AD-Campus 6.2 Operations Monitoring Deployment Guide-5W100

HomeSupportAD-NET(SDN)H3C AD-CampusDiagnose & MaintainOperations MonitoringAD-Campus 6.2 Operations Monitoring Deployment Guide-5W100
Download Book

AD-Campus 6.2 Operations Monitoring

Deployment Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Document version: 5W100-20230221

 

Copyright © 2023 New H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.

Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.

The information in this document is subject to change without notice.


Contents

Overview·· 1

Unified Platform as the network operations monitoring platform·· 2

Prerequisites· 2

Configure the physical devices for operations monitoring· 2

Configure Unified Platform for network operations monitoring· 3

Deploy DNS services· 3

Example: Send alarm notifications via SMS· 4

Example: Send alarm notifications via email 8

Example: Send alarms notifications via WeChat 12

Example: Send alarm notifications via WeCom·· 27

Filter, clear, or acknowledge alarms· 42

View global resource monitoring information· 46

Monitor network devices· 48

Review system logs· 51

Configure system log settings· 51

Example: Upgrade system logs to alarm notifications· 51

Use an external platform for network operations monitoring· 55

Configure Unified Platform to send controller system logs to an external operations monitoring platform   55

Configure the physical devices to send system log messages and SNMP notifications to an external platform   55

Obtain alarms reference documents· 57

Obtain alarm or log messages reference· 57

Obtain trap definitions from Unified Platform·· 58

Appendix A  Alarm and trap management on Unified Platform·· 61

Manage alarms on Unified Platform·· 61

Manage system alarms· 61

Alarm messages reference· 65

Obtain trap definitions from Unified Platform·· 68

Log in to Unified Platform·· 68

View trap definitions· 68

Filter trap definitions· 69

Commonly used filtering criteria· 70

Appendix B  Logs· 71

Introduction to vDHCP logs· 71

Viewing operation logs· 71

Syslog message format 71

Using this document 73

DHCP· 73

DHCP_NORESOURCES· 73

DHCP_NOTSUPPORTED·· 74

DHCPS· 74

DHCPS_ALLOCATE_IP· 74

DHCPS_CONFLICT_IP· 75

DHCPS_EXTEND_IP· 75

DHCPS_FILE· 75

DHCPS_RECLAIM_IP· 76

DHCPS_VERIFY_CLASS· 76

DHCPS6· 76

DHCPS6_ALLOCATE_ADDRESS· 77

DHCPS6_ALLOCATE_PREFIX· 77

DHCPS6_CONFLICT_ADDRESS· 78

DHCPS6_EXTEND_ADDRESS· 78

DHCPS6_EXTEND_PREFIX· 79

DHCPS6_FILE· 79

DHCPS6_RECLAIM_ADDRESS· 80

DHCPS6_RECLAIM_PREFIX· 80

VRRP· 80

VRRP_STATUS_CHANGE· 81

VRRP_VF_STATUS_CHANGE· 82

VRRP_VMAC_INEFFECTIVE· 82

EIA messages· 82

Add Access User 83

Update Access User 84

Delete Access User 85

Add Access Service· 86

Update Access Service· 87

Delete Access Service· 88

Add Access Policy· 88

Update Access Policy· 88

Delete Access Policy· 89

Add Access Device· 89

Update Access Device· 90

Delete Access Device· 90

WSM messages· 90

Create Service Template· 90

Modify Service Template· 91

Delete Service Template· 91

Create AP Template· 91

Modify AP Template· 92

Delete AP Template· 92

Service Bind Radio· 92

Create Location View· 93

Modify Location View· 93

Delete Location View· 93

Create Ap Group· 93

MODIFY AP GROUP· 94

DELETE  AP GROUP· 94

 


Overview

With the AD-Campus 6.2 solution, you can use one of the following methods to monitor network operations:

·     Use Unified Platform to monitor network operations.

·     Use an external network operations monitoring platform. This platform receives Syslog and SNMP notifications from the controller or network devices.

The procedure to configure network operations monitoring differs depending on the method you use.


Unified Platform as the network operations monitoring platform

Prompt notification of network issues enables administrators to take quick action on the issues before they deteriorate or interrupt services. Unified Platform supports notifications of alarms via SMS, email, WeChat, and WeCom. The configuration procedure differs by notification method.

Prerequisites

The alarm feature depends on the kernel-base application package. Before you configure Unified Platform to monitor network operations, make sure you have installed the kernel-base application package and its license.

To place a device in maintenance state, make sure you have installed the suspension application package on Unified Platform.

The application packages are licensed-based. For more information about the licenses, see the configuration guides provided by the production department.

Configure the physical devices for operations monitoring

The physical devices (primarily switches and security appliances) use SNMP to push events to the operations monitoring platform. The monitoring platform can also polls the MIBs on the devices to generate alarms.

The following information describes the SNMP configuration procedure on the network devices. If underlay automation is used, some of the SNMP settings are automatically deployed on the incorporated devices and you do not need to configure them.

1.     Enable the information center and the SNMP agent.

[device] info-center enable

[device] snmp-agent

2.     Configure a read-only community string and a read and write community string. Then, enable SNMP versions. This example enables all SNMP versions.

[device] snmp-agent community read public

[device] snmp-agent community write private

[device] snmp-agent sys-info version all

3.     Enable SNMP notifications and enable SNMP notifications for service modules, for example, BGP.

[device] snmp-agent Trap enable

[device] snmp-agent Trap  enable bgp

4.     Specify Unified Platform as a target host to receive SNMP notifications at the northbound service VIP of its cluster. Optionally, configure authentication for security purposes.

¡     Spine/leaf devices:

[device] snmp-agent target-host Trap  address udp-domain  100.1.0.100 vpn-instance vpn-default params securityname public v2c

¡     Access devices:

[device] snmp-agent target-host Trap  address udp-domain  100.1.0.100  params securityname public v2c

5.     Specify Unified Platform as a log host to receive logs at the northbound service VIP of the Matrix cluster.

¡     Spine/leaf devices:

[device] info-center loghost vpn-instance vpn-default 100.1.0.100

¡     Access devices:

[device] info-center loghost 100.1.0.100

Configure Unified Platform for network operations monitoring

Deploy DNS services

If external connectivity is deployed for the data center network, you must deploy a DNS server. The server uses a distributed database to translate domain names to IP addresses. The DNS server listens for requests on UDP port 53.

To deploy a DNS server on Unified Platform:

1.     Open a Web browser and enter https://Matrix_ip_address:8443/matrix/ui in the address bar to log in to Matrix. The Matrix_ip_address argument represents the northbound service VIP of the Matrix cluster.

2.     Navigate to the Deploy > Clusters page, and then click the Cluster Parameters tab.

Figure 1 Cluster parameters

 

3.     Click the Edit icon  to edit the cluster parameters.

4.     Select External DNS server, and then click the  icon next to the Add DNS server field.

Figure 2 Adding a DNS server

 

5.     In the dialog box that opens, enter a DNS server IP address and a service port number, and then click Apply, as shown in Figure 3.

Figure 3 Adding a DNS server

 

6.     Click Apply to deploy the DNS server.

Example: Send alarm notifications via SMS

This example uses the Emay SMS platform to deliver SMS alarm notifications.

Prerequisites

·     Make sure you have license information (serial number and encryption key) for registration with the Emay SMS platform.

·     Make sure SeerEngine-Campus has incorporated the monitored network devices and can receive SNMP notifications from them.

·     Make sure a DNS server address has been specified on Unified Platform and Unified Platform has Internet connectivity.

Configure the SMS center

1.     Open a Web browser, and then enter http://ip_address:30000/central in the address bar to log in to Unified Platform. The ip_address argument represents the northbound service VIP of the Matrix cluster.

2.     Navigate to the System > System Settings > SMSC Settings page.

Figure 4 SMS settings

 

3.     Select the Emay SMS Sender option for the Sending Method field.

4.     Enter the serial number and encryption key for registration with the Emay platform.

5.     In the Internet Connection Info area, click Edit.

6.     In the dialog box that opens, select a connection type, and then click OK.

In this example, select Direct Connection.

Figure 5 Configuring the Internet connection

 

7.     On the SMSC Settings page, click Refresh. Verify that the Internet connection information has been set successfully.

8.     In the SMS Signature area, enter a signature template.

9.     In the Test Info area, enter a test number and the test content.

10.     Click Test to send the test content to the test number. Make sure the SMS message can be sent successfully.

Figure 6 Sending the test SMS message

 

 

Configure alarm forwarding via SMS messages

1.     Log in to Unified Platform.

2.     Navigate to the Monitor> Alarm > Alarm Forwarding Rules page.

Figure 7 Alarm forwarding rules

 

3.     Click Add to add an alarm forwarding rule.

Figure 8 Adding an alarm forwarding rule

 

4.     Configure the alarm forwarding rule:

¡     Rule Name: Assign a name to the rule.

¡     Alarm Severity Levels to be Concerned: Select the severity levels of alarms to be sent via SMS. The system sends alarms via SMS only for the selected severity levels.

¡     Resources to be Concerned: Select resources of interest. The system sends alarms via SMS only for resources of interest. By default, the All Resources option is selected.

¡     Alarm to be Concerned: Select alarms of interest. The system sends only alarms of interest via SMS. This example selects the All Alarms option.

5.     Click SMS Forwarding.

Figure 9 SMS forwarding

 

6.     Specify the period of time during which alarms are generated, enter a phone number, and then click Add. By default, the All option is selected for the Alarm Time field.

Figure 10 Adding mobile phone numbers

 

7.     Click OK.

In the Action Settings area, verify that the SMS alarm forwarding rule has been added.

Figure 11 Adding an SMS alarm forwarding rule

 

8.     Click OK.

Verify that the SMS alarm forwarding rule has been added to the rule list, and the rule is in enabled (On) state.

Figure 12 SMS alarm forwarding rule list

 

9.     When an alarm occurs, the specified mobile phones will receive a notification of the alarm.

Figure 13 Alarm SMS message

 

10.     Navigate to the System > System Settings > SMS Message Records page to view the SMS messages that have been sent.

Figure 14 SMS message records

 

Example: Send alarm notifications via email

Configure Unified Platform to promptly notify remote maintenance staff of alarms via email.

Prerequisites

·     Only a user with administrator permissions can configure the mail server and alarm forwarding rules.

·     Make sure the mail server has been set up successfully and can access the mail sending ports, such as POP and SMTP.

·     Make sure the mail client can send and receive mails through the mail server.

Summary procedure

1.     Add a mail account on the mail server.

2.     Configure the mail server information.

3.     Configure alarm forwarding rules.

4.     Verify the configuration.

Configure the mail server information

To send mail notifications, you must first specify a mail server.

1.     Log in to Unified Platform, and then navigate to the System > System Settings > Mail Server Settings page.

Figure 15 Mail server settings

 

2.     Configure the mail server settings:

¡     Server Address: Enter the domain name or IP address of the mail server. In this example, use the address of the mail server set up on the internal network.

¡     Server Port: Enter the port number of the mail server. The default is 25.

