Troubleshooting

Using the Event Log for Troubleshooting Switch Problems

I(information) provides information on normal switch operation.D(debug) is reserved for ProCurve internal diagnostic information.Date is the date in the format mm/dd/yy when an entry is recorded in the log.Time is the time in the format hh:mm:ss when an entry is recorded in the log.

Event Number is the number assigned to an event. You can turn event numbering on and off with the [no] log-numbercommand.

System Module is the internal module (such as “ports:” for port manager) that generated a log entry. If VLANs are configured, then a VLAN name also appears for an event that is specific to an individual VLAN. Table C-1 lists the different system modules with a description of each one.

Event Message is a brief description of the operating event.Table C-1. Event Log System Modules

System

Description

Documented in ProCurve Hardware/

Module

Software guide

 

 

 

 

802.1x

802.1X authentication: Provides access control on a per-client

Access Security Guide

 

or per-port basis:

 

 

Client-level security that allows LAN access to 802.1X

 

 

clients (up to 32 per port) with valid user credentials

 

 

Port-level security that allows LAN access only on ports on

 

 

which a single 802.1X-capable client (supplicant) has

 

 

entered valid RADIUS user credentials

 

acl

Access Control Lists (ACLs): Filter layer-3 IP traffic to or from

Advanced Traffic Management Guide

 

a host to block unwanted IP traffic, and block or limit other

 

 

protocol traffic such as TCP, UDP, IGMP, and ICMP. Access

 

 

control entries (ACEs) specify the filter criteria and an action

 

 

(permit or deny) to take on a packet if it meets the criteria.

 

addrmgr

Address Table Manager: Manages MAC addresses that the

Management and Configuration Guide

 

switch has learned and are stored in the switch’s address

 

 

table.

 

arp-protect

Dynamic ARP Protection: Protects the network from ARP

Access Security Guide

 

cache poisoning. Only valid ARP requests and responses are

 

 

relayed or used to update the local ARP cache. ARP packets

 

 

with invalid IP-to-MAC address bindings advertised in the

 

 

source protocol address and source physical address fields

 

 

are discarded.

 

auth

Authorization: A connected client must receive authorization

Access Security Guide

 

through web, AMC, RADIUS-based, TACACS+-based, or

 

 

802.1X authentication before it can send traffic to the switch.

 

 

 

 

C-28