H3C Access Controllers System Log Messages Reference(R14xx R12xx)-6W101

HomeSupportWirelessWX3800X Series Access ControllersReference GuidesLog Message ReferencesH3C Access Controllers System Log Messages Reference(R14xx R12xx)-6W101
H3C Access Controllers System Log Messages Reference(R14xx R12xx)-6W101
book
Title Size Download
book 4.18 MB

H3C Access Controllers System Log Messages Reference

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Document version: 6W101-20240923

Copyright © 2024 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice


Contents

Introduction· 1

System log message format 1

Managing and obtaining system log messages· 3

Obtaining log messages from the console terminal 4

Obtaining log messages from a monitor terminal 4

Obtaining log messages from the log buffer 4

Obtaining log messages from the log file· 4

Obtaining log messages from a log host 4

Software module list 5

Using this document 7

AAA messages· 8

AAA_FAILURE· 9

AAA_LAUNCH· 9

AAA_SUCCESS· 10

ACL messages· 10

ACL_ACCELERATE_NO_RES· 10

ACL_ACCELERATE_NONCONTIGUOUSMASK· 11

ACL_ACCELERATE_NOT_SUPPORT· 11

ACL_ACCELERATE_NOT_SUPPORTHOPBYHOP· 12

ACL_ACCELERATE_NOT_SUPPORTMULTITCPFLAG·· 12

ACL_ACCELERATE_UNK_ERR· 13

ACL_IPV6_STATIS_INFO·· 13

ACL_NO_MEM·· 14

ACL_STATIS_INFO·· 14

APMGR·· 14

AP_CREATE_FAILURE· 15

AP_REBOOT_REASON· 15

APMGR_AP_CFG_FAILED·· 15

APMGR_AP_ONLINE· 16

APMGR_GET_AP_MODEL_FAILURE· 16

APMGR_LOG_ADD_AP_FAIL· 17

APMGR_LOG_MEMALERT· 17

APMGR_LOG_NOLICENSE· 18

APMGR_LOG_OFFLINE· 18

APMGR_LOG_ONLINE· 19

APMGR_LOG_ONLINE_FAILED·· 19

APMGR_REACH_MAX_APNUMBER· 20

APMGR_ERROR· 20

CWS_IMG_DOWNLOAD_FAILED·· 20

_DOWN· 21

CWS_AP_UP· 21

CWS_AP_UP· 22

CWS_IMG_DOWNLOAD_COMPLETE· 22

CWS_IMG_DOWNLOAD_FAILED·· 23

CWS_IMG_DOWNLOAD_START· 23

CWS_IMG_OPENFILE_FAILED·· 24

CWS_RUN_DOWNLOAD_COMPLETE· 24

CWS_RUN_DOWNLOAD_START· 25

RADIO·· 25

ARP·· 25

ARP_ACTIVE_ACK_NO_REPLY· 26

ARP_ACTIVE_ACK_NOREQUESTED_REPLY· 26

ARP_BINDRULETOHW_FAILED·· 27

ARP_DETECTION_LOG·· 28

ARP_DUPLICATE_IPADDR_DETECT· 29

ARP_DYNAMIC· 29

ARP_DYNAMIC_IF· 30

ARP_DYNAMIC_SLOT· 31

ARP_ENTRY_CONFLICT· 32

ARP_ENTRY_ENOUGHRESOURCE· 33

ARP_ENTRY_INCONSISTENT· 34

ARP_ENTRY_NORESOURCE· 35

ARP_HOST_IP_CONFLICT· 35

ARP_LOCALPROXY_ENABLE_FAILED·· 36

ARP_RATE_EXCEEDED·· 36

ARP_RATELIMIT_NOTSUPPORT· 37

ARP_SENDER_IP_INVALID·· 37

ARP_SENDER_MAC_INVALID·· 38

ARP_SENDER_SMACCONFLICT· 39

ARP_SENDER_SMACCONFLICT_VSI 40

ARP_SRC_MAC_FOUND_ATTACK· 41

ARP_SUP_ENABLE_FAILED·· 41

ARP_TARGET_IP_INVALID·· 42

ARP_THRESHOLD_REACHED·· 42

ARP_USER_DUPLICATE_IPADDR_DETECT· 43

ARP_USER_MOVE_DETECT· 44

DUPIFIP· 44

DUPIP· 45

DUPVRRPIP· 45

Application audit and management messages· 45

AUDIT_RULE_MATCH_AS_IPV4_LOG (system log) 46

AUDIT_RULE_MATCH_FILE_IPV4_LOG (system log) 47

AUDIT_RULE_MATCH_FORUM_IPV4_LOG (system log) 48

AUDIT_RULE_MATCH_IM_IPV4_LOG (system log) 49

AUDIT_RULE_MATCH_MAIL_IPV4_LOG (system log) 50

AUDIT_RULE_MATCH_OTHER_IPV4_LOG (system log) 51

AUDIT_RULE_MATCH_SEARCH_IPV4_LOG (system log) 52

AUDIT_RULE_MATCH_AS_IPV4_LOG (fast log) 53

AUDIT_RULE_MATCH_FILE_IPV4_LOG (fast log) 54

AUDIT_RULE_MATCH_FORUM_IPV4_LOG (fast log) 55

AUDIT_RULE_MATCH_IM_IPV4_LOG (fast log) 56

AUDIT_RULE_MATCH_MAIL_IPV4_LOG (fast log) 57

AUDIT_RULE_MATCH_OTHER_IPV4_LOG (fast log) 59

AUDIT_RULE_MATCH_SEARCH_IPV4_LOG (fast log) 61

AUDIT_RULE_MATCH_AS_IPV6_LOG (system log) (fast log) 62

AUDIT_RULE_MATCH_FILE_IPV6_LOG (system log) (fast log) 63

AUDIT_RULE_MATCH_FORUM_IPV6_LOG (system log) (fast log) 64

AUDIT_RULE_MATCH_IM_IPV6_LOG (system log) (fast log) 65

AUDIT_RULE_MATCH_MAIL_IPV6_LOG (system log) (fast log) 66

AUDIT_RULE_MATCH_OTHER_IPV6_LOG (system log) (fast log) 67

AUDIT_RULE_MATCH_SEARCH_IPV6_LOG (system log) (fast log) 68

AVC messages· 68

AVC_MATCH_IPV4_LOG·· 69

AVC_MATCH_IPV6_LOG·· 70

AVC_THRESHOLDWARNING_FASTLOGGING_FMT· 71

AVC_THRESHOLDWARNING_FASTLOGGING_IPV6FMT· 72

CFGMAN messages· 73

CFGMAN_ARCHIVE_SCP_FAIL· 73

CFGMAN_ARCHIVE_FAIL· 73

CFGMAN_CFGCHANGED·· 74

CFGMAN_OPTCOMPLETION· 75

CFGMAN_REPLACE_CANCEL· 76

CFGMAN_REPLACE_FAIL· 76

CFGMAN_REPLACE_SOON· 77

CONNLMT messages· 77

CONNLMT_IPV4_OVERLOAD·· 78

CONNLMT_IPV4_RECOVER· 79

CONNLMT_IPV6_OVERLOAD·· 80

CONNLMT_IPV6_RECOVER· 81

DEV·· 81

AUTOSWITCH_FAULT· 82

AUTOSWITCH_FAULT_REBOOT· 82

BOARD_ALARM_CLEAR· 83

BOARD_ALARM_OCCUR· 83

BOARD_FATALALARM_OCCUR· 83

BOARD_REBOOT· 84

BOARD_STATE_NORMAL· 85

CFCARD_INSERTED·· 85

CFCARD_REMOVED·· 86

CHASSIS_REBOOT· 86

CPU_STATE_NORMAL· 87

DEV_BOARD_RUNNING_FAULT· 87

DEV_BOARD_RUNNING_FAULT_REBOOT· 88

DEV_CLOCK_CHANGE· 88

DEV_FAULT_TOOLONG·· 89

FAN_ABSENT· 89

FAN_ALARM_CLEAR· 90

FAN_ALARM_OCCUR· 90

FAN_DIRECTION_NOT_PREFERRED·· 91

FAN_FAILED·· 91

FAN_FATALALARM_CLEAR· 92

FAN_FATALALARM_OCCUR· 92

FAN_RECOVERED·· 93

POWER_ABSENT· 93

POWER_ALARM_CLEAR· 94

POWER_ALARM_OCCUR· 94

POWER_FAILED·· 95

POWER_MONITOR_ABSENT· 95

POWER_MONITOR_FAILED·· 96

POWER_MONITOR_RECOVERED·· 96

POWER_RECOVERED·· 97

POWER_WARNING_CLEAR· 97

POWER_WARNING_OCCUR· 98

SUBCARD_FAULT· 98

SUBCARD_INSERTED·· 99

SUBCARD_REBOOT· 99

SUBCARD_REMOVED·· 100

SYSTEM_REBOOT· 100

TEMPERATURE_ALARM·· 101

TEMPERATURE_ALARM_CLEAR· 102

TEMPERATURE_ALARM_OCCUR· 103

TEMPERATURE_LOW·· 104

TEMPERATURE_NORMAL· 105

TEMPERATURE_SHUTDOWN· 106

TEMPERATURE_WARNING·· 107

TIMER_CREATE_FAILED_FIRST· 108

TIMER_CREATE_FAILED_MORE· 109

VCHK_VERSION_INCOMPATIBLE· 109

VOLTAGE_ALARM_CLEAR· 110

VOLTAGE_ALARM_OCCUR· 111

VOLTAGE_FATALALARM_CLEAR· 112

VOLTAGE_FATALALARM_OCCUR· 113

DHCP·· 113

DHCP_NOTSUPPORTED·· 113

DHCP_NORESOURCES· 114

DHCPR·· 114

DHCPR_SERVERCHANGE· 114

DHCPR_SWITCHMASTER· 115

DHCPS messages· 115

DHCPS_ALLOCATE_IP· 115

DHCPS_EXTEND_FAILURE· 116

DHCPS_CONFLICT_IP· 116

DHCPS_EXTEND_IP· 117

DHCPS_FILE· 117

DHCPS_RECLAIM_IP· 118

DHCPS_UNAVAILABLE_POOL· 118

DHCPS_VERIFY_CLASS· 119

DHCPS6 messages· 119

DHCPS6_ALLOCATE_ADDRESS· 119

DHCPS6_ALLOCATE_PREFIX· 120

DHCPS6_CONFLICT_ADDRESS· 120

DHCPS6_EXTEND_ADDRESS· 121

DHCPS6_EXTEND_ADDRESS_FAILURE· 121

DHCPS6_EXTEND_PREFIX· 122

DHCPS6_EXTEND_PREFIX_FAILURE· 122

DHCPS6_FILE· 123

DHCPS6_RECLAIM_ADDRESS· 123

DHCPS6_RECLAIM_PREFIX· 124

DHCPS6_UNAVAILABLE_POOL· 124

DHCPSP4· 124

DHCPSP4_FILE· 125

DHCPSP4_UNTRUSTED_SERVER· 125

DHCPSP4_DROP_PACKET· 126

DHCPSP6· 126

DHCPSP6_FILE· 127

DHCPSP6_DROP_PACKET· 127

DIAG messages· 128

CORE_EXCEED_THRESHOLD·· 128

CORE_MINOR_RECOVERY· 128

CORE_MINOR_THRESHOLD·· 129

CORE_RECOVERY· 129

CPU_MINOR_RECOVERY· 129

CPU_MINOR_THRESHOLD·· 130

CPU_SEVERE_RECOVERY· 130

CPU_SEVERE_THRESHOLD·· 131

DIAG_FD_UPLIMIT_REACHED·· 133

DIAG_FD_UPLIMIT_TO_REACH· 133

DIAG_STORAGE_BELOW_THRESHOLD·· 134

DIAG_STORAGE_EXCEED_THRESHOLD·· 134

MEM_ALERT· 135

MEM_BELOW_THRESHOLD·· 136

MEM_EXCEED_THRESHOLD·· 137

DIM engine messages· 137

DIM_SIGNATURE_WARNING·· 137

DIM_ACTIVE_WARNING·· 138

DOT1X messages· 138

DOT1X_CLEAR_MAX_USER_THRESHOLD·· 138

DOT1X_CONFIG_NOTSUPPORT· 139

DOT1X_LOGIN_FAILURE· 140

DOT1X_LOGIN_SUCC· 141

DOT1X_LOGIN_SUCC (in open mode) 142

DOT1X_LOGOFF· 142

DOT1X_LOGOFF (in open mode) 143

DOT1X_LOGOFF_ABNORMAL· 143

DOT1X_LOGOFF_ABNORMAL (in open mode) 144

DOT1X_MACBINDING_EXIST· 144

DOT1X_MAX_USER_THRESHOLD·· 145

DOT1X_NOTENOUGH_EADFREEIP_RES· 145

DOT1X_NOTENOUGH_EADFREEMSEG_RES· 146

DOT1X_NOTENOUGH_EADFREERULE_RES· 146

DOT1X_NOTENOUGH_EADMACREDIR_RES· 147

DOT1X_NOTENOUGH_EADPORTREDIR_RES· 147

DOT1X_NOTENOUGH_ENABLEDOT1X_RES· 148

DOT1X_PEXAGG_NOMEMBER_RES· 148

DOT1X_SMARTON_FAILURE· 149

DOT1X_UNICAST_NOT_EFFECTIVE· 149

FIB messages· 149

FIB_PREFIX_ENOUGHRESOURCE· 150

FIB_PREFIX_INCONSISTENT· 151

FIB_PREFIX_NORESOURCE· 152

FIB_VN_ENOUGHRESOURCE· 153

FIB_VN_INCONSISTENT· 154

FIB_VN_NORESOURCE· 155

FNOTIFY messages· 155

NOTIFY· 156

FS messages· 156

FS_UNFORMATTED_PARTITION· 156

FTP messages· 157

FTP_ACL_DENY· 157

FTP_REACH_SESSION_LIMIT· 157

HOTPLUG messages· 157

HOTPLUG_PORT_PLUGIN· 158

HOTPLUG_PORT_PLUGOUT· 158

HTTPD messages· 158

HTTPD_CONNECT· 159

HTTPD_CONNECT_TIMEOUT· 159

HTTPD_DISCONNECT· 159

HTTPD_FAIL_FOR_ACP· 160

HTTPD_REACH_CONNECT_LIMIT· 160

Identity messages· 160

IDENTITY_AUTO_IMPORT_FINISHED·· 161

IDENTITY_AUTO_IMPORT_START· 161

IDENTITY_CSV_IMPORT_FAILED·· 162

IDENTITY_IMC_IMPORT_FAILED_NO_MEMORY· 162

IDENTITY_LDAP_IMPORT_FAILED_NO_MEMORY· 163

IFMON·· 163

BGTRAFFIC_SEND_BEGIN· 163

BGTRAFFIC_SEND_END·· 164

CRC_ERROR_RECOVERY· 164

CRC_ERROR_THRESHOLD·· 165

IFNET· 165

FLEXE_BANDWIDTH_MISMATCH· 166

FLEXE_BANDWIDTH_MISMATCH_RECOVER· 166

FLEXE_BANDWIDTH_REDUCE· 167

FLEXE_BANDWIDTH_REDUCE_RECOVER· 167

FLEXE_CLIENTID_MISMATCH· 168

FLEXE_CLIENTID_MISMATCH_RECOVER· 168

FLEXE_GROUP_FAULT· 168

FLEXE_GROUP_FAULT_RECOVER· 169

FLEXE_GROUPMEMBER_FAULT· 169

FLEXE_GROUPMEMBER_FAULT_RECOVER· 169

FLEXE_PHYFCSSD_ALARM·· 170

FLEXE_PHYFCSSD_ALARM_RECOVER· 170

FLEXE_PHYGROUP_MISMATCH· 171

FLEXE_PHYGROUP_MISMATCH_RECOVER· 171

FLEXE_PHYLOCAL_FAULT· 172

FLEXE_PHYLOCAL_FAULT_RECOVER· 172

FLEXE_PHYNUM_MISMATCH· 172

FLEXE_PHYNUM_MISMATCH_RECOVER· 173

FLEXE_PHYREMOTE_FAULT· 173

FLEXE_PHYREMOTE_FAULT_RECOVER· 173

FLEXE_STSG_MISMATCH· 174

FLEXE_STSG_MISMATCH_RECOVER· 174

IF_JUMBOFRAME_WARN· 175

IF_BUFFER_CONGESTION_CLEAR· 175

IF_BUFFER_CONGESTION_OCCURRENCE· 176

IF_LINKFLAP_DETECTED·· 176

IFMGR_SPEED_CHANGE· 177

INTERFACE_NOTSUPPRESSED·· 177

INTERFACE_SUPPRESSED·· 177

LINK_UPDOWN· 178

PFC_WARNING·· 178

PHY_UPDOWN· 179

PROTOCOL_UPDOWN· 179

STORM_CONSTRAIN_BELOW·· 180

STORM_CONSTRAIN_CONTROLLED·· 180

STORM_CONSTRAIN_EXCEED·· 181

STORM_CONSTRAIN_NORMAL· 181

TUNNEL_LINK_UPDOWN· 182

TUNNEL_PHY_UPDOWN· 182

VLAN_MODE_CHANGE· 182

IP6ADDR·· 183

IP6ADDR_CREATEADDRESS_CONFLICT· 183

IP6ADDR_CREATEADDRESS_ERROR· 183

IP6ADDR_CREATEADDRESS_INVALID·· 184

IP6FW··· 184

IP6FW_ABNORMAL_HEADERS· 184

IP6FW_SETTING_FAILED_NDFW·· 185

IP6FW_SETTING_FAILED_HOPLIMITEXCEED·· 185

IP6FW_SETTING_FAILED_HOPLIMITUNVARIED·· 186

IPADDR messages· 186

IPADDR_HA_EVENT_ERROR· 187

IPADDR_HA_STOP_EVENT· 188

IPFW messages· 188

IPFW_SETTING_FAILED_ARPFW·· 188

IPFW_SETTING_FAILED_TTLEXCEED·· 189

IPFW_SETTING_FAILED_TTLUNVARIED·· 189

IPS messages· 190

IPS_IPV4_INTERZONE· 191

IPS_IPV6_INTERZONE· 193

IPS_WARNING·· 194

IPS_WARNING·· 195

IPSEC messages· 195

IPSEC_DEBUG_LOG·· 195

IPSEC_FAILED_ADD_FLOW_TABLE· 196

IPSEC_GLOBAL_FLAG_LOGP2MPENABLE· 196

IPSEC_KD3P_LOGINFO·· 197

IPSEC_SA_ESTABLISH· 198

IPSEC_SA_ESTABLISH_FAIL· 199

IPSEC_SA_INITIATION· 205

IPSEC_SA_TERMINATE· 206

IPSG messages· 207

IPSG_ADDENTRY_ERROR· 208

IPSG_ADDEXCLUDEDVLAN_ERROR· 209

IPSG_DELENTRY_ERROR· 209

IPSG_DELEXCLUDEDVLAN_ERROR· 210

L2TPv2 messages· 210

L2TPV2_SESSION_EXCEED_LIMIT· 210

L2TPV2_TUNNEL_EXCEED_LIMIT· 211

LAGG messages· 211

LAGG_ACTIVE· 211

LAGG_AUTO_AGGREGATION· 212

LAGG_INACTIVE_AICFG·· 212

LAGG_INACTIVE_BFD·· 213

LAGG_INACTIVE_CONFIGURATION· 213

LAGG_INACTIVE_DUPLEX· 214

LAGG_INACTIVE_HARDWAREVALUE· 214

LAGG_INACTIVE_LACP_ISOLATE· 215

LAGG_INACTIVE_LOWER_LIMIT· 215

LAGG_INACTIVE_PARTNER· 216

LAGG_INACTIVE_PHYSTATE· 216

LAGG_INACTIVE_RESOURCE_INSUFICIE· 217

LAGG_INACTIVE_SPEED·· 217

LAGG_INACTIVE_UPPER_LIMIT· 218

LAGG_PORT_DISCARDING_STATE· 218

LAGG_PORT_FORWARDING_STATE· 219

License· 219

LICENSE_FILE_LOST· 219

LICENSE_FILE_RESTORE· 220

LICENSE_NEAR_EXPIRE· 220

LICENSE_EXPIRE· 220

LICENSE_TAKE_EFFECT· 221

LICENSE_PRE_NEAR_EXPIRE· 221

LICENSE_PRE_EXPIRE· 221

CLCP·· 221

CLCP_CLIENT_LOGIN_FAIL· 222

CLCP_NEAR_EXPIRE· 222

CLCP_RECLAIM·· 223

CLCP_REQUEST_FAIL· 224

CLCP_RECLAIM_ALARM·· 224

CLCP_CLIENT_OFFLINE· 225

LIPC messages· 225

LIPC_MTCP_CHECK· 225

LIPC_STCP_CHECK· 226

LIPC_STCP_DUPLICATE_SOCKET· 227

LIPC_SUDP_CHECK· 227

PORT_CHANGE· 228

LLDP messages· 228

LLDP_CREATE_NEIGHBOR· 228

LLDP_DELETE_NEIGHBOR· 229

LLDP_LESS_THAN_NEIGHBOR_LIMIT· 229

LLDP_NEIGHBOR_AGE_OUT· 230

LLDP_NEIGHBOR_PROTECTION_BLOCK· 231

LLDP_NEIGHBOR_PROTECTION_DOWN· 232

LLDP_NEIGHBOR_PROTECTION_UNBLOCK· 233

LLDP_NEIGHBOR_PROTECTION_UP· 233

LLDP_PVID_INCONSISTENT· 234

LLDP_REACH_NEIGHBOR_LIMIT· 234

LOAD messages· 234

BOARD_LOADING·· 235

LOAD_FAILED·· 236

LOAD_FINISHED·· 237

LOGIN messages· 237

LOGIN_AUTHENTICATION_FAILED·· 237

LOGIN_FAILED·· 238

LOGIN_ INVALID_USERNAME_PWD·· 238

LPDT messages· 238

LPDT_LOOPED·· 239

LPDT_RECOVERED·· 239

LPDT_VLAN_LOOPED·· 240

LPDT_VLAN_RECOVERED·· 240

LS messages· 240

LOCALSVR_FAIL_TO_WRITETIME2FILE· 241

LOCALSVR_PROMPTED_CHANGE_PWD·· 241

LS_ADD_USER_TO_GROUP· 242

LS_AUTHEN_FAILURE· 242

LS_AUTHEN_SUCCESS· 243

LS_DEL_USER_FROM_GROUP· 243

LS_PWD_ADD_BLACKLIST· 244

LS_PWD_CHGPWD·· 244

LS_PWD_CHGPWD_FOR_AGEDOUT· 245

LS_PWD_CHGPWD_FOR_AGEOUT· 245

LS_PWD_CHGPWD_FOR_COMPOSITION· 245

LS_PWD_CHGPWD_FOR_FIRSTLOGIN· 246

LS_PWD_CHGPWD_FOR_LENGTH· 246

LS_PWD_FAILED2WRITEPASS2FILE· 247

LS_PWD_MODIFY_FAIL· 248

LS_PWD_MODIFY_SUCCESS· 249

LS_REAUTHEN_FAILURE· 249

LS_UPDATE_PASSWORD_FAIL· 250

LS_USER_CANCEL· 250

LS_USER_PASSWORD_EXPIRE· 251

LS_USER_ROLE_CHANGE· 251

MAC messages· 251

MAC_DRIVER_ADD_ENTRY· 252

MAC_NOTIFICATION· 253

MAC_TABLE_FULL_GLOBAL· 254

MAC_TABLE_FULL_PORT· 254

MAC_TABLE_FULL_VLAN· 255

MAC_VLAN_LEARNLIMIT_NORESOURCE· 255

MAC_VLAN_LEARNLIMIT_NOTSUPPORT· 256

MACA messages· 256

MACA_ENABLE_NOT_EFFECTIVE· 256

MACA_LOGIN_FAILURE· 257

MACA_LOGIN_SUCC· 258

MACA_LOGIN_SUCC (in open mode) 258

MACA_LOGOFF· 259

MACA_LOGOFF (in open mode) 260

MFIB messages· 260

MFIB_MEM_ALERT· 261

NAT messages· 261

EIM_MODE_PORT_USAGE_ALARM·· 262

NAT_ADDR_BIND_CONFLICT· 263

NAT_EIM·· 264

NAT_FLOW·· 265

NAT_SERVER_INVALID·· 266

NAT_SERVICE_CARD_RECOVER_FAILURE· 267

NAT444_SYSLOG·· 268

PORT_USAGE_ALARM·· 268

PORTBLOCK_ALARM·· 269

PORTBLOCKGRP_MEMORY_WARNING·· 270

ND·· 270

ND_CONFLICT· 270

ND_DUPADDR· 271

ND_ENTRY_ENOUGHRESOURCE· 271

ND_ENTRY_INCONSISTENT· 272

ND_ENTRY_NORESOURCE· 273

ND_LOCALPROXY_ENABLE_FAILED·· 273

ND_MAC_CHECK· 274

ND_RAGUARD_DROP· 274

ND_RATE_EXCEEDED·· 275

ND_RATELIMIT_NOTSUPPORT· 276

ND_SET_PORT_TRUST_NORESOURCE· 276

ND_SET_VLAN_REDIRECT_NORESOURCE· 277

ND_SNOOPING_LEARN_ALARM_REACH· 277

ND_SNOOPING_LEARN_ALARM_RECOVER· 277

ND_USER_DUPLICATE_IPV6ADDR· 278

ND_USER_MOVE· 279

ND_USER_OFFLINE· 279

ND_USER_ONLINE· 280

NETCONF messages· 280

CLI 281

EDIT-CONFIG·· 282

EDIT_CONFIG_CLI 284

NETCONF_MSG_DEL· 285

REPLY· 285

THREAD·· 286

NQA·· 286

NQA_ENTRY_PROBE_RESULT· 286

NQA_LOG_UNREACHABLE· 287

NQA_PACKET_OVERSIZE· 287

NQA_SCHEDULE_FAILURE· 288

NQA_SERVER_ADDR_UNAVAILABLE· 288

NQA_SERVER_PORT_UNAVAILABLE· 289

NQA_TWAMP_LIGHT_PACKET_INVALID·· 290

NQA_TWAMP_LIGHT_REACTION· 291

NQA_TWAMP_LIGHT_START_FAILURE· 291

NQA_UPF_UE_PROBE· 292

NTP·· 293

NTP_CLOCK_CHANGE· 294

NTP_LEAP_CHANGE· 295

NTP_SOURCE_CHANGE· 296

NTP_SOURCE_LOST· 296

NTP_STRATUM_CHANGE· 297

OPTMOD·· 298

BIAS_HIGH· 298

BIAS_LOW·· 298

BIAS_NORMAL· 299

CFG_ERR· 299

CHKSUM_ERR· 300

FIBER_SFP MODULE_INVALID·· 300

FIBER_SFPMODULE_NOWINVALID·· 301

IO_ERR· 301

MOD_ALM_OFF· 302

MOD_ALM_ON· 302

MODULE_IN· 302

MODULE_OUT· 303

OPTICAL_WARNING_CLEAR· 303

OPTICAL_WARNING_OCCUR· 304

OPTMOD_COUNTERFEIT_MODULE· 305

OPTMOD_MODULE_CHECK· 305

PHONY_MODULE· 306

RX_ALM_OFF· 306

RX_ALM_ON· 307

RX_POW_HIGH· 307

RX_POW_LOW·· 308

RX_POW_NORMAL· 308

TEMP_HIGH· 309

TEMP_LOW·· 309

TEMP_NORMAL· 310

TX_ALM_OFF· 310

TX_ALM_ON· 310

TX_POW_HIGH· 311

TX_POW_LOW·· 311

TX_POW_NORMAL· 312

TYPE_ERR· 312

VOLT_HIGH· 313

VOLT_LOW·· 313

VOLT_NORMAL· 314

OSPF· 314

OSPF_DUP_RTRID_NBR· 314

OSPF_IP_CONFLICT_INTRA· 315

OSPF_LAST_NBR_DOWN· 316

OSPF_NBR_CHG·· 319

OSPF_NBR_CHG_REASON· 321

OSPF_RTRID_CHG·· 324

OSPF_RTRID_CONFLICT_INTER· 325

OSPF_RTRID_CONFLICT_INTRA· 325

OSPF_VLINKID_CHG·· 326

PBR messages· 326

PBR_HARDWARE_BIND_ERROR· 326

PBR_HARDWARE_ERROR· 327

PBR_NEXTHOP_CHANGE· 328

PING messages· 328

PING_STATISTICS· 329

PING_VPN_STATISTICS· 330

PKG messages· 330

PKG_BOOTLOADER_FILE_FAILED·· 331

PKG_BOOTLOADER_FILE_SUCCESS· 331

PKG_INSTALL_ACTIVATE_FAILED·· 331

PKG_INSTALL_ACTIVATE_SUCCESS· 332

PKI messages· 332

REQUEST_CERT_FAIL· 332

REQUEST_CERT_SUCCESS· 333

PKT2CPU messages· 333

PKT2CPU_NO_RESOURCE· 333

Portal messages· 333

PORTAL_USER_LOGOFF· 334

PORTAL_USER_LOGON_FAIL· 337

PORTAL_USER_LOGON_SUCCESS· 338

PPP messages· 338

IPPOOL_ADDRESS_EXHAUSTED·· 339

PPP_USER_LOGON_SUCCESS· 339

PPP_USER_LOGON_FAILED·· 340

PPP_USER_LOGOFF· 341

PPP_USER_LOGOFF_ABNORMAL· 342

PWDCTL messages· 343

PWDCTL_ADD_BLACKLIST· 344

PWDCTL_CHANGE_PASSWORD·· 345

PWDCTL_DELETE_BLACKLIST· 345

PWDCTL_FAILED_TO_OPENFILE· 346

PWDCTL_FAILED_TO_WRITEPWD·· 346

PWDCTL_NOENOUGHSPACE· 347

PWDCTL_NOTFOUNDUSER· 347

PWDCTL_UPDATETIME· 348

PWDCTL_USER_LOCK· 348

PWDCTL_USER_UNLOCK· 349

PWDCTL_USER_INLOCKING·· 349

QoS·· 349

MIRROR_SYNC_CFG_FAIL· 350

QOS_BANDWIDTH_TOTALCHANNEL· 350

QOS_CAR_APPLYUSER_FAIL· 351

QOS_CBQ_REMOVED·· 351

QOS_CHANNEL_APPLYIF_FAIL· 352

QOS_GTS_APPLYUSER_FAIL· 352

QOS_IFA_OUTPUT_IFFAIL· 353

QOS_ITACAR_APPLYUSER_FAIL· 353

QOS_NOT_ENOUGH_BANDWIDTH· 354

QOS_NOT_ENOUGH_NNIBANDWIDTH· 355

QOS_POLICY_APPLYCOPP_CBFAIL· 356

QOS_POLICY_APPLYCOPP_FAIL· 356

QOS_POLICY_APPLYGLOBAL_CBFAIL· 357

QOS_POLICY_APPLYGLOBAL_FAIL· 357

QOS_POLICY_APPLYIF_CBFAIL· 358

QOS_POLICY_APPLYIF_FAIL· 358

QOS_POLICY_APPLYTUN_FAIL· 359

QOS_POLICY_APPLYTUN_SUCCESS· 359

QOS_POLICY_APPLYUSER_FAIL· 360

QOS_POLICY_APPLYVLAN_CBFAIL· 360

QOS_POLICY_APPLYVLAN_FAIL· 361

QOS_PRIORITY_APPLYUSER_FAIL· 361

QOS_QMPROFILE_APPLYUSER_FAIL· 362

QOS_QMPROFILE_MODIFYQUEUE_FAIL· 362

QOS_UNI_RESTORE_FAIL· 363

WRED_TABLE_CFG_FAIL· 363

RADIUS messages· 363

RADIUS_ACCT_SERVER_DOWN· 364

RADIUS_ACCT_SERVER_UP· 364

RADIUS_AUTH_FAILURE· 365

RADIUS_AUTH_SERVER_DOWN· 365

RADIUS_AUTH_SERVER_UP· 366

RADIUS_AUTH_SUCCESS· 366

RADIUS_DELETE_HOST_FAIL· 366

RESMON·· 367

RESMON_MINOR· 367

RESMON_MINOR_RECOVERY· 368

RESMON_SEVERE· 368

RESMON_SEVERE_RECOVERY· 369

RESMON_USEDUP· 369

RESMON_USEDUP_RECOVERY· 370

RIP messages· 370

RIPLOG·· 371

RIPNG messages· 371

RIPNGLOG·· 372

RM messages· 372

RM_ACRT_REACH_LIMIT· 373

RM_ACRT_REACH_THRESVALUE· 374

RM_THRESHLD_VALUE_REACH· 375

RRM messages· 375

RRM_LOG_ADJUSTCHANNEL· 376

RTM messages· 376

RTM_TCL_LOAD_FAILED·· 376

RTM_TCL_MODIFY· 377

RTM_TCL_NOT_EXIST· 377

SCMD messages· 377

PROCESS_ABNORMAL· 378

PROCESS_ACTIVEFAILED·· 379

PROCESS_CORERECORD·· 379

SCM_ABNORMAL_REBOOT· 380

SCM_ABNORMAL_REBOOTMDC· 380

SCM_ABORT_RESTORE· 381

SCM_KERNEL_INIT_TOOLONG·· 381

SCM_PROCESS_STARTING_TOOLONG·· 382

SCM_PROCESS_STILL_STARTING·· 383

SCM_SKIP_PROCESS· 384

ASPF messages· 384

ASPF_IPV4_DNS· 385

ASPF_IPV6_DNS· 386

SESSION messages· 386

DENY_SESSION_IPV4_FLOW·· 387

DENY_SESSION_IPV6_FLOW·· 388

SHELL messages· 389

SHELL_CMD·· 389

SHELL_CMD_CONFIRM·· 390

SHELL_CMD_EXECUTEFAIL· 390

SHELL_CMD_INPUT· 391

SHELL_CMD_INPUT_TIMEOUT· 391

SHELL_CMD_INVALID_CHARACTER· 392

SHELL_CMD_LOCKEDBYOTHER· 392

SHELL_CMD_MATCHFAIL· 393

SHELL_CMDDENY· 393

SHELL_CMDFAIL· 394

SHELL_COMMIT· 394

SHELL_COMMIT_DELAY· 394

SHELL_COMMIT_FAIL· 395

SHELL_COMMIT_REDELAY· 395

SHELL_COMMIT_ROLLBACK· 396

SHELL_COMMIT_ROLLBACKDONE· 396

SHELL_COMMIT_ROLLBACKFAIL· 397

SHELL_COMMIT_SUCCESS· 397

SHELL_COMMIT_WILLROLLBACK· 398

SHELL_CRITICAL_CMDFAIL· 398

SHELL_LOGIN· 399

SHELL_LOGOUT· 399

SHELL_SAVE_FAILED·· 400

SHELL_SAVE_SUCCESS· 400

SHELL_SAVEPOINT_EXIST· 401

SHELL_SAVEPOINT_FAILED·· 401

SHELL_SAVEPOINT_SUCCESS· 401

SNMP messages· 402

SNMP_ACL_RESTRICTION· 402

SNMP_AUTHENTICATION_FAILURE· 403

SNMP_DISP_NODE· 404

SNMP_GET· 405

SNMP_NOTIFY· 406

SNMP_SET· 406

SNMP_USM_NOTINTIMEWINDOW·· 407

SSHC messages· 407

SSHC_CERT_VERIFY_FAIL· 408

SSHS·· 409

SSHS_ACL_DENY· 409

SSHS_ALGORITHM_MISMATCH· 410

SSHS_AUTH_EXCEED_RETRY_TIMES· 410

SSHS_AUTH_FAIL· 411

SSHS_AUTH_SUCCESS· 412

SSHS_AUTH_TIMEOUT· 412

SSHS_AUTHOR_FAIL· 413

SSHS_CERT_VERIFY_FAIL· 414

SSHS_CONNECT· 415

SSHS_DECRYPT_FAIL· 416

SSHS_DISCONNECT· 416

SSHS_ENCRYPT_FAIL· 417

SSHS_LOG·· 417

SSHS_MAC_ERROR· 418

SSHS_REACH_SESSION_LIMIT· 418

SSHS_REACH_USER_LIMIT· 419

SSHS_SCP_DISCONNECT· 419

SSHS_SCP_OPER· 420

SSHS_SFTP_DISCONNECT· 420

SSHS_SFTP_OPER· 421

SSHS_SRV_UNAVAILABLE· 421

SSHS_VERSION_MISMATCH· 422

SSL VPN messages· 422

SSLVPN_HTTP_BIND_ADDRESS_INUSED·· 422

SSLVPN_HTTP_BIND_PORT_ALLOCETED·· 423

SSLVPN_IP_RESOURCE_DENY· 423

SSLVPN_IP_RESOURCE_FAILED·· 424

SSLVPN_IP_RESOURCE_PERMIT· 424

SSLVPN_IPAC_ALLOC_ADDR_FAIL· 425

SSLVPN_IPAC_ALLOC_ADDR_SUCCESS· 426

SSLVPN_IPAC_CONN_CLOSE· 427

SSLVPN_IPAC_PACKET_DROP· 428

SSLVPN_IPAC_RELEASE_ADDR_SUCCESS· 428

SSLVPN_SERVICE_UNAVAILABLE· 429

SSLVPN_USER_LOGIN· 429

SSLVPN_USER_LOGINFAILED·· 430

SSLVPN_USER_LOGOUT· 431

SSLVPN_USER_NUMBER· 431

STAMGR messages· 431

STAMGR_ADD_FAILVLAN· 432

STAMGR_AUTHORACL_FAILURE· 433

STAMGR_AUTHORUSERPROFILE_FAILURE· 434

STAMGR_BSS_FAILURE· 435

STAMGR_CLEINT_BSS_MAXCOUNT· 435

STAMGR_CLIENT_FAILURE· 436

STAMGR_CLIENT_OFFLINE· 445

STAMGR_CLIENT_ONLINE· 450

STAMGR_CLEINT_RADIO_MAXCOUNT· 451

STAMGR_CLIENT_SNOOPING·· 451

STAMGR_ESCAPE_ACTIVE· 452

STAMGR_ESCAPE_DEACTIVE· 452

STAMGR_DOMAIN_UNREACHABLE· 453

STAMGR_DOMAIN_REACHABLE· 453

STAMGR_MACA_LOGIN_FAILURE· 454

STAMGR_MACA_LOGIN_SUCC· 455

STAMGR_MACA_LOGOFF· 456

STAMGR_ROAM_FAILED·· 458

STAMGR_ROAM_SUCCESS· 459

STAMGR_SAVI_BIND·· 460

STAMGR_SAVI_UNBIND·· 460

STAMGR_SAVI_UNKNOWN_SOURCE_IP· 461

STAMGR_SERVICE_FAILURE· 462

STAMGR_SERVICE_OFF· 466

STAMGR_STA_ADDMOB_LKUP_ENDOFIOCTL· 467

STAMGR_SERVICE_ON· 467

STAMGR_TRIGGER_IP· 468

STP·· 468

STP_BPDU_PROTECTION· 468

STP_BPDU_RECEIVE_EXPIRY· 469

STP_CONSISTENCY_CHECK· 469

STP_CONSISTENCY_RESTORATION· 470

STP_DETECTED_TC· 470

STP_DISABLE· 470

STP_DISCARDING·· 471

STP_DISPUTE· 472

STP_ENABLE· 472

STP_FORWARDING·· 473

STP_LOOP_PROTECTION· 474

STP_LOOPBACK_PROTECTION· 474

STP_NOT_ROOT· 475

STP_NOTIFIED_TC· 476

STP_PORT_TYPE_INCONSISTENCY· 476

STP_PVID_INCONSISTENCY· 477

STP_PVST_BPDU_PROTECTION· 477

STP_ROOT_PROTECTION· 478

STP_STG_NUM_DETECTION· 478

SYSLOG messages· 479

SYSLOG_LOGBUFFER_FAILURE· 479

SYSLOG_LOGFILE_FULL· 479

SYSLOG_NO_SPACE· 480

SYSLOG_RESTART· 480

SYSLOG_RTM_EVENT_BUFFER_FULL· 481

TACACS messages· 481

TACACS_ACCT_SERVER_DOWN· 482

TACACS_ACCT_SERVER_UP· 483

TACACS_AUTH_FAILURE· 483

TACACS_AUTH_SERVER_DOWN· 484

TACACS_AUTH_SERVER_UP· 485

TACACS_AUTH_SUCCESS· 485

TACACS_AUTHOR_SERVER_DOWN· 486

TACACS_AUTHOR_SERVER_UP· 487

TACACS_DELETE_HOST_FAIL· 487

TELNETD messages· 487

TELNETD_REACH_SESSION_LIMIT· 488

VLAN messages· 488

VLAN_CREATEVLAN_NO_ENOUGH_RESOUR· 488

VLAN_FAILED·· 489

VLAN_VLANMAPPING_FAILED·· 489

VLAN_VLANTRANSPARENT_FAILED·· 489

VRRP4· 490

VRRP_STATUS_CHANGE· 491

VRRP_VF_STATUS_CHANGE· 494

VRRP_VMAC_INEFFECTIVE· 495

VRRP4_MANUAL_PREEMPT_FAILED·· 496

VRRP6· 497

VRRP_STATUS_CHANGE· 498

VRRP_VF_STATUS_CHANGE· 500

VRRP_VMAC_INEFFECTIVE· 501

VRRP6_MANUAL_PREEMPT_FAILED·· 502

VSRP messages· 502

VSRP_BIND_FAILED·· 503

WIPS messages· 503

APFLOOD·· 503

AP_CHANNEL_CHANGE· 504

ASSOCIATEOVERFLOW·· 504

HONEYPOT· 505

HTGREENMODE· 505

MAN_IN_MIDDLE· 506

WIPS_DOS· 506

WIPS_FLOOD·· 507

WIPS_MALF· 508

WIPS_ROGUE· 509

WIPS_SIGNATURE· 509

WIPS_SPOOF· 510

WIPS_UNAUTH· 511

WIPS_WEAKIV· 511

WIRELESSBRIDGE· 512

WSA messages· 512

WSA_DEVICE· 512

 


Introduction

This document includes the following system messages:

·     Messages specific to the access controller

·     Messages for the Comware 9 software platform. Some platform system messages might not be available on the access controller.

This document is intended only for managing H3C access controllers. Do not use this document for any other device models.

This document assumes that the readers are familiar with data communications technologies and H3C networking products.

System log message format

By default, the system log messages use one of the following formats depending on the output destination:

·     Log host:

<PRI>TIMESTAMP Sysname %%vendorMODULE/severity/MNEMONIC: location; CONTENT

·     Destinations except for the log host:

Prefix TIMESTAMP Sysname MODULE/severity/MNEMONIC: CONTENT

 

 

NOTE:

Log message examples in this document use the format for destinations except the log host. They do not contain elements available only for the log host, including the location element.

 

Table 1 System log message elements

Element

Description

<PRI>

Priority identifier. This element is contained only in messages sent to the log host.

It is calculated by using the following formula:

Priority identifier=facilityx8+severity

Where:

·     Facility is specified by using the info-center loghost command. A log host uses this parameter to identify log sources and filter log messages.

·     Severity represents the importance of the message. For more information about severity levels, see Table 2.

Prefix

Message type identifier. This element is contained in the system log messages sent to non-log-host destinations.

The element uses the following symbols to indicate message severity:

·     Percentage sign (%)—Informational and higher levels.

·     Asterisk (*)—Debug level.

TIMESTAMP

Date and time when the event occurred.

The following are commands for configuring the timestamp format:

·     Log host—Use the info-center timestamp loghost command.

·     Non-log-host destinations—Use the info-center timestamp command.

Sysname

Name or IP address of the device that generated the message.

%%vendor

Manufacturer flag. This element is %%10 for H3C.

This element is only available in messages sent to the log host.

MODULE

Name of the module that produced the message.

severity

Severity level of the message. (For more information about severity levels, see Table 2.)

MNEMONIC

Text string that uniquely identifies the system message. The maximum length is 32 characters.

location

Optional. This element identifies where the message occurred. This element is contained only in messages sent to the log host.

This element presents location information for the message in the following format:

-attribute1=x-attribute2=y…-attributeN=z

The following are examples of location attributes:

·     -MDC=XX, which represents the MDC on which the message occurred.

·     -DevIp=XXX.XXX.XXX.XXX, which represents the source IP of the message.

·     -Slot=XX, which represents the slot on which the message occurred.

·     -Chassis=XX-Slot=XX, which represents the chassis and slot on which the message occurred.

This element is separated from the message description by using a semicolon (;).

CONTENT

Text string that contains detailed information about the event or error.

For variable fields in this element, this document uses the representations in Table 3.

The CONTENT field in most log messages is represented by one or multiple sentences, for example, VTY logged in from 192.168.1.21. Certain log messages are used only to record parameter values. The CONTENT field for such messages is represented in the format of key info 1;key info 2,..key info n. The key information can be one of the following formats:

·     Keyword(keyword ID)=Value

·     Keyword(keyword ID)=(Text ID)Text description

The IDs are factory default parameters that enable the log host software (for example, security management system) to parse keyword content:

·     The keyword ID represents the keyword before the ID.

·     The text ID represents the text description after the ID.

For example, in the key information streamAlarmType(1032)=(42)Too fast speed of TCP session to destination IP, value 1032 represents keyword streamAlarmType, and value 42 represents text description Too fast speed of TCP session to destination IP.

 

System log messages are classified into eight severity levels from 0 to 7. The lower the number, the higher the severity, as shown in Table 2.

Table 2 System log message severity levels

Level

Severity

Description

0

Emergency

The system is unusable. For example, the system authorization has expired.

1

Alert

Action must be taken immediately. For example, traffic on an interface exceeds the upper limit.

2

Critical

Critical condition. For example, the device temperature exceeds the upper limit, the power module fails, or the fan tray fails.

3

Error

Error condition. For example, the link state changes or a storage card is unplugged.

4

Warning

Warning condition. For example, an interface is disconnected, or the memory resources are used up.

5

Notification

Normal but significant condition. For example, a terminal logs in to the device, or the device reboots.

6

Informational

Informational message. For example, a command or a ping operation is executed.

7

Debug

Debugging message.

 

For variable fields in the message text, this document uses the representations in Table 3. The values are case insensitive, even though the representations are uppercase letters.

Table 3 Variable field representations

Representation

Information type

INT16

Signed 16-bit decimal number.

UINT16

Unsigned 16-bit decimal number.

INT32

Signed 32-bit decimal number.

UINT32

Unsigned 32-bit decimal number.

INT64

Signed 64-bit decimal number.

UINT64

Unsigned 64-bit decimal number.

DOUBLE

Two dot-separated signed 32-bit decimal numbers. The format is [INTEGER].[INTEGER].

HEX

Hexadecimal number.

CHAR

Single character.

STRING

Character string.

IPADDR

IP address.

MAC

MAC address.

DATE

Date.

TIME

Time.

 

Managing and obtaining system log messages

You can manage system log messages by using the information center.

By default, the information center is enabled. Log messages can be output to the console, monitor terminal, log buffer, log host, and log file.

To filter log messages, use the info-center source command to specify log output rules. A log output rule specifies the source modules and the lowest severity level of log messages that can be output to a destination. A log message is output if its severity level is higher than or equal to the specified level. For example, if you specify a severity level of 6 (informational), log messages that have a severity level from 0 to 6 are output.

For more information about using the information center, see the network management and monitoring configuration guide for the product.

Obtaining log messages from the console terminal

Access the device through the console port. Real-time log messages are displayed on the console terminal.

Obtaining log messages from a monitor terminal

Monitor terminals refer to terminals that access the device through the AUX, VTY, or TTY lines (for example, Telnet). To obtain log messages from a monitor terminal, use the following guidelines:

·     To display log messages on the monitor terminal, you must configure the terminal monitor command.

·     For monitor terminals, the lowest level of log messages that can be displayed is determined by both the terminal logging level and info-center source commands.

 

 

NOTE:

Settings for the terminal monitor and terminal logging level commands take effect only on the current login session. The default settings for the commands restore at a relogin.

 

Obtaining log messages from the log buffer

Use the display logbuffer command to display history log messages in the log buffer.

Obtaining log messages from the log file

By default, the log file feature automatically saves logs from the log file buffer to the log file every 24 hours. You can use the info-center logfile frequency command to change the automatic saving internal.

To manually save logs to the log file, use the logfile save command. The log file buffer is cleared each time a save operation is performed.

By default, you can obtain the log file from the flash:/logfile path if the device only supports the fixed storage medium flash.

To view the contents of the log file on the device, use the more command.

Obtaining log messages from a log host

Use the info-center loghost command to specify the service port number and IP address of a log host. To specify multiple log hosts, repeat the command.

For a successful log message transmission, make sure the specified port number is the same as the port number used on the log host. The default service port number is 514.

Software module list

Table 4 lists all software modules that might produce system log messages. This document uses "OPENSRC" to represent all open source modules.

Table 4 Software module list

Module name representation

Module name expansion

AAA

Authentication, Authorization and Accounting

ACL

Access Control List

APMGR

Access Point Management

ARP

Address Resolution Protocol

AUDIT

Audit

AVC

Application Visible Control

CFGMAN

Configuration Management

DEV

Device Management

DHCP

Dynamic Host Configuration Protocol

DHCPR

IPv4 DHCP Relay

DHCPS

DHCP Server

DHCPS6

DHCPv6 Server

DHCPSP4

DHCP Snooping

DHCPSP6

DHCPv6 Snooping

DIAG

Diagnosis

DIM

DPI Engine

DOT1X

802.1X

FNOTIFY

Fnotify

FS

File System

FTP

File Transfer Protocol

HOTPLUG

Hotplug

HTTPD

Hypertext Transfer Protocol Daemon

IDENTITY

Identity

IFMON

Interface Monitor

IFNET

Interface Net Management

IP6ADDR

IPv6 Addressing

IP6FW

IPv6 Forwarding

IPADDR

IP Addressing

IPFW

IP Forwarding

IPS

Intrusion Prevention System

IPSEC

IP Security

IPSG

IP Source Guard

L2TPV2

Layer 2 Tunneling Protocol Version 2

LAGG

Link Aggregation

License

License

LIPC

Leopard Inter-process Communication

LLDP

Link Layer Discovery Protocol

LOAD

Load Management

LOGIN

Login

LPDT

Loopback Detection

LS

Local Server

MAC

Media Access Control

MACA

MAC Authentication

MFIB

Multicast Forwarding Information Base

NAT

Network Address Translation

ND

Neighbor Discovery

NETCONF

Network Configuration Protocol

NQA

Network Quality Analyzer

NTP

Network Time Protocol

OPTMOD

Optical Module

OSPF

Open Shortest Path First

PBR

Policy-Based Routing

PFILTER

Packet Filter

PING

Packet Internet Groper

PKG

Package

PKI

Public Key Infrastructure

PKT2CPU

Packet to CPU

PORTAL

Portal

PPP

Point to Point Protocol

PPPOES

PPP over Ethernet Server

PWDCTL

Password Control

QOS

Quality of Service

RADIUS

Remote Authentication Dial In User Service

RIP

Routing Information Protocol

RIPNG

Routing Information Protocol Next Generation

RM

Routing Management

RRM

Radio Resource Management

RTM

Real-Time Event Manager

SCMD

Service Control Manager

SECP

Security Policy

SESSION

Session

SHELL

Shell

SNMP

Simple Network Management Protocol

SSHS

Secure Shell Server

SSL VPN

Secure Sockets Layer Virtual Private Network

STAMGR

Station Management

STP

Spanning Tree Protocol

SYSLOG

System Log

TACACS

Terminal Access Controller Access Control System

TELNETD

Telnet Daemon

VLAN

Virtual Local Area Network

VRRP

Virtual Router Redundancy Protocol

VSRP

Virtual Service Redundancy Protocol

WIPS

Wireless Intrusion Prevention System

WSA

Wireless Spectrum Analysis

 

Using this document

This document categorizes system log messages by software module. The modules are ordered alphabetically. Except for OPENSRC, the system log messages for each module are listed in alphabetic order of their mnemonic names. The OPENSRC messages are unordered because they use the same mnemonic name (SYSLOG). For each OPENSRC message, the section title uses a short description instead of the mnemonic name.

This document explains messages in tables. Table 5 describes information provided in these tables.

Table 5 Message explanation table contents

Item

Content

Example

Message text

Presents the message description.

ACL [UINT32] [STRING] [UINT64] packet(s).

Variable fields

Briefly describes the variable fields in the order that they appear in the message text.

The variable fields are numbered in the "$Number" form to help you identify their location in the message text.

$1: ACL number.

$2: ID and content of an ACL rule.

$3: Number of packets that matched the rule.

Severity level

Provides the severity level of the message.

6

Example

Provides a real message example. The examples do not include the "<PRI>TIMESTAMP Sysname %%vendor" part or the "Prefix TIMESTAMP Sysname" part, because information in this part varies with system settings.

ACL/6/ACL_STATIS_INFO: ACL 2000 rule 0 permit source 1.1.1.1 0 logging 10000 packet(s).

Explanation

Explains the message, including the event or error cause.

Number of packets that matched an ACL rule. This message is sent when the packet counter changes.

Recommended action

Provides recommended actions. For informational messages, no action is required.

No action is required.

 

AAA messages

This section contains AAA messages.

AAA_FAILURE

Message text

-AAAType=[STRING]-AAADomain=[STRING]-Service=[STRING]-UserName=[STRING]; AAA failed.

Variable fields

$1: AAA type.

$2: AAA scheme.

$3: Service.

$4: Username.

Severity level

5 (Notification)

Example

AAA/5/AAA_FAILURE: -AAAType=AUTHOR-AAADomain=domain1-Service=login-UserName=cwf@system; AAA failed.

Impact

No negative impact on the system.

Cause

An AAA request was rejected.

The following are the common reasons:

·     No response was received from the server.

·     The username or password was incorrect.

·     The service type that the user applied for was incorrect.

Recommended action

1.     Verify that the device is correctly connected to the server.

2.     Enter the correct username and password.

3.     Verify that the server settings are the same as the settings on the device.

4.     If the problem persists, collect the device configuration file, log information, and alarm information, and contact H3C Support.

 

AAA_LAUNCH

Message text

-AAAType=[STRING]-AAADomain=[STRING]-Service=[STRING]-UserName=[STRING]; AAA launched.

Variable fields

$1: AAA type.

$2: AAA scheme.

$3: Service.

$4: Username.

Severity level

6 (Informational)

Example

AAA/6/AAA_LAUNCH: -AAAType=AUTHEN-AAADomain=domain1-Service=login-UserName=cwf@system; AAA launched.

Impact

No negative impact on the system.

Cause

The user attempts to come online through AAA authentication.

Recommended action

No action is required.

 

AAA_SUCCESS

Message text

-AAAType=[STRING]-AAADomain=[STRING]-Service=[STRING]-UserName=[STRING]; AAA succeeded.

Variable fields

$1: AAA type.

$2: AAA scheme.

$3: Service.

$4: Username.

Severity level

6 (Informational)

Example

AAA/6/AAA_SUCCESS: -AAAType=AUTHOR-AAADomain=domain1-Service=login-UserName=cwf@system; AAA succeeded.

Impact

No negative impact on the system.

Cause

The device accepted an AAA request.

Recommended action

No action is required.

 

ACL messages

This section contains ACL messages.

ACL_ACCELERATE_NO_RES

Message text

Failed to accelerate [STRING] ACL [UINT32]. The resources are insufficient.

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

4 (Warning)

Example

ACL/4/ACL_ACCELERATE_NO_RES: Failed to accelerate IPv6 ACL 2001. The resources are insufficient.

Impact

If the ACL contains a large number of rules, the packet match speed will be affected, and the connection establishment time or packet forwarding efficiency will be affected.

Cause

Hardware resources were insufficient for accelerating an ACL.

Recommended action

Delete some rules or disable ACL acceleration for other ACLs to release hardware resources.

 

ACL_ACCELERATE_NONCONTIGUOUSMASK

Message text

Failed to accelerate IPv4 ACL [UINT32]. ACL acceleration supports only contiguous wildcard masks.

Variable fields

$1: ACL number.

Severity level

4 (Warning)

Example

ACL/4/ACL_ACCELERATE_NONCONTIGUOUSMASK: Failed to accelerate ACL 2001. ACL acceleration supports only contiguous wildcard masks.

Impact

If the ACL contains a large number of rules, the packet match speed will be affected, and the connection establishment time or packet forwarding efficiency will be affected.

Cause

ACL acceleration failed because rules containing noncontiguous wildcard masks exist in the ACL.

Recommended action

Modify or delete the ACL rules containing noncontiguous wildcard masks.

 

ACL_ACCELERATE_NOT_SUPPORT

Message text

Failed to accelerate [STRING] ACL [UINT32]. The operation is not supported.

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

4 (Warning)

Example

ACL/4/ACL_ACCELERATE_NOT_SUPPORT: Failed to accelerate IPv6 ACL 2001. The operation is not supported.

Impact

If the ACL contains a large number of rules, the packet match speed will be affected, and the connection establishment time or packet forwarding efficiency will be affected.

Cause

ACL acceleration failed because the system does not support ACL acceleration.

Recommended action

No action is required.

 

ACL_ACCELERATE_NOT_SUPPORTHOPBYHOP

Message text

Failed to accelerate IPv6 ACL [UINT32]. ACL acceleration does not support the rules that contain the hop-by-hop keywords.

Variable fields

$1: ACL number.

Severity level

4 (Warning)

Example

ACL/4/ACL_ACCELERATE_NOT_SUPPORTHOPBYHOP: Failed to accelerate IPv6 ACL 3001. ACL acceleration does not support the rules that contain the hop-by-hop keywords.

Impact

If the ACL contains a large number of rules, the packet match speed will be affected, and the connection establishment time or packet forwarding efficiency will be affected.

Cause

ACL acceleration failed for the IPv6 ACL because rules containing the hop-by-hop keyword exist in the ACL.

Recommended action

Delete the ACL rules containing the hop-by-hop keyword.

 

ACL_ACCELERATE_NOT_SUPPORTMULTITCPFLAG

Message text

Failed to accelerate IPv6 ACL [UINT32]. ACL acceleration does not support specifying multiple TCP flags in one rule.

Variable fields

$1: ACL number.

Severity level

4 (Warning)

Example

ACL/4/ACL_ACCELERATE_NOT_SUPPORTMULTITCPFLAG: Failed to accelerate IPv6 ACL 3001. ACL acceleration does not support specifying multiple TCP flags in one rule.

Impact

If the ACL contains a large number of rules, the packet match speed will be affected, and the connection establishment time or packet forwarding efficiency will be affected.

Cause

ACL acceleration failed for the IPv6 ACL because rules containing multiple TCP flags (ACK, FIN, PSH, RST, SYN, and URG) exist in the ACL.

Recommended action

Retain only one TCP flag in the IPv6 ACL rules or delete the IPv6 ACL rules.

 

ACL_ACCELERATE_UNK_ERR

Message text

Failed to accelerate [STRING] ACL [UINT32].

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

4 (Warning)

Example

ACL/4/ACL_ACCELERATE_UNK_ERR: Failed to accelerate IPv6 ACL 2001.

Impact

If the ACL contains a large number of rules, the packet match speed will be affected, and the connection establishment time or packet forwarding efficiency will be affected.

Cause

ACL acceleration failed because of an unknown error.

Recommended action

1.     Execute the undo accelerate command and then execute the accelerate command.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

ACL_IPV6_STATIS_INFO

Message text

IPv6 ACL [UINT32] [STRING] [UINT64] packet(s).

Variable fields

$1: ACL number.

$2: ID and content of an IPv6 ACL rule.

$3: Number of packets that matched the rule.

Severity level

6 (Informational)

Example

ACL/6/ACL_IPV6_STATIS_INFO: IPv6 ACL 2000 rule 0 permit source 1:1::/64 logging 1000 packet(s).

Impact

No negative impact on the system.

Cause

The number of packets matching the IPv6 ACL rule changed.

Recommended action

No action is required.

 

ACL_NO_MEM

Message text

Failed to configure [STRING] ACL [UINT32] due to lack of memory.

Variable fields

$1: ACL type.

$2: ACL number.

Severity level

3 (Error)

Example

ACL/3/ACL_NO_MEM: Failed to configure IPv4 ACL 2001 due to lack of memory.

Impact

The ACL cannot take effect.

Cause

Configuring the ACL failed because memory is insufficient.

Recommended action

Use the display memory-threshold command to check the memory usage.

·     If the memory usage is too high, increase memory.

·     If the memory usage is abnormal, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

ACL_STATIS_INFO

Message text

ACL [UINT32] [STRING] [UINT64] packet(s).

Variable fields

$1: ACL number.

$2: ID and content of an IPv4 ACL rule.

$3: Number of packets that matched the rule.

Severity level

6 (Informational)

Example

ACL/6/ACL_STATIS_INFO: ACL 2000 rule 0 permit source 1.1.1.1 0 logging 10000 packet(s).

Impact

No negative impact on the system.

Cause

The number of packets matching the IPv4 ACL rule changed.

Recommended action

No action is required.

 

 

APMGR

This section contains access point management messages.

AP_CREATE_FAILURE

Message text

Failed to create an AP with entity ID [UINT32] and model [STRING]. Reason: Region code is not available.

Variable fields

$1: AP ID.

$2: AP model.

Severity level

6 (Informational)

Example

APMGR/6/AP_CREATE_FAILURE: Failed to create an AP with entity ID 1 and model WA2620i-AGN. Reason: Region code is not available.

Impact

The AP cannot come online.

Cause

The region code is unavailable.

Recommended action

Configure the region code in global configuration view.

 

AP_REBOOT_REASON

Message text

AP in Run state is rebooting. Reason: The physical status of the radio is down.

Variable fields

N/A

Severity level

6 (Informational)

Example

APMGR/6/AP_REBOOT_REASON: AP in Run state is rebooting. Reason: The physical status of the radio is down.

Impact

No negative impact on the system.

Cause

The physical state of the radio is down.

Recommended action

1.     Identify whether the radio configuration is correct after the AP restarts.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

APMGR_AP_CFG_FAILED

Message text

Failed to reset AP [STRING]. Reason: The AP is writing an image file into the flash.

Variable fields

$1: Name of the AP.

Severity level

4 (Warning)

Example

APMGR/4/APMGR_CFG_FAILD; Failed to reset AP ap2. Reason: The AP is writing an image file into the flash.

Impact

No negative impact on the system.

Cause

Failed to restart an AP from the AC by using the download file command to download a file from the AC.

Recommended action

Restart the AP after the AP completes downloading files from the AC.

 

APMGR_AP_ONLINE

Message text

The AP failed to come online in discovery stage. Reason: AP model [$1] is not supported.

Variable fields

$1: AP model.

Severity level

6 (Informational)

Example

APMGR/6/APMGR_AP_ONLINE: The AP failed to come online in discovery stage. Reason: AP model wa2620i-AGN is not supported.

Impact

The AP cannot come online.

Cause

The AC received an onboarding request from an AP model that the AC does not support.

Recommended action

Use an AP model that the AC supports.

 

APMGR_GET_AP_MODEL_FAILURE

Message text

Failed to get an AP model because no region code is configured globally or for AP group [STRING] .

Variable fields

$1: AP group name.

Severity level

6 (Informational)

Example

APMGR/6/APMGR_GET_AP_MODEL_FAILURE: Failed to get an AP model because no region code is configured globally or for AP group g2.

Impact

No negative impact on the system.

Cause

No region code is configured on the device.

Recommended action

Configure an available region code in global configuration or AP group view.

 

APMGR_LOG_ADD_AP_FAIL

Message text

AP [STRING] failed to come online using serial ID [STRING]: MAC address [STRING] is being used by AP [STRING].

Variable fields

$1: Name of the AP.

$2: Serial number of the AP.

$3: MAC address of the AP.

$4: Name of the AP.

Severity level

4 (Warning)

Example

APMGR/4/APMGR_LOG_ADD_AP_FAIL: AP ap1 failed to come online using serial ID 01247ef96: MAC address 0023-7961-5201 is being used by AP ap2.

Impact

The AP cannot come online.

Cause

During the AP's onboarding process, adding the MAC address fails because it already exists, preventing the AP from coming online.

Recommended action

Delete either the manual AP that has the MAC address or the serial ID.

 

APMGR_LOG_MEMALERT

Message text

The memory usage of the AC has reached the threshold.

Variable fields

N/A

Severity level

4 (Warning)

Example

APMGR/4/APMGR_LOG_MEMALERT: The memory usage of the AC has reached the threshold.

Impact

The AP cannot come online.

Cause

The memory usage of the AC has reached the threshold when the AP was created.

Recommended action

Do not create APs, and new APs are not allowed to come online.

 

APMGR_LOG_NOLICENSE

Message text

AP failed to come online in [STRING]. Reason: No license for the [STRING].

Variable fields

$1: State of the AP

·     discover: Discovery stage.

·     join: Join stage.

$2: AP type.

·     common AP: Common fit AP.

·     WTU AP: WTU.

Severity level

6 (Informational)

Example

APMGR/6/APMGR_LOG_NOLICENSE: AP failed to come online in discover. Reason: No license for the common AP.

Impact

The AP cannot come online.

Cause

The number of online common APs or WTUs has reached the maximum allowed by the license.

Recommended action

Purchase a license to increase the number of APs.

 

APMGR_LOG_OFFLINE

Message text

AP [STRING] went offline. State changed to Idle.

Variable fields

$1: Name of the AP.

Severity level

6 (Informational)

Example

APMGR/6/APMGR_LOG_OFFLINE: AP ap1 went offline. State changed to Idle.

Impact

No negative impact on the system.

Cause

Possible causes are:

·     The AP proactively went offline.

·     The AP went offline unexpectedly.

Recommended action

·     If the AP proactively went offline, no action is required.

·     If the AP went offline unexpectedly, use debugging information to locate and resolve the issue.

·     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

APMGR_LOG_ONLINE

Message text

AP [STRING] came online. State changed to Run.

Variable fields

$1: Name of the AP.

Severity level

6 (Informational)

Example

APMGR/6/APMGR_LOG_ONLINE: AP ap1 came online. State changed to Run.

Impact

No negative impact on the system.

Cause

The AP came online and entered running state.

Recommended action

No action is required.

 

APMGR_LOG_ONLINE_FAILED

Message text

[STRING] ([STRING]) failed to come online in join state. Reason: [STRING] ([STRING]) was offline.

Variable fields

$1: Type of the managed device.

$2: Serial ID of the managed device.

$3: Type of the managing device.

$4: Serial ID of the managing device.

Severity level

6 (Informational)

Example

·     APMGR/6/APMGR_AP_ONLINE_FAILED: WTU (219801A0WA916BQ12535) failed to come online in join state. Reason: WT (219801A11UC173000153) was offline.

·     APMGR/6/APMGR_AP_ONLINE_FAILED: WAP (219801A0VW916AG00254) failed to come online in join state. Reason: SPM (219801A13DB05B0004350) was offline.

Impact

Both the managing and managed devices are unavailable.

Cause

Possible causes are:

·     A WTU cannot come online if the WT that manages the WTU is not online.

·     When an SPM is operating in centralized management mode, a WAP cannot come online when the SPM is not online.

Recommended action

·     Identify why the WT is not online and onboard it.

·     Identify why the SPM is not online and onboard it.

 

APMGR_REACH_MAX_APNUMBER

Message text

An AP failed to come online: Maximum number of APs already reached.

Variable fields

N/A

Severity level

4 (Warning)

Example

APMGR/4/APMGR_REACH_MAX_APNEMBER: An AP failed to come online: Maximum number of APs already reached.

Impact

The AP cannot come online.

Cause

The number of APs associated with the AC has reached the upper limit.

Recommended action

No action is required.

 

APMGR_ERROR

Message text

Failed to install WLAN feature package. Reason: Insufficient hardware resources.

Variable fields

N/A

Severity level

6 (Informational)

Example

APMGR/6/ERROR : Failed to install WLAN feature package. Reason: Insufficient hardware resources.

Impact

The WLAN feature package is unavailable.

Cause

The hardware resources are exhausted.

Recommended action

1.     Manually uninstall the WLAN feature package, identify the reason why the hardware resources are exhausted, and then re-install the WLAN feature package.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CWS_IMG_DOWNLOAD_FAILED

Message text

Failed to download image file[STRING1] for [STRING2] [STRING3].

Variable fields

$1: Name of the file to be downloaded.

$2: Device category, AP or local AC.

$3: Name of the AP or local AC.

Severity level

6 (Informational)

Example

CWS/6/CWS_IMG_DOWNLOAD_FAILED: Failed to download image file wa4300.ipe for AP ap1.

Impact

The AP or local AC cannot obtain the image file.

Cause

Network flapping occurred.

Recommended action

·     Identify whether the image file on the AC/central AC matches the model of the AP/local AC.

·     Identify whether the network connection between the AP and the AC is normal.

 

_DOWN

Message text

CAPWAP tunnel to AP [STRING] went down. Reason: [STRING].

Variable fields

$1: AP name configured on the AC.

$2: Reason for tunnel disconnection.

·     Neighbor dead timer expired.

·     AP was reset by admin.

·     AP was reset by CloudTunnel.

·     AP was reset on cloud.

·     WT was offline.

·     AP was deleted.

·     Serial number changed.

·     Processed join request in Run state.

·     Failed to retransmit message.

·     Received WTP tunnel down event from AP.

·     Backup AC closed the backup tunnel.

·     Backup AP upgrade failed.

·     AC is inactive.

·     Tunnel switched.

·     N/A.

Severity level

6 (Informational)

Example

CWS/6/CWS_AP_DOWN: CAPWAP tunnel to AP ap1 went down. Reason: AP was reset by admin.

Impact

No negative impact on the system.

Cause

See the output for the tunnel disconnection reason.

Recommended action

1.     Examine the network connection between the AP and the AC.

2.     Verify that the AP is correctly configured.

3.     Verify that the AC is correctly configured.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CWS_AP_UP

Message text

[STRING] CAPWAP tunnel to AP [STRING] went up.

Variable fields

$1: Role of the tunnel to the AP.

·     Master.

·     Backup.

$2: Name or serial number of the AP.

Severity level

6 (Informational)

Example

CWS/6/CWS_AP_UP: Backup CAPWAP tunnel to AP ap1 went up.

Impact

No negative impact on the system.

Cause

The AP was connected to the AC successfully and entered Run state.

Recommended action

No action is required.

 

CWS_AP_UP

Message text

[STRING] CAPWAP tunnel to AP [STRING] went up.

Variable fields

$1: Role of the tunnel to the AP.

·     Master.

·     Backup.

$2: Name or serial number of the AP.

Severity level

6 (Informational)

Example

CWS/6/CWS_AP_UP: Backup CAPWAP tunnel to AP ap1 went up.

Impact

No negative impact on the system.

Cause

The AP was connected to the AC successfully and entered Run state.

Recommended action

No action is required.

 

CWS_IMG_DOWNLOAD_COMPLETE

Message text

System software image file [STRING] downloading through the CAPWAP tunnel for AP [STRING] completed.

Variable fields

$1: Image file name.

$2: AP name.

Severity level

6 (Informational)

Example

CWS/6/CWS_IMG_DOWNLOAD_COMPLETE: System software image file 5800.ipe downloading through the CAPWAP tunnel for AP ap2 completed.

Impact

No negative impact on the system.

Cause

The AP downloaded the image file from the AC successfully.

Recommended action

No action is required.

 

CWS_IMG_DOWNLOAD_FAILED

Message text

Failed to download image file [STRING] for the AP. AC memory is not enough.

Variable fields

$1: Image file name.

Severity level

6 (Informational)

Example

CWS/6/CWS_IMG_DOWNLOAD_FAILED: Failed to download image file wa4300anchor.ipe for the AP. AC memory is not enough.

Impact

The AP cannot obtain the image file.

Cause

The memory of the AC is insufficient.

Recommended action

·     Release memory resources. For example, you can execute the logfile save command to manually save all information in the log buffer to the log file to release the memory resources used by the log buffer.

·     Execute the display memory command to display memory usage.

¡     If the memory usage does not drop below the threshold, execute the display process command to display the memory usage of user processes. If a process uses a significant amount of memory, you can enable or disable its corresponding software feature to release memory.

¡     If the memory usage drops below the alarm threshold, the memory alarm is cleared and the TCL monitoring policy remains effective. No action is required.

·     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CWS_IMG_DOWNLOAD_START

Message text

AP [STRING] started to download the system software image file [STRING].

Variable fields

$1: AP name configured on the AC.

$2: Image file name.

Severity level

6 (Informational)

Example

CWS/6/CWS_IMG_DOWNLOAD_START: AP ap1 started to download the system software image file 5800.ipe.

Impact

No negative impact on the system.

Cause

The AP started to download the image file from the AC.

Recommended action

No action is required.

 

CWS_IMG_OPENFILE_FAILED

Message text

Failed to open the image file [STRING].

Variable fields

$1: Path where the image file for the AP is located on the AC.

Severity level

3 (Error)

Example

CWS/3/CWS_IMG_OPENFILE_FAILED: Failed to open the image file slot1#cfa0:/wa5600.ipe.

Impact

The image file cannot be opened on the AP.

Cause

The image file is too large, causing image file loading timeout, or the memory resource for the device is insufficient.

Recommended action

·     Use an image file with a small size.

·     Release memory resources. For example, you can execute the logfile save command to manually save all information in the log buffer to the log file to release the memory resources used by the log buffer.

·     Execute the display memory command to display memory usage.

¡     If the memory usage does not drop below the threshold, execute the display process command to display the memory usage of user processes. If a process uses a significant amount of memory, you can enable or disable its corresponding software feature to release memory.

¡     If the memory usage drops below the alarm threshold, the memory alarm is cleared and the TCL monitoring policy remains effective. No action is required.

·     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CWS_RUN_DOWNLOAD_COMPLETE

Message text

File [STRING] successfully downloaded through the CAPWAP tunnel for AP [STRING].

Variable fields

$1: Image file name.

$2: AP name configured on the AC.

Severity level

6 (Informational)

Example

CWS/6/CWS_RUN_DOWNLOAD_COMPLETE: File ac.cfg successfully downloaded through the CAPWAP tunnel for AP ap2.

Impact

No negative impact on the system.

Cause

The AP has completed downloading the image file.

Recommended action

No action is required.

 

CWS_RUN_DOWNLOAD_START

Message text

AP [STRING] started to download the file [STRING].

Variable fields

$1: AP name configured on the AC.

$2: Image file name.

Severity level

6 (Informational)

Example

CWS/6/CWS_RUN_DOWNLOAD_START: AP ap1 started to download the file ac.cfg.

Impact

No negative impact on the system.

Cause

The AP started to download the configuration file.

Recommended action

No action is required.

 

RADIO

Message text

APMGR/6/RADIO: Current channel usage [UINT32] of radio [CHAR] on AP [STRING] exceeded the threshold.

Variable fields

$1: Current channel usage.

$2: Radio ID.

$3: AP name.

Severity level

6 (Informational)

Example

APMGR/6/RADIO: Current channel usage 63% of radio 2 on AP ap1 exceeded the threshold.

Impact

No negative impact on the system.

Cause

The current channel usage is higher than the channel usage threshold.

Recommended action

Use the channel command to switch the channel to a channel with lower usage.

 

 

ARP

This section contains ARP messages.

ARP_ACTIVE_ACK_NO_REPLY

Message text

No ARP reply from IP [STRING] was received on interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

Severity level

6 (Informational)

Example

ARP/6/ARP_ACTIVE_ACK_NO_REPLY: No ARP reply from IP 192.168.10.1 was received on interface Ethernet0/1/0.

Impact

No negative impact on the system.

Cause

Possible causes include:

·     The ARP active acknowledgement feature detects an attack.

·     The interface sends an ARP request to the sender IP address of the received ARP packet but does not receive an ARP reply.

Recommended action

1.     Verify that the learned ARP entries on the device are consistent with the existing legal devices. When gateways and servers are on the network, check the ARP entries for these devices first.

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_ACTIVE_ACK_NOREQUESTED_REPLY

Message text

Interface [STRING] received from IP [STRING] an ARP reply that was not requested by the device.

Variable fields

$1: Interface name.

$2: IP address.

Severity level

6 (Informational)

Example

ARP/6/ARP_ACTIVE_ACK_NOREQUESTED_REPLY: Interface GigabitEthernet1/0/1 received from IP 192.168.10.1 an ARP reply that was not requested by the device.

Impact

Some normal ARP response packets might be discarded.

Cause

Possible causes include:

·     The ARP active acknowledgement feature detects an attack.

·     The interface receives an ARP reply when it does not send an ARP request to the sender IP address of the ARP packet.

Recommended action

1.     Check for ARP packet attacks in the network by capturing packets to find the source of the attack

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_BINDRULETOHW_FAILED

Message text

Failed to download binding rule to hardware on the interface [STRING], SrcIP [IPADDR], SrcMAC [MAC], VLAN [UINT16], Gateway MAC [MAC].

Variable fields

$1: Interface name.

$2: Source IP address.

$3: Source MAC address.

$4: VLAN ID.

$5: Gateway MAC address.

Severity level

5 (Notification)

Example

ARP/5/ARP_BINDRULETOHW_FAILED: Failed to download binding rule to hardware on the interface Ethernet1/0/1, SrcIP 1.1.1.132, SrcMAC 0015-E944-A947, VLAN 1, Gateway MAC 00A1-B812-1108.

Impact

No negative impact on the system.

Cause

Binding rule delivery failed due to insufficient hardware resources, insufficient memory, or other hardware errors.

Recommended action

1.     Execute the display qos-acl resource command to verify whether there are sufficient hardware ACL resources.

If there are, go to step 2

If there are not, cancel some ACL configurations or accept the current result.

2.     Execute the display memory command to verify whether there are sufficient memory resources.

If there are, go to step 3

If there are not, cancel some configurations or accept the current result.

3.     Hardware error occurred, cancel the last relevant configuration and try again.

4.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_DETECTION_LOG

Message text

Detected an ARP attack on interface [STRING]: IP [STRING], MAC [STRING], VLAN [STRING]. [UINT32] packet(s) dropped.

Variable fields

$1: Interface name.

$2: IP address.

$3: MAC address.

$4: VLAN ID

$5: Discarded message count

Severity level

5 (Notification)

Example

ARP/5/ARP_DETECTION_LOG: Detected an ARP attack on interface GigabitEthernet1/0/1: IP 1.1.1.1, MAC 1-1-1, VLAN 100. 2 packet(s) dropped.

Impact

No negative impacts on the system.

Cause

After ARP Detection function is enabled, there may be packet loss on the interface due to ARP Detection function check

Recommended action

1.     Check the legitimacy of the host sending the ARP message. If the host is illegal, the network connection of the host needs to be disconnected

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_DUPLICATE_IPADDR_DETECT

Message text

Detected an IP address conflict. The device with MAC address [STRING] connected to interface [STRING] in VSI [STRING] and the device with MAC address [STRING] connected to interface [STRING] in VSI [STRING] were using the same IP address [IPADDR].

Variable fields

$1: MAC address.

$2: Interface name. (Including Tunnel interface, Layer 3 interface, and Ethernet service instance, etc.)

$3: VSI name.

$4: Source MAC address of the conflicting peer

$5: Source interface name of the conflicting peer (Including Tunnel interface, Layer 3 interface, and Ethernet service instance, etc.)

$6: VSI name of the conflicting peer

$7: Conflicting IP address

Severity level

6 (Informational)

Example

ARP/6/ ARP_DUPLICATE_IPADDR_DETECT: Detected an IP address conflict. The device with MAC address 00-00-01 connected to interface Ethernet0/0/1 service-instance 1000 in VSI vpna and the device with MAC address 00-00-02 connected to interface tunnel 10 in VSI vpna were using the same IP address 192.168.1.1.

Impact

There may be IP address configuration conflicts in the network, which may cause route flapping, disruption of user services or traffic, and other faults

Cause

The interface receives ARP packets with conflicting IP addresses from the sender compared to the IP addresses learned in the ARP table of this device

Recommended action

1.     Verify whether there are devices with the same IP address configured in the network, and adjust the IP address of the conflicting device

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_DYNAMIC

Message text

The maximum number of dynamic ARP entries for the device reached.

Variable fields

N/A

Severity level

6 (Informational)

Example

ARP/6/ARP_DYNAMIC: The maximum number of dynamic ARP entries for the device reached.

Impact

possibly unable to learn new dynamic ARP entries due to insufficient resources, leading to service interruption

Cause

When the total number of dynamic ARP entries learned on the device reaches the maximum, print this prompt log

Recommended action

1.     Execute the display arp command to view dynamic ARP entries

2.     Execute the arp max-learning-number command to increase the maximum number of dynamic ARP entries that the device can learn

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_DYNAMIC_IF

Message text

The maximum number of dynamic ARP entries for interface [STRING] reached.

Variable fields

$1: Interface name.

Severity level

6 (Informational)

Example

ARP/6/ARP_DYNAMIC_IF: The maximum number of dynamic ARP entries for interface GigabitEthernet1/0/1 reached.

Impact

It may not be possible to learn new dynamic ARP entries due to insufficient resources, resulting in service interruption

Cause

When the total number of dynamic ARP entries learned on the interface reaches the maximum value, print this log prompt

Recommended action

1.     Execute the display arp command to view dynamic ARP entries on the specified interface

2.     Based on network planning and business provisioning, Verify whether the dynamic ARP entries learned on the interface are necessary for the user

¡     If the dynamic ARP entries are necessary for the user, go to step 3

¡     If the dynamic ARP entries are not necessary for the user, and ensure that the service is not affected, execute the undo arp command to delete the specified ARP entry

3.     Execute the arp max-learning-num command to increase the maximum number of dynamic ARP entries allowed to be learned on the specified interface

4.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_DYNAMIC_SLOT

Message text

Pattern 1:

The maximum number of dynamic ARP entries for slot [INT32] reached.

Pattern 2:

The maximum number of dynamic ARP entries for chassis [INT32] slot [INT32] reached.

Variable fields

Pattern 1:

$1: Slot number.

Pattern 2:

$1: Chassis number.

$2: Slot number.

Severity level

6 (Informational)

Example

ARP/6/ARP_DYNAMIC_SLOT: The maximum number of dynamic ARP entries for slot 2 reached.

ARP/6/ARP_DYNAMIC_SLOT: The maximum number of dynamic ARP entries for chassis 1 slot 2 reached.

Impact

It may be unable to learn new dynamic ARP entries due to insufficient resources, resulting in service interruption

Cause

Pattern 1:

The number of dynamic ARP entries learned on the specified slot reaches the maximum value

Pattern 2:

The number of dynamic ARP entries learned on the specified slot in the chassis reaches the maximum value

Recommended action

1.     Execute the command 'display arp' to view dynamic ARP entries on the specified board

2.     Check whether the learned dynamic ARP entries are necessary according to network planning and business provisioning

¡     If the dynamic ARP entries are necessary, go to step 3

¡     If the dynamic ARP entries are not necessary, and the service is not affected, execute the command 'undo arp' to delete the specified ARP entry

3.     Execute the command 'arp max-learning-number' to increase the maximum number of dynamic ARP entries that can be learned on the specified board

4.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_ENTRY_CONFLICT

Message text

The software entry for [STRING] on [STRING] and the hardware entry did not have the same [STRING].

Variable fields

$1: IP address.

$2: VPN-instance name. If the ARP belongs to the public network, it will be displayed as the public network

$3: Inconsistent entry parameter type

·     MAC address: MAC address.

·     output interface: ARP entry's output interface

·     output port: ARP entry's output port

·     outermost layer VLAN ID: Layer 1 VLAN tag

·     second outermost layer VLAN ID: Layer 2 VLAN tag

·     VSI index: VSI index

·     link ID: VSI outbound link identifier

Severity level

6 (Informational)

Example

ARP/6/ARP_ENTRY_CONFLICT: The software entry for 1.1.1.1 on the VPN a and the hardware entry did not have the same MAC address, output port, VSI index, and link ID.

ARP/6/ARP_ENTRY_CONFLICT: The software entry for 1.1.1.2 on the public  network and the hardware entry did not have the same MAC address, output port, VSI index, and link ID.

Impact

Possible causes for abnormal business traffic interruption or forwarding to the wrong port

Cause

Due to insufficient resources or software runtime errors, there is a discrepancy between hardware forwarding entry information and the information recorded in memory

Recommended action

No action is required. ARP will actively refresh the hardware entry

 

ARP_ENTRY_ENOUGHRESOURCE

Message text

Issued the software entry to the driver for IPv4 address [STRING] on VPN instance [STRING].

Issued the software entry to the driver for IPv4 address [STRING] on the public network.

Variable fields

$1: IPv4 address.

$2: VPN instance name. If the ARP entry belongs to the public network, the VPN instance-related field is not displayed.

Severity level

6 (Informational)

Example

ARP/6/ARP_ENTRY_ENOUGHRESOURCE: Issued the software entry to the driver for IPv4 address 10.1.1.1 on VPN instance vpn_1.

ARP/6/ARP_ENTRY_ENOUGHRESOURCE: Issued the software entry to the driver for IPv4 address 10.1.1.2 on the public network.

Impact

No negative impact on the system.

Cause

After enabling the ARP consistency check function through the arp consistency-check enable command, if the hardware entries are successfully refreshed based on the software ARP entries, this log will be output.

Recommended action

No action is required.

 

ARP_ENTRY_INCONSISTENT

Message text

Inconsistent software and hardware ARP entries for IPv4 address [STRING] on VPN instance [STRING]. Inconsistent parameters: [STRING].

Inconsistent software and hardware ARP entries for IPv4 address [STRING] on the public network. Inconsistent parameters: [STRING].

Variable fields

$1: IPv4 address.

$2: VPN instance name. If the ARP entry belongs to the public network, the VPN instance-related field is not displayed.

$3: Inconsistent entry parameter types

MAC address: MAC address.

output interface: Outgoing interface of ARP entry

output port: Outgoing port of ARP entry

outermost layer VLAN ID: First layer VLAN tag

second outermost layer VLAN ID: Second layer VLAN tag

VSI index: VSI index.

link ID: VSI outgoing link identifier

Severity level

6 (Informational)

Example

ARP/6/ARP_ENTRY_INCONSISTENT: Inconsistent software and hardware ARP entries for IPv4 address 10.1.1.1 on VPN instance vpn_1. Inconsistent parameters: MAC address, output port, VSI index, and link ID.

ARP/6/ARP_ENTRY_INCONSISTENT: Inconsistent software and hardware ARP entries for IPv4 address 10.1.1.2 on the public network. Inconsistent parameters: MAC address, output port, VSI index, and link ID.

Impact

This may cause abnormal business traffic interruption

Cause

After enabling the ARP consistency check function with the 'arp consistency-check enable' command, if the device detects inconsistencies between ARP software entries and hardware entries (such as the output interface of ARP entry), this log will be output

Recommended action

No action is required. The ARP module will automatically refresh the hardware entries based on the ARP software entries

 

ARP_ENTRY_NORESOURCE

Message text

Not enough hardware resources to issue the software entry to the driver for IPv4 address [STRING] on VPN instance [STRING].

Not enough hardware resources to issue the software entry to the driver for IPv4 address [STRING] on the public network.

Variable fields

$1: IPv4 address.

$2: VPN instance name. If the ARP entry belongs to the public network, the VPN instance-related field is not displayed.

Severity level

6 (Informational)

Example

ARP/6/ARP_ENTRY_NORESOURCE: Not enough hardware resources to issue the software entry to the driver for IPv4 address 10.1.1.1 on  VPN instance vpn_1.

ARP/6/ARP_ENTRY_NORESOURCE: Not enough hardware resources to issue the software entry to the driver for IPv4 address 10.1.1.2 on the public network.

Impact

No negative impact on the system.

Cause

After enabling ARP entry consistency check function through the arp consistency-check enable command, if there are insufficient ARP hardware entry resources when the ARP software entry is issued, this log will be output

Recommended action

No action is required. The ARP module will proactively refresh the hardware entries based on ARP software entries

 

ARP_HOST_IP_CONFLICT

Message text

The host [STRING] connected to interface [STRING] cannot communicate correctly, because it uses the same IP address as the host connected to interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

$3: Interface name.

Severity level

4 (Warning)

Example

ARP/4/ARP_HOST_IP_CONFLICT: The host 1.1.1.1 connected to interface GigabitEthernet1/0/1 cannot communicate correctly, because it uses the same IP address as the host connected to interface GigabitEthernet1/0/2.

Impact

May cause user business or traffic disruption

Cause

Possible causes include:

·     Different hosts connected under this device are configured with the same IP address

·     Possible ARP attack in the network

Recommended action

1.     According to the log information, check the configuration of the conflicting hosts under the corresponding interface and adjust the IP address

2.     Check the legitimacy of the host sending the ARP message. If the host is illegitimate, disconnect it from the network

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_LOCALPROXY_ENABLE_FAILED

Message text

Failed to enable local proxy ARP on interface [STRING].

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

ARP/4/ARP_LOCALPROXY_ENABLE_FAILED: Failed to enable local proxy ARP on interface VSI-interface 1.

Impact

May cause user service or traffic interruption

Cause

Possible causes include:

·     Enabling local proxy ARP function on the interface fails

·     When the local proxy ARP function is enabled on the MPU but fails on a non-MPU, the corresponding non-MPU prints this prompt log

Recommended action

1.     Verify whether the corresponding board of the device supports configuring the local proxy ARP function

2.     Verify whether the hardware resources of the device are sufficient and remove unnecessary configurations

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_RATE_EXCEEDED

Message text

The ARP packet rate ([UINT32] pps) exceeded the rate limit ([UINT32] pps) on interface [STRING] in the last [UINT32] seconds.

Variable fields

$1: ARP message rate

$2: ARP message rate limit

$3: Interface name.

$4: Interval

Severity level

4 (Warning)

Example

ARP/4/ARP_RATE_EXCEEDED: The ARP packet rate (100 pps) exceeded the rate limit (80 pps) on interface Ethernet0/1/0 in the last 10 seconds.

Impact

ARP message rate on the interface exceeds the ARP rate limit and may affect normal ARP learning and response, causing traffic forwarding failure

Cause

ARP message rate on the interface exceeds the ARP rate limit

Recommended action

1.     Verify whether the ARP messages received on the interface are normal

¡     If all received ARP messages are reasonable, execute the arp rate-limit command to increase the value of ARP message rate limit on the specified interface

¡     If abnormal ARP messages are detected, go to step 2

2.     Use packet capture to check for ARP message attacks in the network and find the source of the attack

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_RATELIMIT_NOTSUPPORT

Message text

Pattern 1:

ARP packet rate limit is not support on slot [INT32].

Pattern 2:

ARP packet rate limit is not support on chassis [INT32] slot [INT32].

Variable fields

Pattern 1:

$1: Slot number.

Pattern 2:

$1: Chassis number.

$2: Slot number.

Severity level

6 (Informational)

Example

ARP/6/ARP_RATELIMIT_NOTSUPPORT: ARP packet rate limit is not support on slot 2.

Impact

No negative impact on the system.

Cause

Pattern 1:

Unspecified slot does not support ARP packet rate limiting function

Pattern 2:

Slot specified within chassis does not support ARP packet rate limiting function

Recommended action

No action is required.

 

ARP_SENDER_IP_INVALID

Message text

Sender IP [STRING] was not on the same network as the receiving interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

Severity level

6 (Informational)

Example

ARP/6/ARP_SENDER_IP_INVALID: Sender IP 192.168.10.2 was not on the same network as the receiving interface GigabitEthernet1/0/1.

Impact

There may be ARP attacks in the network, affecting the normal operation of the device.

Cause

Possible causes include:

·     The IP address configuration of the ARP message sender is incorrect and does not belong to the same network segment as the corresponding interface.

·     The host sending the ARP message is not legitimate, and there may be ARP attacks in the network.

Recommended action

1.     Check the legitimacy of the IP address of the ARP message sender's host.

¡     If the host is illegal, it needs to be disconnected from the network.

¡     If the host is legal, then, while ensuring that the business is not affected, adjust the IP address of the host and the corresponding interface to be in the same network segment.