¡     Secure Connection (SSL/TLS): Select TLSv1, TLSv1.1, TLSv1.2, or SSL for secure connection to the server. If a secure connection is not required, select None.

¡     Client Authentication: Specify the same client authentication settings as those on the server. If client authentication is enabled on the mail server, you must also enable client authentication for the mail server in the system, and enter the sender's username and password. If the mail server does not require client authentication, do not configure client authentication.

¡     Sender’s Mail Address: Enter the mail address of the sender. In this example, enter [email protected].

3.     Click Send Test Mail to test server connectivity and correctness of the username and password.

 

 

NOTE:

If the mail server cannot be pinged, the system makes continuous attempts to send the test mail until the mail is sent successfully or the maximum number of attempts is reached.

 

Figure 16 Successful mail test

 

4.     Click OK.

Add an alarm forwarding rule

1.     Navigate to Monitor > Alarm > Alarm Forwarding Rules.

2.     Click Add.

Figure 17 Adding an alarm forwarding rule

 

3.     Configure the alarm forwarding rule:

¡     Rule Name: Assign a name to the mail alarm forwarding rule. In this example, enter test.

¡     Alarm Severity Levels to be Concerned: Select one or multiple alarm severity levels of interest. Use the default settings in this example.

¡     Resources to be Concerned:

-     To forward alarms generated by any resources, select the All Resources option.

-     To forward alarms generated by only resources of interest, select the Selected Resources option, and then select resources or resource groups of interest. If you select a group, all resources in that group are selected.

¡     Alarms to be Concerned:

-     To forward all alarms, select the All Alarms option.

-     To forward only a subset of alarms, select the Selected Alarms option, and then click Select. In the dialog box that opens, select alarms of interest.

Figure 18 Configuring alarm forwarding via email

 

4.     In the Action Settings area, click Email Forwarding.

5.     Configure the alarm forwarding rule:

¡     Alarm Time: Specify the period of time during which alarms are generated. Select the All or Custom option.

-     All: The system forwards alarms regardless of when they are generated.

-     Custom: The system forwards only alarms generated within the selected time span. For example, if you set the time span to 00:00-23:59 for a day, the system forwards all alarms generated on this day.

This example uses the default setting.

¡     Mail Address: Specify the mail addresses for receiving alarm notification mails. You can specify one or multiple unique mail addresses. The mail address format is login_username@host_name.domain_name. In this example, enter [email protected].

6.     Click OK to add the alarm forwarding rule.

Figure 19 Email alarm forwarding rule added successfully

 

 

NOTE:

If an alarm matches multiple alarm forwarding rules, the alarm is forwarded based on each matching rule. If the matching rules contain the same destination (for example, the same mail address, mobile phone number, or message template), the system sends only one notification of the alarm to that destination.

 

Verify the configuration

Access the mail box for receiving alarm notifications to verify that it can receive alarm notifications of interest pushed by Unified Platform.

After receiving an alarm notification, you can log in to Unified Platform to process the alarm.

Figure 20 Receiving an alarm notification

 

Example: Send alarms notifications via WeChat

This example uses a subscription account that has passed WeChat authentication to introduce the configuration procedures.

Restrictions and guidelines

·     To apply for a WeChat official account, go to the WeChat official accounts platform. For more information, access https://mp.weixin.qq.com/.

·     The system does not support WeChat-based authentication for private subscription accounts. Do not select the private application entity type when you apply for a subscription account.

Prerequisites

·     SeerEngine-Campus has incorporated the monitored network devices and Unified Platform can receive SNMP notifications from them.

·     A DNS server address has been specified on Unified Platform.

·     The real addresses of the Unified Platform servers can communicate with the WeChat platform.

Configure a WeChat subscription account

1.     Open a Web browser, and then enter https://mp.weixin.qq.com/ in the address bar to access the WeChat official accounts platform.

Figure 21 Homepage of the WeChat official account platform

 

2.     Scan the QR code with WeChat or click Log in via password to log in the platform. The official account page opens after you log in successfully.

3.     From the left navigation pane, select Settings and Development > Interface Privilege.

4.     On the page that opens, verify that access to the APIs required for alarm forwarding via WeChat has been granted.

You must obtain access to the following APIs:

¡     Get access_token

¡     Customer service API

¡     Get user list

¡     Get user's basic information

You can also obtain access to any other APIs as needed. If access to an API is not obtained, click the Help icon  next to the Not obtained value in the API status column to view information about obtaining access rights to APIs.

Figure 22 Interface privilege

 

5.     From the left navigation pane, select Settings and Development > Basic Configuration.

Figure 23 Basic configuration

 

6.     Click the Enable link next to the Developer Password(AppSecret) option in the Official Account development information area.

Figure 24 Setting a developer password

 

7.     Use WeChat to scan the QR code for authentication. The page for setting the developer password opens after authentication succeeds.

Figure 25 Password verification

 

8.     Enter the official account password and the verification code. Then, click Next.

9.     On the page that opens, review the following developer information:

¡     AppID: The developer ID uniquely identifies the official account developer. You must provide this ID and the developer password (AppSecret) in pairs to call the APIs for the official account. Unified Platform uses the AppID and AppSecret to communicate with the WeChat server.

¡     AppSecret: The password provided to authenticate the developer's identity for security.

 

IMPORTANT

IMPORTANT:

After this page closes, the WeChat official account platform does not store or display the AppSecret. As a best practice, copy and save the AppSecret and AppID to a document for future use.

 

Figure 26 Viewing the developer password

 

10.     After you copy and save the AppSecret and AppID, select I have learned that AppSecret will not be stored in the Official Accounts Platform and have copied and saved the AppSecret, and then click Confirm and Next to enter the page showing that the developer setting has been completed.

Figure 27 Developer setting completed

 

11.     If all information is correct, click Done. Then, the system returns to the basic configuration page. If you forget your AppSecret, click the Reset link next to the Developer Password(AppSecret) option in the Official Account development information area to reset the AppSecret.

Figure 28 Resetting the AppSecret of a developer

 

12.     Click the Configuration link next to the IP whitelist field in the Official Account development information area. On the page that opens, add trusted IP addresses to the IP whitelist.

When you obtain the access_token API through the developer ID, you must add the source IP to the whitelist. For the purpose of this example, add the northbound service VIP of the Matrix cluster to the whitelist. This IP address is publicly accessible to the Internet. To specify multiple IP addresses, press Enter after inputting an IP address.

Figure 29 Adding IP addresses to the IP whitelist

 

13.     Click Confirm modification. The authentication page opens.

Figure 30 Authentication

 

14.     If identity authentication succeeds, a page opens displaying the IP addresses added to the whitelist.

Figure 31 Viewing the IP whitelist

 

15.     Click Close.

16.     To edit the IP whitelist, click the View link next to the IP whitelist field.

Add the WeChat official account to Unified Platform

1.     Log in to Unified Platform, and then navigate to the Monitor > Alarm > Alarm Forwarding Rules page.

Figure 32 Alarm forwarding rules

 

2.     Click Add. The page for adding an alarm forwarding rule opens.

Figure 33 Adding an alarm forwarding rule

 

3.     Click Wechat Config in the Action Settings area. From the left navigation pane, select WeChat Official Account Platform > Official Accounts.

Figure 34 WeChat official account platform-Official accounts

 

4.     Click Add.

5.     Configure the official account parameters:

¡     Official Account Name: Enter a self-defined official account name.

¡     Official Account Description: Enter a description for the official account.

¡     Official Account Type: Select an official account type. Options include Subscription and Service. This example selects Subscription.

¡     Token: Information used by Unified Platform to identify the WeChat official account platform as the source of a message. You can define the token as needed, except that it must be an alphanumeric string of 3 to 32 characters and start with a letter. In this example, the token is qwer123456.

¡     AppID and AppSecret: Enter the AppID and AppSecret you obtained previously.

Figure 35 Adding an official account

 

6.     Click OK. The system returns to the official account page. Click the official account link in the Official Account Name column. The official account details page opens.

Figure 36 Official account details

 

7.     Record the ID and token displayed on this page for future use.

8.     Click Back to return to the official account page. Click the follower link in the Followers column for an official account. The follower list page opens.

Figure 37 Viewing the follower list

 

9.     Click the link in the Send Test Message column for a follower to open the Send Test Message page.

Figure 38 Sending a test message

 

10.     In the Message Content field, enter a test message, and click OK to send the test message to the follower. To view the status of the test message, select WeChat Official Account Platform > Message Records.

Figure 39 Message records

 

11.     Navigate to the WeChat Official Account Platform > Message Templates page. A message template specifies the official account for alarms and the target followers.

Figure 40 Message templates

 

12.     Click Add.

13.     Configure the message template parameters:

¡     Message Templates: Enter a message template name, a string of 1 to 32 characters.

¡     Official Accounts: Select official accounts to receive alarm notifications from Unified Platform.

¡     Followers: Select the followers to whom the alarm notifications will push.

Figure 41 Adding a message template

 

14.     Click OK.

15.     On the Message Templates page that opens, verify that the message template has been added.

Figure 42 Newly added message template

 

 

NOTE:

·     When you delete an account, Unified Platform automatically deletes its followers.

·     You cannot delete an official account that has been bound to a message template. To identify the name of the bound message template, view the official account details.

·     The system determines that the test message has failed to be sent to the selected follower if that follower does not interact with its subscription account within 24 hours after subscription. This issue is removed after the follower sends a message to the official account.

·     If a follower specified in the message template has unfollowed the official account, Unified Platform removes that follower from the message template automatically.

 

Configure the WeChat official account server

1.     Log in to the WeChat official accounts platform.

2.     From the left navigation pane, select Settings and Development > Basic Configuration.

3.     In the server configuration (disabled) area, click Change Configuration. The Fill in server configuration page opens.

4.     Configure the server:

¡     URL: Enter the URL in the format of http://Unified Platform’s northbound service VIP:port/Wechat/weChat/WechatServlet/ID or http://domain name/Wechat/weChat/WechatServlet/ID. In the URL, replace the ID argument with the ID you have obtained when you added the account, and replace the port argument with the service port number.

¡     Token: Enter the token value you have specified on Unified Platform for the official account.

¡     EncodingAESKey: Enter the encryption and decryption key for the message body. You can manually enter one or randomly generate one.

¡     Message Encryption Method: Select a method as needed. This example selects Plaintext Mode.

Figure 43 Specifying the server configuration

 

5.     Click Submit.

6.     In the dialog box that opens, click Confirm.

The system returns to the basic configuration page.

7.     On the basic configuration page, click Enable to enable the server configuration.

Configure alarm forwarding rules

1.     Log in to Unified Platform, navigate to the Monitor > Alarm > Alarm Forwarding Rules page, and then click Add to add an alarm forwarding rule.

2.     Configure an alarm forwarding rule:

¡     Rule Name: Enter an alarm forwarding rule name, a string of 1 to 32 characters.

¡     Alarm Severity Levels to be Concerned: Select alarm severity levels of interest. The system sends alarm notifications only for the specified severity levels. Available options are Critical, Major, Minor, Warning, and Info.