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_SENDER_MAC_INVALID

Message text

Sender MAC [STRING] was not identical to Ethernet source MAC [STRING] on interface [STRING].

Variable fields

$1: MAC address.

$2: MAC address.

$3: Interface name.

Severity level

6 (Informational)

Example

ARP/6/ARP_SENDER_MAC_INVALID: Sender MAC 0000-5E14-0E00 was not identical to Ethernet source MAC 0000-5C14-0E00 on interface GigabitEthernet1/0/1.

Impact

There may be ARP attacks in the network, affecting the normal operation of the device

Cause

The host that sends the ARP message is not legitimate, and there may be ARP attacks in the network

Recommended action

1.     Check the legitimacy of the MAC address of the ARP message sender's host. If the host is illegal, it needs to be disconnected from the network

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_SENDER_SMACCONFLICT

Message text

Packet was discarded because its sender MAC address was the MAC address of the receiving interface.

Interface: [STRING], sender IP: [STRING], target IP: [STRING].

Variable fields

$1: Interface name.

$2: Sender IP.

$3: Target IP.

Severity level

6 (Informational)

Example

ARP/6/ ARP_SENDER_SMACCONFLICT: Packet was discarded because its sender MAC address was the MAC address of the receiving interface.

Interface: GigabitEthernet1/0/1 sender IP: 1.1.2.2 target IP: 1.1.2.1,

Impact

User services might be interrupted.

Cause

The sender's MAC address in the ARP packet conflicts with the interface MAC address of the receiving packet, possible reasons include:

·     There may be a terminal MAC address in the network that is the same as the MAC address of this interface

·     There may be a loop in the network

Recommended action

1.     Configure STP to check for loops in the network

2.     Check for devices with the same MAC address in the network

¡     If the conflicting device with the MAC address is identified, adjust the MAC address of the conflicting device while ensuring that the business is not affected

¡     If the device with the conflicting MAC address cannot be identified, adjust the MAC address of the corresponding interface while ensuring that the business is not affected

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_SENDER_SMACCONFLICT_VSI

Message text

Packet was discarded because its sender MAC address was the MAC address of the receiving interface.

Interface: [STRING], sender IP: [STRING], target IP: [STRING],VSI index: [UINT32], link ID: [UINT32].

Variable fields

$1: Interface name.

$2: Sender IP.

$3: Target IP.

$4: VSI index.

$5: link ID

Severity level

6 (Informational)

Example

ARP/6/ ARP_SENDER_SMACCONFLICT_VSI: Packet was discarded because its sender MAC address was the MAC address of the receiving interface.

Interface: VSI3 sender IP: 1.1.2.2 target IP: 1.1.2.1, VSI Index: 2, Link ID: 0

Impact

User services might be interrupted.

Cause

The sender's MAC address in the ARP message conflicts with the MAC address of the VSI interface receiving the message. Possible reasons include:

·     There may be a terminal with the same MAC address as the interface in the network

·     There may be a loop in the network

Recommended action

1.     Configure STP to check for loops in the network

2.     Check for devices with the same MAC address in the network

¡     If the conflicting device's MAC address can be identified, adjust the MAC address of the conflicting device while ensuring that the business is not affected

¡     If the device causing the MAC address conflict cannot be identified, adjust the MAC address of the corresponding interface while ensuring that the business is not affected

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_SRC_MAC_FOUND_ATTACK

Message text

An attack from MAC [STRING] was detected on interface [STRING].

Variable fields

$1: MAC address.

$2: Interface name.

Severity level

6 (Informational)

Example

ARP/6/ARP_SRC_MAC_FOUND_ATTACK: An attack from MAC 0000-5E14-0E00 was detected on interface GigabitEthernet1/0/1.

Impact

Some normal ARP packets may be discarded, affecting normal business

Cause

The ARP attack detection function with a fixed source MAC address detects an attack. Within 5 seconds, if ARP packets with the same source MAC address (fixed source MAC address) exceed a certain threshold

Recommended action

1.     Check the legitimacy of the host corresponding to this source MAC address

¡     If the host is legitimate, execute the 'arp source-mac exclude-mac' command to configure the MAC address as a protected MAC address

¡     If the host is illegitimate, the host's network needs to be disconnected or the 'arp source-mac filter' command needs to be executed to configure the detection mode of the ARP attack detection function with a fixed source MAC address as filtering mode

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_SUP_ENABLE_FAILED

Message text

Failed to enable ARP flood suppression on VSI [STRING].

Variable fields

$1: VSI name.

Severity level

4 (Warning)

Example

ARP/4/ARP_SUP_ENABLE_FAILED: Failed to enable ARP flood suppression on VSI vpna.

Impact

This may cause ARP table overflow, unable to cache normal user ARP entries, thereby affecting normal packet forwarding.

Cause

Possible causes include:

·     The device does not support enabling ARP flooding suppression within VSI.

·     Insufficient hardware resources on the device.

Recommended action

1.     Verify whether the device supports configuring ARP flooding suppression within VSI.

2.     Verify whether the device has sufficient hardware resources, and remove unnecessary configurations.

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_TARGET_IP_INVALID

Message text

Target IP [STRING] was not the IP of the receiving interface [STRING].

Variable fields

$1: IP address.

$2: Interface name.

Severity level

6 (Informational)

Example

ARP/6/ARP_TARGET_IP_INVALID: Target IP 192.168.10.2 was not the IP of the receiving interface GigabitEthernet1/0/1.

Impact

There may be ARP attacks in the network, affecting the normal operation of devices

Cause

The host sending the ARP packet is illegal, and there may be ARP attacks in the network

Recommended action

1.     Verify whether the received ARP packet is a broadcast packet

¡     If it is, no action is required.

¡     If it is not, go to step 2

2.     Check the legitimacy of the host that sent the ARP packet, if the host is illegal, the network connection should be terminated

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_THRESHOLD_REACHED

Message text

The alarm threshold for dynamic ARP entry learning was reached on interface [STRING].

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

ARP/4/ARP_THRESHOLD_REACHED: The alarm threshold for dynamic ARP entry learning was reached on interface GigabitEthernet1/0/1

Impact

It may be unable to learn new ARP entries due to insufficient resources, resulting in service interruption

Cause

The number of dynamic ARP entries learned on the current interface has reached the alarm threshold

Recommended action

1.     Execute the 'display arp' command to view the dynamic ARP entries on the specified interface

2.     According to network planning and provisioning, Verify whether the dynamic ARP entries learned on the interface are necessary for the user

¡     If the dynamic ARP entries are necessary for the user, go to step 3

¡     If the dynamic ARP entries are not necessary for the user, and ensure that the service is not affected, execute the 'undo arp' command to delete the specified ARP entries

3.     Check for ARP packet attacks in the network by capturing packets and identify the source of the attack

4.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

ARP_USER_DUPLICATE_IPADDR_DETECT

Message text

Detected a user IP address conflict. New user (MAC [STRING], SVLAN [STRING], CVLAN [STRING]) connecting on interface [STRING] and old user (MAC [STRING], SVLAN [STRING], CVLAN [STRING]) connecting on interface [STRING] were using the same IP address [IPADDR].

Variable fields

$1: New user's MAC address

$2: Outer VLAN where the new user is located

$3: Inner VLAN where the new user is located

$4: Interface name connecting the new user

$5: Old user's MAC address

$6: Outer VLAN where the old user is located

$7: Inner VLAN where the old user is located

$8: Interface name connecting the old user

$9: IP address of the terminal user

Severity level

6 (Informational)

Example

ARP/6/ARP_USER_DUPLICATE_IPADDR_DETECT: Detected a user IP address conflict. New user (MAC 0010-2100-01e1, SVLAN 100, CVLAN 10) connecting on interface GigabitEthernet1/0/1 and old user (MAC 0120-1e00-0102, SVLAN 100, CVLAN 10) connecting on interface GigabitEthernet1/0/1 were using the same IP address 192.168.1.1.

Impact

Possible conflicting IP addresses in the network, which may cause user service or traffic disruption and other faults

Cause

New user's IP address is the same as an old user's IP address

Recommended action

Check all terminal user IP addresses, adjust conflicting user IP addresses, and resolve IP address conflict issues

 

ARP_USER_MOVE_DETECT

Message text

Detected a user (IP address [IPADDR], MAC address [STRING]) moved to another interface. Before user move: interface [STRING], SVLAN [STRING], CVLAN [STRING]. After user move: interface [STRING], SVLAN [STRING], CVLAN [STRING].

Variable fields

$1: IP address of the user.

$2: MAC address of the user.

$3: Interface name before migration.

$4: Outer VLAN of the user before migration.

$5: Inner VLAN of the user before migration.

$6: Interface name after migration.

$7: Outer VLAN of the user after migration.

$8: Inner VLAN of the user after migration.

Severity level

6 (Informational)

Example

ARP/6/ARP_USER_MOVE_DETECT: Detected a user (IP address 192.168.1.1, MAC address 0010-2100-01e1) moved to another interface. Before user move: interface GigabitEthernet1/0/1, SVLAN 100, CVLAN 10. After user move: interface GigabitEthernet1/0/2, SVLAN 100, CVLAN 10.

Impact

User services might be interrupted. When a large number of user migration operations occur, it may reduce device performance.

Cause

After you enable recording user port migrations, ARP detects an endpoint user port migration.

Recommended action

1.     Use the display arp user-move record command to view the endpoint user migration information and check whether the migration is reasonable.

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

DUPIFIP

Message text

Duplicate address [STRING] on interface [STRING], sourced from [STRING].

Variable fields

$1: IP address.

$2: Interface name.

$3: MAC address.

Severity level

6 (Informational)

Example

ARP/6/DUPIFIP: Duplicate address 1.1.1.1 on interface GigabitEthernet1/0/1, sourced from 0015-E944-A947.

Impact

User services might be interrupted.

Cause

There are other devices in the network configured with the same IP address as the IP address of this interface

Recommended action

1.     Verify whether another device in the network has the same IP address as the interface, and edit the IP addresses to ensure no address conflict exists.

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

DUPIP

Message text

IP address [STRING] conflicted with global or imported IP address, sourced from [STRING].

Variable fields

$1: IP address.

$2: MAC address.

Severity level

6 (Informational)

Example

ARP/6/DUPIP: IP address 30.1.1.1 conflicted with global or imported IP address, sourced from 0000-0000-0001.

Impact

User services might be interrupted.

Cause

There are other devices in the network with the same IP address as the global or imported IP address of this device

Recommended action

1.     Verify whether another device in the network has the same IP address as the device, and edit the IP addresses to ensure no address conflict exists.

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

DUPVRRPIP

Message text

IP address [STRING] conflicted with VRRP virtual IP address on interface [STRING], sourced from [STRING].

Variable fields

$1: IP address.

$2: Interface name.

$3: MAC address.

Severity level

6 (Informational)

Example

ARP/6/DUPVRRPIP: IP address 1.1.1.1 conflicted with VRRP virtual IP address on interface GigabitEthernet1/0/1, sourced from 0015-E944-A947.

Impact

User services might be interrupted.

Cause

There are other devices in the network configured with the same IP address as the VRRP virtual IP address of this device

Recommended action

1.     Verify whether there are other devices in the network configured with the same IP address as the VRRP virtual IP address of this device, and adjust the IP address of the conflicting device

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

Application audit and management messages

This section contains application audit and management messages.

AUDIT_RULE_MATCH_AS_IPV4_LOG (system log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Destination IPv4 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Content.

$15: Client type.

$16: Application software version.

$17: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_AS_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=tonghuashun;Behavior(1101)=Login;BehaviorContent(1102)={Account(1103)=hjk123456,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an entertainment or stock application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_FILE_IPV4_LOG (system log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],FileName(1097)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Destination IPv4 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: File name.

$15: Client type.

$16: Application software version.

$17: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_FILE_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=ftp;Behavior(1101)=UploadFile;BehaviorContent(1102)={Account(1103)=ghj123,FileName(1097)=abc.txt};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for a file transfer application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_FORUM_IPV4_LOG (system log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Destination IPv4 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Content.

$15: Client type.

$16: Application software version.

$17: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_FORUM_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=SinaWeibo;Behavior(1101)=Comment;BehaviorContent(1102)={Account(1103)=hjk123456,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for a social networking application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_IM_IPV4_LOG (system log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING],FileName(1097)=[STRING],FileSize(1105)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Destination IPv4 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Content.

$15: File name.

$16: File size.

$17: Client type.

$18: Application software version.

$19: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_IM_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=QQ;Behavior(1101)=Login;BehaviorContent(1102)={Account(1103)=12345678,Content(1104)=test,FileName(1097)=text,FileSize(1105)=152389};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an IM application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_MAIL_IPV4_LOG (system log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Sender_addr(1106)=[STRING],Receiver_addr(1107)=[STRING],Subject(1108)=[STRING],Body(1109)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Destination IPv4 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Sender.

$14: Receiver.

$15: Subject.

$16: Body.

$17: Client type.

$18: Application software version.

$19: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_MAIL_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=smtp;Behavior(1101)=SendMail;BehaviorContent(1102)={Sender_addr(1106)="wb"<[email protected]>,Receiver_addr(1107)=<[email protected]>,Subject(1108)=test,Body(1109)=abc};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an email application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_OTHER_IPV4_LOG (system log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Password(1112)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Destination IPv4 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Password.

$15: Content.

$16: Client type.

$17: Application software version.

$18: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_OTHER_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=Telnet;Behavior(1101)=Download;BehaviorContent(1102)={Account(1103)=hjk123456,Password(1112)=hhh123,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an unclassified application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_SEARCH_IPV4_LOG (system log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Keyword(1095)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Destination IPv4 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Keyword.

$14: Client type.

$15: Application software version.

$16: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_SEARCH_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=BaiduSearch;Behavior(1101)=Search;BehaviorContent(1102)={Keyword(1095)=12345678};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for a search engine application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_AS_IPV4_LOG (fast log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Source IPv4 address after NAT.

$5: Source port number after NAT.

$6: Destination IPv4 address.

$7: Destination port number.

$8: Destination IPv4 address after NAT.

$9: Destination port number after NAT.

$10: Source security zone name.

$11: Destination security zone name.

$12: Username.

$13: Application audit and management policy name.

$14: Application protocol name.

$15: Application behavior.

$16: Application behavior content.

$17: Account.

$18: Content.

$19: Client type.

$20: Application software version.

$21: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_AS_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;NATSrcIPAddr(1005)=200.20.20.2;NATSrcPort(1006)=50753;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;NATDstIPAddr(1009)=192.168.56.2;NATDstPort(1010)=80;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=tonghuashun;Behavior(1101)=Login;BehaviorContent(1102)={Account(1103)=hjk123456,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an entertainment or stock application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_FILE_IPV4_LOG (fast log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],FileName(1097)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Source IPv4 address after NAT.

$5: Source port number after NAT.

$6: Destination IPv4 address.

$7: Destination port number.

$8: Destination IPv4 address after NAT.

$9: Destination port number after NAT.

$10: Source security zone name.

$11: Destination security zone name.

$12: Username.

$13: Application audit and management policy name.

$14: Application protocol name.

$15: Application behavior.

$16: Application behavior content.

$17: Account.

$18: File name.

$19: Client type.

$20: Application software version.

$21: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_FILE_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;NATSrcIPAddr(1005)=200.20.20.2;NATSrcPort(1006)=50753;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;NATDstIPAddr(1009)=192.168.56.2;NATDstPort(1010)=80;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=ftp;Behavior(1101)=UploadFile;BehaviorContent(1102)={Account(1103)=ghj123,FileName(1097)=abc.txt};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for a file transfer application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_FORUM_IPV4_LOG (fast log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Source IPv4 address after NAT.

$5: Source port number after NAT.

$6: Destination IPv4 address.

$7: Destination port number.

$8: Destination IPv4 address after NAT.

$9: Destination port number after NAT.

$10: Source security zone name.

$11: Destination security zone name.

$12: Username.

$13: Application audit and management policy name.

$14: Application protocol name.

$15: Application behavior.

$16: Application behavior content.

$17: Account.

$18: Content.

$19: Client type.

$20: Application software version.

$21: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_FORUM_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;NATSrcIPAddr(1005)=200.20.20.2;NATSrcPort(1006)=50753;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;NATDstIPAddr(1009)=192.168.56.2;NATDstPort(1010)=80;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=SinaWeibo;Behavior(1101)=Comment;BehaviorContent(1102)={Account(1103)=hjk123456,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for a social networking application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_IM_IPV4_LOG (fast log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING],FileName(1097)=[STRING],FileSize(1105)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Source IPv4 address after NAT.

$5: Source port number after NAT.

$6: Destination IPv4 address.

$7: Destination port number.

$8: Destination IPv4 address after NAT.

$9: Destination port number after NAT.

$10: Source security zone name.

$11: Destination security zone name.

$12: Username.

$13: Application audit and management policy name.

$14: Application protocol name.

$15: Application behavior.

$16: Application behavior content.

$17: Account.

$18: Content.

$19: File name.

$16: File size.

$21: Client type.

$22: Application software version.

$23: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_IM_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;NATSrcIPAddr(1005)=200.20.20.2;NATSrcPort(1006)=50753;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;NATDstIPAddr(1009)=192.168.56.2;NATDstPort(1010)=80;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=QQ;Behavior(1101)=Login;BehaviorContent(1102)={Account(1103)=12345678,Content(1104)=test,FileName(1097)=text,FileSize(1105)=152389};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an IM application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_MAIL_IPV4_LOG (fast log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Sender_addr(1106)=[STRING],Receiver_addr(1107)=[STRING],Subject(1108)=[STRING],Body(1109)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Source IPv4 address after NAT.

$5: Source port number after NAT.

$6: Destination IPv4 address.

$7: Destination port number.

$8: Destination IPv4 address after NAT.

$9: Destination port number after NAT.

$10: Source security zone name.

$11: Destination security zone name.

$12: Username.

$13: Application audit and management policy name.

$14: Application protocol name.

$15: Application behavior.

$16: Application behavior content.

$17: Sender.

$18: Receiver.

$19: Subject.

$20: Body.

$21: Client type.

$22: Application software version.

$23: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_MAIL_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;NATSrcIPAddr(1005)=200.20.20.2;NATSrcPort(1006)=50753;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;NATDstIPAddr(1009)=192.168.56.2;NATDstPort(1010)=80;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=smtp;Behavior(1101)=SendMail;BehaviorContent(1102)={Sender_addr(1106)="wb"<[email protected]>,Receiver_addr(1107)=<[email protected]>,Subject(1108)=test,Body(1109)=abc};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an email application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_OTHER_IPV4_LOG (fast log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Password(1112)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Source IPv4 address after NAT.

$5: Source port number after NAT.

$6: Destination IPv4 address.

$7: Destination port number.

$8: Destination IPv4 address after NAT.

$9: Destination port number after NAT.

$10: Source security zone name.

$11: Destination security zone name.

$12: Username.

$13: Application audit and management policy name.

$14: Application protocol name.

$15: Application behavior.

$16: Application behavior content.

$17: Account.

$18: Password.

$19: Content.

$20: Client type.

$21: Application software version.

$22: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_OTHER_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;NATSrcIPAddr(1005)=200.20.20.2;NATSrcPort(1006)=50753;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;NATDstIPAddr(1009)=192.168.56.2;NATDstPort(1010)=80;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=Telnet;Behavior(1101)=Download;BehaviorContent(1102)={Account(1103)=hjk123456,Password(1112)=hhh123,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an unclassified application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_SEARCH_IPV4_LOG (fast log)

Message text

Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Keyword(1095)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv4 address.

$3: Source port.

$4: Source IPv4 address after NAT.

$5: Source port number after NAT.

$6: Destination IPv4 address.

$7: Destination port number.

$8: Destination IPv4 address after NAT.

$9: Destination port number after NAT.

$10: Source security zone name.

$11: Destination security zone name.

$12: Username.

$13: Application audit and management policy name.

$14: Application protocol name.

$15: Application behavior.

$16: Application behavior content.

$17: Keyword.

$18: Client type.

$19: Application software version.

$20: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_SEARCH_IPV4_LOG:Protocol(1001)=TCP;SrcIPAddr(1003)=1.2.3.4;SrcPort(1004)=8080;NATSrcIPAddr(1005)=200.20.20.2;NATSrcPort(1006)=50753;DstIPAddr(1007)=6.1.1.1;DstPort(1008)=8080;NATDstIPAddr(1009)=192.168.56.2;NATDstPort(1010)=80;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=BaiduSearch;Behavior(1101)=Search;BehaviorContent(1102)={Keyword(1095)=12345678};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for a search engine application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_AS_IPV6_LOG (system log) (fast log)

Message text

Protocol(1001)=[STRING];SrcSrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv6 address.

$3: Source port.

$4: Destination IPv6 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Content.

$15: Client type.

$16: Application software version.

$17: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_AS_IPV6_LOG:Protocol(1001)=TCP;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=51396;DstIPv6Addr(1037)=3001::2;DstPort(1008)=25;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=tonghuashun;Behavior(1101)=Login;BehaviorContent(1102)={Account(1103)=hjk123456,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for an entertainment or stock application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_FILE_IPV6_LOG (system log) (fast log)

Message text

Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],FileName(1097)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv6 address.

$3: Source port.

$4: Destination IPv6 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: File name.

$15: Client type.

$16: Application software version.

$17: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_FILE_IPV6_LOG:Protocol(1001)=TCP;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=51396;DstIPv6Addr(1037)=3001::2;DstPort(1008)=25;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=ftp;Behavior(1101)=UploadFile;BehaviorContent(1102)={Account(1103)=ghj123,FileName(1097)=abc.txt};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv4 packet matches an audit rule for a file transfer application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_FORUM_IPV6_LOG (system log) (fast log)

Message text

Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv6 address.

$3: Source port.

$4: Destination IPv6 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Content.

$15: Client type.

$16: Application software version.

$17: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_FORUM_IPV6_LOG:Protocol(1001)=TCP;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=51396;DstIPv6Addr(1037)=3001::2;DstPort(1008)=25;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=SinaWeibo;Behavior(1101)=Comment;BehaviorContent(1102)={Account(1103)=hjk123456,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv6 packet matches an audit rule for a social networking application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_IM_IPV6_LOG (system log) (fast log)

Message text

Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Content(1104)=[STRING],FileName(1097)=[STRING],FileSize(1105)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)= [STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv6 address.

$3: Source port.

$4: Destination IPv6 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Content.

$15: File name.

$16: File size.

$17: Client type.

$18: Application software version.

$19: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_IM_IPV6_LOG:Protocol(1001)=TCP;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=51396;DstIPv6Addr(1037)=3001::2;DstPort(1008)=25;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=QQ;Behavior(1101)=Login;BehaviorContent(1102)={Account(1103)=12345678,Content(1104)=test,FileName(1097)=text,FileSize(1105)=152389};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv6 packet matches an audit rule for an IM application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_MAIL_IPV6_LOG (system log) (fast log)

Message text

Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Sender_addr(1106)=[STRING],Receiver_addr(1107)=[STRING],Subject(1108)=[STRING],Body(1109)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv6 address.

$3: Source port.

$4: Destination IPv6 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Sender.

$14: Receiver.

$15: Subject.

$16: Body.

$17: Client type.

$18: Application software version.

$19: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_MAIL_IPV6_LOG:Protocol(1001)=TCP;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=51396;DstIPv6Addr(1037)=3001::2;DstPort(1008)=25;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=smtp;Behavior(1101)=SendMail;BehaviorContent(1102)={Sender_addr(1106)="wb"<[email protected]>,Receiver_addr(1107)=<[email protected]>,Subject(1108)=test,Body(1109)=abc};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv6 packet matches an audit rule for an email application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_OTHER_IPV6_LOG (system log) (fast log)

Message text

Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Account(1103)=[STRING],Password(1112)=[STRING],Content(1104)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv6 address.

$3: Source port.

$4: Destination IPv6 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Account.

$14: Password.

$15: Content.

$16: Client type.

$17: Application software version.

$18: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_OTHER_IPV6_LOG:Protocol(1001)=TCP;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=51396;DstIPv6Addr(1037)=3001::2;DstPort(1008)=25;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=Telnet;Behavior(1101)=Download;BehaviorContent(1102)={Account(1103)=hjk123456,Password(1112)=hhh123,Content(1104)=hello};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv6 packet matches an audit rule for an unclassified application.

Recommended action

No action is required.

 

AUDIT_RULE_MATCH_SEARCH_IPV6_LOG (system log) (fast log)

Message text

Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];Application(1002)=[STRING];Behavior(1101)=[STRING];BehaviorContent(1102)={Keyword(1095)=[STRING]};Client(1110)=[STRING];SoftVersion(1111)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Protocol type.

$2: Source IPv6 address.

$3: Source port.

$4: Destination IPv6 address.

$5: Destination port number.

$6: Source security zone name.

$7: Destination security zone name.

$8: Username.

$9: Application audit and management policy name.

$10: Application protocol name.

$11: Application behavior.

$12: Application behavior content.

$13: Keyword.

$14: Client type.

$15: Application software version.

$16: Action name. Options include:

·     Permit.

·     Deny.

Severity level

6 (Informational)

Example

AUDIT/6/AUDIT_RULE_MATCH_SEARCH_IPV6_LOG:Protocol(1001)=TCP;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=51396;DstIPv6Addr(1037)=3001::2;DstPort(1008)=25;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=hjp;PolicyName(1079)=policy1;Application(1002)=BaiduSearch;Behavior(1101)=Search;BehaviorContent(1102)={Keyword(1095)=12345678};Client(1110)=PC;SoftVersion(1111)=;Action(1053)=Deny;

Impact

No negative impact on the system.

Cause

This message is generated when an IPv6 packet matches an audit rule for a search engine application.

Recommended action

No action is required.

 

 

AVC messages

This section contains bandwidth management messages.

AVC_MATCH_IPV4_LOG

Message text

Application(1002)=[STRING];UserName(1113)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[USHORT];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[USHORT];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];PolicyName(1079)=[STRING];HitTime(1114)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Application name.

$2: User name.

$3: Source IPv4 address.

$4: Source port number.

$5: Destination IPv4 address.

$6: Destination port number.

$7: Source security zone.

$8: Destination security zone.

$9: Policy name.

$10: Hit time.

$11: Rule action.

Severity level

6 (Informational)

Example

AVC/6/AVC_MATCH_IPV4_LOG:Application(1002)=iQiYiPPS;UserName(1113)=User1;SrcIPAddr(1003)=12.2.2.2;SrcPort(1004)=5141;DstIPAddr(1007)=13.1.1.14;DstPort(1008)=5784;SrcZoneName(1025)=whx;DstZoneName(1035)=hea;PolicyName(1079)=aaa;HitTime(1114)=Wed, 22 May 2019 16:43:47;Action(1053)=drop;

Impact

No negative impact on the system.

Cause

This message is generated and sent to the log host as a fast output log if both of the following conditions exist:

·     A packet matches a traffic rule with a deny action.

·     The last message was generated before more than 10 seconds.

Recommended action

Identify whether the traffic rule blocks normal traffic. If yes, modify the traffic rule.

 

AVC_MATCH_IPV6_LOG

Message text

Application(1002)=[STRING];UserName(1113)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[USHORT];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[USHORT];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];PolicyName(1079)=[STRING];HitTime(1114)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Application name.

$2: User name.

$3: Source IPv6 address.

$4: Source port number.

$5: Destination IPv6 address.

$6: Destination port number.

$7: Source security zone.

$8: Destination security zone.

$9: Policy name.

$10: Hit time.

Severity level

6 (Informational)

Example

AVC/6/AVC_MATCH_IPV6_LOG:Application(1002)=iQiYiPPS;UserName(1113)=User1;SrcIPv6Addr(1036)=12::2;SrcPort(1004)=5141;DstIPv6Addr(1037)=13::4;DstPort(1008)=5784;SrcZoneName(1025)=whx;DstZoneName(1035)=hea;PolicyName(1079)=aaa;HitTime(1114)=Wed, 22 May 2019 16:52:08;Action(1053)=drop;

Impact

No negative impact on the system.

Cause

This message is generated and sent to the log host as a fast output log if both of the following conditions exist:

·     A packet matches a traffic rule with a deny action.

·     The last message was generated before more than 10 seconds.

Recommended action

Identify whether the traffic rule blocks normal traffic. If yes, modify the traffic rule.

 

AVC_THRESHOLDWARNING_FASTLOGGING_FMT

Message text

SrcIPAddr(1003)=[IPADDR];PolicyName(1079)=[STRING];ProfileName(1158)=[STRING];DeviceInfo(1159)=[STRING];BandwidthUpperLimit(1160)=[UINT32];BandwidthLowerLimit(1161)=[UINT32];UpperWarningValue(1162)=[UINT32];LowerWarningValue(1163)=[UINT32];CurRateValue(1164)=[UINT32];WarningTime(1165)=[STRING];WarningDuration(1166)=[UINT32];

Variable fields

$1: Source IPv4 address.

$2: Traffic policy name.

$3: Traffic profile name.

$4: Device information.

$5: Maximum bandwidth threshold in kbps.

$6: Minimum bandwidth threshold in kbps.

$7: Actual rate in kbps that exceeds the maximum bandwidth threshold.

$8: Actual rate in kbps that falls below the minimum bandwidth threshold.

$9: Current traffic rate in kbps.

$10: Warning time when the device detected a threshold violation.

$11: Warning duration. (length of time the threshold violation lasted).

Severity level

6 (Informational)

Example

AVC/6/AVC_THRESHOLDWARNING_FASTLOGGING_FMT:SrcIPAddr(1003)=192.168.1.8;PolicyName(1079)=a;ProfileName(1158)=p;DeviceInfo(1159)=UNISINSIGHTIPC;BandwidthUpperLimit(1160)=8366;BandwidthLowerLimit(1161)=2091;UpperWarningValue(1162)=6;LowerWarningValue(1163)=6;CurRateValue(1164)=6;WarningTime(1165)=Fri, 8 Oct 2019 17:38:32;WarningDuration(1166)=7;

Impact

No negative impact on the system.

Cause

This message is generated and sent to the log host as a fast output log if both of the following conditions exist:

·     Bandwidth detection is enabled.

·     A bandwidth threshold violation occurs one minute or more after the previous threshold violation.

Recommended action

Identify whether the bandwidth thresholds are appropriate. If not, modify the bandwidth thresholds.

 

AVC_THRESHOLDWARNING_FASTLOGGING_IPV6FMT

Message text

SrcIPv6Addr(1036)=[IPADDR];PolicyName(1079)=[STRING];ProfileName(1158)=[STRING];DeviceInfo(1159)=[STRING];BandwidthUpperLimit(1160)=[UINT32];BandwidthLowerLimit(1161)=[UINT32];UpperWarningValue(1162)=[UINT32];LowerWarningValue(1163)=[UINT32];CurRateValue(1164)=[UINT32];WarningTime(1165)=[STRING];WarningDuration(1166)=[UINT32];

Variable fields

$1: Source IPv6 address.

$2: Traffic policy name.

$3: Traffic profile name.

$4: Device information.

$5: Maximum bandwidth threshold in kbps.

$6: Minimum bandwidth threshold in kbps.

$7: Actual rate in kbps that exceeds the maximum bandwidth threshold.

$8: Actual rate in kbps that falls below the minimum bandwidth threshold.

$9: Current traffic rate in kbps.

$10: Warning time (time when the device detected a threshold violation).

$11: Warning duration (length of time the threshold violation lasted).

Severity level

6 (Informational)

Example

AVC/6/AVC_THRESHOLDWARNING_FASTLOGGING_IPV6FMT:SrcIPv6Addr(1036)=2001::1;PolicyName(1079)=a;ProfileName(1158)=p;DeviceInfo(1159)=UNISINSIGHTIPC;BandwidthUpperLimit(1160)=8366;BandwidthLowerLimit(1161)=2091;UpperWarningValue(1162)=6;LowerWarningValue(1163)=6;CurRateValue(1164)=6;WarningTime(1165)=Fri, 8 Oct 2019 17:38:32;WarningDuration(1166)=7;

Impact

No negative impact on the system.

Cause

This message is generated and sent to the log host as a fast output log if both of the following conditions exist:

·     Bandwidth detection is enabled.

·     A bandwidth threshold violation occurs one minute or more after the previous threshold violation.

Recommended action

Identify whether the bandwidth thresholds are appropriate. If not, modify the bandwidth thresholds.

 

 

CFGMAN messages

This section contains configuration management messages.

CFGMAN_ARCHIVE_SCP_FAIL

Message text

Archive configuration to SCP server failed: IP = [STRING], Directory = [STRING], Username = [STRING]

Variable fields

$1: IP address of the SCP server.

$2: Directory that saves the configuration archives on the SCP server.

$3: Username for logging in to the SCP server.

Severity level

5 (Notification)

Example

CFGMAN/5/CFGMAN_ARCHIVE_SCP_FAIL: Archive configuration to SCP server failed: IP = 192.168.21.21, Directory = /test/, Username = admin

Impact

If you perform a configuration rollback through the SCP server, the rollback will fail.

Cause

Possible causes include:

·     The running configuration failed to be saved locally.

·     The SCP server cannot be logged in.

·     The SCP server did not have sufficient storage space.

Recommended action

1.     Verify that the running configuration is saved locally.

2.     Verify that you can log in to the SCP server.

3.     Verify that the SCP server has sufficient storage space.

 

CFGMAN_ARCHIVE_FAIL

Message text

Failed to archive the running configuration to a remote server: Location=[STRING]

Variable fields

$1: URL address of the remote server. For an FTP server, enter the URL in the format of ftp://username@server address[:port number]/file path. To specify an IPv6 address, enclose the IPv6 address in square brackets ([ ]). For an TFTP server, do not include the username in the URL address.

Severity level

4 (Warning)

Example

CFGMAN/4/CFGMAN_ARCHIVE_FAIL: Failed to archive the running configuration to a remote server: Location=ftp://[email protected][:21]/test/

Impact

If you perform a configuration rollback through the remote server, the rollback will fail.

Cause

Possible causes include:

·     The running configuration failed to be saved locally.

·     The remote server cannot be logged in.

·     The remote server did not have sufficient storage space.

Recommended action

1.     Verify that the running configuration is saved locally.

2.     Verify that you can log in to the remote server.

3.     Verify that the remote server has sufficient storage space.

 

CFGMAN_CFGCHANGED

Message text

-EventIndex=[INT32]-CommandSource=[INT32]-ConfigSource=[INT32]-ConfigDestination=[INT32]; Configuration changed.

Variable fields

$1: Event index in the range of 1 to 2147483647.

$2: Configuration change source:

¡     cli—The configuration change came from the CLI.

¡     snmp—The configuration change came from SNMP or was a configuration database change detected by SNMP.

¡     other—The configuration change came from other sources.

$3: Source configuration:

¡     erase—Deleting or renaming a configuration file.

¡     running—Saving the running configuration.

¡     commandSource—Copying a configuration file.

¡     startup—Saving the running configuration to the next-startup configuration file.

¡     local—Saving the running configuration to a local file.

¡     networkFtp—Using FTP to transfer and save a configuration file to the device as the running configuration or next-startup configuration file.

¡     hotPlugging—A card hot swapping caused the configuration to be deleted or become ineffective.

$4: Destination configuration:

¡     erase—Deleting or renaming a configuration file.

¡     running—Saving the running configuration.

¡     commandSource—Copying a configuration file.

¡     startup—Saving the running configuration to the next-startup configuration file.

¡     local—Saving the running configuration to a local file.

¡     networkFtp—Using FTP to transfer and save a configuration file to the device as the running configuration or next-startup configuration file.

¡     hotPlugging—A card hot swapping caused the configuration to be deleted or become ineffective.

Severity level

5 (Notification)

Example

CFGMAN/5/CFGMAN_CFGCHANGED: -EventIndex=6-CommandSource=snmp-ConfigSource=startup-ConfigDestination=running; Configuration changed.

Impact

If this log is generated after a service module actively accesses DBM, the system might generate this log continuously.

Cause

This log is generated when one of the following conditions exists:

·     The configuration in DBM changes after the user performs an operation, such as issuing a command or executing an SNMP or NETCONF operation.

·     The user performs an operation on the current configuration file, such as deleting, renaming, moving, or saving the configuration file.

·     A configuration file is downloaded via FTP or TFTP, and overwrites the current configuration file.

·     A service module actively accesses DBM, causing changes to the configuration in DBM.

Recommended action

·     If this log is caused by a user operation, no action is required.

·     If this log is generated after a service module actively accesses DBM, contact H3C Support for troubleshooting.

 

CFGMAN_OPTCOMPLETION

Message text

-OperateType=[INT32]-OperateTime=[INT32]-OperateState=[INT32]-OperateEndTime=[INT32]; Operation completed.

Variable fields

$1: Operation type:

¡     running2startup—Saves the running configuration to the next-startup configuration file.

¡     startup2running—Loads the configuration in the next-startup configuration file.

¡     running2net—Saves the running configuration to a host on the network.

¡     net2running—Transfers a configuration file from a host on the network and loads the configuration.

¡     net2startup—Transfers a configuration file from a host on the network and specifies the file as the next-startup configuration file.

¡     startup2net—Copies the next-startup configuration file to a host on the network.

$2: Operation start time.

$3: Operation status:

¡     InProcess—Operation is in progress.

¡     success—Operation succeeded.

¡     InvalidOperation—Invalid operation.

¡     InvalidProtocol—Invalid protocol.

¡     InvalidSource—Invalid source file name.

¡     InvalidDestination—Invalid destination file name.

¡     InvalidServer—Invalid server address.

¡     DeviceBusy—The device is busy.

¡     InvalidDevice—Invalid device address.

¡     DeviceError—An error occurred on the device.

¡     DeviceNotWritable—The storage medium on the device is write protected.

¡     DeviceFull—The device does not have enough free storage space for the file.

¡     FileOpenError—Failed to open the file.

¡     FileTransferError—Failed to transfer the file.

¡     ChecksumError—File checksum error.

¡     LowMemory—The memory space is not sufficient.

¡     AuthFailed—User authentication failed.

¡     TransferTimeout—Transfer timed out.

¡     UnknownError—An unknown error occurred.

¡     invalidConfig—Invalid configuration.

$4: Operation end time.

Severity level

5 (Notification)

Example

CFGMAN/5/CFGMAN_OPTCOMPLETION: -OperateType=[running2startup]-OperateTime=[248]-OperateState=[success]-OperateEndTime=[959983]; Operation completed.

Impact

N/A

Cause

The user has completed an operation.

Recommended action

If the operation is not successful, locate and resolve the issue.

 

CFGMAN_REPLACE_CANCEL

Message text

Configuration rollback from remote server was canceled: Replacement file=[STRING]

Variable fields

$1: URL address of the replacement file on the remote server. For an FTP server, enter the URL in the format of ftp://username@server address[:port number]/file path. To specify an IPv6 address, enclose the IPv6 address in square brackets ([ ]). For an TFTP server, do not include the username in the URL address.

Severity level

5 (Notification)

Example

CFGMAN/5/CFGMAN_REPLACE_CANCEL: Configuration rollback from remote server was canceled: Replacement file=ftp://[email protected][:21]/test/startup.cfg

Impact

N/A

Cause

This log is generated to inform the user that the configuration rollback operation has been canceled under the following conditions:

·     The configuration replace server file command was executed to enable remote configuration rollback at a specific time.

·     The system time is changed and exceeds the specified time. As a result, the configuration rollback operation is canceled.

Recommended action

Re-configure remote configuration rollback as needed.

 

CFGMAN_REPLACE_FAIL

Message text

Failed to replace running configuration with a remote configuration file: File=[STRING]

Variable fields

$1: URL address of the replacement file on the remote server. For an FTP server, enter the URL in the format of ftp://username@server address[:port number]/file path. To specify an IPv6 address, enclose the IPv6 address in square brackets ([ ]). For an TFTP server, do not include the username in the URL address.

Severity level

4 (Warning)

Example

CFGMAN/4/CFGMAN_REPLACE_FAIL: Failed to replace running configuration with a remote configuration file: File=ftp://[email protected][:21]/test/startup.cfg

Impact

The configuration rollback will fail.

Cause

Possible causes include:

·     The server cannot be logged in.

·     The specified configuration file did not exist on the server.

·     The local storage space was insufficient.

·     The content and format of the configuration file were incorrect.

Recommended action

1.     Verify that you can access the server successfully.

2.     Verify that the specified configuration file exists on the server.

3.     Verify that the local storage space is sufficient.

4.     Verify that the content and format of the configuration file are correct.

 

CFGMAN_REPLACE_SOON

Message text

The system will replace running configuration with a remote file in 1 minute: File=[STRING]

Variable fields

$1: URL address of the replacement file on the remote server. For an FTP server, enter the URL in the format of ftp://username@server address[:port number]/file path. To specify an IPv6 address, enclose the IPv6 address in square brackets ([ ]). For an TFTP server, do not include the username in the URL address.

Severity level

5 (Notification)

Example

CFGMAN/5/CFGMAN_REPLACE_SOON: The system will replace running configuration with a remote file in 1 minute: File=ftp://[email protected][:21]/test/startup.cfg

Impact

N/A

Cause

The device is scheduled to roll back the running configuration with the specified replacement configuration file on the remote server at a specified time. This log information is printed one minute before the specified time.

Recommended action

No action is required.

 

 

CONNLMT messages

This section contains connection limit messages.

CONNLMT_IPV4_OVERLOAD

Message text

RcvIfName(1023)=[STRING];Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];DstIPAddr(1007)=[IPADDR];ServicePort(1071)=[UINT16];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];SndDSLiteTunnelPeer(1041)=[STRING];UpperLimit(1049)=[UINT32];LimitRuleNum(1051)=[UINT16];Event(1048)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Global, or interface name.

$2: Transport layer protocol type.

$3: Source IP address.

$4: Destination IP address.

$5: Service port number.

$6: Source VPN instance name.

$7: Destination VPN instance name.

$8: Peer tunnel ID.

$9: Upper threshold.

$10: Rule ID.

$11: Event message.

$12: Allow/Forbid establishing a new connection.

Severity level

6 (Informational)

Example

CONNLMT/6/CONNLMT_IPV4_OVERLOAD: RcvIfName(1023)=Global;Protocol(1001)=;SrcIPAddr(1003)=10.10.10.1;DstIPAddr(1007)=;ServicePort(1071)=;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;SndDSLiteTunnelPeer(1041)=;UpperLimit(1049)=1000;LimitRuleNum(1051)=1;Event(1048)=Exceeded upper threshold;Action(1053)=Permit new connections;

Impact

New connections matching the rule cannot be established.

Cause

The number of concurrent connections exceeded the upper threshold.

Recommended action

No action is required.

 

CONNLMT_IPV4_RECOVER

Message text

RcvIfName(1023)=[STRING];Protocol(1001)=[STRING];SrcIPAddr(1003)=[IPADDR];DstIPAddr(1007)=[IPADDR];ServicePort(1071)=[UINT16];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];SndDSLiteTunnelPeer(1041)=[STRING];DropPktCount(1052)=[UINT32];LowerLimit(1050)=[UINT32];LimitRuleNum(1051)=[UINT16];Event(1048)=[STRING];

Variable fields

$1: Global, or interface name.

$2: Transport layer protocol type.

$3: Source IP address.

$4: Destination IP address.

$5: Service port number.

$6: Source VPN instance name.

$7: Destination VPN instance name.

$8: Peer tunnel ID.

$9: Number of dropped packets.

$10: Lower threshold.

$11: Rule ID.

$12: Event message.

Severity level

6 (Informational)

Example

CONNLMT/6/CONNLMT_IPV4_RECOVER: RcvIfName(1023)=Global;Protocol(1001)=;SrcIPAddr(1003)=10.10.10.1;DstIPAddr(1007)=;ServicePort(1071)=;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;SndDSLiteTunnelPeer(1041)=;DropPktCount(1052)=306004;LowerLimit(1050)=10;LimitRuleNum(1051)=1;Event(1048)=Dropped below lower threshold;

Impact

No negative impact on the system.

Cause

The number of concurrent connections dropped to the lower threshold from the upper threshold.

Recommended action

No action is required.

 

CONNLMT_IPV6_OVERLOAD

Message text

RcvIfName(1023)=[STRING];Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];DstIPv6Addr(1037)=[IPADDR];ServicePort(1071)=[UINT16];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];SndDSLiteTunnelPeer(1041)=[STRING];UpperLimit(1049)=[UINT32];LimitRuleNum(1051)=[UINT16];Event(1048)=[STRING];Action(1053)=[STRING];

Variable fields

$1: Global, or interface name.

$2: Transport layer protocol type.

$3: Source IPv6 address.

$4: Destination IPv6 address.

$5: Service port number.

$6: Source VPN instance name.

$7: Destination VPN instance name.

$8: Peer tunnel ID.

$9: Upper threshold.

$10: Rule ID.

$11: Event message.

$12: Allow/Forbid establishing a new connection.

Severity level

6 (Informational)

Example

CONNLMT/6/CONNLMT_IPV6_OVERLOAD: RcvIfName(1023)=Global;Protocol(1001)=;SrcIPv6Addr(1036)=2001::1;DstIPv6Addr(1037)=;ServicePort(1071)=;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;SndDSLiteTunnelPeer(1041)=;UpperLimit(1049)=1000;LimitRuleNum(1051)=1;Event(1048)=Exceeded upper threshold;Action(1053)=Permit new connections;

Impact

New connections matching the rule cannot be established.

Cause

The number of concurrent connections exceeded the upper threshold.

Recommended action

No action is required.

 

CONNLMT_IPV6_RECOVER

Message text

RcvIfName(1023)=[STRING];Protocol(1001)=[STRING];SrcIPv6Addr(1036)=[IPADDR];DstIPv6Addr(1037)=[IPADDR];ServicePort(1071)=[UINT16];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];SndDSLiteTunnelPeer(1041)=[STRING];DropPktCount(1052)=[UINT32];LowerLimit(1050)=[UINT32];LimitRuleNum(1051)=[UINT16];Event(1048)=[STRING];

Variable fields

$1: Global, or interface name.

$2: Transport layer protocol type.

$3: Source IPv6 address.

$4: Destination IPv6 address.

$5: Service port number.

$6: Source VPN instance name.

$7: Destination VPN instance name.

$8: Peer tunnel ID.

$9: Number of dropped packets.

$10: Lower threshold.

$11: Rule ID.

$12: Event message.

Severity level

6 (Informational)

Example

CONNLMT/6/CONNLMT_IPV6_RECOVER: RcvIfName(1023)=Global;Protocol(1001)=;SrcIPv6Addr(1036)=2001::1;DstIPv6Addr(1037)=;ServicePort(1071)=;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;SndDSLiteTunnelPeer(1041)=;DropPktCount(1052)=306004;LowerLimit(1050)=10;LimitRuleNum(1051)=1;Event(1048)=Dropped below lower threshold;

Impact

No negative impact on the system.

Cause

The number of concurrent connections dropped to the lower threshold from the upper threshold.

Recommended action

No action is required.

 

 

DEV

This section contains device management messages.

AUTOSWITCH_FAULT

Message text

[STRING] automatically switches between active and standby, and a fault occurs during the switching.

Variable fields

$1: Chassis number.

Severity level

1 (Alert)

Example

DEV/1/AUTOSWITCH_FAULT: Chassis 1 automatically switches between active and standby, and a fault occurs during the switching.

Impact

A primary/backup switchover fails.

Cause

This message is generated when a fault occurs during the primary/backup switchover process.

Recommended action

·     Manually restart the device to resolve the issue. Before restarting the device, execute the javascript:infosearch(3077425) command to collect and save diagnostic information for troubleshooting.

·     After the device restarts, execute the display device command to view the device state. If the state is not Normal, the issue is not resolved. Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

AUTOSWITCH_FAULT_REBOOT

Message text

[STRING] automatically switches between active and standby, and a fault occurs during the switching, the device will immediately restart [STRING] to restore the fault.

Variable fields

$1: Chassis number.

$2: Chassis number and slot number or slot number.

Severity level

1 (Alert)

Example

DEV/1/AUTOSWITCH_FAULT_REBOOT: Chassis 1 automatically switches between active and standby, and a fault occurs during the switching, the device will immediately restart chassis 1 slot 0 to restore the fault.

Impact

The card is about to restart and will be temporarily unavailable.

Cause

The device will automatically switch over from active to standby. If a fault occurs during the switchover process, the device will immediately restart the faulty card to recover from the fault. This message is generated when the faulty card restarts.

Recommended action

After the faulty card restarts, you can execute the display device command to check the card status. If the state is not Normal, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

BOARD_ALARM_CLEAR

Message text

Board alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

2 (Critical)

Example

DEV/2/BOARD_ALARM_CLEAR: Board alarm cleared. (PhysicalIndex=140, PhysicalName=Level 1 Module 9 on Chassis 1, RelativeResource=1, ErrorCode=441002, Reason=FPGA load failed.)

Impact

No negative impact on the system.

Cause

A critical alarm is cleared.

Recommended action

No action is required.

 

BOARD_ALARM_OCCUR

Message text

Board alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

2 (Critical)

Example

DEV/2/BOARD_ALARM_OCCUR: Board alarm occurred. (PhysicalIndex=140, PhysicalName=Level 1 Module 9 on Chassis 1, RelativeResource=1, ErrorCode=441002, Reason=FPGA load failed.)

Impact

Services on the card might be affected.

Cause

A critical alarm occurs on the card.

Recommended action

3.     Review the alarm information.

1.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

BOARD_FATALALARM_OCCUR

Message text

Board fatal alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

1 (Alert)

 

Example

DEV/1/BOARD_FATALALARM_OCCUR: Board fatal alarm occurred. (PhysicalIndex=180136, PhysicalName=Level 1 Module 5 on Chassis 2, RelativeResource=2/5/0, ErrorCode=000008, Reason=System can't work without SFU board in slot 1.)

 

Impact

The services on the card might be affected.

 

Cause

This message is generated when one of the following conditions exist:

·     The slot is not installed with the corresponding type of card, which results in the system operation failure.

·     The system is not installed with the corresponding switching fabric module or service module.

For more information, see the fault cause description.

 

Recommended action

1.     Execute the display device command to view card status in the chassis to verify that the cards are operating correctly.

2.     If the issue persists even when the card is operating correctly in the chassis, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

BOARD_REBOOT

Message text

Board is rebooting on [STRING].

Variable fields

$1: Chassis number and slot number or slot number.

Severity level

5 (Notification)

Example

DEV/5/BOARD_REBOOT: Board is rebooting on slot 1.

Impact

The card is to stop providing services and restart.

Cause

A user is restarting the card or the card restarts abnormally.

Recommended action

1.     Identify whether a user is restarting the card.

2.     If no user restarts the card, wait for the card to finish the restart, and then execute the display version command to identify the restart reason the Last reboot reason field..

3.     If the card restarts abnormally, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

BOARD_STATE_NORMAL

Message text

Board state changed to Normal on [STRING], type is [STRING].

Variable fields

$1: Chassis number and slot number or slot number.

$2: Card type.

Severity level

5 (Notification)

Example

DEV/5/BOARD_STATE_NORMAL: Board state changed to Normal on slot 1, type is LSQ1FV48SA.

Impact

No negative impact on the system.

Cause

This message is generated when a new LPU or standby MPU finishes initialization. This does not indicate that configuration recovery is completed. You cannot perform a primary/standby switchover when this message is generated.

Recommended action

No action is required.

 

CFCARD_INSERTED

Message text

CF card was inserted in [STRING] [STRING].

Variable fields

$1: Device or chassis number + slot number or slot number

$2: Slot number where the CF card is located (only supported by products with multiple CF cards)

Severity level

4 (Warning)

Example

DEV/4/CFCARD_INSERTED: CF card was inserted in slot 1 CF card slot 1.

Impact

No negative impact on the system.

Cause

This message is generated when the CF card is installed in the specified slot.

Recommended action

No action is required.

 

CFCARD_REMOVED

Message text

CF card was removed from [STRING] [STRING].

Variable fields

$1: Device or chassis number + slot number or slot number

$2: Slot number where the CF card is located (only supported by products that support multiple CF cards)

Severity level

3 (Error)

Example

DEV/3/CFCARD_REMOVED: CF card was removed from slot 1 CF card slot 1.

Impact

The CF card is not available

Cause

This message is generated when the CF card is removed from the device.

Recommended action

1.     If the CF card is removed, no action is needed

2.     If the CF card is not removed, identify whether the CF card is installed correctly. If the CF card is not installed correctly, re-install the CF card.

3.     Identify whether the CF card is damaged. If the CF card is damaged, replace the CF card

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

CHASSIS_REBOOT

Message text

Chassis [STRING] is rebooting now.

Variable fields

$1: Chassis number.

Severity level

5 (Notification)

Example

DEV/5/CHASSIS_REBOOT: Chassis 1 is rebooting now.

Impact

The member device is about stop providing services and restart.

Cause

A user is restarting the member device, or the member device is restarting due to an anomaly.

Recommended action

1.     Identify whether any user is restarting the member device

2.     If no user is restarting the member device, wait for the member device to restart, and then use the display version command to check the Last reboot reason field in the card information for the member device to view the restart reason.

3.     If the restart reason is abnormal, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

CPU_STATE_NORMAL

Message text

Cpu state changed to Normal on [STRING].

Variable fields

$1: Chassis number + slot number + CPU number, or slot number + CPU number. The CPU number is displayed only if multiple CPUs are supported.

Severity level

5 (Notification)

Example

DEV/5/CPU_STATE_NORMAL: Cpu state changed to Normal on slot 1 cpu 1.

Impact

No negative impact on the system.

Cause

The CPU status changed to normal.

Recommended action

No action is required.

 

DEV_BOARD_RUNNING_FAULT

Message text

[STRING] is detected to be faulty.

Variable fields

$1: Chassis number and slot number or slot number.

Severity level

1 (Alert)

Example

DEV/1/DEV_BOARD_RUNNING_FAULT: Chassis 1 slot 0 is detected to be faulty.

Impact

Services on the card might be affected.

Cause

This message is generated when a fault occurs on a card during the device operation.

Recommended action

·     Manually restart the faulty card. Before restarting the card, you can execute the javascript:infosearch(3077425) command to collect and save diagnostic information for fault location.

·     After restarting the card, you can execute the display device command to check the card status. If the state is not Normal, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DEV_BOARD_RUNNING_FAULT_REBOOT

Message text

[STRING] is detected to be faulty, the device will immediately restart [STRING] to recover from the fault.

Variable fields

$1: Chassis number and slot number or slot number.

$2: Chassis number and slot number or slot number.

Severity level

1 (Alert)

Example

DEV/1/DEV_BOARD_RUNNING_FAULT_REBOOT: Chassis 1 slot 0 is detected to be faulty, the device will immediately restart chassis 1 slot 0 to recover from the fault.

Impact

The card will restart soon and will be temporarily unavailable.

Cause

When a fault occurs on the card during the device operation, the device will immediately restart the card to recover from the fault.

Recommended action

After the card automatically restarts, you can execute the display device command to check the device status. If the card status is not Normal, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DEV_CLOCK_CHANGE

Message text

-User=[STRING]-IPAddr=[IPADDR]; System clock changed from [STRING] to [STRING].

Variable fields

$1: Username of the current logged-in user

$2: IP address of the current logged-in user

$3: Old time

$4: New time

Severity level

5 (Notification)

Example

DEV/5/DEV_CLOCK_CHANGE: -User=admin-IPAddr=192.168.1.2; System clock changed from 15:49:52 01/02/2013 to 15:50:00 01/02/2013.

Impact

The background timing program might fail.

Cause

This message is generated when the system time changes. Possible reasons include:

·     The administrator manually changes the system time.

·     The clock protocol automatically changes the system time.

Recommended action

1.     Check the background timing program configuration.

2.     Modify the background timing program that automatically failed.

 

DEV_FAULT_TOOLONG

Message text

Card in [STRING] is still in Fault state for [INT32] minutes.

Variable fields

$1: Chassis number and slot number or slot number.

$2: Duration of the status.

Severity level

4 (Warning)

Example

DEV/4/DEV_FAULT_TOOLONG: Card in slot 1 is still in Fault state for 60 minutes.

Impact

The card is not available.

Cause

This message is generated if the card remains in Fault state for a long time.

Recommended action

1.     Restart the card.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

FAN_ABSENT

Message text

Pattern 1:

Fan [INT32] is absent.

Pattern 2:

Chassis [STRING] fan [INT32] is absent.

Variable fields

Pattern 1:

$1: Fan number

Pattern 2:

$1: Chassis number.

$2: Fan number.

Severity level

3 (Error)

Example

DEV/3/FAN_ABSENT: Fan 2 is absent.

Impact

Heat dissipation in the system might be affected.

Cause

This message is generated when the fan module is not installed in the specified slot or is removed from the device.

Recommended action

1.     If the fan module is not installed in the specified slot, it might cause poor heat dissipation and lead to an increase in device temperature. As a best practice, install the fan module.

2.     If the fan module is removed, no action is required

3.     If the fan module is not removed, identify whether the fan module is installed correctly, such as whether the fan module is not inserted tightly and the fan module is damaged. If the fan module is damaged, replace the fan module

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

FAN_ALARM_CLEAR

Message text

Fan alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

2 (Critical)

Example

DEV/2/FAN_ALARM_CLEAR: Fan alarm cleared. (PhysicalIndex=199, PhysicalName=Fan 2, RelativeResource=0, ErrorCode=300020, Reason=Fan tray is not present.)

Impact

No negative impact on the system.

Cause

A critical fan alarm was cleared.

Recommended action

No action is required.

 

FAN_ALARM_OCCUR

Message text

Fan alarm occurred. ( PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

2 (Critical)

Example

DEV/2/FAN_ALARM_OCCUR: Fan alarm occurred. (PhysicalIndex=199, PhysicalName=Fan 2, RelativeResource=0, ErrorCode=300020, Reason=Fan tray is not present.)

Impact

Heat dissipation in the system might be affected.

Cause

This message is generated when a critical fan failure occurs.

Recommended action

1.     Verify that the fan module is installed correctly. If the fan module is not installed correctly, re-install the fan module.

2.     If the alarm is not cleared, replace the fan module.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

FAN_DIRECTION_NOT_PREFERRED

Message text

Fan [INT32] airflow direction is not preferred [STRING], please check it.

Variable fields

$1: Fan number.

$2: Chassis number and slot number or slot number.

Severity level

1 (Alert)

Example

DEV/1/FAN_DIRECTION_NOT_PREFERRED: Fan 1 airflow direction is not preferred slot 1, please check it.

Impact

Heat dissipation in the system might be affected.

Cause

The airflow direction of the fan tray is different from the airflow direction setting.

Recommended action

1.     Choose a fan model with the same airflow direction as the ventilation system in the equipment room.

2.     If the fan airflow direction is consistent with the ventilation system in the equipment room, adjust the fan airflow direction configuration.

 

FAN_FAILED

Message text

Pattern 1:

Fan [INT32] failed.

Pattern 2:

Chassis [STRING] fan [INT32] failed.

Variable fields

Pattern 1:

$1: Fan number.

Pattern 2:

$1: Chassis number.

$2: Fan number.

Severity level

2 (Critical)

Example

DEV/2/FAN_FAILED: Fan 2 failed.

Impact

Heat dissipation might be affected.

Cause

The fan has malfunctioned and stopped working.

Recommended action

Replace the fan.

 

FAN_FATALALARM_CLEAR

Message text

Fan fatal alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

1 (Alert)

Example

DEV/1/FAN_FATALALARM_CLEAR: Fan fatal alarm cleared. (PhysicalIndex=199, PhysicalName=Fan 2, RelativeResource=0, ErrorCode=300016, Reason=The fan resumed running.)

Impact

No negative impact on the system.

Cause

A critical alarm on the fan was cleared.

Recommended action

No action is required.

 

FAN_FATALALARM_OCCUR

Message text

Fan fatal alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

1 (Alert)

Example

DEV/1/FAN_FATALALARM_OCCUR: Fan fatal alarm occurred. (PhysicalIndex=199, PhysicalName=Fan 2, RelativeResource=0, ErrorCode=300016, Reason=The fan stopped running.)

Impact

Heat dissipation might be affected.

Cause

A critical alarm occurs on the fan.

Recommended action

1.     Verify that the fan module is installed correctly. If the fan module is not installed correctly, re-install the fan module.

2.     If the alarm is not cleared, replace the fan module.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

FAN_RECOVERED

Message text

Pattern 1:

Fan [INT32] recovered.

Pattern 2:

Chassis [INT32] fan [INT32] recovered.

Variable fields

Pattern 1:

$1: Fan number.

Pattern 2:

$1: Chassis number.

$2: Fan number.

Severity level

2 (Critical)

Example

DEV/2/FAN_RECOVERED: Fan 2 recovered.

Impact

No negative impact on the system.

Cause

Insert the fan, shortly after, the fan will switch to the normal operating state.

Recommended action

No action is required.

 

POWER_ABSENT

Message text

Pattern 1:

Power [INT32] is absent.

Pattern 2:

Chassis [INT32] power [INT32] is absent.

Variable fields

Pattern 1:

$1: Power module ID.

Pattern 2:

$1: Chassis number.

$2: Power module ID.

Severity level

3 (Error)

Example

DEV/3/POWER_ABSENT: Power 1 is absent.

Impact

System power supply might be affected.

Cause

The power module was removed from the device, or the power module was damaged.

Recommended action

1.     If the power module was removed, no action is required.

2.     If the power module was not removed, check the power module connection for the device, such as whether the cable is loose or whether the power module is damaged. If the power module is damaged, replace it.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

POWER_ALARM_CLEAR

Message text

Power alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

2 (Critical)

Example

DEV/2/POWER_ALARM_CLEAR: Power alarm cleared. (PhysicalIndex=163, PhysicalName=Unknown Power 2, RelativeResource=0, ErrorCode=233001, Reason=Overtemperature occurred on the power supply.)

Impact

No negative impact on the system.

Cause

A critical power alarm was cleared.

Recommended action

No action is required.

 

POWER_ALARM_OCCUR

Message text

Power alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

2 (Critical)

Example

DEV/2/POWER_ALARM_OCCUR: Power alarm occurred. (PhysicalIndex=163, PhysicalName=Unknown Power 2, RelativeResource=0, ErrorCode=233001, Reason=Overtemperature occurred on the power supply.)

Impact

System power supply might be affected.

Cause

A critical power alarm occurs.

Recommended action

1.     Execute the display power command to view the power module status. If the power module is in Absent state, the power module is not installed. Verify that the power module is installed correctly.

2.     If the power module is installed correctly, replace the power module.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

POWER_FAILED

Message text

Pattern 1:

Power [INT32] failed.

Pattern 2:

Chassis [INT32] power [INT32] failed.

Variable fields

Pattern 1:

$1:  Power module ID.

Pattern 2:

$1: Chassis number.

$2:  Power module ID.

Severity level

2 (Critical)

Example

DEV/2/POWER_FAILED: Power 1 failed.

Impact

The power supply in the system might be affected.

Cause

This message is generated when the power module fails or is just inserted.

Recommended action

1.     If the power module fails, replace it.

2.     If the power module is just inserted, verify that the power module is installed correctly.

 

POWER_MONITOR_ABSENT

Message text

Pattern 1:

Power monitor unit [INT32] is absent.

Pattern 2:

Chassis [INT32] power monitor unit [INT32] is absent.

Variable fields

Pattern 1:

$1: Power monitoring module ID.

Pattern 2:

$1: Chassis number.

$2: Power monitoring module ID.

Severity level

3 (Error)

Example

DEV/3/POWER_MONITOR_ABSENT: Power monitor unit 1 is absent.

Impact

System power supply might be affected.

Cause

The power monitoring module was removed from the device, or the power monitoring module failed.

Recommended action

1.     If the power monitoring module is removed, no action is required.

2.     If the power monitoring module is not removed, check the connection of the power monitoring module, such as whether the cable is loose and whether the power monitoring module is damaged. If the power monitoring module is damaged, replace it.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

POWER_MONITOR_FAILED

Message text

Pattern 1:

Power monitor unit [INT32] failed.

Pattern 2:

Chassis [INT32] power monitor unit [INT32] failed.

Variable fields

Pattern 1:

$1: Power monitoring module ID.

Pattern 2:

$1: Chassis number.

$2: Power monitoring module ID.

Severity level

2 (Critical)

Example

DEV/2/POWER_MONITOR_FAILED: Power monitor unit 1 failed.

Impact

System power supply might be affected.

Cause

The power monitoring module is faulty.

Recommended action

1.     Identify whether the power monitoring module is damaged. If the power monitoring module is damaged, replace it.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

POWER_MONITOR_RECOVERED

Message text

Pattern 1:

Power monitor unit [INT32] recovered.

Pattern 2:

Chassis [INT32] power monitor unit [INT32] recovered.

Variable fields

Pattern 1:

$1: Power monitoring module ID.

Pattern 2:

$1: Chassis number.

$2: Power monitoring module ID.

Severity level

2 (Critical)

Example

DEV/2/POWER_MONITOR_RECOVERED: Power monitor unit 1 recovered.

Impact

No negative impact on the system.

Cause

After the power monitoring module is inserted, its state changes from Failed or Absent to OK.

Recommended action

No action is required.

 

POWER_RECOVERED

Message text

Pattern 1:

Power [INT32] recovered.

Pattern 2:

Chassis [INT32] power [INT32] recovered.

Variable fields

Pattern 1:

$1: Power module ID.

Pattern 2:

$1: Chassis number.

$2: Power module ID.

Severity level

2 (Critical)

Example

DEV/2/POWER_RECOVERED: Power 1 recovered.

Impact

No negative impact on the system.

Cause

After the power module is inserted, its state changes from Failed or Absent to OK

Recommended action

No action is required.

 

POWER_WARNING_CLEAR

Message text

Power warning alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

4 (Warning)

Example

DEV/4/POWER_WARNING_CLEAR: Power warning  alarm cleared. (PhysicalIndex=163, PhysicalName=Unknown Power 2, RelativeResource=0, ErrorCode=200037, Reason=No enough power to power on the board in chassis $1 slot $2. Required power is $3 W, available power is $4 W.)

Impact

No negative impact on the system.

Cause

A power alarm was cleared.

Recommended action

No action is required.

 

POWER_WARNING_OCCUR

Message text

Power warning alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

Severity level

4 (Warning)

Example

DEV/4/POWER_WARNING_OCCUR: Power warning alarm occurred. (PhysicalIndex=163, PhysicalName=Unknown Power 2, RelativeResource=0, ErrorCode=200037, Reason=No enough power to power on the board in chassis $1 slot $2. Required power is $3 W, available power is $4 W.)

Impact

System power supply might be affected.

Cause

A power alarm occurs.

Recommended action

1.     Execute the display power command to view the power module status. If the power module is in Absent state, the power module is not installed. Verify that the power module is installed correctly.

2.     If the power module is installed correctly, replace the power module.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

Table 6 POWER_WARNING_OCCUR fault codes and causes

Fault code

Fault cause

200032

The RPS power supply cannot provide sufficient power to meet the maximum PoE power requirements of the device.

200008

Only one power switch turned on.

 

SUBCARD_FAULT

Message text

Subcard state changed to Fault on [STRING] subslot [INT32], type is [STRING].

Variable fields

$1: Chassis number and slot number or slot number.

$2: Number of the subslot where the subcard resides.

$3: Subcard type.

Severity level

2 (Critical)

Example

DEV/2/SUBCARD_FAULT: Subcard state changed to Fault on slot 1 subslot 1, type is MIM-1ATM-OC3SML.

Impact

The subcard is not available if it is faulty.

Cause

This message is generated when the subcard is restarted or is faulty.

Recommended action

1.     If the subsequent subcard status can be changed to Normal, no action is needed

2.     If the subcard remains in Fault status, replace it.

 

SUBCARD_INSERTED

Message text

Subcard was inserted in [STRING] subslot [INT32], type is [STRING].

Variable fields

$1: Chassis number and slot number or slot number.

$2: Number of the subslot where the subcard resides.

$3: Subcard type.

Severity level

4 (Warning)

Example

DEV/4/SUBCARD_INSERTED: Subcard was inserted in slot 1 subslot 1, type is MIM-1ATM-OC3SML.

Impact

No negative impact on the system.

Cause

This message is generated when the subcard is inserted into the device.

Recommended action

No action is required.

 

SUBCARD_REBOOT

Message text

Subcard is rebooting on [STRING] subslot [INT32].

Variable fields

$1: Chassis number and slot number or slot number.

$2: Number of the subslot where the subcard resides.

Severity level

5 (Notification)

Example

DEV/5/SUBCARD_REBOOT: Subcard is rebooting on slot 1 subslot 1.

Impact

The subcard is about to stop providing services and restart.

Cause

A user is restarting the subcard or the subcard restarts automatically due to an anomaly.

Recommended action

1.     If the subcard can run normally after restart, no action is needed.

2.     To further understand the reason for the abnormal restart or if the subcard keeps restarting automatically, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

SUBCARD_REMOVED

Message text

Subcard was removed from [STRING] subslot [INT32], type is [STRING].

Variable fields

$1: Chassis number and slot number or slot number.

$2: Number of the subslot where the subcard resides.

$3: Subcard type.

Severity level

3 (Error)

Example

DEV/3/SUBCARD_REMOVED: Subcard was removed from slot 1 subslot 1, type is MIM-1ATM-OC3SML.

Impact

The subcard is not available.

Cause

This message is generated when a subcard is removed from the device.

Recommended action

1.     If the subcard was removed, no action is required.

2.     If the subcard is not removed, identify whether the subcard is installed correctly. If the subcard is not installed correctly, re-install the subcard.

3.     Identify whether the subcard is damaged. If the subcard is damaged, replace it.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

SYSTEM_REBOOT

Message text

System is rebooting now.

Variable fields

N/A

Severity level

2 (Critical)

Example

DEV/2/SYSTEM_REBOOT: System is rebooting now.

Impact

The system is about to stop providing services and restart.

Cause

Identify whether any user is restarting the system or whether the system is restarting due to an anomaly.

Recommended action

1.     Identify whether any user is restarting the system. If no user is restarting the system, wait for the system to restart. Then, use the display version command to view the Last reboot reason field to check the reason for the restart.

2.     If the reason for the restart is abnormal, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TEMPERATURE_ALARM

Message text

Pattern 1:

Temperature is greater than the high-temperature alarming threshold on sensor [STRING] [USHOT].

Pattern 2:

Temperature is greater than the high-temperature alarming threshold on [STRING] sensor [STRING] [USHOT].

Pattern 3:

Temperature is greater than the high-temperature alarming threshold on [STRING] [STRING] sensor [STRING] [USHOT].

Variable fields

Pattern 1:

$1: Sensor type.

$2: Sensor ID.

Pattern 2:

$1: Slot number.

$2: Sensor type.

$3: Sensor ID.

Pattern 3:

$1: Chassis number.

$2: Slot number.

$3: Sensor type.

$4: Sensor ID.

Severity level

4 (Warning)

Example

DEV/4/TEMPERATURE_ALARM: Temperature is greater than the high-temperature alarming threshold on slot 1 sensor inflow 1.

Impact

High temperature will affect the normal operation of the system.

Cause

The temperature exceeds the critical (Alarm) high temperature alarm threshold, the ambient temperature is too high, or the fan is abnormal.

Recommended action

2.     Identify whether the temperature in the equipment room is in the acceptable range. Make sure the device is properly ventilated.

3.     Execute the display fan command to identify whether the fan was removed or failed, and identify whether the fan was running correctly. If the fan is absent or faulty, install or replace the fan.

4.     Use the display environment command to check the current temperature and the effective threshold. If the ambient temperature is too high, adjust the ambient temperature.

5.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TEMPERATURE_ALARM_CLEAR

Message text

Temperature alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]> , ThresholdType=<[STRING]>, ThresholdValue=<[STRING]>, CurrentValue=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

$6: Threshold type.

$7: Threshold value.

$8: Current value.

Severity level

2 (Critical)

Example

DEV/2/TEMPERATURE_ALARM_CLEAR: Temperature alarm cleared. (PhysicalIndex=4011, PhysicalName=Temperature Sensor 1 on Board 0, RelativeResource=0/0, ErrorCode=433009, Reason=Board temperature restored, ThresholdType=LowAlarm, ThresholdValue=7, CurrentValue=31.)

Impact

No negative impact on the system.

Cause

A critical temperature alarm is cleared.

Recommended action

No action is required.

 

TEMPERATURE_ALARM_OCCUR

Message text

Temperature alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]> , ThresholdType=<[STRING]>, ThresholdValue=<[STRING]>, CurrentValue=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

$6: Threshold type.

$7: Threshold value.

$8: Current value.

Severity level

2 (Critical)

Example

DEV/2/TEMPERATURE_ALARM_OCCUR: Temperature alarm occurred. (PhysicalIndex=4011, PhysicalName=Temperature Sensor 1 on Board 0, RelativeResource=0/0, ErrorCode=433009, Reason=Board temperature out of range, ThresholdType=LowAlarm, ThresholdValue=7, CurrentValue=3.)

Impact

A high temperature will affect the normal operation of the system

Cause

This message is generated when the temperature of the entity exceeds the alarm threshold.

Recommended action

1.     Identify whether the temperature in the equipment room is in the acceptable range and make sure the device is properly ventilated.

2.     Execute the display fan command to identify whether the fan was removed or failed, and identify whether the fan was running correctly. If the fan is absent or faulty, install or replace the fan.

3.     Use the display environment command to check the current temperature and the effective threshold. If the ambient temperature is too high, adjust the ambient temperature.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TEMPERATURE_LOW

Message text

Pattern 1:

Temperature is less than the low-temperature threshold on sensor [STRING] [INT32].

Pattern 2:

Temperature is less than the low-temperature threshold on [STRING] sensor [STRING] [INT32].

Pattern 3:

Temperature is less than the low-temperature threshold on [STRING] [STRING] sensor [STRING] [INT32].

Variable fields

Pattern 1:

$1: Sensor type.

$2: Sensor ID.

Pattern 2:

$1: Slot number.

$2: Sensor type.

$3: Sensor ID.

Pattern 3:

$1: Chassis number.

$2: Slot number.

$3: Sensor type.

$4: Sensor ID.

Severity level

4 (Warning)

Example

DEV/4/TEMPERATURE_LOW: Temperature is less than the low-temperature threshold on slot 1 sensor inflow 1.

Impact

Low temperature will affect system operation.

Cause

This message is generated when the temperature drops below the low temperature alarm threshold.

Recommended action

1.     Identify whether the ambient temperature in the equipment room is too low. If the ambient temperature is too low, improve the ambient temperature.

2.     Execute the display fan command to identify whether the fan was removed or failed, and identify whether the fan was running correctly. If the fan is absent or faulty, install or replace the fan.

3.     Use the display environment command to check the current temperature and the effective threshold. If the ambient temperature is too high, adjust the ambient temperature.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TEMPERATURE_NORMAL

Message text

Pattern 1:

Temperature changed to normal on sensor [STRING] [INT32].

Pattern 2:

Temperature changed to normal on [STRING] sensor [STRING] [INT32].

Pattern 3:

Temperature changed to normal on [STRING] [STRING] sensor [STRING] [INT32].

Variable fields

Pattern 1:

$1: Sensor type.

$2: Sensor ID.

Pattern 2:

$1: Slot number.

$2: Sensor type.

$3: Sensor ID.

Pattern 3:

$1: Chassis number.

$2: Slot number.

$3: Sensor type.

$4: Sensor ID.

Severity level

4 (Warning)

Example

DEV/4/TEMPERATURE_NORMAL: Temperature changed to normal on slot 1 sensor inflow 1.

Impact

No negative impact on the system.

Cause

This message is generated when the entity's temperature returns to normal from an abnormal state.

Recommended action

No action is required.

 

TEMPERATURE_SHUTDOWN

Message text

Pattern 1:

Temperature is greater than the high-temperature shutdown threshold on sensor [STRING] [INT32]. The slot will be powered off automatically.

Pattern 2:

Temperature is greater than the high-temperature shutdown threshold on [STRING] sensor [STRING] [INT32]. The slot will be powered off automatically.

Pattern 3:

Temperature is greater than the high-temperature shutdown threshold on [STRING] [STRING] sensor [STRING] [INT32]. The slot will be powered off automatically.

Variable fields

Pattern 1:

$1: Sensor type.

$2: Sensor ID.

Pattern 2:

$1: Slot number.

$2: Sensor type.

$3: Sensor ID.

Pattern 3:

$1: Chassis number.

$2: Slot number.

$3: Sensor type.

$4: Sensor ID.

Severity level

2 (Critical)

Example

DEV/2/TEMPERATURE_SHUTDOWN: Temperature is greater than the high-temperature shutdown threshold on slot 1 sensor inflow 1. The slot will be powered off automatically.

Impact

High temperature will affect system operation.

Cause

The temperature exceeds the shutdown-level high temperature alarm threshold, the ambient temperature is too high, or the fan is abnormal.

Recommended action

1.     Identify whether the temperature in the equipment room is in the acceptable range and make sure the device is properly ventilated.

5.     Execute the display fan command to identify whether the fan was removed or failed, and identify whether the fan was running correctly. If the fan is absent or faulty, install or replace the fan.

6.     Use the display environment command to check the current temperature and the effective threshold. If the ambient temperature is too high, adjust the ambient temperature.

7.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TEMPERATURE_WARNING

Message text

Pattern 1:

Temperature is greater than the high-temperature warning threshold on sensor [STRING] [INT32].

Pattern 2:

Temperature is greater than the high-temperature warning threshold on [STRING] sensor [STRING] [INT32].

Pattern 3:

Temperature is greater than the high-temperature warning threshold on [STRING] [STRING] sensor [STRING] [INT32].

Variable fields

Pattern 1:

$1: Sensor type.

$2: Sensor ID.

Pattern 2:

$1: Slot number.

$2: Sensor type.

$3: Sensor ID.

Pattern 3:

$1: Chassis number.

$2: Slot number.

$3: Sensor type.

$4: Sensor ID.

Severity level

4 (Warning)

Example

DEV/4/TEMPERATURE_WARNING: Temperature is greater than the high-temperature warning threshold on slot 1 sensor inflow 1.

Impact

High temperature will affect system operation.

Cause

The temperature exceeds the high temperature alarm threshold, or the ambient temperature is too high, or the fan is abnormal.

Recommended action

1.     Identify whether the temperature in the equipment room is in the acceptable range and make sure the device is properly ventilated.

8.     Execute the display fan command to identify whether the fan was removed or failed, and identify whether the fan was running correctly. If the fan is absent or faulty, install or replace the fan.

9.     Please use the display environment command to check the current temperature and the effective threshold. If the ambient temperature is too high, adjust the ambient temperature

10.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TIMER_CREATE_FAILED_FIRST

Message text

The process with PID [UINT] failed to create a timer.Reason for the failure:[STRING]

Variable fields

$1: The PID of the process that creates the timer

$2: The reason for the most recent attempt failure to create a timer, with possible impact on the service module functionality of the process. Possible reasons include:

·     Maximum number of timers already reached.

Severity level

4 (Warning)

Example

DEV/4/TIMER_CREATE_FAILED_FIRST: The process with PID 70 failed to creadte a timer.Reason for the failure: Maximum number of timers already reached

Impact

The functionality of the service module corresponding to the process might be affected.

Cause

The system outputs this message when a process fails to create a timer for the first time.

The system apply the following rules to avoid frequent output of messages that report timer creation failures:

·     The system outputs a TIMER_CREATE_FAILED_FIRST message when a process fails to create a timer for the first time.

·     If a timer creation failure occurs again 15 minutes after the first failure, the system outputs a TIMER_CREATE_FAILED_MORE message.

·     The TIMER_CREATE_FAILED_MORE message records last time when the timer creation failure message was generated, and the number of timer creation failures between the last and current messages that report timer creation failures. The system does not generate log messages about timer creation failures that occurred within the 15 minutes.

Recommended action

1.     Restart the device to recover the service module corresponding to the process.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TIMER_CREATE_FAILED_MORE

Message text

The process with PID [UINT] failed to create a timer:[UINT] consecutive failures since [STRING].Reason for the failure:[STRING]

Variable fields

$1: PID of the process creating the timer

$2: Number of times the timer creation failed since the last log print

$3: Time of the last log print

$4: Reason for the most recent timer creation failure, possible impact on the business module function of the process

·     Maximum number of timers already reached.

Severity level

4 (Warning)

Example

DEV/4/TIMER_CREATE_FAILED_MORE: The process with PID 70 failed to create a timer:2 consecutive failures since 2019/11/21 16:00:00.Reason for the failure: Maximum number of timers already reached.

Impact

The functionality of the service module corresponding to the process might be affected.

Cause

The system outputs this message when a process fails to create a timer for the first time.

The system apply the following rules to avoid frequent output of messages that report timer creation failures:

·     The system outputs a TIMER_CREATE_FAILED_FIRST message when a process fails to create a timer for the first time.

·     If a timer creation failure occurs again 15 minutes after the first failure, the system outputs a TIMER_CREATE_FAILED_MORE message.

·     The TIMER_CREATE_FAILED_MORE message records last time when the timer creation failure message was generated, and the number of timer creation failures between the last and current messages that report timer creation failures. The system does not generate log messages about timer creation failures that occurred within the 15 minutes.

Recommended action

1.     Restart the device to recover the service module corresponding to the process.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

VCHK_VERSION_INCOMPATIBLE

Message text

Software version of [STRING] is incompatible with MPU.

Variable fields

$1: Chassis number + slot number or slot number.

Severity level

1 (Alert)

Example

DEV/1/VCHK_VERSION_INCOMPATIBLE: Software version of slot 1 is incompatible with MPU.

Impact

The card is not available.

Cause

During startup, PEX detects that its boot software package is incompatible with the software package running on the parent device. In this case, PEX generates this message and restarts.

Recommended action

1.     Set a software package compatible with the current version of the parent device as the next startup software package/load software package for PEX.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

VOLTAGE_ALARM_CLEAR

Message text

Voltage alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

$6: Threshold type.

$7: Threshold value.

$8: Current value.

Severity level

2 (Critical)

Example

DEV/2/VOLTAGE_ALARM_CLEAR: Voltage alarm cleared. (PhysicalIndex=199, PhysicalName=Voltage 2, RelativeResource=0, ErrorCode=420003, Reason=Voltage fell below the high output voltage warning threshold. )

Impact

No negative impact on the system.

Cause

A critical voltage alarm was cleared.

Recommended action

No action is required.

 

Table 7 VOLTAGE_ALARM_CLEAR fault codes and causes

Fault code

Fault cause

421001

PoE turned on.

420005

Voltage on voltage chip channel $1 ($2) on the card $3 fell below the high output voltage shutdown threshold.

$1: Voltage channel number.

$2: Voltage channel description.

$3: Slot number.

Voltage fell below the high output voltage shutdown threshold.

420003

Voltage on voltage chip channel $1 ($2) on the card $3 increased above the low output voltage shutdown threshold.

$1: Voltage channel number.

$2: Voltage channel description.

$3: Slot number.

Voltage increased above the low output voltage shutdown threshold.

 

VOLTAGE_ALARM_OCCUR

Message text

Voltage alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]> , ThresholdType=<[STRING]>, ThresholdValue=<[STRING]>, CurrentValue=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause description.

$6: Threshold type.

$7: Threshold value.

$8: Current value.

Severity level

2 (Critical)

Example

DEV/2/VOLTAGE_ALARM_OCCUR: Voltage alarm occurred. (PhysicalIndex=4043, PhysicalName=Voltage Sensor 0 on Board 0, RelativeResource=0/0, ErrorCode=420005, Reason=Voltage exceeded the high output voltage shutdown threshold, ThresholdType=LowAlarm, ThresholdValue=1031, CurrentValue=0.)

Impact

Voltage abnormality may affect the normal operation of the system

Cause

A critical voltage alarm occurs.

Recommended action

1.     Execute the display voltage command to identify whether the power module meets the power supply requirements. If it does not meet the power supply requirements, replace the power module.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

VOLTAGE_FATALALARM_CLEAR

Message text

Voltage fatal alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]> , ThresholdType=<[STRING]>, ThresholdValue=<[STRING]>, CurrentValue=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause.

$6: Threshold type.

$7: Threshold value with unit.

$8: Current value with unit.

Severity level

1 (Alert)

Example

DEV/1/VOLTAGE_FATALALARM_CLEAR: Voltage fatal alarm cleared. (PhysicalIndex=5683, PhysicalName=Voltage Sensor 2 on Board 14, RelativeResource=0/14, ErrorCode=420001, Reason= Board powered up, ThresholdType=HighAlarm, ThresholdValue= INVALID, CurrentValue= INVALID)

Impact

No negative impact on the system.

Cause

A voltage alert alarm was cleared.

Recommended action

No action is required.

 

VOLTAGE_FATALALARM_OCCUR

Message text

Voltage fatal alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]> , ThresholdType=<[STRING]>, ThresholdValue=<[STRING]>, CurrentValue=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault position.

$4: Fault code.

$5: Fault cause.

$6: Threshold type.

$7: Threshold value with unit.

$8: Current value with unit.

Severity level

1 (Alert)

Example

DEV/1/VOLTAGE_FATALALARM_OCCUR: Voltage fatal alarm occurred. (PhysicalIndex=5683, PhysicalName=Voltage Sensor 2 on Board 14, RelativeResource=0/14, ErrorCode=420001, Reason=Board failed to power up, ThresholdType=HighAlarm, ThresholdValue=INVALID, CurrentValue= INVALID)

Impact

The abnormal voltage might affect the system operation.

Cause

An alert voltage alarm occurs.

Recommended action

1.     Execute the display voltage command to identify whether the power module meets the power supply requirements. If it does not meet the power supply requirements, replace the power module.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

DHCP

This section contains DHCP messages.

DHCP_NOTSUPPORTED

Message text

Failed to apply filtering rules for DHCP packets because some rules are not supported.

Variable fields

N/A

Severity level

3 (Error)

Example

DHCP/3/DHCP_NOTSUPPORTED: Failed to apply filtering rules for DHCP packets because some rules are not supported.

Impact

The system cannot process DHCP packets.

Cause

The system failed to apply filtering rules for DHCP packets because some rules are not supported on the device.

Recommended action

Disable unnecessary services to release hardware resources, and then re-configure DHCP.

 

DHCP_NORESOURCES

Message text

Failed to apply filtering rules for DHCP packets because hardware resources are insufficient.

Variable fields

N/A

Severity level

3 (Error)

Example

DHCP/3/DHCP_NORESOURCES: Failed to apply filtering rules for DHCP packets because hardware resources are insufficient.

Impact

The system cannot process DHCP packets.

Cause

The system failed to apply filtering rules for DHCP packets because the hardware resources are insufficient.

Recommended action

1.     Identify whether the device supports DHCP:

¡     If the device does not support DHCP, no action is required.

¡     If the device supports DHCP, enable DHCP again.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

DHCPR

This section contains DHCP relay agent messages.

DHCPR_SERVERCHANGE

Message text

·     Switched to the DHCP server at [IPADDR] because the current DHCP server did not respond.

·     Switched to the DHCP server at [IPADDR] vpnname [STRING] because the current DHCP server does not respond.

Variable fields

$1: IP address of the DHCP server.

$2: VPN information of the DHCP server.

Severity level

3 (Error)

Example

·     DHCPR/3/DHCPR_SERVERCHANGE: -MDC=1;

Switched to the server at 2.2.2.2 because the current server did not respond.

·     DHCPR/3/DHCPR_SERVERCHANGE: -MDC=1;

Switched to the DHCP server at  2.2.2.2 vpnname 1 because the current DHCP server does not respond.

Impact

The DHCP relay agent turns to another DHCP server for IP address acquisition.

Cause

The DHCP relay agent did not receive any responses from the current DHCP server and switched to another DHCP server in the specified VPN or on the public network for IP address acquisition.

Recommended action

No action is required.

 

DHCPR_SWITCHMASTER

Message text

Switched to the master DHCP server at [IPADDR].

Variable fields

$1: IP address of the master DHCP server.

Severity level

3 (Error)

Example

DHCPR/3/DHCPR_SWITCHMASTER: -MDC=1; Switched to the master DHCP server at 2.2.2.2.

Impact

The DHCP relay agent turns to the master DHCP server for IP address acquisition.

Cause

After a switchback delay time, the DHCP relay agent switched from a backup DHCP server back to the master DHCP server for IP address acquisition.

Recommended action

No action is required.

 

DHCPS messages

This section contains DHCP server messages.

DHCPS_ALLOCATE_IP

Message text

DHCP server received a DHCP client's request packet on interface [STRING], and allocated an IP address [IPADDR](lease [UINT32] seconds) for the DHCP client(MAC [MAC]) from [STRING] pool.

Variable fields

$1: Name of the interface on which DHCP server is configured.

$2: IPv4 address assigned to the DHCP client.

$3: Lease duration of the assigned IPv4 address.

$4: MAC address of the DHCP client.

$5: Name of the address pool to which the assigned IPv4 address belongs.

Severity level

5 (Notification)

Example

DHCPS/5/DHCPS_ALLOCATE_IP: DHCP server received a DHCP client’s request packet on interface GigabitEthernet1/0/2, and allocated an IP address 1.0.0.91(lease 86400 seconds) for the DHCP client(MAC 0000-0000-905a) from p1 pool.

Impact

No negative impact on the system.

Cause

The DHCP server assigned an IPv4 address lease to a DHCP client.

Recommended action

No action is required.

 

DHCPS_EXTEND_FAILURE

Message text

Extend request from DHCP client (IP [IPADDR], MAC [MAC]) failed, reply NAK message.

Variable fields

$1: IPv4 address of the DHCP client requesting lease renewal.

$2: MAC address of the DHCP client requesting lease renewal.

Severity level

5 (Notification)

Example

DHCPS/5/DHCPS_EXTEND_FAILURE: Extend request from DHCP client (IP 1.0.0.91, MAC 0000-0000-905a) failed, reply NAK message.

Impact

The DHCP client cannot use the IP address after lease expiration.

Cause

This log is generated when one of the following conditions exist:

·     The IPv4 address has been assigned to another client.

·     The related address lease does not exist on the DHCP server.

Recommended action

The DHCP client needs to request a new IPv4 address.

 

DHCPS_CONFLICT_IP

Message text

A conflict IP [IPADDR] from [STRING] pool was detected by DHCP server on interface [STRING].

Variable fields

$1: IPv4 address that is in conflict.

$2: Name of the address pool to which the conflicting IPv4 address belongs.

$3: Name of the interface on which DHCP server is configured.

Severity level

5 (Notification)

Example

DHCPS/5/DHCPS_CONFLICT_IP: A conflict IP 100.1.1.1 from p1 pool was detected by DHCP server on interface GigabitEthernet1/0/2.

Impact

The conflicting IPv4 address cannot be assigned.

Cause

The address pool contains an IPv4 interface address of the DHCP server.

Recommended action

No action is required.

 

DHCPS_EXTEND_IP

Message text

DHCP server received a DHCP client's request packet on interface [STRING], and extended lease from [STRING] pool for the DHCP client (IP [IPADDR], MAC [MAC]).

Variable fields

$1: Name of the interface on which DHCP server is configured.

$2: Name of the address pool to which the client's IPv4 address belongs.

$3: IPv4 address of the DHCP client.

$4: MAC address of the DHCP client.

Severity level

5 (Notification)

Example

DHCPS/5/DHCPS_EXTEND_IP: DHCP server received a DHCP client’s request packet on interface GigabitEthernet1/0/2, and extended lease from p1 pool for the DHCP client (IP 1.0.0.91, MAC 0000-0000-905a).

Impact

No negative impact on the system.

Cause

The DHCP server extended the lease for a DHCP client.

Recommended action

No action is required.

 

DHCPS_FILE

Message text

Failed to save DHCP client information due to lack of storage resources.

Variable fields

N/A

Severity level

4 (Warning)

Example

DHCPS/4/DHCPS_FILE: Failed to save DHCP client information due to lack of storage resources.

Impact

The DHCP server failed to save DHCP client information, and the related DHCP client cannot come online.

Cause

A new user attempted to come online when the DHCP server did not have sufficient storage resources.

Recommended action

Delete unnecessary files to release storage resources. If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

DHCPS_RECLAIM_IP

Message text

DHCP server reclaimed a [STRING] pool’s lease(IP [IPADDR], lease [UINT32] seconds), which is allocated for the DHCP client (MAC [MAC]).