¡     Resources to be Concerned: Select resources of interest. Available options are All Resources and Selected Resources. By default, the All Resources option is selected. Unified Platform sends notifications of alarms generated by all resources. To send notifications of alarms generated by only some of the resources, select the Selected Resources option, and then select resource groups or resources of interest. This example uses the All Resources option.

¡     Alarms to be Concerned: Select alarms of interest. Available options are All Alarms and Selected Alarms. By default, the All Alarms option is selected. Unified Platform sends notifications of all alarms. To send notifications of only some of the alarms, select the Selected Alarms option, and then select traps. You can also configure parameters for traps. If you configure parameters for selected traps, Unified Platform sends notifications of only alarms that match the configured parameters. This example uses the All Alarms option.

 

 

NOTE:

Traps are one form of SNMP notifications. This document uses traps and SNMP notifications interchangeably.

 

Figure 44 Adding an alarm forwarding rule

 

3.     Click Wechat Config in the Action Settings area.

4.     Specify the period of time during which alarms are generated. Select the All or Custom option.

¡     All: The system forwards alarms regardless of when they are generated.

¡     Custom: The system forwards only alarms generated within the selected time span.

This example selects the All option.

Figure 45 WeChat forwarding

 

5.     Click Select. On the page that opens, select a WeChat forwarding message template.

Figure 46 Selecting a WeChat forwarding message template

 

6.     Click OK.

The system returns to the WeChat forwarding page.

7.     On the WeChat forwarding page, verify that the selected message template has been added.

Figure 47 Message template added successfully

 

8.     Click OK.

The system returns to the page for adding the alarm forwarding rule.

9.     In the Action Settings area, view the newly added WeChat forwarding action and edit or delete it as needed.

Figure 48 Adding an alarm forwarding rule

 

10.     Click OK.

The system returns to the Alarm Forwarding Rules page.

11.     Verify that the alarm forwarding rule has been added. Then, you can enable, edit, or delete it as needed.

Figure 49 Alarm forwarding results

 

Verify the configuration

Verify that you can receive alarms that match the configured conditions from Unified Platform in the WeChat official account on your mobile phone.

Verify that you can log in to Unified Platform to process the alarms.

Figure 50 Receiving forwarded alarms in WeChat

 

Example: Send alarm notifications via WeCom

Register a WeCom account

1.     Access https://work.weixin.qq.com.

Figure 51 Registering a WeCom account

 

2.     Click Sign Up to register a WeCom account.

Figure 52 Entering WeCom account registration information

 

3.     Enter the company and administrator information, and then scan the QR code with the administrator's WeChat account to bind the WeCom account to the administrator's WeChat account.

Figure 53 Entering WeCom account registration information

 

4.     Select I agree to and abide by Tencent WeCom Service Agreement Privacy Policy Authorization Agreement on Use of Red Packets, and then click Register.

Create an app

1.     Log in to WeCom with the registered account. On the top navigation bar, click App Management.

Figure 54 App management

 

2.     Click the Create an app  icon to enter the Create an app page.

Figure 55 Creating an app

 

3.     Configure the app information, or use an existing mini program to add an app. This example configures the app as follows:

¡     App Logo: Click the logo icon, and click Select image to select an image as the app logo. Click Save to save the configuration.

¡     App Name: Enter an app name. In this example, enter Alarms.

¡     About this App (Optional): Enter information about the app to help users learn about its functionality. This example uses the app to receive system alarm notifications.

¡     Allowed users: Select departments or members that can access this app.

4.     Click Create an app.

View information about the WeCom account

Before you configure Unified Platform to send alarm notifications via WeCom, you must first obtain the company ID and application secret of the WeCom account.

1.     On the top navigation bar, click My Company. On the page that opens, identify the company ID.

Figure 56 Identifying the company ID

 

2.     On the top navigation bar, click App Management. Click the newly added app to view detailed information about the app.

Figure 57 Viewing app information

 

3.     Click the View link next to the Secret field.

Figure 58 Viewing secret information

 

4.     Click Send to send the secret to the administrator's WeCom account.

Figure 59 Viewing the secret information as the administrator

 

5.     Click the View Now link to view the secret.

Configure the WeCom account in Unified Platform

Add the WeCom account

1.     Log in to Unified Platform, and then navigate to the Monitor > Alarm > Alarm Forwarding Rules page. The alarm forwarding rule list displays all alarm forwarding rules in Unified Platform.

Figure 60 Alarm forwarding rule list

 

2.     Click Add to add an alarm forwarding rule.

Figure 61 Adding an alarm forwarding rule

 

3.     Click Wechat Config.

Figure 62 WeChat configuration

 

4.     Navigate to the WeChat Work Official Account Platform > WeChat Work Official Account List page.

Figure 63 WeChat Work Official Account List

 

5.     Click Add to add a WeCom account.

Figure 64 Adding a WeCom account

 

6.     Configure the WeCom account:

¡     Enterprise Name: Enter the enterprise name.

¡     CorpId: Enter the company ID you have obtained.

¡     Secret: Enter the app secret you have obtained.

¡     Enter the description, telephone, postcode, and address as needed.

Figure 65 Adding a WeCom account

 

7.     Click OK to add the WeCom account.

Figure 66 WeCom account added successfully

 

Configure a WeCom message template

1.     Navigate to the WeChat Work Official Account Platform > WeChat Work Message Template page.

Figure 67 WeChat Work Message Template page

 

2.     Click Add to add a WeCom message template.

Figure 68 Adding a WeCom message template

 

3.     Configure the WeCom message template:

¡     Template Name: Enter a message template name, a string of 1 to 32 characters. Valid characters include letters, Chinese characters, digits, underscores (_), hyphens (-), periods (.), backslashes (\), and spaces.

¡     Enterprise Number: Select the corporate account you have added.

¡     Description: Enter a template description, a string of 1 to 32 characters. Valid characters include letters, Chinese characters, digits, underscores (_), hyphens (-), periods (.), backslashes (\), and spaces.

¡     Related Applications: Click Select to select the apps to which messages will be sent.

¡     Related Employees: Click Select to select the alarm notification recipients from among the employees who can access the selected apps. The system automatically synchronizes employee accounts with the WeCom servers every day at 00:00.

Figure 69 Selecting an application

 

Figure 70 Selecting an employee

 

Figure 71 Configuring the WeCom message template

 

4.     Click OK to add the WeCom message template.

Figure 72 WeCom message template added successfully

 

Configure alarm forwarding via WeCom

1.     Navigate to the Monitor> Alarm > Alarm Forwarding Rules page.

2.     Click Add to add an alarm forwarding rule.

Figure 73 Adding an alarm forwarding rule

 

3.      Configure an alarm forwarding rule:

¡     Rule Name: Assign a name to the rule.

¡     Alarm Severity Levels to be Concerned: Select alarm severity levels of interest. The system sends alarm notifications only for the specified severity levels. Available options are Critical, Major, Minor, Warning, and Info.

¡     Resources to be Concerned: Select resources of interest. Available options are All Resources and Selected Resources. By default, the All Resources option is selected. Unified Platform sends notifications of alarms generated by all resources. To send notifications of alarms generated by only some of the resources, select the Selected Resources option and then select resource groups or resources of interest. This example uses the All Resources option.

¡     Alarms to be Concerned: Select alarms of interest. Available options are All Alarms and Selected Alarms. By default, the All Alarms option is selected. Unified Platform sends notifications of all alarms. To send notifications of only some of the alarms, select the Selected Alarms option, and then select traps. You can also configure parameters for traps. If you configure parameters for selected traps, Unified Platform sends notifications of only alarms that match the configured parameters. This example uses the All Alarms option.

 

 

NOTE:

Traps are one form of SNMP notifications. This document uses traps and SNMP notifications interchangeably.

 

4.     In the Action Settings area, click WechatWork. The WeChat work (WeCom) forwarding page opens.

5.     Specify the period of time during which alarms are generated. Select the All or Custom option.

¡     All: The system forwards alarms regardless of when they are generated.

¡     Custom: The system forwards only alarms generated within the selected time span.

This example selects the All option.

6.     Click Select to select WeCom forwarding message templates, and then click OK.

7.     Click OK.

The WeCom alarm forwarding action is added to the action list.

Figure 74 Adding an alarm forwarding rule

 

8.     Click OK.

The alarm forwarding rule is added.

Figure 75 Alarm forwarding rule added successfully

 

Verify the configuration

1.     Verify that the WeCom administrator can receive alarm notifications sent by Unified Platform to the app.

Figure 76 Forwarding alarms to WeCom

 

2.     Click Alarms to view detailed information about the alarms.

Figure 77 Alarm details

 

Filter, clear, or acknowledge alarms

Filter alarms by alarm status

1.     Navigate to the Monitor > Alarm > Active Alarms page.

2.     Click the Search Conditions link. To view alarms in any states, select All for the Status field. To view alarms in a particular state, select that state.

Figure 78 Active alarms

 

Acknowledge alarms

If you verify that an unacknowledged alarm has been cleared, click the Unacked link in the Ack State column for that alarm to acknowledge it.

Figure 79 Acknowledging an alarm

 

Filter alarms by using advanced criteria

1.     Click the  icon at the upper right of the page to expand the advanced search area.

2.     Specify the alarm state, resources, resource groups, and alarm categories to display only the matching alarms.

If you select All for the Status field, you can see information about alarms in any state, including the source of each alarm and when they were generated. If an alarm has been cleared, the page also shows when it was cleared. On this page, you can clear, acknowledge, and delete alarms as needed.

3.     Click a column heading of the alarm list to sort the alarms in descending or ascending order. You can sort the alarms by the severity, alarm source, first alarm time, cleared at (alarm clearing time), or repetitions field.

Figure 80 Advanced search area

 

View and delete history alarms

History alarms are alarms that were cleared prior to the present day.

Navigate to the Monitor > Alarm > History Alarms page.

The system displays the following information about each alarm:

·     Severity: Severity level of the alarm. Available severity levels are info, warning, minor, major, and critical, from the least severe level to the most severe level.

·     Alarm Source: Name and IP address of the device that generated the alarm.

·     Alarm Info: Event description.

·     Clearing State: Whether the alarm has been cleared. If the alarm has been cleared automatically by the system, this field displays $SYSTEM. If the alarm has been manually cleared by a user, this field displays the username.

·     Ack State: Whether the alarm has been acknowledged. If the alarm has been acknowledged, this field displays the username of the user who acknowledged the alarm. If the alarm is not acknowledged, this field displays Unacked.

·     First Alarm: Date and time when the alarm first occurred.

·     Cleared At: Date and time when the alarm was cleared.

·     Repetitions: Number of alarm recurrences before the alarm was cleared.

·     Duration: Period of time from when the alarm was generated to when the alarm was cleared.

·     Actions: Actions that can be performed on the alarm. You can only delete a history alarm.

Figure 81 History alarms

 

View alarms generated by a device

This feature is available for devices incorporated by the controller.

To view all alarms generated on an incorporated device, click its link in the Alarm Source column of the alarm list.

Figure 82 Alarm source

 

Figure 83 Alarms from a device

 

View global resource monitoring information

Unified Platform presents a holistic view of resource statistics for the entire network. For example, you can view network-wide statistics for switches, VLANs, and VXLANs.

View resource capacity statistics

To view network resource capacity statistics, navigate to the Automation > Campus Network > Network Devices > Monitored > Network Monitoring page.

Figure 84 Network monitoring

 

Figure 85 Resources capacity

 

View physical device performance statistics

To view physical device performance statistics, navigate to the Automation > Campus Network > Network Devices > Monitored > Network Monitoring > Physical Device page.

Figure 86 Physical devices

 

View event statistics

To view event statistics, navigate to the Automation > Campus Network > Network Devices > Monitored > Event Statistics page.

Figure 87 Selecting Event Statistics

 

Figure 88 Event statistics

 

View port event statistics

To view port event statistics, navigate to the Automation > Campus Network > Network Devices > Monitored > Event Statistics > Port Event Statistics page.

Figure 89 Port event statistics

 

Monitor network devices

To monitor the health and performance of a network device, add that device to the list of monitored devices. The collected statistics can help you make data-driven optimization and scaling decisions to improve network performance.

View the list of monitored network devices

1.     Navigate to the Monitor > Monitor List > Network Monitors page.

The system displays the following information for each monitored network device:

¡     Device Label: Device label for the monitored network device. By default, a device label is in resource-type_management-IP format. You can change the device labels as needed for the ease of management.

¡     IP Address: IP address of the network device.

¡     Device Model: Model of the network device.

¡     Monitor Templates: The monitor templates that apply to the network devices.

¡     CPU Usage (%): CPU usage of the network device.

¡     Memory Usage (%): Memory usage of the network device.

¡     Response Time (ms): Delay (milliseconds) for the controller to receive a response from the network device.

¡     Unreachability Radio (%): The percentage of network device reachability test failures in all reachability tests for the present day.

¡     Maintenance State: Whether the network device is in maintenance state. You can place a device in maintenance state for scheduled or non-scheduled maintenance or when you must shut down it.

¡     Actions: Actions that can be performed on the network device, including:

-     : View monitoring details. This action is available only when the network device is monitored.

-     : View detailed interface information.

-     : View performance data.

-     : Edit monitoring settings.

-     : Synchronize data with the network device.

-     : Delete the network device.

Enable or disable the maintenance state

1.     To disable the maintenance state for a network device, click the  icon.

2.     To enable the maintenance state for a network device, select the network device, and then select More > Add Maintenance Tag. On the page that opens, configure the parameters, and then click OK. Then, the network device is in In Maintenance state in the specified time span.

Enable or disable monitoring

1.     To disable monitoring a network device, click the  icon. Then, the system stops collecting performance data from the network device.

2.     To enable monitoring a network device, click the  icon. Then, the system starts collecting performance data from the network device.

Figure 90 Monitored network devices

 

Add a network device to the monitor system

To monitor a network device, perform this task.

Before you add a network device to the monitor system, make sure the device can communicate with the servers that deploy Unified Platform.

To add a network device:

1.     Navigate to the Monitor > Monitoring List > Network Monitors page.

2.     Click Add.

3.     Enter basic information about the device:

¡     Specify the management IP address of the device.

¡     Enter a device label for the device for the ease of identification.

¡     Select whether to have the device send traps (SNMP notifications) to the system.

¡     Select the support of the device for ping operations.

The device, for example, a firewall, does not support ping operations if it filters or does not respond to the ping packets sent by the system.

¡     Select whether to add the device to the system even if it cannot be pinged.

4.     Configure the SNMP, Telnet, and SSH parameters for the device.

Figure 91 SNMP parameters

 

5.     In the Monitor Settings area, click Select to select monitor templates for the device.

Figure 92 Selecting monitor templates

 

6.     Click OK.

Review system logs

Navigate to the System > Log Management > System Log Information page. On this page, you can review the system logs for all components of Unified Platform.

Configure system log settings

1.     Log in to Unified Platform, and then navigate to the System > Log Management > System Log Setting page to configure settings for system log management.

2.     Configure the log retention period (Log Saving Days) and time to clear expired log entries (Expired Log Purging Time).

3.     Specify the IP address and port number of the log server.

You can specify a maximum of two log servers.

Figure 93 Configuring system log settings

 

4.     To send only a subset of log entries, click Add Match Rule. In the dialog box that opens, select source components of interest and other filtering conditions, and then click Apply.

5.     Click Apply.

Example: Upgrade system logs to alarm notifications

This example uses the address conflict system log as an example to describe how to upgrade a system log to an alarm notification.

1.     Navigate to the Monitor > Alarming Notification > Upgrade Alarming Rule page. This section uses rule Duplicate address 3 as an example.

2.     Click the  icon in the Actions column for Duplicate address 3.

Figure 94 Upgrade Alarming Rule page

 

3.     On the page that opens, edit the name and edit values for the Syslog Monitoring Interval (sec) and Syslog Count fields as needed.

Figure 95 Configuring alarm triggering settings

 

4.     Click OK.

5.     To view the system logs, navigate to the Monitor > Alarming Notification > Syslog Browse page.

Figure 96 Viewing system logs

 

6.     Unified Platform matches the syslog against parse templates. The syslog uses template Duplicate address 2. To view parse templates, navigate to the Monitor > Alarming Notification > Parse template page.

Figure 97 Parse templates

 

Template Duplicate address 2 corresponds to rule Duplicate address 3_test.

Some rules might use the same parse template. Identify the corresponding rule according to other matching conditions.

Figure 98 Rule details

 

7.     Verify that the system log has been upgraded to an alarm notification on the Monitor > Alarm > Active Alarms page.

Figure 99 Active alarm list

 

Figure 100 Detailed information about the alarm

 


Use an external platform for network operations monitoring

Configure Unified Platform to send controller system logs to an external operations monitoring platform

To have Unified Platform send controller system logs to an external operations monitoring platform:

1.     Open a Web browser, and then enter http://ip_address:30000/central in the address bar to log in to Unified Platform. The ip_address argument represents the northbound service VIP of the Matrix cluster.

2.     Navigate to the System > Log Management > System Log Setting page to configure settings for system log management.

3.     Configure the log retention period (Log Saving Days) and time to clear expired log entries (Expired Log Purging Time).

4.     Specify the IP address and port number of the log server.

You can specify a maximum of two log servers.

Figure 101 System log settings

 

5.     To send only a subset of log entries, click Add Match Rule. In the dialog box that opens, select source components of interest and other filtering conditions, and then click OK.

6.     Click Apply.

Configure the physical devices to send system log messages and SNMP notifications to an external platform

The physical devices (primarily switches and security appliances) can push system log messages and SNMP notifications to an external operations monitoring platform. The platform can also poll the MIBs on the devices to generate alarms.

To configure a physical device to send system log messages and SNMP notifications to an external network operations monitoring system:

1.     Enable the information center and the SNMP agent.

[device] info-center enable

[device] snmp-agent

2.     Configure a read-only community string and a read and write community string. Then, enable SNMP versions. This example enables all SNMP versions.

[device] snmp-agent community read public

[device] snmp-agent community write private

[device] snmp-agent sys-info version all

3.     Enable SNMP notifications and enable SNMP notifications for service modules, for example, BGP.

[device] snmp-agent Trap enable

[device] snmp-agent Trap  enable bgp

4.     Specify the IP address of the external operations monitoring platform for receiving SNMP notifications. Optionally, configure authentication for security purposes.

[device] snmp-agent target-host Trap  address udp-domain  1.1.1.1  params securityname public v2c

5.     Specify the IP address of the external operations monitoring platform for receiving log messages.

[device] info-center loghost 1.1.1.1

 

IMPORTANT

IMPORTANT:

Make sure the port number you specify is the same as that configured on the log host. By default, service port number 514 is used if you do not specify one.


Obtain alarms reference documents

Obtain alarm or log messages reference

Obtain alarms or log messages references

For information about obtaining alarms generated by Unified Platform, see "Manage alarms on Unified Platform."

To obtain the system log reference for a product selected in the AD-Campus 6.2 solution:

1.     Go to http://www.h3c.com/en/Technical_Documents.

2.     Select the product category and then product series of interest. On the documentation page for the product series, identify the system log reference in the reference guides category. For example, to obtain the SeerEngine-Campus system log reference, click the above website, and then select Support > Technical Documents > SDN > H3C SeerEngine-Campus.

System log messages references for related products

Use Table 1 to identify the log message references and modules related to the solution.

For information about EIA, WSM, and vDHCP log messages, see "Appendix B  Logs."

Table 1 System log messages references for related products

Product

Document title

Solution-related modules

SeerEngine-Campus

H3C SeerEngine-Campus System Log Messages Reference

Campus, CON_LICENSE, CON_MONITOR, CON_NETCONF, CON_NetworkMonitor, CON_OAM, CON_OPENFLOW, CON_PortMonitor, CON_REGION, CON_SNMP, CON_SYSTEM, CON_TEAM, CON_USER, DHCP, IDM, NEM, ServiceChain, VSM

S12500G

H3C S12500G-AF System Log Messages Reference

ACL, BGP, M-LAG, ETHDRNI, ETHOAM, FIB, FILTER, IP6ADDR, IP6FW, IPADDR, IPFW, ISIS, ISSU, L2VPN, LAGG, LLDP, MFIB, ND, NETCONF, NQA, OFP, OSPF, OSPFv3, PBR, QOS, RM, SNMP, SYSEVENT, SYSLOG, VCF, VXLAN

S10500X

H3C S10500X System Log Messages Reference

S7500X

H3C S7500X System Log Messages Reference

S6525XE-HI

H3C S6550XE-HI Switch Series System Log Messages Reference

S6520X-HI

H3C S6520X-HI Switch Series System Log Messages Reference

S6520X-EI

H3C S6520X-EI Switch Series System Log Messages Reference

S5560X-HI

H3C Campus Fixed-Port Switches System Log Messages Reference

S5560X-EI

H3C S5560X-EI Switch Series System Log Messages Reference-6W100

S6520X-EI

H3C S6520X-EI Switch Series System Log Messages Reference

S5130-HI

H3C S5130-HI System Log Messages Reference

S5130-EI

H3C S5130-EI System Log Messages Reference

S5130S-HI

H3C S5130S-HI Switch Series System Log Messages Reference

S5130S-EI

H3C S5130S-EI Switch Series System Log Messages Reference

 

Obtain trap definitions from Unified Platform

For information about obtaining trap definitions from Unified Platform, see "Repeated events alarm

Message text

System alarm system has received $3 alarms about the event ($4) of device $6($5) from $1 to $2.

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

$4: Repeat Event Name

$5: Device IP

$6: Device Name

Severity level

Major

Example

System alarm system has received two alarms about the event (cold start) of device A-lab-HuiJu (192.168.54.173) from 2021-08-25 23:53:49 to 2021-08-25 23:53:50.

Explanation

This message occurs if the alarm system has received repeated messages about an event from a device.

Recommended action

Identify the cause and remove the issue.

 

Event alarms received from unmanaged devices

Alarm Info

System alarm system has received $3 alarms from the unmanaged device from $1 to $2.