Variable fields

$1: Name of the address pool to which the assigned IPv4 address belongs.

$2: IPv4 address assigned to the DHCP client.

$3: Lease duration of the assigned IPv4 address.

$4: MAC address of the DHCP client.

Severity level

5 (Notification)

Example

DHCPS/5/DHCPS_RECLAIM_IP: DHCP server reclaimed a p1 pool’s lease(IP 1.0.0.91, lease 86400 seconds), which is allocated for the DHCP client (MAC 0000-0000-905a).

Impact

No negative impact on the system.

Cause

This message is generated when one of the following conditions exists:

·     Lease information is deleted through CLI.

·     The client sends a DHCP-RELEASE message to the DHCP server.

·     The address lease expires, because the client does not renew the lease.

Recommended action

No action is required.

 

DHCPS_UNAVAILABLE_POOL

Message text

Available address pool [STRING] cannot be found.

Variable fields

$1: Name of the address pool. If no authorization-specific or policy-specific address pool exists, this field is not displayed.

Severity level

5 (Notification)

Example

DHCPS/5/DHCPS_UNAVAILABLE_POOL: Available address pool 1 cannot be found.

Impact

The DHCP server cannot assign an IP address to the requesting DHCP client.

Cause

The DHCP server is not configured with the required address pool.

Recommended action

Configure an address pool on the DHCP server as required.

 

DHCPS_VERIFY_CLASS

Message text

Illegal DHCP client-PacketType=[STRING]-ClientAddress=[MAC];

Variable fields

$1: Type of the packet.

$2: Hardware address of the DHCP client.

Severity level

5 (Notification)

Example

DHCPS/5/DHCPS_VERIFY_CLASS: Illegal DHCP client-PacketType= DHCPDISCOVER-ClientAddress=0000-5e01-0104;

Impact

The DHCP server does not process the request from the DHCP client.

Cause

The DHCP server verified that the DHCP client was not on the user class whitelist.

Recommended action

1.     Check the validity of the DHCP client by using the port mirroring feature.

¡     If the DHCP client is unauthorized, ignore the request.

¡     If the DHCP client is authorized, add the user class of the DHCP client to the DHCP user class allowlist.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

DHCPS6 messages

This section contains DHCPv6 server messages.

DHCPS6_ALLOCATE_ADDRESS

Message text

DHCPv6 server received a DHCPv6 client’s request packet on interface [STRING], and allocated an IPv6 address [IPADDR] (lease [UINT32] seconds) for the DHCPv6 client(DUID [HEX], IAID [HEX]) from [STRING] pool.

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: IPv6 address assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 address.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

$6: Name of the address pool to which the assigned IPv6 address belongs.

Severity level

5 (Notification)

Example

DHCPS6/5/ALLOCATE ADDRESS: DHCPv6 server received a DHCPv6 client’s request packet on interface Ethernet0/2, and allocated an IPv6 address 2000::3(lease 60 seconds) for the DHCPv6 client(DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f) from p1 pool.

Impact

No negative impact on the system.

Cause

The DHCPv6 server assigned an IPv6 address lease to a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_ALLOCATE_PREFIX

Message text

DHCPv6 server received a DHCPv6 client’s request packet on interface [STRING], and allocated an IPv6 prefix [IPADDR] (lease [UINT32] seconds) for the DHCPv6 client(DUID [HEX], IAID [HEX]) from [STRING] pool.

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: IPv6 prefix assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 prefix.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

$6: Name of the address pool to which the assigned IPv6 prefix belongs.

Severity level

5 (Notification)

Example

DHCPS6/5/ALLOCATE PREFIX: DHCPv6 server received a DHCPv6 client’s request packet on interface Ethernet0/2, and allocated an IPv6 prefix 2000::(lease 60 seconds) for the DHCPv6 client(DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f) from p1 pool.

Impact

No negative impact on the system.

Cause

The DHCPv6 server assigned an IPv6 prefix lease to a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_CONFLICT_ADDRESS

Message text

A conflict IPv6 address [IPADDR] from [STRING] pool was detected by DHCPv6 server on interface [STRING].

Variable fields

$1: IPv6 address that is in conflict.

$2: Name of the address pool to which the conflicting IPv6 address belongs.

$3: Name of the interface on which DHCPv6 server is configured.

Severity level

5 (Notification)

Example

DHCPS6/5/DHCPS6_CONFLICT_ADDRESS: A conflict IPv6 address 33::1 from p1 pool was detected by DHCPv6 server on interface Ethernet0/2.

Impact

The conflicting IPv6 address cannot be assigned.

Cause

The address pool contains an IPv6 interface address of the DHCPv6 server.

Recommended action

No action is required.

 

DHCPS6_EXTEND_ADDRESS

Message text

DHCPv6 server received a DHCP client’s request packet on interface [STRING], and extended lease from [STRING] pool for the DHCP client (IPv6 address [IPADDR], DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: Name of the address pool to which the client's IPv6 address belongs.

$3: IPv6 address of the DHCPv6 client.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5 (Notification)

Example

DHCPS6/5/EXTEND ADDRESS: DHCPv6 server received a DHCP client’s request packet on interface Ethernet0/2, and extended lease from p1 pool for the DHCP client (IPv6 address 2000::3, DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Impact

No negative impact on the system.

Cause

The DHCPv6 server extended the address lease for a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_EXTEND_ADDRESS_FAILURE

Message text

Extend request for address from DHCPv6 client (IPv6 address [IPADDR], DUID [HEX], IAID [HEX]) failed.

Variable fields

$1: IPv6 address assigned to the DHCPv6 client requesting lease renewal.

$2: DUID of the DHCPv6 client requesting lease renewal.

$3: IAID of the DHCPv6 client requesting lease renewal.

Severity level

5 (Notification)

Example

DHCPS6/5/DHCPS6_EXTEND_ADDRESS_FAILURE: Extend request for address from DHCPv6 client (IPv6 address 2000::3, DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f) failed.

Impact

The DHCPv6 client cannot use the IPv6 address after lease expiration.

Cause

This log is generated when one of the following conditions exist:

·     The IPv6 address has been assigned to another client.

·     The related address lease does not exist on the DHCPv6 server.

Recommended action

The DHCPv6 client needs to request a new IPv6 address.

 

DHCPS6_EXTEND_PREFIX

Message text

DHCPv6 server received a DHCP client’s request packet on interface [STRING], and extended lease from [STRING] pool for the DHCP client (IPv6 prefix [IPADDR], DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: Name of the address pool to which the client's IPv6 prefix belongs.

$3: IPv6 prefix of the DHCPv6 client.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5 (Notification)

Example

DHCPS6/5/EXTEND PREFIX: DHCPv6 server received a DHCP client’s request packet on interface Ethernet0/2, and extended lease from p1 pool for the DHCP client (IPv6 prefix 2000::, DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Impact

No negative impact on the system.

Cause

The DHCPv6 server extended the prefix lease for a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_EXTEND_PREFIX_FAILURE

Message text

Extend request for prefix from DHCPv6 client (IPv6 prefix [IPADDR], DUID [HEX], IAID [HEX]) failed.

Variable fields

$1: IPv6 prefix assigned to the DHCPv6 client requesting lease renewal.

$2: DUID of the DHCPv6 client requesting lease renewal.

$3: IAID of the DHCPv6 client requesting lease renewal.

Severity level

5 (Notification)

Example

DHCPS6/5/DHCPS6_EXTEND_PREFIX_FAILURE: Extend request for prefix from DHCPv6 client (IPv6 prefix 2000::, DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f) failed.

Impact

The DHCPv6 client cannot use the IPv6 prefix after lease expiration.

Cause

This log is generated when one of the following conditions exist:

·     The IPv6 prefix has been assigned to another client.

·     The related prefix lease does not exist on the DHCPv6 server.

Recommended action

The DHCPv6 client needs to request a new IPv6 prefix.

 

DHCPS6_FILE

Message text

Failed to save DHCP client information due to lack of storage resources.

Variable fields

N/A

Severity level

4 (Warning)

Example

DHCPS6/4/DHCPS6_FILE: Failed to save DHCP client information due to lack of storage resources.

Impact

The DHCPv6 server failed to save DHCPv6 client information, and the related DHCPv6 client cannot come online.

Cause

A new user attempted to come online when the DHCPv6 server did not have sufficient storage resources.

Recommended action

Delete unnecessary files to release storage resources. If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

DHCPS6_RECLAIM_ADDRESS

Message text

DHCPv6 server reclaimed a [STRING] pool's lease(IPv6 address [IPADDR], lease [UINT32] seconds), which is allocated for the DHCPv6 client (DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the address pool to which the assigned IPv6 address belongs.

$2: IPv6 address assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 address.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5 (Notification)

Example

DHCPS6/5/RECLAIM ADDRESS: DHCPv6 server reclaimed a p1 pool’s lease(IPv6 address 2000::3, lease 60 seconds), which is allocated for the DHCPv6 client (DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Impact

No negative impact on the system.

Cause

This message is generated when one of the following conditions exists:

·     The reset command is used to delete lease information.

·     The client sends a DHCP-RELEASE message to the DHCPv6 server.

·     The address lease expires, because the client does not renew the lease.

Recommended action

If the DHCPv6 client needs to come online, request an address lease again.

 

DHCPS6_RECLAIM_PREFIX

Message text

DHCPv6 server reclaimed a [STRING] pool’s lease(IPv6 prefix [IPADDR], lease [INTEGER] seconds), which is allocated for the DHCPv6 client (DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the address pool to which the assigned IPv6 prefix belongs.

$2: IPv6 prefix assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 prefix.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5 (Notification)

Example

DHCPS6/5/RECLAIM PREFIX: DHCPv6 server reclaimed a p1 pool’s lease(IPv6 prefix 2000::, lease 60 seconds), which is allocated for the DHCPv6 client (DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Impact

No negative impact on the system.

Cause

This message is generated when one of the following conditions exists:

·     The reset command is used to delete lease information.

·     The client sends a DHCP-RELEASE message to the DHCPv6 server.

·     The prefix lease expires, because the client does not renew the lease.

Recommended action

If the DHCPv6 client needs to come online, request a prefix lease again.

 

DHCPS6_UNAVAILABLE_POOL

Message text

Available [STRING] pool [STRING] cannot be found.

Variable fields

$1: Pool type, which can be prefix or address.

$2: Name of the prefix or address pool. This field is not displayed if one of the following conditions exists:

·     No authorization-specific or policy-specific address pool exists.

·     No prefix pool is applied to the address pool.

Severity level

5 (Notification)

Example

DHCPS6/5/DHCPS6_UNAVAILABLE_POOL: Available address pool 1 cannot be found.

Impact

The DHCPv6 server cannot assign an IPv6 prefix or address to the requesting DHCPv6 client.

Cause

The DHCPv6 server is not configured with the required prefix or address pool.

Recommended action

Configure a prefix or address pool on the DHCPv6 server as required.

 

 

DHCPSP4

This section contains DHCP snooping (DHCPSP4) messages.

DHCPSP4_FILE

Message text

Failed to save DHCP client information due to lack of storage resources.

Variable fields

N/A

Severity level

4 (Warning)

Example

DHCPSP4/4/DHCPSP4_FILE: Failed to save DHCP client information due to lack of storage resources.

Impact

The DHCP snooping device failed to save DHCP client information, and the related DHCP client cannot come online.

Cause

A new user attempted to come online when the DHCP snooping device did not have sufficient storage resources.

Recommended action

Delete unnecessary files to release storage resources. If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

DHCPSP4_UNTRUSTED_SERVER

Message text

Detected reply packet from untrusted server. Server info: IPaddress = [IPADDR], MACaddress = [MAC], Interface = [STRING].

Variable fields

$1: IP address of the untrusted DHCP server.

$2: MAC address of the untrusted DHCP server.

$3: Name of the interface facing the untrusted DHCP server.

Severity level

4 (Warning)

Example

DHCPSP4/4/DHCPSP4_UNTRUSTED_SERVER: Detected reply packet from untrusted server. Server Info: IPaddress = 192.168.1.1, MACaddress = 78a0-7aa4-0307, Interface = GigabitEthernet1/0/1.

Impact

No negative impact on the system.

Cause

This log message is generated under the following conditions:

·     DHCP snooping is enabled on an interface of the DHCP snooping device, which connects the device to an untrusted DHCP server.

·     The above interface is configured as an untrusted port.

Recommended action

Locate the untrusted DHCP server according to the IP address and MAC address information, and isolate the server if necessary.

 

DHCPSP4_DROP_PACKET

Message text

DHCP snooping dropped a packet:

    Message type = [TYPE]

    Client hardware address = [MAC]

    Server ID = [IPADDR]

    Client address = [IPADDR]

    Drop reason: [STRING]

Variable fields

$1: Type of the DHCP packet.

$2: MAC address of the DHCP client.

$3: IP address of the DHCP server.

$4: IP address of the DHCP client.

$5: Reason why the DHCP packet was dropped:

·     The sending and receiving interfaces are not in the same VLAN.

·     The DHCP packet failed to pass the MAC address check.

·     The DHCP packet failed to pass the DHCP-REQUEST check.

·     The DHCP packet failed to pass the giaddr address check.

Severity level

5 (Notification)

Example

DHCPSP4/5/DHCPSP4_DROP_PACKET: DHCP snooping dropped a packet:

    Message type = DHCPDISCOVER

    Client hardware address = 7ec9-5ce2-1600

    Server ID = 0.0.0.0

    Client address = 0.0.0.0

    Drop reason: The DHCP packet failed to pass the giaddr address check.

Impact

No negative impact on the system.

Cause

This log message is generated if the following conditions exist:

1.     The packet drop alarm is enabled for DHCP snooping.

2.     The number of invalid DHCP packets dropped by DHCP snooping reaches the specified alarm threshold.

Recommended action

Use the information in this log message to locate the source of the DHCP packet, and then troubleshoot the issue.

 

 

DHCPSP6

This section contains DHCPv6 snooping (DHCPSP6) messages.

DHCPSP6_FILE

Message text

Failed to save DHCP client information due to lack of storage resources.

Variable fields

N/A

Severity level

4 (Warning)

Example

DHCPSP6/4/DHCPSP6_FILE: Failed to save DHCP client information due to lack of storage resources.

Impact

The DHCPv6 snooping device failed to save DHCPv6 client information, and the related DHCPv6 client cannot come online.

Cause

A new user attempted to come online when the DHCPv6 snooping device did not have sufficient storage resources.

Recommended action

Delete unnecessary files to release storage resources. If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

DHCPSP6_DROP_PACKET

Message text

DHCPv6 snooping dropped a packet:

    Incoming interface = [STRING]

    Message type = [TYPE]

    Client hardware address = [MAC]

    Drop reason: [STRING]

Variable fields

$1: Interface that received the DHCPv6 packet.

$2: Type of the DHCPv6 packet.

$3: MAC address of the DHCPv6 client.

$4: Reason why the DHCPv6 packet was dropped:

·     The DHCPv6 packet failed to pass the source address check.

·     The DHCPv6 packet failed to pass the DHCPv6-REQUEST check.

·     The DHCPv6 packet failed to pass the RELAY-FORW check.

Severity level

5 (Notification)

Example

DHCPSP6/5/DHCPSP6_DROP_PACKET: DHCPv6 snooping drop a packet:

    Incoming interface = GigabitEthernet2/0/1

    Message type = SOLICIT

    Client hardware address = 7ec9-5ce2-1600

    Drop reason: The DHCPv6 packet failed to pass the RELAY-FORW check.

Impact

No negative impact on the system.

Cause

This log message is generated if the following conditions exist:

1.     The packet drop alarm is enabled for DHCPv6 snooping.

2.     The number of invalid DHCPv6 packets dropped by DHCPv6 snooping reaches the specified alarm threshold.

Recommended action

Use the information in this log message to locate the source of the DHCPv6 packet, and then troubleshoot the issue.

 

 

DIAG messages

This section contains diagnostic messages.

CORE_EXCEED_THRESHOLD

Message text

Usage of CPU [INT] core [INT] exceeded the threshold ([string]).

Variable fields

$1: CPU ID.

$2: CPU core ID.

Severity level

3 (Error)

Example

DIAG/3/CORE_EXCEED_THRESHOLD: Usage of CPU 0 core 2 exceeded the threshold (90%).

Impact

The device's running speed will slow down, CPU processing capacity will decrease, and available CPU resources will be insufficient.

Cause

The CPU core usage has exceeded the severe CPU core usage alarm threshold.

Recommended action

2.     Use the display process cpu and monitor thread commands to display CPU usage information for all processes.

1.     If the issue persists for more than 10 minutes, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CORE_MINOR_RECOVERY

Message text

Core usage minor alarm CPU [INT] core [INT] removed.

Variable fields

$1: CPU ID.

$2: CPU core ID.

Severity level

5 (Notification)

Example

DIAG/5/CORE_MINOR_RECOVERY: Core usage minor alarm CPU 0 core 1 removed.

Impact

No negative impact on the system.

Cause

The CPU core usage has dropped to or below the minor CPU core usage alarm threshold.

Recommended action

No action is required.

 

CORE_MINOR_THRESHOLD

Message text

Usage of CPU [INT] core [INT] exceeded the threshold ([string]).

Variable fields

$1: CPU ID.

$2: CPU core ID.

Severity level

4 (Warning)

Example

DIAG/4/CORE_MINOR_THRESHOLD: Usage of CPU 0 core 2 exceeded the threshold (80%).

Impact

The device's operating speed and the CPU processing capability will improve, and available CPU resources will increase.

Cause

The CPU core usage has exceeded the minor CPU core usage alarm threshold.

Recommended action

1.     Use the display process cpu and monitor thread commands to display CPU usage information for all processes.

2.     If the issue persists for more than 10 minutes, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CORE_RECOVERY

Message text

Core usage alarm CPU [INT] core [INT] removed.

Variable fields

$1: CPU ID.

$2: CPU core ID.

Severity level

5 (Notification)

Example

DIAG/5/CORE_RECOVERY: Core usage alarm CPU 0 core 1 removed.

Impact

No negative impact on the system.

Cause

The CPU core usage has dropped to or below the severe CPU core usage alarm threshold.

Recommended action

No action is required.

 

CPU_MINOR_RECOVERY

Message text

CPU usage recovered to normal state.

Variable fields

N/A

Severity level

5 (Notification)

Example

DIAG/5/CPU_MINOR_THRESHOLD: CPU usage recovered to normal state.

Impact

No negative impact on the system.

Cause

The CPU usage decreased below the recovery threshold. The alarm was removed and the CPU usage status changed to recovered state.

Recommended action

No action is required.

 

CPU_MINOR_THRESHOLD

Message text

CPU usage is in minor alarm state.

Variable fields

N/A

Severity level

4 (Warning)

Example

DIAG/4/CPU_MINOR_THRESHOLD: CPU usage is in minor alarm state.

Impact

The device's operating speed and the CPU processing capability will improve, and available CPU resources will increase.

Cause

The CPU usage increased above the minor alarm threshold and entered minor alarm state. The device sends this message periodically until the CPU usage increases above the severe threshold or the minor alarm is removed.

Recommended action

1.     Use the display process cpu and monitor thread commands to display the CPU usage for all processes.

2.     If the issue persists for more than 10 minutes, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CPU_SEVERE_RECOVERY

Message text

CPU usage severe alarm removed.

Variable fields

N/A

Severity level

5 (Notification)

Example

DIAG/5/CPU_SEVERE_RECOVERY: CPU usage severe alarm removed.

Impact

No negative impact on the system.

Cause

The CPU usage decreased to or below the minor alarm threshold and the severe alarm was removed.

Recommended action

No action is required.

 

CPU_SEVERE_THRESHOLD

Message text

CPU usage is in severe alarm state.

CPU usage: [string] in last 5 seconds.

CPU usage thresholds:

Minor: [string]

Severe: [string]

Process info:

JID             PID          PRI   State        FDs   HH:MM:SS   CPU       Name

[INT]          [INT]         [INT]  [string]     [INT]  [string]          [string]   [string]

Core states:

ID         Idle        User    Kernel    Interrupt   Busy

[string]  [string]   [string] [string]   [string]      [string]

Variable fields

$1: Average CPU usage in the last five seconds.

$2: Minor CPU usage alarm threshold.

$3: Severe CPU usage alarm threshold.

$4 to $11: Information about the top 5 processes with the highest CPU usage when the most recent CPU usage threshold crossing event occurred:

·     $4: Job ID, which uniquely identifies a process. This ID can survive a process restart.

·     $5: Process ID.

·     $6: Process priority. A process with a higher priority is scheduled the first.

·     $7: State of the process. Options include:

¡     R—running.

¡     S—Sleeping.

¡     T—Traced or stopped.

¡     D—Uninterruptible sleep.

¡     Z—Zombie.

·     $8: Number of FDs used by the process.

·     $9: Uptime of the process since the most recent startup. This field displays the uptime only in hours when the uptime is equal to or longer than 100 hours.

·     $10: CPU used by the process to the total CPU capacity of the device (containerization not supported).

·     $10: CPU used by the process to the total CPU capacity of the container (containerization supported).

·     $11: Name of the process.

$12 to $11: Information about the CPU cores when the most recent CPU usage threshold crossing event occurred:

·     $12: ID of the CPU core.

·     $13: Total idle rate of the CPU core.

·     $14: CPU core usage of the user process.

·     $15: CPU core usage of the kernel.

·     $16: CPU core usage of interrupts.

$17: Total CPU core usage.

Severity level

3 (Error)

Example

DIAG/3/CPU_THRESHOLD: CPU usage is in severe alarm state.

CPU usage: 100% in last 5 seconds.

CPU usage thresholds:

Minor: 79%

Severe: 99%

Process info:

JID             PID          PRI  State  FDs   HH:MM:SS  CPU       Name

981            981           120  R       2890  803h            92.90%  forward

19169        3464131    120  S      234    00:35:4         6.33%   bgpd

3526894    3526894    135  R      56      00:00:0         0.21%   pkg_update

1555          1555          120  R      1002  00:41:0         0.06%   diagd

17161        17161        120  S      180    00:49:2          0.10%   isisd

Core states:

ID        Idle       User      Kernel   Interrupt  Busy

CPU1  0.01%   99.88% 0.10%   0.01%      99.99%

CPU2  0.01%   99.89% 0.10%   0.00%      99.99%

CPU3  0.01%   99.88% 0.10%   0.01%      99.99%

CPU4  0.01%   99.88% 0.10%   0.01%      999.9%

CPU5  0.01%   99.88% 0.11%   0.00%      99.99%

Impact

The device's operating speed will become slow, CPU processing capability will decline, and available CPU resources will become insufficient.

Cause

The CPU usage increased above the severe alarm threshold and entered severe alarm state. The device sends this message periodically until the severe alarm is removed.

Recommended action

1.     Use the display cpu-usage configuration command to view the alarm thresholds. If the settings are not appropriate, use the monitor cpu-usage command to change the settings.

2.     If the issue persists for more than 10 minutes, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

DIAG_FD_UPLIMIT_REACHED

Message text

FD number upper limit already reached: Process name=[STRING], PID=[INTEGER].

Variable fields

$1: Name of a process.

$2: ID of the process.

Severity level

4 (Warning)

Example

DIAG/4/DIAG_FD_UPLIMIT_REACHED: FD number upper limit already reached: Process name=snmpd, PID=244.

Impact

The process cannot open new files.

Cause

The maximum number of file descriptors that a process can use has been reached.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

DIAG_FD_UPLIMIT_TO_REACH

Message text

Number of FDs is about to reach the upper limit: Process name=[STRING], PID=[INTEGER].

Variable fields

$1: Name of a process.

$2: ID of the process.

Severity level

4 (Warning)

Example

DIAG/4/DIAG_FD_UPLIMIT_TO_REACH: Number of FDs is about to reach the upper limit. Process name=snmpd, PID=244.

Impact

No negative impact on the system. Observe whether the number of file descriptors used by the process keeps rising.

Cause

The maximum number of file descriptors that a process can use was about to be reached.

Recommended action

No action is required.

 

DIAG_STORAGE_BELOW_THRESHOLD

Message text

The usage of [STRING] ([UINT32]%) was below or equal to the threshold of [UINT32]%.

Variable fields

$1: Name of the storage medium.

$2: Disk usage of the storage medium.

$3: Disk usage threshold for the storage medium.

Severity level

4 (Warning)

Example

DIAG/4/DIAG_STORAGE_BELOW_THRESHOLD: The usage of flash (90%) was below or equal to the threshold of 95%.

Impact

No negative impact on the system.

Cause

This message indicates that the storage medium has sufficient space, because the disk usage is not higher than the threshold.

Recommended action

No action is required.

 

DIAG_STORAGE_EXCEED_THRESHOLD

Message text

The usage of [STRING] ([UINT32]%) exceeded the threshold of [UINT32]%.

Variable fields

$1: Name of the storage medium.

$2: Disk usage of the storage medium.

$3: Disk usage threshold for the storage medium.

Severity level

4 (Warning)

Example

DIAG/4/DIAG_STORAGE_EXCEED_THRESHOLD: The usage of flash (96%) exceeded the threshold of 95%.

Impact

Services that require disk writing will be affected, and the storage medium will not have sufficient space.

Cause

This message indicates that the storage medium does not have sufficient space, because the disk usage is higher than the threshold.

Recommended action

1.     For files not in use, for example, log files and history software packages, execute the delete /unreserved command to delete the files or back up the files and then execute the delete /unreserved command to delete the files.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

MEM_ALERT

Message text

system memory info:

                    total           used             free        shared       buffers       cached

Mem:    [ULONG]    [ULONG]    [ULONG]    [ULONG]    [ULONG]    [ULONG]

-/+ buffers/cache:    [ULONG]    [ULONG]

Swap:    [ULONG]    [ULONG]    [ULONG]

Lowmem: [ULONG]  [ULONG]    [ULONG]

Variable fields

·     Mem—Memory information of the whole system:

¡     $1: Total size of allocatable physical memory. The system physical memory contains allocatable physical memory and unallocatable physical memory. Unallocatable physical memory is mainly used for kernel code storage, kernel management, and running of basic functions. Allocatable physical memory is used for such tasks as running service modules and storing files. The size of unallocatable physical memory is automatically calculated based on the system operation requirements. The size of allocatable physical memory is the total physical memory size minus the unallocatable physical memory size.

¡     $2: Size of the physical memory used by the system.

¡     $3: Size of free physical memory of the system.

¡     $4: Total size of physical memory shared by processes.

¡     $5: Size of physical memory used for buffers.

¡     $6: Size of physical memory used for caches.

·     -/+ buffers/cache—Memory usage information of applications:

¡     $7: -/+ Buffers/Cache:used = Mem:Used – Mem:Buffers – Mem:Cached, which indicates the size of physical memory used by applications.

¡     $8: -/+ Buffers/Cache:free = Mem:Free + Mem:Buffers + Mem:Cached, which indicates the size of physical memory available for applications.

·     Swap—Swap memory usage information:

¡     $9: Total size of swap memory.

¡     $10: Size of used swap memory.

¡     $11: Size of free swap memory.

·     Lowmem—Low memory usage information:

¡     $12: Total size of low memory.

¡     $13: Size of used low memory.

¡     $14: Size of free low memory.

Severity level

4 (Warning)

Example

DIAG/4/MEM_ALERT:

system memory info:

                    total         used           free     shared    buffers     cached

Mem:    1784424     920896     863528              0             0      35400

-/+ buffers/cache:    885496     898928

Swap:                0               0               0

Lowmem: 735848     637896      97952

Impact

No negative impact on the system. Observe whether the available memory keeps decreasing.

Cause

A memory alarm was generated, displaying memory usage information.

The system generates this message when the used memory is greater than or equal to the minor, severe, or critical threshold of memory usage.

Recommended action

You can perform the following tasks to help remove the alarm:

·     Verify that appropriate alarm thresholds are set. To view the alarm thresholds, use the display memory-threshold command. Then you can use the memory-threshold command to modify the alarm thresholds if required.

·     Verify that the device is not under attack by checking the ARP table and routing table.

·     Examine and optimize the network, for example, reduce the number of routes, or replace the device with a higher-performance device.

 

MEM_BELOW_THRESHOLD

Message text

Memory usage has dropped below [STRING] threshold.

Variable fields

$1: Memory usage threshold name: minor, severe, critical, or early-warning.

Severity level

1 (Alert)

Example

DIAG/1/MEM_BELOW_THRESHOLD: Memory usage has dropped below critical threshold.

Impact

No negative impact on the system.

Cause

A memory alarm was removed. The message is sent when the system free memory is greater than a memory alarm recovery threshold.

Recommended action

No action is required.

 

MEM_EXCEED_THRESHOLD

Message text

Memory [STRING] threshold has been exceeded.

Variable fields

$1: Memory usage threshold name: minor, severe, critical, or early-warning.

Severity level

1 (Alert)

Example

DIAG/1/MEM_EXCEED_THRESHOLD: Memory minor threshold has been exceeded.

Impact

The running speed of the device will become low and the available memory resources will become insufficient.

Cause

A memory alarm was notified.

When the used memory size is greater than or equal to the minor, severe, or critical threshold of memory usage, the system generates this message and notifies services modules to perform auto repair, such as releasing memory and stopping requesting memory.

Recommended action

You can perform the following tasks to help remove the alarm:

·     Verify that appropriate alarm thresholds are set. To view the alarm thresholds, use the display memory-threshold command. Then you can use the memory-threshold command to modify the alarm thresholds if required.

·     Verify that the device is not under attack by checking the ARP table and routing table.

·     Examine and optimize the network, for example, reduce the number of routes or replace the device with a higher-performance device.

 

DIM engine messages

This section contains DPI engine messages.

DIM_SIGNATURE_WARNING

Message text

Failed to write signature file to storage, because there is not enough free space.

Severity level

4 (Warning)

Example

DPI/4/DIM_SIGNATURE_WARNING: Failed to write signature file to storage, because there is not enough free space.

Impact

The signature library update or rollback will fail.

Cause

This message is generated when a signature library fails to be updated or rolled back due to insufficient storage space in the flash memory.

Recommended action

Release some storage space (for example, in the flash memory) before updating or rolling back a signature library.

 

DIM_ACTIVE_WARNING

Message text

The device fails to activate the DPI engine due to insufficient memory space after the free-memory normal state threshold is reached. DPI services were no longer in effect.

Severity level

4 (Warning)

Example

DPI/4/DIM_ACTIVE_WARNING: The device fails to activate the DPI engine due to insufficient memory space after the free-memory normal state threshold is reached. DPI services were no longer in effect.

Impact

DPI services do not take effect.

Cause

This message is generated when the device fails to activate the DPI engine due to insufficient memory space.

Recommended action

Release some storage space and then execute the inspect activate command.

 

 

DOT1X messages

This section contains 802.1X messages.

DOT1X_CLEAR_MAX_USER_THRESHOLD

Message text

The max-user alarm trigger condition cleared when the percentage of online 802.1X users reached or dropped below the max-user alarm clear threshold on interface [STRING].

Variable fields

$1: Interface type and number.

Severity level

5 (Notification)

Example

DOT1X/5/DOT1X_CLEAR_MAX_USER_THRESHOLD: The max-user alarm trigger condition cleared when the percentage of online 802.1X users reached or dropped below the max-user alarm clear threshold on interface GigabitEthernet1/0/1.

Impact

No negative impact on the system.

Cause

The percentage of current online 802.1X users to the maximum number of concurrent 802.1X users on the interface dropped to the alarm clear threshold from a value above or equal to the alarm threshold.

Recommended action

No action is required.

 

DOT1X_CONFIG_NOTSUPPORT

Message text

802.1X is not supported on interface [STRING].

Variable fields

$1: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_CONFIG_NOTSUPPORT: 802.1X is not supported on interface GigabitEthernet1/0/1.

Impact

The interface cannot use the 802.1X feature.

Cause

Enable 802.1X on an interface that does not support 802.1X.

Recommended action

Disable 802.1X on the interface and configure 802.1X on an interface that supports the feature.

 

DOT1X_LOGIN_FAILURE

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]-ErrCode=[STRING]; User failed 802.1X authentication. Reason: [STRING].

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: Error code.

$6: Failure cause:

·     MAC address authorization failed.

·     VLAN authorization failed.

·     VSI authorization failed.

·     ACL authorization failed.

·     User profile authorization failed.

·     URL authorization failed.

·     Microsegment authorization failed.

·     VSI authorization failed because of insufficient resources.

·     ACL authorization failed because of insufficient resources.

·     MAC address authorization failed after a MAC move.

·     VLAN authorization failed because of failure in authorization VLAN selection.

·     VLAN authorization failed because a free VLAN was assigned as the authorization VLAN.

·     VLAN authorization failed because of failure in authorization VLAN creation.

·     Tagged VLAN authorization failed in port-based access control.

·     Untagged VLAN authorization failed in port-based access control.

·     Tagged VLAN authorization failed in MAC-based access control.

·     Untagged VLAN authorization failed in MAC-based access control.

·     VSI authorization failed because the user belongs to a free VLAN.

·     VSI authorization failed because the user's access interface does not permit the user VLAN.

·     VSI authorization failed because of failure in AC creation.

·     ACL authorization failed because the specified ACL does not exist.

·     ACL authorization failed because of unsupported ACL type.

·     ACL authorization failed because the specified ACL conflicts with other ACLs on the user's access interface.

·     ACL authorization failed because no rule was obtained for the specified ACL.

·     ACL authorization failed because of ACL parameter error.

·     User profile authorization failed because an invalid user profile was assigned to the user (the authorization-fail offline feature is enabled).

·     User profile authorization failed because of failure in issuing the specified user profile to driver.

·     URL authorization failed because of insufficient resources.

·     URL authorization failed because of invalid parameter in the specified URL.

·     URL authorization failed because the specified URL was not supported.

·     URL authorization failed because of deny rule issuing failure.

·     URL authorization failed because of failure in issuing the specified URL to driver.

·     URL authorization failed because no servers were reachable and the url-user-logoff parameter was specified.

·     URL authorization failed because the escape critical VSI feature of port security was configured.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_LOGIN_FAILURE: -IfName=GigabitEthernet1/0/1-MACAddr=0000-0001-0020-VLANID=2-Username=aaa-ErrCode=5; User failed 802.1X authentication. Reason: ACL authorization failed.

Impact

The 802.1X user cannot come online.

Cause

See the failure cause in the log message.

Recommended action

1.     Verify that the 802.1X authentication settings are correct.

2.     Locate the issue based on the failure cause in the log message. If the configuration on the device or authentication server is incorrect, edit the configuration immediately.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_LOGIN_SUCC

Message text

-IfName=[STRING]-MACAddr=[STRING]-AccessVLANID=[STRING]-AuthorizationVLANID=[STRING]-Username=[STRING]; User passed 802.1X authentication and came online.

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: ID of the access VLAN.

$4: ID of the authorization VLAN.

$5: Username.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_LOGIN_SUCC:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-AccessVLANID=444-AuthorizationVLANID=444-Username=aaa; User passed 802.1X authentication and came online.

Impact

The 802.1X user came online successfully.

Cause

The user passed 802.1X authentication to come online.

Recommended action

No action is required.

 

DOT1X_LOGIN_SUCC (in open mode)

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]; The user that failed 802.1X authentication passed open authentication and came online.

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: VLAN ID.

$4: Username.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_LOGIN_SUCC:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=00-10-84-00-22-b9; The user that failed 802.1X authentication passed open authentication and came online.

Impact

The 802.1X user came online successfully.

Cause

A user failed 802.1X authentication but passed open authentication to come online.

Recommended action

No action is required.

 

DOT1X_LOGOFF

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]; 802.1X user was logged off.

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: VLAN ID.

$4: Username.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_LOGOFF:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=aaa-ErrCode=11; 802.1X user was logged off.

Impact

The 802.1X user was logged off.

Cause

The 802.1X user was logged off as requested.

Recommended action

No action is required.

 

DOT1X_LOGOFF (in open mode)

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]; 802.1X open user was logged off.

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: VLAN ID.

$4: Username.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_LOGOFF:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=aaa-ErrCode=11; 802.1X open user was logged off.

Impact

The 802.1X open user was logged off.

Cause

An 802.1X open user was logged off as requested.

Recommended action

No action is required.

 

DOT1X_LOGOFF_ABNORMAL

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]-ErrCode=[STRING]; 802.1X user was logged off abnormally.

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: Error code:

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_LOGOFF_ABNORMAL:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=aaa-ErrCode=11; 802.1X user was logged off abnormally.

Impact

The 802.1X user was logged off abnormally.

Cause

See the error code in the log message.

Recommended action

1.     Locate the issue based on the error code in the log message. Edit the related settings on the device and server immediately.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_LOGOFF_ABNORMAL (in open mode)

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]-ErrCode=[STRING]; 802.1X open user was logged off abnormally.

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: Error code.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_LOGOFF_ABNORMAL:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=aaa-ErrCode=11; 802.1X open user was logged off abnormally.

Impact

The 802.1X open user was logged off abnormally.

Cause

See the error code in the log message.

Recommended action

1.     Locate the issue based on the error code in the log message. Edit the related settings on the device and server immediately.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_MACBINDING_EXIST

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]; MAC address was already bound to interface [STRING].

Variable fields

$1: Type and number of the access interface.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: Type and number of the interface to which the MAC address was bound.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_MACBINDING_EXIST: -IfName=GigabitEthernet1/0/1-MACAddr=0000-0001-0020-VLANID=2-Username=aaa; MAC address was already bound to interface GigabitEthernet1/0/3.

Impact

The user cannot come online on the interface.

Cause

The MAC address of the 802.1X user has already been bound to another interface.

Recommended action

To have the user to come online on a new interface, delete the related 802.1X MAC address binding entry from the bound interface.

 

DOT1X_MAX_USER_THRESHOLD

Message text

The percentage of online 802.1X users reached or exceeded the max-user alarm trigger threshold on interface [STRING].

Variable fields

$1: Interface type and number.

Severity level

4 (Warning)

Example

DOT1X/4/DOT1X_MAX_USER_THRESHOLD: The percentage of online 802.1X users reached or exceeded the max-user alarm trigger threshold on interface GigabitEthernet1/0/1.

Impact

New 802.1X users cannot come online when the number of 802.1X users has reached the upper limit.

Cause

The percentage of current online 802.1X users to the maximum number of concurrent 802.1X users on the interface reached the specified alarm threshold for the first time, or increased to the alarm threshold from a value below or equal to the alarm clear threshold.

Recommended action

1.     Use the display dot1x interface command to view the maximum number of concurrent 802.1X users on the interface. If the maximum number is too small, reconfigure by using the dot1x max-user command.

2.     Use the display dot1x command to view the alarm threshold for online 802.1X users. If the alarm threshold is too low, reconfigure by using the dot1x max-user-alarm command.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_NOTENOUGH_EADFREEIP_RES

Message text

Failed to assign a rule for Free IP [IPADDR] on interface [STRING] due to lack of ACL resources.

Variable fields

$1: Free IP.

$2: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_NOTENOUGH_EADFREEIP_RES: Failed to assign a rule for Free IP 1.1.1.0 on interface Ethernet3/1/2 due to lack of ACL resources.

Impact

The user cannot access the resources of the free IP.

Cause

Enabled with EAD assistant, the device failed to assign an ACL rule to permit a free IP on an interface because of ACL resource shortage.

Recommended action

1.     The device might be busy. Disable 802.1X on the interface, and then re-enable 802.1X later.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_NOTENOUGH_EADFREEMSEG_RES

Message text

Failed to assign a rule for free microsegment [STRING] on interface [STRING] due to lack of ACL resources.

Variable fields

$1: Free microsegment ID.

$2: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_NOTENOUGH_EADFREEMSEG_RES: Failed to assign a rule for free microsegment 1 on interface Ethernet3/1/2 due to lack of ACL resources.

Impact

The user cannot access the resources of the free microsegment.

Cause

Enabled with EAD assistant, the device failed to assign an ACL rule to permit a free microsegment on an interface because of ACL resource shortage.

Recommended action

1.     The device might be busy. Disable 802.1X on the interface, and then re-enable 802.1X later.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_NOTENOUGH_EADFREERULE_RES

Message text

Failed to assign a rule for permitting DHCP and DNS packets on interface [STRING] due to lack of ACL resources.

Variable fields

$1: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_NOTENOUGH_EADFREERULE_RES: Failed to assign a rule for permitting DHCP and DNS packets on interface Ethernet3/1/2 due to lack of ACL resources.

Impact

The interface cannot filter DHCP and DNS packets.

Cause

Enabled with EAD assistant, the device failed to assign an ACL rule to permit DHCP and DNS packets on an interface because of ACL resource shortage.

Recommended action

1.     The device might be busy. Disable 802.1X on the interface, and then re-enable 802.1X later.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_NOTENOUGH_EADMACREDIR_RES

Message text

Failed to assign a rule for redirecting HTTP packets with source MAC address [MAC] on interface [STRING].

Variable fields

$1: Source MAC address of HTTP packets.

$2: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_NOTENOUGH_EADMACREDIR_RES: Failed to assign a rule for redirecting HTTP packets with source MAC address 00e0-fc00-5915 on interface Ethernet3/1/2.

Impact

HTTP packets cannot be redirected.

Cause

Enabled with EAD assistant, the device failed to redirect HTTP packet with the designated source MAC on an interface because of ACL resource shortage.

Recommended action

1.     The device might be busy. Disable 802.1X on the interface, and then re-enable 802.1X later.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_NOTENOUGH_EADPORTREDIR_RES

Message text

Failed to assign a rule for redirecting HTTP packets on interface [STRING] due to lack of ACL resources.

Variable fields

$1: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_NOTENOUGH_EADPORTREDIR_RES: Failed to assign a rule for redirecting HTTP packets on interface Ethernet3/1/2 due to lack of ACL resources.

Impact

HTTP packets cannot be redirected.

Cause

Enabled with EAD assistant, the device failed to assign an ACL rule to redirect HTTP packets on an interface because of ACL resource shortage.

Recommended action

1.     The device might be busy. Disable 802.1X on the interface, and then re-enable 802.1X later.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_NOTENOUGH_ENABLEDOT1X_RES

Message text

Failed to enable 802.1X on interface [STRING] due to lack of ACL resources.

Variable fields

$1: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_NOTENOUGH_ENABLEDOT1X_RES: Failed to enable 802.1X on interface Ethernet3/1/2 due to lack of ACL resources.

Impact

You cannot enable 802.1X on the interface.

Cause

ACL resources are insufficient.

Recommended action

1.     The device might be busy. Disable 802.1X on the interface, and then re-enable 802.1X later.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

DOT1X_PEXAGG_NOMEMBER_RES

Message text

Failed to enable 802.1X on interface [STRING] because the Layer 2 extended-link aggregate interface does not have member ports.

Variable fields

$1: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_PEXAGG_NOMEMBER_RES: Failed to enable 802.1X on interface Bridge-Aggregation100 because the Layer 2 extended-link aggregate interface does not have member ports.

Impact

802.1X on the Layer 2 extended-link aggregate interface does not take effect.

Cause

The Layer 2 extended-link aggregate interface does not have member ports.

Recommended action

Disable 802.1X on the interface, add a member port to the interface, and then re-enable 802.1X.

 

DOT1X_SMARTON_FAILURE

Message text

-IfName=[STRING]-MACAddr=[STRING]; User failed SmartOn authentication because [STRING].

Variable fields

$1: Interface type and number.

$2: MAC address.

$3: Cause of failure:

·     the password was wrong.

·     the switch ID was wrong.

Severity level

6 (Informational)

Example

DOT1X/6/DOT1X_SMARTON_FAILURE:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9; User failed SmartOn authentication because the password was wrong.

Impact

SmartOn authentication has failed.

Cause

The SmartOn authentication failure is caused by the following reasons.

·     Incorrect password.

·     Incorrect switch ID.

Recommended action

Make sure the password and switch ID configured on the device and client are the same.

 

DOT1X_UNICAST_NOT_EFFECTIVE

Message text

The unicast trigger feature is enabled but is not effective on interface [STRING].

Variable fields

$1: Interface type and number.

Severity level

3 (Error)

Example

DOT1X/3/DOT1X_UNICAST_NOT_EFFECTIVE: The unicast trigger feature is enabled but is not effective on interface Ethernet3/1/2.

Impact

The unicast trigger setting does not take effect on the interface.

Cause

Configure unicast trigger on an interface that does not support unicast trigger.

Recommended action

Reconnect the 802.1X clients to another interface that supports the unicast trigger feature.

 

FIB messages

This section contains FIB messages.

FIB_PREFIX_ENOUGHRESOURCE

Message text

Issued the software entry to the driver for IP address [STRING] and mask length [UINT32] on VPN instance [STRING].

Issued the software entry to the driver for IP address [STRING] and mask length [UINT32] on the public network.

Variable fields

$1: IPv4 or IPv6 address.

$2: Mask or prefix length.

$3: VPN instance name. This field is not available for the public network.

Severity level

6 (Informational)

Example

FIB/6/FIB_PREFIX_ENOUGHRESOURCE: Issued the software entry to the driver for IP address 10.1.1.1 and mask length 32 on VPN instance vpn_1.

FIB/6/FIB_PREFIX_ENOUGHRESOURCE: Issued the software entry to the driver for IP address 10::2 and mask length 128 on the public network.

Impact

No negative impact on the system.

Cause

This message occurs when the system successfully updates the FIB entry in hardware with the FIB entry in software for an IP address for consistency. You can use the following commands to enable FIB entry consistency check and the generation of this log for IPv4 and IPv6:

·     fib consistency-check enable (IPv4).

·     ipv6 fib consistency-check enable (IPv6).

Recommended action

No action is required.

FIB_PREFIX_INCONSISTENT

Message text

Inconsistent software and hardware FIB entries for IP address [STRING] and mask length [UINT32] on VPN instance [STRING]. Inconsistent parameters: [STRING].

Inconsistent software and hardware FIB entries for IP address [STRING] and mask length [UINT32] on the public network. Inconsistent parameters: [STRING].

Variable fields

$1: IPv4 or IPv6 address.

$2: Mask or prefix length.

$3: VPN instance name. This field is not available for the public network.

$4: Inconsistent parameters. Options:

¡     Next hop

¡     MPLS label

¡     Adjacent-table

¡     Micro-segment ID

Severity level

6 (Informational)

Example

FIB/6/FIB_PREFIX_INCONSISTENT: Inconsistent software and hardware FIB entries for IP address 10.1.1.1 and mask length 32 on VPN instance vpn_1. Inconsistent parameters: next hop, mpls label, adjacent-table and micro-segment ID.

FIB/6/FIB_PREFIX_INCONSISTENT: Inconsistent software and hardware FIB entries for IP address 10::2 and mask length 128 on the public network. Inconsistent parameters: next hop, mpls label, adjacent-table and micro-segment ID.

Impact

No negative impact on the system.

Cause

This message occurs when the system detects an inconsistency between the FIB entry in software and FIB entry in hardware for an IP address.

You can use the following commands to enable FIB entry consistency check for IPv4 and IPv6.

·     fib consistency-check enable (IPv4).

·     ipv6 fib consistency-check enable (IPv6).

Once the device detects an inconsistency, it will generate this type of log.

Recommended action

No action is required. The device will update the FIB entry in hardware with the FIB entry in software automatically.

FIB_PREFIX_NORESOURCE

Message text

Not enough hardware resources to issue the software entry to the driver for IP address [STRING] and mask length [UINT32] on VPN instance [STRING].

Not enough hardware resources to issue the software entry to the driver for IP address [STRING] and mask length [UINT32] on the public network.

Variable fields

$1: IPv4 or IPv6 address.

$2: Mask or prefix length.

$3: VPN instance name. This field is not available for the public network.

Severity level

6 (Informational)

Example

FIB/6/FIB_PREFIX_NORESOURCE: Not enough hardware resources to issue the software entry to the driver for IP address 10.1.1.1 and mask length 32 on VPN instance vpn_1.

FIB/6/FIB_PREFIX_NORESOURCE: Not enough hardware resources to issue the software entry to the driver for IP address 10::2 and mask length 128 on the public network.

Impact

No negative impact on the system.

Cause

This message occurs when the system fails to update the FIB entry in hardware with the FIB entry in software for an IP address for consistency.

You can use the following commands to enable FIB entry consistency check and the generation of this log for IPv4 and IPv6:

·     fib consistency-check enable (IPv4).

·     ipv6 fib consistency-check enable (IPv6).

Recommended action

No action is required. The device will attempt to re-issue the FIB entry from software to hardware automatically.

FIB_VN_ENOUGHRESOURCE

Message text

Issued the following [UINT32] software FIB entries to the driver:

Entry for IP address [STRING] and mask length [UINT32] on VPN instance [STRING].

Issued the following [UINT32] software FIB entries to the driver:

Entry for IP address [STRING] and mask length [UINT32] on the public network.

Variable fields

$1: Number of resynchronized FIB entries.

$2: IPv4 or IPv6 address.

$3: Mask or prefix length.

$4: VPN instance name. This field is not available for the public network.

Severity level

6 (Informational)

Example

FIB/6/FIB_VN_ENOUGHRESOURCE: Issued the following 1 software FIB entries to the driver:

Entry for IP address 10.1.1.1 and mask length 32 on VPN instance vpn_1.

FIB/6/FIB_PREFIX_ENOUGHRESOURCE: Issued the following 1 software FIB entries to the driver:

Entry for IP address 10::2 and mask length 128 on the public network.

Impact

No negative impact on the system.

Cause

The device attempts to re-issue virtual next hop information to hardware if it has failed to issue this information during synchronization of some FIB entries from software to hardware for consistency. This message occurs after the system successfully re-issues virtual next hop information to hardware.

You can use one of the following commands to enable FIB entry consistency check and the generation of this log for IPv4 and IPv6:

·     fib consistency-check enable (IPv4).

·     ipv6 fib consistency-check enable (IPv6).

Recommended action

No action is required.

FIB_VN_INCONSISTENT

Message text

Inconsistent software and hardware entries for the following [UINT32] FIB entries. Inconsistent parameters: [STRING].

Entry for IP address [STRING] and mask length [UINT32] on VPN instance [STRING].

Inconsistent software and hardware entries for the following [UINT32] FIB entries. Inconsistent parameters: [STRING].

Entry for IP address [STRING] and mask length [UINT32] on the public network.

Variable fields

$1: Number of inconsistent FIB entries.

$2: Inconsistent parameters.

¡     Next hop

¡     MPLS label

¡     Maximum number of ECMP routes

¡     Output tunnel interface

$3: IPv4 or IPv6 address.

$4: Mask or prefix length.

$5: VPN instance name. If the FIB table runs on the public network, this field will not be displayed.

Severity level

6 (Informational)

Example

FIB/6/FIB_VN_INCONSISTENT: Inconsistent software and hardware entries for the following 1 FIB entries. Inconsistent parameters: next hop and mpls label.

Entry for IP address 10.1.1.1 and mask length 32 on VPN instance vpn_1.

FIB/6/FIB_VN_INCONSISTENT: Inconsistent software and hardware entries for the following 1 FIB entries. Inconsistent parameters: next hop and mpls label.

Entry for IP address 10::2 and mask length 128 on the public network.

Impact

No negative impact on the system.

Cause

You can use one of the following commands to enable FIB entry consistency check

·     fib consistency-check enable (IPv4).

·     ipv6 fib consistency-check enable (IPv6).

Once the device detects an inconsistency between virtual nexthop entries in software and in hardware, it will generate this log to inform the user of the inconsistent FIB entries.

Recommended action

No action is required. The device will update the inconsistent virtual nexthop entries in hardware with the virtual nexthop entries in software automatically.

FIB_VN_NORESOURCE

Message text

Not enough hardware resources to issue the following [UINT32] software FIB entries to the driver:

Entry for IP address [STRING] and mask length [UINT32] on VPN instance [STRING].

Not enough hardware resources to issue the following [UINT32] software FIB entries to the driver:

Entry for IP address [STRING] and mask length [UINT32] on the public network.

Variable fields

$1: Number of FIB entries that failed to be issued to the hardware.

$2: IPv4 or IPv6 address.

$3: Mask or prefix length.

$4: VPN instance name. If the FIB table runs on the public network, this field will not be displayed.

Severity level

6 (Informational)

Example

FIB/6/FIB_VN_NORESOURCE: Not enough hardware resources to issue the following 1 software FIB entries to the driver:

Entry for IP address 10.1.1.1 and mask length 32 on VPN instance vpn_1.

FIB/6/FIB_VN_NORESOURCE: Not enough hardware resources to issue the following 1 software FIB entries to the driver:

Entry for IP address 10::2 and mask length 128 on the public network.

Impact

No negative impact on the system.

Cause

You can use one of the following commands to enable FIB entry consistency check and the generation of this log for IPv4 and IPv6:

·     fib consistency-check enable (IPv4).

·     ipv6 fib consistency-check enable (IPv6).

With FIB entry consistency check enabled, the device will generate this type of log if it fails to issue some software virtual nexthop entries to the hardware due to insufficient hardware resources. This log informs the user of the invalid FIB entries.

Recommended action

No action is required. The device will re-issue the software virtual nexthop entries to the hardware automatically.

FNOTIFY messages

This section contains Forward Utility (FNOTIFY) messages.

NOTIFY

Message text

The feature [STRING] has not finished to process the [STRING] event in [UINT32] minutes.

Variable fields

$1: Feature name.

¡     ARP

¡     ND

¡     FIB

¡     WADJ

¡     L2VFIB

¡     WADJ6

¡     OVERLAYMAC

$2: Phase name.

¡     RESTORE: Data restoration.

¡     CROSSRESTORE: Data restoration between modules.

¡     RESTOREOVER: Restoration complete.

¡     PHASE3: SCM phase 3.

$3: Time period, in minutes.

Severity level

6 (Informational)

Example

FNOTIFY/6/NOTIFY_EVENT: The feature ARP has not finished to process the PHASE3 event in 20 minutes

Impact

The feature will be unavailable temporarily.

Cause

This message is sent when data synchronization between modules fails.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

FS messages

This section contains file system messages.

FS_UNFORMATTED_PARTITION

Message text

Partition [STRING] is not formatted yet. Please format the partition first.

Variable fields

$1: Partition name.

Severity level

4 (Warning)

Example

FS/4/FS_UNFORMATED_PARTITION: Partition usba0: is not formatted yet. Please format the partition first.

Impact

This issue might lead to storage medium read and write failures.

Cause

The partition is not formatted. You must format a partition before you can perform other operations on the partition.

Recommended action

Format the specified partition.

 

FTP messages

This section contains File Transfer Protocol messages.

FTP_ACL_DENY

Message text

The FTP Connection [IPADDR]([STRING]) request was denied according to ACL rules.

Variable fields

$1: IP address of the FTP client.

$2: VPN instance to which the IP address of the FTP client belongs.

Severity level

5 (Notification)

Example

FTP/5/FTP_ACL_DENY: The FTP Connection 1.2.3.4(vpn1) request was denied according to ACL rules.

Impact

The system might be attacked.

Cause

The ACL for controlling FTP access denied the access request of an FTP client.

Recommended action

Contact Technical Support to verify that the FTP connection matches the related ACL rules.

 

FTP_REACH_SESSION_LIMIT

Message text

FTP client [STRING] failed to log in. The current number of FTP sessions is [NUMBER]. The maximum number allowed is ([NUMBER]).

Variable fields

$1: IP address of the FTP client.

$2: Current number of FTP sessions.

$3: Maximum number of FTP sessions allowed by the device.

Severity level

6 (Informational)

Example

FTP/6/FTP_REACH_SESSION_LIMIT: FTP client 1.1.1.1 failed to log in. The current number of FTP sessions is 10. The maximum number allowed is (10).

Impact

The FTP user cannot access the system correctly.

Cause

The number of FTP client connections reached the limit.

Recommended action

1.     Use the display current-configuration | include session-limit command to view the current limit for FTP connections. If the command does not display the limit, the device is using the default setting.

2.     If you want to set a greater limit, execute the aaa session-limit command. If you think the limit is proper, no action is required.

 

 

HOTPLUG messages

This section contains interface hot swapping messages.

HOTPLUG_PORT_PLUGIN

Message text

A port is hot pluged in: Port:[STRING], PCI:[STRING].

Variable fields

$1: Interface name.

$2: Port PCI information.

Severity level

6 (Informational)

Example

HOTPLUG/6/HOTPLUG_PORT_PLUGIN: A port is hot pluged in: Port:GigabitEthernet1/0/1, PCI:08.00.0.

Impact

No negative impact on the system.

Cause

A hot-swapping-in event was detected on a port.

Recommended action

No action is required.

 

HOTPLUG_PORT_PLUGOUT

Message text

A port is hot pluged out: Port:[STRING], PCI:[STRING].

Variable fields

$1: Port name.

$2: Port PCI information.

Severity level

6 (Informational)

Example

HOTPLUG/6//HOTPLUG_PORT_PLUGOUT: A port is hot pluged out: Port:GigabitEthernet1/0/1, PCI:08.00.0.

Impact

The interface cannot provide the forwarding service.

Cause

A hot-swapping-out event was detected on a port.

Recommended action

If the administrator disconnects the network cable, no action is required. In other situations, reconnect the network cable. If the network cable or port is damaged, replace it.

 

HTTPD messages

This section contains HTTP daemon messages.

HTTPD_CONNECT

Message text

[STRING] client [STRING] connected to the server successfully.

Variable fields

$1: Connection type, HTTP or HTTPS.

$2: Client IP address.

Severity level

6 (Informational)

Example

HTTPD/6/HTTPD_CONNECT: HTTP client 192.168.30.117 connected to the server successfully.

Impact

No negative impact on the system.

Cause

The HTTP or HTTPS server accepted the request from a client. An HTTP or HTTPS connection was set up.

Recommended action

No action is required.

 

HTTPD_CONNECT_TIMEOUT

Message text

[STRING] client [STRING] connection idle timeout.

Variable fields

$1: Connection type, HTTP or HTTPS.

$2: Client IP address.

Severity level

6 (Informational)

Example

HTTPD/6/HTTPD_CONNECT_TIMEOUT: HTTP client 192.168.30.117 connection to server idle timeout.

Impact

No negative impact on the system.

Cause

An HTTP or HTTPS connection was disconnected because the idle timeout timer expires.

Recommended action

No action is required.

 

HTTPD_DISCONNECT

Message text

[STRING] client [STRING] disconnected from the server.

Variable fields

$1: Connection type, HTTP or HTTPS.

$2: Client IP address.

Severity level

6 (Informational)

Example

HTTPD/6/HTTPD_DISCONNECT: HTTP client 192.168.30.117 disconnected from the server.

Impact

No negative impact on the system.

Cause

An HTTP or HTTPS client was disconnected from the server.

Recommended action

No action is required.

 

HTTPD_FAIL_FOR_ACP

Message text

[STRING] client [STRING] was denied by the certificate access control policy and could not connect to the server.

Variable fields

$1: Connection type, HTTP or HTTPS.

$2: Client IP address.

Severity level

6 (Informational)

Example

HTTPD/6/HTTPD_FAIL_FOR_ACP: HTTP client 192.168.30.117 was denied by the certificate attribute access control policy and could not connect to the server.

Impact

The system might be subjected to attacks.

Cause

An HTTP or HTTPS client was denied by the certificate access control policy.

Recommended action

Contact the technical support to review the certificate attribute access control policy and ensure that the HTTP/HTTPS connection can pass the policy check.

 

HTTPD_REACH_CONNECT_LIMIT

Message text

[STRING] client [STRING] failed to connect to the server, because the number of connections reached the upper limit.

Variable fields

$1: Connection type, HTTP or HTTPS.

$2: Client IP address.

Severity level

6 (Informational)

Example

HTTPD/6/HTTPD_REACH_CONNECT_LIMIT: HTTP client 192.168.30.117 failed to connect to the server, because the number of connections reached the upper limit.

Impact

Web users cannot log in.

Cause

The number of connections reached the limit.

Recommended action

1.     Use the display current-configuration | include session-limit command to view the current limit for connections of the specified type. If the command does not display the limit, the device is using the default setting.

2.     If you want to specify a greater limit, execute the aaa session-limit command. If you think the limit is proper, no action is required.

 

Identity messages

This section contains user identification messages.

IDENTITY_AUTO_IMPORT_FINISHED

Message text

Finished importing identity user accounts and groups automatically.

Variable fields

N/A

Severity level

5 (Notification)

Example

IDENTITY/5/IDENTITY_AUTO_IMPORT_FINISHED: Finished importing identity user accounts and groups automatically.

Impact

No negative impact on the system.

Cause

The system finished importing identity user accounts and groups automatically.

Recommended action

No action is required.

 

IDENTITY_AUTO_IMPORT_START

Message text

Started to import identity user accounts and groups automatically.

Variable fields

N/A

Severity level

5 (Notification)

Example

IDENTITY/5/IDENTITY_AUTO_IMPORT_START: Started to import identity user accounts and groups automatically.

Impact

No negative impact on the system.

Cause

After automatic import of identity user accounts is enabled for the specified policy, the device periodically imports identity user accounts from the server.

Recommended action

No action is required.

 

IDENTITY_CSV_IMPORT_FAILED

Message text

Failed to import identity user [STRING] to domain [STRING] from the .csv file.

Variable fields

$1: Identity username.

$2: Identity domain name.

Severity level

5 (Notification)

Example

IDENTITY/5/IDENTITY_CSV_IMPORT_FAILED: Failed to import identity user network-user1 to domain system-domain from the .csv file.

Impact

The device failed to import the identity user account and stopped importing remaining identity user accounts. User identification related services cannot be carried out normally.

Cause

After the user-identity user-account import url command is executed, the device failed to import an identity user account from a .csv file.

Recommended action

1.     Use the user-identity user-account export url command to view the standard template, and then verify that the format of the local CSV file to be imported is correct.

2.     Make sure no identity user account with the same name exists on the device.

3.     Make sure the identity domain name or identity username in the CSV file does not contain invalid characters.

 

IDENTITY_IMC_IMPORT_FAILED_NO_MEMORY

Message text

Failed to obtain data from IMC. Reason: Not enough memory.

Variable fields

N/A

Severity level

5 (Notification)

Example

IDENTITY/5/IDENTITY_IMC_IMPORT_FAILED_NO_MEMORY: Failed to obtain data from IMC. Reason: Not enough memory.

Impact

The import of identity user accounts and online identity information failed. User identification related services cannot be carried out normally.

Cause

After the user-identity user-account import policy command is executed, the device failed to import identity user accounts and online identity user information from the IMC server because of insufficient memory.

Recommended action

1.     Check if the remaining free memory of the device has reached a memory alarm threshold. Use the display memory-threshold command to view memory alarm threshold information. If the system memory has reached the level-1 (Minor), level-2 (Severe), or level-3 (Critical) alarm threshold, executing the identity user import command is not allowed.

2.     In any view, execute the monitor process command to check process statistics. Enter m to sort the statistics by memory usage, identifying the processes that consume excessive memory resources. Release memory as needed. Once the memory alarm is cleared, try executing the import command again.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IDENTITY_LDAP_IMPORT_FAILED_NO_MEMORY

Message text

Failed to obtain data from the LDAP server specified in scheme [STRING]. Reason: Not enough memory.

Variable fields

$1: LDAP scheme name.

Severity level

5 (Notification)

Example

IDENTITY/5/IDENTITY_LDAP_IMPORT_FAILED_NO_MEMORY: Failed to obtain data from the LDAP server specified in scheme test. Reason: Not enough memory.

Impact

The import of identity user accounts and user groups failed. User identification related services cannot be carried out normally.

Cause

After the user-identity user-account import policy command is executed, the device failed to import identity user accounts and user groups from the LDAP server because of insufficient memory.

Recommended action

1.     Check if the remaining free memory of the device has reached a memory alarm threshold. Use the display memory-threshold command to view memory alarm threshold information. If the system memory has reached the level-1 (Minor), level-2 (Severe), or level-3 (Critical) alarm threshold, executing the identity user import command is not allowed.

2.     In any view, execute the monitor process command to check process statistics. Enter m to sort the statistics by memory usage, identifying the processes that consume excessive memory resources. Release memory as needed. Once the memory alarm is cleared, try executing the import command again.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

IFMON

This section contains interface alarm messages.

BGTRAFFIC_SEND_BEGIN

Message text

Interface [STRING] began sending background traffic.

Variable fields

$1: Interface name.

Severity level

6 (Informational)

Example

IFMON/6/BGTRAFFIC_SEND_BEGIN: Interface GigabitEthernet1/0/1 began sending background traffic.

Impact

No negative impact on services.

Cause

An interface began sending background traffic when the outgoing traffic of the interface did not reach 100 Mbps.

Recommended action

No action is required.

 

BGTRAFFIC_SEND_END

Message text

Interface [STRING] stopped sending background traffic.

Variable fields

$1: Interface name.

Severity level

6 (Informational)

Example

IFMON/6/BGTRAFFIC_SEND_END: Interface GigabitEthernet1/0/1 stopped sending background traffic.

Impact

No negative impact on services.

Cause

An interface stopped sending background traffic when the outgoing traffic of the interface exceeded 300 Mbps.

Recommended action

No action is required.

 

CRC_ERROR_RECOVERY

Message text

Number of CRC error packets recovered to normal.

Variable fields

N/A

Severity level

4 (Warning)

Example

IFMON/4/CRC_ERROR_RECOVERY: Number of CRC error packets recovered to normal.

Impact

No negative impact on services.

Cause

This message was generated when the number of CRC error packets within a statistics collection interval dropped below the lower threshold, and this alarm was cleared.

Recommended action

No action is required.

 

CRC_ERROR_THRESHOLD

Message text

The number of CRC error packets exceeded the upper threshold: Interface Name=[STRING], upper threshold=[UINT32], number of CRC error packets=[UINT64], interval=[UINT32]s.

Variable fields

$1: Interface name.

$2: Upper threshold for the alarm or upper bit error rate threshold.

$3: Number of CRC error packets within the latest statistics collection interval.

$4: Statistics collection and comparison interval for CRC error packets in seconds.

Severity level

4 (Warning)

Example

IFMON/4/CRC_ERROR_THRESHOLD: The number of CRC error packets exceeded the upper threshold: Interface Name=HundredGigE1/0/1, upper threshold=100, number of CRC error packets=200, interval=10s.

Impact

If the shutdown keyword is configured when you configure the CRC packet error rate on a physical interface, the system shuts down the interface when the number of received CRC error packets on the interface exceeds the upper threshold. Then, the interface stops forwarding all packets. To recover the interface, execute the undo shutdown command on the interface. If you do not specify this keyword, an upper threshold exceeding alarm is generated and the interface enters the alarm state when the number of received CRC error packets exceeds the upper threshold on the interface.

Cause

This message was generated when the number of CRC error packets within a statistics collection interval exceeded the upper threshold. Typically, the reason is that the upper threshold is set improperly or data is damaged during transmission and the number of error packets increases.

Recommended action

·     Identify whether the upper threshold is set properly.

·     Identify whether the link environment quality is good.

 

 

IFNET

This section contains interface management messages.

FLEXE_BANDWIDTH_MISMATCH

Message text

The bandwidth of local FlexE logical interface [STRING] did not match the bandwidth of the peer interface with the same client ID.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_BANDWIDTH_MISMATCH: The bandwidth of local FlexE logical interface FlexE2/1/129 did not match the bandwidth of the peer interface with the same client ID.

Impact

Service traffic might be dropped.

Cause

FlexE logical interfaces configured with the same client ID on two ends were configured with different available bandwidth.

Recommended action

Use the client command to modify the available bandwidth of the FlexE logical interface to ensure configuration consistency.

 

FLEXE_BANDWIDTH_MISMATCH_RECOVER

Message text

The bandwidth of local FlexE logical interface [STRING] matched the bandwidth of the peer interface with the same client ID.

Variable fields

$1: Interface name.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_BANDWIDTH_MISMATCH_RECOVER: The bandwidth of local FlexE logical interface FlexE2/1/129 matched the bandwidth of the peer interface with the same client ID.

Impact

No negative impact on the system.

Cause

FlexE logical interfaces configured with the same client ID on two ends were configured with the same available bandwidth.

Recommended action

No action is required.

 

FLEXE_BANDWIDTH_REDUCE

Message text

The actual bandwidth [INT32] Gbps of FlexE logical interface [STRING] became less than the configured bandwidth.

Variable fields

$1: Interface bandwidth.

$2: Interface name.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_BANDWIDTH_REDUCE: The actual bandwidth 50 Gbps of FlexE logical interface FlexE2/1/129 became less than the configured bandwidth.

Impact

The bandwidth of a FlexE logical interface decreases.

Cause

A FlexE physical interface went down. As a result, the bandwidth of the corresponding FlexE logical interface became less.

Recommended action

Check the physical connection of the FlexE physical interface and identify whether the link fails.

 

FLEXE_BANDWIDTH_REDUCE_RECOVER

Message text

The actual bandwidth [INT32] Gbps of FlexE logical interface [STRING] became equal to the configured bandwidth.

Variable fields

$1: Interface bandwidth.

$2: Interface name.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_BANDWIDTH_REDUCE_RECOVER: The actual bandwidth 100 Gbps of FlexE logical interface FlexE2/1/129 became equal to the configured bandwidth.

Impact

No negative impact on the system.

Cause

A FlexE physical interface came up. As a result, the bandwidth of the corresponding FlexE logical interface recovered.

Recommended action

No action is required.

 

FLEXE_CLIENTID_MISMATCH

Message text

The client ID of local FlexE logical interface [STRING] did not match the client ID of a peer interface.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_CLIENTID_MISMATCH: The client ID of local FlexE logical interface FlexE2/1/129 did not match the client ID of a peer interface.

Impact

The FlexE physical interface is down.

Cause

FlexE logical interfaces on two ends were configured with different client IDs.

Recommended action

Use the client command to modify the client IDs of FlexE logical interfaces to ensure configuration consistency.

 

FLEXE_CLIENTID_MISMATCH_RECOVER

Message text

The client ID of local FlexE logical interface [STRING] matched the client ID of a peer interface.

Variable fields

$1: Interface name.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_CLIENTID_MISMATCH_RECOVER: The client ID of local FlexE logical interface FlexE2/1/129 matched the client ID of a peer interface.

Impact

No negative impact on the system.

Cause

The FlexE logical interfaces on two ends were configured with the same client ID.

Recommended action

No action is required.

 

FLEXE_GROUP_FAULT

Message text

FlexE interface group [INT32] state changed to fault.

Variable fields

$1: FlexE-group interface number.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_GROUP_FAULT: FlexE interface group 1 state changed to fault.

Impact

A FlexE-group interface fails and cannot forward traffic.

Cause

All FlexE physical interfaces in an FlexE-group interface went down. As a result, the FlexE-group interface failed.

Recommended action

Check the physical connection of the FlexE physical interface and identify whether the link fails.

 

FLEXE_GROUP_FAULT_RECOVER

Message text

FlexE interface group [INT32] state changed to normal

Variable fields

$1: FlexE-group interface number.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_GROUP_FAULT_RECOVER: FlexE interface group 1 state changed to normal.

Impact

No negative impact on the system.

Cause

FlexE physical interfaces in up state existed in the FlexE interface group, and the FlexE-group interface recovered.

Recommended action

No action is required.

 

FLEXE_GROUPMEMBER_FAULT

Message text

FlexE physical interface [STRING] in FlexE interface group [INT32] failed.

Variable fields

$1: Interface name.

$2: FlexE-group interface number.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_GROUPMEMBER_FAULT: FlexE physical interface FlexE-50G2/1/1 in FlexE interface group 1 failed.

Impact

Service traffic might be dropped.

Cause

FlexE physical interfaces in the FlexE interface group failed.

Recommended action

1.     Check the physical connection of the FlexE physical interface and identify whether the link fails.

2.     Identify whether the peer device fails.

 

FLEXE_GROUPMEMBER_FAULT_RECOVER

Message text

FlexE physical interface [STRING] in FlexE interface group [INT32] recovered.

Variable fields

$1: Interface name.

$2: FlexE-group interface number.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_GROUPMEMBER_FAULT_RECOVER: FlexE physical interface FlexE-50G2/1/1 in FlexE interface group 1 recovered.

Impact

No negative impact on the system.

Cause

FlexE physical interfaces in the FlexE interface group recover.

Recommended action

No action is required.

 

FLEXE_PHYFCSSD_ALARM

Message text

FCS-SD error occurred on local FlexE physical interface [STRING].

Variable fields

$1: Interface name.

 

Severity level

4 (Warning)

 

Example

IFNET/4/FLEXE_PHYFCSSD_ALARM: FCS-SD error occurred on local FlexE physical interface FlexE-50G2/1/1.

 

Impact

Packets are dropped because of error packets, and service packet forwarding is affected.

 

Cause

An FCS-SD error occurs on the overhead section layer of a FlexE physical interface.

 

Recommended action

Identify whether the physical link of the FlexE physical interface is normal.

 

 

FLEXE_PHYFCSSD_ALARM_RECOVER

Message text

FCS-SD error on local FlexE physical interface [STRING] was cleared.

Variable fields

$1: Interface name.

Severity level

5 (Notification)

 

Example

IFNET/5/FLEXE_PHYFCSSD_ALARM_RECOVER: FCS-SD error on local FlexE physical interface FlexE-50G2/1/1 was cleared.

 

Impact

No negative impact on the system.

 

Cause

An FCS-SD error recovers on the overhead section layer of a FlexE physical interface.

 

Recommended action

Check the FlexE physical interface, and make sure the FlexE physical interface is connected normally.

 

 

FLEXE_PHYGROUP_MISMATCH

Message text

FlexE interface group [INT32] of local FlexE physical interface [STRING] did not match the FlexE interface group [INT32] of the peer interface.

Variable fields

$1: FlexE-group interface number on the local end.

$2: Interface name.

$3: Remote FlexE-group interface number.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_PHYGROUP_MISMATCH: FlexE interface group 1 of local FlexE physical interface FlexE-50G2/1/1 did not match the FlexE interface group 2 of the peer interface.

Impact

A FlexE physical interface cannot come up.

Cause

The two FlexE physical interfaces connected have inconsistent FlexE-group interfaces.

Recommended action

Use the bind interface command to modify the FlexE physical interface associated with a FlexE-group interface, and add the two interconnected FlexE physical interfaces to the same FlexE-group interface.

 

FLEXE_PHYGROUP_MISMATCH_RECOVER

Message text

FlexE interface group [INT32] of local FlexE physical interface [STRING] matched the FlexE interface group [INT32] of the peer interface.

Variable fields

$1: FlexE-group interface number on the local end.

$2: Interface name.

$3: Remote FlexE-group interface number.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_PHYGROUP_MISMATCH_RECOVER: FlexE interface group 1 of local FlexE physical interface FlexE-50G2/1/1 matched the FlexE interface group 1 of the peer interface.

Impact

No negative impact on the system.

Cause

Two interconnected FlexE physical interfaces were assigned to the same FlexE interface group.

Recommended action

No action is required.

 

FLEXE_PHYLOCAL_FAULT

Message text

Local FlexE physical interface [STRING] failed and a port failure alarm was sent to the peer interface.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_PHYLOCAL_FAULT: Local FlexE physical interface FlexE-50G2/1/1 failed and a port failure alarm was sent to the peer interface.

Impact

Service switchover or interruption might occur.

Cause

A failure occurred on a local FlexE physical interface and an alarm was generated to notify the peer FlexE physical interface.

Recommended action

Identify whether the physical connection of the local FlexE physical interface is normal or whether the local FlexE physical interface is manually shut down.

 

FLEXE_PHYLOCAL_FAULT_RECOVER

Message text

Local FlexE physical interface [STRING] recovered.

Variable fields

$1: Interface name.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_PHYLOCAL_FAULT_RECOVER: Local FlexE physical interface FlexE-50G2/1/1 recovered.

Impact

No negative impact on the system.

Cause

The local FlexE physical interface recovers.

Recommended action

No action is required.

 

FLEXE_PHYNUM_MISMATCH

Message text

PHY number [INT32] of local FlexE physical interface [STRING] did not match the PHY number [INT32] of the peer interface.

Variable fields

$1: PHY number for the local FlexE physical interface.

$2: Interface name.

$3: PHY number for the peer FlexE physical interface.

Severity level

4 (Warning)

 

Example

IFNET/4/FLEXE_PHYNUM_MISMATCH: PHY number 10 of local FlexE physical interface Flex-50GE-2/1/1 did not match the PHY number 20 of the peer interface.

 

Impact

A FlexE physical interface cannot come up.

 

Cause

Two interconnected FlexE physical interfaces were configured with different PHY numbers.

 

Recommended action

Use the bind interface command to modify PHY numbers of FlexE physical interfaces to ensure configuration consistency.

 

 

FLEXE_PHYNUM_MISMATCH_RECOVER

Message text

PHY number [INT32] of local FlexE physical interface [STRING] matched the PHY number [INT32] of the peer interface.

Variable fields

$1: PHY number for the local FlexE physical interface.

$2: Interface name.

$3: PHY number for the peer FlexE physical interface.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_PHYNUM_MISMATCH_RECOVER: PHY number 10 of local FlexE physical interface FlexE-50G2/1/1 matched the PHY number 10 of the peer interface.

Impact

No negative impact on the system.

Cause

Two interconnected FlexE physical interfaces were configured with the same PHY number.

Recommended action

No action is required.

 

FLEXE_PHYREMOTE_FAULT

Message text

The peer interface of local FlexE physical interface [STRING] failed.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_PHYREMOTE_FAULT: The peer interface of local FlexE physical interface FlexE-50G2/1/1 failed.

Impact

Service switchover or interruption might occur.

Cause

The peer FlexE physical interface fails

Recommended action

Identify whether the physical connection of the peer FlexE physical interface is normal or whether the local FlexE physical interface is manually shut down.

 

FLEXE_PHYREMOTE_FAULT_RECOVER

Message text

The peer interface of local FlexE physical interface [STRING] recovered.

Variable fields

$1: Interface name.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_PHYREMOTE_FAULT_RECOVER: The peer interface of local FlexE physical interface FlexE-50G2/1/1 recovered.

Impact

No negative impact on the system.

Cause

The peer FlexE physical interface recovered.

Recommended action

No action is required.

 

FLEXE_STSG_MISMATCH

Message text

The sub-timeslot granularity [INT32] Gbps of the subcard where local FlexE interface [STRING] resides did not match that of the subcard where the peer interface resides.

Variable fields

$1: Sub-timeslot granularity.

$2: Interface name.

Severity level

4 (Warning)

Example

IFNET/4/FLEXE_STSG_MISMATCH: The sub-timeslot granularity 5 Gbps of the subcard where local FlexE interface FlexE-50G2/1/1 resides did not match that of the subcard where the peer interface resides.

 

Impact

Services on the interfaces are affected.

 

Cause

The subcards of two interconnected FlexE physical interfaces were configured with different sub-timeslot granularities.

 

Recommended action

Use the flexe sub-time-slot granula command to modify the sub-timeslot granularities of two interconnected devices to ensure configuration consistency.

 

 

FLEXE_STSG_MISMATCH_RECOVER

Message text

The sub-timeslot granularity [INT32] Gbps of the subcard where local FlexE interface [STRING] resides matched that of the subcard where the peer interface resides.

Variable fields

$1: Sub-timeslot granularity.

$2: Interface name.

Severity level

5 (Notification)

Example

IFNET/5/FLEXE_STSG_MISMATCH_RECOVER: The sub-timeslot granularity 5 Gbps of the subcard where local FlexE interface FlexE-50G2/1/1 resides matched that of the subcard where the peer interface resides.

Impact

No negative impact on the system.

Cause

The subcards of two interconnected FlexE physical interfaces were configured with the same sub-timeslot granularity.

Recommended action

No action is required.

 

IF_JUMBOFRAME_WARN

Message text

The specified size of jumbo frames on the aggregate interface [STRING] is not supported on the member port [STRING].

Variable fields

$1: Aggregate interface name.

$2: Member port name.

Severity level

3 (Error)

Example

IFNET/3/IF_JUMBOFRAME_WARN: -MDC=1-Slot=3; The specified size of jumbo frames on the aggregate interface Bridge-Aggregation1 is not supported on the member port GigabitEthernet1/0/1.

Impact

The impact on the system depends on the actual situation.

Cause

Some member interfaces do not support the jumboframe enable [ size ] configuration when you modify the aggregate interface.

Recommended action

Identify the value ranges for the jumbo frame size supported on member ports. Specify a jumbo frame size supported by member ports for the aggregate interface.

 

IF_BUFFER_CONGESTION_CLEAR

Message text

[STRING] congestion on queue [UINT32] of [STRING] is cleared. [UINT64] packets are discarded.

Variable fields

$1: Data buffer type: ingress (for receive data buffer) or egress (for transmit data buffer).

$2: Queue ID in the range of 0 to 7.

$3: Interface name.

$4: Number of packets dropped.

Severity level

5 (Notification)

Example

IFNET/5/IF_BUFFER_CONGESTION_CLEAR: Ingress congestion on queue 1 of GigabitEthernet1/0/1 is cleared. 1000 packets are discarded.

Impact

No negative impact on the system.

Cause

On queue 1 of GigabitEthernet 1/0/1, congestion in the receive data buffer is removed. 1000 packets are dropped.

Recommended action

No action is required.

IF_BUFFER_CONGESTION_OCCURRENCE

Message text

[STRING] congestion occurs on queue [INTEGER] of [STRING].

Variable fields

$1: Data buffer type: ingress (for receive data buffer) or egress (for transmit data buffer).

$2: Queue ID in the range of 0 to 7.

$3: Interface name.

Severity level

4 (Warning)

Example

IFNET/4/IF_BUFFER_CONGESTION_OCCURRENCE: Ingress congestion occurs on queue 1 of GigabitEthernet1/0/1.

Impact

Service traffic might be dropped.

Cause

On queue 1 of GigabitEthernet 1/0/1, congestion occurs in the receive data buffer.

Recommended action

Examine the network status.

IF_LINKFLAP_DETECTED

Message text

Link flapping was detected on [STRING].

Variable fields

$1: Interface name

Severity level

3 (Error)

Example

IFNET/3/IF_LINKFLAP_DETECTED: Link flapping was detected on GigabitEthernet1/0/1.

Impact

Service traffic might be dropped.

Cause

The number of detected flaps reached or exceeded the link flapping detection threshold during the link flapping detection interval.

Recommended action

1.     Identify whether the cable is frequently plugged and unplugged for the local or peer interface.

2.     Execute the port link-flap protect enable command to adjust the link flapping detection interval and the link flapping detection threshold.

IFMGR_SPEED_CHANGE

Message text

The speed of interface [STRING] has changed to [STRING].

Variable fields

$1: Aggregate interface name.

$2: Interface speed after change.

Severity level

6 (Informational)

Example

IFNET/6/IFMGR_SPEED_CHANGE: The speed of interface Route-Aggregation6 has changed to 1Gbps.

Impact

The forwarding rate of service traffic might change.

Cause

The speed of an aggregate interface changed.

Recommended action

No action is required.

 

INTERFACE_NOTSUPPRESSED

Message text

Interface [STRING] is not suppressed.

Variable fields

$1: Interface name.

Severity level

6 (Informational)

Example

IFNET/6/INTERFACE_NOTSUPPRESSED: Interface Ethernet0/0/0 is not suppressed.

Impact

No negative impact on the system.

Cause

The interface changed from suppressed state to unsuppressed state. When the interface is unsuppressed, the upper-layer services can detect the physical state changes of the interface.

Recommended action

No action is required.

 

INTERFACE_SUPPRESSED

Message text

Interface [STRING] was suppressed.

Variable fields

$1: Interface name.

Severity level

5 (Notification)

Example

IFNET/5/INTERFACE_SUPPRESSED: Interface Ethernet0/0/0 was suppressed.

Impact

Service traffic might be dropped.

Cause

The interface was suppressed because its state frequently changed. When the interface is suppressed, the upper-layer services cannot detect the physical state changes of the interface.

Recommended action

1.     Identify whether the cable is frequently plugged and unplugged for the local or peer interface.

2.     Configure physical state change suppression to adjust the suppression parameters.

 

LINK_UPDOWN

Message text

Line protocol state on the interface [STRING] changed to [STRING].

Variable fields

$1: Interface name.

$2: State of link layer protocol, which can be up or down.

Severity level

5 (Notification)

Example

IFNET/5/LINK_UPDOWN: Line protocol state on the interface Ethernet0/0 changed to down.

Impact

If the physical link status of the interface becomes down, it will be unable to forward the traffic. If the physical link status of the interface becomes up, there will be no impact on the system.

Cause

The link layer protocol state changed on an interface.

Recommended action

When the link layer protocol state of an interface is down, use the display interface command to display the link layer protocol state and locate the reason for which the link layer protocol state changed to down on the interface.

 

PFC_WARNING

Message text

On interface [STRING], the rate of [STRING] PFC packets of 802.1p priority [INTEGER] exceeded the PFC early-warning threshold [INTEGER] pps. The current rate is [INTEGER].

Variable fields

$1: Interface name.

$2: Alarm direction, which can be input or output.

$3: 802.1p priority.

$4: Rate threshold at which the interface receives or sends PFC frames, in pps.

$5: Rate at which the interface receives or sends PFC frames, in pps.

Severity level

4 (Warning)

Example

IFNET/4/PFC_WARNING: On interface GigabitEthernet1/0/1, the rate of input PFC packets of 802.1p priority 1 exceeded the PFC early-warning threshold 50 pps. The current rate is 60.

Impact

PFC packets might be dropped.

Cause

The rate at which the interface receives or sends PFC packets reaches the early-warning threshold.

Recommended action

No action is required.

 

PHY_UPDOWN

Message text

Physical state on the interface [STRING] changed to [STRING].

Variable fields

$1: Interface name.

$2: Link state, which can be up or down.

Severity level

3 (Error)

Example

IFNET/3/PHY_UPDOWN: Physical state on the interface Ethernet0/0 changed to down.

Impact

If the physical status of the interface becomes down, it will be unable to forward the traffic. If the physical status of the interface becomes up, there will be no impact on the system.

Cause

The physical state changed on an interface.

Recommended action

When the interface is physically down, check whether a physical link is present or whether the link fails.

 

PROTOCOL_UPDOWN

Message text

Protocol [STRING] state on the interface [STRING] changed to [STRING].

Variable fields

$1: Protocol name.

$2: Interface name.

$3: State of link layer protocol, which can be up or down.

Severity level

5 (Notification)

Example

IFNET/5/PROTOCOL_UPDOWN: Protocol IPX state on the interface Ethernet6/4/1 changed to up.

Impact

If the protocol status of the interface becomes down, it will be unable to forward the traffic. If the protocol status of the interface becomes up, there will be no impact on the system.

Cause

The state of a protocol has been changed on an interface.

Recommended action

When the state of a network layer protocol is down, check the network layer protocol configuration.

 

STORM_CONSTRAIN_BELOW

Message text

[STRING] is in controlled status, [STRING] flux falls below its lower threshold [STRING].

Variable fields

$1: Interface name.

$2: Packet type, which can be BC, MC, or UC.

$3: Lower suppression threshold:

·     lowerlimit%

·     lowerlimit pps

·     lowerlimit kbps

Severity level

1 (Alert)

Example

IFNET/1/STORM_CONSTRAIN_BELOW: GigabitEthernet1/0/1 is in controlled status, BC flux falls below its lower threshold 90%.

Impact

No negative impact on the system.

Cause

The port is in controlled state. Any type of traffic on the port drops below the lower threshold from above the upper threshold.

Recommended action

No action is required.

 

STORM_CONSTRAIN_CONTROLLED

Message text

[STRING] turned into controlled status, port status is controlled, packet type is [STRING], upper threshold is [STRING].

Variable fields

$1: Interface name.

$2: Packet type, which can be BC, MC, or UC.

$3: Upper suppression threshold:

·     upperlimit%

·     upperlimit pps

·     upperlimit kbps

Severity level

1 (Alert)

Example

IFNET/1/STORM_CONSTRAIN_CONTROLLED: GigabitEthernet1/0/1 turned into controlled status, port status is controlled, packet type is BC, upper threshold is 90%.

Impact

Packets of the specified type might be lost, or the interface might be shut down.

Cause

The port is in controlled state. Any type of traffic on the port exceeds the upper threshold.

Recommended action

No action is required.

 

STORM_CONSTRAIN_EXCEED

Message text

[STRING] is in controlled status, [STRING] flux exceeds its upper threshold [STRING].

Variable fields

$1: Interface name.

$2: Packet type, which can be BC, MC, or UC.

$3: Upper suppression threshold:

·     upperlimit%

·     upperlimit pps

·     upperlimit kbps

Severity level

1 (Alert)

Example

IFNET/1/STORM_CONSTRAIN_EXCEED: GigabitEthernet1/0/1 is in controlled status, BC flux exceeds its upper threshold 90%.

Impact

Packets of the specified type might be lost, or the interface might be shut down.

Cause

The port is in controlled state. Any type of traffic on the port exceeds the upper threshold.

Recommended action

No action is required.

 

STORM_CONSTRAIN_NORMAL

Message text

[STRING] returned to normal status, port status is [STRING], packet type is [STRING], lower threshold is [STRING].

Variable fields

$1: Interface name.

$2: Packet type, which can be BC, MC, or UC.

$3: Lower suppression threshold:

·     lowerlimit%

·     lowerlimit pps

·     lowerlimit kbps

Severity level

1 (Alert)

Example

IFNET/1/STORM_CONSTRAIN_NORMAL: GigabitEthernet1/0/1 returned to normal status, port status is normal, packet type is BC, lower threshold is 10%.

Impact

No negative impact on the system.

Cause

The port is in normal state. Any type of traffic on the port drops below the lower threshold from above the upper threshold.

Recommended action

No action is required.

 

TUNNEL_LINK_UPDOWN

Message text

Line protocol state on the interface [STRING] changed to [STRING].

Variable fields

$1: Interface name.

$2: Protocol state, which can be up or down.

Severity level

5 (Notification)

Example

IFNET/5/TUNNEL_LINK_UPDOWN: Line protocol state on the interface Tunnel1 changed to down.

Impact

The impact on the system depends on the actual situation.

Cause

The state of a link layer protocol has been changed on a tunnel interface.

Recommended action

When the link layer protocol state of a tunnel interface is down, use the display interface command to display the link layer protocol state and locate the reason for which the link layer protocol state changed to down on the tunnel interface.

TUNNEL_PHY_UPDOWN

Message text

Physical state on the interface [STRING] changed to [STRING].

Variable fields

$1: Interface name.

$2: Protocol state, which can be up or down.

Severity level

3 (Error)

Example

IFNET/3/TUNNEL_PHY_UPDOWN: Physical state on the Tunnel1 changed to down.

Impact

The impact on the system depends on the actual situation.

Cause

The state of a link layer protocol has been changed on a tunnel interface.

Recommended action

When the physical state of a link layer protocol is down, check whether a physical link is present or whether the link fails.

VLAN_MODE_CHANGE

Message text

Dynamic VLAN [INT32] has changed to a static VLAN.

Variable fields

$1: VLAN ID.

Severity level

5 (Notification)

Example

IFNET/5/VLAN_MODE_CHANGE: Dynamic VLAN 20 has changed to a static VLAN.

Impact

No negative impact on the system.

Cause

Creating a VLAN interface changes the corresponding dynamic VLAN to a static VLAN.

Recommended action

No action is required.

 

IP6ADDR

This section contains IPv6 addressing messages.

IP6ADDR_CREATEADDRESS_CONFLICT

Message text

Failed to create an address by the prefix. Reason: [STRING] on [STRING] conflicts with SRv6 locator [STRING].

Variable fields

$1: IPv6 address.

$2: Interface name.

$3: SRv6 locator.

Severity level

4 (Warning)

Example

IP6ADDR/4/IP6ADDR_CREATEADDRESS_CONFLICT: Failed to create an address by the prefix. Reason: 2000::1234:0:0:1/80 on GigabitEthernet1/0/1 conflicts with SRv6 locator 2000::1/64.

Impact

IPv6 address generation failed on the interface, which affects normal service operation.

Cause

The IPv6 address configured for the interface by using the ipv6 address prefix-number command conflicts with the Locator field configured in SRv6 view.

Recommended action

Examine the interface IPv6 address configured by using the ipv6 address prefix-number command and the Locator field in SRv6 view, remove the conflicting configuration, and configure a new IPv6 address for the interface.