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

Severity Level

Warning

Example

System alarm system has received 3 alarms from the unmanaged device from 2021-08-25 23:53:49 to 2021-08-25 23:53:50.

Explanation

The alarm system has received a large number of events from unmanaged devices.

Recommended action

Add the unmanaged devices to the system for management.

 

Unknown event alarm

Message text

System alarm system has received a lot of unknown traps from $1 to $2, the total number of unknown traps exceeded the threshold ($3).

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

Severity level

Warning

Example

System alarm system has received a lot of unknown traps from 2021-08-25 23:53:49 to 2021-08-25 23:53:50, the total number of unknown traps exceeded the threshold (3).

Explanation

The alarm system has received a large number of unknown traps.

Recommended action

Add the definitions of the unknown traps to the system for management.

 

Intermittent failure alarm

Message text

System alarm system found event ($4) and event ($5) in device $7($6) had $3 intermittent failures from $1 to $2.

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

$4: Flash Event

$5: Flash Relative Event

$6: Device IP

$7: Device Name

Severity level

Major

Example

System alarm system found event (link DOWN) and event (link DOWN) in device A-lab-HuiJu (192.168.54.173) had 2 intermittent failures from 2021-08-25 23:53:49 to 2021-08-25 23:53:50.

Explanation

A fault comes and goes quickly.

Recommended action

Check for service anomalies that might result from the intermittent failure.

 

Lower-level NMS reported alarm

Message text

Lower-level NMS $L alarm: $4

Variable fields

$1: Device ID

$2: Fault OID

$3: POS Info

$4: Trap Description

$5: Alarm Level

$6: Device IP

$7: Device Name

$8: Serial Number

Alarm Severity Level

Warning

Example

Lower-level NMS 172.51.2.6 alarm: Interface Ten-GigabitEthernet2/0/14 became down.

Explanation

The upper-level NMS received an alarm of interest from a lower-level NMS.

Recommended action

Access the lower-level NMS to review information about the device that reported the alarm and locate the root cause of the issue.

 

Lower-level NMS reported recovery event

Message text

Lower-level NMS $L recovery: $4

Variable fields

$1: Device ID

$2: Fault OID

$3: POS Info

$4: Trap Description

$5: Alarm Level

$6: Device IP

$7: Device Name

$8: Serial Number

Severity level

Info

Example

Lower-level NMS 172.51.2.6 recovery: Interface Ten-GigabitEthernet2/0/14 became up.

Explanation

The upper-level NMS received a recovery event of interest from a lower-level NMS.

Recommended action

No action is required.

 

Obtain trap definitions from Unified Platform."


Appendix A  Alarm and trap management on Unified Platform

Manage alarms on Unified Platform

Manage system alarms

The system generates alarms when the alarm conditions are met or when a lower-level node reports alarms. The following information describes how to use and manage system alarms and provides sample alarm messages and recommended actions.

View system alarms

Log in to Unified Platform, and then navigate to the Monitor > Alarm page.

On this page, you can view and manage all alarms generated in the system. Table 2 describes the fields in an alarm entry.

Active alarms

The active alarms page intuitively displays alarms that are still present in the system and alarms that have been cleared in the present day, in tables and graphs.

On this page, you can get a quick holistic view of the network health and use the basic and advanced search functions to identify alarms of interest with ease.

Figure 102 Active alarms

 

History alarms

The History Alarms page intuitively displays alarms that have been cleared prior to the present day, in tables and graphs.

On this page, you can get a quick holistic view of network health history and use the basic and advanced search functions to identify history alarms of interest with ease.

Figure 103 History alarms

 

Alarm forwarding

Configure alarm forwarding to have the system notify maintenance staff of alarms via email or SMS for quick removal of network issues.

Figure 104 Alarm forwarding rules

 

Trap list

The Trap List page provides basic and advanced filters for quick and accurate search for traps of interest.

Figure 105 Trap list

 

Trap definitions

This page displays all traps defined in the system, including predefined and custom traps. You can add new trap definitions or edit existing ones as needed.

Figure 106 Trap definitions

 

Trap filter rules

This page displays all trap filter rules defined in the system, including predefined and custom trap filter rules. You can add new trap filter rules or edit existing ones as needed.

Figure 107 Trap filter rules page

 

Trap-to-alarm rules

On this page, you can define rules to escalate traps to alarms based on keywords, trap sources, trap types, and time ranges. The system automatically escalates a trap to an alarm if it matches a trap-to-alarm rule.

Figure 108 Trap-to-alarm rules

 

Table 2 Alarm fields

Field

Description

Severity

Alarm severity level. The severity level of an alarm can be critical, major, minor, warning, or info, from the most severe to the least severe.

Alarms excluding the threshold-triggered alarms have only one severity level.

Ack State

Whether the alarm has been administratively acknowledged. After you receive an alarm and identify its reason, you can manually change its state to Acked.

Clearing State

Whether the alarm has been cleared. An alarm changes to the cleared state when the alarm condition is removed. If an alarm source is deleted, the system deletes all alarms from that source.

Alarm Source

Name and IP address of the entity that generated the alarm. This field displays only the IP address if the alarm resource is not incorporated in the system.

Alarm Info

Detailed information about the event or error that triggered the alarm.

First Alarm

Date and time when the alarm was first triggered.

Cleared At

Date and time when the alarm was cleared.

 

Manage system alarms

1.     Log in to Unified Platform, and then navigate to the Monitor > Alarm page.

2.     On the page that opens, perform the following tasks to manage alarms:

¡     To filter alarms of interest, select a filtering criterion, and then click OK.

The system then displays only matching alarms.

By default, the system displays all alarms.

¡     To obtain the most recent alarm information, click Refresh.

¡     To delete alarms, select the target alarms, and then click Delete.

¡     To acknowledge or unacknowledge an alarm, click Acked or Unacked, respectively, in the Ack State column for that alarm.

¡     To export alarms, click More, and then select Export to export all filter-matching alarms as a file.

By default, the alarms file is exported to the download path for your browser.

Configure alarm forwarding

To send alarm notifications for the specified severity levels to email addresses or phones, configure alarm forwarding.

To configure alarm forwarding:

1.     Log in to Unified Platform, and then navigate to the Monitor > Alarm > Alarm Forwarding Rules page.

2.     Specify a rule name, select the alarm severity levels, resources, and alarms of interest.

3.     Click Action Settings, add phone numbers or emails, and then click OK.

 

 

NOTE:

The system does not support alarm notifications via WeChat.

Using the alarm messages reference

The alarm messages reference categorizes system alarm messages by alarm type. This document explains messages in tables. Table 3 describes information provided in these tables.

Table 3 Message explanation table fields

Item

Content

Example

Message text

Presents the message description.

Current CPU usage $2 exceeded alarm threshold $1

Variable fields

Briefly describes the variable fields in the order in which they appear in the message text.

The variable fields are numbered in the "$Number" form to help you identify their location in the message text.

$1: CPU usage threshold.

$2: Current CPU usage in percentage.

Severity level

Provides the severity level of the message.

Major

Example

Provides a real message example.

Current CPU usage 86% exceeded alarm threshold 85%

Explanation

Explains the message, including the event or error cause.

When the CPU usage of the device reaches the CPU usage threshold, the system sends a log message for the event. When the CPU usage of the device drops below the threshold, the system sets the state of the alarm to cleared. The thresholds for CPU usage are configurable. By default, the thresholds are as follows:

·     For the H3C MSR router series, only the major threshold is set, and the threshold value is 99%.

·     For devices of other models, the minor threshold is 85%, and the major threshold is 90%.

Recommended action

Provides recommended actions. For informational messages, no action is required.

If an alarm condition persists for a long time, contact H3C Support

 

Alarm messages reference

Repeated events alarm

Message text

System alarm system has received $3 alarms about the event ($4) of device $6($5) from $1 to $2.

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

$4: Repeat Event Name

$5: Device IP

$6: Device Name

Severity level

Major

Example

System alarm system has received two alarms about the event (cold start) of device A-lab-HuiJu (192.168.54.173) from 2021-08-25 23:53:49 to 2021-08-25 23:53:50.

Explanation

This message occurs if the alarm system has received repeated messages about an event from a device.

Recommended action

Identify the cause and remove the issue.

 

Event alarms received from unmanaged devices

Alarm Info

System alarm system has received $3 alarms from the unmanaged device from $1 to $2.

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

Severity Level

Warning

Example

System alarm system has received 3 alarms from the unmanaged device from 2021-08-25 23:53:49 to 2021-08-25 23:53:50.

Explanation

The alarm system has received a large number of events from unmanaged devices.

Recommended action

Add the unmanaged devices to the system for management.

 

Unknown event alarm

Message text

System alarm system has received a lot of unknown traps from $1 to $2, the total number of unknown traps exceeded the threshold ($3).

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

Severity level

Warning

Example

System alarm system has received a lot of unknown traps from 2021-08-25 23:53:49 to 2021-08-25 23:53:50, the total number of unknown traps exceeded the threshold (3).

Explanation

The alarm system has received a large number of unknown traps.

Recommended action

Add the definitions of the unknown traps to the system for management.

 

Intermittent failure alarm

Message text

System alarm system found event ($4) and event ($5) in device $7($6) had $3 intermittent failures from $1 to $2.

Variable fields

$1: Fault Start Time

$2: Stop Time

$3: Times

$4: Flash Event

$5: Flash Relative Event

$6: Device IP

$7: Device Name

Severity level

Major

Example

System alarm system found event (link DOWN) and event (link DOWN) in device A-lab-HuiJu (192.168.54.173) had 2 intermittent failures from 2021-08-25 23:53:49 to 2021-08-25 23:53:50.

Explanation

A fault comes and goes quickly.

Recommended action

Check for service anomalies that might result from the intermittent failure.

 

Lower-level NMS reported alarm

Message text

Lower-level NMS $L alarm: $4

Variable fields

$1: Device ID

$2: Fault OID

$3: POS Info

$4: Trap Description

$5: Alarm Level

$6: Device IP

$7: Device Name

$8: Serial Number

Alarm Severity Level

Warning

Example

Lower-level NMS 172.51.2.6 alarm: Interface Ten-GigabitEthernet2/0/14 became down.

Explanation

The upper-level NMS received an alarm of interest from a lower-level NMS.

Recommended action

Access the lower-level NMS to review information about the device that reported the alarm and locate the root cause of the issue.

 

Lower-level NMS reported recovery event

Message text

Lower-level NMS $L recovery: $4

Variable fields

$1: Device ID

$2: Fault OID

$3: POS Info

$4: Trap Description

$5: Alarm Level

$6: Device IP

$7: Device Name

$8: Serial Number

Severity level

Info

Example

Lower-level NMS 172.51.2.6 recovery: Interface Ten-GigabitEthernet2/0/14 became up.

Explanation

The upper-level NMS received a recovery event of interest from a lower-level NMS.

Recommended action

No action is required.

 

Obtain trap definitions from Unified Platform

Log in to Unified Platform

1.     Open a Web browser, and then enter http://ip_address:30000/central in the address bar.

The ip_address argument represents the northbound service VIP of the Matrix cluster.

2.     Log in to Unified Platform.

Make sure the user account you use has the privilege of viewing trap definitions.

View trap definitions

Navigate to the Monitor > Alarm > Traps > Trap Definitions page.

The page displays all trap definitions in the system.

Figure 109 Trap definitions

 

Filter trap definitions

To filter trap definitions, click the chevron to the right of the search field, and then select a filtering criterion.

Available filtering criteria include trap name, enterprise name, trap OID, enterprise ID, maintenance experience, and trap category.

Figure 110 Filtering trap definitions

 

For example, if you select the enterprise name criterion, and then enter the matrix keyword, the system displays all trap definitions available for Matrix.

Figure 111 Filtering Matrix trap definitions

 

Commonly used filtering criteria

Trap definition

Filtering criterion

Matrix-related trap definitions

Enterprise name: matrix

Portal-related trap definitions

Enterprise name: portal enterprise id

License server

Enterprise name: License Server enterprise id

 


Appendix B  Logs

Introduction to vDHCP logs

Operation logs record system operations and configuration modifications, such as device operations (adding, editing, or deleting a device) and policy configuration. Operation log messages include operation description, result, and failure reasons, and provide reference for system analysis and maintenance.

This document assumes that the readers are familiar with data communications technologies and H3C vDHCP products.

Viewing operation logs

The vDHCP product is deployed based on Unified Platform.

To view operation logs:

1.     Log in to Unified Platform, and then navigate to the System > Log Management > Operation Log Information page.

Figure 112 Operation log list

 

Table 4 Operation log elements

Element

Description

Time

Date and time when the log message was generated.

Username

Name of the user that triggered the log generation.

User IP

IP address of the terminal where the user performed the operation.

Service Name

Name of the service that produced the message.

Operation Result

Operation result: Succeeded or Failed.

Operation Description

Text string that contains detailed information about the operation.

Failure Reason

Possible reasons for an operation failure.

 

Syslog message format

vDHCP can send operation logs to syslog servers through the syslog protocol.

To set the IP addresses and port numbers of syslog servers:

1.     Navigate to the System > Log Management > Setting Operation Log page.

2.     Set the IP addresses and port numbers of syslog servers.

By default, controllers send operation logs in the following format:

<PRI>TIMESTAMP Hostname Origin/severity/Keywords CONTENT

Table 5 Syslog message elements

Element

Description

<PRI>

Priority identifier. It is calculated by using the following formula:

Priority identifier=facilityx8+severity

Where:

·     facility represents the programming module defined by syslog.

·     severity represents the syslog message severity level. For more information, see Table 7.

TIMESTAMP

Date and time when the event occurred.

Hostname

Name or IP address of the server or VM where the controller that generated the message resides.

Origin

Name of the service module that generated the message.

Keywords

Keywords of the message that facilitate searching or memorizing.

CONTENT

Text string that contains detailed information about the operation, in the following format:

User=username IP=user IP Description=description Result=result Cause=operation failure causes

 

Table 6 lists all service modules that might produce operation log messages.

Table 6 Service module list

Service module name

Description

DHCP

DHCP module.

DHCPS

IPv4 DHCP server module.

DHSPS6

IPv6 DHCP server module.

VRRP

VRRP module.

 

Syslog messages are classified into eight severity levels from 0 to 7. The lower the number, the higher the severity, as shown in Table 7.

Table 7 Syslog message severity levels

Level

Severity

Description

0

Emergency

The system might be unusable.

1

Alert

Action must be taken immediately.

2

Critical

Critical condition.

3

Error

Error condition.

4

Warning

Warning condition.

5

Notice

Normal but significant condition.

6

Informational

Informational message.

7

Debug

Debugging message.

 

Using this document

This document categorizes operation log messages by service module. This document explains messages in tables. Table 8 describes information provided in these tables.

Table 8 Message explanation table contents

Item

Content

Example

Keyword

Summary of the message that facilitates searching or memorizing.

DELETE_FABRIC_OP

Message text

Presents the message description.

Deleted fabric: $1

Variable fields

Briefly describes the variable fields in the order that they appear in the message text.

The variable fields are numbered in the "$Number" form to help you identify their location in the message text.

$1: Fabric UUID.

Example

Provides a real message example.

Deleted fabric: 218b5f2f-e435-4365-a1ab-0eaa03b7fa19

Explanation

Explains the message.

A fabric was deleted.

Recommended action

Provides recommended actions.

Delete unnecessary files to release resources.

 

DHCP

This section contains DHCP messages.

DHCP_NORESOURCES

Keyword

DHCP_NORESOURCES

Message text

Failed to apply filtering rules for DHCP packets because hardware resources are insufficient.

Variable fields

N/A

Severity level

3

Example

DHCP/3/DHCP_NORESOURCES: Failed to apply filtering rules for DHCP packets because hardware resources are insufficient.

Explanation

The system failed to apply filtering rules for DHCP packets because the hardware resources are insufficient.

Recommended action

Release hardware resources, and then apply the rules again.

 

DHCP_NOTSUPPORTED

Keyword

DHCP_NOTSUPPORTED

Message text

Failed to apply filtering rules for DHCP packets because some rules are not supported.

Variable fields

N/A

Severity level

3

Example

DHCP/3/DHCP_NOTSUPPORTED: Failed to apply filtering rules for DHCP packets because some rules are not supported.

Explanation

The system failed to apply filtering rules for DHCP packets because some rules are not supported on the device.

Recommended action

No action is required.

 

DHCPS

This section contains DHCP server messages.

DHCPS_ALLOCATE_IP

Keyword

DHCPS_ALLOCATE_IP

Message text

DHCP server received a DHCP client’s request packet on interface [STRING], and allocated an IP address [IPADDR](lease [UINT32] seconds) for the DHCP client(MAC [MAC]) from [STRING] pool.

Variable fields

$1: Name of the interface on which DHCP server is configured.

$2: IPv4 address assigned to the DHCP client.

$3: Lease duration of the assigned IPv4 address.

$4: MAC address of the DHCP client.

$5: Name of the address pool to which the assigned IPv4 address belongs.

Severity level

5

Example

DHCPS/5/DHCPS_ALLOCATE_IP: DHCP server received a DHCP client’s request packet on interface Ethernet0/2, and allocated an IP address 1.0.0.91(lease 86400 seconds) for the DHCP client(MAC 0000-0000-905a) from p1 pool.

Explanation

The DHCP server assigned an IPv4 address with a lease to a DHCP client.

Recommended action

No action is required.

 

DHCPS_CONFLICT_IP

Keyword

DHCPS_CONFLICT_IP

Message text

A conflict IP [IPADDR] from [STRING] pool was detected by DHCP server on interface [STRING].

Variable fields

$1: IPv4 address that is in conflict.

$2: Name of the address pool to which the conflicting IPv4 address belongs.

$3: Name of the interface on which DHCP server is configured.

Severity level

5

Example

DHCPS/5/DHCPS_CONFLICT_IP: A conflict IP 100.1.1.1 from p1 pool was detected by DHCP server on interface Ethernet0/2.

Explanation

The DHCP server deleted a conflicting IPv4 address from an address pool.

Recommended action

No action is required.

 

DHCPS_EXTEND_IP

Keyword

DHCPS_EXTEND_IP

Message text

DHCP server received a DHCP client’s request packet on interface [STRING], and extended lease from [STRING] pool for the DHCP client (IP [IPADDR], MAC [MAC]).

Variable fields

$1: Name of the interface on which DHCP server is configured.

$2: Name of the address pool to which the client's IPv4 address belongs.

$3: IPv4 address of the DHCP client.

$4: MAC address of the DHCP client.

Severity level

5

Example

DHCPS/5/DHCPS_EXTEND_IP: DHCP server received a DHCP client’s request packet on interface Ethernet0/2, and extended lease from p1 pool for the DHCP client (IP 1.0.0.91, MAC 0000-0000-905a).

Explanation

The DHCP server extended the lease for a DHCP client.

Recommended action

No action is required.

 

DHCPS_FILE

Keyword

DHCPS_FILE

Message text

Failed to save DHCP client information due to lack of storage resources.

Variable fields

N/A

Severity level

4

Example

DHCPS/4/DHCPS_FILE: Failed to save DHCP client information due to lack of storage resources.

Explanation

The DHCP server failed to back up DHCP bindings to the backup file due to lack of storage resources.

Recommended action

Delete unnecessary files to release resources.

 

DHCPS_RECLAIM_IP

Keyword

DHCPS_RECLAIM_IP

Message text

DHCP server reclaimed a [STRING] pool’s lease(IP [IPADDR], lease [UINT32] seconds), which is allocated for the DHCP client (MAC [MAC]).

Variable fields

$1: Name of the address pool to which the assigned IPv4 address belongs.

$2: IPv4 address assigned to the DHCP client.

$3: Lease duration of the assigned IPv4 address.

$4: MAC address of the DHCP client.

Severity level

5

Example

DHCPS/5/DHCPS_RECLAIM_IP: DHCP server reclaimed a p1 pool’s lease(IP 1.0.0.91, lease 86400 seconds), which is allocated for the DHCP client (MAC 0000-0000-905a).

Explanation

The DHCP server reclaimed the IPv4 address assigned to a DHCP client.

Recommended action

No action is required.

 

DHCPS_VERIFY_CLASS

Keyword

DHCPS_VERIFY_CLASS

Message text

Illegal DHCP client-PacketType=[STRING]-ClientAddress=[MAC];

Variable fields

$1: Type of the packet.

$2: Hardware address of the DHCP client.

Severity level

5

Example

DHCPS/5/DHCPS_VERIFY_CLASS: Illegal DHCP client-PacketType= DHCPDISCOVER-ClientAddress=0000-5e01-0104;

Explanation

The DHCP server verified that the DHCP client was not on the user class whitelist.

Recommended action

Check the validity of the DHCP client.

 

DHCPS6

This section contains DHCPv6 server messages.

DHCPS6_ALLOCATE_ADDRESS

Keyword

DHCPS6_ALLOCATE_ADDRESS

Message text

DHCPv6 server received a DHCPv6 client’s request packet on interface [STRING], and allocated an IPv6 address [IPADDR] (lease [UINT32] seconds) for the DHCP client(DUID [HEX], IAID [HEX]) from [STRING] pool.

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: IPv6 address assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 address.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

$6: Name of the address pool to which the assigned IPv6 address belongs.

Severity level

5

Example

DHCPS6/5/DHCPS6_ALLOCATE_ADDRESS: DHCPv6 server received a DHCPv6 client’s request packet on interface Ethernet0/2, and allocated an IPv6 address 2000::3(lease 60 seconds) for the DHCP client(DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f) from p1 pool.

Explanation

The DHCPv6 server assigned an IPv6 address with a lease to a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_ALLOCATE_PREFIX

Keyword

DHCPS6_ALLOCATE_PREFIX

Message text

DHCPv6 server received a DHCPv6 client’s request packet on interface [STRING], and allocated an IPv6 prefix [IPADDR] (lease [UINT32] seconds) for the DHCP client(DUID [HEX], IAID [HEX]) from [STRING] pool.

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: IPv6 prefix assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 prefix.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

$6: Name of the address pool to which the assigned IPv6 prefix belongs.