 

IP6ADDR_CREATEADDRESS_ERROR

Message text

Failed to create an address by the prefix. Reason: [STRING] on [STRING] and [STRING] on [STRING] overlap.

Variable fields

$1: IPv6 prefix.

$2: Interface name.

$3: IPv6 prefix.

$4: Interface name.

Severity level

4 (Warning)

Example

IP6ADDR/4/IP6ADDR_CREATEADDRESS_ERROR: Failed to create an address by the prefix. Reason: 2001::/64 on GigabitEthernet1/0/2 and 2001::/64 on GigabitEthernet1/0/1 overlap.

Impact

IPv6 interface address generation fails, which causes abnormal service running.

Cause

The device failed to generate an IPv6 address for an interface by using the prefix specified in the ipv6 address prefix-number command, because the prefixes overlapped on this interface and another interface.

Recommended action

Check the IPv6 prefixes of the related interfaces, cancel the IPv6 address configuration on the conflicting interface and configure the interface to generate an IPv6 address by using a different prefix.

IP6ADDR_CREATEADDRESS_INVALID

Message text

Can't configure the unspecified address or loopback address on [STRING] by using a prefix with all zeros.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

IP6ADDR/4/IP6ADDR_CREATEADDRESS_INVALID: Can't configure the unspecified address or loopback address on GigabitEthernet1/0/1 by using a prefix with all zeros.

Impact

IPv6 interface address generation fails, which causes abnormal service running.

Cause

This message is sent when you use the ipv6 prefix command to configure an all-zero IPv6 prefix and then specify this prefix in the ipv6 address prefix-number command to configure an unspecified or loopback IPv6 address for an interface.

Recommended action

Cancel the invalid configuration and reconfigure an IPv6 address for the interface.

IP6FW

This section contains IPv6 forwarding messages.

IP6FW_ABNORMAL_HEADERS

Message text

Received an IPv6 packet with repeated extension headers.

Variable fields

N/A

Severity level

6 (Informational)

Example

IP6FW/6/IP6FW_ABNORMAL_HEADERS: Received an IPv6 packet with repeated extension headers.

Impact

N/A

Cause

The IPv6 packet has errors.

Recommended action

Verify the validity of the packet source.

 

IP6FW_SETTING_FAILED_NDFW

Message text

Failed to add rule to forward ND packets with IPv6 address [STRING] in VPN index [STRING] to tunnel index [STRING]. Error code: [STRING].

Variable fields

$1: IPv6 address.

$2: VPN instance index.

$3: Tunnel interface index.

$4: Error code.

·     0x40010001—Failed to issue configuration to the driver.

·     0x40010008—Not supported by the driver.

·     0x40010006—Driver configuration already exists.

·     0x4001000b—Insufficient driver resource.

·     0x20010002—Invalid driver parameters.

Severity level

6 (Informational)

Example

IP6FW/6/IP6FW_SETTING_FAILED_NDFW: Failed to add rule to forward ND packets with IPv6 address 100::1 in VPN index 1 to tunnel index 1. Error code: 0x40010001

Impact

ND packet forwarding will fail.

Cause

A hardware fault exists.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

IP6FW_SETTING_FAILED_HOPLIMITEXCEED

Message text

Failed to add rule to forward packets with hop limit of 1: IPv6 address [STRING], VPN index [STRING], Error code: [STRING].

Variable fields

$1: IPv6 address.

$2: VPN instance index.

$3: Error code.

·     0x40010001—Failed to issue configuration to the driver.

·     0x40010008—Not supported by the driver.

·     0x40010006—Driver configuration already exists.

·     0x4001000b—Insufficient driver resource.

·     0x20010002—Invalid driver parameters.

Severity level

6 (Informational)

Example

IP6FW/6/IP6FW_SETTING_FAILED_ HOPLIMITEXCEED: Failed to add rule to forward packets with hop limit of 1: IPv6 address 100::1, VPN index 1, Error code: 0x40010001.

Impact

The configuration of the forwarding hop-limit-exceeded destination command will be unusable.

Cause

A hardware fault exists.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

IP6FW_SETTING_FAILED_HOPLIMITUNVARIED

Message text

Failed to add rule to forward packets with the hop limit field unchanged: IPv6 address [STRING], VPN index [STRING], Error code: [STRING].

Variable fields

$1: IPv6 address.

$2: VPN instance index.

$3: Error code.

·     0x40010001—Failed to issue configuration to the driver.

·     0x40010008—Not supported by the driver.

·     0x40010006—Driver configuration already exists.

·     0x4001000b—Insufficient driver resource.

·     0x20010002—Invalid driver parameters.

Severity level

6 (Informational)

Example

IP6FW/6/IP6FW_SETTING_FAILED_HOPLIMITUNVARIED: Failed to add rule to forward packets with the hop limit field unchanged: IPv6 address 100::1, VPN index 1, Error code: 0x40010001.

Impact

The configuration of the forwarding hop-limit-unvaried destination command will be unusable.

Cause

A hardware fault exists.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

 

IPADDR messages

This section contains IP addressing messages.

IPADDR_HA_EVENT_ERROR

Message text

A process failed HA upgrade because [STRING].

Variable fields

$1: HA upgrade failure reason:

·     IPADDR failed the smooth upgrade.

·     IPADDR failed to reupgrade to the master process.

·     IPADDR stopped to restart the timer.

·     IPADDR failed to upgrade to the master process.

·     IPADDR failed to restart the upgrade.

·     IPADDR failed to add the unicast object to the master task epoll.

·     IPADDR failed to create an unicast object.

·     IPADDR role switchover failed when the standby process switched to the master process.

·     IPADDR switchover failed when the master process switched to the standby process.

·     IPADDR HA upgrade failed.

·     IPADDR failed to set the interface filtering criteria.

·     IPADDR failed to register interface events.

·     IPADDR failed to subscribe port events.

·     IPADDR failed to add a VPN port event to the master epoll.

·     IRDP failed to open DBM.

·     IRDP failed to initiate a connection to the device management module.

·     IRDP failed to add the master task epoll with the handle used to connect to the device management module.

·     IRDP failed to register device management events.

·     IRDP failed to subscribe port events.

·     IRDP failed to add the master task epoll with the handle used to subscribe port events.

·     IRDP failed to set the interface filtering criteria.

·     IRDP failed to register interface events.

·     IRDP failed to register network events.

·     IRDP failed to create the interface control block storage handle.

·     IRDP failed to create the timer.

·     IRDP failed to add the master task epoll with the handle used to create the timer.

·     IRDP failed to set the schedule time for the timer.

·     IRDP failed to set the timer to unblocked status.

·     IRDP failed to create a timer instance.

Severity level

4 (Warning)

Example

IPADDR/4/IPADDR_HA_EVENT_ERROR: A process failed HA upgrade because IPADDR failed the smooth upgrade.

Impact

The primary/secondary switchover service cannot take effect, because the IP address module does not respond to the HA event.

Cause

A process failed HA upgrade and the message showed the failure reason.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

IPADDR_HA_STOP_EVENT

Message text

The device received an HA stop event.

Variable fields

None.

Severity level

4 (Warning)

Example

IPADDR/4/IPADDR_HA_STOP_EVENT: The device received an HA stop event.

Impact

The device is downgraded from primary to secondary.

Cause

This message is sent when the device receives an HA stop event during an active/standby process switchover.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

IPFW messages

This section contains IP Forwarding (IPFW) messages.

IPFW_SETTING_FAILED_ARPFW

Message text

Failed to add rule to forward ARP packets with IP address [STRING] in VPN index [STRING] to tunnel index [STRING]. Error code: [STRING].

Variable fields

$1: IP address.

$2: VPN instance index.

$3: Tunnel interface index.

$4: Error code.

·     0x40010001—Failed to issue configuration to the driver.

·     0x40010008—Not supported by the driver.

·     0x40010006—Driver configuration already exists.

·     0x4001000b—Insufficient driver resource.

·     0x20010002—Invalid driver parameters.

Severity level

6 (Informational)

Example

IPFW/6/IPFW_SETTING_FAILED_APPFW: Failed to add rule to forward ARP packets with IP address 10.0.0.1 in VPN index 1 to tunnel index 1. Error code: 0x40010001

Impact

ARP packet forwarding will fail.

Cause

A hardware fault exists.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

IPFW_SETTING_FAILED_TTLEXCEED

Message text

Failed to add rule to forward packets with TTL exceeded: IP address [STRING], VPN index [STRING], Error code: [STRING].

Variable fields

$1: IP address.

$2: VPN instance index.

$3: Error code.

·     0x40010001—Failed to issue configuration to the driver.

·     0x40010008—Not supported by the driver.

·     0x40010006—Driver configuration already exists.

·     0x4001000b—Insufficient driver resource.

·     0x20010002—Invalid driver parameters.

Severity level

6 (Informational)

Example

IPFW/6/IPFW_SETTING_FAILED_TTLEXCEED: Failed to add rule to forward packets with TTL exceeded: IP address 10.0.0.1, VPN index 1, Error code: 0x40010001.

Impact

The configuration of the forwarding ttl-exceeded-packet destination command will be unusable.

Cause

A hardware fault exists.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

IPFW_SETTING_FAILED_TTLUNVARIED

Message text

Failed to add rule to forward packets with keeping the value unchanged in the TTL field: IP address [STRING], VPN index [STRING], Error code: [STRING].

Variable fields

$1: IP address.

$2: VPN instance index.

$3: Error code.

·     0x40010001—Failed to issue configuration to the driver.

·     0x40010008—Not supported by the driver.

·     0x40010006—Driver configuration already exists.

·     0x4001000b—Insufficient driver resource.

·     0x20010002—Invalid driver parameters.

Severity level

6 (Informational)

Example

IPFW/6/IPFW_SETTING_FAILED_TTLUNVARIED:Failed to add rule to forward packets with keeping the value unchanged in the TTL field: IP address 10.0.0.1, VPN index 1, Error code: 0x40010001.

Impact

The configuration of the forwarding ttl-unvaried destination command will be unusable.

Cause

A hardware fault exists.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

IPS messages

This section contains IPS messages.

IPS_IPV4_INTERZONE

Message text

Protocol(1001)=[STRING];Application(1002)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];RcvVPNInstance(1042)=[STRING];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];AttackName(1088)=[STRING];AttackID(1089)=[UINT32];Category(1090)=[STRING];Protection(1091)=[STRING];SubProtection(1092)=[STRING];Severity(1087)=[STRING];Action(1053)=[STRING];CVE(1075)=[STRING];BID(1076)=[STRING];MSB(1077)=[STRING];HitDirection(1115)=[STRING];RealSrcIP(1100)=[STRING];SubCategory(1124)=[STRING];CapturePktName(1116)=[STRING];HttpHost(1117)=[STRING];HttpFirstLine(1118)=[STRING];PayLoad(1135)=[STRING];

Variable fields

$1: Protocol type.

$2: Application protocol name.

$3: Source IP address.

$4: Source port number.

$5: Destination IP address.

$6: Destination port number.

$7: Source VPN instance name.

$8: Source security zone name.

$9: Destination security zone name.

$10: Name of the identity user.

$11: Policy name.

$12: Attack name.

$13: Attack ID.

$14: Attack category.

$15: Protected object type.

$16: Protected object.

$17: Severity level. Valid values are:

¡     INVALID: Severity level not specified.

¡     LOW.

¡     MEDIUM.

¡     HIGH.

¡     CRITICAL.

$18: Actions applied to the packet. Available actions are:

¡     Block-Source.

¡     Drop.

¡     Reset.

¡     Permit.

¡     Redirect.

¡     Capture.

¡     Logging.

$19: Common Vulnerabilities and Exposures (CVE).

$20: Bugtraq ID (BID).

$21: Microsoft Security Bulletins (MSB).

$22: Packet direction:

¡     original.

¡     reply.

$23: Original source IP address of the packet.

$24: Attack subcategory.

$25: Capture file name.

$26: Host field.

$27: Packet first line.

$28: Event return value.

Severity level

4

Example

IPS/4/IPS_IPV4_INTERZONE:-Context=1;Protocol(1001)=TCP;Application(1002)=http;SrcIPAddr(1003)=100.10.10.40;SrcPort(1004)=2999;DstIPAddr(1007)=200.10.10.40;DstPort(1008)=80;RcvVPNInstance(1042)=;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=abc;PolicyName(1079)=ips;AttackName(1088)=WEB_CLIENT_Windows_Media_ASF_File_Download_SET;AttackID(1089)=5707;Category(1090)=Other;Protection(1091)=Other;SubProtection(1092)=Other;Severity(1087)=CRITICAL;Action(1053)=Reset & Logging;CVE(1075)=CVE-2014-6277 | CVE-2014-6278;BID(1076)=BID-22559;MSB(1077)=MS10-017;HitDirection(1115)=original;RealSrcIP(1100)=10.10.10.10,20.20.20.20;SubCategory(1124)=Other;CapturePktName(1116)=ips_100.10.10.40_20171205_101112_5707.pcap;HttpHost(1117)=www.shr.com;HttpFirstLine(1118)=/file/show.cgi%7cecho%20HSC/http_pic_300k.jpg;PayLoad(1135)=/file/show.cgi;

Explanation

This message is sent when an IPv4 packet matches a WAF signature.

Recommended action

No action is required.

 

IPS_IPV6_INTERZONE

Message text

Protocol(1001)=[STRING];Application(1002)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];RcvVPNInstance(1042)=-[ STRING];SrcZoneName(1025)=[STRING];DstZoneName(1035)=[STRING];UserName(1113)=[STRING];PolicyName(1079)=[STRING];AttackName(1088)=[STRING];AttackID(1089)=[UINT32];Category(1090)=[STRING];Protection(1091)=[STRING];SubProtection(1092)=[STRING];Severity(1087)=[STRING];Action(1053)=[STRING];CVE(1075)=[STRING];BID(1076)=[STRING];MSB(1077)=[STRING];HitDirection(1115)=[STRING];RealSrcIP(1100)=[STRING];SubCategory(1124)=[STRING];CapturePktName(1116)=[STRING];HttpHost(1117)=[STRING];HttpFirstLine(1118)=[STRING];PayLoad(1135)=[STRING];

Variable fields

$1: Protocol type.

$2: Application protocol name.

$3: Source IPv6 address.

$4: Source port number.

$5: Destination IP address.

$6: Destination port number.

$7: Source VPN instance name.

$8: Source security zone name.

$9: Destination security zone name.

$10: Name of the identity user.

$11: Policy name.

$12: Attack name.

$13: Attack ID.

$14: Attack category.

$15: Protected object type.

$16: Protected object.

$17: Severity level. Valid values are:

¡     INVALID: Severity level not specified.

¡     LOW.

¡     MEDIUM.

¡     HIGH.

¡     CRITICAL.

$18: Actions applied to the packet. Available actions are:

¡     Block-Source.

¡     Drop.

¡     Reset.

¡     Permit.

¡     Redirect.

¡     Capture.

¡     Logging.

$19: Common Vulnerabilities and Exposures (CVE).

$20: Bugtraq ID (BID).

$21: Microsoft Security Bulletins (MSB).

$22: Packet direction:

¡     original.

¡     reply.

$23: Original source IP address of the packet.

$24: Attack subcategory.

$25: Capture file name.

$26: Host field.

$27: Packet first line.

$28: Event return value.

Severity level

4

Example

IPS/4/IPS_IPV6_INTERZONE:-Context=1;Protocol(1001)=TCP;Application(1002)=http;SrcIPv6Addr(1036)=100::40;SrcPort(1004)=2999;DstIPv6Addr(1037)=200::40;DstPort(1008)=80;RcvVPNInstance(1042)=;SrcZoneName(1025)=spf;DstZoneName(1035)=spf;UserName(1113)=aaa;PolicyName(1079)=ips;AttackName(1088)=WEB_CLIENT_Windows_Media_ASF_File_Download_SET;AttackID(1089)=5707;Category(1090)=Other;Protection(1091)=Other;SubProtection(1092)=Other;Severity(1087)=CRITICAL;Action(1053)=Reset & Logging;CVE(1075)=CVE-2014-6277 | CVE-2014-6278;BID(1076)=BID-22559;MSB(1077)=MS10-017;HitDirection(1115)=reply;RealSrcIP(1100)=10::1;SubCategory(1124)=Other;CapturePktName(1116)=ips_100::40_20171205_101112_5707.pcap;HttpHost(1117)=www.shr.com;HttpFirstLine(1118)=/file/show.cgi%7cecho%20HSC/http_pic_300k.jpg;PayLoad(1135)=/file/show.cgi;

Explanation

This message is sent when an IPv6 packet matches an IPS signature.

Recommended action

No action is required.

 

IPS_WARNING

Message text

Updated the IPS signature library successfully.

Variable fields

None.

Severity level

4

Example

IPS/4/IPS_WARNING: -Context=1; Updated the IPS signature library successfully.

Explanation

The IPS signature library was updated successfully through a manual offline update or triggered online update.

Recommended action

No action is required.

 

IPS_WARNING

Message text

Rolled back the IPS signature library successfully.

Variable fields

None.

Severity level

4

Example

IPS/4/IPS_WARNING: -Context=1; Rolled back the IPS signature library successfully.

Explanation

The IPS signature library was rolled back to the previous or factory default version successfully.

Recommended action

No action is required.

 

 

IPSEC messages

This section contains IPsec messages.

IPSEC_DEBUG_LOG

Message text

IPsec packet discarded, Src IP:[STRING], Dst IP:[STRING], SPI:[UINT32], SN:[UINT32], Cause:[STRING].

Variable fields

$1: Source IP address of the packet.

$2: Destination  IP address of the packet.

$3: Security Parameter Index (SPI).

$4: Sequence number of the packet.

$5: Reason for dropping the packet:

·     Anti-replay checking failed

·     AH authentication failed

·     ESP authentication failed

·     Invalid SA

·     ESP decryption failed

·     Source address of packet does not match the SA

·     No ACL rule matched

Severity level

6 (Informational)

Example

IPSEC/6/IPSEC_DEBUG_LOG: IPsec packet discarded, Src IP:1.1.1.2, Dst IP:1.1.1.4, SPI:1002, SN:0, Cause:AH authentication failed.

Impact

No negative impact on the system.

Cause

An IPsec packet was dropped.

Recommended action

1.     Troubleshoot this issue according to the displayed information and reason.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IPSEC_FAILED_ADD_FLOW_TABLE

Message text

Failed to add flow-table due to [STRING].

Variable fields

$1: Reason for the failure.

Severity level

4 (Warning)

Example

IPSEC/4/IPSEC_FAILED_ADD_FLOW_TABLE: Failed to add flow-table due to no enough resource.

Impact

The current and subsequent IPsec SAs cannot be established.

Cause

Not enough hardware resources.

Recommended action

If the failure is caused by not enough hardware resources, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IPSEC_GLOBAL_FLAG_LOGP2MPENABLE

Message text

IPsec P2MP tunnel table item created/deleted,tunnel index: [UINT32],tunnel sequence num: [UINT32],peer public IP: [STRING],peer tunnel IP: [STRING],interface index: [UINT32],port: [UINT32]

Variable fields

$1: Tunnel index.

$2: Tunnel sequence number.

$3: Peer public IP address.

$4: Peer tunnel address.

$5: Interface index.

$6: Peer port.

Severity level

6 (Informational)

Example

IPSEC/6/IPSEC_GLOBAL_FLAG_LOGP2MPENABLE: IPsec P2MP tunnel table item created,tunnel index: 0,tunnel sequence num: 1,peer public IP:10.1.1.2,peer tunnel IP:192.168.10.2,interface index: 140,port: 62465

Impact

No negative impact on the system.

Cause

P2MP learned or deleted an entry.

Recommended action

No action is required.

 

IPSEC_KD3P_LOGINFO

Message text

Anti-replay dropped a packet: src=[STRING]; time-sent=[STRING], [UINT32] [STRING] [UINT32] [UINT32]:[UINT32]:[UINT32] [UINT32]us; time-received=[STRING], [UINT32] [STRING] [UINT32] [UINT32]:[UINT32]:[UINT32] [UINT32]us; time-diff=[UINT32]us; window-size= +-[FLOAT]ms.

Variable fields

$1: Source IP address of the dropped packet.

$2-$9: Weekday, day, month, year, hour, minute, second, microsecond when the packet was sent.

$10-$17: Weekday, day, month, year, hour, minute, second, microsecond when the packet was received.

$18: Time difference between sending and receiving, in microseconds.

$19: Half of the time window, in milliseconds.

Severity level

6 (Informational)

Example

IPSEC/6/1.4  IPSEC_KD3P_LOGINFO:Anti-replay dropped a packet: src=192.168.58.178;time-sent=Sat, 23 Apr 2016 11:17:29 594565us; time-received =Sat, 23 Apr 2016 11:17:26 707866us; time-diff=2886699us; window-size =+-2500ms.

Impact

No negative impact on the system.

Cause

An IPsec packet is dropped. Possible reasons include:

·     The time difference between packet sending and receiving exceeded the window size.

·     The receiver has enabled anti-replay but the received packet contains no anti-replay header.

·     In tunnel mode, anti-replay is not enabled but the received packet contains an anti-replay header.

Recommended action

Troubleshoot this issue according to the displayed information and the possible reasons described.

If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IPSEC_SA_ESTABLISH

Message text

IPsec SA was established.

SA information:

Role: [STRING]

Local address: [STRING]

Remote address: [STRING]

Sour addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Dest addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Inside VPN instance: [STRING]

Outside VPN instance: [STRING]

Inbound AH SPI: [STRING]

Outbound AH SPI: [STRING]

Inbound ESP SPI: [STRING]

Outbound ESP SPI: [STRING]

ACL number: [UINT32]

ACL name: [STRING]

Variable fields

$1: Role that established the IPsec SA, which can be initiator or responder.

$2: Local end IP address.

$3: Remote end IP address.

$4-$9: Data flows.

$10: Inside VPN instance.

$11: Outside VPN instance.

$12: Inbound AH SPI.

$13: Outbound AH SPI.

$14: Inbound ESP SPI.

$15: Outbound ESP SPI.

$16: ACL number. The default value is 4294967295.

$17: ACL name. Either the ACL number or ACL name will be displayed but not both.

Severity level

6 (Informational)

Example

IPSEC/6/IPSEC_SA_ESTABLISH: IPsec SA was established.

SA information:

Role: Responder

Local address: 2.2.2.2

Remote address: 1.1.1.1

Sour addr: 192.168.2.0/255.255.255.0  Port: 0  Protocol: IP

Dest addr: 192.168.1.0/255.255.255.0  Port: 0  Protocol: IP

Inside VPN instance: aaa

Outside VPN instance: bbb

Inbound AH SPI: 192365458

Outbound AH SPI: 13654581

Inbound ESP SPI: 292334583

Outbound ESP SPI: 5923654586

ACL number: 3101

ACL name: aaa

Impact

No negative impact on the system.

Cause

An IPsec SA is established.

Recommended action

No action is required.

 

IPSEC_SA_ESTABLISH_FAIL

Message text

Failed to establish IPsec SA.

Reason: [STRING].

SA information:

Role: [STRING]

Local address: [STRING]

Remote address: [STRING]

Sour addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Dest addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Inside VPN instance: [STRING]

Outside VPN instance: [STRING]

Inbound AH SPI: [STRING]

Outbound AH SPI: [STRING]

Inbound ESP SPI: [STRING]

Outbound ESP SPI: [STRING]

ACL number: [UINT32]

ACL name: [STRING]

Variable fields

$1: Reason for the IPsec SA establishment failure:

·     Get SP: Required configuration is missing in the SP. SP ID=%u.

·     Get SP: The SP's local address doesn't match the local address configured in the IKE profile. SP ID=%u, SP's local address=%s, p2policy's local address=%s.

·     Get SP: The remote address doesn't exist. SP ID=%u, hostname=%s.

·     Get SP: The SP's remote address doesn't match the remote address configured in the IKE profile. SP ID=%u, SP's remote address=%s, p2policy's remote address=%s.

·     The policy contains incorrect ACL or IKE profile configuration.

·     Get SP: The SP doesn't have an IPsec transform set.

·     Get SP: Failed to create larval SA.

·     Create SA: Failed to fill the SA.

·     Create SA: Failed to create SA.

·     Create SA: Can't find SP.

·     Failed to create tunnel because a tunnel with the same index and sequence number already exists. Tunnel index=%d, tunnel seq=%d.

·     Failed to switch SA because the inbound SA can't be found. SPI=%u.

·     Failed to switch SA because the SA state is incorrect.

·     Failed to switch SA because the outbound SA can't be found.

·     Failed to switch SA because the outbound SA using another security protocol can't be found.

·     Failed to switch SA in kernel.

·     Failed to notify kernel of the link state change.

·     Number of IPsec tunnels reached the crypto capacity of the device.

·     Maximum number of IPsec tunnels already reached.

·     Failed to add IPsec tunnel.

·     Getting SP: IPsec is smoothing.

·     Getting SP: IPsec is not running.

·     Getting SP: Failed to find SP by index and sequence number.

·     Getting SP: Creating SA timed out.

·     Getting SP by interface: Target node not online.

·     Getting SP by mGRE: Failed to get interface.

·     Getting SP: Failed to get SP by mGRE because interface type was invalid.

·     Getting SP: Failed to get SP by mGRE because of no tunnel protection configuration.

·     Getting SP: Failed to get SP by mGRE because profile %s was not found.

·     Getting SP: Failed to get SP by mGRE because of wrong profile type.

·     Getting SP by mGRE: Failed to find profile SP by profile %s.

·     Getting SP: Failed to get SP by mgre.

·     Getting SP: Failed to get SP by SVTI because of invalid interface type.

·     Getting SP: Failed to get SP by SVTI because of no tunnel protection configuration with interface %s.

·     Getting SP: Failed to get SP by SVTI because profile %s was not found.

·     Getting SP: Failed to get SP by SVTI because of wrong type of profile %s.

·     Getting SP by SVTI: Failed to find profile SP by profile %s.

·     Getting SP: Failed to get SP by SVTI because SP type was not ISAKMP with profile %s.

·     Getting SP: Failed to match flow because renegotiation SP's index or Seqnum changed.

·     Getting SP: Failed to match SVTI flow because IKE profile was not match.

·     Getting SP: Failed to match SVTI flow because flow was not match with ACL.

·     Getting SP by SVTI: Failed to create larval SA.

·     Getting SP: Failed to get SP by SVTI with interface %s.

·     Getting SP by L3 interface: Failed to get interface data.

·     Getting SP: Failed to get SP by L3 interface because no SP entry was found by key.

·     Getting SP: Failed to get SP by L3 interface because no source interface SP entry was found by key.

·     Getting SP by L3 interface: Failed to match SP because SP's mode not ISAKMP.

·     Getting SP by L3 interface: Failed to match SP because SP negotiation not complete.

·     Getting SP: Rejected peer's request of any flow when SP's mode was isakmp template and no ACL was specified.

·     Getting SP by L3 interface: Failed to match SP because policy cannot be found by SP.

·     Getting SP by L3 interface: Failed to match SP because IKE profile was %s while IPsec used profile %s.

·     Getting SP: Failed to match flow because ACL not match.

·     Getting SP: Failed to match flow because renegotiation SP's index or Seqnum changed.

·     Getting SP: Flow netmask check failed.

·     Getting SP: Flow overlap check failed.

$2: Role that established the IPsec SA, which can be initiator or responder.

$3: Local end IP address.

$4: Remote end IP address.

$5-$10: Data flows.

$11: Inside VPN instance.

$12: Outside VPN instance.

$13: Inbound AH SPI.

$14: Outbound AH SPI.

$15: Inbound ESP SPI.

$16: Outbound ESP SPI.

$17: ACL number. The default value is 4294967295.

$18: ACL name. Either the ACL number or ACL name will be displayed but not both.

Severity level

6 (Informational)

Example

IPSEC/6/IPSEC_SA_ESTABLISH_FAIL: Failed to establish IPsec SA

Reason: Failed to add IPsec tunnel.

SA information:

Role: Responder

Local address: 2.2.2.2

Remote address: 1.1.1.1

Sour addr: 192.168.2.0/255.255.255.0  Port: 0  Protocol: IP

Dest addr: 192.168.1.0/255.255.255.0  Port: 0  Protocol: IP

Inside VPN instance: aaa

Outside VPN instance: bbb

Inbound AH SPI: 192365458

Outbound AH SPI: 13654581

Inbound ESP SPI: 292334583

Outbound ESP SPI: 5923654586

ACL number: 3101

ACL name: aaa

Impact

The IPsec SA failed to be established and therefore the IPsec tunnel cannot be established to protect packets.

Cause

·     The IPsec transform set parameters, IPsec authentication and encryption algorithms, and IPsec encapsulation modes are inconsistent between the two ends.

·     The IPsec policy settings are inconsistent between the two ends.

·     The ACLs used by the two ends are not mirror ACLs.

·     The physical link status is poor or the peer network is unreachable.

Recommended action

·     Verify that the two ends use the same IPsec transform set parameters, IPsec authentication and encryption algorithms, and IPsec encapsulation mode.

·     Verify that the two ends use the same IPsec policy configuration.

·     Verify that the ACLs used by the two ends are mirror ACLs.

·     Troubleshoot network issues to make sure the physical link status is good and the peer network is reachable.

If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IPSEC_SA_INITIATION

Message text

Began to establish IPsec SA.

Local address: [STRING]

Remote address: [STRING]

Sour addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Dest addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Inside VPN instance: [STRING]

Outside VPN instance: [STRING]

ACL number: [UINT32]

ACL name: [STRING]

Variable fields

$1: Local address.

$2: Remote address.

$3-$8: Data flows.

$9: Inside VPN instance.

$10: Outside VPN instance.

$11: ACL number. The default value is 4294967295.

$12: ACL name. Either the ACL number or ACL name will be displayed but not both.

Severity level

6 (Informational)

Example

IPSEC/6/IPSEC_SA_INITIATION: Began to establish IPsec SA.

Local address: 2.2.2.2

Remote address: 1.1.1.1

Sour addr: 192.168.2.0/255.255.255.0  Port: 0  Protocol: IP

Dest addr: 192.168.1.0/255.255.255.0  Port: 0  Protocol: IP

Inside VPN instance: aaa

Outside VPN instance: bbb

ACL number: 3101

ACL name: aaa

Impact

No negative impact on the system.

Cause

An IPsec SA is to be established.

Recommended action

No action is required.

 

IPSEC_SA_TERMINATE

Message text

The IPsec SA was deleted.

Reason: [STRING]

SA information:

Role: [STRING]

Local address: [STRING]

Remote address: [STRING]

Sour addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Dest addr: [STRING]  Port: [UINT32]  Protocol: [STRING]

Inside VPN instance: [STRING]

Outside VPN instance: [STRING]

Inbound AH SPI: [STRING]

Outbound AH SPI: [STRING]

Inbound  ESP SPI: [STRING]

Outbound ESP SPI: [STRING]

ACL number: [UINT32]

ACL name: [STRING]

Variable fields

$1: Reason for the IPsec SA removal:

·     SA idle timeout.

·     The reset command was executed.

·     Internal event.

·     Configuration change.

·     An IKE SA deletion message was received.

$2: Role that established the IPsec SA, which can be initiator or responder.

$3: Local end IP address.

$4: Remote end IP address.

$5-$10: Data flows.

$11: Inside VPN instance.

$12: Outside VPN instance.

$13: Inbound AH SPI.

$14: Outbound AH SPI.

$15: Inbound ESP SPI.

$16: Outbound ESP SPI.

$17: ACL number. The default value is 4294967295.

$18: ACL name. Either the ACL number or ACL name will be displayed but not both.

Severity level

6 (Informational)

Example

IPSEC/6/IPSEC_SA_TERMINATE: The IPsec SA was deleted.

Reason: SA idle timeout.

SA information:

Role: initiator

Local address: 2.2.2.2

Remote address: 1.1.1.1

Sour addr: 192.168.2.0/255.255.255.0  Port: 0  Protocol: IP

Dest addr: 192.168.1.0/255.255.255.0  Port: 0  Protocol: IP

Inside VPN instance: aaa

Outside VPN instance: bbb

Inbound AH SPI: 192365458

Outbound AH SPI: 13654581

Inbound ESP SPI: 292334583

Outbound ESP SPI: 5923654586

ACL number: 3101

ACL name: aaa

Impact

The IPsec SA was deleted and the IPsec service carried on the SA was interrupted.

Cause

See the value for the Reason field.

Recommended action

If the SA is deleted due to a reason described in this message, the SA will be re-established, and no action is required.

If the SA is deleted due to other reasons, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

IPSG messages

This section contains IPSG messages.

IPSG_ADDENTRY_ERROR

Message text

Failed to add an IP source guard binding on interface [STRING]: IP=[STRING], MAC=[STRING], VLAN=[UINT16]. Reason: [STRING].

Variable fields

$1: Interface name. If you do not specify an interface, this field displays N/A.

$2: IPv4 address or IPv6 address. If you do not specify an IP address, this field displays N/A.

$3: MAC address. If you do not specify a MAC address, this field displays N/A.

$4: VLAN ID. If you do not specify a VLAN, this field displays 65535.

$5: Failure reasons. Available options include:

¡     Feature not supported.

¡     Resources not sufficient.

¡     Maximum number of IPv4 binding entries already reached.

¡     Maximum number of IPv6 binding entries already reached.

¡     Unknown error.

Severity level

6 (Informational)

Example

IPSG/6/IPSG_ADDENTRY_ERROR: Failed to add an IP source guard binding on interface Vlan-interface1: IP=1.1.1.1, MAC=0001-0001-0001, VLAN=1. Reason: Resources not sufficient.

Impact

The system cannot use the IPSG binding to filter packets.

Cause

See the failure reason in the log message.

Recommended action

·     Identify whether the device supports the IPSG feature. If IPSG is not supported, output of this message is normal. No action is required.

·     Disable unnecessary services to release hardware resources when the failure is caused by insufficient hardware resources.

·     Delete unnecessary IPSG bindings to release ACL resources for IPSG bindings if the failure is caused by maximum number of IPv4SG or IPv6SG bindings being reached.

·     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IPSG_ADDEXCLUDEDVLAN_ERROR

Message text

Failed to add excluded VLANs (VLAN [UINT16] to VLAN [UINT16]). Reason: [STRING].

Variable fields

$1: Start VLAN ID of the VLAN range that has been configured to be excluded from IPSG filtering.

$2: End VLAN ID of the VLAN range that has been configured to be excluded from IPSG filtering.

$3: Failure reasons. Available options include:

·     Feature not supported.

·     Resources not sufficient.

·     Unknown error.

Severity level

6 (Informational)

Example

IPSG/6/IPSG_ADDEXCLUDEDVLAN_ERROR: -MDC=1-Slot=4; Failed to add excluded VLANs (VLAN 1 to VLAN 5). Reason: Resources not sufficient.

Impact

The system will not permit the packets that match the VLANs excluded from IPSG filtering.

Cause

See the failure reason in the log message.

Recommended action

·     Identify whether the device supports the IPSG feature. If IPSG is not supported, output of this message is normal. No action is required.

·     Disable unnecessary services to release hardware resources when the failure is caused by insufficient hardware resources.

·     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IPSG_DELENTRY_ERROR

Message text

Failed to delete an IP source guard binding on interface [STRING]: IP=[STRING], MAC=[STRING], VLAN=[UINT16]. Reason: [STRING].

Variable fields

$1: Interface name. If you do not specify an interface, this field displays N/A.

$2: IP address. If you do not specify an IP address, this field displays N/A.

$3: MAC address. If you do not specify a MAC address, this field displays N/A.

$4: VLAN ID. If you do not specify a VLAN, this field displays 65535.

$5: Failure reason. Available options include:

·     Feature not supported.

·     Unknown error.

Severity level

6 (Informational)

Example

IPSG/6/IPSG_DELENTRY_ERROR: Failed to delete an IP source guard binding on interface Vlan-interface1: IP=1.1.1.1, MAC=0001-0001-0001, VLAN=1. Reason: Unknown error.

Impact

The system can still use this binding to filter packets.

Cause

See the failure reason in the log message.

Recommended action

1.     Identify whether the device supports the IPSG feature. If IPSG is not supported, output of this message is normal. No action is required.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

IPSG_DELEXCLUDEDVLAN_ERROR

Message text

Failed to delete excluded VLANs (VLAN [UINT16] to VLAN [UINT16]). Reason: [STRING].

Variable fields

$1: Start VLAN ID of the VLAN range that has been configured to be excluded from IPSG filtering.

$2: End VLAN ID of the VLAN range that has been configured to be excluded from IPSG filtering.

$3: Failure reasons. Available options include:

·     Feature not supported.

·     Resources not sufficient.

·     Unknown error.

Severity level

6 (Informational)

Example

IPSG/6/IPSG_DELEXCLUDEDVLAN_ERROR: -MDC=1-Slot=4; Failed to delete excluded VLANs (VLAN 1 to VLAN 5). Reason: Resources not sufficient.

Impact

The system will still permit the packets that match these VLANs.

Cause

See the failure reason in the log message.

Recommended action

·     Identify whether the device supports the IPSG feature. If IPSG is not supported, output of this message is normal. No action is required.

·     Disable unnecessary services to release hardware resources when the failure is caused by insufficient hardware resources.

·     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

L2TPv2 messages

This section contains L2TPv2 messages.

L2TPV2_SESSION_EXCEED_LIMIT

Message text

Number of L2TP sessions exceeded the limit.

Variable fields

N/A

Severity level

4 (Warning)

Example

L2TPV2/4/L2TPV2_SESSION_EXCEED_LIMIT: Number of L2TP sessions exceeded the limit.

Impact

New L2TP sessions cannot be created. As a result, new L2TP users cannot come online.

Cause

The number of established L2TP sessions has reached the limit.

Recommended action

For new L2TP users to come online, perform one of the following tasks:

·     Wait for the old L2TP users to go offline and release L2TP session resources.

·     Execute the reset ppp access-user command to forcibly log out some old L2TP users to release L2TP session resources.

 

L2TPV2_TUNNEL_EXCEED_LIMIT

Message text

Number of L2TP tunnels exceeded the limit.

Variable fields

N/A

Severity level

4 (Warning)

Example

L2TPV2/4/L2TPV2_TUNNEL_EXCEED_LIMIT: Number of L2TP tunnels exceeded the limit.

Impact

New L2TP tunnels cannot be established.

Cause

The number of established L2TP tunnels has reached the limit.

Recommended action

1.     Perform one of the following tasks:

¡     Execute the reset l2tp tunnel command to disconnect an idle tunnel.

¡     Wait for the device to automatically disconnect an idle tunnel after the hello interval elapses.

2.     If the problem persists, contact H3C Support.

 

 

 

LAGG messages

This section contains link aggregation messages.

LAGG_ACTIVE

Message text

Member port [STRING] of aggregation group [STRING] changed to the active state.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_ACTIVE: Member port GE1/0/1 of aggregation group BAGG1 changed to the active state.

Impact

No negative impact on the system.

Cause

A member port in an aggregation group changed to the Selected state.

Recommended action

No action is required.

 

LAGG_AUTO_AGGREGATION

Message text

Failed to assign automatic assignment-enabled interface [STRING] to the aggregation group. Please check the configuration on the interface.

Variable fields

$1: Port name.

Severity level

6 (Informational)

Example

Failed to assign automatic assignment-enabled interface [STRING] to the aggregation group. Please check the configuration on the interface.

Impact

The interface cannot automatically join an aggregation group.

Cause

A port failed to join an automatically created aggregation group for one of the following reasons:

·     The attribute configuration of the port is inconsistent with that of the aggregate interface.

·     Some settings on the port prevent it from joining the aggregation group.

Recommended action

To resolve this issue:

·     Modify the attribute configuration of the port to be consistent with the aggregate interface.

·     Remove the settings that affect automatic member port assignment from the port.

 

LAGG_INACTIVE_AICFG

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the member port and the aggregate interface have different attribute configurations.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_AICFG: Member port FGE1/0/50 of aggregation group BAGG1 changed to the inactive state, because the member port and the aggregate interface have different attribute configurations.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because the member port and the aggregate interface had different attribute configurations.

Recommended action

Modify the attribute configuration of the member port to be the same as the attribute configuration of the aggregate interface.

 

LAGG_INACTIVE_BFD

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the BFD session state of the port is down.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_BFD: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because the BFD session state of the port is down.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because the BFD session on the port went down.

Recommended action

To resolve this issue:

·     Check for a link failure.

·     Modify the port settings to make sure it has the same operational key and attribute configuration as the reference port.

 

LAGG_INACTIVE_CONFIGURATION

Message text

Member port [STRING] of [STRING] changed to the inactive state, because the aggregation configuration of the port is incorrect.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_CONFIGURATION: Member port FGE1/0/50 of BAGG1 changed to the inactive state, because the aggregation configuration of the port is incorrect.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because some configuration on the member port cannot be issued to the driver.

Recommended action

Verify that no configuration on this port conflicts with the aggregation feature.

 

LAGG_INACTIVE_DUPLEX

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the duplex mode is different between the member port and the reference port.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_DUPLEX: Member port FGE1/0/50 of aggregation group BAGG1 changed to the inactive state, because the duplex mode is different between the member port and the reference port.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because the duplex mode was different between the member port and the reference port.

Recommended action

Change the duplex mode of the member port to be the same as the reference port.

 

LAGG_INACTIVE_HARDWAREVALUE

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because of the port's hardware restriction.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_HARDWAREVALUE: Member port FGE1/0/50 of aggregation group BAGG1 changed to the inactive state, because of the port's hardware restriction.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because of the port's hardware restriction.

Recommended action

Verify that no hardware differences exist between member ports.

 

LAGG_INACTIVE_LACP_ISOLATE

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the link-aggregation lacp isolate setting had been configured.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_LACP_ISOLATE: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because the link-aggregation lacp isolate setting had been configured.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because aggregate interfaces on the device were isolated.

Recommended action

Remove aggregate interface isolation.

 

LAGG_INACTIVE_LOWER_LIMIT

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the number of Selected ports was below the lower limit.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_LOWER_LIMIT: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because the number of Selected ports was below the lower limit.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group was placed in Unselected state because the required minimum number of Selected ports was not reached.

Recommended action

Make sure the minimum number of Selected ports is met.

 

LAGG_INACTIVE_PARTNER

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the link aggregation configuration of its peer port was incorrect.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_PARTNER: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because the link aggregation configuration of its peer port was incorrect.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because the port's partner changed to the Unselected state.

Recommended action

No action is required.

 

LAGG_INACTIVE_PHYSTATE

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the physical or line protocol state of the port was down.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_PHYSTATE: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because the physical or line protocol state of the port was down.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because the port went down.

Recommended action

Check the member port for physical or link layer issues.

 

LAGG_INACTIVE_RESOURCE_INSUFICIE

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because hardware resources were not enough.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

3 (Error)

Example

LAGG/3/LAGG_INACTIVE_RESOURCE_INSUFICIE: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because hardware resources were not enough.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because the aggregation resources were insufficient.

Recommended action

No action is required.

 

LAGG_INACTIVE_SPEED

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the speed configuration of the port was different from that of the reference portincorrect.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_INACTIVE_SPEED: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because the speed configuration of the port was different from that of the reference portincorrect.

Impact

The member port cannot forward the service traffic.

Cause

A member port in an aggregation group changed to the Unselected state because the speed was different between the member port and the reference port.

Recommended action

Change the speed of the member port to be the same as the reference port.

 

LAGG_INACTIVE_UPPER_LIMIT

Message text

Member port [STRING] of aggregation group [STRING] changed to the inactive state, because the number of Selected ports had reached the upper limit.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

3 (Error)

Example

LAGG/3/LAGG_INACTIVE_UPPER_LIMIT: Member port GE1/0/1 of aggregation group BAGG1 changed to the inactive state, because the number of Selected ports had reached the upper limit.

Impact

The member port cannot forward the service traffic.

Cause

The number of Selected ports reached the upper limit in a dynamic aggregation group. A member port in the aggregation group changed to the Unselected state because a more eligible port joined the aggregation group.

Recommended action

No action is required.

 

LAGG_PORT_DISCARDING_STATE

Message text

Member port [STRING] of [STRING] changed to the discarding state.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_PORT_DISCARDING_STATE: Member port GE1/0/50 of BAGG1 changed to the discarding state.

Impact

The member port cannot forward the service traffic.

Cause

A member port in the aggregation group changed to the discarding state and cannot forward service traffic.

Recommended action

Execute the display link-aggregation troubleshooting command to view the Selected state and reasons for member ports in the aggregation group. Troubleshoot and resolve issues based on the advice provided in the Advice field of the command output.

 

LAGG_PORT_FORWARDING_STATE

Message text

Member port [STRING] of [STRING] changed to the forwarding state.

Variable fields

$1: Port name.

$2: Link aggregation group type and ID.

Severity level

6 (Informational)

Example

LAGG/6/LAGG_PORT_FORWARDING_STATE: Member port GE1/0/50 of BAGG1 changed to the forwarding state.

Impact

No negative impact on the system.

Cause

A member port in the aggregation group changed to the forwarding state and can forward service traffic.

Recommended action

No action is required.

 

 

License

This section contains license messages.

LICENSE_FILE_LOST

Message text

License activation file [STRING] was lost.

Variable fields

$1: Name of the activation file.

Severity level

4 (Warning)

Example

LIC/4/LICENSE_FILE_LOST: License activation file 0123456789.ak was lost.

Impact

The license-based feature is unavailable.

Cause

A license activation file was lost.

Recommended action

1.     Copy the backup activation file to the license folder on the device.

2.     If no backup activation file is available, go to the email box provided when the license is registered and obtain the activation file. Then, copy the activation file to the license folder on the device.

3.     If you do not obtain the activation file in the email box provided when the license is registered, contact H3C Support to retrieve the lost activation file and copy the activation file to the license folder on the device.

 

LICENSE_FILE_RESTORE

Message text

License activation file [STRING] was successfully restored.

Variable fields

$1: Name of the activation file.

Severity level

6 (Informational)

Example

LIC/6/LICENSE_FILE_RESTORE: License activation file 0123456789.ak was successfully restored.

Impact

No negative impact on the system.

Cause

A license activation file was successfully restored.

Recommended action

No action is required.

 

LICENSE_NEAR_EXPIRE

Message text

License [STRING] will expire in [left days] days.

Variable fields

$1: License key, activation key, or activation file name.

$2: Remaining validity days.

Severity level

4 (Warning)

Example

LIC/4/LICENSE_NEAR_EXPIRE: License 0123456789.ak will expire in 2 days.

Impact

The license-based feature will be unavailable.

Cause

This message is printed once a day, starting from the 10th day before the expiration date.

Recommended action

Purchase and install a new license as soon as possible.

 

LICENSE_EXPIRE

Message text

License [STRING] expired.

Variable fields

$1: License key, activation key, or activation file name.

Severity level

4 (Warning)

Example

LIC/4/LICENSE_EXPIRE: License 0123456789.ak expired.

Impact

The license-based feature is unavailable.

Cause

A license expired.

Recommended action

Purchase and install a new license as soon as possible.

 

LICENSE_TAKE_EFFECT

Message text

State of license [STRING] changed to in use.

Variable fields

$1: License key, activation key, or activation file name.

Severity level

6 (Informational)

Example

LIC/6/LICENSE_TAKE_EFFECT: State of license 0123456789.ak changed to in use.

Impact

No negative impact on the system.

Cause

The state of a license changed from usable to in use.

Recommended action

No action is required.

 

LICENSE_PRE_NEAR_EXPIRE

Message text

Preinstalled licenses will expire in [STRING] days.

Variable fields

$1: Remaining validity days.

Severity level

4 (Warning)

Example

LIC/4/LICENSE_PRE_NEAR_EXPIRE: Preinstalled licenses will expire in 3 days.

Impact

The license-based feature will be unavailable.

Cause

This message is printed once a day, starting from the 10th day before the expiration date.

Recommended action

Examine whether usable formal licenses are installed. If no usable formal licenses are installed, purchase and install formal licenses.

 

LICENSE_PRE_EXPIRE

Message text

Preinstalled licenses expired.

Variable fields

N/A

Severity level

4 (Warning)

Example

LIC/4/LICENSE_PRE_EXPIRE: Preinstalled licenses expired.

Impact

The license-based feature is unavailable.

Cause

Preinstalled licenses expired.

Recommended action

Examine whether usable formal licenses are installed. If no usable formal licenses are installed, purchase and install formal licenses.

 

CLCP

This section contains CLCP messages.

CLCP_CLIENT_LOGIN_FAIL

Message text

Failed to login. Reason: [STRING].

Variable fields

$1: Login failure reason. Supported values:

¡     Network error.

¡     Incorrect username or password.

¡     Error occurred for communication between license client and license server.

Severity level

4 (Warning)

Example

CLCP/4/CLCP_CLIENT_LOGIN_FAIL: Failed to login. Reason: Incorrect username or password.

Impact

Licenses cannot be requested from the license server.

Cause

The license client failed to log in to the license server.

Recommended action

Handle the issue according to the failure reason:

·     If the reason is network error, verify that the server address configuration is correct.

·     If the reason is incorrect username or password, verify that the username and password configured on the device for accessing the license server are the same as those on the license server.

·     If communication error occurs, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CLCP_NEAR_EXPIRE

Message text

License [STRING] will expire in [STRING] days.

Variable fields

$1: Feature name.

$2: Remaining validity days.

Severity level

4 (Warning)

Example

CLCP/4/CLCP_NEAR_EXPIRE: License APMGR will expire in 2 days.

Impact

The license-based feature will be unavailable.

Cause

This message is printed once a day, starting from the 10th day before the expiration date.

Recommended action

Purchase and install a new license on the license server.

 

CLCP_RECLAIM

Message text

License [STRING] was reclaimed. Reason: [STRING].

Variable fields

$1: Feature name.

$2: Reclamation reason. Supported values:

¡     The license-based feature was not in use.

¡     The license aged out after the client had been disconnected from the license server for 30 days.

¡     The license was forcibly reclaimed by the license server.

¡     The license expired on the license server.

¡     The license was uninstalled on the license server.

¡     License information is inconsistent between license client and license server.

¡     Unknown.

Severity level

4 (Warning)

Example

CLCP/4/CLCP_RECLAIM: License APMGR was reclaimed. Reason: The license expired on the license server.

Impact

The license-based feature is unavailable.

Cause

A license was reclaimed by the license server.

Recommended action

Handle the issue according to the reclamation reason:

·     If the license-based feature is not in use, no action is required. To use the feature, the license client will automatically request the license again from the license server.

·     If the license ages out because of long time disconnection, restore the connection between the device and the license server.

·     If the license is forcibly reclaimed by the license server, no action is required.

·     If the license expires or is uninstalled on the license server, purchase and install a new license on the license server.

·     If license information is inconsistent between license client and license server or the reclamation reason is unknown, the license client will automatically request the license again after the license is reclaimed. In this case, no action is required. If exceptions exist, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CLCP_REQUEST_FAIL

Message text

Failed to request license [STRING]. Reason: [STRING].

Variable fields

$1: Feature name.

$2: Failure reason. Supported values:

¡     No sufficient license resources on the license server.

¡     Error occurred for communication between license client and license server.

¡     License server system error.

Severity level

4 (Warning)

Example

CLCP/4/CLCP_REQUEST_FAIL: Failed to request license APMGR. Reason: No sufficient license resources on the license server.

Impact

Licenses cannot be requested from the license server.

Cause

The license client failed to request a license.

Recommended action

Handle the issue according to the failure reason:

·     If no sufficient license resources are available on the license server, purchase new licenses and install them on the license server.

·     If a communication error or system error occurs, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

CLCP_RECLAIM_ALARM

Message text

License [STRING] will be reclaimed in [STRING] days. Reason: [STRING].

Variable fields

$1: Feature name.

$2: Remaining validity days.

$3: Reclamation reason. The value is The license client was disconnected from the license server.

Severity level

4 (Warning)

Example

CLCP/4/CLCP_RECLAIM_ALARM: License APMGR will be reclaimed in 2 days. Reason: The license client was disconnected from the license server.

Impact

The license-based feature will be unavailable.

Cause

The license client has been disconnected from the license server.

Recommended action

Restore the network connection between the license client and license server.

 

CLCP_CLIENT_OFFLINE

Message text

The license client went offline. Reason: [STRING].

Variable fields

$1: Offline reason. Supported values:

¡     The license server forced the license client to go offline.

¡     Client information aged out on the license server.

¡     The license client has been disconnected from the license server for a long time.

Severity level

4 (Warning)

Example

CLCP/4/CLCP_CLIENT_OFFLINE: The license client went offline. Reason: The license server forced the license client to go offline.

Impact

Licenses cannot be requested from the license server.

Cause

The license client went offline.

Recommended action

Handle the issue according to the offline reason:

·     If the license server forces the license client to go offline or client information ages out on the license server, no action is required. The device will be automatically reconnected to the license server after a period of time.

·     If the license client has been disconnected from the license server for a long time, restore the connection between the device and the license server.

 

LIPC messages

This section contains Leopard inter-process communication (LIPC) messages.

LIPC_MTCP_CHECK

Message text

Data stays in the receive buffer for an over long time. Owner=[STRING], VRF=[INTEGER], MDC=[INTEGER], Group=[INTEGER], MID=[INTEGER].

Variable fields

$1: Name of the process.

$2: Name of the VRF to which the LIPC link belongs to.

$3: MDC ID of the LIPC link.

$4: Multicast group ID of the LIPC link.

$5: Multicast group member ID of the LIPC link.

Severity level

4 (Warning)

Example

LIPC/4/LIPC_MTCP_CHECK: Data stays in the receive buffer for an over long time. Owner=fsd, VRF=0, MDC=1, Group=134, MID=10001.

Impact

Processes might operate incorrectly.

Cause

Processes will establish an LIPC link during internal communication. LIPC MTCP assigns a receive buffer to the process and checks at intervals whether data in the buffer is retrieved by the process. If the process has not retrieved data from the receive buffer for a long time and a large amount of data accumulates in the buffer, the process might run abnormally.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

LIPC_STCP_CHECK

Message text

Data stays in the receive buffer for an over long time. Process name(thread  name)=[STRING]([STRING]), PID(TID)=[INTEGER]([INTEGER]),inode=[INTEGER], port=[INTEGER], VRF=[INTEGER], local address/portid=[INTEGER]/[INTEGER], remote address/portid=[INTEGER]/[INTEGER].

Variable fields

$1: Name of the process that established the LIPC link.

$2: Name of the thread.

$3: ID of the process.

$4: ID of the thread.

$5: Address of the FD in the kernel.

$6: Port number for the LIPC link (the same port number is used for both local and remote ends).

$7: Name of the VRF to which the LIPC link belongs.

$8: LIP address of the local node.

$9: Temporary port number of the local node. It is a number temporarily assigned by the system for the port.

$10: LIP address of the remote node.

$11: Temporary port number of the remote node. It is a number temporarily assigned by the system for the port.

Severity level

4 (Warning)

Example

LIPC/4/LIPC_STCP_CHECK: Data  stays in the receive buffer for an over long time. Process name(thread  name)=pimd(pimd), PID(TID)=10953(10957),inode=2720150667, port=2149, VRF=0, local address/portid=0/2353866048, remote address/portid=0/1062257808.

Impact

Processes might operate incorrectly.

Cause

Processes will establish an LIPC link during internal communication. LIPC STCP assigns a receive buffer to the process and checks at intervals whether data in the buffer is retrieved by the process. If the process has not retrieved data from the receive buffer for a long time and a large amount of data accumulates in the buffer, the process might run abnormally.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

LIPC_STCP_DUPLICATE_SOCKET

Message text

Socket (LIP=[INTEGER], PortID=[INTEGER], Owner=[STRING]) has failed connect to server (LIP=[INTEGER],Port=[INTEGER]) too many times.

Variable fields

$1: LIP address of the local node.

$2: Port number of the local node.

$3: Name of the process.

$5: LIP address of the remote node.

$6: Service port number.

Severity level

4 (Warning)

Example

LIPC/4/LIPC_STCP_DUPLICATE_SOCKET: Socket (LIP=8, PortID=123456, Owner=sfs) has failed connect to server (LIP=8, Port=10515) too many times.

Impact

No negative impact on the system.

Explanation

Typically, if a service module fails to establish a connection by using a socket, it will close that socket and apply for another socket for reconnection. If the module continues to use the failed socket for connection, LIPC will return a failure. This log records information about reconnection failures of a module by using a failed socket.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

LIPC_SUDP_CHECK

Message text

Data stays in the receive buffer for an over long time. Owner=[STRING], VRF=[INTEGER], MDC=[INTEGER], local address/port=[INTEGER]/[INTEGER], remote address/port=[INTEGER]/[INTEGER].

Variable fields

$1: Name of the process that established the LIPC link.

$2: Name of the VRF to which the LIPC link belongs.

$3: MDC ID of the LIPC link.

$4: Port number of the local node.

$5: IP address of the local node.

$6: LIP address of the remote node.

$7: Port number of the remote node.

Severity level

4 (Warning)

Example

LIPC/4/LIPC_SUDP_CHECK: Data stays in the receive buffer for an over long time. Owner=snmpd, VRF=0, MDC=1, local address/port=0/10525, remote address/port=32768/0.

Impact

Processes might operate incorrectly.

Cause

Processes will establish an LIPC link during internal communication. LIPC SUDP assigns a receive buffer to the process and checks at intervals  whether data in the buffer is retrieved by the process. If the process has not retrieved data from the receive buffer for a long time and a large amount of data accumulates in the buffer, the process might run abnormally.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

PORT_CHANGE

Message text

STCP: Node where the listening port number [INT] (MDC: [INT] VRF: [INT]) resides changed from LIP [INT] to LIP [INT].

Variable fields

$1: LIPC global port number.

$2: Name of the MDC where the LIPC global port resides.

$3: Name of the VRF to which the LIPC global port belongs.

$4: Name of the old LIPC node where the LIPC global port resides.

$5: Name of the new LIPC node where the LIPC global port resides.

Severity level

5 (Notification)

Example

LIPC/5/PORT_CHANGE: Node where the listening port number 620 (MDC: 1 VRF: 1) resides changed from LIP 1 to LIP 3.

Impact

No negative impact on the system.

Cause

STCP assigns an LIPC global port number as a listening port number to each service module as requested. Typically, a service module listens to the port number only on the LIPC node where the port has been requested.

This message is generated if the service module listens to the port number on a different LIPC node. STCP will move the port number from the old LIPC node to the new node.

Recommended action

No action is required.

 

 

LLDP messages

This section contains LLDP messages.

LLDP_CREATE_NEIGHBOR

Message text

[STRING] agent new neighbor created on port [STRING] (IfIndex [UINT32]), neighbor's chassis ID is [STRING], port ID is [STRING].

Variable fields

$1: Agent type.

$2: Port name.

$3: Port ifIndex.

$4: Neighbor's chassis ID.

$5: Neighbor's port ID.

Severity level

6 (Informational)

Example

LLDP/6/LLDP_CREATE_NEIGHBOR: Nearest bridge agent new neighbor created on port Ten-GigabitEthernet10/0/15 (IfIndex 599), neighbor's chassis ID is 3822-d666-ba00, port ID is GigabitEthernet6/0/5.

Impact

No negative impact on the system.

Cause

The port received an LLDP message from a new neighbor.

Recommended action

No action is required.

 

LLDP_DELETE_NEIGHBOR

Message text

[STRING] agent neighbor deleted on port [STRING] (IfIndex [UINT32]), neighbor's chassis ID is [STRING], port ID is [STRING].

Variable fields

$1: Agent type.

$2: Port name.

$3: Port ifIndex.

$4: Neighbor's chassis ID.

$5: Neighbor's port ID.

Severity level

6 (Informational)

Example

LLDP/6/LLDP_DELETE_NEIGHBOR: Nearest bridge agent neighbor deleted on port Ten-GigabitEthernet10/0/15 (IfIndex 599), neighbor's chassis ID is 3822-d666-ba00, port ID is GigabitEthernet6/0/5.

Impact

The LLDP neighbor is disconnected.

Cause

The port received a deletion message when a neighbor was deleted.

Recommended action

1.     View related settings on the neighboring device to identify whether the neighboring device is disabled with LLDP.

¡     If LLDP is disabled on the neighboring device, execute the lldp enable and lldp global enable commands to enable LLDP.

¡     If LLDP is enabled on the neighboring device, go to step 2.

2.     Execute the display interface command to identify whether a link failure occurs between the local device and the neighboring device.

¡     If a link failure occurs, troubleshoot the link failure. If the link failure cannot be cleared, go to step 3.

¡     If no link failure occurs, go to step 3.

4.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

LLDP_LESS_THAN_NEIGHBOR_LIMIT

Message text

The number of [STRING] agent neighbors maintained by port [STRING] (IfIndex [UINT32]) is less than [UINT32], and new neighbors can be added.

Variable fields

$1: Agent type.

$2: Port name.

$3: Port ifIndex.

$4: Maximum number of neighbors a port can maintain.

Severity level

6 (Informational)

Example

LLDP/6/LLDP_LESS_THAN_NEIGHBOR_LIMIT: The number of nearest bridge agent neighbors maintained by port Ten-GigabitEthernet10/0/15 (IfIndex 599) is less than 5, and new neighbors can be added.

Impact

No negative impact on the system.

Cause

The number of the neighbors for a port changes.

Recommended action

No action is required.

 

LLDP_NEIGHBOR_AGE_OUT

Message text

[STRING] agent neighbor aged out on port [STRING] (IfIndex [UINT32]), neighbor's chassis ID is [STRING], port ID is [STRING].

Variable fields

$1: Agent type.

$2: Port name.

$3: Port ifIndex.

$4: Neighbor's chassis ID.

$5: Neighbor's port ID.

Severity level

5 (Notification)

Example

LLDP/5/LLDP_NEIGHBOR_AGE_OUT: Nearest bridge agent neighbor aged out on port Ten-GigabitEthernet10/0/15 (IfIndex599), neighbor's chassis ID is 3822-d666-ba00, port ID is GigabitEthernet6/0/5.

Impact

The LLDP neighbor is disconnected.

Cause

This message is generated when the port failed to receive LLDPDUs from the neighbor within a certain period of time.

Recommended action

1.     Execute the display interface command to identify whether a link failure occurs between the local device and the neighboring device, which causes LLDP packet loss or congestion.

¡     If a link failure occurs, troubleshoot the link failure. If the link failure cannot be cleared, go to step 2.

¡     If no link failure occurs, go to step 2.

5.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

LLDP_NEIGHBOR_PROTECTION_BLOCK

Message text

The status of port [STRING] changed to blocked ([STRING]) for the [STRING] agent.

Variable fields

$1: Interface name.

$2: Neighbor protection feature that caused the state change:

¡     agingNeighbor aging-based protection.

¡     validationNeighbor validation-based protection.

¡     black hole—LLDP black hole detection-based protection.

¡     cross domain—LLDP cross-domain detection-based protection.

$3: LLDP agent type.

Severity level

4 (Warning)

Example

LLDP/4/LLDP_NEIGHBOR_PROTECTION_BLOCK: -MDC=1; -ifDescr=GigabitEthernet1/0/1; The status of port GigabitEthernet1/0/1 changed to blocked (aging) for the nearest bridge agent.

Impact

The port is blocked and cannot process services.

Cause

Cause 1:

A neighbor identification error occurs, leading to neighbor validation-based protection.

Cause 2:

Neighbor aging occurs due to a period of failure to receive LLDP packets, leading to neighbor aging-based protection.

Cause 3:

LLDP black hole detection enabled on the interface detects a black hole on LLDP packets.

Cause 4:

LLDP cross-domain detection enabled on the interface has detected LLDP packets with domain IDs different from the local domain ID.

Recommended action

Cause 1:

1.     Execute the display interface command to identify whether a link failure occurs between the local device and the neighboring device, which causes LLDP packet loss or congestion.

¡     If a link failure occurs, troubleshoot the link failure. If the link failure cannot be cleared, go to step 2.

¡     If no link failure occurs, go to step 2.

2.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

Cause 2:

3.     Execute the display lldp neighbor-information command to display the LLDP information received from the neighboring devices and obtain the chassis ID TLV and port ID TLV.

4.     Identify whether the chassis ID TLV and port ID TLV from the neighboring device are the same as those of the local device from the lldp neighbor-identity chassis-id and lldp neighbor-identity port-id commands.

¡     If the chassis ID TLV and port ID TLV are the same as those of the local device from the lldp neighbor-identity chassis-id and lldp neighbor-identity port-id commands, go to step 4.

¡     If the chassis ID TLV and port ID TLV are different from those of the local device from the lldp neighbor-identity chassis-id and lldp neighbor-identity port-id commands, go to step 3.

5.     Execute the lldp neighbor-identity chassis-id and lldp neighbor-identity port-id commands to configure the local identification information to ensure that the identification information on the local device is the same as that received from the neighboring device.

6.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

Cause 3:

No action is required. Alternatively, change the physical topology to clear LLDP packet back holes.

Cause 4:

Check the planned domain ID configuration for LLDP cross-domain detection at both ends. Identify whether the domain IDs at both ends must be the same.

·     If the domain IDs at both ends must be the same, execute the lldp cross-domain-detection domain-id command at both ends to ensure that the same domain IDs at both ends are the same.

·     If the domain IDs at both ends can be different, no action is required.

 

LLDP_NEIGHBOR_PROTECTION_DOWN

Message text

The status of port [STRING] changed to down (aging) for the [STRING] agent.

Variable fields

$1: Interface name.

$2: LLDP agent type.

Severity level

4 (Warning)

Example

LLDP/4/LLDP_NEIGHBOR_PROTECTION_DOWN: -MDC=1; -ifDescr=GigabitEthernet1/0/1; The status of port GigabitEthernet1/0/1 changed to down (aging) for the nearest bridge agent.

Impact

The port is shut down and cannot process services.

Cause

Neighbor aging occurs due to a period of failure to receive LLDP packets, leading to neighbor aging-based protection.

Recommended action

1.     Execute the display interface command to identify whether a link failure occurs between the local device and the neighboring device, which causes LLDP packet loss or congestion.

¡     If a link failure occurs, troubleshoot the link failure. If the link failure cannot be cleared, go to step 2.

¡     If no link failure occurs, go to step 2.

2.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

LLDP_NEIGHBOR_PROTECTION_UNBLOCK

Message text

The status of port [STRING] changed to unblocked for the [STRING] agent.

Variable fields

$1: Interface name.

$2: LLDP agent type.

Severity level

4 (Warning)

Example

LLDP/4/LLDP_NEIGHBOR_PROTECTION_UNBLOCK: -MDC=1; -ifDescr=GigabitEthernet1/0/1; The status of port GigabitEthernet1/0/1 changed to unblocked for the nearest bridge agent.

Impact

No negative impact on the system.

Cause

LLDP packets are received on the port or the neighboring identification information is the same as the local configuration.

Recommended action

No action is required.

 

LLDP_NEIGHBOR_PROTECTION_UP

Message text

The status of port [STRING] changed to up for the [STRING] agent.

Variable fields

$1: Interface name.

$2: LLDP agent type.

Severity level

4 (Warning)

Example

LLDP/4/LLDP_NEIGHBOR_PROTECTION_UP: -MDC=1; -ifDescr=GigabitEthernet1/0/1; The status of port GigabitEthernet1/0/1 changed to up for the nearest bridge agent.

Impact

No negative impact on the system.

Cause

Execute the undo lldp neighbor-protection aging or undo shutdown command on the interface disabled with neighbor aging-based protection.

Recommended action

No action is required.

 

LLDP_PVID_INCONSISTENT

Message text

PVID mismatch discovered on [STRING] (PVID [UINT32]), with [STRING] [STRING] (PVID [STRING]).

Variable fields

$1: Port name.

$2: VLAN ID.

$3: System name.

$4: Port name.

$5: VLAN ID.

Severity level

5 (Notification)

Example

LLDP/5/LLDP_PVID_INCONSISTENT: PVID mismatch discovered on GigabitEthernet1/0/1 (PVID 2), with H3C GigabitEthernet1/0/1 (PVID 1).

Impact

A PVID mismatch occurs between two ends of the link, which causes the failure of packet forwarding for some protocols.

Cause

The PVID TLV carried in an LLDP packet from the neighboring device does not match the PVID of the local interface that receives that LLDP packet.

Recommended action

Configure the same PVID for the local and peer interfaces.

 

LLDP_REACH_NEIGHBOR_LIMIT

Message text

The number of [STRING] agent neighbors maintained by the port [STRING] (IfIndex [UINT32]) has reached [UINT32], and no more neighbors can be added.

Variable fields

$1: Agent type.

$2: Port name.

$3: Port ifIndex.

$4: Maximum number of neighbors a port can maintain.

Severity level

5 (Notification)

Example

LLDP/5/LLDP_REACH_NEIGHBOR_LIMIT: The number of nearest bridge agent neighbors maintained by the port Ten-GigabitEthernet10/0/15 (IfIndex 599) has reached 5, and no more neighbors can be added.

Impact

The interface cannot create a new LLDP neighbor entry.

Cause

This message is generated when the port with its maximum number of neighbors reached received an LLDP packet from a new neighbor.

Recommended action

To create a new neighbor entry, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

LOAD messages

This section contains load management messages.

BOARD_LOADING

Message text

Mode 1:

Board in chassis [INT32] slot [INT32] is loading software images.

Mode 2:

Board in slot [INT32] is loading software images.

Variable fields

Mode 1:

$1: Chassis ID.

$2: Slot ID.

Mode 2:

$1: Slot ID.

Severity level

4 (Warning)

Example

Mode 1:

LOAD/4/BOARD_LOADING: Board in chassis 1 slot 5 is loading software images.

Mode 2:

LOAD/4/BOARD_LOADING: Board in slot 5 is loading software images.

Impact

No negative impact on the system.

Cause

The card is loading software images during the boot process.

Recommended action

No action is required.

 

LOAD_FAILED

Message text

Mode 1:

Board in chassis [INT32] slot [INT32] failed to load software images.

Mode 2:

Board in slot [INT32] failed to load software images.

Variable fields

Mode 1:

$1: Chassis ID.

$2: Slot ID.

Mode 2:

$1: Slot ID.

Severity level

3 (Error)

Example

Mode 1:

LOAD/3/LOAD_FAILED: Board in chassis 1 slot 5 failed to load software images.

Mode 2:

LOAD/3/LOAD_FAILED: Board in slot 5 failed to load software images.

Impact

The card will fail to start.

Cause

The card failed to load software images during the boot process.

Recommended action

1.     Execute the display boot-loader command to identify the startup software images.

2.     Execute the dir command to verify that the startup software images exist. If the startup software images do not exist or are damaged, re-upload the software images to the device or set another one as the startup software images.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

LOAD_FINISHED

Message text

Mode 1:

Board in chassis [INT32] slot [INT32] has finished loading software images.

Mode 2:

oard in slot [INT32] has finished loading software images.

Variable fields

Mode 1:

$1: Chassis ID.

$2: Slot ID.

Mode 2:

$1: Slot ID.

Severity level

5 (Notification)

Example

Mode 1:

LOAD/5/LOAD_FINISHED: Board in chassis 1 slot 5 has finished loading software images.

Mode 2:

LOAD/5/LOAD_FINISHED: Board in slot 5 has finished loading software images.

Impact

No negative impact on the system.

Cause

The card has finished loading software images.

Recommended action

No action is required.

 

 

LOGIN messages

This section contains login messages.

LOGIN_AUTHENTICATION_FAILED

Message text

Authentication failed for [STRING] from [STRING]. Reason: [STRING].

Variable fields

$1: Username.

$2: User line name or IP address.

$3: Failure cause. For more information, see the user online/offline reason description in AAA commands in Security Command Reference.

Severity level

5 (Notification)

Example

LOGIN/5/LOGIN_AUTHENTICATION_FAILED: Authentication failed for Usera from console0. Reason: Invalid username or password.

Impact

The user failed to log in to the system.

Cause

Authentication failed upon user login.

Recommended action

Troubleshoot the issue based on the failure cause.

 

LOGIN_FAILED

Message text

[STRING] failed to login from [STRING].

Variable fields

$1: Username.

$2: Line name or IP address.

Severity level

5 (Notification)

Example

LOGIN/5/LOGIN_FAILED: TTY failed to log in from console0.

LOGIN/5/LOGIN_FAILED: usera failed to log in from 192.168.11.22.

Impact

A user fails to log in to the system.

Cause

A login attempt failed.

Recommended action

1.     Verify the connection between the device and the server.

2.     Enter the username and password again.

3.     Verify that the server settings are correct, such as the server type.

4.     Verify that the number of login users has not reached the upper limit.

5.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

LOGIN_ INVALID_USERNAME_PWD

Message text

Invalid username or password from [STRING].

Variable fields

$1: User line name and user IP address.

Severity level

5 (Notification)

Example

LOGIN/5/LOGIN_INVALID_USERNAME_PWD: Invalid username or password from console0.

LOGIN/5/LOGIN_INVALID_USERNAME_PWD: Invalid username or password from 192.168.11.22.

Impact

A user fails to log in to the system.

Cause

A user entered an invalid username or password.

Recommended action

Verify that the username and password for login are correct.

 

LPDT messages

This section contains LPDT messages.

LPDT_LOOPED

Message text

Loopback exists on [STRING].

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

LPDT/4/LPDT_LOOPED: Loopback exists on Ethernet6/4/2.

Impact

The device processes the port based on the loop protection action configured for the port.

Cause

The port has received a loop detection packet from this device.

Recommended action

1.     Identify whether the existing Layer 2 loops in the current network are necessary for network deployment:

¡     If yes, proceed to step 2.

¡     If not, redeploy the network to eliminate Layer 2 loops.

2.     Identify whether the network topology meets the requirements after the loop detection feature processes the port:

¡     If yes, no action is required.

¡     If not, modify the loop detection configuration for the device to ensure that the network topology after the loop detection feature processes the port meets the requirements. If the issue persists, proceed to step 3.

3.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

LPDT_RECOVERED

Message text

Loopback on [STRING] recovered.

Variable fields

$1: Interface name.

Severity level

5 (Notification)

Example

LPDT/5/LPDT_RECOVERED: Loopback on Ethernet6/4/1 recovered.

Impact

No negative impact on the system.

Cause

Reason 1: Within all VLANs, a port does not receive loop detection packets within three times the loop detection interval.

Reason 2: The port is shut down to eliminate loops.

Recommended action

No action is required.

 

LPDT_VLAN_LOOPED

Message text

Loopback exists on [STRING] in VLAN [UINT16].

Variable fields

$1: Interface name.

$2: VLAN ID.

Severity level

4 (Warning)

Example

LPDT/4/LPDT_VLAN_LOOPED: Loopback exists on Ethernet6/4/1 in VLAN 1.

Impact

The device processes the port based on the loop protection action configured for the port.

Cause

The port received a loop detection packet from this device within the specified VLAN.

Recommended action

1.     Identify whether the existing Layer 2 loops in the current network are necessary for network deployment:

¡     If yes, proceed to step 2.

¡     If not, redeploy the network to eliminate Layer 2 loops.

2.     Identify whether the network topology meets the requirements after the loop detection feature processes the port:

¡     If yes, no action is required.

¡     If not, modify the loop detection configuration for the device to ensure that the network topology after the loop detection feature processes the port meets the requirements. If the issue persists, proceed to step 3.

3.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

LPDT_VLAN_RECOVERED

Message text

Loopback on [STRING] in VLAN [UINT16] recovered.

Variable fields

$1: Interface name.

$2: VLAN ID.

Severity level

5 (Notification)

Example

LPDT/5/LPDT_VLAN_RECOVERED: A loop was removed on GigabitEthernet1/0/1 in VLAN 1.

Impact

No negative impact on the system.

Cause

Reason 1: Within all VLANs, a port does not receive loop detection packets within three times the loop detection interval.

Reason 2: The port is shut down to eliminate loops.

Recommended action

No action is required.

 

 

LS messages

This section contains Local Server messages.

LOCALSVR_FAIL_TO_WRITETIME2FILE

Message text

Failed to write the local user creation or login time records to file.

Variable fields

N/A

Severity level

6 (Informational)

Example

LOCALSVR/6/ LOCALSVR_FAIL_TO_WRITETIME2FILE: Failed to write the local user creation or login time records to file.

Impact

No negative impact on the system.

Cause

The local file system of the device is running out of memory space.

Recommended action

Execute the dir command in user view to check the remaining capacity information of local storage media (such as flash). If no enough remaining space is available, delete unnecessary files.

 

LOCALSVR_PROMPTED_CHANGE_PWD

Message text

Please change the password of [STRING] [STRING], because [STRING].

Variable fields

$1: Password type:

¡     device management user.

¡     user line.

¡     user line class.

$2: Username, user line name, or user line class name.

$3: Reason for password change:

¡     the current password is a weak-password.

¡     the current password is the default password.

¡     it is the first login of the current user or the password had been reset.

¡     the password had expired.

Severity level

6 (Informational)

Example

LOCALSVR/6/LOCALSVR_PROMPTED_CHANGE_PWD: Please change the password of device management user hhh, because the current password is a weak password.

Impact

No negative impact on the system.

Cause

The device generated a log message to prompt a user to change the password of the user, user line, or user line class.

The device will generate such a log message every 24 hours after the user logs in to the device if the password does not meet the password control requirements.

Recommended action

Change the user password as required:

·     If scheme authentication is used, change the local password of the user.

·     If password authentication is used, change the authentication password of the user line or user line class for the user.

 

LS_ADD_USER_TO_GROUP

Message text

Admin [STRING] added user [STRING] to group [STRING].

Variable fields

$1: Admin name.

$2: Username.

$3: User group name.

Severity level

4 (Warning)

Example

LS/4/LS_ADD_USER_TO_GROUP: Admin admin added user user1 to group group1.

Impact

No negative impact on the system.

Cause

The administrator added a local user into a specific user group.

Recommended action

No action is required.

 

LS_AUTHEN_FAILURE

Message text

User [STRING] from [STRING] failed authentication. [STRING]

Variable fields

$1: Username.

$2: IP address.

$3: Failure reason:

¡     "User not found."

¡     "Password verified failed."

¡     "User not active."

¡     "Access type mismatch."

¡     "Binding attribute is failed."

¡     "User in blacklist."

Severity level

5 (Notification)

Example

LS/5/LS_AUTHEN_FAILURE: User cwf@system from 192.168.0.22 failed authentication. "User not found."

Impact

Users cannot come online.

Cause

The local server rejected a user's authentication request. Possible reasons include:

·     The user cannot be found.

·     Password verification failed.

·     The user is not online.

·     The access type does not match.

·     Binding attributes failed.

·     The user has been blacklisted.

Recommended action

Troubleshoot according to the reason displayed in the message.

 

LS_AUTHEN_SUCCESS

Message text

User [STRING] from [STRING] was authenticated successfully.

Variable fields

$1: Username.

$2: IP address.

Severity level

6 (Informational)

Example

LS/6/LS_AUTHEN_SUCCESS: User cwf@system from 192.168.0.22 was authenticated successfully.

Impact

No negative impact on the system.

Cause

The local server accepted a user's authentication request.

Recommended action

No action is required.

 

LS_DEL_USER_FROM_GROUP

Message text

Admin [STRING] delete user [STRING] from group [STRING].

Variable fields

$1: Admin name.

$2: Username.

$3: User group name.

Severity level

4 (Warning)

Example

LS/4/LS_DEL_USER_FROM_GROUP: Admin admin delete user user1 from group group1.

Impact

No negative impact on the system.

Cause

The administrator deleted a local user from a specific user group.

Recommended action

No action is required.

 

LS_PWD_ADD_BLACKLIST

Message text

User [STRING] was added to the blacklist due to multiple login failures, [STRING].

Variable fields

$1: Username.

$2: Options include:

¡     but could make other attempts.

¡     and is permanently blocked.

¡     and was temporarily blocked for [UINT32] minutes.

Severity level

4 (Warning)

Example

LS/4/LS_PWD_ADDBLACKLIST: User aaa at 192.168.0.22 was added to the blacklist due to multiple login failures, but could make other attempts.

Impact

The impact on the system depends on the actual situation.

Cause

After a user login authentication fails, the system adds the user to the password management blacklist and restricts subsequent login attempts according to the measures configured in the password-control login-attempt command.

When a user login fails more times than the specified limit, the system will prohibit that user from logging in. After a period, the system allows the user to attempt to log in again.

Recommended action

1.     If this message appears occasionally, check the user's password. Incorrect password input might cause login prohibition. As a best practice, try to log in again after waiting for some time. If you encounter the same issue when logging into the device again with the correct username and password, collect log messages and configuration data, and then contact Technical Support for help.

2.     If this message appears frequently, the system might be under a login attack. Contact Technical Support for help.

 

LS_PWD_CHGPWD

Message text

The password of local [STRING] user [STRING] was modified.

Variable fields

$1: User access type.

¡     network-access

¡     device-management

$2: Username.

Severity level

5 (Notification)

Example

LS/5/LS_PWD_CHGPWD: The password of local network-access user abc was modified.

Impact

No negative impact on the system.

Cause

The password of a local user was modified.

Recommended action

Typically, no action is required when this log is generated. The device administrator can determine whether an abnormal password change occurred based on this log.

 

LS_PWD_CHGPWD_FOR_AGEDOUT

Message text

User [STRING] changed the password because it was expired.

Variable fields

$1: Username.

Severity level

4 (Warning)

Example

LS/4/LS_PWD_CHGPWD_FOR_AGEDOUT: User aaa changed the password because it was expired.

Impact

No negative impact on the system.

Cause

A user changed the password because the old password has expired.

Recommended action

No action is required.

 

LS_PWD_CHGPWD_FOR_AGEOUT

Message text

User [STRING] changed the password because it was about to expire.

Variable fields

$1: Username.

Severity level

4 (Warning)

Example

LS/4/LS_PWD_CHGPWD_FOR_AGEOUT: User aaa changed the password because it was about to expire.

Impact

No negative impact on the system.

Cause

A user changed the password because the old password was about to expire.

Recommended action

No action is required.

 

LS_PWD_CHGPWD_FOR_COMPOSITION

Message text

User [STRING] changed the password because it had an invalid composition.

Variable fields

$1: Username.

Severity level

4 (Warning)

Example

LS/4/LS_PWD_CHGPWD_FOR_COMPOSITION: User aaa changed the password because it had an invalid composition.

Impact

No negative impact on the system.

Cause

A user reentered the password due to a mistake in the password composition.

Recommended action

No action is required.

 

LS_PWD_CHGPWD_FOR_FIRSTLOGIN

Message text

User [STRING] changed the password at the first login.

Variable fields

$1: Username.

Severity level

4 (Warning)

Example

LS/4/LS_PWD_CHGPWD_FOR_FIRSTLOGIN: User aaa changed the password at the first login.

Impact

No negative impact on the system.

Cause

A user changed the password at the first login.

Recommended action

No action is required.

 

LS_PWD_CHGPWD_FOR_LENGTH

Message text

User [STRING] changed the password because it was too short.

Variable fields

$1: Username.

Severity level

4 (Warning)

Example

LS/4/LS_PWD_CHGPWD_FOR_LENGTH: User aaa changed the password because it was too short.

Impact

No negative impact on the system.

Cause

A user changed the password because the input password was too short.

Recommended action

No action is required.

 

LS_PWD_FAILED2WRITEPASS2FILE

Message text

Failed to write the password records to file.

Variable fields

N/A

Severity level

4 (Warning)

Example

LS/4/LS_PWD_FAILED2WRITEPASS2FILE: Failed to write the password records to file.

Impact

The local user's password cannot be modified.

Cause

A user failed to change its own password during login, or an administrator failed to change a local user's password. Possible reasons include:

·     The local file system of the device is running out of memory space.

·     An anomaly occurs on the local lauth.dat file.

Recommended action

1.     Execute the dir command in user view to check the remaining capacity information of local storage media (such as flash). If no enough remaining space is available, delete unnecessary files.

2.     Execute the dir command in user view to check for the lauth.dat file on local storage media (such as flash). If the file does not exist, has a size of 0, or is very small (likely an anomaly if less than 20B), please contact Technical Support for help.

 

LS_PWD_MODIFY_FAIL

Message text

Admin [STRING] from [STRING] could not modify the password for user [STRING], because [STRING].

Variable fields

$1: Admin name.

$2: IP address.

$3: Username.

$4: Failure reason:

·     old password is incorrect.

·     password is too short.

·     password has not minimum different chars.

·     invalid password composition.

·     password has repeated chars.

·     password contains username.

¡     new password must be different from any previous password by a minimum of four chars.

¡     new password must be different from old password by a minimum of four chars.

·     password used already.

¡     password is in update-wait time.

¡     entered passwords did not match

·     unknown error.

Severity level

4 (Warning)

Example

LS/4/LS_PWD_MODIFY_FAIL: Admin admin from 1.1.1.1 could not modify the password for user user1, because old password is incorrect.

Impact

No negative impact on the system.

Cause

Possible causes:

·     The old password is incorrect

·     The password is too short.

·     The number of unique characters is fewer than 4.

·     Invalid password composition.

·     The password contains three or more consecutive identical characters.

·     The password contains the username.

·     The new password does not differ from a previous password by at least four characters.

·     The new password does not differ from the old password by at least four characters.

·     The password is identical to the current or a previous password.

·     The password update interval has not been reached.

·     The confirmation password entered is incorrect.

Recommended action

Troubleshoot according to the reason displayed in the message.

 

LS_PWD_MODIFY_SUCCESS

Message text

Admin [STRING] from [STRING] modify the password for user [STRING] successfully.

Variable fields

$1: Admin name.

$2: IP address.

$3: Username.

Severity level

6 (Informational)

Example

LS/6/LS_PWD_MODIFY_SUCCESS: Admin admin from 1.1.1.1 modify the password for user abc successfully.

Impact

No negative impact on the system.

Cause

An administrator successfully modified a user's password.

Recommended action

No action is required.

 

LS_REAUTHEN_FAILURE

Message text

User [STRING] from [STRING] failed reauthentication.

Variable fields

$1: Username.

$2: IP address.

Severity level

5 (Notification)

Example

LS/5/LS_REAUTHEN_FAILURE: User abcd from 1.1.1.1 failed reauthentication.

Impact

The user failed to change their password because the old password entered was incorrect.

Cause

When a user changes their own password during login or after successful login from the CLI, the system requires the user to enter the old password first. If verification of the old password fails, the system will output this log message.

Recommended action

Check the local user's old password. If it is correct, contact Technical Support for help.

 

LS_UPDATE_PASSWORD_FAIL

Message text

Failed to update the password for user [STRING].

Variable fields

$1: Username.

Severity level

4 (Warning)

Example

LS/4/LS_UPDATE_PASSWORD_FAIL: Failed to update the password for user abc.

Impact

The local user's password cannot be modified.

Cause

Adding, changing, or deleting a local user password from CLI failed. Possible reasons include:

·     The password does not meet security requirements, such as being too short or identical to the current or past passwords.

·     The local file system of the device is running out of memory space.

·     An anomaly occurs on the local lauth.dat file.

Recommended action

1.     Reset the password according to the system's prompt to meet security requirements.

2.     Execute the dir command in user view to check the remaining capacity information of local storage media (such as flash). If no enough remaining space is available, delete unnecessary files.

3.     Execute the dir command in user view to check for the lauth.dat file on local storage media (such as flash). If the file does not exist, has a size of 0, or is very small (likely an anomaly if less than 20B), please contact Technical Support for help.

 

LS_USER_CANCEL

Message text

User [STRING] from [STRING] cancelled inputting the password.

Variable fields

$1: Username.

$2: IP address.

Severity level

5 (Notification)

Example

LS/5/LS_USER_CANCEL: User 1 from 1.1.1.1 cancelled inputting the password.

Impact

No negative impact on the system.

Cause

The user cancelled inputting the password or did not input the password in 90 seconds.

Recommended action

No action is required.

 

LS_USER_PASSWORD_EXPIRE

Message text

User [STRING]'s login idle timer timed out.

Variable fields

$1: Username.

Severity level

5 (Notification)

Example

LS/5/LS_USER_PASSWORD_EXPIRE: User 1's login idle timer timed out.

Impact

No negative impact on the system.

Cause

After logging in, the local user was idle for a period that exceeded the idle timeout.

Recommended action

No action is required.

 

LS_USER_ROLE_CHANGE

Message text

Admin [STRING] [STRING] user role [STRING] for [STRING].

Variable fields

$1: Admin name.

$2: Added/Deleted.

$3: User role.

$4: Username.

Severity level

4 (Warning)

Example

LS/4/LS_USER_ROLE_CHANGE: Admin admin added user role network-admin for abcd.

Impact

No negative impact on the system.

Cause

The administrator added a user role for a local user.

Recommended action

No action is required.

 

MAC messages

This section contains MAC messages.

MAC_DRIVER_ADD_ENTRY

Message text

Driver failed to add MAC address entry: MAC address=[STRING], VLAN=[UINT32], State=[UINT32], interface=[STRING].

Variable fields

$1: MAC address.

$2: VLAN ID.

$3: Entry type number.

$4: Interface type and interface number.

Severity level

4 (Warning)

Example

MAC/4/MAC_DRIVER_ADD_ENTRY: Driver failed to add MAC address entry: MAC address=1-1-1, VLAN=1, State=2, interface=GigabitEthernet1/0/1.

Impact

The device cannot generate the specified MAC address entry.

Cause

The MAC address entry failed to be issued to the driver.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

MAC_NOTIFICATION

Message text

Pattern 1:

MAC address [STRING] in VLAN [UNIT32] has moved from port [STRING] to port [STRING] for [UNIT32] times.

Pattern 2:

MAC address [STRING] in VSI [STRING] has moved from [STRING] service-instance [UNIT32] to [STRING] service-instance [UNIT32] for [UNIT32] times.

Variable fields

Pattern 1:

$1: MAC address table

$2: VLAN ID.

$3: Interface name.

$4: Interface name.

$5: Number of MAC address moves.

Pattern 2:

$1: MAC address.

$2: VSI instance name.

$3: Interface name.

$4: Ethernet service instance ID.

$5: Interface name.

$4: Ethernet service instance ID.

$5: Number of MAC address moves.

Severity level

4 (Warning)

Example

Pattern 1:

MAC/4/MAC_NOTIFICATION: MAC address 0000-0012-0034 in VLAN 500 has moved from port GE1/0/1 to port GE1/0/2 for 1 times

Pattern 2:

MAC/4/MAC_NOTIFICATION: MAC address 0010-9400-0002 in VSI vpna has moved from Twenty-FiveGigE1/0/1 service-instance 40 to Twenty-FiveGigE1/0/3 service-instance 30 for 152499 times.

Impact

If MAC address moves occur frequently, Layer 2 loops might occur in the network to cause a broadcast storm.

Cause

Reason 1: Layer 2 loops exist in the network.

Reason 2: Malicious attacks exist in the network.

Recommended action

Reason 1:

Deploy the correct physical network topology to eliminate loops, or deploy loop avoidance protocols (such as spanning tree, loop protection, RRPP, and ERPS).

Reason 2:

1.     Use the mac-address mac-learning priority command to configure the MAC address learning priority for an interface, or use the mac-address notification mac-move suppression command to configure MAC address move suppression to avoid the impact of malicious attacks. If MAC address moves still occur frequently, proceed to step 2.

2.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

MAC_TABLE_FULL_GLOBAL

Message text

The number of MAC address entries reached the maximum number [UINT32].

Variable fields

$1: Maximum number of MAC addresses.

Severity level

4 (Warning)

Example

MAC/4/MAC_TABLE_FULL_GLOBAL: The number of MAC address entries reached the maximum number 1024.

Impact

The device cannot learn new MAC address entries.

Cause

The number of entries in the global MAC address table reached the maximum number supported by the table.

Recommended action

1.     Execute the display mac-address command to display all current MAC address entries.

2.     Execute the undo mac-address command in system view or interface view to delete unnecessary MAC address entries.

 

MAC_TABLE_FULL_PORT

Message text

The number of MAC address entries reached the maximum number [UINT32] for interface [STRING].

Variable fields

$1: Maximum number of MAC addresses.

$2: Interface name.

Severity level

4 (Warning)

Example

MAC/4/MAC_TABLE_FULL_PORT: The number of MAC address entries reached the maximum number 1024 for interface GigabitEthernet2/0/32.