Severity level

5

Example

DHCPS6/5/DHCPS6_ALLOCATE_PREFIX: DHCPv6 server received a DHCPv6 client’s request packet on interface Ethernet0/2, and allocated an IPv6 prefix 2000::(lease 60 seconds) for the DHCP client(DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f) from p1 pool.

Explanation

The DHCPv6 server assigned an IPv6 prefix with a lease to a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_CONFLICT_ADDRESS

Keyword

DHCPS6_CONFLICT_ADDRESS

Message text

A conflict IPv6 address [IPADDR] from [STRING] pool was detected by DHCPv6 server on interface [STRING].

Variable fields

$1: IPv6 address that is in conflict.

$2: Name of the address pool to which the conflicting IPv6 address belongs.

$3: Name of the interface on which DHCPv6 server is configured.

Severity level

5

Example

DHCPS6/5/DHCPS6_CONFLICT_ADDRESS: A conflict IPv6 address 33::1 from p1 pool was detected by DHCPv6 server on interface Ethernet0/2.

Explanation

The DHCPv6 server deleted a conflicting IPv6 address from an address pool.

Recommended action

No action is required.

 

DHCPS6_EXTEND_ADDRESS

Keyword

DHCPS6_EXTEND_ADDRESS

Message text

DHCPv6 server received a DHCP client’s request packet on interface [STRING], and extended lease from [STRING] pool for the DHCP client (IPv6 address [IPADDR], DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: Name of the address pool to which the client's IPv6 address belongs.

$3: IPv6 address of the DHCPv6 client.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5

Example

DHCPS6/5/DHCPS6_EXTEND_ADDRESS: DHCPv6 server received a DHCP client’s request packet on interface Ethernet0/2, and extended lease from p1 pool for the DHCP client (IPv6 address 2000::3, DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Explanation

The DHCPv6 server extended the address lease for a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_EXTEND_PREFIX

Keyword

DHCPS6_EXTEND_PREFIX

Message text

DHCPv6 server received a DHCP client’s request packet on interface [STRING], and extended lease from [STRING] pool for the DHCP client (IPv6 prefix [IPADDR], DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the interface on which DHCPv6 server is configured.

$2: Name of the address pool to which the client's IPv6 prefix belongs.

$3: IPv6 prefix of the DHCPv6 client.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5

Example

DHCPS6/5/DHCPS6_EXTEND_PREFIX: DHCPv6 server received a DHCP client’s request packet on interface Ethernet0/2, and extended lease from p1 pool for the DHCP client (IPv6 prefix 2000::, DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Explanation

The DHCPv6 server extended the prefix lease for a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_FILE

Keyword

DHCPS6_FILE

Message text

Failed to save DHCP client information due to lack of storage resources.

Variable fields

N/A

Severity level

4

Example

DHCPS6/4/DHCPS6_FILE: Failed to save DHCP client information due to lack of storage resources.

Explanation

The DHCPv6 server failed to back up DHCPv6 bindings to the backup file due to lack of storage resources.

Recommended action

Delete unnecessary files to release resources.

 

DHCPS6_RECLAIM_ADDRESS

Keyword

DHCPS6_RECLAIM_ADDRESS

Message text

DHCPv6 server reclaimed a [STRING] pool’s lease(IPv6 address [IPADDR], lease [UINT32] seconds), which is allocated for the DHCPv6 client (DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the address pool to which the assigned IPv6 address belongs.

$2: IPv6 address assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 address.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5

Example

DHCPS6/5/DHCPS6_RECLAIM_ADDRESS: DHCPv6 server reclaimed a p1 pool’s lease(IPv6 address 2000::3, lease 60 seconds), which is allocated for the DHCPv6 client (DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Explanation

The DHCPv6 server reclaimed the IPv6 address assigned to a DHCPv6 client.

Recommended action

No action is required.

 

DHCPS6_RECLAIM_PREFIX

Keyword

DHCPS6_RECLAIM_PREFIX

Message text

DHCPv6 server reclaimed a [STRING] pool’s lease(IPv6 prefix [IPADDR], lease [INTEGER] seconds), which is allocated for the DHCPv6 client (DUID [HEX], IAID [HEX]).

Variable fields

$1: Name of the address pool to which the assigned IPv6 prefix belongs.

$2: IPv6 prefix assigned to the DHCPv6 client.

$3: Lease duration of the assigned IPv6 prefix.

$4: DUID of the DHCPv6 client.

$5: IAID of the DHCPv6 client.

Severity level

5

Example

DHCPS6/5/DHCPS6_RECLAIM_PREFIX: DHCPv6 server reclaimed a p1 pool’s lease(IPv6 prefix 2000::, lease 60 seconds), which is allocated for the DHCPv6 client (DUID 0001000118137c37b4b52facab5a, IAID 10b4b52f).

Explanation

The DHCPv6 server reclaimed the IPv6 prefix assigned to a DHCPv6 client.

Recommended action

No action is required.

 

VRRP

This section contains VRRP messages.

VRRP_STATUS_CHANGE

Keyword

VRRP_STATUS_CHANGE

Message text

The status of [STRING] virtual router [UINT32] (configured on [STRING]) changed from [STRING] to [STRING]: [STRING].

Variable fields

$1: VRRP version.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: Original status.

$5: Current status.

$6: Reason for status change:

¡     Interface event received—An interface event was received.

¡     IP address deleted—The virtual IP address has been deleted.

¡     The status of the tracked object changed—The status of the associated track entry changed.

¡     VRRP packet received—A VRRP advertisement was received.

¡     Current device has changed to IP address owner—The current device has become the IP address owner.

¡     Master-down-timer expired—The master down timer expired.

¡     Zero priority packet received—A VRRP packet containing priority 0 was received.

¡     Preempt—Preemption occurred.

¡     Master group drove—The state of the master group changed.

Severity level

6

Example

VRRP/6/VRRP_STATUS_CHANGE: The status of IPv4 virtual router 10 (configured on Ethernet0/0) changed (from Backup to Master): Master-down-timer expired.

Explanation

The VRRP group status changed because of the following reasons:

·     An interface event was received.

·     The virtual IP address has been deleted.

·     The status of the associated track entry changed.

·     A VRRP advertisement was received.

·     The current device has become the IP address owner.

·     The master down timer expired.

·     A VRRP packet containing priority 0 was received.

·     Preemption occurred.

·     The state of the master group changed.

Recommended action

Check the VRRP group status to make sure it is operating correctly.

 

VRRP_VF_STATUS_CHANGE

Keyword

VRRP_VF_STATUS_CHANGE

Message text

The [STRING] virtual router [UINT32] (configured on [STRING]) virtual forwarder [UINT32] detected status change (from [STRING] to [STRING]): [STRING].

Variable fields

$1: VRRP version.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: VF ID.

$5: Original status of VF.

$6: Current status of VF.

$7: Reason for the status change.

Severity level

6

Example

VRRP/6/VRRP_VF_STATUS_CHANGE: The IPv4 virtual router 10 (configured on GigabitEthernet5/1) virtual forwarder 2 detected status change (from Active to Initialize): Weight changed.

Explanation

The status of the virtual forwarder has changed because the weight changed, the timeout timer expired, or VRRP went down.

Recommended action

Check the status of the track entry.

 

VRRP_VMAC_INEFFECTIVE

Keyword

VRRP_VMAC_INEFFECTIVE

Message text

The [STRING] virtual router [UINT32] (configured on [STRING]) failed to add virtual MAC: [STRING].

Variable fields

$1: VRRP version.

$2: VRRP group number.

$3: Name of the interface where the VRRP group is configured.

$4: Reason for the error.

Severity level

3

Example

VRRP/3/VRRP_VMAC_INEFFECTIVE: The IPv4 virtual router 10 (configured on Ethernet0/0) failed to add virtual MAC: Insufficient hardware resources.

Explanation

The virtual router failed to add a virtual MAC address.

Recommended action

Find out the root cause for the operation failure and fix the problem.

 

EIA messages

This section contains EIA messages.

Add Access User

Keyword

ADD_ACCESS_USER_OP

Message text

Add access user: $1

Variable fields

$1: Access user name.

Example

Add access user “test”

Explanation

An access user was created.

Possible failure causes

·     The value cannot be empty.

·     Password and confirmed password do not match. Please type again.

·     The end time must be later than the validity time.

·     The user cannot apply for two services with the same suffix.

·     Account "$1" already exists.

·     Only allowed: number ( ) + - and space.

·     User group "xxx" already removed from the system.

·     Please select at least one access service.

·     Please input a valid IP address that contains four sections, each section being a numeral ranging from 0 to 255. These IP addresses 0.0.0.0 and 255.255.255.255 are not allowed.

·     The value must be an integer in the range of 0 to 255, or in a format such as 10.153.3.154/4/1/0/1010.153.3.154/1/0/101/0/10.

·     Please input a valid MAC address in the format XX:XX:XX:XX:XX:XX, XX-XX-XX-XX-XX-XX or XXXX-XXXX-XXXX. The "X" can only be the character in the union of [A,F], [a,f] and [0,9].

·     The MAC authentication user cannot be bound to the service "xxx" because Bound User IP is enabled for the service. Please select another service.

·     The access service for which the access user applies does not use a security group, or the IP address is not on any Layer 2 network segment for the security group that has been applied for.

·     The bound information "IP address" cannot be empty.

·     Failed to add the account bound with a nonexistent endpoint.

·     Failed to add the account bound with an offline endpoint.

·     RADIUS server processing error.

·     Failed to notify the policy server. Please click the "Validate" link.

·     The account bound with the endpoint successfully added. Failed to refresh the endpoint binding information for no service.

·     The account bound with the endpoint successfully added. Failed to refresh the endpoint binding information.

 

Update Access User

Keyword

UPDATE_ACCESS_USER_OP

Message text

Basic information of user $1" successfully modified.

Variable fields

$1: Access user name.

Example

Basic information of user "test" successfully modified.

Explanation

Basic information of an access user was edited.

Possible failure causes

·     The value cannot be empty.

·     Password and confirmed password do not match. Please type again.

·     The end time must be later than the validity time.

·     The user cannot apply for two services with the same suffix.

·     Account "$1" already exists.

·     The access account does not exist whose userName is xxx.

·     Only allowed: number ( ) + - and space.

·     User group "xxx" already removed from the system.

·     Please select at least one access service.

·     Please input a valid IP address that contains four sections, each section being a numeral ranging from 0 to 255. These IP addresses 0.0.0.0 and 255.255.255.255 are not allowed.

·     The value must be an integer in the range of 0 to 255, or in a format such as 10.153.3.154/4/1/0/1010.153.3.154/1/0/101/0/10.

·     Please input a valid MAC address in the format XX:XX:XX:XX:XX:XX, XX-XX-XX-XX-XX-XX or XXXX-XXXX-XXXX. The "X" can only be the character in the union of [A,F], [a,f] and [0,9].

·     The MAC authentication user cannot be bound to the service "xxx" because Bound User IP is enabled for the service. Please select another service.