Impact

The interface cannot learn new MAC address entries.

Cause

The number of entries in the MAC address table for an interface reached the maximum number supported by the table.

Recommended action

Use the display mac-address interface interface-type interface-number command to identify whether the MAC address entries on the interface are the required ones:

·     If yes, execute the mac-address max-mac-count command on this interface to increase the MAC address learning limit.

·     If not, execute the undo mac-address command on the interface to delete unnecessary MAC address entries.

 

MAC_TABLE_FULL_VLAN

Message text

The number of MAC address entries reached the maximum number [UINT32] in VLAN [UINT32].

Variable fields

$1: Maximum number of MAC addresses.

$2: VLAN ID.

Severity level

4 (Warning)

Example

MAC/4/MAC_TABLE_FULL_VLAN: The number of MAC address entries reached the maximum number 1024 in VLAN 2.

Impact

The VLAN cannot learn new MAC address entries.

Cause

The number of entries in the MAC address table for a VLAN reached the maximum number supported by the table.

Recommended action

Use the display mac-address interface vlan vlan-id command to identify whether the MAC address entries for the VLAN are the required ones:

·     If yes, execute the mac-address max-mac-count command in the view of this VLAN to increase the MAC address learning limit.

·     If not, execute the undo mac-address command in the view of this VLAN to delete unnecessary MAC address entries.

 

MAC_VLAN_LEARNLIMIT_NORESOURCE

Message text

The card does not have enough hardware resources to set MAC learning limit for VLAN [UINT16].

Variable fields

$1: VLAN ID.

Severity level

5 (Notification)

Example

MAC/5/MAC_VLAN_LEARNLIMIT_NORESOURCE: The card does not have enough hardware resources to set MAC learning limit for VLAN 100.

Impact

The MAC learning limit cannot be set for a VLAN.

Cause

The hardware resources of the card are insufficient.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

MAC_VLAN_LEARNLIMIT_NOTSUPPORT

Message text

The card does not support setting MAC learning limit for VLAN [UINT16].

Variable fields

$1: VLAN ID.

Severity level

5 (Notification)

Example

MAC/5/ MAC_VLAN_LEARNLIMIT_NOTSUPPORT: The card does not support setting MAC learning limit for VLAN 100.

Impact

The MAC learning limit cannot be set for a VLAN.

Cause

The card does not support configuring this feature.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

MACA messages

This section contains MAC authentication messages.

MACA_ENABLE_NOT_EFFECTIVE

Message text

MAC authentication is enabled but is not effective on interface [STRING].

Variable fields

$1: Interface name.

Severity level

3 (Error)

Example

MACA/3/MACA_ENABLE_NOT_EFFECTIVE: MAC authentication is enabled but is not effective on interface Ethernet3/1/2.

Impact

The MAC authentication feature does not take effect on the interface.

Cause

MAC authentication is configured on an interface does not support MAC authentication.

Recommended action

1.     Disable MAC authentication on the interface.

2.     Reconnect the connected devices to another interface that supports MAC authentication.

3.     Enable MAC authentication on the new interface.

 

MACA_LOGIN_FAILURE

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]-UsernameFormat=[STRING]; User failed MAC authentication. Reason: [STRING].

Variable fields

$1: Interface name.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: User account format.

$6: Failure reason.

¡     MAC address authorization failed.

¡     VLAN authorization failed.

¡     VSI authorization failed.

¡     ACL authorization failed.

¡     User profile authorization failed.

¡     URL authorization failed.

¡     Authentication process failed.

Severity level

6 (Informational)

Example

MACA/6/MACA_LOGIN_FAILURE: -IfName=GigabitEthernet1/0/1-MACAddr=0000-0000-0001-VLANID=1-Username=0000-0000-0001-UsernameFormat=MAC address; User failed MAC authentication. Reason: VLAN authorization failed.

Impact

MAC authentication users cannot come online.

Cause

See the log message for the failure reason.

Recommended action

1.     Verify that the devices are connected normally.

2.     Verify that the MAC authentication settings are correct.

3.     Locate the failure reason and resolve the issue according to the failure reason. If the configuration of the device or authentication server is incorrect, promptly modify the configuration of the device or server.

4.     If the issue persists, collect alarm information, log information, and configuration data, and then contact Technical Support for help.

 

MACA_LOGIN_SUCC

Message text

-IfName=[STRING]-MACAddr=[STRING]-AccessVLANID=[STRING]-AuthorizationVLANID=[STRING]-Username=[STRING]-UsernameFormat=[STRING]; User passed MAC authentication and came online.

Variable fields

$1: Interface name.

$2: MAC address.

$3: ID of the access VLAN.

$4: ID of the authorization VLAN.

$5: Username.

$5: User account format.

Severity level

6 (Informational)

Example

MACA/6/MACA_LOGIN_SUCC:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-AccessVLANID=444-AuthorizationVLANID=444-Username=00-10-84-00-22-b9-UsernameFormat=MAC address; User passed MAC authentication and came online.

Impact

MAC authentication users come online.

Cause

The user passed MAC authentication.

Recommended action

No action is required.

 

MACA_LOGIN_SUCC (in open mode)

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]-UsernameFormat=[STRING]; The user that failed MAC authentication passed open authentication and came online.

Variable fields

$1: Interface name.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: User account format.

Severity level

6 (Informational)

Example

MACA/6/MACA_LOGIN_SUCC:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=00-10-84-00-22-b9-UsernameFormat=MAC address; The user that failed MAC authentication passed open authentication and came online.

Impact

MAC authentication users come online.

Cause

A user failed MAC authentication but passed open authentication.

Recommended action

No action is required.

 

MACA_LOGOFF

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]-UsernameFormat=[STRING]; MAC authentication user was logged off.

Variable fields

$1: Interface name.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: User account format.

Severity level

6 (Informational)

Example

MACA/6/MACA_LOGOFF:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=00-10-84-00-22-b9-UsernameFormat=MAC address; MAC authentication user was logged off.

Impact

The MAC address authentication user goes offline.

Cause

Common reasons for an MAC authentication user to go offline include:

·     The MAC address authentication user actively goes offline.

·     A user with the same MAC address uses 802.1X authentication to come online again.

·     The MAC address authentication configuration on the device changes.

·     Real-time traffic accounting fails for the MAC address authentication user.

·     The MAC authentication user failed to pass re-authentication.

·     The server forces the user to go offline.

·     The user goes offline after offline detection is enabled.

·     The session of the user times out.

Recommended action

1.     If the user goes offline normally, no action is required.

2.     If the user goes offline abnormally, perform the following tasks:

a.     Make sure the link between the device and the server is normal. If the link is abnormal, restore the link.

b.     Identify whether the user has passed 802.1X authentication. Use the display dot1x connection command to identify whether the current MAC address has successfully come online through 802.1X authentication. If the user comes online through 802.1X authentication, to maintain the MAC authentication user identity, log off the corresponding 802.1X user and disable 802.1X authentication, and then try MAC authentication again.

c.     Identify whether the device and server configurations related to MAC authentication have changed, such as both global and interface-level MAC authentication state, consistent authentication method configuration on the server and device, and authentication domain configuration.

3.     If the issue cannot be located or resolved, collect alarm information, log information, and configuration data, and then contact Technical Support for help.

 

MACA_LOGOFF (in open mode)

Message text

-IfName=[STRING]-MACAddr=[STRING]-VLANID=[STRING]-Username=[STRING]-UsernameFormat=[STRING]; MAC authentication open user was logged off.

Variable fields

$1: Interface name.

$2: MAC address.

$3: VLAN ID.

$4: Username.

$5: User account format.

Severity level

6 (Informational)

Example

MACA/6/MACA_LOGOFF:-IfName=GigabitEthernet1/0/4-MACAddr=0010-8400-22b9-VLANID=444-Username=00-10-84-00-22-b9-UsernameFormat=MAC address; MAC authentication open user was logged off.

Impact

A MAC authentication user in open mode goes offline.

Cause

Common reasons for MAC authentication users to go offline include:

·     MAC address authentication users actively go offline.

·     A user with the same MAC address uses 802.1X authentication to come online again.

·     The MAC address authentication configuration on the device changes.

·     Real-time traffic accounting fails for the MAC address authentication user.

·     The MAC authentication user failed to pass re-authentication.

·     The server forces the user to go offline

·     The user goes offline after offline detection is enabled.

·     The session of the user times out.

Recommended action

1.     If the user goes offline normally, no action is required.

2.     If the user goes offline abnormally, perform the following tasks:

a.     Make sure the link between the device and the server is normal. If the link is abnormal, restore the link.

b.     Identify whether the user has passed 802.1X authentication. Use the display dot1x connection command to identify whether the current MAC address has successfully come online through 802.1X authentication. If the user comes online through 802.1X authentication, to maintain the MAC authentication user identity, log off the corresponding 802.1X user and disable 802.1X authentication, and then try MAC authentication again.

c.     Identify whether the device and server configurations related to MAC authentication have changed, such as both global and interface-level MAC authentication state, consistent authentication method configuration on the server and device, and authentication domain configuration.

3.     If the issue cannot be located or resolved, collect alarm information, log information, and configuration data, and then contact Technical Support for help.

 

 

 

MFIB messages

This section contains MFIB messages.

MFIB_MEM_ALERT

Message text

MFIB process received system memory alert [STRING] event.

Variable fields

$1: Type of the memory alert event.

Severity level

5 (Notification)

Example

MFIB/5/MFIB_MEM_ALERT: MFIB process received system memory alert start event.

Impact

Multicast routing and forwarding functions might not work.

Cause

Memory resources are insufficient.

Recommended action

1.     Release memory resources. For example, you can use the logfile save command to save logs in the log file buffer to the log file.

2.     Execute the display memory command to view memory usage information.

¡     If the memory usage does not fall below the threshold, use the display process command to identify the processes with high memory usage. If the memory usage of a process is high, disable the corresponding software feature.

¡     If the memory usage falls below the threshold, no action is required.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

NAT messages

This section contains NAT messages.

EIM_MODE_PORT_USAGE_ALARM

Message text

[STRING] Port usage reaches [STRING]%; SrcIPAddr=[IPADDR]; VPNInstance=[STRING]; NATIPAddr=[IPADDR]; ConnectCount=[UINT16].

Variable fields

$1: Protocol type:

¡     UDP.

¡     TCP.

¡     ICMP.

¡     TOTAL.

$2: Percentage.

$3: Source IP address.

$4: Source VPN instance name.

$5: Source IP address after translation.

$6: Numbers of ports that are assigned.

Severity level

6 (Informational)

Example

NAT/6/EIM_MODE_PORT_USAGE_ALARM: UDP Port usage reaches 40%; SrcIPAddr=1.1.1.211; VPNInstance=-; NATIPAddr=198.1.1.16; ConnectCount=40.

Impact

When the message is initially generated, it has no negative impact on services. However, if the number of sessions reaches the maximum number of ports that can be used by users, session establishment will fail.

Explanation

This message is sent in the following conditions:

·     The resource usage in the port block reaches or exceeds the threshold set by the nat log port-block port-usage threshold command.

·     The Endpoint-Independent Mapping mode is applied.

Recommended action

1.     Use the nat log port-block port-usage threshold command to set a larger threshold for port usage in port blocks, and then identify whether the log message is still generated.

¡     If the log message is not generated, the processing is completed.

¡     If the log message is still generated, proceed to step 2.

2.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

NAT_ADDR_BIND_CONFLICT

Message text

Failed to activate NAT configuration on interface [STRING], because global IP addresses already bound to another service card.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

NAT/4/NAT_ADDR_BIND_CONFLICT: Failed to activate NAT configuration on interface GigabitEthernet1/0/1, because global IP addresses already bound to another service card.

Impact

The NAT configuration succeeds but does not take effect.

Cause

The public IP addresses that the interface references have been bound to another service card.

Recommended action

1.     Execute the display nat all command to identify whether multiple interfaces reference the same address group or public IP addresses.

¡     If multiple interfaces reference the same address group or public IP addresses, you must specify the same service card for the interfaces. On each interface where configuration modification is required, execute the undo nat service command to cancel the specified slot, and then execute the nat service command to re-specify a slot. Make sure the specified slots for the interfaces are the same.

¡     If multiple interfaces do not reference the same address group or public IP addresses, go to step 2.

2.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

NAT_EIM

Message text

Protocol(1001)=[STRING];LocalIPAddr(1003)=[IPADDR];LocalPort(1004)=[UINT16];GlobalIPAddr(1005)=[IPADDR];GlobalPort(1006)=[UINT16];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];RcvDSLiteTunnelPeer(1040)=[STRING];BeginTime_e(1013)=[STRING];EndTime_e(1014)=[STRING];Event(1048)=([UNIT16])[STRING];

Variable fields

$1: Protocol type.

$2: Source IP address.

$3: Source port number.

$4: Source IP address after translation.

$5: Source port number after translation.

$6: Source VPN instance name.

$7: Destination VPN instance name.

$8: Source DS-Lite tunnel.

$9: Time when the EIM entry was created.

$10: Time when the EIM entry was removed.

$11: Event type. Available values are 1 and 8.

$12: NAT EIM entry deleted description:

¡     NAT EIM entry created: A NAT EIM entry was created. The value for the event type field is 8.

¡     NAT EIM entry deleted: A NAT EIM entry was deleted. The value for the event type field is 1.

Severity level

6 (Informational)

Example

NAT/6/NAT_EIM: -Protocol(1001)=UDP;LocalIPAddr(1003)=1.1.1.2;LocalPort(1004)=1024;GlobalIPAddr(1005)=30.3.1.231;GlobalPort(1006)=1026;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;RcvDSLiteTunnelPeer(1040)=;BeginTime_e(1013)=10261971001739;EndTime_e(1014)=;Event(1048)=(8)NAT EIM entry created;

Impact

No negative impact on the system.

Cause

This message is sent when a NAT EIM entry is created or deleted.

Recommended action

No action is required.

 

NAT_FLOW

Message text

Protocol(1001)=[STRING];Application(1002)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];InitPktCount(1044)=[UINT32];InitByteCount(1046)=[UINT32];RplyPktCount(1045)=[UINT32];RplyByteCount(1047)=[UINT32];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];RcvDSLiteTunnelPeer(1040)=[STRING];SndDSLiteTunnelPeer(1041)=[STRING];BeginTime_e(1013)=[STRING];EndTime_e(1014)=[STRING];Event(1048)=([UINT16])[STRING];VlanID(1175)=[UINT16];VNI(1213)=[UINT32];

Variable fields

$1: Protocol type.

$2: Application layer protocol.

$3: Source IP address.

$4: Source port number.

$5: Source IP address after translation.

$6: Source port number after translation.

$7: Destination IP address.

$8: Destination port number.

$9: Destination IP address after translation.

$10: Destination port number after translation.

$11: Total number of incoming packets.

$12: Total number of incoming bytes.

$13: Total number of outgoing packets.

$14: Total number of outgoing bytes.

$15: Source VPN instance name.

$16: Destination VPN instance name.

$17: Source DS-Lite tunnel.

$18: Destination DS-Lite tunnel.

$19: Time when the session is created.

$20: Time when the session is deleted.

$21: Event type. Available values are 1, 2, 3, 6, 8, and 254.

$22: Event description:

¡     Session created: A NAT session was created. The value for the event type field is 8.

¡     Active data flow timeout: The duration of a NAT session exceeded the active data flow time. The value for the event type field is 6.

¡     Normal over: A NAT session ended and was deleted. The value for the event type field is 1.

¡     Aged for timeout: A NAT session was deleted because it aged out. The value for the event type field is 2.

¡     Aged for reset or config-change: A NAT session was deleted by configuration. The value for the event type field is 3.

¡     Other: A NAT session was deleted because of other reasons. For example, it was deleted by another module. The value for the event type field is 254.

$23: VLAN ID of the session.

$24: VXLAN ID of the session.

Severity level

6 (Informational)

Example

NAT/6/NAT_FLOW: Protocol(1001)=UDP;Application(1002)=other;SrcIPAddr(1003)=1.1.1.2;SrcPort(1004)=1024;NatSrcIPAddr(1005)=30.3.1.231;NatSrcPort(1006)=1026;DstIPAddr(1007)=2.1.1.2;DstPort(1008)=1024;NatDstIPAddr(1009)=2.1.1.2;NatDstPort(1010)=1024;InitPktCount(1044)=1;InitByteCount(1046)=110;RplyPktCount(1045)=0;RplyByteCount(1047)=0;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;RcvDSLiteTunnelPeer(1040)=;SndDSLiteTunnelPeer(1041)=;BeginTime_e(1013)=03232019091640;EndTime_e(1014)=;Event(1048)=(8)Session created;VlanID(1175)=--;VNI(1213)=--;

Impact

No negative impact on the system.

Cause

This message is sent in one of the following conditions:

·     A NAT session is created or deleted.

·     Regularly during a NAT session.

·     The traffic threshold or aging time of a NAT session is reached.

Recommended action

No action is required.

 

NAT_SERVER_INVALID

Message text

The NAT server with Easy IP is invalid because its global settings conflict with that of another NAT server on this interface.

Variable fields

N/A

Severity level

4 (Warning)

Example

NAT/4/NAT_SERVER_INVALID: The NAT server with Easy IP is invalid because its global settings conflict with that of another NAT server on this interface.

Impact

The NAT Server with Easy IP cannot take effect.

Cause

The global settings of the NAT Server with Easy IP conflict with those of another NAT Server on the same interface.

Recommended action

1.     Execute the display nat all command to check the NAT Server configuration in the NAT internal server information field.

2.     Execute the nat server command to modify the NAT Server configuration. Make sure the combination of protocol type, public IP addresses and public ports is unique for each NAT Server on the same interface.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

NAT_SERVICE_CARD_RECOVER_FAILURE

Message text

Pattern 1:

Failed to recover the configuration of binding the service card on slot [UINT16] to interface [STRING], because [STRING].

Pattern 2:

Failed to recover the configuration of binding the service card on chassis [UINT16] slot [UINT16] to interface [STRING], because [STRING].

Variable fields

Pattern 1:

$1: Slot number.

$2: Interface name.

$3: Reasons why restoring the binding between the service card and the interface fails.

Pattern 2:

$1: Chassis number.

$2: Slot number.

$3: Interface name.

$4: Reasons why restoring the binding between the service card and the interface fails.

Severity level

4 (Warning)

Example

NAT/4/NAT_SERVICE_CARD_RECOVER_FAILURE: Failed to recover the configuration of binding the service card on chassis 2 slot 3 to interface Ethernet0/0/2, because NAT service is not supported on this service card.

Impact

The service card cannot process NAT services.

Cause

·     The NAT addresses have already been bound to another service card.

·     The specified service card does not support NAT services.

·     Hardware resources are insufficient.

Recommended action

1.     Check the value for the because field in the log message.

¡     If the value is NAT addresses already bound to another service card, use the display nat all command to check NAT configuration. Edit the configuration to specify the same service card for the interfaces that reference the same public IP addresses.

¡     If the value is NAT service is not supported on this service card, the hardware resources are not enough, or unknown error, check the service card for hardware problems.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

NAT444_SYSLOG

Message text

Failed to allocate port blocks from address group [UINT16].

Variable fields

$1: Address group ID.

Severity level

6 (Informational)

Example

NAT/6/NAT444_SYSLOG: Failed to allocate port blocks from address group 3.

Impact

Subsequent users cannot come online.

Cause

This message is sent when NAT444 port block allocation failure occurs.

Recommended action

1.     Check the address group ID in the log message, and then use the nat address-group command to enter the view of the address group.

2.     Use the port-block or block-size command to adjust the number of port blocks that can be allocated from the address group. Alternatively, specify the extended-block-size keyword when executing the port-block command to enable the address group to allocate extended port blocks.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PORT_USAGE_ALARM

Message text

Port usage reaches [STRING]%; SrcIPAddr=[IPADDR]; VPNInstance=[STRING]; NATIPAddr=[IPADDR]; ConnectCount=[UINT16].

Variable fields

$1: Percentage.

$2: Source IP address.

$3: Source VPN instance name.

$4: Source IP address after translation.

$5: Number of allocated ports.

Severity level

6 (Informational)

Example

NAT/6/PORT_USAGE_ALARM: Port usage reaches 40%; SrcIPAddr=1.1.1.211; VPNInstance=-; NATIPAddr=16.1.1.198; ConnectCount=40.

Impact

When the message is initially generated, the issue has no negative impact on services. However, if the number of ports allocated to users reaches the upper limit, session establishment will fail.

Cause

This message is sent in the following conditions:

·     The resource usage in the port block reaches or exceeds the threshold set by the nat log port-block port-usage threshold command.

·     The Connection-Dependent Mapping mode is applied.

Recommended action

1.     Use the nat log port-block port-usage threshold command to set a larger threshold for port usage in port blocks, and then identify whether the log message is still generated.

¡     If the log message is not generated, the processing is completed.

¡     If the log message is still generated, proceed to step 2.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PORTBLOCK_ALARM

Message text

Address group [UINT16]; total port blocks [UINT16]; active port blocks [UINT16]; usage over [UINT16]%.

Variable fields

$1: Address group ID.

$2: Total number of port blocks.

$3: Number of allocated port blocks.

$4: Port block usage.

Severity level

6 (Informational)

Example

NAT/6/PORTBLOCK_ALARM: Address group 3; total port blocks 16575; active port blocks 6630; usage over 40%.

Impact

When the message is initially generated, the issue has no negative impact on services. However, if the number of ports allocated to users reaches the upper limit of the address group, new users will fail to apply for public ports.

Cause

This message is sent when the port block usage reaches or exceeds the threshold set by the nat log port-block usage threshold command.

Recommended action

1.     Use the display current-configuration command to obtain the threshold for port usage in port blocks set by the nat log port-block usage threshold command.

¡     If the threshold is too small, use the nat log port-block usage threshold command to set a large threshold (not larger than 90%). Then, identify whether the log message is still generated. If the log message is not generated, the processing is completed. If the log message is still generated, proceed to step 2.

¡     If the threshold is appropriate, proceed to step 2.

2.     Add port block resources. (Use the port-range command to add port resources or use the address command to add address resources.) Then identify whether the log message is still generated.

¡     If the log message is not generated, the processing is completed.

¡     If the log message is still generated, proceed to step 3.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PORTBLOCKGRP_MEMORY_WARNING

Message text

Insufficient memory caused by excessive public addresses in port block group [UINT16]. Please reconfigure the public address space.

Variable fields

$1: NAT port block group ID.

Severity level

4 (Warning)

Example

NAT/4/PORTBLOCKGRP_MEMORY_WARNING: Insufficient memory caused by excessive public addresses in port block group 1. Please reconfigure the public address space.

Impact

NAT port block group configuration has failed to be deployed.

Cause

This message is sent when a public address range in a NAT port block group is too large, which causes insufficient memory.

Recommended action

1.     Obtain the NAT port block group ID from the log message, and then use the nat port-block-group command to enter the view of the NAT port block group.

2.     Use the undo global-ip-pool command to remove public IP address ranges from the NAT port block group until this message is no longer generated.

 

ND

This section contains ND messages.

ND_CONFLICT

Message text

[STRING] is inconsistent.

Variable fields

$1: Configuration type. Options include the following:

·     M_FLAG: Configuration flag for managed address.

·     O_FLAG: Configuration flag for other information.

·     CUR_HOP_LIMIT: Hop count limit.

·     REACHABLE TIME: Time to maintain neighbor reachability.

·     NS INTERVAL: Neighbor solicitation message interval.

·     MTU: MTU for the advertised link.

·     PREFIX VALID TIME: Valid lifetime of the prefix.

·     PREFIX PREFERRED TIME: Preferred lifetime of the prefix for stateless address configuration.

Severity level

6 (Informational)

Example

ND/6/ND_CONFLICT: PREFIX VALID TIME is inconsistent.

Impact

User service or traffic might be interrupted.

Cause

The device received a route advertisement message, causing inconsistency with the configuration on the neighboring router.

Recommended action

Check the device configuration and modify it to match the configuration on the neighboring router.

 

ND_DUPADDR

Message text

Duplicate address: [STRING] on the interface [STRING].

Variable fields

$1: The IPv6 address to be assigned.

$2: Interface name.

Severity level

6 (Informational)

Example

ND/6/ND_DUPADDR: Duplicate address: 33::8 on the interface Vlan-interface9.

Impact

No negative impact on the system.

Cause

The IPv6 address has been used by other devices in the network.

Recommended action

Based on network planning and provisioning, assign a new IPv6 address to this interface.

 

ND_ENTRY_ENOUGHRESOURCE

Message text

Issued the software entry to the driver for IPv6 address [STRING] on VPN instance [STRING].

Issued the software entry to the driver for IPv6 address [STRING] on the public network.

Variable fields

$1: IPv6 address.

$2: VPN instance name. If the ND entry belongs to the public network, the VPN instance-related field is not displayed.

Severity level

6 (Informational)

Example

ND/6/ND_ENTRY_ENOUGHRESOURCE: Issued the software entry to the driver for IPv6 address 10::1 on VPN instance vpn_1.

ND/6/ND_ENTRY_ENOUGHRESOURCE: Issued the software entry to the driver for IPv6 address 10::2 on the public network.

Impact

No negative impact on the system.

Cause

After enabling the ND entry consistency check function with the ipv6 nd consistency-check enable command, this log will be output if the ND hardware entry is successfully refreshed.

Recommended action

No action is required.

 

ND_ENTRY_INCONSISTENT

Message text

Inconsistent software and hardware ND entries for IPv6 address [STRING] on VPN instance [STRING]. Inconsistent parameters: [STRING].

Inconsistent software and hardware ND entries for IPv6 address [STRING] on the public network. Inconsistent parameters: [STRING].

Variable fields

$1: IPv6 address.

$2: VPN instance name. If the ND entry belongs to the public network, the VPN instance-related field is not displayed.

$3: Inconsistent entry parameter types.

¡     MAC address: MAC address.

¡     output interface: Output interface of ND entry.

¡     output port : Output port of ND entry.

¡     outermost layer VLAN ID: Layer 1 VLAN tag.

¡     second outermost layer VLAN ID: Layer 2 VLAN tag.

¡     VSI index: VSI index.

¡     link ID: VSI output link identifier.

Severity level

6 (Informational)

Example

ND/6/ND_ENTRY_INCONSISTENT: Inconsistent software and hardware ND entries for IPv6 address 10::1 on VPN instance vpn_1. Inconsistent parameters: MAC address, output port, VSI index, and link ID.

ND/6/ND_ENTRY_INCONSISTENT: Inconsistent software and hardware ND entries for IPv6 address 10::2 on the public network. Inconsistent parameters: MAC address, output port, VSI index, and link ID.

Impact

Service traffic might be interrupted.

Cause

After enabling the ND entry consistency check function with the ipv6 nd consistency-check enable command, if the device detects inconsistencies between ND software entries and hardware entries (such as the output interface of ND entry), this log will be output.

Recommended action

No action is required. The ND module will automatically refresh the hardware entries based on the ND software entries.

 

ND_ENTRY_NORESOURCE

Message text

Not enough hardware resources to issue the software entry to the driver for IPv6 address [STRING] on VPN instance [STRING].

Not enough hardware resources to issue the software entry to the driver for IPv6 address [STRING] on the public network.

Variable fields

$1: IPv6 address.

$2: VPN instance name. If the ND entry belongs to the public network, the VPN instance-related field is not displayed.

Severity level

6 (Informational)

Example

ND/6/ND_ENTRY_NORESOURCE: Not enough hardware resources to issue the software entry to the driver for IPv6 address 10::1 on VPN instance vpn_1.

ND/6/ND_ENTRY_NORESOURCE: Not enough hardware resources to issue the software entry to the driver for IPv6 address 10::2 on the public network.

Impact

No negative impact on the system.

Cause

After enabling the ND entry consistency check function through the ipv6 nd consistency-check enable command, if the driver does not have enough ND hardware entry resources when the ND software entry is issued, this log will be output.

Recommended action

No action is required. ND module will actively refresh the driver's hardware entries based on the ND software entries.

 

ND_LOCALPROXY_ENABLE_FAILED

Message text

Failed to enable local ND proxy on interface [STRING].

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

ND/4/ND_LOCALPROXY_ENABLE_FAILED: Failed to enable local ND proxy on interface Vlan-interface 1.

Impact

User service or traffic might be interrupted.

Cause

Possible causes include:

·     Failed to enable local ND proxy on an interface.

·     If local ND proxy is successfully enabled on an MPU interface but fails to be enabled on a non-MPU interface, the log message is generated on the corresponding interface card.

Recommended action

1.     Check if the corresponding card of the device supports local ND proxy.

2.     Check if the hardware resources of the device are sufficient, and remove unnecessary configuration.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_MAC_CHECK

Message text

Packet received on interface [STRING] was dropped because source MAC [STRING] was inconsistent with link-layer address [STRING].

Variable fields

$1: Name of the interface the received the ND packets.

$2: Source MAC address in ND packets.

$3: Link layer source MAC address in ND packets.

Severity level

6 (Informational)

Example

ND/6/ND_MAC_CHECK: Packet received on interface Ethernet2/0/2 was dropped because source MAC 0002-0002-0001 was inconsistent with link-layer address 0002-0002-0002.

Impact

No negative impact on the system.

Cause

Enable ND protocol packet source MAC address consistency check with 'execute ipv6 nd mac-check enable' command, and enable ND log information with 'execute ipv6 nd check log enable' command. If the MAC address in the received ND protocol packet and the MAC address in the source link layer option address do not match, check the legitimacy of the link layer source MAC address corresponding to the host. If the host is illegal, disconnect it from the network.

Recommended action

1.     Check the legality of the link layer source MAC address corresponding to the host. If the host is illegal, it needs to be disconnected from the network.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_RAGUARD_DROP

Message text

Dropped RA messages with the source IPv6 address [STRING] on interface [STRING]. [STRING] messages dropped in total on the interface.

Variable fields

$1: Source IPv6 address of discarded messages.

$2: Port name of discarded messages.

$3: Total number of messages discarded by the port.

Severity level

4 (Warning)

Example

ND/4/ND_RAGUARD_DROP: Dropped RA messages with the source IPv6 address FE80::20 on interface GigabitEthernet1/0/1. 20 RA messages dropped in total on the interface.

Impact

The network might have an RA message spoofing attack, affecting normal device operation.

Cause

RA Guard detected illegal RA messages, indicating possible RA message spoofing attacks in the network.

Recommended action

1.     Check if the device sending the RA message is legitimate. If the device is illegal, disconnect it from the network.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_RATE_EXCEEDED

Message text

The ND packet rate ([UINT32] pps) exceeded the rate limit ([UINT32] pps) on interface [STRING] in most recent [UINT32] seconds.

Variable fields

$1: ND message rate.

$2: ND message rate limit.

$3: Interface name.

$4: Interval.

Severity level

4 (Warning)

Example

ND/4/ND_RATE_EXCEEDED: The ND packet rate (100 pps) exceeded the rate limit (80 pps) on interface GigabitEthernet1/0/1 in most recent 10 seconds.

Impact

When the rate of receiving ND messages on the interface exceeds the ND rate limit, it will be discarded, which may affect normal ND learning and response, causing traffic forwarding failure.

Cause

During a certain period of time, the rate of receiving ND messages on the interface exceeded the ND message limit value.

Recommended action

1.     Check if the received ND messages on the interface are normal.

¡     If the received ND messages are all reasonable, execute the ipv6 nd rate-limit command to increase the value of the ND message rate limit on the specified interface.

¡     If abnormal ND messages are detected, please proceed to step 2.

2.     Check if there is an ND message attack in the network by capturing packets and find the source of the attack.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_RATELIMIT_NOTSUPPORT

Message text

Pattern 1:

ND packet rate limit is not support on slot [INT32].

Pattern 2:

ND packet rate limit is not support on chassis [INT32] slot [INT32].

Variable fields

Pattern 1:

$1: Slot number.

Pattern 2:

$1: Chassis number.

$2: Slot number.

Severity level

6 (Informational)

Example

ND/6/ND_RATELIMIT_NOTSUPPORT: ND packet rate limit is not support on slot 2.

ND/6/ND_RATELIMIT_NOTSUPPORT: ND packet rate limit is not support on chassis 1 slot 2.

Impact

No negative impact on the system.

Cause

Pattern 1:

ND packet rate limit is not supported on the specified slot.

Pattern 2:

ND packet rate limit is not supported on the specified slot of the specified chassis.

Recommended action

No action is required.

 

ND_SET_PORT_TRUST_NORESOURCE

Message text

Not enough resources to complete the operation.

Variable fields

N/A

Severity level

6 (Informational)

Example

ND/6/ND_SET_PORT_TRUST_NORESOURCE: Not enough resources to complete the operation.

Impact

Driver resources are insufficient, which affects normal service operation.

Cause

This message is generated when the driver resources are insufficient during port rule deployment.

Recommended action

1.     Release device driver resources and redeploy the port rule.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_SET_VLAN_REDIRECT_NORESOURCE

Message text

Not enough resources to complete the operation.

Variable fields

N/A

Severity level

6 (Informational)

Example

ND/6/ND_SET_VLAN_REDIRECT_NORESOURCE: Not enough resources to complete the operation.

Impact

Driver resources are insufficient, which affects normal service operation.

Cause

This message is generated when the driver resources are insufficient during VLAN rule deployment.

Recommended action

1.     Release device driver resources and redeploy the VLAN rule.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_SNOOPING_LEARN_ALARM_REACH

Message text

The alarm threshold for global ND snooping entry learning was reached.

Variable fields

N/A

Severity level

4 (Warning)

Example

ND/4/ND_SNOOPING_LEARN_ALARM_REACH : The alarm threshold for global ND snooping entry learning was reached.

Impact

The device might not learn new ND snooping entries, which affects normal service operation.

Cause

The number of global ND snooping entries has reached the alarm threshold. The network might have an ND attack.

Recommended action

1.     Check the network for any ND attack by capturing packets and identify the attack source.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_SNOOPING_LEARN_ALARM_RECOVER

Message text

The alarm for global ND snooping entry learning was recovered.

Variable fields

N/A

Severity level

4 (Warning)

Example

ND/4/ND_SNOOPING_LEARN_ALARM_RECOVER : The alarm for global ND snooping entry learning was recovered.

Impact

No negative impact on the system.

Cause

The number of global ND snooping entries drops below the alarm threshold.

Recommended action

No action is required.

 

ND_USER_DUPLICATE_IPV6ADDR

Message text

Detected a user IPv6 address conflict. New user (MAC [STRING], SVLAN [STRING], CVLAN [STRING]) on interface [STRING] and old user (MAC [STRING], SVLAN [STRING], CVLAN [STRING]) on interface [STRING] were using the same IPv6 address [IPV6ADDR].

Variable fields

$1: New user's MAC address.

$2: New user's outer VLAN.

$3: New user's inner VLAN.

$4: Name of the interface connecting to the new user.

$5: Old user's MAC address.

$6: Old user's outer VLAN.

$7: Old user's inner VLAN.

$8: Name of the interface connecting to the old user.

$9: Endpoint user's IPv6 address.

Severity level

6 (Informational)

Example

ND/6/ND_USER_DUPLICATE_IPV6ADDR: Detected a user IPv6 address conflict. New user (MAC 0010-2100-01e1, SVLAN 100, CVLAN 10) on interface GigabitEthernet1/0/1 and old user (MAC 0120-1e00-0102, SVLAN 100, CVLAN 10) on interface GigabitEthernet1/0/1 were using the same IPv6 address 10::1.

Impact

The network might have conflicting IPv6 addresses, which might cause user service or traffic interruption.

Cause

This message is generated when the device detects a user IPv6 address conflict after you enable recording user IPv6 address conflicts by using the ipv6 nd user-ip-conflict record enable command.

Recommended action

1.     Check the IPv6 addresses of all endpoint users and adjust the conflicting IPv6 addresses.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_USER_MOVE

Message text

Detected a user (IPv6 address [IPV6ADDR], MAC address [STRING]) moved to another interface. Before user move: interface [STRING], SVLAN [STRING], CVLAN [STRING]. After user move: interface [STRING], SVLAN [STRING], CVLAN [STRING].

Variable fields

$1: IPv6 address of the user.

$2: MAC address of the user.

$3: Interface name before migration.

$4: Outer VLAN of the user before migration.

$5: Inner VLAN of the user before migration.

$6: Interface name after migration.

$7: Outer VLAN of the user after migration.

$8: Inner VLAN of the user after migration.

Severity level

6 (Informational)

Example

ND/6/ND_USER_MOVE: Detected a user (IPv6 address 10::1, MAC address 0010-2100-01e1) moved to another interface. Before user move: interface GigabitEthernet1/0/1, SVLAN 100, CVLAN 20. After user move: interface GigabitEthernet1/0/2, SVLAN 100, CVLAN 10.

Impact

This might cause user service interruption. A large number of user migration operations might degrade device performance.

Cause

After you enable recording user port migrations by using the ipv6 nd user-move record enable command, an endpoint user migrates between ports.

Recommended action

1.     Use the ddisplay ipv6 nd user-move record command to view user port migration entry information and identify whether the migration is reasonable.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

ND_USER_OFFLINE

Message text

Detected a user (IPv6 address [IPV6ADDR], MAC address [STRING]) was offline from interface [STRING].

Variable fields

$1: Offline user's IPv6 address.

$2: Offline user's MAC address.

$3: Name of the interface connecting to the offline user.

Severity level

6 (Informational)

Example

ND/6/ND_USER_OFFLINE: Detected a user (IPv6 address 10::1, MAC address 0010-2100-01e1) was offline from interface GigabitEthernet1/0/1.

Impact

No negative impact on the system.

Cause

After you enable ND logging for user online and offline events by using the ipv6 nd online-offline-log enable command, the device outputs this log when it detects a user offline event.

Recommended action

No action is required.

 

ND_USER_ONLINE

Message text

Detected a user (IPv6 address [IPV6ADDR], MAC address [STRING]) was online on interface [STRING].

Variable fields

$1: IPv6 address of the online user.

$2: MAC address of the online user.

$3: Name of the interface connecting to the online user.

Severity level

6 (Informational)

Example

ND/6/ND_USER_ONLINE: Detected a user (IPv6 address 10::1, MAC address 0010-2100-01e1) was online on interface GigabitEthernet1/0/1.

Impact

No negative impact on the system.

Cause

After you enable ND logging for user online and offline events by using the ipv6 nd online-offline-log enable command, the device outputs this log when it detects a user online event.

Recommended action

1.     Based on the log message, check if the online user is legitimate. If the user is illegal, disconnect the network connection with the user.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

 

NETCONF messages

This section contains NETCONF messages.

CLI

Message text

User ([STRING], [STRING][STRING]) performed an CLI operation: [STRING] operation result=[STRING][STRING]

Variable fields

$1: Username or user line type.

If scheme login authentication was performed for the user, this field displays the username.

If no login authentication was performed or password authentication was performed, this field displays the user line type, such as VTY.

$2: User IP address or user line type and relative number.

For a Telnet or SSH user, this field displays the IP address of the user.

For a user who logged in through the console or AUX port, this field displays the user line type and the relative line number, such as CON0.

$3: ID of the NETCONF session. This field is not displayed for Web and RESTful sessions.

$4: Message ID of the NETCONF request. This field is not displayed for Web and RESTful sessions.

$5: Operation result, Succeeded or Failed.

$6: Cause for an operation failure. This field is displayed only if the failure is caused by a known reason.

Severity level

6 (Informational)

Example

XMLSOAP/6/CLI: -MDC=1; User (test, 169.254.5.222, session ID=1) performed an CLI operation: message ID=101, operation result=Succeeded.

Impact

The impact is related to the command line contents in the CLI request.

Cause

A user performs a CLI operation.

Recommended action

No action is required.

 

EDIT-CONFIG

Message text

User ([STRING], [STRING], session ID [UINT16]) performed an edit-config operation: message ID=[STRING], operation result=Succeeded.

Or:

User ([STRING], [STRING], session ID [UINT16]) performed an edit-config operation: message ID=[STRING], operation result=Failed. [STRING]

Or:

User ([STRING], [STRING], session ID [UINT16]) performed an edit-config operation: message ID=[STRING], operation result=Failed, XPath=[STRING], error message=[STRING].

Variable fields

$1: Username or user line type.

¡     If scheme login authentication was performed for the user, this field displays the username.

¡     If no login authentication was performed or password authentication was performed, this field displays the user line type, such as VTY.

$2: User IP address, or user line type and relative number.

¡     For a Telnet or SSH user, this field displays the IP address of the user.

¡     For a user who logged in through the console or AUX port, this field displays the user line type and the relative line number, such as CON0.

$3: ID of the NETCONF session.

$4: Message ID of the NETCONF request.

$5: Error information or XPath expression of the erroneous line.

¡     If the verbose keyword was not specified and the error reason was known, this field displays the detailed error information.

¡     If the verbose keyword was specified, this field displays the XPath expression of the erroneous line.

$6: Error information. This field is displayed only when the verbose keyword was specified.

Severity level

6 (Informational)

Example

XMLSOAP/6/EDIT-CONFIG: -MDC=1; User (test, 192.168.100.20, session ID 1) performed an edit-config operation: message ID=101, operation result=Succeeded.

Impact

The impact is related to the entry to be operated in the edit-config request.

Cause

A NETCONF client deployed settings by using the <edit-config> operation.

An <edit-config> operation can contain multiple settings. The device might output multiple log messages at a time.

Recommended action

·     No action is required if the operation succeeded.

·     If the operation failed, identify whether the edit-config operation conflicts with the current configuration of the device. Alternatively, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

Message text

User ([STRING], [STRING][STRING])[STRING] operation=[STRING] [STRING] [STRING], result=[STRING]. No attributes.

Or:

User ([STRING], [STRING],[STRING]),[STRING] operation=[STRING] [STRING] [STRING], result=[STRING]. Attributes: [STRING].

Variable fields

$1: Username or user line type.

¡     If scheme login authentication was performed for the user, this field displays the username.

¡     If no login authentication was performed or password authentication was performed, this field displays the user line type, such as VTY.

$2: User IP address or user line type and relative number.

¡     For a Telnet or SSH user, this field displays the IP address of the user.

¡     For a user who logged in through the console or AUX port, this field displays the user line type and the relative line number, such as CON0.

$3: ID of the NETCONF session. This field is not displayed if the session does not have a session ID.

$4: Message ID of the NETCONF request. This field is not displayed if the request does not have a message ID.

$5: Name of a NETCONF row operation.

$6: Module name and table name.

$7: Index information. If there are multiple indexes, this field uses a comma as the delimiter. This field is displayed only when there are indexes.

$8: Operation result, Succeeded or Failed.

$9: Attribute column information. This field is displayed only when the operation configures an attribute column.

Severity level

6 (Informational)

Example

XMLSOAP/6/EDIT-CONFIG: -MDC=1; User (test, 192.168.200.220, session ID 1), message ID=101, operation=merge DHCP/DHCPServerPoolStatic (PoolIndex=1, Ipv4Address=1.1.1.1), result=Failed. Attributes: CID="aaaaa", HType=1.

Impact

The impact is related to the entry to be operated in the edit-config request.

Cause

The device outputs this log message for each row operation for an <action> or <edit-config> operation.

Recommended action

No action is required.

 

EDIT_CONFIG_CLI

Message text

User ([STRING], [STRING], session ID [UINT16]), message ID=[UINT16], row index=[UINT16], command=[STRING]. [STRING]

Variable fields

$1: Username or user line type.

¡     If scheme login authentication was performed for the user, this field displays the username.

¡     If no login authentication was performed or password authentication was performed, this field displays the user line type, such as VTY.

$2: User IP address, or user line type and relative number.

¡     For a Telnet or SSH user, this field displays the IP address of the user.

¡     For a user who logged in through the console or AUX port, this field displays the user line type and the relative line number, such as CON0.

$3: ID of the NETCONF session. This field is not displayed if the session does not have a session ID.

$4: Message ID of the NETCONF request. This field is not displayed if the request does not have a message ID.

$5: Row index in the NETCONF request.

$6: Commands for the operations in the NETCONF request.

$7: Error message returned upon failed NETCONF row operations. The error message is Configuration failed. The device does not return this message if all operations in the request are executed successfully.

Severity level

6 (Informational)

Example

XMLSOAP/6/EDIT_CONFIG_CLI: User (test, 192.168.100.20, session ID 1), message ID=100, row index=1, command=port trunk pvid vlan 100.

Impact

No negative impact on the system.

Cause

If the XML-to-CLI feature for NETCONF logging is enabled, the device converts every <action> and <edit-config> operation from their XML forms to their CLI command forms and logs the CLI commands for the operations. This log also records the operation results.

This log is available only for <action> and <edit-config> operations.

Recommended action

No action is required.

 

NETCONF_MSG_DEL

Message text

A NETCONF message was dropped. Reason: Packet size exceeded the upper limit.

Variable fields

N/A

Severity level

7 (Debug)

Example

NETCONF/7/NETCONF_MSG_DEL: A NETCONF message was dropped. Reason: Packet size exceeded the upper limit.

Impact

No negative impact on the system.

Cause

The system dropped a NETCONF request message that was received from a NETCONF over SSH client or at the XML view. The reason is that the message size exceeded the upper limit.

Recommended action

1.     Reduce the size of the request message. For example, delete blank spaces, carriage returns, and tab characters.

2.     Segment the request message and then re-encapsulate the segments before sending them to the device. As a best practice, collect alarm information, log messages, and configuration data, and contact Technical Support.

 

REPLY

Message text

Sent a NETCONF reply to the client: Session ID=[UINT16], Content=[STRING].

Or:

Sent a NETCONF reply to the client: Session ID=[UINT16], Content (partial)=[STRING].

Variable fields

$1: ID of the NETCONF session. Before a session is established, this field displays a hyphen (-).

$2: NETCONF packet sent by the device to the NETCONF client.

Severity level

7 (Debug)

Example

XMLSOAP/7/REPLY: -MDC=1; Sent a NETCONF reply to the client: Session ID=2, Content=</env:Body></env:Envelope>.

Impact

No negative impact on the system.

Cause

The device sent a NETCONF packet to the NETCONF client to identify the status of NETCONF.

If the NETCONF packet contains a lot of contents, the device might output multiple log messages, each with the partial flat.

Recommended action

No action is required.

 

THREAD

Message text

Maximum number of NETCONF threads already reached.

Variable fields

N/A

Severity level

3 (Error)

Example

XMLCFG/3/THREAD: -MDC=1; Maximum number of NETCONF threads already reached.

Impact

New NETCONF over SSH sessions are not accepted.

New NETCONF SOAP and RESTful requests are not accepted.

The Web feature is unavailable.

Cause

The number of NETCONF threads already reached the upper limit.

Recommended action

Please try again later.

 

NQA

This section contains NQA messages.

NQA_ENTRY_PROBE_RESULT

Message text

Reaction entry [STRING] of NQA entry admin-name [STRING] operation-tag [STRING]: [STRING].

Variable fields

$1: ID of the NQA reaction entry, in the range of 1 to 10.

$2: Admin name of the NQA operation.

$3: Operation tag of the NQA operation.

$4: Operation result:

·     Probe-pass: The operation succeeds.

·     Probe-fail: The operation fails.

Severity level

6 (Informational)

Example

NQA/6/NQA_ENTRY_PROBE_RESULT: Reaction entry 1 of NQA entry admin-name 1 operation-tag 1: Probe-pass.

Impact

No negative impact on the system.

Cause

The network administrator configured an NQA reaction entry. This log records the operation result of the NQA reaction entry.

Recommended action

If the operation fails, check the network environment or operation parameter configuration.

 

NQA_LOG_UNREACHABLE

Message text

Server [STRING] unreachable.

Variable fields

$1: IP address of the NQA server.

Severity level

6 (Informational)

Example

NQA/6/NQA_LOG_UNREACHABLE: Server 192.168.30.117 unreachable.

Impact

No negative impacts on the system.

Cause

An unreachable NQA server was detected.

Recommended action

1.     Identify whether the IP address of the NQA server is correct based on the IP address in the message. If it is configured incorrectly, execute the destination command in NQA operation view to reconfigure the IP address of the NQA server.

2.     Execute the display ip routing-table command to identify whether the device has routes to the NQA server. If the device has no routes to the NQA server, execute the ip route-static command to configure a static route, or configure a dynamic routing protocol to generate a route.

3.     Execute the display interface command to view the state of the outbound interface to the NQA server. If the interface is in down state, resolve the interface failure.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

NQA_PACKET_OVERSIZE

Message text

NQA entry ([STRING]-[STRING]): The payload size exceeds 65503 bytes, and all IPv6 UDP probe packets will be dropped by the NQA server.

Variable fields

$1: Admin name of the NQA operation.

$2: Operation tag of the NQA operation.

Severity level

6 (Informational)

Example

NQA/6/NQA_PACKET_OVERSIZE: NQA entry (1-1): The payload size exceeds 65503 bytes, and all IPv6 UDP probe packets will be dropped by the NQA server.

Impact

No negative impact on the system.

Cause

The NQA client attempted to send UDP probe packets with an IPv6 destination address and the data size exceeding 65503 bytes. The oversized probe packets will be dropped by the NQA server.

Recommended action

Use the data-size command to edit the payload size in bytes for each probe packet in NQA operation type view or NQA template view.

 

NQA_SCHEDULE_FAILURE

Message text

NQA entry ([ STRING ]- [ STRING ]): Failed to start the scheduled NQA operation because port [ STRING] used by the operation is not available.

Variable fields

$1: Admin name of the NQA entry.

$2: Operation tag of the NQA entry.

$3: Port number.

Severity level

4 (Warning)

Example

NQA/4/NQA_SCHEDULE_FAILURE: NQA entry (admin-tag): Failed to start the scheduled NQA operation because port 10000 used by the operation is not available.

Impact

No negative impacts on the system.

Cause

The port is occupied by other services.

Recommended action

1.     By using the display tcp and display udp commands to view the information in the Local Addr:port field, you can see the IPv4 address and port number currently in use by this end; by using the display ipv6 tcp and display ipv6 udp commands to view the information in the LAddr->port field, you can see the IPv6 address and port number currently in use by this end.

2.     Executing the source port command to modify the source port of the NQA test to the currently available port number.

 

NQA_SERVER_ADDR_UNAVAILABLE

Message text

Failed to enable the NQA server because the listening service's IP address [STRING] is not available.

Variable fields

$1: IP address.

Severity level

6 (Informational)

Example

NQA/6/NQA_SEVER_ADDR_UNAVAILABLE: Failed to enable the NQA server because the listening service's IP address 192.168.10.100 is not available.

Impact

The device cannot use the IP address to provide NQA server services.

Cause

The IP address is not configured, or the interface where the IP address is configured goes down.

Recommended action

Verify that the IP or IPv6 address is configured on the device, or the associated interface is up. Alternatively, use the nqa server tcp-connect or nqa server udp-echo command to edit the listening service's IP address for the NQA server.

·     For a TCP or DLSw operation, you must configure the nqa server tcp-connect command. For a DLSw operation, make sure the value for the port-number argument is 2065. Without the configuration, the operation will fail.

·     For a UDP echo, UDP jitter, or voice operation, you must configure the nqa server udp-echo command. Without the configuration, the operation will fail.

 

NQA_SERVER_PORT_UNAVAILABLE

Message text

Failed to enable the NQA server because listening port [STRING] is not available.

Variable fields

$1: Port number.

Severity level

6 (Informational)

Example

NQA/6/NQA_SEVER_PORT_UNAVAILABLE: Failed to enable the NQA server because listening port 10000 is not available.

Impact

The device cannot use the port number to provide NQA server services.

Cause

The port has been used by another service.

Recommended action

Use the nqa server tcp-connect or nqa server udp-echo command to edit the listening service's port number for the NQA server.

·     For a TCP or DLSw operation, you must configure the nqa server tcp-connect command. For a DLSw operation, make sure the value for the port-number argument is 2065. Without the configuration, the operation will fail.

·     For a UDP echo, UDP jitter, or voice operation, you must configure the nqa server udp-echo command. Without the configuration, the operation will fail.

·     Make sure the configured port number is not used by any other services on the device.

¡     You can obtain the IPv4 address and port number in use on the local end from the Local Addr:port field in the output from the display tcp and display udp commands.

¡     You can obtain the IPv6 address and port number in use on the local end from the LAddr->port field in the output from the display ipv6 tcp and display ipv6 udp commands.

 

NQA_TWAMP_LIGHT_PACKET_INVALID

Message text

NQA TWAMP Light test session [UINT32] index [UINT32]: The number of packets captured for statistics collection is invalid.

Variable fields

$1: Test session ID.

$2: Serial number of the statistics data.

Severity level

6 (Informational)

Example

NQA/6/NQA_TWAMP_LIGHT_PACKET_INVALID: NQA TWAMP Light test session 1 index 7: The number of packets captured for statistics collection is invalid.

Impact

No negative impacts on the system.

Cause

The statistics collection interval for the TWAMP Light test was shorter than the packet sending interval. Results of the test will not be included in statistics.

Recommended action

1.     Execute the stop command in TWAMP Light sender view to stop the test.

2.     Execute the start command in TWAMP Light sender view to start the test, and make sure the following conditions are met:

¡     The packet monitoring time is greater than the statistics collection interval.

¡     The statistics collection interval is greater than the packet sending interval.

 

NQA_TWAMP_LIGHT_REACTION

Message text

NQA TWAMP Light test session [UINT32] reaction entry [UINT32]: Detected continual violation of the [STRING] [STRING] threshold for a threshold violation monitor time of [UINT32] ms.

Variable fields

$1: Test session ID.

$2: ID of the NQA reaction entry.

$3: Reaction entry type:

¡     Two-way delay.

¡     Two-way loss.

¡     Two-way jitter.

$4: Threshold violation value:

¡     upper—Be equal to or greater than the upper threshold limit.

¡     lower—Be equal to or less than the lower threshold limit.

$5: Statistics collection interval.

Severity level

6 (Informational)

Example

NQA/6/NQA_TWAMP_LIGHT_REACTION: NQA TWAMP Light test session 1 reaction entry 1: Detected continual violation of the two-way loss upper threshold for a threshold violation monitor time of 2000 ms.

Impact

No negative impacts on the system.

Cause

In a TWAMP Light test, the device monitors the test result, and starts the monitoring time when either of the following conditions is met:

·     The monitoring result goes beyond the upper threshold limit.

·     The monitoring result drops below the lower threshold limit from a monitoring result higher than the lower limit.

If either condition is always true during the monitoring time, a threshold violation occurs.

Recommended action

No action is required.

 

NQA_TWAMP_LIGHT_START_FAILURE

Message text

NQA TWAMP Light test session [UINT32]: Failed to start the test session. Please check the parameters.

Variable fields

$1: Test session ID.

Severity level

6 (Informational)

Example

NQAS/6/NQA_TWAMP_LIGHT_START_FAILURE: NQA TWAMP Light test session 1: Failed to start the test session, Please check the parameters.

Impact

No negative impacts on the system.

Cause

Driver check failed. Required settings are missing.

Recommended action

The network configuration requirements for the driver vary by network environment. Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

NQA_UPF_UE_PROBE

Message text

Reaction entry [STRING] of NQA operation with administrator name [STRING] and operation tag [STRING] exceeded the threshold.

Delay information between UPF and UE:

·     Round trip time [UINT32] us

·     UPF network to station two-way delay [UINT32] us

·     Downlink GTPU delay [UINT32]  us

·     Uplink GTPU delay [UINT32]  us

·     Downlink PDCP delay [UINT32] us

·     Uplink PDCP delay [UINT32] us

·     Donwlink RLC delay [UINT32] us

·     Uplink RLC delay [UINT32] us

·     Downlink MAC delay [UINT32] us

·     Uplink MAC delay [UINT32] us

Variable fields

$1: ID of the NQA reaction entry, in the range of 1 to 10.

$2: Admin name of the NQA operation.

$3: Operation tag of the NQA operation.

$4: Total round trip time for packets between the UPF and UE, in microseconds.

$5: Total round trip time for packets between the UPF and base station, in microseconds.

$6: Duration for uplink packets to enter and exit the GTP-U layer of the base station, in microseconds.

$7: Duration for downlink packets to enter and exit the GTP-U layer of the base station, in microseconds.

$8: Duration for uplink packets to enter and exit the PDCP layer of the base station, in microseconds.

$9: Duration for downlink packets to enter and exit the PDCP layer of the base station, in microseconds.

$10: Duration for uplink packets to enter and exit the RLC layer of the base station, in microseconds.

$11: Duration for downlink packets to enter and exit the RLC layer of the base station, in microseconds.

$12: Duration for uplink packets to enter and exit the MAC layer of the base station, in microseconds.

$13: Duration for downlink packets to enter and exit the MAC layer of the base station, in microseconds.

Severity level

6 (Informational)

Example

NQA/6/NQA_UPF_UE_PROBE: Reaction entry 1 of NQA operation with administrator name 1 and operation tag 1 exceeded the threshold.

Delay information between UPF and UE:

·     Round trip time 1500 us

·     UPF network to station two-way delay 1000 us

·     Downlink GTPU delay 35 us

·     Uplink GTPU delay 35 us

·     Downlink PDCP delay 35 us

·     Uplink PDCP delay 35 us

·     Donwlink RLC delay 35 us

·     Uplink RLC delay 35 us

·     Downlink MAC delay 35 us

·     Uplink MAC delay 35 us

Impact

No negative impacts on the system.

Cause

After you enable delay measurement between the UPF and UE, a log is generated if the monitored result is greater than or equal to the alarm threshold.

Recommended action

1.     Execute the display nqa statistics command in any view to display the NQA operation statistics. Check the measured round-trip delay between the UPF and UE. If any parameter value exceeds the expected value range, locate and troubleshoot the issue.

2.     Execute the display current-configuration | include "upf-ue-rtt threshold-value” command in any view to display the NQA reaction entry configuration for round-trip delay of packets between the UPF and UE. If the threshold configuration is not appropriate, execute the reaction checked-element upf-ue-rtt command in ICMP echo operation view to edit the configuration.

3.     If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

 

NTP

This section contains NTP messages.

NTP_CLOCK_CHANGE

Message text

System clock changed from [STRING] to [STRING], the NTP server's IP address is [STRING].

Variable fields

$1: Time before synchronization.

$2: Time after synchronization.

$3: IP address.

Severity level

5 (Notification)

Example

NTP/5/NTP_CLOCK_CHANGE: System clock changed from 02:12:58:345 12/28/2012 to 02:29:12:879 12/28/2012, the NTP server's IP address is 192.168.30.116.

Impact

No negative impacts on the system.

Cause

The NTP client has synchronized its time to the NTP server.

Recommended action

No action is required.

 

NTP_LEAP_CHANGE

Message text

System Leap Indicator changed from [UINT32] to [UINT32] after clock update.

Variable fields

$1: Original system Leap Indicator. Options include the following:

¡     01: Indicates that the last minute of the day has 61 seconds.

¡     10: Indicates that the last minute of the day has 59 seconds.

$2: Current system Leap Indicator. Options include the following:

¡     01: Indicates that the last minute of the day has 61 seconds.

¡     10: Indicates that the last minute of the day has 59 seconds.

Severity level

5 (Notification)

Example

NTP/5/NTP_LEAP_CHANGE: System Leap Indicator changed from 00 to 01 after clock update.

Impact

The device will adjust the time by leaping one second during the last minute of the day on which this log is generated.

Cause

The system Leap Indicator changed. For example, the NTP status changed from unsynchronized to synchronized.

NTP Leap Indicator is a two-bit code warning of an impending leap second to be inserted in the NTP timescale.

The bits are set before 23:59 on the day of insertion and reset after 00:00 on the following day. This causes the number of seconds (rollover interval) in the day of insertion to be increased or decreased by one.

Recommended action

Determine if a leap second adjustment is necessary today for printing this log, based on the deviation values of TAI and UTC time published regularly by the International Bureau of Weights and Measures (BIPM):

If a leap second adjustment is needed and its value is correct, then no action is required.

If a leap second adjustment is not needed, then wait for the next time synchronization. If after the next synchronization, the device's system time matches the international standard time, then no action is required.

If after the next synchronization, the device's system time does not match the international standard time, continue to check if the time source has also undergone a leap second adjustment. If the time source has an incorrect leap second adjustment, recalibrate the time of the time source.

 

NTP_SOURCE_CHANGE

Message text

NTP server's IP address changed from [STRING] to [STRING].

Variable fields

$1: IP address of the original time source.

$2: IP address of the new time source.

Severity level

5 (Notification)

Example

NTP/5/NTP_SOURCE_CHANGE: NTP server's IP address changed from 1.1.1.1 to 1.1.1.2.

Impact

No negative impacts on the system.

Cause

The system changed the time source.

Recommended action

Generally, no action is required. You can also further identify the cause of the clock source switch, for example:

·     Ping the IP address of the original clock source to see if the original clock source is route reachable. If the route is not reachable, resolve the routing issue first.

·     Log in to the original clock source and check if the clock on the original clock source is accurate. If it is not accurate, adjust the time on the original clock source.

·     Log in to the original clock source and check if the NTP configuration on the original clock source is correct. If it is not correct, modify it according to the NTP configuration manual.

 

NTP_SOURCE_LOST

Message text

Lost synchronization with NTP server with IP address [STRING].

Variable fields

$1: IP address.

Severity level

4 (Warning)

Example

NTP/4/NTP_SOURCE_LOST: Lost synchronization with NTP server with IP address 1.1.1.1.

Impact

The accuracy of the device's clock might be affected.

Cause

During NTP interactions, if the clock source is unsynchronized or unreachable, and there are no other candidate sources for synchronization, the device generates this log.

Recommended action

1.     Ping the IP address of the original clock source to check if the original clock source is route reachable. If the route is not reachable, resolve the routing issue first.

2.     Log in to the original clock source and check if the clock on the original clock source is accurate. If it is not accurate, adjust the time on the original clock source.

3.     Log in to the original clock source and check if the NTP configuration on the original clock source is correct. If incorrect, modify it according to the NTP configuration manual.

4.     Select the corresponding command-line configuration for the new clock source based on the clock synchronization mode adopted.

 

NTP_STRATUM_CHANGE

Message text

System stratum changed from [UINT32] to [UINT32] after clock update.

Variable fields

$1: Original stratum.

$2: Current stratum.

Severity level

5 (Notification)

Example

NTP/5/NTP_STRATUM_CHANGE: System stratum changed from 6 to 5 after clock update.

Impact

Clock synchronization between the device and downstream devices might be affected.

Cause

Causes for changes in the device's clock stratum might include:

·     Changes in the hierarchy of the clock source itself, such as when the system initially selects a clock source.

·     Switching of synchronization clock sources during the synchronization process, with changes in the clock source leading to changes in the clock hierarchy.

In actual networks, NTP servers that obtain time synchronization from authoritative clocks (such as atomic clocks) typically have their stratums set to 1 and are used as the primary time servers to synchronize the clocks of other devices in the network. The NTP distance between devices in the network and the primary time server, which is the number of NTP servers in the NTP synchronization chain, determines the stratum of the clock on the device. For example, in a network topology like: Atomic Clock -> Device A -> Device B -> Device C, the clock stratum of Device A would be 1, the clock stratum of Device B would be 2, and the clock stratum of Device C would be 3.

Recommended action

1.     Verify whether the clock source has changed. Execute the display ntp-service status command to check the value of the Reference clock ID field (which represents the clock source address):

¡     If the value of the Reference clock ID field is consistent with the main clock source address in the network plan, proceed to step 2. If the value of the Reference clock ID field is not consistent with the main clock source address in the network plan, this indicates a clock source switch has occurred. The switch in the clock source leads to changes in clock stratums, no action is required.

¡     If the value of Reference clock ID is none, it indicates the loss of the clock source. Replace the clock source or repair the faulty one.

2.     Verify whether the change in the clock stratums of this device is caused by the change in the hierarchy of the clock source itself. Log in to the clock source and check its clock stratums. If the clock stratums of the clock source are inconsistent with the network plan, modify the clock stratums of the clock source (if the clock source is an H3C device, execute the display ntp-service sessions command to see the value of the stra field, which represents the clock stratums of the clock source. Under system view, execute the ntp-service refclock-master command to change the clock hierarchy of the clock source).

3.     Verify whether the change in the clock stratums of this device is caused by the change in the hierarchy of the clock source itself. Execute the display ntp-service sessions command on the device, where the value of the stra field indicates the clock stratums of the clock source. If the clock stratums of the clock source are inconsistent with the network plan, log in to the clock source and modify its clock stratums (if the clock source is an H3C device, the clock stratums can be modified by executing ntp-service refclock-master command in system view).

 

 

OPTMOD

This section contains OPTMOD messages.

BIAS_HIGH

Message text

[STRING]: Bias current is high.

Variable fields

$1: Port name.

Severity level

2 (Critical)

Example

OPTMOD/2/BIAS_HIGH: GigabitEthernet1/0/1: Bias current is high.

Impact

The transceiver module cannot run correctly.

Cause

When the bias current of the optical transceiver module exceeds the high bias current alarm threshold, this log is generated

Recommended action

1.     Use the 'display transceive diagnosis interface' command to Verify whether the current bias current value has exceeded the high bias current alarm threshold

2.     Use the 'display transceive alarm interface' command multiple times to confirm the presence of high bias current alarm

3.     If there is indeed a high bias current alarm, it indicates an issue with the optical transceiver module. Please replace the transceiver module.

 

BIAS_LOW

Message text

[STRING]: Bias current is low.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/BIAS_LOW: GigabitEthernet1/0/1: Bias current is low.

Impact

The transceiver module cannot run correctly.

Cause

When the bias current of the optical transceiver module is lower than the bias current low alarm threshold, this log is generated

Recommended action

1.     Verify if the port status is shutdown. If the status is shutdown, recover the port status to up

2.     Use the display transceiver diagnosis interface command to Verify whether the current bias current value has exceeded the bias current low alarm threshold

3.     Use the display transceiver alarm interface command to check multiple times if there is indeed a bias current low alarm

4.     If it is lower than the bias current low alarm threshold, there may be a fault with the optical transceiver module or the board. Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

BIAS_NORMAL

Message text

[STRING]: Bias current is normal.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/BIAS_NORMAL: GigabitEthernet1/0/1: Bias current is normal.

Impact

No negative impacts on the system.

Cause

This log is generated when the bias current of the optical transceiver module is restored to normal range.

Recommended action

No action is required.

 

CFG_ERR

Message text

[STRING]: Transceiver type and port configuration mismatched.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/CFG_ERR: GigabitEthernet1/0/1: Transceiver type and port configuration mismatched.

Impact

The transceiver module might fail to run correctly.

Cause

When the optical transceiver module type does not match the port configuration, this log is generated

Recommended action

1.     Verify whether the optical transceiver module can work properly. If it can, no action is required.

2.     If the transceiver module cannot run correctly, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

CHKSUM_ERR

Message text

[STRING]: Transceiver information checksum error.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/CHKSUM_ERR: GigabitEthernet1/0/1: Transceiver information checksum error.

Impact

No negative impacts on the system.

Cause

When the optical transceiver module register information verification fails, this log is generated

Recommended action

1.     Verify whether the optical transceiver module can work normally, if yes, no action is required.

2.     If the optical transceiver module cannot work normally, please re-plug the optical transceiver module

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

FIBER_SFP MODULE_INVALID

Message text

[STRING]: This transceiver module is not compatible with the interface card. HP does not guarantee the correct operation of the transceiver module. The transceiver module will be invalidated in [UINT32] days. Please replace it with a compatible one as soon as possible.

Variable fields

$1: Port name.

$2: Optical Transceiver Module Failure Days

Severity level

4 (Warning)

Example

OPTMOD/4/FIBER_SFPMODULE_INVALID: GigabitEthernet1/0/1: This transceiver module is not compatible with the interface card. HP does not guarantee the correct operation of the transceiver module. The transceiver module will be invalidated in 3 days. Please replace it with a compatible one as soon as possible.

Impact

The transceiver module cannot run correctly.

Cause

This log is generated when the optical transceiver module does not match the interface card

Recommended action

Replace the transceiver module.

 

FIBER_SFPMODULE_NOWINVALID

Message text

[STRING]: This is not a supported transceiver for this platform.  HP does not guarantee the normal operation or maintenance of unsupported transceivers.  Please review the platform datasheet on the HP web site or contact your HP sales rep for a list of supported transceivers.

Variable fields

$1: Port name.

Severity level

4 (Warning)

Example

OPTMOD/4/FIBER_SFPMODULE_NOWINVALID: GigabitEthernet1/0/1: This is not a supported transceiver for this platform.  HP does not guarantee the normal operation or maintenance of unsupported transceivers.  Please review the platform datasheet on the HP web site or contact your HP sales rep for a list of supported transceivers.

Impact

Unsupportable optical transceiver modules may not work properly on the device

Cause

When the optical transceiver module is not supported, this log is generated

Recommended action

Please refer to the platform data on the HP website or contact your HP sales representative for a list of supported optical transceiver modules, Replace the transceiver module.

 

IO_ERR

Message text

[STRING]: The transceiver information I/O failed.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/IO_ERR: GigabitEthernet1/0/1: The transceiver information I/O failed.

Impact

The transceiver module cannot run correctly.

Cause

When the device fails to read the optical transceiver module register, this log is generated

Recommended action

1.     Verify whether the port is working properly. If the port is not working properly, Verify and resolve the port issue first

2.     If the same fault occurs multiple times with other optical modules on the single board, it indicates a component failure on the board. Collect the configuration file, log file, and alarms, and then contact Technical Support.

3.     Execute the 'display transceiver diagnosis interface' or 'display transceiver alarm interface' command. If both commands fail, it indicates a fault with the transceiver module. Please replace the transceiver module.

 

MOD_ALM_OFF

Message text

[STRING]: [STRING] was removed.

Variable fields

$1: Port name.

$2: Fault type.

Severity level

3 (Error)

Example

OPTMOD/3/MOD_ALM_OFF: GigabitEthernet1/0/1: Module_not_ready was removed.

Impact

No negative impacts on the system.

Cause

This log is generated when the optical transceiver module fault is cleared.

Recommended action

No action is required.

 

MOD_ALM_ON

Message text

[STRING]: [STRING] was detected.

Variable fields

$1: Port name.

$2: Fault type.

Severity level

3 (Error)

Example

OPTMOD/3/MOD_ALM_ON: GigabitEthernet1/0/1: Module_not_ready was detected.

Impact

The transceiver module might fail to run correctly.

Cause

When a fault is detected in the optical transceiver module, this log is generated

Recommended action

According to different types of faults, the cause of the fault may be the problem with the optical transceiver module itself, or it may be a port or link problem, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

MODULE_IN

Message text

[STRING]: The transceiver is [STRING].

Variable fields

$1: Port name.

$2: Transceiver module type.

Severity level

4 (Warning)

Example

OPTMOD/4/MODULE_IN: GigabitEthernet1/0/1: The transceiver is 1000_BASE_T_AN_SFP.

Impact

No negative impacts on the system.

Cause

When an optical transceiver module is inserted into a port, this log is generated.

Recommended action

No action is required.

 

MODULE_OUT

Message text

[STRING]: Transceiver absent.

Variable fields

$1: Port name.

Severity level

4 (Warning)

Example

OPTMOD/4/MODULE_OUT: GigabitEthernet1/0/1: Transceiver absent.

Impact

The transceiver module is not available.

Cause

This log is generated when the transceiver module is removed.

Recommended action

No action is required.

 

OPTICAL_WARNING_CLEAR

Message text

Transceiver warning alarm cleared. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault location information.

$4: Error code.

$5: Error reason.

Severity level

4 (Warning)

Example

OPTMOD/4/OPTICAL_WARNING_CLEAR: Transceiver warning alarm cleared. (PhysicalIndex=8833, PhysicalName=GE1/0/1, RelativeResource=1/0/1, ErrorCode=600060, Reason=Transceiver RXCDR_unlock detected. Lane = 1.)

Impact

No negative impact on the system.

Cause

The transceiver module alarm is cleared.

Recommended action

No action is required.

 

OPTICAL_WARNING_OCCUR

Message text

Transceiver warning alarm occurred. (PhysicalIndex=<[UINT]>, PhysicalName=<[STRING]>, RelativeResource=<[STRING]>, ErrorCode=<[UINT]>, Reason=<[STRING]>)

Variable fields

$1: Entity index.

$2: Entity name.

$3: Fault location information.

$4: Error code.

$5: Error reason.

Severity level

4 (Warning)

Example

OPTMOD/4/OPTICAL_WARNING_OCCUR: Transceiver warning alarm occurred. (PhysicalIndex=8833, PhysicalName=GE1/0/1, RelativeResource=1/0/1, ErrorCode=600060, Reason=Transceiver RXCDR_unlock detected. Lane = 1.)

Impact

The transceiver module cannot operate correctly.

Cause

The transceiver module alarm is generated.

Recommended action

1.     Verify that the transceiver module and fibers are connected correctly.

3.     Remove the transceiver module and insert it again.

4.     Verify that all interface modules installed on the device are operating correctly.

5.     Take corresponding measures based on the FaultID.

4.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

OPTMOD_COUNTERFEIT_MODULE

Message text

The following transceiver you are using is suspected to be a counterfeit/pirated/unauthorized H3C transceiver, which might cause compatibility problems and expose your device to security threats. Please contact H3C for further detection and verification promptly.

[STRING]: Transceiver type [STRING], SN [STRING].

Variable fields

$1: Interface type and number.

$2: Interface Module Model

$3: Serial number of the transceiver module.

Severity level

3 (Error)

Example

OPTMOD/3/OPTMOD_COUNTERFEIT_MODULE: The following transceiver you are using is suspected to be a counterfeit/pirated/unauthorized H3C transceiver, which might cause compatibility problems and expose your device to security threats. Please contact H3C for further detection and verification promptly.

GigabitEthernet1/0/1: Transceiver type 1000_BASE_SX_SFP, SN 2013AYU0711103.

GigabitEthernet1/0/2: Transceiver type 1000_BASE_SX_SFP, SN 2013AYU0711103.

Impact

The transceiver module might fail to run correctly.

Cause

When counterfeit, pirate, or unauthorized H3C optical transceiver modules are detected on the device, this log is generated. For counterfeit, pirate, or unauthorized H3C optical transceiver modules, data cannot be obtained through the display transceiver diagnosis command.

Recommended action

Please purchase and use H3C transceiver modules.

 

OPTMOD_MODULE_CHECK

Message text

An H3C transceiver is detected. Please go to the website www.h3c.com to verify its authenticity.

Variable fields

N/A

Severity level

6 (Informational)

Example

OPTMOD/6/OPTMOD_MODULE_CHECK: An H3C transceiver is detected. Please go to the website www.h3c.com to verify its authenticity.

Impact

No negative impacts on the system.

Cause

When no H3C optical transceiver module is detected on the device, this log will be printed. Remind users to visit the H3C official website (www.h3c.com) for bar code anti-counterfeiting verification.

Recommended action

No action is required.

 

PHONY_MODULE

Message text

[STRING]: A non-H3C transceiver is detected. Please confirm the label of the transceiver.

If there is an H3C Logo, it is suspected to be a counterfeit H3C transceiver. This transceiver is NOT sold by H3C.

H3C therefore shall NOT guarantee the normal function of the device or assume the maintenance responsibility thereof!

Variable fields

$1: Port name.

Severity level

4 (Warning)

Example

OPTMOD/4/PHONY_MODULE: GigabitEthernet1/0/1: A non-H3C transceiver is detected. Please confirm the label of the transceiver.

If there is an H3C Logo, it is suspected to be a counterfeit H3C transceiver. This transceiver is NOT sold by H3C.

H3C therefore shall NOT guarantee the normal function of the device or assume the maintenance responsibility thereof!

Impact

The transceiver module might fail to run correctly.

Cause

This log is generated when a non-H3C transceiver module is detected.

Recommended action

1.     Please purchase and use H3C transceiver modules.

2.     If Verify using H3C optical transceiver module, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

RX_ALM_OFF

Message text

[STRING]: [STRING] was removed.

Variable fields

$1: Port name.

$2: Rx fault type.

Severity level

3 (Error)

Example

OPTMOD/3/RX_ALM_OFF: GigabitEthernet1/0/1: RX_not_ready was removed.

Impact

No negative impacts on the system.

Cause

This log is generated when the optical transceiver module RX fault is cleared.

Recommended action

No action is required.

 

RX_ALM_ON

Message text

[STRING]: [STRING] was detected.

Variable fields

$1: Port name.

$2: Rx fault type.

Severity level

3 (Error)

Example

OPTMOD/3/RX_ALM_ON: GigabitEthernet1/0/1: RX_not_ready was detected.

Impact

The transceiver module might fail to run correctly.

Cause

When an optical transceiver module RX fault is detected, this log is generated

Recommended action

The cause of the failure may be the optical transceiver module itself, or it may be a port or link issue, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

RX_POW_HIGH

Message text

[STRING]: RX power is high.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/RX_POW_HIGH: GigabitEthernet1/0/1: RX power is high.

Impact

The transceiver module might fail to run correctly.

Cause

When the RX power of the optical module exceeds the high alarm threshold of the received optical power, this log is generated.

Recommended action

1.     Adjust the link and increase the optical attenuation to ensure that the optical power of the optical module meets the normal working range of received optical power.

2.     Use the display transceiver diagnosis interface command to Verify whether the power has exceeded the high alarm threshold of the received optical power.

3.     Use the display transceiver alarm interface command to Verify whether there is currently a high alarm for received optical power.

4.     If the high alarm threshold of the received optical power is indeed exceeded, it indicates a problem with the optical module. Please replace the transceiver module.

 

RX_POW_LOW

Message text

[STRING]: RX power is low.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/RX_POW_LOW: GigabitEthernet1/0/1: RX power is low.

Impact

The transceiver module might fail to run correctly.

Cause

When the optical transceiver module RX power is lower than the receive optical power low alarm threshold, this log is generated

Recommended action

1.     Adjust the link to make the optical transceiver module receive optical power within the normal working range

2.     Use the 'display transceive diagnosis interface' command to Verify whether the power has fallen below the receive optical power low alarm threshold

3.     Use the 'display transceive alarm interface' command to Verify whether there is indeed a receive optical power low alarm currently

4.     If it is indeed below the receive optical power low alarm threshold, it means there is a problem with the optical module. Please replace the transceiver module.

 

RX_POW_NORMAL

Message text

[STRING]: RX power is normal.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/RX_POW_NORMAL: GigabitEthernet1/0/1: RX power is normal.

Impact

No negative impacts on the system.

Cause

This log is generated when the optical transceiver module RX power is recovered to the normal range

Recommended action

No action is required.

 

TEMP_HIGH

Message text

[STRING]: Temperature is high.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/TEMP_HIGH: GigabitEthernet1/0/1: Temperature is high.

Impact

High temperature will affect the normal operation of the optical transceiver module

Cause

When the temperature of the optical transceiver module exceeds the high temperature alarm threshold, this log is generated

Recommended action

1.     Please Verify whether the ambient temperature in the computer room is too high. If the ambient temperature is indeed too high, please improve the room temperature and ensure normal ventilation of the equipment environment

2.     Verify whether the device fan is working properly. If the fan is not working properly, install or replace the faulty fan

3.     If the device fan is normal and the ambient temperature is normal, it means the optical transceiver module is faulty. Please replace the transceiver module.

 

TEMP_LOW

Message text

[STRING]: Temperature is low.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/TEMP_LOW: GigabitEthernet1/0/1: Temperature is low.

Impact

Low temperature will affect the normal operation of the optical transceiver module.

Cause

When the temperature of the optical module is lower than the low temperature alarm threshold, this log is generated.

Recommended action

1.     Please Verify whether the ambient temperature in the equipment room is too low. If the ambient temperature is indeed too low, please improve the room temperature.

2.     If the ambient temperature is normal, it indicates a fault in the optical module. Please replace the transceiver module.

 

TEMP_NORMAL

Message text

[STRING]: Temperature is normal.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/TEMP_NORMAL: GigabitEthernet1/0/1: Temperature is normal.

Impact

No negative impacts on the system.

Cause

This log is generated when the optical transceiver module temperature has recovered to the normal range.

Recommended action

No action is required.

 

TX_ALM_OFF

Message text

[STRING]: [STRING] was removed.

Variable fields

$1: Port name.

$2: Tx fault type.

Severity level

3 (Error)

Example

OPTMOD/3/TX_ALM_OFF: GigabitEthernet1/0/1: TX_fault was removed.

Impact

No negative impacts on the system.

Cause

When the optical transceiver module TX fault is cleared, this log is generated

Recommended action

No action is required.

 

TX_ALM_ON

Message text

[STRING]: [STRING] was  detected.

Variable fields

$1: Port name.

$2: Tx fault type.

Severity level

3 (Error)

Example

OPTMOD/3/TX_ALM_ON: GigabitEthernet1/0/1: TX_fault was detected.

Impact

The transceiver module might fail to run correctly.

Cause

When an optical transceiver module TX fault is detected, this log is generated

Recommended action

The cause of the fault may be the optical transceiver module itself, or it may be a port or link issue, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

TX_POW_HIGH

Message text

[STRING]: TX power is high.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/TX_POW_HIGH: GigabitEthernet1/0/1: TX power is high.

Impact

The transceiver module might fail to run correctly.

Cause

When the optical module TX power exceeds the high alarm threshold of the transmitted optical power, this log is generated

Recommended action

1.     Adjust the link, increase the optical attenuation to ensure that the optical power of the optical module meets the normal working range

2.     Use the 'display transceiver diagnosis interface' command to Verify whether the power has exceeded the high alarm threshold of the transmitted optical power

3.     Use the 'display transceiver alarm interface' command to Verify whether there is currently a high alarm for the transmitted optical power

4.     If the high alarm threshold of the transmitted optical power has indeed been exceeded, it indicates a problem with the optical module. Please replace the transceiver module.

 

TX_POW_LOW

Message text

[STRING]: TX power is low.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/TX_POW_LOW: GigabitEthernet1/0/1: TX power is low.

Impact

The transceiver module cannot run correctly.

Cause

When the optical module TX power is lower than the low optical power transmission alarm threshold, this log is generated

Recommended action

1.     Verify the port status to see if it is shutdown. If the status is shutdown, restore the port status to up

2.     Use the display transceiver diagnosis interface command to Verify whether the power is indeed lower than the low optical power transmission alarm threshold

3.     Use the display transceiver alarm interface command to Verify whether there is currently a low optical power transmission alarm

4.     If it is indeed lower than the low optical power transmission alarm threshold, it means there is a problem with the optical module. Please replace the transceiver module.

5.     If the problem cannot be resolved, it may be a board problem (such as turning off the light, abnormal high-speed signals, etc.), collect the configuration file, log file, and alarms, and then contact Technical Support.

 

TX_POW_NORMAL

Message text

[STRING]: TX power is normal.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/TX_POW_NORMAL: GigabitEthernet1/0/1: TX power is normal.

Impact

No negative impacts on the system.

Cause

Optical transceiver module TX power recovered to normal range, this log is generated

Recommended action

No action is required.

 

TYPE_ERR

Message text

[STRING]: The transceiver type is not supported by port hardware.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/TYPE_ERR: GigabitEthernet1/0/1: The transceiver type is not supported by port hardware.

Impact

The transceiver module cannot run correctly.

Cause

When the port hardware does not support the optical transceiver module type, this log is generated.

Recommended action

1.     Replace the transceiver module.

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

VOLT_HIGH

Message text

[STRING]: Voltage is high.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/VOLT_HIGH: GigabitEthernet1/0/1: Voltage is high.

Impact

The transceiver module might fail to run correctly. Or the optical transceiver module is damaged.

Cause

When the voltage of the optical transceiver module exceeds the overvoltage high alarm threshold, this log is generated.

Recommended action

1.     Verify whether the port is working properly. If the port is not working properly, first Verify the port issue and resolve it.

2.     Verify if this fault has occurred multiple times on other optical transceiver modules on the board. If so, it indicates a possible component failure on the board, collect the configuration file, log file, and alarms, and then contact Technical Support.

3.     Use the display transceiver diagnosis interface command to Verify whether the voltage has exceeded the overvoltage high alarm threshold.

4.     Use the display transceiver alarm interface command to Verify whether there is indeed a high voltage alarm currently.

5.     If the overvoltage high alarm threshold is indeed exceeded, it means there is a problem with the optical transceiver module. Please replace the transceiver module.

 

VOLT_LOW

Message text

[STRING]: Voltage is low.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/VOLT_LOW: GigabitEthernet1/0/1: Voltage is low.

Impact

The transceiver module might fail to run correctly.

Cause

When the voltage of the optical transceiver module is lower than the low voltage alarm threshold, this log is generated

Recommended action

1.     Verify whether the port is working properly. If the port is not working properly, Verify the port issue and resolve it first

2.     Confirm if other optical transceiver modules on the board have encountered this fault multiple times. If so, it indicates a component failure on the board, collect the configuration file, log file, and alarms, and then contact Technical Support.

3.     Use the display transceiver diagnosis interface command to Verify whether the voltage has exceeded the low voltage alarm threshold

4.     Use the display transceiver alarm interface command to Verify whether there is currently a low voltage alarm

5.     If it is indeed below the low voltage alarm threshold, it indicates a problem with the optical transceiver module. Please replace the transceiver module.

 

VOLT_NORMAL

Message text

[STRING]: Voltage is normal.

Variable fields

$1: Port name.

Severity level

3 (Error)

Example

OPTMOD/3/VOLT_NORMAL: GigabitEthernet1/0/1: Voltage is normal!

Impact

No negative impacts on the system.

Cause

This log is generated when the optical transceiver module voltage is restored to normal range.

Recommended action

No action is required.

 

 

OSPF

This section contains OSPF messages.

OSPF_DUP_RTRID_NBR

Message text

OSPF [UINT16] Duplicate router ID [STRING] on interface [STRING], sourced from IP address [IPADDR].

Variable fields

$1: OSPF process ID.

$2: Router ID.

$3: Interface name.

$4: IP address.

Severity level

6 (Informational)

Example

OSPF/6/OSPF_DUP_RTRID_NBR: OSPF 1 Duplicate router ID 11.11.11.11 on interface GigabitEthernet0/0/3, sourced from IP address 11.2.2.2.

Impact

Router LSA continues to refresh, causing route flapping.

Cause

Two directly connected devices have the same router ID configured

Recommended action

1.     Select different handling steps based on the different ways to obtain the Router ID for the OSPF process:

¡     If the OSPF process uses the global router ID, execute the router id command to edit the router ID.

¡     If the OSPF process uses a manually specified router ID, execute the ospf router-id command to edit the router ID.

¡     If the OSPF process uses an automatically obtained router ID, execute the ip address command to edit the IP address of the corresponding interface.

2.     Execute the reset ospf process command to enable the new router ID to take effect.

 

OSPF_IP_CONFLICT_INTRA

Message text

OSPF [UINT16] Received newer self-originated network-LSAs. Possible conflict of IP address [IPADDR] in area [STRING] on interface [STRING].

Variable fields

$1: OSPF process ID.

$2: IP address.

$3: OSPF area ID.

$4: Interface name.

Severity level

6 (Informational)

Example

OSPF/6/OSPF_IP_CONFLICT_INTRA: OSPF 1 Received newer self-originated network-LSAs. Possible conflict of IP address 11.1.1.1 in area 0.0.0.1 on interface GigabitEthernet1/0/3.

Impact

·     Device CPU usage is high

·     OSPF frequently ages LSA, regenerating LSA

·     Device routes are frequently refreshed, route calculation errors occur

Cause

Two devices in the same OSPF area may have the same main IP address configured on their interfaces, and at least one device is the DR

Recommended action

1.     Check if OSPF_RTRID_CONFLICT_INTRA is generated at the same time, i.e. whether there is a Router ID conflict in the same OSPF area.

¡     If there is a Router ID conflict in the same OSPF area, resolve the Router ID conflict according to the Recommended action in the OSPF_RTRID_CONFLICT_INTRA log.

¡     If there is no Router ID conflict in the same OSPF area, go to step 2.

2.     Find the interface information in the log, then modify the main IP address of the interface to ensure that devices in the same area use different main IP addresses for their interfaces.

 

OSPF_LAST_NBR_DOWN

Message text

OSPF [UINT32] Last neighbor down event: Router ID: [STRING] Local address: [STRING] Remote address: [STRING] Reason: [STRING]

Variable fields

$1: OSPF process ID.

$2: Router ID.

$3: Local IP address.

$4: Neighbor IP address.

$5: Reasons for the OSPF neighbor state becoming Down include:

·     Ospf Interface Parameters Changed.

·     Reset ospf command was performed.

·     Undo ospf command was performed.

·     Undo area command was performed.

·     Undo network: executed the undo network command

·     Silent Interface: executed the silent interface command

·     Ospf_iflchange: interface logical attribute change

·     Ospf_ifachange: interface physical attribute change

·     Ospf_ifvchange: interface vlink attribute change

·     Vlink down: virtual link interface down

·     Shamlink down: sham link interface down

·     DeadInterval timer expired: Dead interval timer timeout

·     Configuring stub area: Stub area configuration change

·     Configuring nssa area: NSSA area configuration change

·     Opaque-Capability changed: opaque-capability enable configuration change

·     Out-of-Band Resynchronazition Capability changed: enable out-of-band-resynchronization configuration change

·     BFD session down: BFD session down

·     Database-filter or referenced ACL changed: configuration change for filtering LSA sent to a specific neighbor or change of ACL rule referenced by the configuration

shutdown: configured the shutdown process command

Severity level

6 (Informational)

Example

OSPF/6/OSPF_LAST_NBR_DOWN: OSPF 1 Last neighbor down event: Router ID: 2.2.2.2 Local address: 10.1.1.1 Remote address: 10.1.1.2 Reason: Dead Interval timer expired.

Impact

Service interruption might occur.

Cause

·     Adjacent timer timeout

·     Physical interface change

·     OSPF-linked BFD session Down

·     OSPF configuration change

Neighbor device reasons

Recommended action

Reason for OSPF neighbor down is adjacent timer timeout, Recommended action as follows:

1.     Execute the ping command to check if the device link is faulty (including transmission equipment faults).

¡     If ping fails, check the transmission equipment, link status, interface situation, and adjust hardware equipment to restore service.

¡     If ping is successful, go to step 2.

2.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

Reason for OSPF neighbor down is physical interface change, Recommended action as follows:

1.     Execute the display interface [ interface-type [ interface-number | interface-number.subnumber ] ] command to check the status of the physical interface that establishes the OSPF neighbor relationship.

¡     If the physical status of the interface is DOWN, check if the transmission equipment is normal, and restore the physical interface status to eliminate the fault.

¡     If the physical status of the interface is "Administratively DOWN," it means that the interface has been manually closed with the shutdown command, open the interface by executing the undo shutdown command under the interface.

¡     If the physical status of the interface is "UP," go to step 2.

2.     Execute the display ospf interface command to check if the interface is in a normal state under the OSPF protocol.

¡     If the OSPF interface status is Down, check if the interface is configured with an IP address, and eliminate the fault by checking the IP address.

¡     If the OSPF interface status is P-2-P, DR, BDR, or DROther, go to step 3.

3.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

Reason for OSPF neighbor down is BFD session down, Recommended action as follows:

1.     Execute the ping command to check if the device link is faulty (including transmission equipment faults).

¡     If ping fails, check the transmission equipment, link status, interface situation, and adjust hardware equipment to restore service.

¡     If ping is successful, go to step 2.

2.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

Reason for OSPF neighbor down is configuration change, Recommended action as follows:

1.     Use the display ospf interface command to check if the OSPF Area ID configuration at both ends is consistent.

¡     If they are consistent, go to step 2.

¡     If not consistent, modify to be consistent.

2.     Use the 'display ospf interface' command to check if the network types of the local and remote interfaces are consistent.

¡     If not consistent, modify to be consistent.

¡     If they are consistent, go to step 3.

3.     Use the 'display ospf statistics error' command every 10 seconds to check the OSPF error statistics and continue for 5 minutes.

¡     If the count value corresponding to the 'Bad authentication type' field keeps increasing, it means that the OSPF authentication types configured on the two devices establishing the neighbor are inconsistent, and the same authentication type needs to be configured on both devices.

¡     If the count value corresponding to the 'Hello-time mismatch' field keeps increasing, it means that the values of the Hello timer on the interface are inconsistent, and the Hello timer values on both interfaces need to be set to be consistent.

¡     If the count value corresponding to the 'Dead-time mismatch' field keeps increasing, it means that the values of the Dead timer on the interface are inconsistent, and the Dead timer values on both interfaces need to be set to be consistent.

¡     If the count value corresponding to the 'Ebit option mismatch' field keeps increasing, it means that the area type configuration is inconsistent (one end is configured as a normal area, and the other end is configured as a Stub or NSSA area), and the area types on both ends need to be set to be consistent.

4.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

OSPF_NBR_CHG

Message text

OSPF [UINT32] Neighbor [STRING] ([STRING]) changed from [STRING] to [STRING].

Variable fields

$1: OSPF process ID.

$2: Neighbor router ID.

$3: Interface name.

$4: Original neighbor state.

$5: New neighbor state.

Severity level

3 (Error)

Example

OSPF/3/OSPF_NBR_CHG: OSPF 1 Neighbor 2.2.2.2 (Vlan-interface100) changed from Full to Down.

Impact

The sequence of OSPF neighbor state changes from low to high is: Down->Init->2-Way->ExStart->Exchange->Loading->Full. If the neighbor state changes from a lower state to a higher state, it is normal operation information and does not need attention. If the neighbor state changes from a higher state to a lower state, service interruption might occur.

Cause

The following reasons may cause the OSPF neighbor state to change from 2-way or Full state to other states:

·     Link fault, OSPF packets are discarded

·     DR priority configuration of the interface is unreasonable

·     OSPF MTU values configured on both ends are different

·     Neighbor adjacency timer times out

·     BFD session status linked to OSPF becomes Down

Recommended action

1.     execute the 'display ospf peer' command to check the "State" field, which indicates the neighbor state. If the neighbor state is Full, it is normal operation information and does not need to be handled. Otherwise, go to step 2.

2.     Execute the 'display interface interface-type interface-number' command to check the status of the interface connecting the neighbor.

¡     If the physical interface status is Up, go to step 3.

¡     If the physical interface status is Down, check if the 'shutdown' command is configured on the interface. If the 'shutdown' command is configured, execute the 'undo shutdown' command, then go to step 3. If the 'shutdown' command is not configured, go to step 3.

3.     Check if the opposite interface IP address can be pinged.

¡     If it cannot be pinged, go to step 6.

¡     If it can be pinged, go to step 4.

4.     Execute the 'display ospf interface' command to check the "State" field, which indicates the OSPF interface status.

¡     If the interface establishing a neighbor relationship with the opposite end is in the Down state, go to step 6.

¡     If the interface establishing a neighbor relationship with the opposite end is in a non-Down state, go to step 5.

5.     Execute the 'display ospf interface verbose' command to check if the parameters configured on this device and the opposite device are consistent, including: Hello timer, Dead timer, Poll timer, OSPF network type, authentication. If the parameters configured on both ends are consistent, go to step 6. If the parameters configured on both ends are inconsistent, modify the configuration using the following command to ensure consistency.

¡     ospf timer hello

¡     ospf timer dead

¡     ospf timer poll

¡     ospf network-type

¡     ospf authentication-mode

6.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

OSPF_NBR_CHG_REASON

Message text

OSPF [UINT32] Area [STRING] Router [STRING]([STRING]) CPU usage: [STRING], VPN name: [STRING], IfMTU: [UINT32], Neighbor address: [STRING], NbrID [STRING] changed from [STRING] to [STRING] at [STRING].

Last 4 hello packets received at:

[STRING]

Last 4 hello packets sent at:

[STRING]

Variable fields

$1: OSPF process ID.

$2: Area ID.

$3: Router ID.

$4: Interface short name

$5: CPU usage.

$6: VPN name. Only the neighbor status change log information of the OSPF multi-instance process will display the VPN name

$7: Interface MTU size

$8: Neighbor IP address.

$9: Neighbor's router ID

$10: Neighbor state before the change

$11: Neighbor state after the change and the reason for the state change

·     to DOWN because OSPF interface parameters changed.

·     to DOWN because the OSPF process was reset.

·     to DOWN because the OSPF process was deleted.

·     to DOWN because the OSPF area was deleted.

·     to DOWN because OSPF was disabled (Interface: interface, peer address: address).

·     to DOWN because OSPF packet receiving and sending are disabled (Interface: interface, peer address: address).

·     to DOWN because the interface address was deleted or OSPF was disabled on interface.

·     to DOWN because the interface went down or MTU changed.

·     to DOWN because the virtual link was deleted or the route it relies on was deleted.

·     to DOWN because to DOWN because the virtual link interface went down or the virtual link settings were deleted.

·     to DOWN because the sham link was deleted or the route it relies on was deleted.

·     to DOWN because the dead timer expired.

·     to DOWN because the stub configuration changed in area area-id.

·     to DOWN because the NSSA configuration changed in area area-id.

·     to DOWN because the Opaque LSA capability configuration changed.

·     to DOWN because the out-of-band resynchronization capability configuration changed.

·     to DOWN because BFD session went down.

·     to INIT because a 1-way hello packet was received.

·     to DOWN because database-filter configuration changed or database-filter ACL configuration changed.

·     to EXSTART because a BadLSReq event was triggered upon the request for a nonexistent LSA.

·     to EXSTART because the LSA requested and then learned is the same as that in local.

·     to EXSTART because the LSA requested and then learned is older than that in local.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a non-retransmitted DD packet from the Loading or Full peer during the DD retransmit interval.

·     to EXSTART because a SeqNumberMismatch event was triggered by the change of the OSPF peer’s capability to link-local signaling attribute.

·     to EXSTART because a SeqNumberMismatch event was triggered by the OSPF peer’s multi-topology attribute change.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a retransmitted DD packet from the Loading or Full peer after the DD retransmit interval expired.

·     to EXSTART because a SeqNumberMismatch event was triggered by the change of the OSPF peer’s capability to receive AS external LSA.

·     to EXSTART because a SeqNumberMismatch event was triggered by the master-slave relationship change.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of an unexpected initial DD packet after DD transmission started.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet with a wrong sequence number from the slave.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet with a wrong sequence number from the master.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet containing local opaque LSA without enabling the opaque capability.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet containing area opaque LSA without enabling the opaque capability.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet containing AS opaque LSA without enabling the opaque capability.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet containing NSSA external LSA in a non-NSSA area.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet containing invalid LSA.

·     to EXSTART because a SeqNumberMismatch event was triggered upon the receipt of a DD packet containing AS external LSA in the stub area or on the virtual link.

$12: Time when the neighbor state changed.

$13: Time when 4 Hello packets were received before the neighbor state change

$14: Time when 4 Hello packets were sent before the neighbor state change

Severity level

5 (Notification)

Example

OSPF/5/OSPF_NBR_CHG_REASON: OSPF 1 Area 0.0.0.0 Router 2.2.2.2(GE1/0/1) CPU usage:3.80%, VPN name: a, IfMTU:1500, Neighbor address:10.1.1.2, NbrID:1.1.1.1 changed from Full to Down because OSPF interface parameters changed at 2019-04-01 15:20:57:034.

Last 4 hello packets received at:

   2019-09-01 15:19:46:225

   2019-09-01 15:19:56:224

   2019-09-01 15:20:06:225

   2019-09-01 15:20:16:225

Last 4 hello packets sent at:

   2019-09-01 15:20:22:033

   2019-09-01 15:20:32:033

   2019-09-01 15:20:42:032

   2019-09-01 15:20:52:033

Impact

OSPF neighbor state change sequence from low to high: Down->Init->2-Way->ExStart->Exchange->Loading->Full. If the neighbor state changes from a lower state to a higher state, it is normal operation information and does not need attention. If the neighbor state changes from a higher state to a lower state, service interruption might occur.

Cause

·     OSPF adjacency state changes from Attempt to 1-way or Down, or from Down to 2-way or Full.

·     Configuration parameters of this end or the peer interface (such as Hello timer, Dead timer, interface authentication, etc.) are inconsistent.

·     Restart the OSPF protocol by executing the reset ospf process command.

·     Interface adjacency state on NBMA network or broadcast network changes from Full to other states, or from other states to Full.

Recommended action

1.     Execute the display ospf peer command to check the "State" field, which indicates the neighbor state. If the neighbor state is Full, it is normal operation information and does not need to be processed. Otherwise, go to step 2.

2.     Execute the display interface interface-type interface-number command to check the status of the interface connecting the neighbor.

¡     If the physical interface status is Up, go to step 3.

¡     If the physical interface status is Down, check if the shutdown command is configured on this interface. If the shutdown command is configured, execute the undo shutdown command, then go to step 3. If the shutdown command is not configured, go to step 3.

3.     Check if the peer interface IP address can be pinged.

¡     If the ping is unsuccessful, go to step 6.

¡     If the ping is successful, go to step 4.

4.     Execute the display ospf interface command to check the "State" field, which indicates the OSPF interface status.

¡     If the interface establishing neighbor relationship with the peer is in Down state, go to step 6.

¡     If the interface establishing neighbor relationship with the peer is in a non-Down state, go to step 5.

1.     Execute the display ospf interface verbose command to check if the configuration parameters of this device and the peer device are consistent.

¡     If they are not consistent, modify them to be consistent.

¡     If they are consistent, go to step 6.

2.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

OSPF_RTRID_CHG

Message text

OSPF [UINT32] New router ID elected, restart OSPF if you want to make the new Router ID take effect.

Variable fields

$1: OSPF process ID.

Severity level

5 (Notification)

Example

OSPF/5/OSPF_RTRID_CHG: OSPF 1 New router ID elected, restart OSPF if you want to make the new Router ID take effect.

Impact

No negative impact on the system.

Cause

The user changed the Router ID or the interface IP used, which caused the OSPF router ID to change. Manual restart of OSPF is required to make the new router ID take effect.

Recommended action

If you want the new Router ID to take effect, ensure that restarting the process will not affect current business, and use the 'reset ospf process' command to make the new router ID take effect.

 

OSPF_RTRID_CONFLICT_INTER

Message text

OSPF [UINT16] Received newer self-originated ase-LSAs. Possible conflict of router ID [STRING].

Variable fields

$1: OSPF process ID.

$2: Router ID.

Severity level

6 (Informational)

Example

OSPF/6/OSPF_RTRID_CONFLICT_INTER: OSPF 1 Received newer self-originated ase-LSAs. Possible conflict of router ID 11.11.11.11.

Impact

AS External LSA continues to refresh, and external routes introduced by ASBR continue to flap

Cause

Two non-directly connected devices within the same OSPF domain may have the same router ID configured, with one device being the ASBR

Recommended action

1.     Depending on the different ways to obtain the Router ID in the OSPF process, select different handling steps:

¡     If the OSPF process uses the global router ID, execute the router id command to edit the router ID.

¡     If the OSPF process uses a manually specified router ID, execute the ospf router-id command to edit the router ID.

¡     If the OSPF process uses an automatically obtained router ID, execute the ip address command to edit the IP address of the corresponding interface.

2.     Execute the reset ospf process command to enable the new router ID to take effect.

 

OSPF_RTRID_CONFLICT_INTRA

Message text

OSPF [UINT16] Received newer self-originated router-LSAs. Possible conflict of router ID [STRING] in area [STRING].

Variable fields

$1: OSPF process ID.

$2: Router ID.

$3: OSPF area ID.

Severity level

4 (Warning)

Example

OSPF/4/OSPF_RTRID_CONFLICT_INTRA: OSPF 1 Received newer self-originated router-LSAs. Possible conflict of router ID 11.11.11.11 in area 0.0.0.1.

Impact

Router LSA keeps refreshing, route flapping

Cause

Two non-directly connected devices in the same OSPF area may have the same router ID configured

Recommended action

1.     Depending on the different ways to obtain the Router ID in the OSPF process, select different processing steps:

¡     If the OSPF process uses the global router ID, execute the router id command to edit the router ID.

¡     If the OSPF process uses a manually specified router ID, execute the ospf router-id command to edit the router ID.

¡     If the OSPF process uses an automatically obtained router ID, execute the ip address command to edit the IP address of the corresponding interface.

3.     Execute the reset ospf process command to enable the new router ID to take effect..

 

OSPF_VLINKID_CHG

Message text

OSPF [UINT32] Router ID changed, reconfigure Vlink on peer

Variable fields

$1: OSPF process ID.

Severity level

5 (Notification)

Example

OSPF/5/OSPF_VLINKID_CHG:OSPF 1 Router ID changed, reconfigure Vlink on peer

Impact

Modification of the remote device's virtual link configuration is required

Cause

The new Router ID of the local OSPF process takes effect

Recommended action

1.     Execute the display ospf process-id command to obtain the router ID of the OSPF process. The value of the process-id argument is the OSPF process ID in this message.

2.     On the remote device, use the undo vlink-peer command to delete the original virtual link configuration. Then, reconfigure the virtual link using the vlink-peer command and specify the Router ID from step 1 as the virtual link neighbor's Router ID.

 

PBR messages

This section contains PBR messages.

PBR_HARDWARE_BIND_ERROR

Message text

Failed to apply the policy [STRING] to interface [STRING] because of [STRING]..

Variable fields

$1: Policy name.

$2: Interface name.

$3: Hardware processing failure reasons:

·     insufficient hardware resources.

·     unsupported operations.

·     insufficient hardware resources and unsupported operations.

Severity level

4 (Warning)

Example

PBR/4/PBR_HARDWARE_BIND_ERROR: Failed to apply the policy abc to interface GigabitEthernet1/0/1 because of unsupported operations.

Impact

The interface cannot use PBR to forward packets.

Cause

Unicast PBR policy failed to be configured on the interface.

Recommended action

Edit the PBR policy configuration according to the failure reason:

·     If hardware resources are insufficient, check PBR configuration on the device and delete unnecessary settings.

·     If the system does not support the operation, identify whether the PBR configuration contains the if-match or apply clauses that are not supported by the device.

·     If hardware resources are insufficient, and the system does not support the operation, check for unnecessary PBR settings on the device, and identify whether the PBR configuration contains unsupported clauses.

 

PBR_HARDWARE_ERROR

Message text

Failed to update policy [STRING] because of [STRING].

Variable fields

$1: Policy name.

$2: Hardware error reasons:

·     insufficient hardware resources.

·     unsupported operations.

·     insufficient hardware resources and unsupported operations.

Severity level

4 (Warning)

Example

PBR/4/PBR_HARDWARE_ERROR: Failed to update policy aaa because of insufficient hardware resources and not supported operations.

Impact

You cannot use the most recent PBR configuration to guide packet forwarding.

Cause

The device failed to update PBR configuration.

Recommended action

Modify the PBR policy configuration according to the failure reason:

·     If hardware resources are insufficient, check PBR configuration on the device and delete unnecessary settings.

·     If the system does not support the operation, identify whether the PBR configuration contains the if-match or apply clauses that are not supported by the device.

·     If hardware resources are insufficient, and the system does not support the operation, check for unnecessary PBR settings on the device, and identify whether the PBR configuration contains unsupported clauses.

 

PBR_NEXTHOP_CHANGE

Message text

Policy name=[STRING], node ID=[STRING], VPN instance=[STRING], next hop=[STRING], next hop unreachable because of [STRING].

Variable fields

$1: Policy name.

$2: Node ID.

$3: VPN instance name. For the public network, this field displays public.

$4: Next hop IP address.

$5: Next hop change reason:

·     FIB information change—The FIB information changed.

·     track entry status change—The track entry status changed.

·     configuration change—The PBR configuration on the device was edited.

Severity level

4 (Warning)

Example

PBR/4/PBR_NEXTHOP_CHANGE: Policy name=a, node ID=0, VPN instance=public, next hop=1.1.1.2, next hop unreachable because of FIB information change.

Impact

Packet forwarding might fail.

Cause

The link to the next hop specified in the PBR policy changed.

Recommended action

Take the action based on the next hop change reason:

·     For FIB information change, identify whether the FIB entry associated with the next hop is correct.

·     For track entry status change, locate the change reason and troubleshoot the associated issue.

·     For PBR configuration change, identify whether the edited PBR configuration meets forwarding requirements.

 

PING messages

This section contains ping messages.

PING_STATISTICS

Message text

[STRING] statistics for [STRING]: [UINT32] packet(s) transmitted, [UINT32] packet(s) received, [DOUBLE]% packet loss, round-trip min/avg/max/std-dev = [DOUBLE]/[DOUBLE]/[DOUBLE]/[DOUBLE] ms.

Variable fields

$1: Ping or ping6.

$2: IP address, IPv6 address, or host name for the destination.

$3: Number of sent echo requests.

$4: Number of received echo replies.

$5: Percentage of the non-replied packets to the total request packets.

$6: Minimum round-trip delay.

$7: Average round-trip delay.

$8: Maximum round-trip delay.

$9: Standard deviation round-trip delay.

Severity level

6 (Informational)

Example

PING/6/PING_STATISTICS: Ping statistics for 1.1.1.2: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.600/2.000/0.800 ms.

Impact

No negative impact on the system.

Cause

A user uses the ping command to identify whether a destination in the public network is reachable.

Recommended action

·     If the packet loss rate in the statistics is 0, it indicates normal communication, and no action is required.

·     If the packet loss rate is greater than 0 but less than 100%, packet loss has occurred. The reason might be unstable links or sudden traffic congesting the bandwidth. Perform the following tasks:

¡     Execute the display interface command to check the interface status. If the interface status changes frequently between up and down, it might be a cable fault or an issue with interface components. Please further identify and resolve the issue.

¡     Execute the display counter command to display packet rate statistics for interfaces that are up during the last statistics collection period. If there is a significant increase in traffic, burst traffic might exist. You can capture or mirror the traffic for analysis and set ACLs to filter unauthorized traffic.

·     If the packet loss rate is 100%, perform the following tasks:

¡     Execute the display interface command to identify whether the interface is down. If the interface is down, follow the prompts in the output to troubleshoot the issue.

¡     Execute the display ipv6 routing-table command to check the public network routing table for routes to the destination. If there are no routes, manually add a route or introduce it through a dynamic routing protocol.

 

PING_VPN_STATISTICS

Message text

[STRING] statistics for [STRING] in VPN instance [STRING] [UINT32] packet(s) transmitted, [UINT32] packet(s) received, [DOUBLE]% packet loss, round-trip min/avg/max/std-dev = [DOUBLE]/[DOUBLE]/[DOUBLE]/[DOUBLE] ms.

Variable fields

$1: Ping or ping6.

$2: IP address, IPv6 address, or host name for the destination.

$3: VPN instance name.

$4: Number of sent echo requests.

$5: Number of received echo replies.

$6: Percentage of the non-replied packets to the total request packets.

$7: Minimum round-trip delay.

$8: Average round-trip delay.

$9: Maximum round-trip delay.

$10: Standard deviation round-trip delay.

Severity level

6 (Informational)

Example

PING/6/PING_VPN_STATISTICS: Ping statistics for 192.168.0.115 in VPN instance vpn1: 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss, round-trip min/avg/max/std-dev = 0.000/0.800/2.000/0.748 ms.

Impact

No negative impact on the system.

Cause

A user uses the ping command to identify whether a destination in a private network is reachable.

Recommended action

·     If the packet loss rate in the statistics is 0, it indicates normal communication, and no action is required.

·     If the packet loss rate is greater than 0 but less than 100%, packet loss has occurred. The reason might be unstable links or sudden traffic congesting the bandwidth. Perform the following tasks:

¡     Execute the display interface command to check the interface status. If the interface status changes frequently between up and down, it might be a cable fault or an issue with interface components. Please further identify and resolve the issue.

¡     Execute the display counter command to display packet rate statistics for interfaces that are up during the last statistics collection period. If there is a significant increase in traffic, burst traffic might exist. You can capture or mirror the traffic for analysis and set ACLs to filter unauthorized traffic.

·     If the packet loss rate is 100%, perform the following tasks:

¡     Execute the display interface command to identify whether the interface is down. If the interface is down, follow the prompts in the output to troubleshoot the issue.

¡     Execute the display ipv6 routing-table command with the vpn keyword specified to check the VPN routing table for routes to the destination. If there are no routes, manually add a route or introduce it through a dynamic routing protocol.

 

 

PKG messages

This section contains package management messages.

PKG_BOOTLOADER_FILE_FAILED

Message text

Failed to execute the boot-loader file command.

Variable fields

None

Severity level

5 (Notification)

Example

PKG/5/PKG_BOOTLOADER_FILE_FAILED: -IPAddr=192.168.79.1-User=**; Failed to execute the boot-loader file command.

Impact

No negative impact on the system.

Cause

A user executed the boot-loader file command, but the command failed.

Recommended action

Take actions as prompted by the command.

 

PKG_BOOTLOADER_FILE_SUCCESS

Message text

Executed the boot-loader file command successfully.

Variable fields

None

Severity level

5 (Notification)

Example

PKG/5/PKG_BOOTLOADER_FILE_SUCCESS: -IPAddr=192.168.79.1-User=**; Executed the boot-loader file command successfully.

Impact

No negative impact on the system.

Cause

A user executed the boot-loader file command successfully.

Recommended action

No action is required.

 

PKG_INSTALL_ACTIVATE_FAILED

Message text

Failed to execute the install activate command.

Variable fields

None

Severity level

5 (Notification)

Example

PKG/5/PKG_INSTALL_ACTIVATE_FAILED: -IPAddr=192.168.79.1-User=**; Failed to execute the install activate command.

Impact

No negative impact on the system.

Cause

A user executed the install activate command, but the command failed.

Recommended action

Take actions as prompted by the command.

 

PKG_INSTALL_ACTIVATE_SUCCESS

Message text

Executed the install activate command successfully.

Variable fields

None

Severity level

5 (Notification)

Example

PKG/5/PKG_INSTALL_ACTIVATE_SUCCESS: -IPAddr=192.168.79.1-User=**; Executed the install activate command successfully.

Impact

No negative impact on the system.

Cause

A user executed the install activate command successfully.

Recommended action

No action is required.

 

 

PKI messages

This section contains PKI messages.

REQUEST_CERT_FAIL

Message text

Failed to request certificate of domain [STRING].

Variable fields

$1: PKI domain name

Severity level

5 (Notification)

Example

PKI/5/REQUEST_CERT_FAIL: Failed to request certificate of domain abc.

Impact

·     If the system does not have a certificate, the certificate related services will be unavailable.

·     When the certificate expires, the certificate related services will be unavailable.

Cause

This message is generated when the system fails to request certificate for a domain.

Recommended action

1.     Execute the display clock command to check whether the system time is correct on the device.

¡     If not, edit the device time by using the clock datetime command.

¡     If yes, go to step 2.

2.     Ping the connectivity between the device and CA server.

¡     If ping fails, troubleshoot the routes and physical links to ensure the connectivity between them.

¡     If ping succeeds, go to step 3.

3.     Check whether the CA server provides services normally.

¡     If not, make the CA services normal.

¡     If yes, go to step 4.

4.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

REQUEST_CERT_SUCCESS

Message text

Request certificate of domain [STRING] successfully.

Variable fields

$1: PKI domain name

Severity level

5 (Notification)

Example

PKI/5/REQUEST_CERT_SUCCESS: Request certificate of domain abc successfully.

Impact

No negative impact on the system.

Cause

The system successfully requested a certificate for a domain.

Recommended action

No action is required.

 

PKT2CPU messages

This section contains PKT2CPU messages.

PKT2CPU_NO_RESOURCE

Message text

-Interface=[STRING]-ProtocolType=[UINT32]-MacAddr=[STRING]; The resources are insufficient.

-Interface=[STRING]-ProtocolType=[UINT32]-SrcPort=[UINT32]-DstPort=[UINT32]; The resources are insufficient.

Variable fields

$1: Interface type and number.

$2: Protocol type.

$3: MAC address or source port.

$4: Destination port.

Severity level

4 (Warning)

Example

PKT2CPU/4/PKT2CPU_NO_RESOURCE: -Interface=Ethernet0/0/2-ProtocolType=21-MacAddr=0180-c200-0014; The resources are insufficient.

Impact

The service processing capability is affected, because the hardware resources are insufficient.

Cause

This message is generated when the hardware resources were insufficient.

Recommended action

1.     Cancel the configuration that is not needed.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support.

 

Portal messages

This section contains portal messages.

PORTAL_USER_LOGOFF

Message text

UserName=[STRING], IPAddr=[STRING], IfName=[STRING], OuterVLAN=[UINT16], InnerVLAN=[UINT16], MACAddr=[STRING], Reason=[STRING], Input Octets=[UINT32], Output Octets=[UINT32], Input Gigawords=[UINT32], Output Gigawords=[UINT32], IPv6Input Octets=[UINT32], IPv6Output Octets=[UINT32], IPv6 Input Gigawords=[UINT32], IPv6Output Gigawords=[UINT32], SessionTime=[UINT32]; User logged off.

Variable fields

$1: Username.

$2: IP address.

$3: Interface name.

$4: Outer VLAN ID.

$5: Inner VLAN ID.

$6: MAC address.

$7: Reason for user offline, see Table 8.

$8: Statistics of the user's upstream IPv4 traffic, in bytes.

$9: Statistics of the user's downstream IPv4 traffic, in bytes.

$10: Statistics of the user's upstream IPv4 traffic. The measurement unit is 4G bytes.

$11: Statistics of the user's downstream IPv4 traffic. The measurement unit is 4G bytes.

$12: Statistics of the user's upstream IPv6 traffic, in bytes.

$13: Statistics of the user's downstream IPv6 traffic, in bytes.

$14: Statistics of the user's upstream IPv6 traffic. The measurement unit is 4G bytes.

$15: Statistics of the user's downstream IPv6 traffic. The measurement unit is 4G bytes.

$16: Online duration of the user, in seconds.

Severity level

6 (Informational)

Example

PORTAL/6/PORTAL_USER_LOGOFF: UserName=abc, IPAddr=1.1.1.2, IfName=Route-Aggregation1023.4000, OuterVLAN=100, InnerVLAN=4000, MACAddr=0230-0103-5601, Reason=User request, Input Octets=100, Output Octets=200, Input Gigawords=100, Output Gigawords=200, IPv6Input Octets=100, IPv6Output Octets=200, IPv6Input Gigawords=100, IPv6Output Gigawords=200, SessionTime=200; User logged off.

Impact

No negative impact on the system.

Cause

A portal user went offline.

Whether IPv6-related fields are displayed depends on the configuration of the portal user-log traffic-separate command. For more information, see portal commands in Security Command Reference.

Recommended action

Choose the recommended action according to the reason (see Table 8).

Table 8 Reasons that a user goes offline and recommended actions

Reason

Description

Recommended action

User request.

The user requested to be offline.

No action is required.

DHCP entry deleted.

The DHCP entry was deleted.

Verify that the DHCP server configuration is correct.

Idle timeout.

The traffic of the user in the specified period of time does not reach the idle cut traffic threshold.

No action is required.

Session timeout.

The user's online time has reached the session timeout time assigned by the server.

No action is required.

User detection failure.

The user failed online detection.

No action is required.

Force logout by RADIUS server.

The RADIUS server logged out the user.

No action is required.

Interface down.

·     The state of the access interface became Down or Deactive.

·     The access interface is a VLAN interface and a Layer 2 port left the VLAN.

·     Verify that a cable is correctly inserted to the user access interface, and the access interface is not shut down by using the shutdown command.

·     Verify that the user access interface card or subcard operates normally.

·     Verify that portal roaming is enabled on the user access Layer 2 Ethernet interface.

Failed to assign a user rule.

N/A.

Release memory to ensure enough hardware memory space.

Authorization info changed.

Authorization information changed for the user. For example, the authorization ACL or user profile was deleted.

No action is required.

Force logout by access device.

The device logged out the user.

Make sure portal authentication functions normally on the user access interface.

User info synchronization failure.

The device failed to synchronize user information with the server.

·     Make sure the user heartbeat interval configured on the portal authentication server is not greater than the user synchronization detection timeout configured on the access device.

·     Verify that the server is reachable.

User recovery failure.

User information recovery failed.

·     Verify that the user access interface is up.

·     Verify that portal authentication is enabled on the user access interface.

·     Verify that the session timeout timer for the user does not expire.

Authorization ACL for the online user changed.

N/A

·     Verify that the authorization ACL for the user is correctly assigned.

·     Verify that strict checking on authorized ACLs is disabled.

Authorization user profile for the online user changed.

N/A

·     Verify that the authorization user profile for the user is correctly assigned by using the display user profile command.

·     Verify that strict checking on authorized user profiles is disabled.

Accounting update failure.

Failed to update accounting for the user.

·     Verify that the device can correctly communicate with the accounting server.

·     Verify that the status of the accounting server is active.

Failed to start accounting.

Failed to start accounting for the user.

·     Verify that the device can correctly communicate with the accounting server.

·     Verify that the status of the accounting server is active.

User traffic reached threshold.

Traffic of the user reached the traffic threshold set by the server.

No action is required.

Authorization VPN instance deleted.

The authorization VPN instance was deleted.

No action is required.

Authorization ACL does not exist.

The authorization ACL does not exist.

Verify that the ACL is correctly configured on the device.

Failed to get physical info.

Failed to get the physical information.

No action is required.

Failed to add an ARP or ND entry for the user.

Failed to add the ARP or ND entry of the user.

No action is required.

User information does not match user profile.

The user information and the user profile do not match.

No action is required.

Authorization user profile does not exist.

The authorization user profile does not exist.

Verify that the user profile is correctly configured on the device.

Failed to issue the user rule to the AP.

Failed to issue the user rule to the AP.

No action is required.

Deleted the user for SSID switchover.

The user was logged out after SSID switchover.

No action is required.

Failed to issue an OpenFlow rule to the AP.

Failed to issue an OpenFlow rule to the AP.

No action is required.

Logged out the user after the wireless client disconnected.

The user was logged out after the wireless client was disconnected.

No action is required.

Logged out the user when a new user with the same MAC address performed MAC-trigger authentication.

The user was logged out because a new user with the same MAC address performed MAC-trigger authentication.

No action is required.

Logged out the user when a new dual-stack user with the same MAC address came online.

The user was logged out because a new dual-stack user with the same MAC address came online.

No action is required.

The portal server failed to instruct the device to change the user IP address.

The portal server failed to instruct the device to change the IP address of the user.

No action is required.

DHCP received a DHCP release packet.

The user was logged out because DHCP received a DHCP release message.

No action is required.

DHCP lease expired.

The DHCP lease of the user expired.

No action is required.

DHCP received a DHCP release packet from the WLAN roaming center.

The WLAN roaming center instructed DHCP to log out the user because of a DHCP release message.

No action is required.

WLAN roaming center instructed portal to log out the user.

The WLAN roaming center instructed portal to log out the user.

No action is required.

Logged out the user after user synchronization through WiFiDog.

Portal logged out the user after it synchronized user information through WifFiDog.

No action is required.

The cloud portal server instructed portal to log out the user.

The cloud portal server instructed portal to log out the user.

No action is required.

PORTAL_USER_LOGON_FAIL

Message text

-UserName=[STRING]-IPAddr=[IPADDR]-IfName=[STRING]-OuterVLAN=[UINT16]-InnerVLAN=[UINT16]-MACAddr=[STRING]-Reason=[STRING]; User failed to get online.

Variable fields

$1: Username.

$2: IP address.

$3: Interface name.

$4: Outer VLAN ID.

$5: Inner VLAN ID.

$6: MAC address.

$7: Login failure reason, see Table 9.

Severity level

6 (Informational)

Example

PORTAL/6/PORTAL_USER_LOGON_FAIL: -UserName=abc-IPAddr=1.1.1.2-IfName=Route-Aggregation1023.4000- OuterVLAN=100-InnerVLAN=4000-MACAddr=0230-0103-5601-Reason= Authentication Failed : 4; User failed to get online.

Impact

The portal user cannot come online or use portal services.

Cause

A portal user failed to come online. For possible reasons, see Table 9.

Recommended action

Choose the recommended action according to the reason, see Table 9.

Table 9 Reasons that a user fails to come online and recommended actions

Reason

Description

Recommended action

Authorization failure.

Authorization failed, or authorization attributes deployment failed.

·     Verify that the device can correctly communicate with the authorization server.

·     Verify that the authorization user attributes exist on the device and are correctly configured.

·     Verify that the device supports the authorization user attributes.

Received logout request.

The user received a logout request from the portal server during the login process.

Verify that the device can correctly communicate with the AAA server.

Authentication failure.

Authentication failed.

·     Verify that the device can correctly communicate with the authentication server.

·     Verify that the shared key is the same on the device and the authentication server.

·     Verify that the username is valid.

·     Verify that the password for the username is correct.

·     Verify that the authentication domain on the device is correct.

Other error.

Unknown error.

N/A

PORTAL_USER_LOGON_SUCCESS

Message text

-UserName=[STRING]-IPAddr=[STRING]-IfName=[STRING]-OuterVLAN=[UINT16]-InnerVLAN=[UINT16]-MACAddr=[STRING]:User got online successfully.

Variable fields

$1: Username.

$2: IP address.

$3: Interface name.

$4: Outer VLAN ID.

$5: Inner VLAN ID.

$6: MAC address.

Severity level

6 (Informational)

Example

PORTAL/6/PORTAL_USER_LOGON_SUCCESS: -UserName=abc-IPAddr=1.1.1.2-IfName=Route-Aggregation1023.4000- OuterVLAN=100-InnerVLAN=4000-MACAddr=0230-0103-5601; User got online successfully.

Impact

No negative impact on the system.

Cause

A portal user came online successfully.

Recommended action

No action is required.

PPP messages

This section contains PPP messages.

IPPOOL_ADDRESS_EXHAUSTED

Message text

The address pool [STRING] was exhausted.

Variable fields

$1: Pool name.

Severity level

5 (Notification)

Example

PPP/5/IPPOOL_ADDRESS_EXHAUSTED: The address pool aaa was exhausted.

Impact

The address pool cannot allocate addresses to new online users.

Cause

This message is generated when the last address is assigned from the pool.

Recommended action

Add new addresses to the pool.

 

PPP_USER_LOGON_SUCCESS

Message text

-UserName=[STRING]-IPAddr=[IPADDR]-IfName=[STRING]-OuterVLAN=[UINT16]-InnerVLAN=[UINT16]-MACAddr=[MAC]; The user came online successfully.

Variable fields

$1: Username.

$2: IP address.

$3: Interface name.

$4: Outer VLAN ID.

$5: Inner VLAN ID.

$6: MAC address.

Severity level

6 (Informational)

Example

PPP/6/PPP_USER_LOGON_SUCCESS: -UserName=abc-IPAddr=1.1.1.2-IfName=Route-Aggregation1023.4000-OuterVLAN=1000-InnerVLAN=4000-MACAddr=0230-0103-5601; The user came online successfully.

Impact

No negative impact on the system.

Cause

The user has come online successfully.

Recommended action

No action is required.

 

PPP_USER_LOGON_FAILED

Message text

-UserName=[STRING]-IPAddr=[IPADDR]-IfName=[STRING]-OuterVLAN=[UINT16]-InnerVLAN=[UINT16]-MACAddr=[MAC]-Reason=[STRING]; The user failed to come online.

Variable fields

$1: Username.

$2: IP address.

$3: Interface name.

$4: Outer VLAN ID.

$5: Inner VLAN ID.

$6: MAC address.

$7: Cause (see Table 10).

Severity level

6 (Informational)

Example

PPP/6/PPP_USER_LOGON_FAILED: -UserName=abc-IPAddr=1.1.1.2-IfName=Route-Aggregation1023.4000-OuterVLAN=1000-InnerVLAN=4000-MACAddr=0230-0103-5601-Reason=Authentication failed; The user failed to come online.

Impact

A user cannot come online.

Cause

For user online failure causes, see Table 10.

Recommended action

See Table 10.

 

Table 10 Causes and recommended actions

Cause

Description

Recommended action

Authentication method error

The authentication method was configured incorrectly, possibly because the authentication method requested by users is inconsistent with the authentication method configured on the interface.

Verify that the authentication method is configured correctly.

AAA access limit reached

The upper limit of concurrent logins using the same local user name is reached.

1.     Check the number of concurrent online users using the current local user name.

2.     Modify the upper limit of the concurrent logins using the current local user name to a greater value by executing the access-limit command.

The local user does not exist

The local user was not configured.

1.     Verify that the dial-in user is a legal user.

2.     Add the local user if the user is a legal user but the corresponding local user does not exist on the device.

Local authentication failed: wrong password

The local authentication was rejected because of the incorrect password.

1.     Verify that the username is correct.

2.     Verify that the password is correct.

No AAA response during authentication

The device did not receive an AAA response from the authentication server during the authentication timeout time.

1.     Verify that the device communicates with the authentication server correctly.

2.     Verify that the authentication server operates correctly.

3.     Verify that the shared key on the device is the same as the shared key on the authentication server.

RADIUS authentication reject

The RADIUS server returned an access-reject packet.

1.     Verify that the username is correct.

2.     Verify that the password is correct.

AAA authorization information error

Failed to add user authorization information.

Verify that the authorization attributes deployed by the authorization server exist on the device and are configured correctly.

Authentication request to AAA failed

The device failed to send the authentication request to the AAA server.

1.     Verify that the device communicates with the authentication server correctly.

2.     Verify that the authentication server operates correctly.

Accounting request to AAA failed

The device failed to send the accounting request to the AAA server.

1.     Verify that the device communicates with the accounting server correctly.

2.     Verify that the accounting server operates correctly.

No authentication ACK from AAA

The device failed to receive the authentication acknowledgment packet from the AAA server.

1.     Verify that the device communicates with the authentication server correctly.

2.     Verify that the authentication server operates correctly.

TACACS authentication reject

The TACACS server returned an access-reject packet.

1.     Verify that the username is correct.

2.     Verify that the password is correct.

 

PPP_USER_LOGOFF

Message text

-UserName=[STRING]-IPAddr=[IPADDR]-IfName=[STRING]-OuterVLAN=[UINT16]-InnerVLAN=[UINT16]-MACAddr=[MAC]-Reason=[STRING]; The user logged off.

Variable fields

$1: Username.

$2: IP address.

$3: Interface name.

$4: Outer VLAN ID.

$5: Inner VLAN ID.

$6: MAC address.

$7: Cause (see Table 11).

Severity level

6 (Informational)

Example

PPP/6/PPP_USER_LOGOFF: -UserName=abc-IPAddr=1.1.1.2-IfName=Route-Aggregation1023.4000-OuterVLAN=1000-InnerVLAN=4000-MACAddr=0230-0103-5601-Reason=Use request; The user logged off.

Impact

No negative impact on the system.

Cause

A user went offline correctly.

Recommended action

No action is required.

 

Table 11 Causes

Cause

Description

User request

The user connection was terminated at the user's request.

 

PPP_USER_LOGOFF_ABNORMAL

Message text

-UserName=[STRING]-IPAddr=[IPADDR]-IfName=[STRING]-OuterVLAN=[UINT16]-InnerVLAN=[UINT16]-MACAddr=[MAC]-Reason=[STRING]; The user logged off abnormally.

Variable fields

$1: Username.

$2: IP address.

$3: Interface name.

$4: Outer VLAN ID.

$5: Inner VLAN ID.

$6: MAC address.

$7: Cause (see Table 12).

Severity level

6 (Informational)

Example

PPP/6/PPP_USER_LOGOFF_ABNORMAL: -UserName=abc-IPAddr=1.1.1.2-IfName=Route-Aggregation1023.4000-OuterVLAN=1000-InnerVLAN=4000-MACAddr=0230-0103-5601-Reason=Lost Carrier; The user logged off abnormally.

Impact

The user has gone offline abnormally.

Cause

For the abnormal offline causes, see Table 12.

Recommended action

See Table 12.

 

Table 12 Causes and recommended actions

Cause

Description

Recommended action

Lost carrier

The keepalive packets were lost, possibly because the link between the user device and the device connecting to the BAS fails.

Save the related log information locally and contact the support.

Lost service

The service server (for example, L2TP) terminated the service.

No action is required.

Admin reset

The user session was temporarily terminated by the administrator by executing the shutdown command because of management reasons.

No action is required.

BAS request

Unknown reasons.

Save the related log information locally and contact the support.

Session timeout

The user session timed out.

Notify the user that the traffic quota is used up or to renew the user account.

Traffic quota limit reached

The user traffic limit was reached.

Notify the user that the traffic is used up or to renew the user account.

Logged off by the RADIUS server

The AAA server logged off the user.

No action is required.

Accounting update failure

The accounting update failed.

1.     Verify that the device communicates with the accounting server correctly.

2.     Verify that the accounting server operates correctly.

No AAA response during realtime accounting

The user did not receive the response from the accounting server during the timeout time. (In the realtime accounting phase.)

1.     Verify that the device communicates with the accounting server correctly.

2.     Verify that the accounting server operates correctly.

No AAA response for accounting start

The user did not receive the response from the accounting server during the timeout time. (In the accounting start phase.)

1.     Verify that the device communicates with the accounting server correctly.

2.     Verify that the accounting server operates correctly.

No AAA response for accounting stop

The user did not receive the response from the accounting server during the timeout time. (In the accounting stop phase.)

1.     Verify that the device communicates with the accounting server correctly.

2.     Verify that the accounting server operates correctly.

PPP negotiation terminated

The PPP negotiation was terminated.

Verify that the configuration is correct.

Repeated LCP negotiation packets

Repeated LCP negotiation packets were received.

Disconnect the client and initiate a connection again.

The interface that the user accesses goes down

N/A.

1.     Verify that the network cable of the user access interface is correctly connected.

2.     Verify the user access card or subcard has no errors or is in position.

The interface that the user accesses is shut down

N/A.

Verify that the shutdown command is not executed on the user access interface.

Session idle cut

The user traffic did not reach the threshold within the specified period.

No action is required.

 

 

PWDCTL messages

This section contains password control messages.

PWDCTL_ADD_BLACKLIST

Message text

User [STRING] from [IPADDR] was added to the blacklist for failed login attempts.

Variable fields

$1: Username.

$1: User IP address.

Severity level

6 (Informational)

Example

PWDCTL/6/PWDCTL_ADD_BLACKLIST: User hhh from 1.1.1.1 was added to the blacklist for failed login attempts.

Impact

The user is added to the blacklist without being locked. However, when the maximum login attempts with incorrect passwords are reached, the user account will be locked.

Cause

·     The user entered an incorrect password,

·     The user service type is not matched.

·     The user is not activated.

Recommended action

1.     Enter the correct password to log in to the device. If the issue persists, go to step 2.

2.     Identify whether the related settings including the password control and user service type are correct on the device. If the related settings are correct, go to step 3.

3.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PWDCTL_CHANGE_PASSWORD

Message text

[STRING] changed the password because [STRING].

Variable fields

$1: Username.

$2: The reasons for changing the password.

¡     it was the first login of the account.

¡     the password had expired.

¡     the password was too short.

¡     the password was not complex enough.

¡     the password was default password

Severity level

6 (Informational)

Example

PWDCTL/6/PWDCTL_CHANGE_PASSWORD: hhh changed the password because It is the first login of the account.

Impact

No negative impact on the system.

Cause

A user must change the password in one of the following conditions:

·     A user logs in to the device for the first time and the password change at first login feature is enabled.

·     The user password has exceeded the password aging time.

·     The user password length is less than the minimum password length.

·     The user password does not match the password complexity checking policy.

·     Device management users log in to the device with the default password via Telnet, SSH, HTTP, and HTTPS.

This message is generated after you change the password.

Recommended action

After a user changes the password, log in to the device again with the new password.

 

PWDCTL_DELETE_BLACKLIST

Message text

User [STRING] was deleted from the blacklist.

Variable fields

$1: Username.

Severity level

5 (Notification)

Example

PWDCTL/5/PWDCTL_DELETE_BLACKLIST: User hhh was deleted from the blacklist.

Impact

No negative impact on the system.

Cause

·     The user account is removed from the password control blacklist.

·     The administrator uses the reset password-control blacklist command to remove the user account from the password control blacklist.

Recommended action

Use the username that is removed from the blacklist to log in to the device again.

 

PWDCTL_FAILED_TO_OPENFILE

Message text

Failed to create or open the password file.

Variable fields

N/A

Severity level

3 (Error)

Example

PWDCTL/3/PWDCTL_FAILED_TO_OPENFILE: Failed to open the password file.

Impact

The password control feature is not available.

Cause

·     The storage space is insufficient in the system.

·     The running memory is insufficient in the system.

Recommended action

1.     Execute the dir command in user view to view the remaining storage space. If the remaining storage space is insufficient, delete unnecessary files to release the space. If the remaining storage space is sufficient, go to step 2.

2.     Release memory resources. For example, execute the logfile save command to save the content from the log file buffer to the log file to release memory resources occupied by the log file buffer.

2.     Execute the display memory to display memory usage information.

¡     If the memory usage does not drop below the alarm threshold, execute the display process command to check the memory usage of the user-mode processes. If a process uses a large amount of memory and is not required, you can enable or disable the corresponding software feature for that process to release memory.

¡     If the memory usage drops below the alarm threshold, the memory alarm is cleared and the password control feature will continue to take effect.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PWDCTL_FAILED_TO_WRITEPWD

Message text

Failed to write the password records to file.

Variable fields

N/A

Severity level

3 (Error)

Example

PWDCTL/3/PWDCTL_FAILED_TO_WRITEPWD: Failed to write the password records to file.

Impact

A user failed to log in to the device.

Cause

The storage space is insufficient in the system.

Recommended action

Execute the dir command in user view to view the remaining storage space:

·     If the remaining storage space is insufficient, delete unnecessary files to release the space.

·     If the remaining storage space is sufficient, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PWDCTL_NOENOUGHSPACE

Message text

Not enough free space on the storage media where the file is located.

Variable fields

N/A

Severity level

3 (Error)

Example

PWDCTL/3/PWDCTL_NOENOUGHSPACE: Not enough free space on the storage media where the file is located.

Impact

The password control feature failed to be configured.

Cause

The memory space is insufficient on the storage media such as the flash or CF card where the .dat file is located.

Recommended action

Execute the dir command in user view to view the remaining storage space in the system.

·     If the remaining storage space is insufficient, delete unnecessary files to release the space.

·     If the remaining storage space is sufficient, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PWDCTL_NOTFOUNDUSER

Message text

Can't find the username in the file.

Variable fields

N/A

Severity level

3 (Error)

Example

PWDCTL/3/PWDCTL_NOTFOUNDUSER: Can't find the username in the file.

Impact

The user password failed to be configured. The user cannot log in to the device.

Cause

·     The LAUTHD process is abnormal.

·     The local user configuration is abnormal.

Recommended action

1.     Disable the password control feature and then enable the password control feature. If the issue persists, go to step 2.

2.     Create a local user. If the issue persists, go to step 3.

3.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PWDCTL_UPDATETIME

Message text

Last login time updated after clock update.

Variable fields

N/A

Severity level

6 (Informational)

Example

PWDCTL/6/PWDCTL_UPDATETIME: Last login time updated after clock update.

Impact

No negative impact on the system.

Cause

This message is generated when the last login time is updated.

Recommended action

No action is required.

 

PWDCTL_USER_LOCK

Message text

User [STRING] from [IPADDR] was [STRING] after making the maximum login attempts.

Variable fields

$1: Username.

$2: User IP address.

$3: The locking action to be taken after the user fails the maximum number of consecutive login attempts:

¡     locked in lock-time minutes—Locks the user account for a period of time. When the locking timer expires, users can use this user account to log in.

¡     permanently lockedLocks the user account permanently.

Severity level

4 (Warning)

Example

1.     PWDCTL/4/PWDCTL_USER_LOCK: User hhh from 1.1.1.1 was locked in 1 minutes after making the maximum login attempts.

2.     PWDCTL/4/PWDCTL_LOCKBLACKLIST: User hhh from 1.1.1.1 was permanently locked after making the maximum login attempts.

Impact

A user cannot log in to the device before the locking period expires.

Cause

The action to be taken after the user fails the maximum number of consecutive login attempts depends on the password-control login-attempt command.

Recommended action

Execute the display password-control blacklist command to identify whether the user account is locked because the maximum number of consecutive login attempts was exceeded.

·     If yes, make login attempts after the locking timer expires or remove the user account from the blacklist by executing reset password-control blacklist.

·     If no, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

PWDCTL_USER_UNLOCK

Message text

User [STRING] was unlocked when the lock time expired.

Variable fields

$1: Username.

Severity level

5 (Notification)

Example

PWDCTL/5/PWDCTL_USER_UNLOCK: User hhh was unlocked when the lock time expired.

Impact

No negative impact on the system.

Cause

The user account is unlocked after the locking timer expires.

Recommended action

No action is required.

 

PWDCTL_USER_INLOCKING

Message text

User [STRING] from [IPADDR] has been locked due to exceeding the maximum number of login attempts.

Variable fields

$1: Username.

$2: User IP address.

Severity level

5 (Notification)

Example

PWDCTL/5/PWDCTL_USER_INLOCKING: User hhh from 1.1.1.1 has been locked due to exceeding the maximum number of login attempts.

Impact

A user cannot log in to the device before the locking period expires.

Cause

Login attempts were made during the locking period of the user account.

Recommended action

Execute the display password-control blacklist command to identify whether the user account is locked because the maximum number of consecutive login attempts was exceeded.

·     If yes, make login attempts after the locking timer expires or remove the user account from the blacklist by executing reset password-control blacklist.

·     If no, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

QoS

This section contains QoS messages.

MIRROR_SYNC_CFG_FAIL

Message text

Failed to restore configuration for monitoring group [UINT32] in [STRING], because [STRING]

Variable fields

$1: Monitoring group number

$2: Slot number.

$3: Detailed reasons for data recovery failure

Severity level

4 (Warning)

Example

QOS/4/MIRROR_SYNC_CFG_FAIL: Failed to restore configuration for monitoring group 1 in chassis 2 slot 1, because monitoring resources are insufficient.

Impact

Member ports in the monitoring group are not effective

Cause

After the business board is inserted into the device, the recovery of the monitoring group's configuration information fails, that is, the configuration of member ports related to the monitoring group does not exist. The reasons for the failure are as follows:

·     The total number of monitoring ports exceeds the maximum supported by the current monitoring group

·     The monitoring resources of the current business board are insufficient

·     The type of ports in the monitoring group is not supported by the current business board

Recommended action

Please reconfigure the member ports of the monitoring group according to actual needs

 

QOS_BANDWIDTH_TOTALCHANNEL

Message text

Failed to set the interface bandwidth for interface [STRING] because the interface bandwidth is less than the total channel bandwidth.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

QOS/4/QOS_BANDWIDTH_TOTALCHANNEL: Failed to set the interface bandwidth for interface GigabitEthernet4/0/1 because the interface bandwidth is less than the total channel bandwidth.

Impact

The interface bandwidth does not take effect.

Cause

This message is generated when the bandwidth of the main interface is smaller than the total channelized bandwidth of subinterfaces.

Recommended action

Use the bandwidth command to increase the bandwidth of the main interface or use the mode channel-bandwidth command reduce the channelized bandwidth of a subinterface.

 

 

QOS_CAR_APPLYUSER_FAIL

Message text

[STRING]; Failed to apply the [STRING] CAR in [STRING] profile [STRING] to the user. Reason: [STRING].

Variable fields

$1: User ID Information

$2: CAR Application Orientation

$3: Profile Type

$4: Profile Name

$5: Failure cause.

¡     The resources are insufficient.

The operation is not supported.

Severity level

4 (Warning)

Example

QOS/4/QOS_CAR_APPLYUSER_FAIL: -MAC=1111-2222-3333-IP=192.168.1.2-SVLAN=100-VPN=”N/A”-Port=GigabitEthernet5/1/5; Failed to apply the inbound CAR in user profile a to the user. Reason: The resources are insufficient.

Impact

The traffic policing configured in the user profile, user group profile, or session group profile bound to the online user is invalid.

Cause

·     The CAR configured in the user profile, user group profile, or session group profile delivered during the user online process has failed.

·     The modification or addition of CAR in the user profile, user group profile, or session group profile bound to the already online user has failed.

Recommended action

1.     Please delete the CAR configuration under this user profile, user group profile, or session group profile.

2.     Please execute the 'display resource-monitor' command to check if the remaining resources corresponding to bras_car in the displayed fields are sufficient. If the resources are insufficient, delete some unnecessary traffic policing configurations.

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_CBQ_REMOVED

Message text

CBQ is removed from [STRING].

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

QOS/4/QOS_CBQ_REMOVED: CBQ is removed from GigabitEthernet4/0/1.

Impact

For the traffic behavior in the QoS policy applied on the interface, if class-based queuing is configured, packets that comply with the traffic classification in the QoS policy on the interface do not follow the CBQ queue scheduling defined in the traffic behavior

Cause

When the maximum available bandwidth or interface rate on the interface is changed to be lower than the minimum guaranteed bandwidth required by the original CBQ configuration on the interface, the system removes the CBQ from the interface

Recommended action

Please execute the 'bandwidth' command to modify the maximum available bandwidth on the interface so that it meets the bandwidth requirement in CBQ, then reapply the QoS policy containing CBQ traffic behavior on the interface

 

QOS_CHANNEL_APPLYIF_FAIL

Message text

Failed to set the channel bandwidth on interface [STRING] Reason The total channel bandwidth exceeds the interface bandwidth.

Variable fields

$1: Subinterface name.

Severity level

3 (Error)

Example

QOS/3/QOS_CHANNEL_APPLYIF_FAIL: Failed to set the channel bandwidth on interface GigabitEthernet4/0/1.1 Reason The total channel bandwidth exceeds the interface bandwidth.

Impact

The channelized bandwidth setting for the subinterface does not take effect.

Cause

The total channelized bandwidth exceeds the interface bandwidth.

Recommended action

1.     Use the bandwidth command to increase the bandwidth of the main interface or use the mode channel-bandwidth command reduce the channelized bandwidth of a subinterface.

2.     If the qos lr command is executed on the interface and the total channelized bandwidth exceeds the rate limit value, use the qos lr command to increase the rate limit value or use the mode channel-bandwidth command reduce the channelized bandwidth of a subinterface.

 

QOS_GTS_APPLYUSER_FAIL

Message text

[STRING]; Failed to apply GTS in user profile [STRING] to the user. Reason: [STRING].

Variable fields

$1: User ID information

$2: User profile name.

$3: Failure cause.

Severity level

4 (Warning)

Example

QOS/4/QOS_GTS_APPLYUSER_FAIL: -MAC=1111-2222-3333-IP=192.168.1.2/16-CVLAN=100-Port=GigabitEthernet5/1/5; Failed to apply GTS in user profile a to the user. Reason: The resources are insufficient.

Impact

The traffic shaping in the User Profile of the application is not effective

Cause

The GTS information issued during user online process failed

The user has already gone online, but the modification or addition of GTS information failed

Recommended action

1.     Please delete or modify the GTS configuration under this User Profile

2.     Please execute the 'display resource-monitor' command to check if the remaining resources corresponding to the 'queue_shape' in the displayed field are sufficient. If the resources are insufficient, delete some unnecessary traffic shaping configurations

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_IFA_OUTPUT_IFFAIL

Message text

Failed to find an output interface for destination IP address [STRING].

Variable fields

$1: Destination IP address.

Severity level

4 (Warning)

Example

QOS/4/QOS_IFA_OUTPUT_IFFAIL: Failed to find an output interface for destination IP address 1.1.1.1.

Impact

Packets fail to be forwarded.

Cause

No output interface is found based on the destination IP address.

Recommended action

Use the display ip routing-table command to identify whether the destination IP address is reachable. If no, use IGP, BGP, or static routing to learn the destination IP address.

 

QOS_ITACAR_APPLYUSER_FAIL

Message text

[STRING]; Failed to apply the ITA CAR at level [STRING] to the user. Reason: [STRING].

Variable fields

$1: User identity.

$2: ITA CAR level.

$3: Failure cause:

¡     The ITA CAR is not supported.

¡     The resources are insufficient.

¡     The value is out of range.

Severity level

4 (Warning)

Example

QOS/4/QOS_ITACAR_APPLYUSER_FAIL: -MAC=1111-2222-3333-IP=192.168.1.2/16-SVLAN=100-Port=GigabitEthernet5/1/5; Failed to apply the ITA CAR at level 7 to the user. Reason: The ITA CAR is not supported.

Impact

The ITA CAR does not take effect.

Cause

The system failed to apply or modify traffic policing parameters in the ITA CAR policy.

Recommended action

1.     Use the display resource-monitor command to identify whether the available bras_car resources are sufficient. If no, delete unused CAR settings.

2.     Cancel the ITA CAR policy or modify the traffic policing parameters.

 

QOS_NOT_ENOUGH_BANDWIDTH

Message text

Policy [STRING] request bandwidth [UINT32](kbps). Only [UINT32](kbps) available on [STRING].

Variable fields

$1: QoS policy name.

$2: Bandwidth required by CBWFQ

$3: Available bandwidth on the interface

$4: Interface name.

Severity level

3 (Error)

Example

QOS/3/QOS_NOT_ENOUGH_BANDWIDTH: Policy d request bandwidth 10000(kbps). Only 80(kbps) available on GigabitEthernet4/0/1.

Impact

Class-based queuing (CBQ) applied on the interface is not effective

Cause

CBQ configuration fails because the minimum guaranteed bandwidth required by CBQ is greater than the interface's maximum available bandwidth

Recommended action

Please adjust the minimum guaranteed bandwidth in the CBQ configuration, then reapply the QoS policy containing CBQ traffic behavior on the interface, or execute the 'bandwidth' command to modify the maximum available bandwidth on the interface to meet the bandwidth requirements in CBQ

 

QOS_NOT_ENOUGH_NNIBANDWIDTH

Message text

Pattern 1:

The total UNI bandwidth is greater than the NNI bandwidth.

Pattern 2:

The total UNI bandwidth is greater than the NNI bandwidth. The bandwidth of [STRING] is changed.

Pattern 3:

The total UNI bandwidth is greater than the NNI bandwidth.[STRING] is created based on [STRING] of the UNI interface.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

Pattern 1:

QOS/4/ QOS_NOT_ENOUGH_NNIBANDWIDTH: The total UNI bandwidth is greater than the NNI bandwidth.

Pattern 2:

QOS/4/ QOS_NOT_ENOUGH_NNIBANDWIDTH: The total UNI bandwidth is greater than the NNI bandwidth. The bandwidth of GigabitEthernet4/0/1 is changed.

Pattern 3:

QOS/4/ QOS_NOT_ENOUGH_NNIBANDWIDTH: The total UNI bandwidth is greater than the NNI bandwidth. Virtual-Access1 is created based on Virtual-Template1 of the UNI interface.

Impact

There may be congestion and packet loss in the upstream traffic

Cause

Pattern 1:

·     When users increase the bandwidth of the upstream interface or decrease the bandwidth limit of the downstream interface, the total downstream bandwidth still exceeds the threshold of the upstream bandwidth

Pattern 2:

·     Interface bandwidth changes result in the total downstream bandwidth exceeding the total upstream bandwidth

Pattern 3:

·     The creation of a new Virtual-Access interface results in the total downstream bandwidth exceeding the total upstream bandwidth

Recommended action

Increase the threshold of the upstream bandwidth or reduce the downlink limited bandwidth configuration of the UNI interface

 

QOS_POLICY_APPLYCOPP_CBFAIL

Message text

Failed to apply classifier-behavior [STRING] in policy [STRING] to the [STRING] direction of control plane slot [UINT32]. [STRING].

Variable fields

$1: CB to name

$2: QoS policy name.

$3: Traffic direction.

$4: Slot number.

$5: Failure cause.

¡     The behavior is empty.

Only one rate-limiting action is supported in one behavior to be applied to the control plane.

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYCOPP_CBFAIL: Failed to apply classifier-behavior d in policy b to the inbound direction of control plane slot 3. The behavior is empty.

Impact

Apply QoS policy on the control plane, and a traffic behavior in the QoS policy does not take effect

Cause

Add or modify the configuration of a CB pair in a certain orientation on the control plane

Recommended action

Please modify the configuration of the traffic behavior in the QoS policy according to the failure reason

 

QOS_POLICY_APPLYCOPP_FAIL

Message text

Failed to apply or refresh QoS policy [STRING] to the [STRING] direction of control plane slot [UINT32]. [STRING].

Variable fields

$1: QoS policy name.

$2: Traffic direction.

$3: Slot number.

$4: Failure cause.

The operation is not supported.

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYCOPP_FAIL: Failed to apply or refresh QoS policy b to the inbound direction of control plane slot 3. The operation is not supported.

Impact

The QoS policy applied on the control plane is not taking effect

Cause

Applying or updating the QoS policy in a certain orientation on the control plane has failed

Recommended action

1.     Please modify the QoS policy and reapply it on the control plane

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_POLICY_APPLYGLOBAL_CBFAIL

Message text

Failed to apply classifier-behavior [STRING] in policy [STRING] to the [STRING] direction globally. [STRING].

Variable fields

$1: CB against name

$2: QoS policy name.

$3: Traffic direction.

$4: Failure cause.

The behavior is empty: traffic behavior is empty

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYGLOBAL_CBFAIL: Failed to apply classifier-behavior a in policy b to the outbound direction globally. The behavior is empty.

Impact

Apply global QoS policy, but a traffic behavior in this policy is not taking effect

Cause

Add or modify a CB pair configuration in a global direction of the QoS policy

Recommended action

1.     Please modify the CB pair in this QoS policy and reapply it in the control plane

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_POLICY_APPLYGLOBAL_FAIL

Message text

Failed to apply or refresh QoS policy [STRING] to the [STRING] direction globally. [STRING].

Variable fields

$1: QoS policy name.

$2: Traffic direction.

$3: Failure cause.

The operation is not supported.

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYGLOBAL_FAIL: Failed to apply or refresh QoS policy b to the inbound direction globally. The operation is not supported.

Impact

The global QoS policy does not take effect

Cause

A newly configured or modified QoS policy is applied to a specific orientation globally

Recommended action

Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_POLICY_APPLYIF_CBFAIL

Message text

Failed to apply classifier-behavior [STRING] in policy [STRING] to the [STRING] direction of interface [STRING]. [STRING].

Variable fields

$1: CB pair name.

$2: QoS policy name.

$3: Traffic direction.

$4: Interface name.

$5: Failure cause.

¡     The behavior is empty.: Traffic behavior is empty, no action is configured

¡     The card where the interface specified in the class-behavior association resides is not in position.

¡     Only one service class marking action is supported for the same EXP value on the same interface and the service class value can't be modified except that the old value has been deleted.

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYIF_CBFAIL: Failed to apply classifier-behavior b in policy b to the inbound direction of interface Ethernet3/1/2. The behavior is empty.

Impact

QoS policy is applied on the interface, and a traffic behavior in this QoS policy does not take effect

Cause

Add or modify a CB pair configuration in a certain direction of the interface's QoS policy

Recommended action

1.     Please modify the CB pair configuration in the QoS policy according to the failure reason

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_POLICY_APPLYIF_FAIL

Message text

Failed to apply or refresh QoS policy [STRING] to the [STRING] direction of interface [STRING]. [STRING].

Variable fields

$1: QoS policy name.

$2: Traffic direction.

$3: Interface name.

$4: Failure cause.

The operation is not supported.

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYIF_FAIL: Failed to apply or refresh QoS policy b to the inbound direction of interface Ethernet3/1/2. The operation is not supported.

Impact

The QoS policy configured under the interface does not take effect

Cause

Configure or modify the QoS policy on a certain orientation of the interface

Recommended action

Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_POLICY_APPLYTUN_FAIL

Message text

Failed to apply or refresh QoS policy [STRING] to [STRING]. Reason: [STRING].

Variable fields

$1: QoS policy name.

$2: Tunnel information.

$3: Failure cause:

¡     The filtering action is not supported.

¡     The marking action is not supported.

¡     The mirroring action is not supported.

¡     The redirect action is not supported.

¡     The QoS policy does not exist.

¡     The QoS policy was deleted.

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYTUN_FAIL: Failed to apply or refresh QoS policy b to ADVPN session Tunnel1 192.168.0.10. Reason: The marking action is not supported.

Impact

The QoS policy applied to the tunnel does not take effect

Cause

An action in the QoS policy is not supported.

Recommended action

1.     Modify the QoS policy according to the failure cause.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

QOS_POLICY_APPLYTUN_SUCCESS

Message text

QoS policy [STRING] was successfully applied or refreshed to [STRING].

Variable fields

$1: QoS policy name.

$2: Tunnel information.

Severity level

6 (Informational)

Example

QOS/6/QOS_POLICY_APPLYTUN_SUCCESS: QoS policy b was successfully applied or refreshed to ADVPN session Tunnel1 192.168.0.10.

Impact

No negative impact on the system.

Cause

A QoS policy was applied to a tunnel or modified successfully.

Recommended action

No action is required.

 

QOS_POLICY_APPLYUSER_FAIL

Message text

[STRING]; Failed to apply the [STRING] QoS policy [STRING] in user profile [STRING] to the user. Reason: [STRING].

Variable fields

$1: User ID (UID) information

$2: Orientation of QoS policy application

$3: QoS policy name.

$4: User profile name.

$5: Failure cause.

The QoS policy is not supported.: The QoS policy is not supported under User Profile

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYUSER_FAIL: -MAC=1111-2222-3333-IP=192.168.1.2/16-CVLAN=100-Port=GigabitEthernet5/1/5; Failed to apply the inbound QoS policy p in user profile a to the user. Reason: The QoS policy is not supported.

Impact

QoS policy for applications under User Profile is not effective

Cause

·     During user login, the QoS policy configured in the User Profile is issued

·     The user has already logged in, modify the QoS policy information in the User Profile or add a new QoS policy

Recommended action

1.     Please delete or modify the QoS policy configured in the User Profile

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_POLICY_APPLYVLAN_CBFAIL

Message text

Failed to apply classifier-behavior [STRING] in policy [STRING] to the [STRING] direction of VLAN [UINT32]. [STRING].

Variable fields

$1: CB to name

$2: QoS policy name.

$3: Traffic direction.

$4: VLAN ID

$5: Failure cause.

The behavior is empty.

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYVLAN_CBFAIL: Failed to apply classifier-behavior b in policy b to the inbound direction of VLAN 2. The behavior is empty.

Impact

Based on VLAN, apply QoS policy, and a traffic behavior in the QoS policy is not effective

Cause

Add or modify a CB pair configuration in a certain orientation of VLAN

Recommended action

1.     Please modify the CB pair configuration in the QoS policy based on the failure reason

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_POLICY_APPLYVLAN_FAIL

Message text

Failed to apply or refresh QoS policy [STRING] to the [STRING] direction of VLAN [UINT32]. [STRING].

Variable fields

$1: QoS policy name.

$2: Traffic direction.

$3: VLAN ID

$4: Failure cause.

The operation is not supported.: VLAN does not support this QoS policy

Severity level

4 (Warning)

Example

QOS/4/QOS_POLICY_APPLYVLAN_FAIL: Failed to apply or refresh QoS policy b to the inbound direction of VLAN 2. The operation is not supported.

Impact

QoS policy based on VLAN application does not take effect

Cause

Add or modify QoS policy on a certain orientation of VLAN

Recommended action

1.     Please delete or modify the QoS policy applied on a certain orientation of VLAN

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_PRIORITY_APPLYUSER_FAIL

Message text

Failed to identify the [STRING] priority of the user. Reason: [STRING].

Variable fields

$1: Traffic direction.

$2: Failure cause.

¡     The priority type is not supported.

Severity level

4 (Warning)

Example

QOS/4/QOS_PRIORITY_APPLYUSER_FAIL: Failed to identify the inbound priority of the user. Reason: The priority type is not supported.

Impact

The device cannot obtain the priority of the user and cannot schedule packets for the user based on the user priority.

Cause

The system failed to modify the priority of incoming packets or enqueue packets according to the RADIUS-assigned user priority.

Recommended action

On the RADIUS server, disable the RADIUS server from assigning the user priority or modify the user priority to be assigned by the RADIUS server.

 

QOS_QMPROFILE_APPLYUSER_FAIL

Message text

[STRING]; Failed to apply queue scheduling profile [STRING] in session group profile [STRING] to the user. Reason: [STRING].

Variable fields

$1: User ID information

$2: Queue Scheduling Policy Name

$3: Session Group Profile Name

$4: Failure cause.

The QMProfile is not supported.

Severity level

4 (Warning)

Example

QOS/4/QOS_QMPROFILE_APPLYUSER_FAIL: -MAC=1111-2222-3333-IP=192.168.1.2/16-SVLAN=100-Port=GigabitEthernet5/1/5; Failed to apply queue scheduling profile b in session group profile a to the user. Reason: The QMProfile is not supported.

Impact

The queue scheduling policy configured in the Session Group Profile for authorized online users is not taking effect

Cause

·     During the user's online process, the queue scheduling policy configured in the Session Group Profile is delivered

·     The user is already online, and the queue scheduling policy configuration in the Session Group Profile is modified or added

Recommended action

Please remove the queue scheduling policy in the Session Group Profile for authorized online users

 

QOS_QMPROFILE_MODIFYQUEUE_FAIL

Message text

Failed to configure queue [UINT32] in queue scheduling profile [STRING]. [STRING].

Variable fields

$1: Queue number

$2: Name of queue scheduling policy

$3: Failure cause.

The value is out of range.

Severity level

4 (Warning)

Example

QOS/4/QOS_QMPROFILE_MODIFYQUEUE_FAIL: Failed to configure queue 1 in queue scheduling profile myqueue. The value is out of range.

Impact

Queue scheduling in the scheduling policy cannot be modified, and still takes effect according to the original queue scheduling method and parameters

Cause

After applying the queue scheduling policy at the interface, if the configuration of a queue in the queue scheduling policy is modified, and the new configuration parameters exceed the port capacity

Recommended action

1.     Please delete the applied queue scheduling policy at the interface before modifying the queue parameters in the queue scheduling policy

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

QOS_UNI_RESTORE_FAIL

Message text

Failed to restore the UNI configuration of [STRING], because the total UNI bandwidth is greater than the NNI bandwidth.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

QOS/4/ QOS_NNIBANDWIDTH_OVERFLOW: Failed to restore the UNI configuration of the interface GigabitEthernet5/1/5, because the total UNI bandwidth is greater than the NNI bandwidth.

Impact

Downlink bandwidth limit of UNI interface configuration in bandwidth guarantee group does not take effect

Cause

When the business card is restarted or reinserted into the chassis, and the UNI interface configuration data is restored, the restoration of UNI interface configuration data fails because the total bandwidth limit on the UNI interface exceeds the uplink interface bandwidth threshold

Recommended action

Please reconfigure the bandwidth in the bandwidth guarantee group, such as increasing the uplink interface bandwidth threshold or reducing the UNI interface CAR bandwidth limit, and execute the 'qos uni enable' command to re-enable the bandwidth guarantee group function of the UNI interface

 

WRED_TABLE_CFG_FAIL

Message text

Failed to dynamically modify the configuration of WRED table [STRING], because [STRING].

Variable fields

$1: WRED table name.

$2: Configuration failure detailed reasons

ECN is not supported.

Severity level

4 (Warning)

Example

QOS/4/WRED_TABLE_CFG_FAIL: Failed to dynamically modify the configuration of WRED table a, because ECN is not supported.

Impact

Modifying the configuration in the WRED table does not take effect

Cause

Due to the hardware service board not supporting certain features, such as ECN function, the modification of the corresponding function configuration in the WRED table failed

Recommended action

Do not configure relevant functions that the service board does not support or collect configuration files, log information, and alarm messages, and contact technical support

 

RADIUS messages

This section contains RADIUS messages.

RADIUS_ACCT_SERVER_DOWN

Message text

RADIUS accounting server was blocked: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the accounting server.

$2: Port number of the accounting server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

4 (Warning)

Example

RADIUS/4/RADIUS_ACCT_SERVER_DOWN: RADIUS accounting server was blocked: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

The server cannot be reached and user association fails.

Cause

The device detected that the status of the RADIUS accounting server changed from active to block.

Recommended action

1.     Execute the display interface command to verify that the accounting server interface has started up. If the server interface is not up, verify that the physical link connection is correct.

2.     Execute the ping command to ping the accounting server to verify that the server is reachable. If the server is not reachable, check the network reachability between the device and the RADIUS accounting server, and then examine whether firewalls or similar devices exist in the network.

3.     Execute the display current-configuration command to verify that the RADIUS accounting server configuration is correct on the device. For more information, see AAA Command Reference and AAA Configuration Guide.

4.     If the issue persists, collect the configuration file, log information, and alarm information, and then contact Technical Support.

 

RADIUS_ACCT_SERVER_UP

Message text

RADIUS accounting server became active: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the accounting server.

$2: Port number of the accounting server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

6 (Informational)

Example

RADIUS/6/RADIUS_ACCT_SERVER_UP: RADIUS accounting server became active: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

No negative impact on the system.

Cause

The device detected that the status of the RADIUS accounting server changed from block to active.

Recommended action

No action is required.

 

RADIUS_AUTH_FAILURE

Message text

User [STRING] at [STRING] failed authentication.

Variable fields

$1: Username.

$2: IP address.

Severity level

5 (Notification)

Example

RADIUS/5/RADIUS_AUTH_FAILURE: User abc@system at 192.168.0.22 failed authentication.

Impact

User authentication failed.

Cause

The RADIUS server rejected the authentication request of the user.

Recommended action

1.     Check the RADIUS authentication-related configurations on the device, and contact the server administrator to confirm the reason for rejecting authentication requests, then resolve the issue based on the specific cause.

2.     If the issue persists, collect the device configuration file, log information, alarm information, and contact Technical Support.

 

RADIUS_AUTH_SERVER_DOWN

Message text

RADIUS authentication server was blocked: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the authentication server.

$2: Port number of the authentication server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

4 (Warning)

Example

RADIUS/4/RADIUS_AUTH_SERVER_DOWN: RADIUS authentication server was blocked: Server IP= 1.1.1.1, port=1812, VPN instance=public.

Impact

This will lead to user authentication failure. If no backup authentication server exists, this issue may result in user disconnection.

Cause

The status of the RADIUS authentication server changed from active to block.

Recommended action

1.     Execute the display interface command to verify that the accounting server interface has started up. If the server interface is not up, verify that the physical link connection is correct.

2.     Execute the ping command to ping the accounting server to verify that the server is reachable. If the server is not reachable, check the network reachability between the device and the RADIUS accounting server, and then examine whether firewalls or similar devices exist in the network.

3.     Execute the display current-configuration command to verify that the RADIUS accounting server configuration is correct on the device. For more information, see AAA Command Reference and AAA Configuration Guide.

4.     If the issue persists, collect the configuration file, log information, and alarm information, and then contact Technical Support.

 

RADIUS_AUTH_SERVER_UP

Message text

RADIUS authentication server became active: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the authentication server.

$2: Port number of the authentication server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

6 (Informational)

Example

RADIUS/6/RADIUS_AUTH_SERVER_UP: RADIUS authentication server became active: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

No negative impact on the system.

Cause

The device detected that the status of the RADIUS authentication server changed from block to active.

Recommended action

No action is required.

 

RADIUS_AUTH_SUCCESS

Message text

User [STRING] at [STRING] was authenticated successfully.

Variable fields

$1: Username.

$2: IP address.

Severity level

6 (Informational)

Example

RADIUS/6/RADIUS_AUTH_SUCCESS: User abc@system at 192.168.0.22 was authenticated successfully.

Impact

No negative impact on the system.

Cause

An authentication request was accepted by the RADIUS server.

Recommended action

No action is required.

 

RADIUS_DELETE_HOST_FAIL

Message text

Failed to delete servers in scheme [STRING].

Variable fields

$1: Scheme name.

Severity level

4 (Warning)

Example

RADIUS/4/RADIUS_DELETE_HOST_FAIL: Failed to delete servers in scheme abc.

Impact

Depends on the actual situation.

Cause

Failed to delete servers from a RADIUS scheme through the CLI.

Recommended action

Collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

RESMON

This section contains resource monitoring messages.

RESMON_MINOR

Message text

-Resource=[STRING]-Total=[STRING]-Used=[STRING]-Free=[STRING]; Free resource decreased to or below minor threshold [STRING]. [STRING].

Variable fields

$1: Resource type.

$2: Total amount.

$3: Used amount.

$4: Available amount.

$5: Minor resource depletion threshold.

$6: Resource usage description. Some types of resources do not have description information.

Severity level

4 (Warning)

Example

RESMON/4/RESMON_MINOR: -Resource=AA-Total=100%-Used=83%-Free=17%; Free resource decreased to or below minor threshold 20%.

Impact

No negative impact on the system temporarily. Pay attention to whether the remaining hardware resource amount continues to decrease.

Cause

When the available hardware resource amount decreases to or below the minor resource depletion threshold, the device enters minor alarm state and generates this log message.

Recommended action

Configure the device based on the resource type so the device allocates the type of resources reasonably.

 

RESMON_MINOR_RECOVERY

Message text

-Resource=[STRING]-Total=[STRING]-Used=[STRING]-Free=[STRING]; Free resource increased above minor threshold [STRING]. [STRING].

Variable fields

$1: Resource type.

$2: Total amount.

$3: Used amount.

$4: Available amount.

$5: Minor resource depletion threshold.

$6: Resource usage description. Some types of resources do not have description information.

Severity level

5 (Notification)

Example

RESMON/5/RESMON_MINOR_RECOVER: -Resource=AA-Total=100%-Used=77%-Free=23%; Free resource increased above minor threshold 20%.

Impact

No negative impact on the system.

Cause

When the available hardware resource amount increases above the minor resource depletion threshold, the device removes the minor resource depletion alarm and generates this log message. The hardware resource usage recovers to normal.

Recommended action

No action is required.

 

RESMON_SEVERE

Message text

-Resource=[STRING]-Total=[STRING]-Used=[STRING]-Free=[STRING]; Free resource decreased to or below severe threshold [STRING]. [STRING].

Variable fields

$1: Resource type.

$2: Total amount.

$3: Used amount.

$4: Available amount.

$5: Severe resource depletion threshold.

$6: Resource usage description. Some types of resources do not have description information.

Severity level

3 (Error)

Example

RESMON/3/RESMON_SEVERE: -Resource=AA-Total=100%-Used=93%-Free=7%; Free resource decreased to or below severe threshold 10%.

Impact

The services that use this type of hardware resource will be limited or become unavailable.

Cause

When the available hardware resource amount decreases to or below the severe resource depletion threshold and the hardware resources are not exhausted, the device enters severe alarm state and generates this log message periodically.

Recommended action

Configure the device based on the resource type so the device allocates the type of resources reasonably.

 

RESMON_SEVERE_RECOVERY

Message text

-Resource=[STRING]-Total=[STRING]-Used=[STRING]-Free=[STRING]; Free resource increased above severe threshold [STRING]. [STRING].

Variable fields

$1: Resource type.

$2: Total amount.

$3: Used amount.

$4: Available amount.

$5: Severe resource depletion threshold.

$6: Resource usage description. Some types of resources do not have description information.

Severity level

5 (Notification)

Example

RESMON/5/RESMON_SEVERE_RECOVER: -Resource=AA-Total=100%-Used=83%-Free=17%; Free resource increased above severe threshold 10%.

Impact

No negative impact on the system.

Cause

When the available resource amount increases above the severe resource depletion threshold, the device removes the severe resource depletion alarm and generates this log message.

Recommended action

No action is required.

 

RESMON_USEDUP

Message text

-Resource=[STRING]-Total=[STRING]-Used=[STRING]-Free=[STRING]; Resources used up. [STRING].

Variable fields

$1: Resource type.

$2: Total amount.

$3: Used amount.

$4: Available amount.

$5: Resource usage description. Some types of resources do not have description information.

Severity level

2 (Critical)

Example

RESMON/2/RESMON_USEDUP: -Resource=vlaninterface-Total=2048-Used=2048-Free=0; Resources used up.

Impact

The services that use this type of hardware resource will be limited or become unavailable.

Cause

When the available resource amount decreases to zero, the device outputs this log message.

Recommended action

To ensure correct operation of the relevant services, immediately clear data or entries of the resource type that are not used.

 

RESMON_USEDUP_RECOVERY

Message text

-Resource=[STRING]-Total=[STRING]-Used=[STRING]-Free=[STRING]; The amount of free resources increased from zero to a non-zero value. [STRING].

Variable fields

$1: Resource type.

$2: Total amount, which can be 100% or an integer for an absolute value.

$3: Used amount, a percentage or an integer for an absolute value.

$4: Available amount, a percentage or an integer for an absolute value.

$5: Additional resource usage information. This field might be null.

Severity level

5 (Notification)

Example

RESMON/5/RESMON_USEDUP_RECOVER: -Resource=vlaninterface-Total=2048-Used=2047-Free=1; The amount of free resources increased from zero to a non-zero value.

Impact

No negative impact on the system.

Cause

When the available resource amount increases from zero, the device outputs this log message.

Recommended action

No action is required.

 

RIP messages

This section contains RIP messages.

RIPLOG

Message text

RIP: Interfaces [STRING] [STRING] Multicast group failed, return value [STRING]

Variable fields

$1: Interface name.

$2: Multicast group quitting or joining failure. Options are:

·     Quitting: Failed to quit the multicast group.

·     Joining: Failed to join the multicast group.

$3: Error code. Options include:

·     22: Invalid parameter.

·     99: Incorrect multicast source address.

·     105: Insufficient device memory.

Severity level

6 (Informational)

Example

RIP/6/RIPLOG:RIP: Interfaces GigabitEthernet1/0/1 Joining Multicast group failed, return value 22

Impact

No negative impact on the system

Cause

The interface failed to join or quit the multicast group, and cannot start or stop receiving/sending RIP multicast packets.

Recommended action

1.     Restart the interface or device.

2.     If the issue persists, collect log messages, and then contact Technical Support for help.

 

 

RIPNG messages

This section contains RIPng messages.

RIPNGLOG

Message text

RIPng: Interfaces [STRING] [STRING] Multicast group failed, return value [STRING].

Variable fields

$1: Interface name.

$2: Multicast group quitting or joining failure. Options are:

·     Quitting: Failed to quit the multicast group.

·     Joining: Failed to join the multicast group.

$3: Error code. Options include:

·     22: Invalid parameter.

·     99: Incorrect multicast source address.

·     105: Insufficient device memory.

Severity level

6 (Informational)

Example

RIPng/6/RIPNGLOG:RIPng: Interfaces GigabitEthernet1/0/1 Joining Multicast group failed, return value 22.

Impact

No negative impact on the system

Cause

The interface failed to join or quit the multicast group, and cannot start or stop receiving/sending RIPng multicast packets.

Recommended action

1.     Restart the interface or device.

2.     If the issue persists, collect log messages, and then contact Technical Support for help.

 

Message text

RIPng Socket Set-option failed on [STRING], this packet will be sent next time.

Variable fields

$1: Interface name.

Severity level

6 (Informational)

Example

RIPng/6/RIPNGLOG:RIPng Socket Set-option failed on GigabitEthernet1/0/1, this packet will be sent next time.

Impact

No negative impact on the system

Cause

Failed to set the Socket option when the RIPng interface is sending packets.

Recommended action

No action is required.

 

RM messages

This section contains RM messages.

RM_ACRT_REACH_LIMIT

Message text

Max active [STRING] routes [UINT32] reached in URT of [STRING]

Variable fields

$1: IPv4 or IPv6.

$2: Maximum number of active routes.

$3: VPN instance name.

Severity level

4 (Warning)

Example

RM/4/RM_ACRT_REACH_LIMIT: Max active IPv4 routes 100000 reached in URT of VPN1

Impact

Too many active routes occupy resources such as system memory.

Cause

The number of active routes reached the upper limit in the unicast routing table of a VPN instance. New route prefixes cannot be activated.

Recommended action

1.     Execute relevant command to view unicast route statistics of the specified VPN instance:

¡     For IPv4 routes, execute the display ip routing-table vpn-instance vpn-instance-name statistics command.

¡     For IPv6 routes, execute the display ipv6 routing-table vpn-instance vpn-instance-name statistics command.

2.     Analyze the route origin for each protocol, and identify whether the VPN instance contains additional routes:

¡     If additional routes exist, delete unnecessary routes and identify whether the total number of routes is below the upper limit. If the number is below the upper limit, the processing ends. If the number is still above the upper limit, proceed to step 3.

¡     If additional routes do not exist, proceed to step 3.

3.     Enter IPv4 address family view/IPv6 address family view of the VPN instance, and execute the display this command to view the maximum number of active route prefixes for the VPN instance. Identify whether the number is appropriate:

¡     If the number is appropriate, collect log messages and configuration data, and then contact Technical Support for help.

¡     If the number is not appropriate, execute the routing-table limit command to configure an appropriate maximum number of active route prefixes.

 

RM_ACRT_REACH_THRESVALUE

Message text

Threshold value [UINT32] of max active [STRING]% routes reached in URT of [STRING]

Variable fields

$1: Threshold of the maximum number of active routes in percentage.

$2: IPv4 or IPv6.

$3: VPN instance name.

Severity level

4 (Warning)

Example

RM/4/RM_ACRT_REACH_THRESVALUE: Threshold value 50% of max active IPv4 routes reached in URT of vpn1

Impact

The device still allows new route prefixes to be activated. When the number of active route prefixes reaches the upper limit in the VPN instance, the device no longer activate new route prefixes.

Cause

The alarm threshold of the maximum number of active routes is reached in the unicast routing table of the VPN instance.

Recommended action

Identify whether to increase the maximum number of route prefixes or the alarm threshold for the maximum number of active routes for the VPN instance.

 

RM_THRESHLD_VALUE_REACH

Message text

Threshold value [UINT32] of active [STRING] routes reached in URT of [STRING]

Variable fields

$1: Maximum number of active routes.

$2: IPv4 or IPv6.

$3: VPN instance name.

Severity level

4 (Warning)

Example

RM/4/RM_THRESHLD_VALUE_REACH: Threshold value 10000 of active IPv4 routes reached in URT of vpn1

Impact

Too many active routes occupy resources such as system memory.

Cause

The number of active routes reached the upper limit in the unicast routing table of a VPN instance. New route prefixes can be activated.

Recommended action

1.     Execute relevant command to view unicast route statistics of the specified VPN instance:

¡     For IPv4 routes, execute the display ip routing-table vpn-instance vpn-instance-name statistics command.

¡     For IPv6 routes, execute the display ipv6 routing-table vpn-instance vpn-instance-name statistics command.

2.     Analyze the route origin for each protocol, and identify whether the VPN instance contains additional routes:

¡     If additional routes exist, delete unnecessary routes and identify whether the total number of routes is below the upper limit. If the number is below the upper limit, the processing ends. If the number is still above the upper limit, proceed to step 3.

¡     If additional routes do not exist, proceed to step 3.

3.     Enter IPv4 address family view/IPv6 address family view of the VPN instance, and execute the display this command to view the maximum number of active route prefixes for the VPN instance. Identify whether the number is appropriate:

¡     If the number is appropriate, collect log messages and configuration data, and then contact Technical Support for help.

¡     If the number is not appropriate, execute the routing-table limit command to configure an appropriate maximum number of active route prefixes.

 

 

RRM messages

This section contains RRM messages.

RRM_LOG_ADJUSTCHANNEL

Message text

Channel of radio [UINT32] on AP [STRING] changed from [UINT16] to [UINT16].

Variable fields

$1: Radio ID.

$2: AP name.

$3: Old channel ID.

$4: New channel ID.

Severity level

6

Example

RRM/6/RRM_LOG_ADJUSTCHANNEL: Channel of radio 1 on AP ap2 changed from 149 to 52.

Explanation

The working channel of the radio changed.

Recommended action

No action is required.

 

RTM messages

This section contains RTM messages.

RTM_TCL_LOAD_FAILED

Message text

Failed to load the Tcl script file of policy [STRING].

Variable fields

$1: Name of a Tcl-defined policy.

Severity level

4 (Warning)

Example

RTM/4/RTM_TCL_LOAD_FAILED: Failed to load the Tcl script file of policy TEST.

Impact

The Tcl-defined policy does not take effect.

Cause

The memory resource is insufficient.

Recommended action

1.     Release the memory resources. Fr example, execute the logfile save command to save all the content in the log file buffer to the log file to release the memory resources occupied by the log file buffer.

2.     Execute the display memory command to view display memory usage information.

¡     If the memory usage does not drop below the alarm threshold, execute the display process command to view the memory usage of user-mode processes. If a process occupies too much memory, enable or disable the software feature for that process to release the memory resources.

¡     If the memory usage drops below the alarm threshold, the alarm will be cleared. No action is required.

3.     If the issue persists, collect alarm information and configuration data, and then contact Technical Support for help.

 

RTM_TCL_MODIFY

Message text

Failed to execute Tcl-defined policy [STRING] because the policy's Tcl script file had been modified.

Variable fields

$1: Name of a Tcl-defined policy.

Severity level

4 (Warning)

Example

RTM/4/RTM_TCL_MODIFY: Failed to execute Tcl-defined policy aaa because the policy's Tcl script file had been modified.

Impact

The Tcl-defined policy failed to be executed.

Cause

The Tcl script file for the policy was modified.

Recommended action

Delete the Tcl  policy. Then, create a new Tcl policy and bind the edited Tcl script file.

 

RTM_TCL_NOT_EXIST

Message text

Failed to execute Tcl-defined policy [STRING] because the policy's Tcl script file was not found.

Variable fields

$1: Name of a Tcl-defined policy.

Severity level

4 (Warning)

Example

RTM/4/RTM_TCL_NOT_EXIST: Failed to execute Tcl-defined policy aaa because the policy's Tcl script file was not found.

Impact

The Tcl-defined policy failed to be executed.

Cause

The system did not find the Tcl script file for the policy while executing the policy.

Recommended action

To delete the Tcl policy if the Tcl policy is not necessary, execute the undo rtm tcl-policy command in system view.

If the Tcl policy is necessary, execute the display current-configuration | include "rtm tcl-policy" command to view the name and path of the Tcl script file for the Tcl policy, and then copy the backup Tcl script file to the path specified by the rtm tcl-policy command. The name of the copied Tcl script file must be the same as the name of the Tcl script file specified by the rtm tcl-policy command. If the event specified in the Tcl policy is triggered, the device will automatically execute the Tcl policy.

 

SCMD messages

This section contains SCM messages.

PROCESS_ABNORMAL

Message text

The process [STRING] exited abnormally. ServiceName=[STRING], ExitCode=[STRING], KillSignal=[STRING], StartTime=[STRING], StopTime=[STRING].

Variable fields

$1: Process name.

$2: Service name defined in the script.

$3: Process exit code. If the process was closed by a signal, this field displays NA.

$4: Signal that closed the process. If the process was not closed by a signal, this field displays NA.

$5: Time when the process was created.

$6: Time when the process was closed.

Severity level

4 (Warning)

Example

SCMD/4/PROCESS_ABNORMAL: The process diagd exited abnormally. ServiceName=DIAG, ExitCode=1, KillSignal=NA, StartTime=2019-03-06 14:18:06, StopTime=2019-03-06 14:35:25.

Impact

If the process has a standby process, this issue does not have a negative impact on the system. If the process does not have a standby process, the device cannot provide the corresponding service.

Cause

A service exited abnormally.

Recommended action

1.     Use the display process command to identify whether the process exists. If the process exists, the process is recovered.

2.     If the process is not recovered or the process is recovered but reasons need to be located, perform the following tasks:

a.     Execute the view /var/log/trace.log > trace.log command in probe view.

b.     Upload the trace.log file saved in the storage media of the device to the server through FTP or TFTP (in binary mode).

c.     Contact Technical Support. Do not reboot the device so Technical Support can help you locate the problem.

 

PROCESS_ACTIVEFAILED

Message text

The standby process [STRING] failed to switch to the active process due to uncompleted synchronization, and was restarted.

Variable fields

$1: Process name.

Severity level

4 (Warning)

Example

SCMD/4/PROCESS_ACTIVEFAILED: The standby process [STRING] failed to switch to the active process due to uncompleted synchronization, and was restarted.

Impact

If the active process can continue to work, this issue does not have a negative impact on the system. If the active process cannot continue to work, the device cannot provide the corresponding service.

Cause

The active process exited abnormally when the standby process has not completed synchronization.

Recommended action

Collect the device configuration file, log information, and alarm information, and then contact Technical Support.