·     The access service for which the access user applies does not use a security group, or the IP address is not on any Layer 2 network segment for the security group that has been applied for.

·     The bound information "IP address" cannot be empty.

·     Failed to add the account bound with a nonexistent endpoint.

·     Failed to add the account bound with an offline endpoint.

·     RADIUS server processing error.

·     Failed to notify the policy server. Please click the "Validate" link.

·     The account bound with the endpoint successfully added. Failed to refresh the endpoint binding information for no service.

·     The account bound with the endpoint successfully added. Failed to refresh the endpoint binding information.

 

Delete Access User

Keyword

DELETE_ACCESS_USER_OP

Message text

Delete access user "$1".Platform User "$1" successfully deleted.

Variable fields

$1: Access user name.

Example

Delete access user "test".Platform User "test" successfully deleted.

Explanation

An access user was deleted.

Possible failure causes

·     Access account xxx has been deleted.

·     Access account xxx cannot be deleted. It is online.

·     Access account xxx cannot be deleted. It is roaming online.

·     xxx is a guest manager with guests under management. Such an account can not be cancelled.

·     RADIUS server processing error.

 

Add Access Service

Keyword

ADD_ACCESS_SERVICE_OP

Message text

Added access service : $1

Variable fields

$1: Access service name.

Example

Added access service "test"

Explanation

An access service was added.

Possible failure causes

·     The value cannot be empty.

·     Service group xxx does not exist.

·     Only alphanumeric characters, underscores (_), hyphens (-) and dots (.) are allowed.

·     accessPriority.can.has.exists.

·     At least one User group do not exist.

·     One of the services that user group "{0}" has applied for has the same suffix as the current service.

·     Service "{0}" already exists.

·     The default roaming service already exists. You can configure at most one default roaming service.

·     The selected access location group does not exist.

·     The selected access IP group does not exist.

·     The selected security policy does not exist.

·     The selected internet access configuration does not exist.

·     The proprietary attribute assignment policy does not exist.

·     The selected wireless SSID group does not exist.

·     Selected AP group does not exist.

·     Seleted Phone Number Group does not exist.

·     Seleted IMSI Group does not exist.

·     The selected endpoint MAC group does not exist.

·     The selected vendor group does not exist.

·     The selected OS group does not exist.

·     The selected endpoint information does not exist.

·     The selected access period policy does not exist.

·     The selected access rule does not exist.

·     Service xxx successfully added. Failed to notify the Radius server. Please click the "Validate" link.

·     Service xxx successfully added. Failed to notify the policy server. Please click the "Validate" link.

 

Update Access Service

Keyword

UPDATE_ACCESS_SERVICE_OP

Message text

Modify access service : $1

Variable fields

$1: Access service name.

Example

Modify access service "test"

Explanation

An access service was updated.

Possible failure causes

·     The value cannot be empty.

·     Service group xxx does not exist.

·     Only alphanumeric characters, underscores (_), hyphens (-) and dots (.) are allowed.

·     accessPriority.can.has.exists.

·     At least one User group do not exist.

·     One of the services that user group "{0}" has applied for has the same suffix as the current service.

·     Service "{0}" already exists.

·     The default roaming service already exists. You can configure at most one default roaming service.

·     The selected access location group does not exist.

·     The selected access IP group doesn not exist.

·     The selected security policy does not exist.

·     The selected internet access configuration does not exist.

·     The proprietary attribute assignment policy does not exist.

·     The selected wireless SSID group does not exist.

·     Seleted AP group does not exist.

·     Seleted Phone Number Group does not exist.

·     Seleted IMSI Group does not exist.

·     The selected endpoint MAC group does not exist.

·     The selected vendor group does not exist.

·     The selected OS group does not exist.

·     The selected endpoint information does not exist.

·     The selected access period policy does not exist.

·     The selected access rule does not exist.

·     Service xxx successfully added. Failed to notify the Radius server. Please click the "Validate" link.

·     Service xxx successfully added. Failed to notify the policy server. Please click the "Validate" link.

 

Delete Access Service

Keyword

DELETE_ACCESS_SERVICE_OP

Message text

Deletedaccess service : $1

Variable fields

$1: Access service name.

Example

Deleted access service "test"

Explanation

An access service was deleted.

Possible failure causes

·     Service xxx is being used by users.

·     Service xxx already pre-applied by the access user.

·     Service xxx is being used by users.

·     Service xxx is being used by a Sync Policy.

·     Service xxx is being used by a mute terminal user configuration profile.

·     Cannot delete service xxx. It is being used by the grade node.

·     Service xxx is being used by a guest policy.

 

Add Access Policy

Keyword

ADD_ACCESS_POLICY_OP

Message text

Add access policy: $1

Variable fields

$1: Access policy name.

Example

Add access policy "test"

Explanation

An access policy was added.

Possible failure causes

·     Access policy xxx already exists.

·     Access period policy xxx does not exist.

·     Service xxx successfully added. Failed to notify the Radius server. Please click the "Validate" link.

·     Service xxx successfully added. Failed to notify the policy server. Please click the "Validate" link.

 

Update Access Policy

Keyword

UPDATE_ACCESS_POLICY_OP

Message text

Modify access policy: $1

Variable fields

$1: Access policy name.

Example

Modify access policy "test"

Explanation

An access policy was edited.

Possible failure causes

·     Access policy xxx already exists.

·     Access period policy xxx does not exist.

·     Service xxx successfully added. Failed to notify the Radius server. Please click the "Validate" link.

·     Service xxx successfully added. Failed to notify the policy server. Please click the "Validate" link.

 

Delete Access Policy

Keyword

DELETE_ACCESS_POLICY_OP

Message text

Delete access policy: $1

Variable fields

$1: Access policy name.

Example

Delete access policy "test"

Explanation

An access policy was deleted.

Possible failure causes

·     Access period policy xxx does not exist.

·     Service xxx successfully added. Failed to notify the Radius server. Please click the "Validate" link.

·     Service xxx successfully added. Failed to notify the policy server. Please click the "Validate" link.

 

Add Access Device

Keyword

ADD_ACCESS_ DEVICE _OP

Message text

Added access device: $1

Variable fields

$1: Access device name.

Example

Added access device "192.167.22.75"

Explanation

An access device was added.

Possible failure causes

·     Please add at least one access device information record.

·     Adding access device xxx failed. The device with the same IP address already exists.

·     Adding access device failed. The device with the same IP address already exists.

·     You need to add this device to the iMC platform first.

·     The RADIUS server xxx returned an error. The validation packet might be blocked by the firewall on the host where the iNode management center is located, or it might be lost due to a network connection failure.

·     Notify RADIUS Server Failed, the server response timed out.

·     Possible cause: RADIUS Server's IP or port is not correct or the network is error and so on.

·     Failed to notify the policy server.

 

Update Access Device

Keyword

UPDATE_ACCESS_ DEVICE _OP

Message text

Modified access device: $1

Variable fields

$1: Access device name.

Example

Modified access device "192.167.22.75"

Explanation

An access device was edited.

Possible failure causes

·     The RADIUS server xxx returned an error. The validation packet might be blocked by the firewall on the host where the iNode management center is located, or it might be lost due to a network connection failure.

·     Notify RADIUS Server Failed, the server response timed out.

·     Possible cause: RADIUS Server's IP or port is not correct or the network is error and so on.

·     Failed to notify the policy server.

 

Delete Access Device

Keyword

DELETE_ACCESS_ DEVICE _OP

Message text

Deleted access device: $1

Variable fields

$1: Access device name.

Example

Deleted access device "192.167.22.75"

Explanation

An access device was deleted.

Possible failure causes

·     Failed to delete access device xxx. Reason: The device is deploying configuration to device.

·     Failed to delete access device xxx. Reason: The device is synchronizing configuration from device.

·     Cannot delete device xxx. There are online users.

·     Deleting access device xxx failed. The device may have been deleted.

 

WSM messages

This section contains WSM messages.

Create Service Template

Keyword

CREATE_SERVICE_TEMPLATE

Message text

Added service policy $1 on $2.

Variable fields

$1: Service policy name.

$2: AC name.

Example

Added service policy SSID_TEST on AC1.

Explanation

A service policy was added.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Modify Service Template

Keyword

MODIFY_SERVICE_TEMPLATE

Message text

Edited service policy $1 on $2.

Variable fields

$1: Service policy name.

$2: AC name.

Example

Edited service policy SSID_TEST on AC1.

Explanation

A service policy was edited.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Delete Service Template

Keyword

DELETE_SERVICE_TEMPLATE

Message text

Deleted service policy $1 on $2.

Variable fields

$1: Service policy name.

$2: AC name.

Example

Deleted service policy SSID_TEST on AC1.

Explanation

A service policy was deleted.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Create AP Template

Keyword

CREATE_AP_TEMPLATE

Message text

Added AP template $1 on $2.

Variable fields

$1: AP template name.

$2: AC name.

Example

Added AP template AP_TEST on AC1.

Explanation

An AP template was added.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Modify AP Template

Keyword

MODIFY_AP_TEMPLATE

Message text

Edited AP template $1 on $2.

Variable fields

$1: AP template name.

$2: AC name.

Example

Edited AP template AP_TEST on AC1.

Explanation

An AP template was edited.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Delete AP Template

Keyword

DELETE_AP_TEMPLATE

Message text

Deleted AP template $1 on $2.

Variable fields

$1: AP template name.

$2: AC name.

Example

Deleted AP template AP_TEST on AC1.

Explanation

An AP template was deleted.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Service Bind Radio

Keyword

SERVICE_BIND_RADIO

Message text

Bound service policy $1 to $3 on $2.

Variable fields

$1: Service policy name.

$2: AP name.

$3: Radio ID.

Example

Bound service policy SSID_TESt to Radio1 on AP_TESt.

Explanation

A service policy was bound to a radio.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Create Location View

Keyword

CREATE_LOCATION_VIEW

Message text

Added location view $1.

Variable fields

$1: Location view name.

Example

Added location view TEST_loc.

Explanation

A location view was added.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Modify Location View

Keyword

MODIFY_LOCATION_VIEW

Message text

Edited location view $1.

Variable fields

$1: Location view name.

Example

Edited location view TEST_loc.

Explanation

A location view was edited.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Delete Location View

Keyword

DELETE_LOCATION_VIEW

Message text

Deleted location view $1.

Variable fields

$1: Location view name.

Example

Deleted location view TEST_loc.

Explanation

A location view was deleted.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

Create Ap Group

Keyword

CREATE_AP_GROUP

Message text

Added AP group $1.

Variable fields

$1: AP group name.

Example

Added AP group TEST_loc.

Explanation

An AP group was added.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

MODIFY AP GROUP

Keyword

MODIFY_ AP_GROUP

Message text

Edited AP group $1.

Variable fields

$1: AP group name.

Example

Edited AP group TEST_loc.

Explanation

An AP group was edited.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

DELETE  AP GROUP

Keyword

DELETE_ AP_GROUP

Message text

Deleted AP group $1.

Variable fields

$1: AP group name.

Example

Deleted AP group TEST_loc.

Explanation

An AP group was deleted.

Possible failure causes

·     Database error.

·     Configuration timeout.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网