 

PROCESS_CORERECORD

Message text

Exceptions occurred with process [STRING]. A core dump file was generated.

Variable fields

$1: Process name.

Severity level

5 (Notification)

Example

SCMD/5/PROCESS_CORERECORD: Exceptions occurred with process diagd. A core dump file was generated.

Impact

If the process has a standby process, this issue does not have a negative impact on the system. If the process does not have a standby process, the device cannot provide the corresponding service.

Cause

A process exited abnormally.

Recommended action

1.     Execute the display exception context command to collect process exception information, and save the information to a file.

2.     Execute the display exception filepath command to display the core file.

3.     Upload the core file and the file that stores the process exception information to the server through FTP or TFTP (in binary mode).

4.     Contact Technical Support. Do not reboot the device so Technical Support can help you locate the problem.

 

SCM_ABNORMAL_REBOOT

Message text

Failed to restore process [STRING]. Rebooting [STRING].

Variable fields

Pattern 1:

$1: Process name.

Pattern 2:

$1: Process name.

$2: Chassis number and slot number, slot number, or the system.

Severity level

3 (Error)

Example

SCMD/3/SCM_ABNORMAL_REBOOT: Failed to restore process ipbased. Rebooting slot 1.

Impact

If the process has a standby process, this issue does not have a negative impact on the system. If the process does not have a standby process, the device cannot provide the corresponding service.

Cause

The process exited abnormally during the device or slot startup. If the process cannot recover after multiple automatic restart attempts, the slot or device will restart automatically.

Recommended action

1.     Use the display process command to verify that the process has recovered after the card or device restarts.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and then contact Technical Support.

 

SCM_ABNORMAL_REBOOTMDC

Message text

Failed to restore process [STRING] on [STRING] [UINT16]. Rebooting [STRING] [UINT16].

Variable fields

$1: Process name.

$2: Object type, MDC or context.

$3: ID of the MDC or context.

$4: Object type, MDC or context.

$5: ID of the MDC or context.

Severity level

3 (Error)

Example

SCMD/3/SCM_ABNORMAL_REBOOTMDC: Failed to restore process ipbased on MDC 2. Rebooting MDC 2.

Impact

The MDC or context cannot provide services.

Cause

The process exited abnormally during the startup of the user MDC on the active MPU or the context on the main security engine in the security engine group. If the process cannot recover after multiple automatic restart attempts, the MDC or context will restart automatically. This message will be output in MDC 1 or Context 1.

Recommended action

1.     Use the display process command to verify that the process has recovered after the card restarts.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and then contact Technical Support.

 

SCM_ABORT_RESTORE

Message text

Failed to restore process [STRING]. Restoration aborted.

Variable fields

$1: Process name.

Severity level

3 (Error)

Example

SCMD/3/SCM_ABORT_RESTORE: Failed to restore process ipbased. Restoration aborted.

Impact

The device cannot provide the corresponding service.

Cause

The process exited abnormally during the system operation. If the process cannot recover after multiple automatic restart attempts, the device will stop restoring the process.

Recommended action

1.     Use the display process log command in any view to display the details about process exit.

2.     Restart the card or the MDC where the process is located.

3.     If the issue persists, collect the output from the display process log command, and then contact Technical Support.

 

SCM_KERNEL_INIT_TOOLONG

Message text

Kernel init in sequence [STRING] function [STRING] is still starting for [UINT32] minutes.

Variable fields

$1: Kernel event phase.

$2: Address of the function corresponding to the kernel event.

$3: Time duration.

Severity level

4 (Warning)

Example

SCMD/4/SCM_KERNEL_INIT_TOOLONG: Kernel init in sequence 0x25e7 function 0x6645ffe2 is still starting for 15 minutes.

Impact

The device cannot start up.

Cause

A function at a phase during kernel initialization ran too long.

Recommended action

1.     Wait for the device to start up.

2.     If the device fails to start up within 1 hour, restart the module.

3.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

SCM_PROCESS_STARTING_TOOLONG

Message text

Pattern 1:

The process [STRING] has not finished starting in [UINT32] hours.

Pattern 2:

The process [STRING] on [STRING] [UINT16] has not finished starting in [UINT32] hours.

Variable fields

Pattern 1:

$1: Process name.

$2: Time duration.

Pattern 2:

$1: Process name.

$2: Object type, MDC or context.

$3: ID of the MDC or context.

$4: Time duration.

Severity level

4 (Warning)

Example

SCMD/4/ SCM_PROCESS_STARTING_TOOLONG: The process ipbased has not finished starting in 1 hours.

Impact

The device cannot provide the corresponding service and even cannot operate correctly.

Cause

The process initialization takes a long time and has not been finished. Too many processes have been configured or the process is abnormal.

Recommended action

1.     Wait 6 hours and then verify that the process has been started.

2.     Restart the card/MDC/context, and then use the display process command to verify that the process has recovered.

3.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

SCM_PROCESS_STILL_STARTING

Message text

Pattern 1:

The process [STRING] is still starting for [UINT32] minutes.

Pattern 2:

The process [STRING] on [STRING] [UINT16] is still starting for [UINT32] minutes.

Variable fields

Pattern 1:

$1: Process name.

$2: Time duration.

Pattern 2:

$1: Process name.

$2: Object type, MDC or context.

$3: ID of the MDC or context.

$4: Time duration.

Severity level

6 (Informational)

Example

SCMD/6/SCM_PROCESS_STILL_STARTING: The process ipbased is still starting for 20 minutes.

Impact

No negative impact on the system.

Cause

A process is always in startup state.

Recommended action

No action is required.

 

SCM_SKIP_PROCESS

Message text

Pattern 1:

The process [STRING] was skipped because it failed to start within 6 hours.

Pattern 2:

The process [STRING] on [STRING] [UINT16] was skipped because it failed to start within 6 hours.

Variable fields

Pattern 1:

$1: Process name.

Pattern 2:

$1: Process name.

$2: Object type, MDC or context.

$3: ID of the MDC or context.

Severity level

3 (Error)

Example

SCMD/3/SCM_SKIP_PROCESS: The process ipbased was skipped because it failed to start within 6 hours.

Impact

The device cannot provide the corresponding service.

Cause

A process failed to start within 6 hours. The device will skip this process and continue to start.

Recommended action

1.     Restart the card/MDC/context, and then use the display process command to verify that the process has restored.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

 

ASPF messages

This section contains ASPF messages.

ASPF_IPV4_DNS

Message text

SrcIPAddr(1003)=[IPADDR];DstIPAddr(1007)=[IPADDR];RcvVPNInstance(1042)=[STRING];RcvDSLiteTunnelPeer(1040)=[STRING];DomainName(1099)=[STRING];Action(1053)=[STRING];Reason(1056)=[STRING].

Variable fields

$1: Source IP address.

$2: Destination IP address.

$3: VPN instance name.

$4: Local address of the DS-Lite tunnel.

$5: Domain name.

$6: Action taken on invalid protocol packets:

¡     drop: Drops the packets.

¡     logging: Generates log information.

¡     none: Permits the packets to pass without processing them.

$7: Reason for generating the log message:

¡     Invalid DNS RR.

¡     Failed to check DNS header flag.

¡     Failed to check DNS header ID.

Severity level

6 (Informational)

Example

ASPF/6/ASPF_IPV4_DNS:SrcIPAddr(1003)=1.1.1.3;DstIPAddr(1007)=2.1.1.2;RcvVPNInstance(1042)=vpn;RcvDSLiteTunnelPeer(1040)=dstunnel1;DomainName(1099)=www.h3c.com;Action(1053)=drop,logging;Reason(1056)=Check DNS RR invalid.

Impact

No negative impact on the system.

Cause

Enable ASPF detection for the DNS. If the DNS packet format is invalid, the system discards the packet and generates a log message.

Recommended action

No action is required.

 

ASPF_IPV6_DNS

Message text

SrcIPv6Addr(1036)=[IPADDR];DstIPv6Addr(1037)=[IPADDR];RcvVPNInstance(1042)=[STRING];DomainName(1099)=[STRING];Action(1053)=[STRING];Reason(1056)=[STRING].

Variable fields

$1: Source IP address.

$2: Destination IP address.

$3: VPN instance name.

$4: Domain name.

$5: Action taken on invalid protocol packets:

¡     drop: Drops the packets.

¡     logging: Generates log information.

¡     none: Permits the packets to pass without processing them.

$7: Reason for generating the log message:

¡     Invalid DNS RR.

¡     Failed to check DNS header flag.

¡     Failed to check DNS header ID.

Severity level

6 (Informational)

Example

ASPF/6/ASPF_IPV6_DNS:SrcIPv6Addr(1036)=2001::1;DstIPv6Addr(1037)=3001::1;RcvVPNInstance(1042)=vpn;DomainName(1099)=www.h3c.com;Action(1053)=drop,logging;Reason(1056)=Check DNS RR invalid.

Impact

No negative impact on the system.

Cause

Enable ASPF detection for the DNS. If the DNS packet format is invalid, the system discards the packet and generates a log message.

Recommended action

No action is required

 

SESSION messages

This section contains session messages.

DENY_SESSION_IPV4_FLOW

Message text

Protocol(1001)=[STRING];Application(1002)=[STRING];Category(1174)=[STRING];SrcIPAddr(1003)=[IPADDR];SrcPort(1004)=[UINT16];NATSrcIPAddr(1005)=[IPADDR];NATSrcPort(1006)=[UINT16];DstIPAddr(1007)=[IPADDR];DstPort(1008)=[UINT16];NATDstIPAddr(1009)=[IPADDR];NATDstPort(1010)=[UINT16];InitPktCount(1044)=[UINT32];InitByteCount(1046)=[UINT32];RplyPktCount(1045)=[UINT32];RplyByteCount(1047)=[UINT32];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];RcvDSLiteTunnelPeer(1040)=[STRING];SndDSLiteTunnelPeer(1041)=[STRING];BeginTime_e(1013)=[STRING];EndTime_e(1014)=[STRING];Event(1048)=([UINT16])[STRING];

Variable fields

$1: Protocol type.

$2: Application name.

$3: Service category.

$4: Source IPv4 address.

$5: Source port number.

$6: Source IPv4 address after translation.

$7: Source port number after translation..

$8: Destination IPv4 address.

$9: Destination port number.

$10: Destination IPv4 address after translation.

$11: Destination port number after translation.

$12: Total number of inbound packets.

$13: Total number of inbound bytes.

$14: Total number of outbound packets.

$15: Total number of outbound bytes.

$16: Source VPN instance name.

$17: Destination VPN instance name.

$18: Source DS-Lite tunnel.

$19: Destination DS-Lite tunnel.

$20: Time when the session was created.

$21: Time when the session was removed.

$22: Event type.

$23: Event description:

¡     Session created.

¡     Normal over.

¡     Aged for timeout.

¡     Other.

Severity level

6 (Informational)

Example

SESSION/6/DENY_SESSION_IPV4_FLOW:Protocol(1001)=UDP;Application(1002)=sip;Category(1174)=aaa;SrcIPAddr(1003)=10.10.10.1;SrcPort(1004)=1024;NATSrcIPAddr(1005)=10.10.10.1;NATSrcPort(1006)=1024;DstIPAddr(1007)=20.20.20.1;DstPort(1008)=21;NATDstIPAddr(1009)=20.20.20.1;NATDstPort(1010)=21;InitPktCount(1044)=1;InitByteCount(1046)=50;RplyPktCount(1045)=0;RplyByteCount(1047)=0;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;RcvDSLiteTunnelPeer(1040)=;SndDSLiteTunnelPeer(1041)=;BeginTime_e(1013)=03182024082546;EndTime_e(1014)=;Event(1048)=(8)Session created;

Impact

No negative impact on the system.

Explanation

This message is sent when an IPv4 packet drop session is created or removed.

Recommended action

No action is required.

 

DENY_SESSION_IPV6_FLOW

Message text

Protocol(1001)=[STRING];Application(1002)=[STRING];Category(1174)=[STRING];SrcIPv6Addr(1036)=[IPADDR];SrcPort(1004)=[UINT16];DstIPv6Addr(1037)=[IPADDR];DstPort(1008)=[UINT16];InitPktCount(1044)=[UINT32];InitByteCount(1046)=[UINT32];RplyPktCount(1045)=[UINT32];RplyByteCount(1047)=[UINT32];RcvVPNInstance(1042)=[STRING];SndVPNInstance(1043)=[STRING];BeginTime_e(1013)=[STRING];EndTime_e(1014)=[STRING];Event(1048)=([UINT16])[STRING];

Variable fields

$1: Protocol type.

$2: Application name.

$3: Service category.

$4: Source IPv6 address.

$5: Source port number.

$6: Destination IPv6 address.

$7: Destination port number.

$8: Total number of inbound packets.

$9: Total number of inbound bytes.

$10: Total number of outbound packets.

$11: Total number of outbound bytes.

$12: Source VPN instance name.

$13: Destination VPN instance name.

$14: Time when the session was created.

$15: Time when the session was removed.

$16: Event type.

$17: Event description:

¡     Session created.

¡     Normal over.

¡     Aged for timeout.

¡     Other.

Severity level

6 (Informational)

Example

SESSION/6/DENY_SESSION_IPV6_FLOW: Protocol(1001)=UDP;Application(1002)=sip;Category(1174)=aaa;SrcIPv6Addr(1036)=2001::2;SrcPort(1004)=1024;DstIPv6Addr(1037)=3001::2;DstPort(1008)=53;InitPktCount(1044)=1;InitByteCount(1046)=110;RplyPktCount(1047)=0;RplyByteCount(1047)=0;RcvVPNInstance(1042)=;SndVPNInstance(1043)=;BeginTime_e(1013)=03182024082901;EndTime_e(1014)=;Event(1048)=(8)Session created;

Impact

No negative impact on the system.

Explanation

This message is sent when an IPv6 packet drop session is created or removed.

Recommended action

No action is required.

 

 

SHELL messages

This section contains shell messages.

SHELL_CMD

Message text

-Line=[STRING]-IPAddr=[STRING]-User=[STRING]; Command is [STRING].

Variable fields

$1: User line type and number. If there is not user line information, this field displays two asterisks (**).

$2: IP address. If there is not IP address information, this field displays two asterisks (**).

$3: Username. If there is not username information, this field displays two asterisks (**).

$4: Command string.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CMD: -Line=aux0-IPAd

dr=**-User=**; Command is quit.

Impact

No negative impact on the system.

Cause

A command was executed.

Recommended action

No action is required.

 

SHELL_CMD_CONFIRM

Message text

Confirm option of command [STRING] is [STRING].

Variable fields

$1: Command string.

$2: Confirm option.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CMD_CONFIRM: Confirm option of command save is no.

Impact

No negative impact on the system.

Cause

A user selected a confirmation option for a command.

Recommended action

No action is required.

 

SHELL_CMD_EXECUTEFAIL

Message text

-User=[STRING]-IPAddr=[STRING]; Command [STRING] in view [STRING] failed to be executed.

Variable fields

$1: Username.

$2: IP address.

$3: Command string.

$4: Current command mode.

Severity level

4 (Warning)

Example

SHELL/4/SHELL_CMD_EXECUTEFAIL: -User=**-IPAddr=192.168.62.138; Command save in view system failed to be executed.

Impact

The command failed to be executed.

Cause

A command that a background program issued failed to be executed.

Recommended action

1.     Execute the command again.

2.     Verify that the command view is correct.

3.     If the issue persists, collect alarm information, log messages, and configuration file, and then contact Technical Support for help.

 

SHELL_CMD_INPUT

Message text

Input string for the [STRING] command is [STRING].

Variable fields

$1: Command string.

$2: String entered by the user.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CMD_INPUT: Input string for the save command is startup.cfg.

SHELL/6/SHELL_CMD_INPUT: Input string for the save command is CTRL_C.

SHELL/6/SHELL_CMD_INPUT: Input string for the save command is the Enter key.

Impact

No negative impact on the system.

Cause

A user responded to the input requirement of a command.

Recommended action

No action is required.

 

SHELL_CMD_INPUT_TIMEOUT

Message text

Operation timed out: Getting input for the [STRING] command.

Variable fields

$1: Command string.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CMD_INPUT_TIMEOUT: Operation timed out: Getting input for the fdisk command.

Impact

The command failed to be executed.

Cause

The user did not respond to the input requirement of a command before the timeout timer expired.

Recommended action

Execute the command again and input the required information in time for the next step.

 

SHELL_CMD_INVALID_CHARACTER

Message text

Execution failed for the [STRING] command. Reason: The command contains invalid characters (? or \t).

Variable fields

$1: Command to be executed.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CMD_INVALID_CHARACTER: Execution failed for the sysname abc?? command. Reason: The command contains invalid characters (? or \t).

Impact

The command failed to be executed.

Cause

When the device uses a .cfg configuration file to deploy the configuration, such as configuration recovery or rollback, the commands in the configuration contain invalid characters ? or \t.

Recommended action

Make sure the command is in the correct format and configure the settings manually.

 

SHELL_CMD_LOCKEDBYOTHER

Message text

The system has been locked by [STRING].

Variable fields

$1: Session type.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CMD_LOCKEDBYOTHER: The system has been locked by NETCONF.

Impact

The command failed to be executed.

Cause

Another user locked the configuration. You cannot configure the device.

Recommended action

Wait for the user to unlock the configuration.

 

SHELL_CMD_MATCHFAIL

Message text

-User=[STRING]-IPAddr=[STRING]; Command [STRING] in view [STRING] failed to be matched.

Variable fields

$1: Username.

$2: IP address.

$3: Command string.

$4: Current command mode.

Severity level

4 (Warning)

Example

SHELL/4/SHELL_CMD_MATCHFAIL: -User=**-IPAddr=192.168.62.138; Command description 10 in view system failed to be matched.

Impact

The command failed to be executed.

Cause

The command string has errors, or the view does not support the command.

Recommended action

1.     Verify the command is correct.

2.     Verify that the command view is correct.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

SHELL_CMDDENY

Message text

-Line=[STRING]-IPAddr=[STRING]-User=[STRING]; Command [STRING] is permission denied.

Variable fields

$1: User line type and number. If there is not user line information, this field displays two asterisks (**).

$2: IP address. If there is not IP address information, this field displays two asterisks (**).

$3: Username. If there is not username information, this field displays two asterisks (**).

$4: Command string.

Severity level

5 (Notification)

Example

SHELL/5/SHELL_CMDDENY: -Line=vty0-IPAddr=192.168.62.138-User=**; Command vlan 10 is permission denied.

Impact

The command failed to be executed.

Cause

The user did not have the right to execute the command.

Recommended action

Verify that the user has the permission to execute the command.

 

SHELL_CMDFAIL

Message text

The [STRING] command failed to restore the configuration.

Variable fields

$1: Command string.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CMDFAIL: The “vlan 1024” command failed to restore the configuration.

Impact

The system failed to run the specified configuration file.

Cause

The specified command failed to be restored during a configuration restoration from a .cfg file.

Recommended action

1.     Verify that the configuration file is the file saved on the device.

2.     Identify whether a card is replaced on the device.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

SHELL_COMMIT

Message text

The configuration has been committed.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_COMMIT: The configuration has been committed.

Impact

No negative impact on the system.

Cause

The configuration has been committed successfully.

Recommended action

No action is required.

 

SHELL_COMMIT_DELAY

Message text

A configuration rollback will be performed in [INT32] minutes.

Variable fields

$1: Configuration commit delay timer.

Severity level

5 (Notification)

Example

SHELL/5/SHELL_COMMIT_DELAY: A configuration rollback will be performed in 3 minutes.

Impact

When the timer expires, the system will operate according to the configuration set before the commitment.

Cause

The configuration commit delay timer has been configured successfully.

Recommended action

Complete and commit the configuration before the timer expires. If you cannot complete the configuration, execute the configuration commit delay command again to delay the expiration.

 

SHELL_COMMIT_FAIL

Message text

-Line=[STRING]-IPAddr=[STRING]-User=[STRING]; Failed to commit the target configuration.

Variable fields

$1: User line type and number. If there is not user line information, this field displays two asterisks (**).

$2: IP address. If there is not IP address information, this field displays two asterisks (**).

$3: Username. If there is not username information, this field displays two asterisks (**).

Severity level

4 (Warning)

Example

SHELL/4/SHELL_COMMIT_FAIL: -Line=aux0-IPAddr=**-User=**; Failed to commit the target configuration.

Impact

The system does not operate with the target configuration.

Cause

A target configuration commit operation failed in private or exclusive mode.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

SHELL_COMMIT_REDELAY

Message text

The commit delay has been reset, a configuration rollback will be performed in [INT32] minutes.

Variable fields

$1: Configuration commit delay timer reconfigured.

Severity level

5 (Notification)

Example

SHELL/5/SHELL_COMMIT_REDELAY: The commit delay has been reset, a configuration rollback will be performed in 3 minutes.

Impact

When the timer expires, the system will operate according to the configuration set before the commitment.

Cause

The configuration commit delay timer was reconfigured before the timer expires. This message is generated to indicate that the configuration commit delay timer has been configured and displays the timer value.

Recommended action

Complete and commit the configuration before the timer expires.

 

SHELL_COMMIT_ROLLBACK

Message text

The configuration commit delay is overtime, a configuration rollback will be performed.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_COMMIT_ROLLBACK: The configuration commit delay is overtime, a configuration rollback will be performed.

Impact

After the configuration rollback, the system runs the configuration before the commit operation.

Cause

A timeout rollback timer was specified for deploying the target configuration. When the timeout rollback timer reaches, the device will start configuration rollback. This message is the prompt before the start of configuration rollback.

Recommended action

Complete and commit the configuration within the configuration commit delay timer.

 

SHELL_COMMIT_ROLLBACKDONE

Message text

The configuration rollback has been performed.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_COMMIT_ROLLBACKDONE: The configuration rollback has been performed.

Impact

The system runs the configuration before the commit operation.

Cause

A timeout rollback timer was specified for deploying the target configuration. When the timeout rollback timer reaches, the device will start configuration rollback. This message is generated when configuration rollback is completed.

Recommended action

Complete and commit the configuration within the configuration commit delay timer.

 

SHELL_COMMIT_ROLLBACKFAIL

Message text

Failed to roll back the configuration from the uncommitted changes.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/ SHELL_COMMIT_ROLLBACKFAIL: Failed to roll back the configuration from the uncommitted changes.

Impact

Configuration rollback failed. The system fails to run the configuration before the commit operation.

Cause

A timeout rollback timer was specified for submitting the target configuration. When the timeout rollback timer reaches, the device will start configuration rollback. This message is generated when configuration rollback fails.

Recommended action

Manually perform the operations as needed.

 

SHELL_COMMIT_SUCCESS

Message text

-Line=[STRING]-IPAddr=[STRING]-User=[STRING]; Target configuration successfully committed.

Variable fields

$1: User line type and number. If there is not user line information, this field displays two asterisks (**).

$2: IP address. If there is not IP address information, this field displays two asterisks (**).

$3: Username. If there is not username information, this field displays two asterisks (**).

Severity level

5 (Notification)

Example

SHELL/5/SHELL_COMMIT_SUCCESS: -Line=aux0-IPAddr=**-User=**; Target configuration successfully committed.

Impact

The system runs the configuration with the target configuration successfully.

Cause

A target configuration commit operation succeeded in private or exclusive mode.

Recommended action

No action is required.

 

SHELL_COMMIT_WILLROLLBACK

Message text

A configuration rollback will be performed in 1 minute. To retain the configuration you have made after executing the configuration commit delay command, execute the commit command.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_COMMIT_WILLROLLBACK: A configuration rollback will be performed in 1 minute. To retain the configuration you have made after executing the configuration commit delay command, execute the commit command.

Impact

When the timer expires, the system will operate according to the configuration set before the commitment.

Cause

A configuration rollback will be performed in 1 minute.

Recommended action

Complete and commit the configuration within the configuration commit delay timer. If you cannot complete the configuration, execute the configuration commit delay command again to delay the expiration.

 

SHELL_CRITICAL_CMDFAIL

Message text

-User=[STRING]-IPAddr=[STRING]; Command is [STRING] .

Variable fields

$1: Username.

$2: IP address.

$3: Command string.

Severity level

6 (Informational)

Example

SHELL/6/SHELL_CRITICAL_CMDFAIL: -User=admin-IPAddr=169.254.0.7; Command is save.

Impact

Command execution failed. Only the FIPS mode is supported.

Cause

A command failed to be executed.

Recommended action

1.     Identify the failure cause and take actions as instructed.

2.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

SHELL_LOGIN

Message text

[STRING] logged in from [STRING].

Variable fields

$1: Username.

$2: User line type and number.

Severity level

5 (Notification)

Example

SHELL/5/SHELL_LOGIN: Console logged in from console0.

Impact

No negative impact on the system.

Cause

A user logged in.

If the user logged in to the standby MPU, the user line type and number field displays local.

Recommended action

No action is required.

 

SHELL_LOGOUT

Message text

[STRING] logged out from [STRING], reason: [STRING].

Variable fields

$1: Username.

$2: User line type and number.

$3: Logout cause. This field is available only in FIPS mode.

¡     exit normally

¡     time out

Severity level

5 (Notification)

Example

SHELL/5/SHELL_LOGOUT: Console logged out from console0, reason: exit normally.

Impact

No negative impact on the system.

Cause

Possible causes include the following:

·     A user logged out.

·     If the user logged in to the standby MPU, the user line type and number field displays local.

The logout cause is displayed only in FIPS mode.

Recommended action

No action is required.

 

SHELL_SAVE_FAILED

Message text

Failed to save running configuration to configuration file for configuration rollback.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_SAVE_FAILED: Failed to save running configuration to configuration file for configuration rollback.

Impact

After the target configuration command lines are committed, the system cannot restore the original running configuration before the commit operation.

Cause

The system failed to save the running configuration to the configuration file and does not support a rollback. The system saves the running configuration to the configuration file in the following situations:

·     After the commit command is executed, the device fails to commit the target configuration command lines.

·     The commit command is not executed before the timer set by using the commit confirmed command expires.

Recommended action

If necessary, roll back the configuration manually.

 

SHELL_SAVE_SUCCESS

Message text

Saved running configuration to configuration file for configuration rollback.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_SAVE_SUCCESS: Saved running configuration to configuration file for configuration rollback.

Impact

No negative impact on the system.

Cause

The system saved the running configuration to the configuration file successfully and supports a rollback. The system saves the running configuration to the configuration file in the following situations:

·     After the commit command is executed, the device fails to commit the target configuration command lines.

·     The commit command is not executed before the timer set by using the commit confirmed command expires.

Recommended action

No action is required.

 

SHELL_SAVEPOINT_EXIST

Message text

The running configuration at this rollback point is the same as the configuration at the previous rollback point.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_SAVEPOINT_EXIST: The running configuration at this rollback point is the same as the configuration at the previous rollback point.

Impact

No negative impact on the system.

Cause

The specified two rollback points have the same configuration.

Recommended action

No action is required.

 

SHELL_SAVEPOINT_FAILED

Message text

Failed to create a new rollback point.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_SAVEPOINT_FAILED: Failed to create a new rollback point.

Impact

The system failed to quickly restore the current configuration to the configuration in the specified configuration file.

Cause

An attempt to create a new rollback point failed.

Recommended action

To save the rollback point:

1.     Manually roll back to the rollback point.

2.     Verify the file system. For example, verify that the remaining space of the file system is sufficient.

3.     Execute the commit command again.

 

SHELL_SAVEPOINT_SUCCESS

Message text

Created a new rollback point.

Variable fields

N/A

Severity level

5 (Notification)

Example

SHELL/5/SHELL_SAVEPOINT_SUCCESS: Created a new rollback point.

Impact

No negative impact on the system.

Cause

An attempt to create a new rollback point succeeded.

Recommended action

No action is required.

 

SNMP messages

This section contains SNMP messages.

SNMP_ACL_RESTRICTION

Message text

SNMP [STRING] from [STRING] is rejected due to ACL restriction.

Variable fields

$1: SNMP community/usm-user/group.

$2: IP address of the NMS.

Severity level

3 (Error)

Example

SNMP/3/SNMP_ACL_RESTRICTION: SNMP community public from 192.168.1.100 is rejected due to ACL restriction.

Impact

The NMS cannot access the device.

Cause

The IP address and other parameters of the NMS did not match the SNMP ACL.

Recommended action

Identify whether the IP address in the prompt is a valid NMS IP address:

·     If the IP address is a valid NMS IP address, identify whether the ACL configuration is correct.

·     Use the display snmp-agent community command to check the ACL number referenced by the SNMP community name in the log message. Execute the display snmp-agent group and display snmp-agent usm-user commands to view the ACL number referenced by the SNMP username/group name in the log message. Then, execute the display acl command to review the configuration of the ACL. If the ACL configuration is incorrect, execute the rule command in ACL view to edit the filter rule in the ACL.

·     If the IP address is an invalid NMS IP address, no action is required.

 

SNMP_AUTHENTICATION_FAILURE

Message text

Failed to authenticate SNMP message.

Variable fields

N/A

Severity level

4 (Warning)

Example

SNMP/4/SNMP_AUTHENTICATION_FAILURE: Failed to authenticate SNMP message.

Impact

The NMS cannot access the device.

Cause

The NMS initiates an SNMP request to the device, but fails to pass authentication.

Recommended action

Execute the display snmp-agent sys-info command to check the SNMP version used by the device. Different SNMP versions support different security authentication methods.

·     For SNMPv1 and SNMPv2c, authentication and encryption are not supported and community names are used for security authentication. The device and NMS must use the same community name. Execute the display snmp-agent community command to view the community name used on the device. To access the device from the NMS, use the same community name, or create a community on the device by using the snmp-agent community command and make sure the community name is the same as that on the NMS.

·     For SNMPv3, authentication and encryption are supported and the device and NMS must use the same security authentication parameters, including username, whether to authenticate, whether to encrypt, the password for authentication, and the password for encryption. Execute the display snmp-agent group and display snmp-agent usm-user commands to view the device's security authentication parameters. If they differ from those on the NMS, edit the NMS's security authentication parameters, or use the snmp-agent group and snmp-agent usm-user v3 commands to change the authentication parameters.

 

SNMP_DISP_NODE

Message text

Access to MIB name: [STRING], Type: [STRING], NMS IP: [STRING], ID: [STRING], Start time: [STRING] may be hunged

Description

NMS performs SNMP operations on the device, and the device takes too long to process the operations.

Variable fields

$1: MIB node name.

$2: Operation type. Options are Get and Set.

$3: IP address of the NMS.

$4: SNMP packet ID.

$5: Time when the device started to process the SNMP operation.

Severity level

5 (Notification)

Example

SNMP/5/SNMP_DISP_NODE: Access to MIBname:ifInDiscards, Type:Get, NMS IP:10.6.41.3, ID:7666285, Start time:01-07 09:48:37:710 may be hunged

Impact

No negative impact on the system.

Cause

NMS performs SNMP operations on the device, and the device takes an excessively long time to process the operations (over 60 seconds).

·     The device is processing other tasks and cannot process SNMP requests in time.

·     The SNMP process is busy and cannot process SNMP requests in time.

Recommended action

1.     Locate and address device busy issues.

a.     Execute the display cpu-usage command to identify whether the system CPU usage is temporarily high. The possible cause of increase in CPU usage is that the device is under an attack or the device is processing a task that consumes significant CPU resources.

b.     If the CPU usage is high, execute the display process command to identify the process that causes the increase in CPU usage and continue locating the service module issue.

2.     Troubleshoot SNMP process issues.

For devices that support the display system internal snmp-agent operation in-progress command, execute the probe command in system view to enter probe view. Then, repeatedly execute the display system internal snmp-agent operation in-progress command to view information related to the SNMP operations the device is currently processing.

¡     If the Request ID in the output keeps changing, the SNMP process is continuously processing different requests, and the current SNMP process is busy. Please reduce the frequency of SNMP operations on the device by the NMS.

¡     If the Request ID in the output does not change, the SNMP process is continuously processing the same request, and the processing timed out. Perform the following tasks:

Execute the undo snmp-agent and snmp-agent commands to restart the SNMP process and try to resolve the issue.

Execute the display system internal snmp-agent operation timed-out and display system internal snmp-agent packet timed-out commands to check for time-consuming SNMP operations and the involved MIB nodes. Reduce or avoid similar operations.

For devices that do not support the display system internal snmp-agent operation in-progress command, perform the following tasks:

a.     Execute the debugging snmp agent command to enable SNMP debugging. Then, perform SNMP get or set operations again to reproduce the issue before further locating the issue based on the debugging information.

b.     If the SNMP process is stuck and SNMP operations can't be continued to reproduce the issue, use the follow command in probe view to view the cause. Then, execute the undo snmp-agent and snmp-agent commands in sequence to restart the SNMP process and try to resolve the issue.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

SNMP_GET

Message text

-seqNO=[UINT32]-srcIP=[STRING]-op=GET-node=[STRING]-value=[STRING]; The agent received a message.

Variable fields

$1: Sequence number of an SNMP operation log.

$2: IP address of the NMS.

$3: MIB object name and OID.

$4: Value field of the request packet.

Severity level

6 (Informational)

Example

SNMP/6/SNMP_GET: -seqNO=1-srcIP=192.168.28.28-op=GET-node=sysLocation(1.3.6.1.2.1.1.6.0)-value=; The agent received a message.

Impact

No negative impact on the system.

Cause

The device has SNMP logging enabled and received a get request sent by the NMS.

Recommended action

No action is required.

 

SNMP_NOTIFY

Message text

Notification [STRING][STRING].

Variable fields

$1: Notification name and OID.

$2: Variable-binding field of notifications.

¡     If no MIB object exists, only notification name and OID are displayed.

¡     If MIB objects are included, " with " are displayed before the MIB object and OID. MIB objects are separated by semicolons (;).

Severity level

6 (Informational)

Example

SNMP/6/SNMP_NOTIFY: Notification hh3cLogIn(1.3.6.1.4.1.25506.2.2.1.1.3.0.1) with hh3cTerminalUserName(1.3.6.1.4.1.25506.2.2.1.1.2.1.0)=;hh3cTerminalSource(1.3.6.1.4.1.25506.2.2.1.1.2.2.0)=Console.

Impact

No negative impact on the system.

Cause

The device has SNMP notifications feature and the device sent SNMP notifications to the NMS.

Recommended action

No action is required.

 

SNMP_SET

Message text

-seqNO=[UINT32]-srcIP=[STRING]-op=SET-errorIndex=[UINT32]-errorStatus=[STRING]-node=[STRING]-value=[STRING]; The agent received a message.

Variable fields

$1: Sequence number of an SNMP operation log.

$2: IP address of the NMS.

$3: Error index of the Set operation.

$4: Error status of the Set operation.

$5: MIB object name and OID.

$6: Value of the MIB object changed by the Set operation.

Severity level

6 (Informational)

Example

SNMP/6/SNMP_SET: -seqNO=3-srcIP=192.168.28.28-op=SET-errorIndex=0-errorStatus=noError-node=sysLocation(1.3.6.1.2.1.1.6.0)-value=Hangzhou China; The agent received a message.

Impact

No negative impact on the system.

Cause

The device has SNMP logging enabled and received a get request sent by the NMS.

Recommended action

No action is required.

 

SNMP_USM_NOTINTIMEWINDOW

Message text

-User=[STRING]-IPAddr=[STRING]; SNMPv3 message is not in the time window.

Variable fields

$1: Username.

$2: IP address of the NMS.

Severity level

4 (Warning)

Example

SNMP/4/SNMP_USM_NOTINTIMEWINDOW: -User=admin-IPAddr=169.254.0.7; SNMPv3 message is not in the time window.

Impact

No negative impact on the system.

Cause

When the timeout timer expires, the device still has not received an SNMPv3 response.

Recommended action

1.     Resend SNMPv3 requests.

2.     After re-establishing the SNMPv3 connection, retransmit the SNMPv3 request. If a response is received from the peer, no further processing is required. If not, proceed to step 3.

3.     Ping the IP address of the NMS. If the ping operation fails, first identify the issue that causes the failure.

4.     Identify whether the SNMP server on the NMS is operating correctly. If not, restart the SNMP server on the NMS.

5.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

 

SSHC messages

This section contains SSH client messages.

SSHC_CERT_VERIFY_FAIL

Message text

Failed to verify the certificate because [STRING].

Variable fields

$1: Failure reason:

¡     null certificate.

¡     null certificate name.

¡     unable to get issuer certificate.

¡     unable to get certificate CRL.

¡     unable to decrypt CRL's signature.

¡     certificate signature failure.

¡     CRL signature failure.

¡     unable to decrypt certificate's signature.

¡     certificate is not yet valid.

¡     certificate has expired.

¡     CRL is not yet valid.

¡     CRL has expired.

¡     format error in certificate's notBefore field.

¡     format error in certificate's notAfter field.

¡     format error in CRL's lastUpdate field.

¡     format error in CRL's nextUpdate field.

¡     out of memory.

¡     self signed certificate.

¡     self signed certificate in certificate chain.

¡     unable to verify the first certificate.

¡     certificate chain too long.

¡     certificate revoked.

¡     invalid CA certificate.

¡     invalid non-CA certificate (has CA markings).

¡     path length constraint exceeded.

¡     proxy path length constraint exceeded.

¡     proxy certificates not allowed, please set the appropriate flag.

¡     unsupported certificate purpose.

¡     certificate not trusted.

¡     certificate rejected.

¡     application verification failure.

¡     subject issuer mismatch.

¡     authority and subject key identifier mismatch.

¡     authority and issuer serial number mismatch.

¡     key usage does not include certificate signing.

¡     unable to get CRL issuer certificate.

¡     unhandled critical extension.

¡     key usage does not include CRL signing.

¡     key usage does not include digital signature.

¡     unhandled critical CRL extension.

¡     invalid or inconsistent certificate extension.

¡     invalid or inconsistent certificate policy extension.

¡     no explicit policy.

¡     Different CRL scope.

¡     CRL path validation error.

¡     unsupported or invalid name syntax.

¡     unsupported or invalid name constraint syntax.

¡     Suite B: certificate version invalid.

¡     Suite B: invalid public key algorithm.

¡     Suite B: invalid ECC curve.

¡     Suite B: invalid signature algorithm.

¡     Suite B: curve not allowed for this LOS.

¡     Suite B: cannot sign P-384 with P-256.

¡     Invalid certificate verification context.

¡     Issuer certificate lookup error.

¡     proxy subject name violation.

Severity level

5 (Notification)

Example

SSHC/5/SSHC_CERT_VERIFY_FAIL: Failed to verify the certificate because null certificate.

Impact

SSH user login fails or online SSH users are kicked offline.

Cause

SSH client certificate authentication failed.

Recommended action

Resolve the issue based on the failure reason.

 

 

SSHS

This section contains SSH server messages.

SSHS_ACL_DENY

Message text

The SSH Connection [IPADDR]([STRING]) request was denied according to ACL rules.

Variable fields

$1: IP address of the SSH client.

$2: IP address of the SSH client in the VPN

Severity level

5 (Notification)

Example

SSHS/5/SSH_ACL_DENY: The SSH Connection 1.2.3.4(vpn1) request was denied according to ACL rules.

Impact

SSH client login failed

Cause

The device has access control configured for the SSH client, and the client's IP address is not within the permit range defined in the ACL

Recommended action

Confirm if the user corresponding to this IP address is unauthorized:

·     If yes, no action is required.

·     If not, modify the ACL configuration to include the client's IP address in the permit rules

 

SSHS_ALGORITHM_MISMATCH

Message text

SSH client [STRING] failed to log in because of [STRING] algorithm mismatch.

Variable fields

$1: IP address of the SSH client.

$2: Algorithm type:

¡     encryption.

¡     key exchange.

¡     MAC.

public key.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_ALGORITHM_MISMATCH: SSH client 192.168.30.117 failed to log in because of encryption algorithm mismatch.

Impact

SSH client login failed

Cause

SSH client and server-side algorithms do not match

Recommended action

Modify the algorithm to make the SSH client and server use the same type of algorithm

 

SSHS_AUTH_EXCEED_RETRY_TIMES

Message text

SSH user [STRING] (IP: [STRING]) failed to log in, because the number of authentication attempts exceeded the upper limit.

Variable fields

$1: Username.

$2: IP address of the SSH client.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_AUTH_EXCEED_RETRY_TIMES: SSH user David (IP: 192.168.30.117) failed to log in, because the number of authentication attempts exceeded the upper limit.

Impact

The system may be under attack by unauthorized users

Cause

The maximum number of SSH user authentication attempts is reached

Recommended action

1.     Check the log to see if the user is unauthorized:

¡     If so, modify the ACL configuration to exclude the unauthorized client's IP address from the permit rules

¡     If not, contact the administrator for the correct username and password. If the alarm persists, go to step 2

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSHS_AUTH_FAIL

Message text

SSH user [STRING] (IP: [STRING]) didn't pass public key authentication for [STRING].

Variable fields

$1: Username.

$2: IP address of the SSH client.

$3: Failure reason:

·     wrong public key algorithm.

·     wrong public key.

·     wrong digital signature.

Severity level

5 (Notification)

Example

SSHS/5/SSHS_AUTH_FAIL: SSH user David (IP: 192.168.30.117) didn't pass public key authentication for wrong public key algorithm.

Impact

SSH client login failed

Cause

SSH user failed public key authentication

Recommended action

Reason 1: wrong public key algorithm

1.     Check if the SSH client authentication uses the DSA algorithm in FIPS mode:

¡     If so, switch to another supported algorithm.

¡     If not, If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

Reason 2: wrong public key

2.     Check if the specified SSH user is configured with a public key using the display ssh user-information command:

¡     If not, configure it using the ssh user command.

¡     If yes, go to step 2.

3.     Check if the configured public key matches the one specified on the client using the display public-key peer command:

¡     If not, import the specified public key to the device and configure it to the specified user using the ssh user command.

¡     If it matches, it may be due to mismatched public and private keys on the SSH client, regenerate the key pair on the SSH client.

4.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

Reason 3: wrong digital signature

1.     Check the validity of the server's CA certificate and the client's local certificate.

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSHS_AUTH_SUCCESS

Message text

SSH user [STRING] from [IPADDR] port [INTEGER] passed [STRING] authentication.

Variable fields

$1: Username.

$2: User IP.

$3: TCP source port.

$4: Authentication method, with values keyboard-interactive, password, and publickey

Severity level

6 (Informational)

Example

SSHS/6/SSHS_AUTH_SUCCESS: SSH user ABC from 1.1.1.1 port 55361 passed keyboard-interactive authentication.

Impact

No negative impacts on the system.

Cause

SSH user authentication through

Recommended action

No action is required.

 

SSHS_AUTH_TIMEOUT

Message text

Authentication timed out for [IPADDR].

Variable fields

$1: User IP.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_AUTH_TIMEOUT: Authentication timed out for 1.1.1.1.

Impact

SSH user login authentication failed

Cause

SSH users did not complete authentication within the set authentication timeout period

Recommended action

Check if the SSH user authentication timeout is set too short by using the 'display ssh server status' command:

·     If it is not set too short, enter user information promptly to complete the authentication

·     If it is set too short, use the 'ssh server authentication-timeout' command to increase the authentication timeout

 

SSHS_AUTHOR_FAIL

Message text

Authorization failed for user [STRING] from [STRING] port [INT32].

Variable fields

$1: Username.

$2: IP address of the SSH client.

$3: Port number.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_AUTHOR_FAIL: Authorization failed for user David from 140.1.2.46 port 15000.

Impact

SSH user login fail

Cause

SSH user authorization fail

Recommended action

Check local user provisioning or authentication server configuration

 

SSHS_CERT_VERIFY_FAIL

Message text

Failed to verify the certificate because [STRING].

Variable fields

$1: Failure reason:

·     null certificate.

·     null certificate name.

·     unable to get issuer certificate.

·     unable to get certificate CRL.

·     unable to decrypt CRL's signature.

·     certificate signature failure.

·     CRL signature failure.

·     unable to decrypt certificate's signature.

·     certificate is not yet valid.

·     certificate has expired.

·     CRL is not yet valid.

·     CRL has expired.

·     format error in certificate's notBefore field.

·     format error in certificate's notAfter field.

·     format error in CRL's lastUpdate field.

·     format error in CRL's nextUpdate field.

·     out of memory.

·     self signed certificate.

·     self signed certificate in certificate chain.

·     unable to verify the first certificate.

·     certificate chain too long.

·     certificate revoked.

·     invalid CA certificate.

·     invalid non-CA certificate (has CA markings).

·     path length constraint exceeded.

·     proxy path length constraint exceeded.

·     proxy certificates not allowed, set the appropriate flag.

·     unsupported certificate purpose.

·     certificate not trusted.

·     certificate rejected.

·     application verification failure.

·     subject issuer mismatch.

·     authority and subject key identifier mismatch.

·     authority and issuer serial number mismatch.

·     key usage does not include certificate signing.

·     unable to get CRL issuer certificate.

·     unhandled critical extension.

·     key usage does not include CRL signing.

·     key usage does not include digital signature.

·     unhandled critical CRL extension.

·     invalid or inconsistent certificate extension.

·     invalid or inconsistent certificate policy extension.

·     no explicit policy.

·     Different CRL scope.

·     CRL path validation error.

·     unsupported or invalid name syntax.

·     unsupported or invalid name constraint syntax.

·     Suite B: certificate version invalid.

·     Suite B: invalid public key algorithm.

·     Suite B: invalid ECC curve.

·     Suite B: invalid signature algorithm.

·     Suite B: curve not allowed for this LOS.

·     Suite B: cannot sign P-384 with P-256.

·     Invalid certificate verification context.

·     Issuer certificate lookup error.

·     proxy subject name violation.

·     Absence of basic Constraints extension.

·     failure to establish revocation status.

Severity level

5 (Notification)

Example

SSHS/5/SSHS_CERT_VERIFY_FAIL: Failed to verify the certificate because null certificate.

Impact

SSH user login failed or SSH user disconnected

Cause

SSH client certificate verification failed, see specific reasons in the variable fields.

Recommended action

Take corresponding actions based on the specific failure reasons indicated in the logs

 

SSHS_CONNECT

Message text

SSH user [STRING] (IP: [STRING]) connected to the server successfully.

Variable fields

$1: Username.

$2: IP address of the SSH client.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_CONNECT: SSH user David (IP: 192.168.30.117) connected to the server successfully.

Impact

No negative impacts on the system.

Cause

SSH user successfully logged in to the server

Recommended action

No action is required.

 

SSHS_DECRYPT_FAIL

Message text

The packet from [STRING] failed to be decrypted with [STRING].

Variable fields

$1: IP address of the SSH client.

$2: Encryption algorithm (such as aes256-cbc)

Severity level

5 (Notification)

Example

SSHS/5/SSHS_DECRYPT_FAIL: The packet from 192.168.30.117 failed to be decrypted with aes256-cbc.

Impact

SSH user login failure or disconnection

Cause

Packet decryption failure from SSH client

Recommended action

Configure the SSH user to try logging in again. If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSHS_DISCONNECT

Message text

SSH user [STRING] (IP: [STRING]) disconnected from the server.

Variable fields

$1: Username.

$2: IP address of the SSH client.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_DISCONNECT: SSH user David (IP: 192.168.30.117) disconnected from the server.

Impact

No negative impacts on the system.

Cause

SSH user exits the login

Recommended action

Check if the SSH client is unauthorized:

·     If yes, modify the ACL configuration to exclude the unauthorized client's IP address from the permit rules in the ACL, and update the user authentication configuration used by the client.

·     If not, no action is required.

 

SSHS_ENCRYPT_FAIL

Message text

The packet to [STRING] failed to be encrypted with [STRING].

Variable fields

$1: IP address of the SSH client.

$2: Encryption algorithm (such as aes256-cbc)

Severity level

5 (Notification)

Example

SSHS/5/SSHS_ENCRYPT_FAIL: The packet to 192.168.30.117 failed to be encrypted with aes256-cbc.

Impact

SSH user login failure or disconnection

Cause

Message encryption failed to be sent to the SSH client

Recommended action

SSH user to re-login and try again,

If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSHS_LOG

Message text

Authentication failed for user [STRING] from [STRING] port [INT32] because of invalid username or wrong password.

Authorization failed for user [STRING] from [STRING] port [INT32].

Variable fields

$1: IP address of the SSH client.

$2: Username.

$3: Port number.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_LOG: Authentication failed for user David from 140.1.1.46 port 16266 because of invalid username or wrong password.

SSHS/6/SSHS_LOG: Authorization failed for user David from 140.1.2.46 port 15000.

Impact

SSH users cannot log in to the SSH server

Cause

·     Invalid SSH username

·     Incorrect SSH user login password

Recommended action

1.     Check if the username meets the format requirements:

¡     If not, re-enter a username that meets the format requirements

¡     If it meets the requirements, go to step 2

2.     Check if the login password is correct:

¡     If not, re-enter the correct password

¡     If correct, go to step 3

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSHS_MAC_ERROR

Message text

SSH server received a packet with wrong message authentication code (MAC) from [STRING].

Variable fields

$1: IP address of the SSH client.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_MAC_ERROR: SSH server received a packet with wrong message authentication code (MAC) from 192.168.30.117.

Impact

SSH user login to fail or drop

Cause

SSH server side fails to verify the integrity of SSH client message

Recommended action

Configure the SSH users to log in again.

If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSHS_REACH_SESSION_LIMIT

Message text

SSH client [STRING] failed to log in. The current number of SSH sessions is [NUMBER]. The maximum number allowed is ([NUMBER]).

Variable fields

$1: IP address of the SSH client.

$2: SSH/Stelnet/SFTP/SCP/NETCONF

$3: Total number of SSH sessions or various types of SSH sub-sessions (Stelnet/SFTP/SCP/NETCONF over SSH)

$4: Total number of SSH sessions or various types of SSH sub-sessions allowed by the device (Stelnet/SFTP/SCP/NETCONF over SSH)

Severity level

6 (Informational)

Example

SSHS/6/SSHS_REACH_SESSION_LIMIT: SSH client 192.168.30.117 failed to log in. The current number of SSH sessions is 10. The maximum number allowed is (10).

Impact

SSH client login to server failed

Cause

SSH client login failed, maximum number of SSH sessions reached

Recommended action

1.     Increase the upper limit by executing the aaa session-limit ssh command

2.     If the maximum user connection limit is already configured to the maximum value, you can take offline idle clients to allow new SSH users to come online

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSHS_REACH_USER_LIMIT

Message text

SSH client [STRING] failed to log in, because the number of users reached the upper limit.

Variable fields

$1: IP address of the SSH client.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_REACH_USER_LIMIT: SSH client 192.168.30.117 failed to log in, because the number of users reached the upper limit.

Impact

SSH client login failed

Cause

Number of VTY users on SSH server has reached the upper limit of allowed users

Recommended action

Use the display users command to check for idle subscriber lines, then use the free line vty command to release idle VTY subscriber lines, allowing new SSH users to connect

 

SSHS_SCP_DISCONNECT

Message text

SCP user [STRING] (IP: [STRING]) disconnected from the server, reason: [STRING].

Variable fields

$1: Username.

$2: SCP client IP address

$3: Disconnect reason:

·     User logout: User actively exits the login

·     Forced logout by administrator: Administrator forces user exit

Severity level

6 (Informational)

Example

SSHS/6/SSHS_SCP_DISCONNECT: SCP user David (IP: 192.168.30.117) disconnected from the server, reason: User logout.

Impact

No negative impacts on the system.

Cause

SCP client log out

Recommended action

Check if the SCP client is an unauthorized client:

·     If so, modify the ACL configuration to exclude the unauthorized client's IP address from the ACL permit rules, and modify the user authentication configuration used by the client

·     If not, no action is required.

 

SSHS_SCP_OPER

Message text

User [STRING] at [IPADDR] requested operation: [STRING].

Variable fields

$1: Username.

$2: User IP.

$3: User request content, including file operation information

·     get file "name": Download a file named name

·     put file "name": Upload a file named name

Severity level

6 (Informational)

Example

SSHS/6/SSHS_SCP_OPER: -MDC=1; User user1 at 1.1.1.1 requested operation: put file "aa".

Impact

No negative impacts on the system.

Cause

SCP server receives SCP user request to execute related operations

Recommended action

No action is required.

 

SSHS_SFTP_DISCONNECT

Message text

SFTP user [STRING] (IP: [STRING]) disconnected from the server, reason: [STRING].

Variable fields

$1: Username.

$2: IP address of the SFTP client.

$3: Disconnection reason:

·     User logout.

·     Timeout.

·     Forced logout by admin: Administrator forced user logout

Severity level

6 (Informational)

Example

SSHS/6/SSHS_SFTP_DISCONNECT: SFTP user David (IP: 192.168.30.117) disconnected from the server, reason: Timeout.

Impact

No negative impacts on the system.

Cause

SFTP client logout

Recommended action

Check if the SFTP client is an unauthorized client:

·     If it is, modify the ACL configuration to exclude the unauthorized client's IP address from the ACL permit rule and modify the user authentication configuration used by the client

·     If not, no action is required.

 

SSHS_SFTP_OPER

Message text

User [STRING] at [IPADDR] requested operation: [STRING].

Variable fields

$1: Username.

$2: User IP.

$3: User requests content, including file operations and directory operations

·     open dir "path": Open directory path

·     open "file" (attribute code code) in MODE mode: Open file file in MODE mode, with attribute code code

·     remove file "path": Delete file path

·     mkdir "path" (attribute code code): Create new directory path with attribute code code

·     rmdir "path": Delete directory path

·     rename old "old-name" to new "new-name": Change the name of old file or folder from old-name to new-name

Severity level

6 (Informational)

Example

SSHS/6/SSHS_SFTP_OPER: User user1 at 1.1.1.1 requested operation: open dir "flash:/".

Impact

No negative impacts on the system.

Cause

SFTP server receives SFTP user requests to perform related operations

Recommended action

No action is required.

 

SSHS_SRV_UNAVAILABLE

Message text

The [STRING] server is disabled or the [STRING] service type is not supported.

Variable fields

$1: Service type. Options include Stelnet, SCP, SFTP, and NETCONF.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_SRV_UNAVAILABLE: The SCP server is disabled or the SCP service type is not supported.

Impact

Server is disconnecting, SSH user login to SSH server failed

Cause

Stelnet/SCP/SFTP/NETCONF over SSH service is unavailable or the class type is not supported

Recommended action

1.     Check if the corresponding SSH class type is enabled:

¡     If not enabled, enable the corresponding service.

¡     If already enabled, go to step 2

2.     Execute the ssh user command in the device system view to modify the SSH user's class type to match the client type

 

SSHS_VERSION_MISMATCH

Message text

SSH client [STRING] failed to log in because of version mismatch.

Variable fields

$1: IP address of the SSH client.

Severity level

6 (Informational)

Example

SSHS/6/SSHS_VERSION_MISMATCH: SSH client 192.168.30.117 failed to log in because of version mismatch.

Impact

No negative impacts on the system.

Cause

SSH client and server SSH version numbers do not match

Recommended action

1.     Execute the 'display ssh server status' command on the device to check the SSH version field for confirmation of SSH version:

¡     If SSH version displays as 1.99, it means the device is compatible with SSH1 client, go to step 2

¡     If SSH version displays as 2.0, execute the 'ssh server compatible-ssh1x enable' command on the device to enable compatibility with SSH1 client

2.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

SSL VPN messages

This section contains SSL VPN messages.

SSLVPN_HTTP_BIND_ADDRESS_INUSED

Message text

Failed to bind TCP connection [STRING]/[UINT32] to VPN instance [UINT32] because the address was already used.

Variable fields

$1: IP address to be bound.

$2: Port number to be bound.

$3: VPN instance index.

Severity level

3 (Error)

Example

SSLVPN/3/SSLVPN_HTTP_BIND_ADDRESS_INUSED: Failed to bind TCP connection 192.168.30.117/10000 to VPN instance 0 because the address was already used.

Impact

The SSL VPN user failed to access the gateway.

Cause

Failed to bind the VPN instance with the IP address and the port number because the IP address to be bound has been used and cannot be reused.

Recommended action

Use display tcp-proxy to identify available IP addresses and then use an IP address that is not used or can be reused to perform the binding task again.

 

SSLVPN_HTTP_BIND_PORT_ALLOCETED

Message text

Failed to bind TCP connection [STRING]/[UINT32] to VPN instance [UINT32] because the port was already allocated.

Variable fields

$1: IP address to be bound.

$2; Port number to be bound.

$3: VPN instance index.

Severity level

3 (Error)

Example

SSLVPN/3/ SSLVPN_HTTP_BIND_PORT_ALLOCETED: Failed to bind TCP connection 192.168.30.117/10000 to VPN instance 0 because the port was already allocated.

Impact

The SSL VPN user failed to access the gateway.

Cause

Failed to bind the VPN instance with the IP address and the port number because the port number to be bound has been allocated.

Recommended action

Use display tcp-proxy port-info and display ipv6 tcp-proxy port-info to identify available port numbers, and then perform the binding task again.

 

SSLVPN_IP_RESOURCE_DENY

Message text

User [STRING] of gateway [STRING] from [STRING] and virtual address [STRING] denied to access [STRING]:[STRING].

Variable fields

$1: Username.

$2: SSL VPN gateway name.

$3: User IP address.

$4: Virtual IP address for user login.

$5: IP address of the requested resource.

$6: Port number of the requested resource.

Severity level

6 (Informational)

Example

SSLVPNK/6/SSLVPN_IP_RESOURCE_DENY: User abc of gateway ctx1 from 192.168.200.130 and virtual address 10.1.1.10 denied to access 10.1.1.255:137.

Impact

The user failed to access IP resources.

Cause

A user was denied access to specific IP resources, which is possibly caused by ACL-based access filtering.

Recommended action

Verify that access to the requested resource is not denied by the ACL rules used for IP access filtering.

 

SSLVPN_IP_RESOURCE_FAILED

Message text

User [STRING] of gateway [STRING] from [STRING] and virtual address [STRING] failed to access [STRING]:[STRING].

Variable fields

$1: Username.

$2: SSL VPN gateway name.

$3: User IP address.

$4: Virtual IP address for user login.

$5: IP address of the requested resource.

$6: Port number of the requested resource.

Severity level

6 (Informational)

Example

SSLVPNK/6/SSLVPN_IP_RESOURCE_FAILED: User abc of gateway ctx1 from 192.168.200.130 and virtual address 10.1.1.10 failed to access 10.1.1.255:137.

Impact

The user failed to access IP resources.

Cause

The user failed to access IP resources, which is caused by network issues.

Recommended action

Verify that a route is available to reach the requested IP resource.

 

SSLVPN_IP_RESOURCE_PERMIT

Message text

User [STRING] of gateway [STRING] from [STRING] and virtual address [STRING] permitted to access [STRING]:[STRING].

Variable fields

$1: Username.

$2: SSL VPN gateway name.

$3: User IP address.

$4: Virtual IP address for user login.

$5: IP address of the requested resource.

$6: Port number of the requested resource.

Severity level

6

Example

SSLVPN/6/SSLVPN_IP_RESOURCE_PERMIT: User abc of gateway gw1 from 192.168.200.130 and virtual address 10.1.1.10 permitted to access 10.1.1.255:137.

Impact

No negative impact on the system.

Cause

A user accessed IP resources.

Recommended action

No action is required.

 

SSLVPN_IPAC_ALLOC_ADDR_FAIL

Message text

Failed to allocate [STRING] address to user [STRING] at [STRING] in gateway [STRING]. Reason: [STRING].

Variable fields

$1: Route version:

·     IPv4

·     IPv6

$2: Username.

$3: User IP address.

$4: SSL VPN gateway name.

$5: Reason why the SLS VPN gateway failed to allocate an IP address to the user. Options are:

·     Failed to obtain system resource data.

·     No address is available in the address pool.

·     Failed to obtain address pool.

·     Available addresses in the address pool have been bound to other users.

Severity level

6 (Informational)

Example

SSLVPN/6/SSLVPN_IPAC_ALLOC_ADDR_FAIL: Failed to allocate IPv4 address to user user1 at 10.1.1.100 in gateway gw. Reason: No address is available in the address pool.

Impact

The SSL VPN failed to assign an IP address to the vNIC on the IP access client.

Cause

The SSL VPN gateway failed to allocate an IP address to the IP access user, which is possibly caused the following:

·     The device is operating correctly.

·     The address pool is not configured.

·     No address available.

·     The IP address to be assigned has been used.

Recommended action

Troubleshoot the issue based on the displayed cause.

 

SSLVPN_IPAC_ALLOC_ADDR_SUCCESS

Message text

[STRING] address [STRING] successfully allocated to user [STRING] at [STRING] in gateway [STRING].

Variable fields

$1: Route version:

¡     IPv4

¡     IPv6

$2: IP address.

$3: Username.

$4: User IP address.

$5: SSL VPN gateway name.

Severity level

6 (Informational)

Example

SSLVPN/6/SSLVPN_IPAC_ALLOC_ADDR_SUCCESS: IPv4 address 10.1.1.1 successfully allocated to user user1 at 10.1.1.100 in gateway gw.

Impact

No negative impact on the system.

Cause

When an IP access user successfully connects to the SSL VPN gateway by using the IP address assigned to the vNIC on the SSL VPN client , the device logs the successful IP assignment.

Recommended action

No action is required.

 

SSLVPN_IPAC_CONN_CLOSE

Message text

IP connection was [STRING]. Reason: [STRING].

Variable fields

$1: Connection close type. Options are:

·     closed.

·     aborted.

$2: Reason why the connection was closed. Options are:

·     User logout.

·     Failure to find peer.

·     Handshake failed.

·     Change of IP address pool.

·     Failure to receive data.

·     Local retransmission timeout.

·     Local keepalive timeout.

·     Local probe timeout.

·     Received FIN from peer.

·     Received RST from peer.

·     No authorized policy group.

·     Allocated address was bound to another user.

·     Failure to update client configuration.

·     Deleted old peer.

·     Failure to add peer.

·     Other.

Severity level

6 (Informational)

Example

SSLVPNK/6/SSLVPN_IPAC_CONN_CLOSE: IP connection was closed. Reason: User logout.

Impact

The connection to the IP access service is terminated.

Cause

The reason for the close of an IP connection was logged.

Recommended action

Troubleshoot the issue based on the displayed cause.

 

SSLVPN_IPAC_PACKET_DROP

Message text

Dropped [STRING] IP connection [STRING] packets in gateway [STRING]. Reason: [STRING].

Variable fields

$1: Number of dropped packets.

$2: Connection direction:

·     request.

·     reply.

$3: SSL VPN gateway name.

$4: Reason for the packet drop:

·     Buffer insufficient.

·     Gateway rate limit.

Severity level

6 (Informational)

Example

SSLVPN/6/SSLVPN_IPAC_PACKET_DROP: Dropped 164 IP connection reply packets in gateway gw. Reason: Gateway rate limit.

Impact

Packet drops occur on the IP access service.

Cause

Packet drop information was logged when packet drops occur on the IP access service.

Recommended action

Identify whether the gateway rate limit is configured or the buffer is insufficient .

 

SSLVPN_IPAC_RELEASE_ADDR_SUCCESS

Message text

User [STRING] at [STRING] in gateway [STRING] released [STRING] address [STRING].

Variable fields

$1: Username.

$2: User IP address.

$3: SSL VPN gateway name.

$4: Route version:

¡     IPv4

¡     IPv6

$5: IP address that the SSL VPN gateway allocated to a user.

Severity level

6 (Informational)

Example

SSLVPNK/6/SSLVPN_IPAC_RELEASE_ADDR_SUCCESS: User abc at 10.1.1.1 in gateway gw released IPv4 address 10.1.1.100.

Impact

No negative impact on the system.

Cause

The SSL VPN gateway successfully released the IP address allocated to the vNIC on the IP access client.

Recommended action

No action is required.

 

SSLVPN_SERVICE_UNAVAILABLE

Message text

SSL VPN service was unavailable. Reason: [STRING].

Variable fields

$1: Reason why the SSL VPN service was unavailable. Options include SSL VPN gateway not enabled.

Severity level

6 (Informational)

Example

SSLVPNK/6/SSLVPN_SERVICE_UNAVAILABLE: SSL VPN service was unavailable. Reason: SSL VPN gateway not enabled.

Impact

The SSL VPN service is not available.

Cause

The reason for the unavailability of an SSL VPN service was logged.

Recommended action

Enter the SSL VPN gateway view and use the service ipv4 enable command to enable the gateway.

 

SSLVPN_USER_LOGIN

Message text

User [STRING] of gateway [STRING] logged in from [STRING].

Variable fields

$1: Username.

$2: SSL VPN gateway name.

$3: User IP address.

Severity level

5 (Notification)

Example

SSLVPN/5/SSLVPN_USER_LOGIN: User abc of gateway ctx logged in from 192.168.200.31.

Impact

No negative impact on the system.

Cause

A user logged in to an SSL VPN gateway.

Recommended action

No action is required.

 

SSLVPN_USER_LOGINFAILED

Message text

User [STRING] of gateway [STRING] failed to log in from [STRING]. Reason: [STRING].

Variable fields

$1: Username.

$2: SSL VPN gateway name.

$3: User IP address.

$4: Reason for the login failure:

·     Authentication failed.

·     Authorization failed, reason: the authorizing process has failed.

·     Accounting failed, reason: the accounting process has failed.

·     Number of online users exceeded the limit.

·     Failed to get SMS message code from iMC server.

·     Maximum number of concurrent online connections for the user already reached.

·     Login timed out.

·     The authentication server is not reachable.

·     The authorization server is not reachable.

·     The accounting server is not reachable.

·     Authentication failed, reason: incorrect username or password or an internal error has occurred on the authentication server.

·     Authentication failed, reason: internal system error.

·     Authorization failed, reason: internal system error.

·     Accounting failed, reason: internal system error.

·     Authentication failed, reason: The account expires

·     Other.

Severity level

5 (Notification)

Example

SSLVPN/5/SSLVPN_USER_LOGINFAILED: User abc of gateway ctx failed to log in from 192.168.200.31.

Impact

The user failed to log in to the SSL VPN gateway.

Cause

The user failed to log in to the SSL VPN gateway.

Recommended action

Troubleshoot the issue based on the displayed failure cause.

 

SSLVPN_USER_LOGOUT

Message text

User [STRING] of gateway [STRING] logged out from [STRING]. Reason: [STRING].

Variable fields

$1: Username.

$2: SSL VPN gateway name.

$3: User IP address.

$4: Reason for user logout:

·     Idle timeout.

·     A logout request was received from the Web browser.

·     A logout request was received from the client.

·     Forced logout.

·     A new login was attempted and logins using the account reach the maximum.

·     Accounting update failed.

·     Accounting session timed out.

·     Interface went down.

·     ADM request was received.

·     Idle cut for traffic not reach the minimum required amount.

Severity level

5 (Notification)

Example

SSLVPN/5/SSLVPN_USER_LOGOUT: User abc of gateway ctx logged out from 192.168.200.31. Reason: A logout request was received from the Web browser.

Impact

No negative impact on the system.

Cause

The user logged out of an SSL VPN gateway.

Recommended action

Troubleshoot the issue based on the displayed cause.

 

SSLVPN_USER_NUMBER

Message text

The number of SSL VPN users reached the upper limit.

Variable fields

None.

Severity level

6 (Informational)

Example

SSLVPN/6/SSLVPN_USER_NUMBER: The number of SSL VPN users reached the upper limit.

Impact

No negative impact on the system.

Cause

The number of SSL VPN users reached the upper limit.

Recommended action

No action is required.

 

STAMGR messages

This section contains station management messages.

STAMGR_ADD_FAILVLAN

Message text

-SSID=[STRING]-UserMAC=[STRING]-APName=[STRING]-RadioID=[STRING]; Added a user to the Fail VLAN [STRING].

Variable fields

$1: SSID.

$2: MAC address of the client.

$3: Name of the AP associated with the client.

$4: ID of the radio associated with the client.

$5: ID of the Fail VLAN.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_ADD_FAILVLAN:-SSID=text-wifi-UserMAC=3ce5-a616-28cd-APName=ap1-RadioID=2; Added a user to the Fail VLAN 5.

Impact

No negative impact on the system.

Cause

The client failed to pass the authentication and was assigned to the Auth-Fail VLAN. The notification is not available for 802.1X.

Recommended action

No action is required.

 

STAMGR_AUTHORACL_FAILURE

Message text

-SSID=[STRING]-UserMAC=[STRING]-APName=[STRING]-RadioID=[STRING]; Failed to assign an ACL [STRING]. Reason: [STRING].

Variable fields

$1: SSID.

$2: MAC address of the client.

$3: Name of the AP associated with the client.

$4: ID of the radio associated with the client.

$5: ACL number.

$6: Reason:

·     The ACL doesn't exist.

·     This type of ACL is not supported.

·     The memory resource is not enough.

·     The ACL conflicts with other ACLs.

·     The ACL doesn't contain any rules.

·     The OpenFlow tunnel was not established.

·     The OpenFlow table is full.

·     Unknown reason. Error code code was returned.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_AUTHORACL_FAILURE:-SSID=text-wifi-UserMAC=3ce5-a616-28cd-APName=ap1-RadioID=2; Failed to assign an ACL 2000. Reason: The ACL doesn’t exist.

Impact

You cannot authorize the specified ACL rule.

Cause

See xxx.

Recommended action

·     Modify the ACL configuration based on the failure reason displayed.

·     If the memory is insufficient, release memory resources. For example, execute the logfile save command to manually save the content in the log file cache to the log file to release the memory resources in the cache, and then execute the display memory command to view the memory usage.

¡     If the memory usage is still above the threshold, execute the display process command to view the memory usage of user-space processes. If a process uses a lot of memory, you can enable or disable the corresponding software feature to free up memory.

¡     If the memory usage drops below the alarm threshold, the alarm is cleared, and the TCL monitor policy continues to take effect. No other action is required.

·     If the issue persists, collect alarm and configuration information, and contact Technical Support.

 

STAMGR_AUTHORUSERPROFILE_FAILURE

Message text

-SSID=[STRING]-UserMAC=[STRING]-APName=[STRING]-RadioID=[STRING]; Failed to assign user profile [STRING]. Reason: [STRING].

Variable fields

$1: SSID.

$2: MAC address of the client.

$3: Name of the AP associated with the client.

$4: ID of the radio associated with the client.

$5: Name of the authorization user profile.

$6: Failure cause:

·     The user profile doesn’t exist.

·     No user profiles are created on the device.

·     The memory resource is not enough.

·     The OpenFlow tunnel was not established.

·     Unknown reason. Error code code was returned.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_AUTHORUSERPROFILE_FAILURE: -SSID=1

-UserMAC=429f-ea7d-ac12-APName=ap1-RadioID=1; Failed to assign a user profile h.Reason: The user profile doesn't exist.

Impact

You cannot authorize the specified user profile.

Cause

See xxx.

Recommended action

·     Modify the user profile configuration based on the failure reason displayed.

·     If the memory is insufficient, release memory resources. For example, execute the logfile save command to manually save the content in the log file cache to the log file to release the memory resources in the cache, and then execute the display memory command to view the memory usage.

¡     If the memory usage is still above the threshold, execute the display process command to view the memory usage of user-space processes. If a process uses a lot of memory, you can enable or disable the corresponding software feature to free up memory.

¡     If the memory usage drops below the alarm threshold, the alarm is cleared, and the TCL monitor policy continues to take effect. No other action is required.

·     If the issue persists, collect alarm and configuration information, and contact Technical Support.

 

STAMGR_BSS_FAILURE

Message text

-APID=[STRING]-RadioID=[STRING]-WLANID=[STRING]-ST Name=[STRING]; The number of BSSs exceeded the upper limit.

Variable fields

$1: AP ID.

$2: Radio ID.

$3: WLAN ID.

$4: Service template name.

Severity level

6 (Informational)

Example

STAMGR/6/SERVICE_BSS_FAILURE: -APID=1-RadioID=2-WLANID=3-ST Name=1; The number of BSSs exceeded the upper limit.

Impact

New BSSs cannot be created.

Cause

A large number of APs join the group, causing the number of BSSs exceeding the upper limit.

Recommended action

Delete unnecessary BSSs.

 

STAMGR_CLEINT_BSS_MAXCOUNT

Message text

SSID=[STRING]-APName=[STRING]-RadioID=[STRING]; Number of associated clients reached the upper limit allowed by the BSS.

Variable fields

$1: SSID defined in the service template.

$2: Name of the AP associated with the client.

$3: ID of the radio associated with the client.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_CLIENT_BSS_MAXCOUNT: SSID=test-wifi-APName=ap1-RadioID=2; Number of associated clients reached the upper limit allowed by the BSS.

Impact

New clients cannot access the wireless service.

Cause

The number of associated clients reached the upper limit allowed by the BSS.

Recommended action

Create a new BSS.

 

STAMGR_CLIENT_FAILURE

Message text

Client [STRING] failed to come online from BSS [STRING] with SSID [STRING] on AP [STRING] Radio ID [STRING]. Reason: [STRING].

Variable fields

$1: MAC address of the client.

$2: BSSID.

$3: SSID defined in the service template.

$4: Name of the AP associated with the client.

$5: ID of the radio associated with the client.

$6: Reasons for the client's failure to come online. Table 13 describes the possible reasons.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_CLIENT_FAILURE: Client 3303-c2af-b8d2 failed to come online from BSS 0023-12ef-78dc with SSID 1 on AP ap1 Radio ID 1. Reason: Unknown reason.

Impact

Clients cannot access or use the wireless network.

Cause

See Table 13.

Recommended action

To resolve the issue:

1.     Select the processing method based on the failure reason. For more information, see Table 13.

2.     If the issue persists, collect alarm, log, and configuration information, and contact Technical Support

 

Table 13 Possible failure reasons

Possible reasons

Recommended action

Unknown error.

No action is required.

Failed to process open authentication packet from the client.

Examine the open-system authentication configuration.

Failed to send responses when the AC successfully processed open authentication packet from the client.

Examine the open-system authentication configuration.

Failed to create state timer when the AC received authentication packet in Unauth state.

No action is required.

Failed to refresh state timer when the AC received authentication packet in Unauth state.

No action is required.

Received association packet Unauth state.

No action is required.

Received deauthentication packet with reason code code in Unauth state:

·     1: Unknown reason.

·     3: Client is removed from BSS and is deauthenticated.

·     6: Incorrect frame.

·     9: Received association or reassociation request before authentication is complete.

·     13: Invalid IE.

No action is required.

Received dissociation packet with reason code code in Unauth state:

·     1: Unknown reason.

·     2: Prior authentication is invalid.

·     4: Inactivity timer expired.

·     5: Insufficient resources.

·     7: Incorrect frame.

·     8: Client is removed from BSS and is disassociated.

·     10: Failed to negotiate the Power Capability IE.

·     11: BSS management switchover.

No action is required.

Received Auth failure packet in Unauth state.

No action is required.

Received state timer timeout in Unauth state.

No action is required.

Received deauthentication packet with reason code code in Auth state:

·     1: Unknown reason.

·     3: Client is removed from BSS and is deauthenticated.

·     6: Incorrect frame.

·     9: Received association or reassociation request before authentication is complete.

·     13: Invalid IE.

No action is required.

Received authentication packet with inconsistent authentication algorithm or shared key in Auth state.

No action is required.

Received state timer timeout in Auth state.

No action is required.

Failed to process Add Mobile message when client association succeeded in Auth state.

No action is required.

Received inconsistent authentication algorithm or share key in Userauth state.

No action is required.

Failed to check association request when the AC received association packet in Userauth state.

No action is required.

Failed to process IE when the AC received association packet in Userauth state.

No action is required.

Failed to send association responses when the AC received association packet in Userauth state.

No action is required.

Failed to process Add Mobile message when client association succeeded in Userauth state.

No action is required.

Received deauthentication packet with reason code code in Userauth state:

·     1: Unknown reason.

·     3: Client is removed from BSS and is deauthenticated.

·     6: Incorrect frame.

·     9: Received association or reassociation request before authentication is complete.

·     13: Invalid IE.

No action is required.

Received dissociation packet with reason code code in Userauth state:

·     1: Unknown reason.

·     2: Prior authentication is invalid.

·     4: Inactivity timer expired.

·     5: Insufficient resources.

·     7: Incorrect frame.

·     8: Client is removed from BSS and is disassociated.

·     10: Failed to negotiate the Power Capability IE.

·     11: BSS management switchover.

No action is required.

Client authentication failed in Userauth state.

No action is required.

Failed to get backup client data while using AP private data to upgrade client.

No action is required.

Failed to set kernel forwarding table while using AP private data to upgrade client.

No action is required.

Failed to add MAC while using AP private data to upgrade client.

No action is required.

Failed to create keepalive and idle timeout timers while using AP private data to upgrade client.

No action is required.

Failed to set kernel forwarding table while upgrading client without using AP private data.

No action is required.

Failed to add MAC while upgrading client without using AP private data.

No action is required.

Failed to activate client while upgrading client without using AP private data.

No action is required.

Failed to synchronize client information to configuration thread while upgrading client without using AP private data.

No action is required.

Failed to create keepalive and idle timeout timers while upgrading client without using AP private data.

No action is required.

Failed to add MAC during inter-device client smooth creation.

No action is required.

Failed to set kernel forwarding table during inter-device client smooth creation.

No action is required.

Failed to send Add Mobile message during inter-device client smooth creation.

No action is required.

Failed to get AP type during inter-device client smooth creation.

No action is required.

Failed to recover service data while recovering running client data from database.

No action is required.

Failed to synchronize data to service thread while recovering basic client data from database.

No action is required.

Failed to add MAC when hierarchy device received upstream Add Mobile message.

No action is required.

Failed to set kernel forwarding table when hierarchy device received upstream Add Mobile message.

No action is required.

Failed to synchronize upstream message when hierarchy device received upstream Add Mobile message.

No action is required.

Failed to create client when hierarchy device received upstream Add Mobile message.

No action is required.

Failed to add MAC when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to synchronize data to service thread when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to set kernel forwarding table when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to send down add pbss to driver when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to synchronize downstream message when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to create client when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to create interval statistics timer when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to obtain AP private data when hierarchy device received downstream Add Mobile message.

No action is required.

Failed to advertise Add Mobile message.

No action is required.

Failed to activate client when hierarchy device received downstream client state synchronization message.

No action is required.

Failed to get AP type when hierarchy device received downstream client state synchronization message.

No action is required.

Failed to synchronize downstream message when hierarchy device received downstream client state synchronization message.

No action is required.

The radio was in down state when hierarchy device received downstream Add Mobile message.

No action is required.

Hierarchy device failed to process the upstream Add Mobile message.

No action is required.

Hierarchy device failed to process downstream Add Mobile message.

No action is required.

Failed to process service thread during inter-device client smooth creation.

No action is required.

Failed to create client when inter-device smooth.

No action is required.

Failed to process upstream client state synchronization message in Userauth state.

No action is required.

Failed to process downstream client state synchronization message in Userauth state.

No action is required.

Hierarchy device failed to process upstream client state synchronization message.

No action is required.

Hierarchy device failed to process downstream client state synchronization message.

No action is required.

AC received message for deleting the client entry.

No action is required.

Fit AP received message for deleting the client.

No action is required.

Different old and new region codes.

Examine the region code configuration.

Failed to update IGTK.

No action is required.

Failed to update GTK.

No action is required.

Failed to generate IGTK when the first client came online.

No action is required.

TKIP is used to authenticate all clients.

No action is required.

Channel changed.

No action is required.

BssDelAllSta event logged off client normally.

No action is required.

AP down.

Connect the client to an online AP.

Radio down.

Connect the client to an enabled radio.

Service template disabled.

Make the client come online from an enabled service template.

Service template unbound.

Bind the wireless service again.

Created BSS during masterAC switchover process.

No action is required.

Updated BSS base information when BSS was in deactive state.

No action is required.

Intrusion protection.

No action is required.

Local AC or AP deleted BSS

No action is required.

BssDelAllSta event logged off client abnormally.

No action is required.

Received VLAN deleted event.

Connect the client to a VLAN that is in use.

CM received message for logging off client from AM.

No action is required.

The reset wlan client command was executed to log off the client.

No action is required.

Deleted private data on AP: DBM database recovered

No action is required.

Failed to synchronize authentication succeeded message downstream.

No action is required.

Client RSSI was lower than the threshold and was decreasing.

No action is required.

Configured whitelist for the first time or executed the reset wlan client all command

No action is required.

Received client offline websocket message

No action is required.

WMAC logged off all clients associated with the radio.

No action is required.

Timer for sending deassociation message timed out.

No action is required.

The client is in blacklist or deleted from whitelist.

Examine the allowlist or denylist configuration.

Client was added to the dynamic blacklist.

Examine the denylist configuration.

Failed to roam out.

Examine the roaming configuration.

Implemented inter-AC roaming for the first time.

No action is required.

Successfully roamed to another BSS.

No action is required.

Failed to roam in.

Examine the roaming configuration.

Roaming process received a message for logging off the client.

No action is required.

Roaming process processed Down event and logged off roam-in clients.

No action is required.

Roaming failure.

Examine the roaming configuration.

Successfully performed roaming but failed to recover authentication data.

No action is required.

Roaming timed out.

Examine the roaming configuration.

Seamless roaming failed.

Examine the roaming configuration.

Logged off clients that performed inter- or intra-AC roaming.

No action is required.

Failed to process AccessCtrlChk. Configure permitted AP group or permitted SSID.

No action is required.

Synchronized client information to process and logged off client.

No action is required.

Failed to synchronize client state to uplinkdevices.

No action is required.

Local AC or remote AP received Add Mobile message updated BSS and logged off clients.

No action is required.

Upgraded HA and logged off all clients.

No action is required.

Synchronized BSS data during master/backup AC switchover process.

No action is required.

Failed to synchronize service template data during master/backup AC switchover process.

No action is required.

BSS aging timer timed out.

No action is required.

Remote AP deleted non-local forwarding BSS.

No action is required.

Failed to find configuration data when synchronizing data.

No action is required.

BSS was deleted: BSS synchronization examination failed or there was no BSS data to be updated.

No action is required.

Failed to get BSS by using WLAN ID.

Examine the VLAN configuration for the wireless service.

Unbound inherited service template.

No action is required.

STAMGR process was down automatically or manually.

No action is required.

Deleted redundant clients.

No action is required.

Failed to process authorized doing nodes.

No action is required.

Authorization failed.

Examine the authorization configuration.

NSS value in Operating Mode Notification Action packet doesn't support mandatory VHT-MCS.

No action is required.

Number of sent SA requests exceeded the permitted threshold.

No action is required.

Number of associated clients exceed the upper limit allowed by the AP.

No action is required.

Number of associated clients exceed the upper limit allowed by the AC.

No action is required.

Number of associated clients exceed the upper limit allowed by channel usage.

No action is required.

Deauthenticated by WIPS countermeasure.

No action is required.

Local AC came online again and deleted all clients associated with the BSS.

No action is required.

Failed to upgrade hot-backup.

No action is required.

The illegally created BSS was deleted.

No action is required.

Failed to process requests when receiving UserAuth Success message.

No action is required.

Failed to get AP type when receiving UserAuth Successful message.

No action is required.

Failed to notify client of the recovery of basic client data from database.

No action is required.

Failed to recover basic client data from database.

No action is required.

Client already existed when the AC received Auth packet from the client and checked online clients.

No action is required.

Client already existed during FT Over-the-DS authentication.

No action is required.

SKA authentication failed.

No action is required.

Deadline timer timed out during FT authentication.

No action is required.

Failed to send the response for the successful shared key authentication to the client.

No action is required.

Failed to get FT data during FT authentication.

No action is required.

FT authentication was performed and BSS does not support FT.

Change the FT authentication method.

Failed to process FT authentication-success result.

No action is required.

Failed to process FT authentication.

Examine the FT authentication configuration.

Maximum number of clients already reached when remote request message was received.

No action is required.

Failed to fill authorization information while processing authorization message.

No action is required.

Failed to process key negotiation during 802.1X authentication.

No action is required.

Invalid session key length during 802.1X authentication.

No action is required.

802.1X authentication failed.

Examine the 802.1X authentication configuration.

802.1X server was unreachable.

Verify that the device and the 802.1X authentication server can reach each other.

User timer timed out during 802.1X authentication.

No action is required.

Server timer timed out during 802.1X authentication.

Verify that the device and the 802.1X authentication server can reach each other.

802.1X authentication configuration error.

Examine the device and 802.1X authentication configuration.

Received nonexistent authorization VLAN group during 802.1X authentication.

Examine the authorization VLAN group configuration.

MAC authentication failed.

Examine the MAC authentication configuration.

MAC server was unreachable.

Verify that the device and the MAC authentication server can reach each other.

Session time is zero during MAC authentication.

No action is required.

Server timer timed out during MAC authentication.

Verify that the device and the MAC authentication server can reach each other.

802.1X authentication failed and the return code is code.

Examine the 802.1X authentication configuration.

MAC authentication failed and the return code is code.

Examine the MAC authentication configuration.

Authorization failed for 802.1X authentication and the return code is code.

Examine the authorization configuration for 802.1X authentication.

Authorization failed for MAC authentication and the return code is code.

Examine the authorization configuration for MAC authentication.

Accounting start failed for 802.1X authentication and the return code is code.

Examine the accounting configuration for 802.1X authentication.

Accounting start failed for MAC authentication and the return code is code.

Examine the accounting configuration for MAC authentication.

Accounting update failed for 802.1X authentication and the return code is code.

Examine the accounting configuration for 802.1X authentication.

Accounting update failed for MAC authentication and the return code is code.

Examine the accounting configuration for MAC authentication.

Failed to receive client EAP request for 802.1X authentication.

No action is required.

Failed to receive server response for 802.1X authentication.

No action is required.

Failed to receive server response for MAC authentication.

No action is required.

Received client log-off packet during 802.1X authentication.

No action is required.

802.1X client handshake failed.

No action is required.

Incorrect 802.1X authentication method.

Reconfigure the 802.1X authentication method.

WLAN roaming center notified IP conflict detected by address security check.

Examine and delete the conflicting client.

WLAN roaming center notified MAC conflict detected by address security check.

Examine and delete the conflicting client.

Roaming failed because the user is in the local address security denylist.

No action is required.

Failed to notify the uplink device of user authentication failure.

No action is required.

Failed to advertise Add Mobile message: CAPWAP translation failure.

No action is required.

Failed to advertise Add Mobile message: Invalid length.

No action is required.

Failed to advertise Add Mobile message: Radio down.

No action is required.

Failed to advertise Add Mobile message: Insufficient memory on the downlink device.

No action is required.

Failed to advertise Add Mobile message: MAC adding failure.

No action is required.

Failed to advertise Add Mobile message: AVL adding failure.

No action is required.

Failed to advertise Add Mobile message: PBSS adding failure.

No action is required.

Failed to advertise Add Mobile message: Downlink synchronization failure.

No action is required.

Failed to advertise Add Mobile message: Statistics report timer creation failure.

No action is required.

Failed to advertise Add Mobile message: AP private data obtaining failure.

No action is required.

Failed to advertise Add Mobile message: Client not found for Add Mobile response.

No action is required.

Failed to advertise Add Mobile message: Client was being deleted for Add Mobile response.

No action is required.

Failed to advertise Add Mobile message: Insufficient memory in kernel.

No action is required.

Failed to advertise Add Mobile message: Forward entry adding failure.

No action is required.

Failed to advertise Add Mobile message: PHY obtaining failure.

No action is required.

Failed to advertise Add Mobile message: Invalid length in kernel.

No action is required.

Failed to advertise Add Mobile message: Client adding failure in driver.

No action is required.

Failed to advertise Add Mobile message: Preamble type setting failure in driver.

No action is required.

Failed to advertise Add Mobile message: Dot11g protection setting failure in driver.

No action is required.

Failed to advertise Add Mobile message: PTK setting failure in driver.

No action is required.

Failed to advertise Add Mobile message: PTK flag update failure.

No action is required.

The client does not match a permit ACL rule.

No action is required.

The client is in the dynamic blacklist.

No action is required.

The client is in the static blacklist.

No action is required.

The client is not in the whitelist.

No action is required.

The number of clients exceed the maximum allowed value of radio

Connect the client to another radio.

The number of clients exceed the maximum allowed value of BSS

Connect the client to another wireless service.

 

STAMGR_CLIENT_OFFLINE

Message text

Client [STRING] went offline from BSS [STRING] with SSID [STRING] on AP [STRING] Radio ID [STRING]. State changed to Unauth. Reason [STRING]

Variable fields

$1: MAC address of the client.

$2: BSSID.

$3: SSID defined in the service template.

$4: Name of the AP associated with the client.

$5: ID of the radio associated with the client.

$6: Reason why the client goes offline. Table 14 describes the possible reasons.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_CLIENT_OFFLINE: Client 0023-8933-2147 went offline from BSS 0023-12ef-78dc with SSID abc on AP ap1 Radio ID 2. State changed to Unauth. Reason: Radio down.

Impact

No negative impact on the system.

Cause

The client went offline from the BSS for a specific reason. The state of the client changed to Unauth.

Recommended action

To resolve the issue:

1.     Examine whether the AP and its radios operate correctly if the client went offline abnormally. If the logoff was requested by the client, no action is required.

2.     If they do not operate correctly, check the debugging information to locate the issue and resolve it.

3.     If the issue persists, contact H3C Support.

 

Table 14 Possible logoff reasons

Possible reasons

Recommended action

Received disassociation frame in Run state: reason code=String.

No action is required.

Unknown reason.

No action is required.

AC received message for deleting the client entry.

No action is required.

Different old and new region codes.

Examine the region code configuration.

Failed to update IGTK.

No action is required.

Failed to update GTK.

No action is required.

Failed to generate IGTK when the first client came online.

No action is required.

TKIP is used to authenticate all clients.

No action is required.

Channel changed.

No action is required.

BssDelAllSta event logged off client normally.

No action is required.

Radio down.

Connect the client to an enabled radio.

Service template disabled.

Make the client come online from an enabled service template.

Service template unbound.

Rebind the service template.

Created BSS during master/backup AC switchover process.

No action is required.

Updated BSS base information when BSS was in deactive state.

No action is required.

Intrusion protection.

Verify if illegal clients that have not been authenticated exist.

Local AC or AP deleted BSS.

No action is required.

BssDelAllSta event logged off client abnormally.

No action is required.

Received VLAN deleted event.

No action is required.

CM received message for logging off client from AM.

No action is required.

The reset wlan client command was executed to log off the client.

No action is required.

DBM database failed to recover client operation data.

No action is required.

Deleted private data on AP: DBM database recovered.

No action is required.

Received deauthentication frame in Run state: reason code=String.

No action is required.

Failed to process (re)association request in Run state.

No action is required.

Unmatched authentication algorithm in received authentication message.

No action is required.

Idle timer timeout.

No action is required.

Keepalive timer timeout.

No action is required.

Received authentication failure message.

No action is required.

Deauthenticated by WIPS countermeasure in Run state.

No action is required.

Failed to synchronize authentication succeeded message downstream.

No action is required.

Client RSSI was lower than the threshold and was marked as decreasing.

No action is required.

Configured whitelist for the first time or executed the reset wlan client all command.

No action is required.

Received client offline websocket message.

No action is required.

WMAC logged off all clients associated with the radio.

No action is required.

Timer for sending disassociation message timed out.

No action is required.

The client is in blacklist or deleted from whitelist.

Examine the allowlist or denylist configuration.

Client was added to the dynamic blacklist.

Examine the denylist configuration.

Failed to roam out.

Examine the roaming configuration.

Implemented inter-AC roaming for the first time.

No action is required.

Successfully roamed to another BSS.

No action is required.

Failed to roam in.

No action is required.

Roaming process received a message for logging off the client.

No action is required.

Roaming process processed Down event and logged off roam-in clients.

No action is required.

Roaming failure.

No action is required.

Successfully performed roaming but failed to recover authentication data.

No action is required.

Roaming timed out.

No action is required.

Seamless roaming failed.

No action is required.

Logged off clients that performed inter- or intra-AC roaming.

No action is required.

Failed to process AccessCtrlChk when configured permitted AP group or permitted SSID.

No action is required.

Synchronized client information to process and logged off client in Run state.

No action is required.

Failed to synchronize client state to uplink/downlink devices.

No action is required.

Local AC or remote AP received add mobile message, updated BSS, and logged off clients in Run state.

No action is required.

Upgraded HA and logged off all clients.

No action is required.

Synchronized BSS data during master/backup AC switchover process.

No action is required.

Failed to synchronize service template data during master/backup AC switchover process.

No action is required.

BSS aging timer timed out.

No action is required.

Remote AP deleted non-local forwarding BSS.

No action is required.

Failed to find configuration data when synchronizing data.

No action is required.

BSS was deleted: BSS synchronization examination failed or there was no BSS data to be updated.

No action is required.

Failed to get BSS by using WLAN ID.

No action is required.

Unbound inherited service template.

No action is required.

STAMGR process was down automatically or manually.

No action is required.

Deleted redundant clients.

No action is required.

Failed to process authorized doing nodes.

No action is required.

Authorization failed.

Examine the authorization configuration.

NSS value in Operating Mode Notification Action packet doesn't support mandatory VHT-MCS.

No action is required.

Number of sent SA requests exceeded the permitted threshold.

No action is required.

Fit AP received message for deleting the client.

No action is required.

Local AC came online again and deleted all clients associated with the BSS.

No action is required.

Failed to upgrade hot backup.

No action is required.

The illegally created BSS was deleted.

No action is required.

Failed to process requests when receiving UserAuth Success message.

No action is required.

Failed to get AP type when receiving UserAuth Success message.

No action is required.

The client doesn't support mandatory rate.

Change the radio type or connect the client to another radio.

Disabled access services for 802.11b clients.

Enable access services for 802.11b clients.

The client doesn't support mandatory VHT-MCS.

Change the radio type.

Enabled the client dot11ac-only feature.

Disable the client dot11ac-only feature.

Disabled MUTxBF.

Enable MU-TxBF.

Disabled SUTxBF.

Enable SU-TxBF.

The client doesn't support mandatory MCS.

No action is required.

Channel bandwidth changed.

No action is required.

Enabled the client dot11n-only feature.

Disable the client dot11n-only feature.

Disabled short GI.

Enable Short-GI.

Disabled the A-MPDU aggregation method.

Enable A-MPDU.

Disabled the A-MSDU aggregation method.

Enable A-MSDU.

Disabled STBC.

Enable STBC.

Disabled LDPC.

Enable LDPC.

The MIMO capacity decreased, and the MCS supported by the AP can't satisfy the client's negotiated MCS.

Change the MIMO mode to allow more spatial streams.

The MIMO capacity decreased, and the VHT-MCS supported by the AP can't satisfy the client's negotiated VHT-MCS.

Change the MIMO mode to allow more spatial streams.

Hybrid capacity increased, which kicked off clients associated with other radios with lower Hybrid capacity.

No action is required.

Failed to add MAC address.

No action is required.

The roaming entry doesn't exist while the AC was processing the roaming request during client smooth reconnection.

No action is required.

Home AC processed the move out response message to update the roaming entry and notified the foreign AC to force the client offline during an inter-AC roaming.

No action is required.

The associated AC left from the mobility group and deleted roam-in entries and roaming entries of the client.

No action is required.

Executed the reset wlan mobility roaming command.

No action is required.

Kicked client because of roaming to another bssid.

No action is required.

The roaming entry doesn't exist while the AC was processing the Add Preroam message during client smooth reconnection.

No action is required.

Deleted roaming entries of clients in the fail VLAN while processing a fail VLAN delete event.

No action is required.

Deleted the roaming entry of the client while processing a client delete event.

No action is required.

Moving to another SSID on the same radio.

No action is required.

Fail-permit activated and clients are logged off.

No action is required.

Fail-permit deactivated and clients are logged off.

No action is required.

AP triggered (idle timeout).

No action is required.

AP triggered (channel change).

No action is required.

AP triggered (bandwidth change).

No action is required.

Received log-off packet from 802.1X authentication client.

No action is required.

802.1X client handshake failed.

No action is required.

Accounting update timed out for the 802.1X authentication client.

Examine the accounting configuration for 802.1X authentication.

Accounting update timed out for the MAC authentication client.

Examine the accounting configuration for MAC authentication.

802.1X authentication client idle cut on AP.

No action is required.

MAC authentication client idle cut on AP.

No action is required.

Session timeout timer expired for the 802.1X authentication client.

No action is required.

Session timeout timer expired for the MAC authentication client.

No action is required.

Received client disassociation message from server for the 802.1X authentication client.

No action is required.

Received client disassociation message from server for the MAC authentication client.

No action is required.

Received nonexistent authorization VLAN group for the 802.1X authentication client.

Examine the authorization VLAN group configuration for 802.1X authentication.

Received nonexistent authorization VLAN group for the MAC authentication client.

Examine the authorization VLAN group configuration for MAC authentication.

Total client traffic failed to reach the minimum traffic threshold.

No action is required.

Failed to obtain the client IP address before the accounting delay timer expired.

No action is required.

Forced client disassociation because of rate limit issued by DingTalk app.

No action is required.

Logged off client because the EoGRE tunnel went down.

Examine the EoGRE tunnel configuration.

IP conflict detected by address security check.

Examine the EoGRE tunnel configuration.

MAC conflict detected by address security check.

Examine and delete the conflicting client.

WLAN roaming center notified IP conflict detected by address security check.

Examine and delete the conflicting client.

WLAN roaming center notified MAC conflict detected by address security check.

Examine and delete the conflicting client.

Roaming failed because the user is in the local address security denylist.

No action is required.

Failed to notify the uplink device of user authentication failure.

No action is required.

The client does not match a permit ACL rule.

No action is required.

The client is in the dynamic blacklist.

No action is required.

The client is in the static blacklist.

No action is required.

The client is not in the whitelist.

No action is required.

Client supporting BTM roamed to another BSS (Count: Count) successfully.

No action is required.

Client not supporting BTM roamed to another BSS (Count: Count) successfully.

No action is required.

Client supporting BTM was navigated to 5GHz radio from 2.4GHz radio on the same AP (BTM requests: Count).

No action is required.

Portal logged off the client after the client passed authentication.

No action is required.

AP triggered client disassociation.

No action is required.

Client connected to another BSSID.

No action is required.

Received disconnecion-request frame from server for the 802.1X or MAC authentication client.

No action is required.

IP address conflict detected by AC.

No action is required.

Received eapol-logoff frame.

No action is required.

Received eapol-logoff frame during 802.1X authentication.

No action is required.

Previous online user entry removed by clear-previous-connection.

No action is required.

Client IP change triggered accounting restart.

No action is required.

Session timed out for the 802.1X or MAC authentication client.

No action is required.

Fast keepalive failed.

No action is required.

 

STAMGR_CLIENT_ONLINE

Message text

Client [STRING] went online from BSS [STRING] vlan [STRING] with SSID [STRING] on AP [STRING] Radio ID [STRING]. State changed to Run.

Variable fields

$1: MAC address of the client.

$2: BSSID.

$3: ID of the VLAN in which the client came online.

$4: SSID defined in the service template.

$5: Name of the AP associated with the client.

$6: ID of the radio associated with the client.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_CLIENT_ONLINE: Client 0023-8933-2147 went online from BSS 0023-12ef-78dc vlan 1 with SSID abc on AP ap1 Radio ID 2. State changed to Run.

Impact

No negative impact on the system.

Cause

The client came online from the BSS. The state of the client changed to Run.

Recommended action

No action is required.

 

STAMGR_CLEINT_RADIO_MAXCOUNT

Message text

APName=[STRING]-RadioID=[STRING]; Number of associated clients reached the upper limit allowed by the radio.

Variable fields

$1: Name of the AP associated with the client.

$2: ID of the radio associated with the client.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_CLIENT_RADIO_MAXCOUNT: APName=ap1-RadioID=2; Number of associated clients reached the upper limit allowed by the radio.

Impact

New clients cannot connect to the radio.

Cause

The number of associated clients reached the upper limit allowed by the radio.

Recommended action

Enable more radios for clients to come online from other radios.

 

STAMGR_CLIENT_SNOOPING

Message text

Detected client IP change: Client MAC: [SRTING], IP: [STRING], [STRING], [STRING], Username: [STRING], AP name: [STRING], Radio ID [UCHAR], Channel number: [UINT32], SSID: [STRING], BSSID: [STRING].

Variable fields

$1: MAC address of the client.

$2: Current IP address of the client.

$3: Used IP address of the client.

$4: Used IP address of the client.

$5: Username of the client.

$6: Name of the AP associated with the client.

$7: ID of the radio associated with the client.

$8: ID of the channel used by the client.

$9: SSID of the service template associated with the client.

$10: BSSID of the service template associated with the client.

Severity level

6 (Informational)

Example

STAMGR_CLIENT_SNOOPING: Detected client IP change: Client MAC: 31ac-11ea-17ff,IP: 4.4.4.4, IP: 1.1.1.1, IP: 2.2.2.2, IP: -NA-, User name: test, AP name: ap1, Radio ID: 1, Channel number: 161,SSID: 123, BSSID: 25c8-3dd5-261a.

Impact

No negative impact on the system.

Cause

IP change was detected for a specific client.

Recommended action

No action is required.

 

STAMGR_ESCAPE_ACTIVE

Message text

The fail-permit mode was activated on radio [STRING] bound with service template [STRING] and SSID [STRING] in BSS [STRING]. Reason: [STRING].

Variable fields

$1: Radio ID.

$2: Service template name.

$3: SSID.

$4: BSSID.

$5: Reason why the fail-permit mode was activated. Options include:

¡     Unreachable domain—The RADIUS server cannot be reached.

¡     AP disconnected from the AC.

Severity level

4 (Warning)

Example

STAMGR/4/STAMGR_ESCAPE_ACTIVE: The fail-permit mode was activated on radio 1 bound with service template st1 and SSID st1ssid in BSS 0023-12ef-78dc. Reason: AP disconnected from AC.

Impact

The AC disconnects from the RADIUS server or disconnects from APs.

Cause

The configured fail-prmit mode was activated because the RADIUS server cannot be reached or the AP is disconnected from the AC.

Recommended action

To resolve the issue:

1.     Verify that the RADIUS server can be reached and the AP is connected to the AC correctly.

2.     If the issue persists, contact H3C Support.

 

STAMGR_ESCAPE_DEACTIVE

Message text

The fail-permit mode was deactivated on radio [STRING] bound with service template [STRING] and SSID [STRING] in BSS [STRING]. Reason: [STRING].

Variable fields

$1: Radio ID.

$2: Service template name.

$3: SSID.

$4: BSSID.

$5: Reason why the fail-permit mode was deactivated. Options include:

¡     Domain is reachable—Connection to the RADIUS server was restored.

¡     AP and AC connection restored.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_ESCAPE_DEACTIVE: The fail-permit mode was deactivated on radio 1 bound with service template st1 and SSID st1ssid in BSS 0023-12ef-78dc. Reason: AP and AC connection restored.

Impact

No negative impact on the system.

Cause

The configured fail-prmit mode was deactivated because connection to the RADIUS server or the AP and AC connection was restored.

Recommended action

No action is required.

 

STAMGR_DOMAIN_UNREACHABLE

Message text

Domain [STRING] configured in service template [STRING] with SSID [STRING] is unreachable.

Variable fields

$1: Domain name.

$2: Service template name.

$3: SSID.

Severity level

4 (Warning)

Example

STAMGR/4/STAMGR_DOMAIN_UNREACHABLE: Domain mydomain configured in service template st1 with SSID ssidst1 is unreachable.

Impact

The authentication service is unavailable.

Cause

The device disconnects from the RADIUS authentication server.

Recommended action

To resolve the issue:

1.     Verify that the RADIUS server can be reached.

2.     If the issue persists, contact H3C Support.

 

STAMGR_DOMAIN_REACHABLE

Message text

Domain [STRING] configured in service template [STRING] with SSID [STRING] is reachable.

Variable fields

$1: Domain name.

$2: Service template name.

$3: SSID.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_DOMAIN_REACHABLE: Domain mydomain configured in service template st1 with SSID ssidst1 is reachable.

Impact

No negative impact on the system.

Cause

Connection to the authentication domain configured in the service template restored.

Recommended action

No action is required.

 

STAMGR_MACA_LOGIN_FAILURE

Message text

-Username=[STRING]-UserMAC=[STRING]-SSID=[STRING]-APName=[STRING]-RadioID=[STRING]-VLANID=[STRING]-UsernameFormat=[STRING]; A user failed MAC authentication. Reason: [STRING].

Variable fields

$1: Username.

$2: MAC address of the client.

$3: SSID.

$4: Name of the AP associated with the client.

$5: ID of the radio associated with the client.

$6: VLAN ID.

$7: Username format:

·     fixed.

·     MAC address.

$8: Reason for the authentication failure:

·     AAA processed authentication request and returned error code code.

¡     4—Represents one of the following errors: nonexistent authentication domain, service type error, or incorrect username or password.

¡     8—Represents one of the following errors: no IP addresses are added to the authentication server, preshared keys configured on the authentication server are different from preshared keys configured on the device, or the authentication server and the device cannot reach each other.

¡     26—Configuration error exists in the authentication domain.

·     AAA processed authorization request and returned error code code.

¡     8—The authentication server and the device cannot reach each other.

·     Client timeout timer expired.

·     Received user security information and kicked off the client.

·     Accounting-update timer expired, and no responses were received from the server.

·     Kicked off the client when the idle timeout timer expired.

·     Authentication method error.

·     Kicked off the client because the server-assigned session timeout timer is 0.

·     Received session disconnection event.

·     Unknown reason.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_MACA_LOGIN_FAILURE:-Username=MAC-UserMAC=3ce5-a616-28cd-SSID=text-wifi-APName=ap1-RadioID=2-VLANID=11-UsernameFormat=fixed; A user failed MAC authentication. Reason: AAA processed authentication request and returned error code 8.

Impact

No negative impact on the system.

Cause

The client failed to pass MAC authentication for a specific reason.

Recommended action

To resolve the issue:

1.     Examine the network connection between the device and the AAA server.

2.     Verify that the AAA server works correctly.

3.     Verify that the AAA server is configured with the correct username and password.

4.     Troubleshoot errors one by one according to the returned error code during authentication.

5.     If the issue persists, contact H3C Support.

 

STAMGR_MACA_LOGIN_SUCC

Message text

-Username=[STRING]-UserMAC=[STRING]-SSID=[STRING]-APName=[STRING]-RadioID=[STRING]-VLANID=[STRING]-UsernameFormat=[STRING]; A user passed MAC authentication and came online.

Variable fields

$1: Username.

$2: MAC address of the client.

$3: SSID.

$4: Name of the AP associated with the client.

$5: ID of the radio associated with the client.

$6: VLAN ID.

$7: Username format:

·     fixed.

·     MAC address.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_MACA_LOGIN_SUCC:-Username=MAC-UserMAC=3ce5-a616-28cd-SSID=text-wifi-APName=ap1-RadioID=2-VLANID=11-UsernameFormat=fixed; A user passed MAC authentication and came online.

Impact

No negative impact on the system.

Cause

The client came online after passing MAC authentication.

Recommended action

No action is required.

 

STAMGR_MACA_LOGOFF

Message text

-Username=[STRING]-UserMAC=[STRING]-SSID=[STRING]-APName=[STRING]-RadioID=[STRING]-VLANID=[STRING]-UsernameFormat=[STRING]; Session for a MAC authentication user was terminated. Reason: [STRING].

Variable fields

$1: Username.

$2: MAC address of the client.

$3: SSID.

$4: Name of the AP associated with the client.

$5: ID of the radio associated with the client.

$6: VLAN ID.

$7: Username format:

·     fixed.

·     MAC address.

$8: Reason why the client is logged off.

·     AAA processed authentication request and returned error code code. Server reason: reason.

The reason field represents the reason returned from the server and is available only when the server returned a reason. Available error codes include:

¡     4—Represents one of the following errors: nonexistent authentication domain, service type error, or incorrect username or password.

¡     8—Represents one of the following errors: no IP addresses are added to the authentication server, preshared keys configured on the authentication server are different from preshared keys configured on the device, or the authentication server and the device cannot reach each other.

¡     26—Configuration error exists in the authentication domain.

·     AAA processed authorization request and returned error code code. Server reason: reason.

The reason field represents the reason returned from the server and is available only when the server returned a reason. Available error codes include:

¡     8—The authentication server and the device cannot reach each other.

·     AAA processed accounting-start request and returned error code code. Server reason: reason.

The reason field represents the reason returned from the server and is available only when the server returned a reason. Available error codes include:

¡     8—The authentication server and the device cannot reach each other.

·     AAA processed accounting-update request and returned error code code. Server reason: reason.

The reason field represents the reason returned from the server and is available only when the server returned a reason. Available error codes include:

¡     8—The authentication server and the device cannot reach each other.

·     Client timeout timer expired.

·     Received user security information and kicked off the client.

·     Lost in shaking hands.

·     Accounting-update timer expired, and no responses were received from the server.

·     Kicked off the client when the idle timeout timer expired.

·     Authentication method error.

·     Kicked off the client because the server-assigned session timeout timer is 0.

·     Received session disconnection event.

·     Received disassociation frame in Run state: reason code=code.

·     Received deauthentication frame in Run state: reason code=code.

·     Received disassociation packet in Userauth state.

·     Received deauthentication packet in Userauth state.

·     Received client failure message with reason code=code.

·     Received client offline message with reason code=code.

·     Unknown reason.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_MACA_LOGOFF:-Username=MAC-UserMAC=3ce5-a616-28cd-SSID=text-wifi-APName=ap1-RadioID=2-VLANID=11-UsernameFormat=fixed; Session for a MAC authentication user was terminated. Reason: Received user security information and kicked off the client.

Impact

No negative impact on the system.

Cause

The MAC authenticated client was logged off for a specific reason.

Recommended action

To resolve the issue:

1.     Check the debugging information to locate the logoff cause and remove the issue. If the logoff was requested by the client, no action is required.

2.     If the issue persists, contact H3C Support.

 

STAMGR_ROAM_FAILED

Message text

Client [MAC] on AP [STRING] Radio ID [STRING] failed to roam with reason code [UINT32].

Variable fields

$1: MAC address of the client.

$2: Name of the AP associated with the client.

$3: ID of the radio associated with the client.

$4: Reason code for the roaming failure:

·     1—Failed to select a roaming policy.

·     2—Insufficient memory resources.

·     3—Network communication failures.

·     4—Lack of local roaming entries.

·     5—Failed to add a VLAN.

Severity level

4 (Warning)

Example

STAMGR/4/STAMGR_ROAM_FAILED: Client 001f-3ca8-1092 on AP ap1 Radio ID 2 failed to roam with reason code 1.

Impact

No negative impact on the system.

Cause

The client failed to roam for a specific reason.

Recommended action

To resolve the issue, depending on the reason code:

·     1—Use the display wlan client verbose command to verify that the authentication method has changed.

·     2—Use the display process memory command to check memory resource usage for each module.

·     3—Use the display wlan mobility group command to check the IACTP tunnel state.

·     4—Use the display wlan mobility group command to check the IACTP tunnel state.

·     5—Re-add the VLAN or replace the added VLAN.

 

STAMGR_ROAM_SUCCESS

Message text

Client [MAC] roamed from BSSID [MAC] on AP [STRING] Radio ID [STRING] of AC IP [IPADDR] to BSSID [MAC] on AP [STRING] Radio ID [STRING] of AC IP [IPADDR] successfully.

Variable fields

$1: MAC address of the client.

$2: BSSID of the AP associated with the client before roaming.

$3: Name of the AP associated with the client before roaming.

$4: ID of the radio associated with the client before roaming.

$5: IP address of the AC associated with the client before roaming.

$6: BSSID of the AP associated with the client after roaming.

$7: Name of the AP associated with the client after roaming.

$8: ID of the radio associated with the client after roaming.

$9: IP address of the AC associated with the client after roaming.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_ROAM_SUCCESS: Client 0021-005f-dffd roamed from BSSID 000f-e289-6ad0 on AP ap1 Radio ID 2 of AC IP 172.25.0.81 to BSSID 000f-e2ab-baf0 on AP ap2 Radio ID 2 of AC IP 172.25.0.82 successfully.

Impact

No negative impact on the system.

Cause

The client roamed successfully.

Recommended action

No action is required.

 

STAMGR_SAVI_BIND

Message text

Bound IP address [STRING] to client [STRING] associated with radio [STRING] of AP [STRING] in BSS [STRING] with SSID [STRING]. Binding type: [STRING].

Variable fields

$1: IP address of the client.

$2: MAC address of the client.

$3: ID of the radio associated with the client.

$4: Name of the AP associated with the client.

$5: BSSID.

$6: SSID of the service template.

$7: IP address binding type:

·     DHCP.

·     DHCPv6.

·     ND.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_SAVI_BIND: Bound IP address 192.168.1.1 to client b0f9-6393-72e0 associated with radio 2 of AP ap1 in BSS b0f9-6393-72f0 with SSID abc. Binding type: DHCP.

Impact

No negative impact on the system.

Cause

The device created an SAVI binding entry.

Recommended action

No action is required.

 

STAMGR_SAVI_UNBIND

Message text

Unbound IP address [STRING] from client [STRING] associated with radio [STRING] of AP [STRING] in BSS [STRING] with SSID [STRING].

Variable fields

$1: IP address of the client.

$2: MAC address of the client.

$3: ID of the radio associated with the client.

$4: Name of the AP associated with the client.

$5: BSSID.

$6: SSID of the service template.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_SAVI_UNBIND: Unbound IP address 192.168.1.1 from client b0f9-6393-72e0 associated with radio 2 of AP ap1 in BSS b0f9-6393-72f0 with SSID abc.

Impact

No negative impact on the system.

Cause

The device deleted an SAVI binding entry.

Recommended action

No action is required.

 

STAMGR_SAVI_UNKNOWN_SOURCE_IP

Message text

Received a data packet with unknown source IP [STRING] destined to IP [STRING] from client [STRING] associated with radio [STRING] of AP [STRING] in BSS [STRING] with SSID [STRING]. IP protocol: [STRING].

Variable fields

$1: Source IP address.

$2: Destination IP address.

$3: MAC address of the client.

$4: ID of the radio associated with the client.

$5: Name of the AP associated with the client.

$6: BSSID.

$7: SSID of the service template.

$8: IP protocol version.

Severity level

6 (Informational)

Example

STAMGR/6/STAMGR_SAVI_UNKNOWN_SOURCE_IP: Received a data packet with unknown source IP 192.168.1.1 destined to IP 192.168.1.2 from client 0023-8933-2147 associated with radio 2 of AP ap1 in BSS 0023-12ef-78dc with SSID abc. IP protocol: 17.

Impact

The system might be under client spoofing attacks.

Cause

The device received a data packet with an unknown IP address that does not match any SAVI binding entry from a client.

Recommended action

Verify if the client is a legal client based on the output information. If the client is illegal, forbid the client from access.

 

STAMGR_SERVICE_FAILURE

Message text

Service failure occurred on BSS [STRING] after service template [STRING] with SSID [STRING] was bound to radio [STRING] on AP [STRING] with AP ID [STRING]. Reason: [STRING], code=0x[STRING].

Variable fields

$1: BSSID.

$2: Name of the service template.

$3: SSID defined in the service template.

$4: Radio ID.

$5: AP name.

$6: AP ID.

$7: Reason for the service failure, as described in Table 15.

$8: Error code.

Severity level

6 (Informational)

Example

STAMGR/6/SERVICE_FAILURE: Service failure occurred on BSS 0023-12ef-78dc after service template st1 with SSID st1ssid was bound to radio 1 on AP ap1 with AP ID 1. Reason: Failed to activate BSS when AP came online, code=0x61140001.

Impact

The wireless service cannot be used.

Cause

After the AP came online, BSS activation failed for a specific reason with error code 0x61140001.

Recommended action

To resolve the issue:

1.     Check the debugging information to locate the failure cause and remove the issue.

2.     If the issue persists, contact H3C Support.

 

Table 15 Possible service failure reasons

Possible reasons

Failed to create a BSS interface during smooth BSS interface creation.

Replied with failure to transmit interface creation node during smooth BSS interface creation.

Failed to set forwarding location during smooth recovery of AP data.

Failed to initiate a series of locations during smooth recovery of AP data.

Failed to send message of creating BSS interface to worker thread during smooth recovery of AP data.

Failed to create handle during smooth recovery of AP data.

Failed to activate BSS during smooth recovery of AP data.

Failed to set kernel forwarding table during smooth recovery of AP data.

Failed to create BSS node when AP came online.

Failed to create BSS handle when AP came online.

Insufficient memory for creating BSS node when AP came online.

Failed to get radio private data while creating BSS node in general process.

Failed to initiate a series of locations while creating BSS node in general process.

Failed to set kernel forwarding table while creating BSS node in general process.

Failed to create BSS node during smooth recovery of BSS data.

Failed to get AP location while recovering BSS running data from DBM.

Failed to get radio private data while recovering BSS running data from DBM.

Failed to add BSS index to interface index while recovering BSS running data from DBM.

Failed to create BSS handle when hierarchy device received Add WLAN message.

Failed to initiate a series of locations when hierarchy device received Add WLAN message.

Failed to set forwarding location when hierarchy device received Add WLAN message.

Failed to send message to worker thread when hierarchy device received Add WLAN message.

Failed to set kernel forwarding table when hierarchy device received Add WLAN message.

Failed to activate BSS when hierarchy device received Add WLAN message.

Failed to issue Add WLAN message when hierarchy device received Add WLAN message.

Failed to activate BSS when service template was bound.

Failed to create BSS node when service template was bound.

Failed to create BSS handle when service template was bound.

Failed to add bind node to mapped radio list of the service template while recovering service template binding information for service thread from pending database.

Failed to create BSS node while recovering service template binding information for service thread from pending database.

Failed to add bind node to mapped radio list of the service template while creating BSS from Merger.

Failed to create BSS node while creating BSS from Merger.

Failed to apply for memory while creating BSS node.

Failed to calculate BSSID while creating BSS node.

Service thread received interface creation failure while creating BSS interface during smooth recovery of AP data.

Failed to add BSS index to interface index while creating BSS interface during smooth recovery of AP data.

Failed to add VLAN on the interface while creating BSS interface during smooth recovery of AP data.

Failed to set the source MAC address of the interface while creating BSS interface during smooth recovery of AP data.

Failed to set kernel forwarding table while creating BSS interface during smooth recovery of AP data.

Failed to activate BSS while creating BSS interface during smooth recovery of AP data.

Replied with failure to transmit interface creation node when hierarchy device created an interface accordingly.

Failed to create BSS interface when BSS created an interface accordingly.

Failed to add BSS index to interface index when BSS created an interface accordingly.

Failed to add VLAN on the interface when BSS created an interface accordingly.

Failed to set source MAC address of the interface when BSS created an interface accordingly.

Failed to set kernel forwarding table when BSS created an interface accordingly.

Failed to issue ADD BSS message when BSS created an interface accordingly.

Replied with failure to transmit interface creation node when hierarchy device created an interface accordingly for an invalid interface.

Created BSS rollback for failed resources while issuing ADD BSS message callback.

Failed to enable packet socket while recovering BSS running data from DBM.

Failed to create BSS node while recovering BSS running data from DBM.

Failed to initiate BSS while creating BSS node.

Failed to activate BSS when service template was enabled.

Invalid BSS interface index while upgrading BSS with AP private data.

Failed to upgrade backup BSS to real BSS while upgrading BSS with AP private data.

Failed to set kernel forwarding table while upgrading BSS with AP private data.

Failed to activate BSS while upgrading BSS with AP private data.

Invalid BSS interface index while upgrading BSS without AP private data.

Failed to set kernel forwarding table while upgrading BSS without AP private data.

Failed to activate BSS while upgrading BSS without AP private data.

Failed to create BSS interface while creating general BSS process.

Failed to activate BSS during smooth recovery of BSS data.

Failed to activate BSS while recovering service template binding information for service thread from pending database.

Failed to activate BSS while creating BSS from Merger.

Failed to activate BSS when AP came online.

Failed to activate BSS when other module sent activation request.

Failed to activate BSS when other module received activation request.

Failed to send response node of creating interface while creating interface during smooth recovery of AP data.

Failed to add BSS index to interface index when hierarchy device created an interface accordingly.

Failed to add VLAN on the interface when hierarchy device created an interface accordingly.

Failed to set source MAC address of the interface when hierarchy device created an interface accordingly.

Failed to set kernel forwarding table when hierarchy device created an interface accordingly.

Failed to activate BSS when hierarchy device created an interface accordingly.

Failed to issue Add BSS message when hierarchy device created an interface accordingly.

Insufficient memory when hierarchy device received BSS creation message.

Failed to fill BSS basic data when hierarchy device received BSS creation message.

Failed to initiate BSS service phase when hierarchy device received BSS creation message.

Failed to receive Add WLAN message when hierarchy device received BSS creation message.

Failed to get radio private data because of invalid AP ID when hierarchy device received BSS creation message.

Failed to get radio private data because of invalid radio ID when hierarchy device received BSS creation message.

Failed to get radio private data when hierarchy device received Add WLAN message.

Failed to issue message when hierarchy device received Add WLAN message.

Failed to get BSS data through WLAN ID during smooth recovery of BSS data.

Failed to issue Add WLAN message while creating BSS node in general process.

Failed to create BSS interface when hierarchy device created an interface accordingly.

Failed to create BSS interface when hierarchy device created an interface accordingly for an invalid interface.

Failed to set forwarding location while creating BSS node in general process.

Replied with failure to transmit interface creation node when BSS created an interface accordingly.

Failed to update BSS key data when hierarchy device received Add WLAN message.

Replied with failure to transmit interface creation node when BSS created an interface accordingly for an existing BSS.

 

STAMGR_SERVICE_OFF

Message text

BSS [STRING] was deleted after service template [STRING] with SSID [STRING] was unbound from radio [STRING] on AP [STRING]. Reason: [STRING].

Variable fields

$1: BSSID.

$2: Name of the service template.

$3: SSID defined in the service template.

$4: Radio ID.

$5: AP name.

$6: Reason for the BSS deletion.

·     Unknown reason.

·     AP down.

·     Deleted BSS with the Delete mark when inter-AC BSS smooth ended.

·     Hierarchy device received BSS delete message.

·     Deleted AP private data from APMGR when AP smooth ended.

·     WLAS was triggered, and service was shut down temporarily.

·     Intrusion protection was triggered, and service was shut down permanently.

·     Service module received Update WLAN message when BSS was inactive.

·     Disabled service template.

·     Unbound service template.

·     Deleted BSS with the Delete mark when inter-AC AP smooth ended.

·     BSS aging timer timed out.

·     Deleted non-local forwarding BSS when AP enabled with remote AP went offline.

·     Failed to find configuration data while synchronizing data.

·     AP did not come online or service template was disabled.

·     Failed to find the WLAN ID from APMGR while BSS was smoothing WLAN ID.

·     Unbound inherited service template.

·     The stamgr process became down automatically or was shut down manually.

·     Failed to use AP private data to upgrade backup BSS.

·     Failed to upgrade backup BSS.

·     Failed to synchronize service template data to the Merger bind list while upgrading backup data.

Severity level

6 (Informational)

Example

STAMGR/6/SERVICE_OFF: BSS 0023-12ef-78dc was deleted after service template st1 with SSID st1ssid was unbound from radio 1 on AP ap1. Reason: Failed to find configuration data while synchronizing data.

Impact

The BSS is unavailable.

Cause

The BSS was deleted for a specific reason.

Recommended action

To resolve the issue:

1.     Verify that the BSS is deleted as requested. If the BSS is deleted as requested, no action is required.

2.     Locate the deletion cause and remove the issue if the BSS is deleted abnormally,

3.     If the issue persists, contact H3C Support.

 

STAMGR_STA_ADDMOB_LKUP_ENDOFIOCTL

Message text

APID=[UINT32]-MAC=[STRING]-BSSID=[STRING]; AC doesn't need to send client information to uplink device: Client information already arrived at the end of the IOCTL tunnel.

Variable fields

$1: ID of the AP associated with the client.

$2: MAC address of the client.

$3: BSSID of the service template associated with the client.

Severity level

7 (Debug)

Example

STAMGR/7/STAMGR_STA_ADDMOB_LKUP_ENDOFIOCTL: APID=667-MAC=d4f4-6f69-d7a1-BSSID=600b-0301-d5a0; The AC doesn't need to send client information to uplink device: Client information already arrived at the end of the IOCTL tunnel.

Impact

No negative impact on the system.

Cause

Client information already arrived at the end of the IOCTL tunnel.

Recommended action

To resolve the issue depending on the network infrastructure:

·     Fit AP+AC network—No action is required if this message is output. If no message is output, locate the issue according to the debugging information and resolve the issue.

·     AC hierarchical network—No action is required if this message is output by the central AC. If this message is output by a local AC, locate the issue according to the debugging information and resolve the issue.

 

STAMGR_SERVICE_ON

Message text

BSS [STRING] was created after service template [STRING] with SSID [STRING] was bound to radio [STRING] on AP [STRING].

Variable fields

$1: BSSID.

$2: Name of the service template.

$3: SSID defined in the service template.

$4: Radio ID.

$5: AP name.

Severity level

6 (Informational)

Example

STAMGR/6/SERVICE_ON: BSS 0023-12ef-78dc was created after service template st1 with SSID 1 was bound to radio 1 on AP ap1.

Impact

No negative impact on the system.

Cause

The BSS was created.

Recommended action

No action is required.

 

STAMGR_TRIGGER_IP

Message text

-SSID=[STRING]-UserMAC=[STRING]-APName=[STRING]-RadioID=[STRING]-VLANID=[STRING]; Intrusion protection triggered. Action: [STRING].

Variable fields

$1: SSID.

$2: MAC address of the client.

$3: Name of the AP associated with the client.

$4: ID of the radio associated with the client.

$5: ID of the access VLAN.

$6: Action:

·     Added the user to the blocked MAC address list.

·     Closed the user's BSS temporarily.

·     Closed the user's BSS permanently.

Severity level

5 (Notification)

Example

STAMGR/5/STAMGR_TRIGGER_IP:-SSID=text-wifi-UserMAC=3ce5-a616-28cd-APName=ap1-RadioID=2-VLANID=11; Intrusion protection triggered, the intrusion protection action: added a user to the list of Block-MAC.

Impact

No negative impact on the system.

Cause

The device detected that an unauthenticated client is attempting to access the network.

Recommended action

No action is required.

 

 

STP

This section contains STP messages.

STP_BPDU_PROTECTION

Message text

BPDU-Protection port [STRING] received BPDUs.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

STP/4/STP_BPDU_PROTECTION: BPDU-Protection port GigabitEthernet1/0/1 received BPDUs.

Impact

The port is closed by the device

Cause

The interface with BPDU protection function enabled receives BPDU

Recommended action

The closed port will be re-activated after a certain time interval. If the interface with BPDU protection function enabled is frequently closed due to receiving BPDU, check if the BPDU message on this port is from a malicious attack:

·     If so, collect the configuration file, log file, and alarms, and then contact Technical Support.

·     If not, disable the BPDU protection function on this port by executing the command 'stp port bpdu-protection disable' on this port

 

STP_BPDU_RECEIVE_EXPIRY

Message text

[STRING] [UINT32]'s port [STRING] received no BPDU within the rcvdInfoWhile interval. Information of the port aged out.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

5 (Notification)

Example

STP/5/STP_BPDU_RECEIVE_EXPIRY: Instance 0's port GigabitEthernet1/0/1 received no BPDU within the rcvdInfoWhile interval. Information of the port aged out.

Impact

Topology changes in the spanning tree network

Cause

The corresponding device on the port has not enabled the spanning tree function or there is a link fault with the device on the other end

Recommended action

1.     On the device connected through this port, execute the command 'display stp' to check if the spanning tree function is enabled:

¡     If yes, go to step 2

¡     If no, enable the global and port spanning tree function on the device on the other end using the 'stp global enable' and 'stp enable' commands. If the device on the other end still cannot receive BPDU after enabling the spanning tree function, go to step 2

2.     Check if there is a link fault between this device and the device on the other end:

¡     If yes, repair the link fault between the devices. If unable to locate the fault or repair the link fault, go to step 3

¡     If no, go to step 3

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_CONSISTENCY_CHECK

Message text

M-LAG role assignment finished. verify that the local device and the peer device have consistent global and mlag-interface-specific STP settings.

Variable fields

N/A

Severity level

5 (Notification)

Example

STP/5/STP_CONSISTENCY_CHECK: M-LAG role assignment finished. verify that the local device and the peer device have consistent global and mlag-interface-specific STP settings.

Impact

If the spanning tree configuration on two M-LAG devices in the M-LAG system is inconsistent, it may cause the M-LAG system to malfunction.

Cause

If both devices are configured with M-LAG and spanning tree function.

Recommended action

Execute the 'display current-configuration' command on both devices in the M-LAG system to check if the global and M-LAG interface spanning tree configurations are consistent:

·     If they are consistent, no action is required.

·     If they are inconsistent, modify the spanning tree configuration to be consistent on both M-LAG devices.

 

STP_CONSISTENCY_RESTORATION

Message text

Consistency restored on VLAN [UINT32]'s port [STRING].

Variable fields

$1: VLAN ID

$2: Interface name.

Severity level

6 (Informational)

Example

STP/6/STP_CONSISTENCY_RESTORATION: Consistency restored on VLAN 10's port GigabitEthernet1/0/1.

Impact

No negative impacts on the system.

Cause

The PVID or port type at both ends of the link port becomes consistent

Recommended action

No action is required.

 

STP_DETECTED_TC

Message text

[STRING] [UINT32]'s port [STRING] detected a topology change.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

6 (Informational)

Example

STP/6/STP_DETECTED_TC: Instance 0's port GigabitEthernet1/0/1 detected a topology change.

Impact

Spanning Tree Topology changes, triggering a recalculation of the Spanning Tree Protocol

Cause

Port status changes on the device

Recommended action

Check if the topology change is normal:

·     If yes, no action is required.

·     If no, troubleshoot the related issues, recover the Spanning Tree Topology. If unable to troubleshoot, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_DISABLE

Message text

STP is now disabled on the device.

Variable fields

N/A

Severity level

6 (Informational)

Example

STP/6/STP_DISABLE: STP is now disabled on the device.

Impact

Devices are unable to use the Spanning Tree Protocol (STP) function and cannot process or send BPDUs.

Cause

Users execute the 'undo stp global enable' command to globally disable the Spanning Tree Protocol.

Recommended action

No action is required.

 

STP_DISCARDING

Message text

[STRING] [UINT32]'s port [STRING] has been set to discarding state.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

6 (Informational)

Example

STP/6/STP_DISCARDING: Instance 0's port GigabitEthernet1/0/1 has been set to discarding state.

Impact

This port cannot forward user traffic

Cause

The spanning tree topology of the port in the MSTP instance has changed

Recommended action

1.     Check if there have been changes in the devices or links in the network topology:

¡     If yes, go to step 2

¡     If no, go to step 3

2.     Check if the changes in the devices or links in the network topology are in line with the requirements:

¡     If yes, go to step 3

¡     If no, proceed to step 4

3.     Execute the command 'display stp' to check if the current status calculation results of each port are in line with the requirements:

¡     If yes, no action is required.

¡     If no, go to step 4

4.     Deploy the network topology correctly. If the problem is still not resolved after deploying the network topology correctly, go to step 5

5.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_DISPUTE

Message text

[STRING] [UINT32]'s port [STRING] received an inferior BPDU from a designated port which is in forwarding or learning state.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

4 (Warning)

Example

STP/4/STP_DISPUTE: Instance 0's port GigabitEthernet1/0/2 received an inferior BPDU from a designated port which is in forwarding or learning state.

Impact

Ports triggering Dispute protection will be blocked

Cause

In the spanning tree instance or VLAN, the port receives a low priority BPDU message sent by the designated port, and the sending port is in the Forwarding or Learning state

Recommended action

The following methods can be used to handle this:

·     Execute the 'display stp abnormal-port' command to view information about the port in Dispute protection. Check if there is a one-way fault on the link where the remote end cannot receive messages from the local end. After ensuring that the VLAN configurations on both ends of the port are consistent, you can try to down/up the link for recovery or replace the cable

·     Based on the designated bridge ID and designated port ID carried by the received low priority message, troubleshoot the link between the device and the device to which the BPDU in the spanning tree topology belongs

·     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_ENABLE

Message text

STP is now enabled on the device.

Variable fields

No

Severity level

6 (Informational)

Example

STP/6/STP_ENABLE: STP is now enabled on the device.

Impact

Some ports may be blocked due to the calculation results of the Spanning Tree Protocol (STP)

Cause

On the device, the global enable command for STP has been executed to enable the global Spanning Tree Protocol

Recommended action

No action is required.

 

STP_FORWARDING

Message text

[STRING] [UINT32]'s port [STRING] has been set to forwarding state.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

6 (Informational)

Example

STP/6/STP_FORWARDING: Instance 0's port GigabitEthernet1/0/1 has been set to forwarding state.

Impact

No negative impacts on the system.

Cause

The network topology changes

Recommended action

1.     Execute the display stp command to check if the current status calculation results of each port meet the requirements:

¡     If yes, then no action is required.

¡     If no, go to step 2.

2.     Correctly deploy the network topology. If the issue persists after correct deployment, go to step 3.

3.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_LOOP_PROTECTION

Message text

[STRING] [UINT32]'s LOOP-Protection port [STRING] failed to receive configuration BPDUs.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

4 (Warning)

Example

STP/4/STP_LOOP_PROTECTION: Instance 0's LOOP-Protection port GigabitEthernet1/0/1 failed to receive configuration BPDUs.

Impact

Ports with loop protection enabled will remain in Discarding state until receiving BPDU

Cause

Reason 1: Spanning tree function is not enabled on the opposite device of the port with loop protection enabled

Reason 2: Link fault occurred on the port with loop protection enabled

Recommended action

1.     Execute the display stp command on the opposite device connected to this port to check if the spanning tree function is enabled on that device:

¡     If yes, go to step 2

¡     If not, enable the global and port spanning tree functions on the opposite device with the stp global enable and stp enable commands. If the opposite device enables the spanning tree function and this end still cannot receive BPDU, go to step 2

2.     Check if there is a link fault between this device and the opposite device:

¡     If yes, repair the link fault between the devices. If the cause of the fault cannot be located or the link fault cannot be repaired, go to step 3

¡     If not, execute step 3

3.     If the issue persists, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_LOOPBACK_PROTECTION

Message text

[STRING] [UINT32]'s port [STRING] received its own BPDU.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

4 (Warning)

Example

STP/4/STP_LOOPBACK_PROTECTION: Instance 0's port GigabitEthernet1/0/2 received its own BPDU.

Impact

There may be a loop in the network, which could cause a broadcast storm

Cause

Ports receive their own BPDU messages in the spanning tree instance or VLAN

Recommended action

1.     Check for malicious users forging BPDU to attack the network:

¡     If yes, go to step 3

¡     If no, go to step 2

2.     Check if there is a physical loop in the network, if so, manually break the loop. If the problem is not resolved, go to step 3

3.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_NOT_ROOT

Message text

The current switch is no longer the root of instance [UINT32].

Variable fields

$1: STP instance number.

Severity level

5 (Notification)

Example

STP/5/STP_NOT_ROOT: The current switch is no longer the root of instance 0.

Impact

Device roles are recalculated, which may cause a brief disruption to the business.

Cause

Possible reasons include:

·     A device with a smaller root bridge ID has been added to the spanning tree network topology

·     A device's priority in the original spanning tree network topology has been modified

Recommended action

For a device with a smaller root bridge ID added to the spanning tree network topology:

1.     On the newly added device, execute the 'display stp root' command to check if the device's root bridge ID is the smallest:

¡     If yes, go to step 2

¡     If no, go to step 4

2.     confirm whether the root bridge ID of the newly added device should be planned as the smallest root bridge ID:

¡     If yes, then no action is required.

¡     If no, go to step 3

3.     modify the priority and other configurations of the newly added device to change the root bridge role to the device planned by the user. If the problem is still not resolved, go to step 4

4.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

For devices with modified priorities in the original spanning tree network topology:

5.     Execute the 'display stp' command to check if the device priority modification configuration in the spanning tree network topology is normal:

¡     If yes, then no action is required.

¡     If no, go to step 2

6.     Execute the 'stp priority' command to modify the priority of each device to the value planned by the user. If the problem is still not resolved, go to step 3

7.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_NOTIFIED_TC

Message text

[STRING] [UINT32]'s port [STRING] was notified a topology change.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

6 (Informational)

Example

STP/6/STP_NOTIFIED_TC: Instance 0's port GigabitEthernet1/0/1 was notified a topology change.

Impact

Spanning Tree topology changes, triggering re-calculation of the Spanning Tree Protocol

Cause

Device receives a BPDU with the TC flag set

Recommended action

Check if the topology change is normal:

·     If yes, no action is required.

·     If no, troubleshoot the related faults and recover the Spanning Tree topology. If unable to troubleshoot, collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_PORT_TYPE_INCONSISTENCY

Message text

Access port [STRING] in VLAN [UINT32] received PVST BPDUs from a trunk or hybrid port.

Variable fields

$1: Interface name.

$2: VLAN ID

Severity level

4 (Warning)

Example

STP/4/STP_PORT_TYPE_INCONSISTENCY: Access port GigabitEthernet1/0/1 in VLAN 10 received PVST BPDUs from a trunk or hybrid port.

Impact

Due to the difference in BPDU format sent by Access ports and Trunk as well as Hybrid ports, it may cause errors in the Spanning Tree Protocol calculation

Cause

Access ports received PVST format BPDUs sent by Trunk or Hybrid ports

Recommended action

1.     Check if the type of the port specified in the log is consistent with its peer port:

¡     If yes, go to step 2

¡     If no, change the port types on both ends to the same type. If the problem is still not resolved, go to step 2

2.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_PVID_INCONSISTENCY

Message text

Port [STRING] with PVID [UINT32] received PVST BPDUs from a port with PVID [UINT32].

Variable fields

$1: Interface name.

$2: VLAN ID

$3: VLAN ID

Severity level

4 (Warning)

Example

STP/4/STP_PVID_INCONSISTENCY: Port GigabitEthernet1/0/1 with PVID 10 received PVST BPDUs from a port with PVID 20.

Impact

PVST calculation may have errors

Cause

This end port does not match the remote port's PVID

Recommended action

determine if the inconsistency of PVIDs on both ends of the port complies with the network planning requirements:

·     If yes, execute the 'stp ignore-pvid-inconsistency' command to disable PVST's PVID inconsistency protection function

·     If no, modify the PVIDs on both ends of the port to match

 

STP_PVST_BPDU_PROTECTION

Message text

PVST BPDUs were received on port [STRING], which is enabled with PVST BPDU protection.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

STP/4/STP_PVST_BPDU_PROTECTION: PVST BPDUs were received on port GigabitEthernet1/0/1, which is enabled with PVST BPDU protection.

Impact

The port receiving the PVST message was closed.

Cause

In MSTP mode, the port with PVST message protection function enabled received a PVST message.

Recommended action

1.     Determine if the device publishing the PVST message needs to do so:

¡     If yes, No action is required.

¡     If no, modify the configuration on the device to stop publishing PVST messages. If the issue is not resolved, go to step 2

2.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_ROOT_PROTECTION

Message text

[STRING] [UINT32]'s ROOT-Protection port [STRING] received superior BPDUs.

Variable fields

$1: STP instance or VLAN.

$2: STP instance number or VLAN ID.

$3: Interface name.

Severity level

4 (Warning)

Example

STP/4/STP_ROOT_PROTECTION: Instance 0's ROOT-Protection port GigabitEthernet1/0/1 received superior BPDUs.

Impact

The port that receives a BPDU with a higher precedence will transition to the listening state and stop forwarding user messages. If no better BPDU is received within twice the Forward Delay time, the port will recover to its original normal state.

Cause

A new device has been added to the spanning tree network topology, or an existing device has undergone a precedence change.

Recommended action

1.     Execute the 'display stp' command on other devices in the spanning tree network to check the current root bridge calculation results and port calculation results to see if they comply with the network plan:

¡     If yes, go to step 2

¡     If no, go to step 3

2.     Execute the 'undo stp root-protection' command on the port with root protection enabled to disable the root protection function on that port. If the issue is not resolved, go to step 4

3.     Reconfigure the precedence of devices in the network as needed to make the device with root protection enabled the root bridge device. If the issue is not resolved, go to step 4

4.     Collect the configuration file, log file, and alarms, and then contact Technical Support.

 

STP_STG_NUM_DETECTION

Message text

STG count [UINT32] is smaller than the MPU's STG count [UINT32].

Variable fields

$1: Number of specified board STG

$2: Number of MPU STG

Severity level

4 (Warning)

Example

STP/4/STP_STG_NUM_DETECTION: STG count 64 is smaller than the MPU's STG count 65.

Impact

Spanning Tree Protocol cannot run normally

Cause

Detected that the number of STG on the specified board is less than the number of STG on the MPU

Recommended action

The number of STP instances configured on the MPU cannot exceed the minimum number of STG on all boards. For example: If the number of STP instances configured is m, and the minimum number of STG on any board is n, then m cannot be greater than n

 

SYSLOG messages

This section contains syslog (information center) messages.

SYSLOG_LOGBUFFER_FAILURE

Message text

Log cannot be sent to the logbuffer because of communication timeout between syslog and DBM processes.

Variable fields

N/A

Severity level

4 (Warning)

Example

SYSLOG/4/SYSLOG_LOGBUFFER_FAILURE: Log cannot be sent to the logbuffer because of communication timeout between syslog and DBM processes.

Impact

The log buffer is unable to store logs.

Cause

The communication timed out between syslog and DBM processes.

Recommended action

Collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

SYSLOG_LOGFILE_FULL

Message text

Log file space is full.

Variable fields

N/A

Severity level

4 (Warning)

Example

SYSLOG/4/SYSLOG_LOGFILE_FULL: Log file space is full.

Impact

New logs cannot be stored to the log file.

Cause

The log file is full.

Recommended action

To resolve the issue:

1.     Back up the log file, and delete the log file.

2.     Execute the undo info-center logfile overwrite-protection command to disable the log file overwrite protection feature. With this feature disabled, when the log file is full, new logs can overwrite existing logs and be saved to the log file.

3.     Execute the info-center logfile size-quota command to modify the maximum storage space that a single log file can occupy.

 

SYSLOG_NO_SPACE

Message text

Failed to save log file due to lack of space resources.

Variable fields

N/A

Severity level

4 (Warning)

Example

SYSLOG/4/SYSLOG_NO_SPACE: -MDC=1; Failed to save log file due to lack of space resources.

Impact

Newly generated logs cannot be saved into the log file.

Cause

The storage space is insufficient.

Recommended action

To resolve the issue:

1.     Back up the log file to a remote server.

2.     Use the delete /unreserved file command to temporarily delete unused files.

3.     Use the reset recycle-bin command to clear the files in the recycle bin to free up storage space on the storage medium.

 

SYSLOG_RESTART

Message text

System restarted --

[STRING] [STRING] Software.

Variable fields

$1: Company name.

$2: Software name.

Severity level

6 (Informational)

Example

SYSLOG/6/SYSLOG_RESTART: System restarted --

H3C Comware Software

Impact

The system restarts and the device cannot operate correctly.

Cause

The device is restarted.

Recommended action

No action is required.

 

SYSLOG_RTM_EVENT_BUFFER_FULL

Message text

In the last minute, [String] syslog logs were not monitored because the buffer was full.

Variable fields

$1: Number of system logs that were not sent to the EAA module in the last minute.

Severity level

5 (Notification)

Example

SYSLOG/5/SYSLOG_RTM_EVENT_BUFFER_FULL: In the last minute, 100 syslog logs were not monitored because the buffer was full.

Impact

This issue might affect the execution of EAA monitoring policies.

Cause

This message records the number of system logs that are not processed by EAA because the log buffer monitored by EAA is full. The log buffer can be filled up if the device generates large numbers of system logs in a short period of time.

Recommended action

To resolve the issue:

1.     Execute the display logbuffer command to locate a large number of logs generated in a short time, identify the service module generating the logs, and determine based on the log information whether the service module's function is abnormal or under attack. First address the issues with the service module's abnormalities or attacks to reduce the generation of logs.

2.     Use the rtm event syslog buffer-size command to increase the log buffer size.

 

 

TACACS messages

This section contains TACACS messages.

TACACS_ACCT_SERVER_DOWN

Message text

TACACS accounting server was blocked: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the accounting server.

$2: Port number of the accounting server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

4 (Warning)

Example

TACACS/4/TACACS_ACCT_SERVER_DOWN: TACACS accounting server was blocked: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

A server becomes unreachable, which causes the user to fail to come online.

Cause

An accounting server became blocked from active.

Recommended action

1.     Use the display interface command to identify whether the interface connected to the TACACS accounting server is up:

¡     If no, troubleshoot the physical links.

¡     If yes, go to step 2.

2.     Use the ping command to identify whether the TACACS accounting server is reachable:

¡     If no, first check the network reachability between the device and the TACACS accounting server, and then identify whether firewalls exist in the network. Make sure the TACACS accounting server is reachable.

¡     If yes, go to step 3.

3.     Use the display current-configuration command to identify whether the TACACS accounting server is configured correctly:

¡     If no, modify the TACACS accounting server settings. For more information about TACACS server configuration, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.

¡     If yes, go to step 4.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TACACS_ACCT_SERVER_UP

Message text

TACACS accounting server became active: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the accounting server.

$2: Port number of the accounting server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

6 (Informational)

Example

TACACS/6/TACACS_ACCT_SERVER_UP: TACACS accounting server became active: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

No negative impact on the system.

Cause

The device detected that a TACACS accounting server became active from blocked.

Recommended action

No action is required.

 

TACACS_AUTH_FAILURE

Message text

User [STRING] at [STRING] failed authentication.

Variable fields

$1: Username.

$2: IP address.

Severity level

5 (Notification)

Example

TACACS/5/TACACS_AUTH_FAILURE: User cwf@system at 192.168.0.22 failed authentication.

Impact

A user fails authentication.

Cause

An authentication request was rejected by the TACACS server.

Recommended action

1.     Verify that the TACACS authentication-related configurations are correct on the device.

2.     If the issue persists, contact the server administrator to confirm the reason for rejecting the authentication request, and resolve the issue based on the reason.

3.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TACACS_AUTH_SERVER_DOWN

Message text

TACACS authentication server was blocked: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the authentication server.

$2: Port number of the authentication server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

4 (Warning)

Example

TACACS/4/TACACS_AUTH_SERVER_DOWN: TACACS authentication server was blocked: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

This issue will result in user authentication failures during login. If no secondary authentication servers are available, users might be disconnected.

Cause

The device detected that a TACACS authentication server became blocked from active.

Recommended action

1.     Use the display interface command to identify whether the interface connected to the TACACS accounting server is up:

¡     If no, troubleshoot the physical links.

¡     If yes, go to step 2.

2.     Use the ping command to identify whether the TACACS accounting server is reachable:

¡     If no, first check the network reachability between the device and the TACACS accounting server, and then identify whether firewalls exist in the network. Make sure the TACACS accounting server is reachable.

¡     If yes, go to step 3.

3.     Use the display current-configuration command to identify whether the TACACS accounting server is configured correctly:

¡     If no, modify the TACACS accounting server settings. For more information about TACACS server configuration, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.

¡     If yes, go to step 4.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TACACS_AUTH_SERVER_UP

Message text

TACACS authentication server became active: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the authentication server.

$2: Port number of the authentication server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

6 (Informational)

Example

TACACS/6/TACACS_AUTH_SERVER_UP: TACACS authentication server became active: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

No negative impact on the system.

Cause

The device detected that a TACACS authentication server became active from blocked.

Recommended action

No action is required.

 

TACACS_AUTH_SUCCESS

Message text

User [STRING] at [STRING] was authenticated successfully.

Variable fields

$1: Username.

$2: IP address.

Severity level

6 (Informational)

Example

TACACS/6/TACACS_AUTH_SUCCESS: User cwf@system at 192.168.0.22 was authenticated successfully.

Impact

No negative impact on the system.

Cause

An authentication request was accepted by the TACACS server.

Recommended action

No action is required.

 

TACACS_AUTHOR_SERVER_DOWN

Message text

TACACS authorization server was blocked: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the authorization server.

$2: Port number of the authorization server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

4 (Warning)

Example

TACACS/4/TACACS_AUTHOR_SERVER_DOWN: TACACS authorization server was blocked: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

This issue will result in user authentication failures during login. If no secondary authentication servers are available, users might be disconnected.

Cause

The device detected that a TACACS authorization server became blocked from active.

Recommended action

1.     Use the display interface command to identify whether the interface connected to the TACACS accounting server is up:

¡     If no, troubleshoot the physical links.

¡     If yes, go to step 2.

2.     Use the ping command to identify whether the TACACS accounting server is reachable:

¡     If no, first check the network reachability between the device and the TACACS accounting server, and then identify whether firewalls exist in the network. Make sure the TACACS accounting server is reachable.

¡     If yes, go to step 3.

3.     Use the display current-configuration command to identify whether the TACACS accounting server is configured correctly:

¡     If no, modify the TACACS accounting server settings. For more information about TACACS server configuration, see AAA commands in Security Command Reference and AAA configuration in Security Configuration Guide of the device.

¡     If yes, go to step 4.

4.     If the issue persists, collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TACACS_AUTHOR_SERVER_UP

Message text

TACACS authorization server became active: Server IP=[STRING], port=[UINT32], VPN instance=[STRING].

Variable fields

$1: IP address of the authorization server.

$2: Port number of the authorization server.

$3: VPN instance name. This field displays public if the server belongs to the public network.

Severity level

6 (Informational)

Example

TACACS/6/TACACS_AUTHOR_SERVER_UP: TACACS authorization server became active: Server IP=1.1.1.1, port=1812, VPN instance=public.

Impact

No negative impact on the system.

Cause

The device detected that a TACACS authorization server became active from blocked.

Recommended action

No action is required.

 

TACACS_DELETE_HOST_FAIL

Message text

Failed to delete servers in scheme [STRING].

Variable fields

$1: Scheme name.

Severity level

4 (Warning)

Example

TACACS/4/TACACS_DELETE_HOST_FAIL: Failed to delete servers in scheme abc.

Impact

The impact on the system is determined based on the actual situation.

Cause

Failed to use a command line to delete servers from a TACACS scheme.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

TELNETD messages

This section contains Telnet daemon messages.

TELNETD_REACH_SESSION_LIMIT

Message text

Telnet client [STRING] failed to log in. The current number of Telnet sessions is [NUMBER]. The maximum number allowed is ([NUMBER]).

Variable fields

$1: IP address of the Telnet client.

$2: Current number of Telnet sessions.

$3: Maximum number of Telnet sessions allowed by the device.

Severity level

6 (Informational)

Example

TELNETD/6/TELNETD_REACH_SESSION_LIMIT: Telnet client 1.1.1.1 failed to log in. The current number of Telnet sessions is 10. The maximum number allowed is (10).

Impact

The Telnet user cannot access the system.

Cause

The number of Telnet connections reached the limit.

Recommended action

1.     Use the display current-configuration | include session-limit command to view the current limit for Telnet connections. If the command does not display the limit, it indicates that the device is using the default setting.

2.     To set a greater limit, execute the aaa session-limit command.

 

VLAN messages

This section contains VLAN messages.

VLAN_CREATEVLAN_NO_ENOUGH_RESOUR

Message text

Failed to create VLAN [STRING]. The maximum number of VLANs has been reached.

Variable fields

$1: VLAN ID.

Severity level

4 (Warning)

Example

VLAN/4/ VLAN_CREATEVLAN_NO_ENOUGH_RESOUR: Failed to create VLAN 1025-4094. The maximum number of VLANs has been reached.

Impact

Failed to create the specified VLANs.

Cause

Insufficient hardware resources for VLANs.

Recommended action

1.     Execute the display vlan brief command to view the VLANs that have been created.

2.     Execute the undo vlan command to delete unnecessary VLANs.

 

VLAN_FAILED

Message text

Failed to add interface [STRING] to the default VLAN.

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

VLAN/4/VLAN_FAILED: Failed to add interface GigabitEthernet1/0/1 to the default VLAN.

Impact

The port specified in this log message cannot receive packets carrying the default VLAN tag.

Cause

An interface was created when hardware resources were insufficient.

Recommended action

Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

VLAN_VLANMAPPING_FAILED

Message text

The configuration failed because of resource insufficiency or conflicts on [STRING].

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

VLAN/4/VLAN_VLANMAPPING_FAILED: The configuration failed because of resource insufficiency or conflicts on Ethernet0/0.

Impact

The VLAN mapping feature on this port cannot run properly.

Cause

Hardware resources are insufficient or the port joins or leaves a Layer 2 aggregation group.

Recommended action

1.     Reconfigure VLAN mapping on the port. If the issue persists, proceed to step 2.

2.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

VLAN_VLANTRANSPARENT_FAILED

Message text

The configuration failed because of resource insufficiency or conflicts on [STRING].

Variable fields

$1: Interface name.

Severity level

4 (Warning)

Example

VLAN/4/VLAN_VLANTRANSPARENT_FAILED: The configuration failed because of resource insufficiency or conflicts on GigabitEthernet1/0/1.

Impact

The VLAN transparent transmission feature on this port cannot run properly.

Cause

Hardware resources are insufficient or the port joins or leaves a Layer 2 aggregation group.

Recommended action

1.     Reconfigure VLAN transparent transmission on the port. If the issue persists, proceed to step 2.

2.     Collect alarm information, log messages, and configuration data, and then contact Technical Support for help.

 

 

VRRP4

This section contains IPv4 VRRP messages.

VRRP_STATUS_CHANGE

Message text

The status of [STRING] virtual router [UINT32] (configured on [STRING]) changed from [STRING] to [STRING]: [STRING].

Variable fields

$1: Network protocol type. Options include IPv4 and IPv6.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: Original status.

$5: Current status.

$6: Reason for status change:

¡     Interface event received—An interface event was received.

¡     IP address deleted—The IP address of the interface configured with the VRRP group is deleted.

¡     The status of the tracked object changed—The status of the associated track entry changed.

¡     VRRP packet received—A VRRP advertisement was received.

¡     Current device has changed to IP address owner—The current device has become the IP address owner.

¡     Master-down-timer expired—The master down timer (3 × VRRP advertisement interval + Skew_Time) expired.

¡     Zero priority packet received—A VRRP packet containing priority 0 was received.

¡     Preempt—Preemption occurred.

¡     Master group drove—The state of the master group changed.

Severity level

6 (Informational)

Example

VRRP4/6/VRRP_STATUS_CHANGE: The status of IPv4 virtual router 10 (configured on Ethernet0/0) changed from Backup to Master: Master-down-timer expired.

Impact

No negative impacts on the system.

Cause

The VRRP group status changed because of the following reasons:

1.     An interface event was received.

2.     The virtual IP address has been deleted.

3.     The status of the associated track entry changed.

4.     A VRRP advertisement was received.

5.     The current device has become the IP address owner.

6.     The master down timer (3 × VRRP advertisement interval + Skew_Time) expired.

7.     A VRRP packet containing priority 0 was received.

8.     Preemption occurred.

9.     The state of the master group changed.

Recommended action

Take an action according to the reason for the change in VRRP status carried in the log:

·     For reason 1, identify whether the interface where the VRRP group is located has failed

Execute the display interface command on both local and remote ends to check the status of the interface connected to the VRRP group. If the interface state is down, locate and handle the interface fault according to the output information.

·     For reason 2, identify whether the interface IP address is deleted. Execute the display interface brief command on the local end to view the device interface IP address. If the interface IP address is deleted, execute the ip address or ipv6 address command in interface view to configure an IP address again.

·     For reason 3, first execute the display vrrp command to obtain the associated track entry ID, and then use the display track command to locate and resolve the track entry fault.

·     For reason 4, no action is required

·     For reason 5, the recommended action is as follows:

Identify whether it is necessary to configure the local device as the IP address owner of the VRRP group: Execute the display vrrp command without parameters on the local device to view the virtual IP address of the VRRP group. Execute the display interface brief command on the local device to view the IP address of the device interface, and locate the interface with the same IP address as the VRRP group. A device with an interface IP address the same as the virtual IP address is called the IP address owner. An IP address owner in the VRRP group is the master as long as it is working correctly.

¡     If the device needs to be configured as the IP address owner, no action is required

¡     If the device does not need to be configured as the IP address owner, use the vrrp vrid command in interface view to edit the virtual IP address of the VRRP group

·     For reason 6, the recommended action is as follows:

¡     Identify whether the remote device is faulty. Execute the display vrrp command on the remote device. If the State field value is Initialize, the device is faulty. Locate the cause and recover the remote device.

¡     Identify whether the interface connected to the VRRP group is faulty. Execute the display interface command on both the local and remote ends to check the state of the interface connected to the VRRP group. If the interface state is down, locate and resolve the interface fault according to the output information.

¡     Identify whether a VRRP configuration error exists. Execute the display current-configuration | inculde vrrp command on both the local and remote ends to filter VRRP configuration. The VRRP configuration on both the local and remote ends has the following requirements:

The VRRP group number and the virtual IP address must be the same on both the local and remote ends. If they are different, use the vrrp vrid command to configure the settings again.

For VRRPv4, the version number must be consistent. If it is not consistent, use the vrrp version command in interface view to edit the version. IPv6 VRRP supports only VRRPv3 version that cannot be edited.

For VRRPv4, the authentication mode must be consistent. If an authentication key is configured, the authentication key must also be consistent. If it is not consistent, use the vrrp vrid authentication-mode command in interface view to edit the setting. VRRPv6 does not support authentication

·     For reason 7, the recommended action is as follows:

¡     Execute the display vrrp verbose command on both the local and remote ends to view the configured VRRP priority (Config pri field):

If the configuration is correct, no action is required.

If the configuration is incorrect, use the vrrp vrid priority command in interface view to edit the configuration.

¡     Execute the display vrrp verbose command on both the local and remote ends to view the configured VRRP priority (Config pri field) and the actual effective VRRP priority (Running pri field). If the two values are different, further check the associated track entry ID, and use the display track command to locate and resolve the track entry fault

·     For reason 8, if the preemption is manually triggered by the administrator, no action is required. For automatic preemption, the monitored object is faulty, and further confirmation of the cause of automatic preemption is needed.

·     For reason 9, execute the display vrrp verbose command on the local device, locate the associated management VRRP group name according to the value of the Follow Name field, and then take further actions according to the value of the reason in the management VRRP group trap.

·     If the issue persists, collect the configuration data, log messages, and alarm information, and then contact Technical Support for help.

 

VRRP_VF_STATUS_CHANGE

Message text

The [STRING] virtual router [UINT32] (configured on [STRING]) virtual forwarder [UINT32] detected status change (from [STRING] to [STRING]): [STRING].

Variable fields

$1: Network protocol type. Options include IPv4 and IPv6.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: VF ID.

$5: Original status of VF. Options include:

·     ActiveThe VF is forwarding data.

·     ListeningThe VF is in backup state.

·     Initialize—The VF is in initialization state.

$6: Current status of VF. Options include:

·     ActiveThe VF is forwarding data.

·     ListeningThe VF is in backup state.

·     Initialize—The VF is in initialization state.

$7: Reason for the status change. Options include:

·     Weight changed

·     Adding virtual MAC address failed

·     ConcededReceived a message with VF priority 0, and actively removed the forwarding permissions

·     Learnt from Advertisement

·     Reply received—Received a reply message.

·     Release received—Received release message.

·     Active timer expired

·     Time-out timer expired

·     Self-allocated—The master allocated a virtual MAC address to itself.

·     VRRP down—The VRRP group went down.

·     Take over—Took over as the AVF.

·     The status of the tracked object changed

Severity level

6 (Informational)

Example

VRRP4/6/VRRP_VF_STATUS_CHANGE: The IPv4 virtual router 10 (configured on GigabitEthernet5/1) virtual forwarder 2 detected status change (from Active to Initialize): Weight changed.

Impact

No negative impact on the system for normal switchover. If the VF status is abnormal after the switchover, services might be interrupted.

Cause

Possible reasons include:

1.     Weight change.

2.     Failed to add virtual MAC address.

3.     Received a message with VF priority 0, and actively removed the forwarding permissions

4.     Learned from an advertisement message

5.     Received a reply message

6.     Received a release message

7.     Active timer timed out

8.     Timeout timer timed out

9.     The master allocated a virtual MAC address to itself.

10.     The VRRP group went down

11.     Took over as the AVF.

12.     The status of the tracked object changed

Recommended action

Take an action based on the VRRP status change reason in the log message:

·     For reason 1, check the configured VRRP priority (Config pri field) and the actual effective VRRP priority (Running pri field). If the two values are different, further check the associated track entry number. Use the display track command to locate and resolve the track entry fault.

·     For reason 2, locate the root cause of the MAC operation failure and resolve it

·     For reason 3, identify whether a VRRP group with a priority higher than the local priority exists in the network:

¡     If the configuration is correct, no action is needed

¡     If the configuration is incorrect, edit the configuration by using the vrrp vrid priority command in interface view

·     For reason 4, no action is required.

·     For reason 5, no action is required.

·     For reason 6, no action is required.

·     For reason 7, no action is required.

·     For reason 8, no action is required.

·     For reason 9, no action is required.

·     For reason 10, identify whether the interface configured with the VRRP group has failed: Use the display interface command to check the state of the interface connected to the VRRP group. If the interface state is down, locate and resolve the interface fault according to the output information.

·     For reason 11, the original highest-priority AVF's weight has failed. Check the reason for the change in the original AVF priority.

·     For reason 12, check the track entry state. You can use the display track command to locate and resolve the track entry fault.

 

VRRP_VMAC_INEFFECTIVE

Message text

The [STRING] virtual router [UINT32] (configured on [STRING]) failed to add virtual MAC: [STRING].

Variable fields

$1: Network protocol type. Options include IPv4 and IPv6.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: The reason for the error is Insufficient hardware resources, indicating a lack of hardware resources

Severity level

3 (Error)

Example

VRRP4/3/VRRP_VMAC_INEFFECTIVE: The IPv4 virtual router 10 (configured on Ethernet0/0) failed to add virtual MAC: Insufficient hardware resources.

Impact

The VRRP group of this device cannot work correctly.

Cause

Failed to add the virtual MAC address.

Recommended action

1.     In probe view, execute the display system internal vrrp kernel virtual-route command to view the virtual router information of the VRRP kernel and collect output information.

2.     If the issue persists, collect configuration data, log messages, and alarm information, and then contact Technical Support for help.

 

VRRP4_MANUAL_PREEMPT_FAILED

Message text

IPv4 virtual router [UINT32] (configured on interface [STRING]) failed to execute manual preemption because the received packet has higher priority.

Variable fields

$1: VRRP group number.

$2: Name of the interface where the VRRP group is configured.

Severity level

6 (Informational)

Example

VRRP4/6/VRRP4_MANUAL_PREEMPT_FAILED: IPv4 virtual router 1 (configured on interface GigabitEthernet1/0/1) failed to execute manual preemption because the received packet has higher priority.

Impact

No negative impact on the system.

Cause

Manual switchover failed, because a VRRP advertisement packet with higher priority is received.

Recommended action

Check the router priority and router state in the VRRP group.


 

VRRP6

This section contains IPv6 VRRP messages.

VRRP_STATUS_CHANGE

Message text

The status of [STRING] virtual router [UINT32] (configured on [STRING]) changed from [STRING] to [STRING]: [STRING].

Variable fields

$1: Network protocol type. Options include IPv4 and IPv6.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: Original status.

$5: Current status.

$6: Reason for status change:

¡     Interface event received—An interface event was received.

¡     IP address deleted—The IP address of the interface configured with the VRRP group is deleted.

¡     The status of the tracked object changed—The status of the associated track entry changed.

¡     VRRP packet received—A VRRP advertisement was received.

¡     Current device has changed to IP address owner—The current device has become the IP address owner.

¡     Master-down-timer expired—The master down timer (3 × VRRP advertisement interval + Skew_Time) expired.

¡     Zero priority packet received—A VRRP packet containing priority 0 was received.

¡     Preempt—Preemption occurred.

¡     Master group drove—The state of the master group changed.

Severity level

6 (Informational)

Example

VRRP6/6/VRRP_STATUS_CHANGE: The status of IPv4 virtual router 10 (configured on Ethernet0/0) changed from Backup to Master: Master-down-timer expired.

Impact

No negative impacts on the system.

Cause

The VRRP group status changed because of the following reasons:

1.     An interface event was received.

2.     The virtual IP address has been deleted.

3.     The status of the associated track entry changed.

4.     A VRRP advertisement was received.

5.     The current device has become the IP address owner.

6.     The master down timer (3 × VRRP advertisement interval + Skew_Time) expired.

7.     A VRRP packet containing priority 0 was received.

8.     Preemption occurred.

9.     The state of the master group changed.

Recommended action

Take an action according to the reason for the change in VRRP status carried in the log:

·     For reason 1, identify whether the interface where the VRRP group is located has failed

Execute the display interface command on both local and remote ends to check the status of the interface connected to the VRRP group. If the interface state is down, locate and handle the interface fault according to the output information.

·     For reason 2, identify whether the interface IP address is deleted. Execute the display interface brief command on the local end to view the device interface IP address. If the interface IP address is deleted, execute the ip address or ipv6 address command in interface view to configure an IP address again.

·     For reason 3, first execute the display vrrp command to obtain the associated track entry ID, and then use the display track command to locate and resolve the track entry fault.

·     For reason 4, no action is required

·     For reason 5, the recommended action is as follows:

Identify whether it is necessary to configure the local device as the IP address owner of the VRRP group: Execute the display vrrp command without parameters on the local device to view the virtual IP address of the VRRP group. Execute the display interface brief command on the local device to view the IP address of the device interface, and locate the interface with the same IP address as the VRRP group. A device with an interface IP address the same as the virtual IP address is called the IP address owner. An IP address owner in the VRRP group is the master as long as it is working correctly.

¡     If the device needs to be configured as the IP address owner, no action is required

¡     If the device does not need to be configured as the IP address owner, use the vrrp vrid command in interface view to edit the virtual IP address of the VRRP group

·     For reason 6, the recommended action is as follows:

¡     Identify whether the remote device is faulty. Execute the display vrrp command on the remote device. If the State field value is Initialize, the device is faulty. Locate the cause and recover the remote device.

¡     Identify whether the interface connected to the VRRP group is faulty. Execute the display interface command on both the local and remote ends to check the state of the interface connected to the VRRP group. If the interface state is down, locate and resolve the interface fault according to the output information.

¡     Identify whether a VRRP configuration error exists. Execute the display current-configuration | inculde vrrp command on both the local and remote ends to filter VRRP configuration. The VRRP configuration on both the local and remote ends has the following requirements:

The VRRP group number and the virtual IP address must be the same on both the local and remote ends. If they are different, use the vrrp ipv6 vrid command to configure the settings again.

·     For reason 7, the recommended action is as follows:

¡     Execute the display vrrp verbose command on both the local and remote ends to view the configured VRRP priority (Config pri field):

If the configuration is correct, no action is required.

If the configuration is incorrect, use the vrrp vrid priority command in interface view to edit the configuration.

¡     Execute the display vrrp verbose command on both the local and remote ends to view the configured VRRP priority (Config pri field) and the actual effective VRRP priority (Running pri field). If the two values are different, further check the associated track entry ID, and use the display track command to locate and resolve the track entry fault

·     For reason 8, if the preemption is manually triggered by the administrator, no action is required. For automatic preemption, the monitored object is faulty, and further confirmation of the cause of automatic preemption is needed.

·     For reason 9, execute the display vrrp verbose command on the local device, locate the associated management VRRP group name according to the value of the Follow Name field, and then take further actions according to the value of the reason in the management VRRP group trap.

·     If the issue persists, collect the configuration data, log messages, and alarm information, and then contact Technical Support for help.

 

VRRP_VF_STATUS_CHANGE

Message text

The [STRING] virtual router [UINT32] (configured on [STRING]) virtual forwarder [UINT32] detected status change (from [STRING] to [STRING]): [STRING].

Variable fields

$1: Network protocol type. Options include IPv4 and IPv6.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: VF ID.

$5: Original status of VF. Options include:

·     ActiveThe VF is forwarding data.

·     ListeningThe VF is in backup state.

·     Initialize—The VF is in initialization state.

$6: Current status of VF. Options include:

·     ActiveThe VF is forwarding data.

·     ListeningThe VF is in backup state.

·     Initialize—The VF is in initialization state.

$7: Reason for the status change. Options include:

·     Weight changed

·     Adding virtual MAC address failed

·     ConcededReceived a message with VF priority 0, and actively removed the forwarding permissions

·     Learnt from Advertisement

·     Reply received—Received a reply message.

·     Release received—Received release message.

·     Active timer expired

·     Time-out timer expired

·     Self-allocated—The master allocated a virtual MAC address to itself.

·     VRRP down—The VRRP group went down.

·     Take over—Took over as the AVF.

·     The status of the tracked object changed

Severity level

6 (Informational)

Example

VRRP6/6/VRRP_VF_STATUS_CHANGE: The IPv4 virtual router 10 (configured on GigabitEthernet5/1) virtual forwarder 2 detected status change (from Active to Initialize): Weight changed.

Impact

No negative impact on the system for normal switchover. If the VF status is abnormal after the switchover, services might be interrupted.

Cause

Possible reasons include:

1.     Weight change.

2.     Failed to add virtual MAC address.

3.     Received a message with VF priority 0, and actively removed the forwarding permissions

4.     Learned from an advertisement message

5.     Received a reply message

6.     Received a release message

7.     Active timer timed out

8.     Timeout timer timed out

9.     The master allocated a virtual MAC address to itself.

10.     The VRRP group went down

11.     Took over as the AVF.

12.     The status of the tracked object changed

Recommended action

Take an action based on the VRRP status change reason in the log message:

·     For reason 1, check the configured VRRP priority (Config pri field) and the actual effective VRRP priority (Running pri field). If the two values are different, further check the associated track entry number. Use the display track command to locate and resolve the track entry fault.

·     For reason 2, locate the root cause of the MAC operation failure and resolve it

·     For reason 3, identify whether a VRRP group with a priority higher than the local priority exists in the network:

¡     If the configuration is correct, no action is needed

¡     If the configuration is incorrect, edit the configuration by using the vrrp vrid priority command in interface view

·     For reason 4, no action is required.

·     For reason 5, no action is required.

·     For reason 6, no action is required.

·     For reason 7, no action is required.

·     For reason 8, no action is required.

·     For reason 9, no action is required.

·     For reason 10, identify whether the interface configured with the VRRP group has failed: Use the display interface command to check the state of the interface connected to the VRRP group. If the interface state is down, locate and resolve the interface fault according to the output information.

·     For reason 11, the original highest-priority AVF's weight has failed. Check the reason for the change in the original AVF priority.

·     For reason 12, check the track entry state. You can use the display track command to locate and resolve the track entry fault.

 

VRRP_VMAC_INEFFECTIVE

Message text

The [STRING] virtual router [UINT32] (configured on [STRING]) failed to add virtual MAC: [STRING].

Variable fields

$1: Network protocol type. Options include IPv4 and IPv6.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: The reason for the error is Insufficient hardware resources, indicating a lack of hardware resources

Severity level

3 (Error)

Example

VRRP6/3/VRRP_VMAC_INEFFECTIVE: The IPv4 virtual router 10 (configured on Ethernet0/0) failed to add virtual MAC: Insufficient hardware resources.

Impact

The VRRP group of this device cannot work correctly.

Cause

Failed to add the virtual MAC address.

Recommended action

1.     In probe view, execute the display system internal vrrp ipv6 kernel virtual-route command to view the virtual router information of the VRRP kernel and collect output information.

2.     If the issue persists, collect configuration data, log messages, and alarm information, and then contact Technical Support for help.

 

VRRP6_MANUAL_PREEMPT_FAILED

Message text

IPv6 virtual router [UINT32] (configured on interface [STRING]) failed to execute manual preemption because the received packet has higher priority.

Variable fields

$1: VRRP group number.

$2: Name of the interface where the VRRP group is configured.

Severity level

6 (Informational)

Example

VRRP6/6/VRRP6_MANUAL_PREEMPT_FAILED: IPv6 virtual router 1 (configured on interface GigabitEthernet1/0/1) failed to execute manual preemption because the received packet has higher priority.

Impact

No negative impact on the system.

Cause

Manual switchover failed, because a VRRP advertisement packet with higher priority is received.

Recommended action

Check the router priority and router state in the VRRP group.

 

VSRP messages

This section contains VSRP messages.

VSRP_BIND_FAILED

Message text

Failed to bind the IP addresses and the port on VSRP peer [STRING].

Variable fields

$1: VSRP peer name.

Severity level

6 (Informational)

Example

VSRP/6/VSRP_BIND_FAILED: Failed to bind the IP addresses and the port on VSRP peer aaa.

Impact

The control channel for the VSRP instance might fail to be established. When the VSRP-associated service module cannot determine the master and backup devices, VSRP might not determine the master and backup devices either, affecting correct operation of VSRP.

Cause

The system memory resources are insufficient.

Recommended action

4.     Release the memory. For example, execute the logfile save command to manually save all content in the log file buffer to log files, releasing memory resources occupied by the log file buffer.

1.     Execute the display memory command to view process memory usage:

¡     If the memory usage drops below the alarm threshold, the memory alarm is cleared, and no further action is required.

¡     If the memory usage does not drop below the alarm threshold, execute the display process command to view memory usage of user processes. If a specific process occupies too much memory, you can enable or disable the process-associated software feature to release the memory.

2.     If the issue persists, collect alarm information and configuration data, and then contact Technical Support for help.

 

 

WIPS messages

This section contains WIPS messages.

APFLOOD

Message text

-VSD=[STRING]; AP flood detected.

Variable fields

$1: VSD name.

Severity level

5 (Notification)

Example

WIPS/5/APFLOOD: -VSD=home; AP flood detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

The number of APs detected in the specified VSD reached the threshold.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

AP_CHANNEL_CHANGE

Message text

-VSD=[STRING]-SrcMAC=[MAC]; Channel change detected.

Variable fields

$1: VSD name.

$2: MAC address of the AP.

Severity level

5 (Notification)

Example

WIPS/5/AP_CHANNEL_CHANGE: -VSD=home-SrcMAC=1122-3344-5566; Channel change detected.

Impact

The AP channel has changed, which might affect the channels of other APs in operation.

Cause

The channel of the specified AP changed.

Recommended action

Determine whether the channel change is valid.

 

ASSOCIATEOVERFLOW

Message text

-VSD=[STRING]-SrcMAC=[MAC]; Association/Reassociation DoS attack detected.

Variable fields

$1: VSD name.

$2: MAC address of the AP.

Severity level

5 (Notification)

Example

WIPS/5/ASSOCIATEOVERFLOW: -VSD=home-SrcMAC=1122-3344-5566; Association/Reassociation DoS attack detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

The specified AP sent an association response with the status code 17.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

HONEYPOT

Message text

-VSD=[STRING]-SrcMAC=[MAC]; Honeypot AP detected.

Variable fields

$1: VSD name.

$2: MAC address of the AP.

Severity level

5 (Notification)

Example

WIPS/5/HONEYPOT: -VSD=home-SrcMAC=1122-3344-5566; Honeypot AP detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

The specified AP was detected as a honeypot AP.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

HTGREENMODE

Message text

-VSD=[STRING]-SrcMAC=[MAC]; HT-Greenfield AP detected.

Variable fields

$1: VSD name.

$2: MAC address of the AP.

Severity level

5 (Notification)

Example

WIPS/5/HTGREENMODE: -VSD=home-SrcMAC=1122-3344-5566; HT-Greenfield AP detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

The specified AP was detected as an HT-greenfield AP.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

MAN_IN_MIDDLE

Message text

-VSD=[STRING]-SrcMAC=[MAC]; Man-in-the-middle attack detected.

Variable fields

$1: VSD name.

$2: MAC address of the client.

Severity level

5 (Notification)

Example

WIPS/5/MAN_IN_MIDDLE: -VSD=home-SrcMAC=1122-3344-5566; Man-in-the-middle attack detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

The specified client suffered a man-in-the-middle attack.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_DOS

Message text

-VSD=[STRING]; [STRING] rate attack detected.

Variable fields

$1: VSD name.

$2: Device type: AP or client.

Severity level

5 (Notification)

Example

WIPS/5/WIPS_DOS: -VSD=home; AP rate attack detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

The number of device entries learned within the specified interval reached the threshold.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_FLOOD

Message text

-VSD=[STRING]-SrcMAC=[MAC]; [STRING] flood detected.

Variable fields

$1: VSD name.

$2: Attacker's MAC address.

$3: Flood attack type. Options include the following:

·     Association request

·     Authentication

·     Disassociation

·     Reassociation request

·     Deauthentication

·     Null data

·     Beacon

·     Probe request

·     BlockAck

·     CTS

·     RTS

·     EAPOL start

Severity level

5 (Notification)

Example

WIPS/5/WIPS_FLOOD: -VSD=home-SrcMAC=1122-3344-5566; Association request flood detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

The number of a specific type of packets detected within the specified interval reached the threshold.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_MALF

Message text

-VSD=[STRING]-SrcMAC=[MAC]; Error detected: [STRING].

Variable fields

$1: VSD name.

$2: Sender's MAC address.

$3: Malformed packet type. Options include the following:

·     invalid ie length—Invalid IE length.

·     duplicated ie—Duplicate IE.

·     redundant ie—Redundant IE.

·     invalid pkt length—Invalid packet length.

·     illegal ibss ess—Abnormal IBSS and ESS setting.

·     invalid source addr—Invalid source MAC address.

·     overflow eapol key—Oversized EAPOL key.

·     malf auth—Malformed authentication request frame.

·     malf assoc req—Malformed association request frame.

·     malf ht ie—Malformed HT IE.

·     large duration—Oversized duration.

·     null probe resp—Malformed probe response frame.

·     invalid deauth code—Invalid deauthentication code.

·     invalid disassoc code—Invalid disassociation code.

·     over flow ssid—Oversized SSID.

·     fata jack—FATA-Jack.

Severity level

5 (Notification)

Example

WIPS/5/WIPS_MALF: -VSD=home-SrcMAC=1122-3344-5566; Error detected: fata jack.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

A malformed packet was detected.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_ROGUE

Message text

-VSD=[STRING]-SrcMAC=[MAC]; Rogue AP detected by radio [UINT32] of sensor [STRING] on channel [UINT32] (RSSI=[UINT32]).

Variable fields

$1: VSD name.

$2: MAC address of the rogue AP.

$3: Radio ID of the sensor.

$4: Sensor name.

$5: Channel number of the sensor.

$6: Signal strength of the sensor.

Severity level

5 (Notification)

Example

WIPS/5/WIPS_ROGUE: -VSD=home-SrcMAC=1122-3344-5566; Rogue AP detected by radio 1 of sensor ap1 on channel 149 (RSSI=84).

Impact

Rogue APs exist in the wireless network, which might affect the wireless performance.

Cause

Rogue APs are detected in the specified VSD.

Recommended action

1.     Use the display wips virtual-security-domain device ap rogue command to display information about the rogue APs detected in the specified VSD.

¡     If only a few rogue APs exist and wireless services are not affected, no action is required.

¡     If wireless services are affected, proceed to the next step.

2.     Configure countermeasures against rogue APs.

3.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_SIGNATURE

Message text

-VSD=[STRING]-SrcMAC=[MAC]-RuleID=[UINT16]; Signature rule matched.

Variable fields

$1: VSD name.

$2: MAC address of the sender.

$3: ID of the matching Signature rule.

Severity level

5 (Notification)

Example

WIPS/5/WIPS_SIGNATURE: -VSD=home-SrcMAC=1122-3344-5566-RuleID=10; Signature rule matched.

Impact

Attacks exist in the wireless network, which might affect the wireless performance.

Cause

The system detected a packet matching a Signature rule in the specified VSD.

Recommended action

1.     Verify if the device is under attacks.

2.     Take countermeasures against the attacker device.

3.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_SPOOF

Message text

-VSD=[STRING]-SrcMAC=[MAC]; [STRING] detected.

Variable fields

$1: VSD name.

$2: MAC address of the device being spoofed.

$3: Spoofing attack type. Options include the following:

·     AP spoofing AP—A fake AP spoofs an authorized AP.

·     AP spoofing client—A fake AP spoofs an authorized client.

·     AP spoofing ad-hoc—A fake AP spoofs an Ad hoc device.

·     Ad-hoc spoofing AP—An Ad hoc device spoofs an authorized AP.

·     Client spoofing AP—A client spoofs an authorized AP.

Severity level

5 (Notification)

Example

WIPS/5/WIPS_SPOOF: -VSD=home-SrcMAC=1122-3344-5566; AP spoofing AP detected.

Impact

Attacks are present in the current environment, which might affect wireless performance.

Cause

A spoofing attack was detected.

Recommended action

1.     Configure countermeasures against the attacking device.

2.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_UNAUTH

Message text

-VSD=[STRING]-SrcMAC=[MAC];Unauthorized client detected by radio [UINT32] of sensor [STRING] on channel [UINT32] (RSSI=[UINT32]).

Variable fields

$1: VSD name.

$2: MAC address of the Unauth client.

$3: Radio ID of the sensor.

$4: Sensor name.

$5: Channel number of the sensor.

$6: Signal strength of the sensor.

Severity level

5 (Notification)

Example

WIPS/5/WIPS_UNAUTH: -VSD=home-SrcMAC=1122-3344-5566; Unauthorized client detected by radio 1 of sensor ap1 on channel 149 (RSSI=84).

Impact

Unauthorized clients exist in the wireless network, which might affect the wireless performance.

Cause

Unauth clients are detected in the specified VSD.

Recommended action

1.     Use the display wips virtual-security-domain device client unauthorized command to display information about unauthorized clients in the specified VSD.

¡     If only a few unauthorized clients exist and wireless services are not affected, no action is required.

¡     If wireless services are affected, proceed to the next step.

2.     Configure countermeasures against unauthorized clients.

3.     If the issue persists, collect the device configuration file, log information, and alarm information, and contact Technical Support.

 

WIPS_WEAKIV

Message text

-VSD=[STRING]-SrcMAC=[MAC]; Weak IV detected.

Variable fields

$1: VSD name.

$2: Sender's MAC address.

Severity level

5 (Notification)

Example

WIPS/5/WIPS_WEAKIV: -VSD=home-SrcMAC=1122-3344-5566; Weak IV detected.

Impact

Using Weak IV encryption increases the risk of the key being cracked, affecting wireless security.

Cause

A Weak IV was detected.

Recommended action

Use a more secure encryption method to encrypt packets.

 

WIRELESSBRIDGE

Message text

-VSD=[STRING]-AP1=[MAC]-AP2=[MAC]]; Wireless bridge detected.

Variable fields

$1: VSD name.

$2: MAC address of AP 1.

$3: MAC address of AP 2.

Severity level

5 (Notification)

Example

WIPS/5/WIRELESSBRIDGE: -VSD=home-AP1=1122-3344-5566-AP2=7788-9966-5544; Wireless bridge detected.

Impact

Detecting a wireless bridge indicates the presence of a security risk in the current wireless network.

Cause

The specified APs set up a wireless bridge.

Recommended action

Determine whether the wireless bridge is valid.

 

WSA messages

This section contains Wireless Spectrum Analysis (WSA) messages.

WSA_DEVICE

Message text

[APID: UINT32, RADIOID: UCHAR]; [STRING] detected.

Variable fields

$1: AP ID.

$2: Radio ID.

$3: Interference devices. Options include the following:

¡     Microwave ovens.

¡     Microwave oven inverters.

¡     Bluetooth devices.

¡     Other fixed frequency devices.

¡     Cordless phones using fixed frequency.

¡     Video devices using fixed frequency.

¡     Audio devices using fixed frequency.

¡     Other hopper frequency devices.

¡     Frequency-hopping cordless phone bases.

¡     Frequency-hopping cordless networks (2.4 GHz).

¡     Microsoft Xboxes.

¡     Other devices.

¡     Frequency-hopping cordless networks (5 GHz).

Severity level

5

Example

WSA/5/WSA_DEVICE: [APID: 1, RADIODID: 2]; Bluetooth devices detected.

Explanation

The radio interface of an AP detected an interference device.

Recommended action

Determine whether the device has suffered an attack.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网