4 Event Logs

The P840 router generates event logs for various functions performed by the bridge/router. All of the event logs are stored in the internal event log file, which is accessible through the Network Events menu.

Certain event logs are classified as alarms because they are deemed to be of higher urgency. Alarm logs are indicated by an asterisk (“*”) at the start of the alarm text and are printed on the ALARM line on the menu system as well as being stored in the event log. Alarms are listed in the second part of this appendix.

All WAN-link-related events include the link number in the event log. All remote site-related events include the remote site alias in the event log.

All LCP events are remote site based.

Event logs:

CallerID X callback rejected (not resuming)

Generated when an incoming ISDN call from the specified CallerID has been identified as a request for Callback and has been rejected. The request for Callback was rejected because all available circuits were reserved for resuming connections, while the Callback request was for a new connection.

CallerID X callback rejected (call limit)

Generated when an incoming ISDN call from the specified CallerID has been identified as a request for Callback and has been rejected. The request for Callback was rejected because the CallerID was associated with a remote site whose call limit was exceeded.

CallerID X rejected (not resuming)

Generated when an incoming ISDN call from the specified CallerID has been rejected. The call was rejected because all available circuits were reserved for resuming connections, while the incoming call was for a new connection.

CallerID X rejected (usage limit)

Generated when an incoming ISDN call from the specified CallerID has been rejected. The call was rejected because the CallerID was associated with a remote site whose usage limit was exceeded.

CallerID X security rejection

Generated when a call has been rejected for security reasons. CallerID security is enabled and the incoming CallID does not match any of the numbers configured for any of the remote sites.

Capture off

Generated when link trace capture is turned off.

Completed BACP negotiation with <remote site alias>

Generated when the Bandwidth Allocation Control Protocol negotiation has been completed with the remote site device associated with the stated remote site profile. Once BACP negotiations are complete, the two routers will negotiate when required to bring up the second link.

23

Page 23
Image 23
Perle Systems P840 manual Event Logs, Event logs

P840 specifications

Perle Systems is renowned for its high-performance networking hardware, and the Perle P840 model exemplifies this reputation with its advanced features and technologies. Designed for small to medium-sized enterprises, the P840 serves as a versatile and reliable solution for connectivity needs.

One of the main features of the Perle P840 is its robust network performance, supporting both Ethernet and serial connectivity. With support for RS-232, RS-422, and RS-485 interfaces, the P840 enables seamless integration of legacy devices into modern network architectures, allowing businesses to leverage existing infrastructure without the need for extensive upgrades.

The P840 also boasts advanced security features to protect sensitive data during transmission. It supports SSL encryption and VPN capabilities, ensuring that data travels securely across the network. Additionally, it implements strong authentication protocols, providing organizations with peace of mind knowing that their communications are safeguarded against potential threats.

Another standout characteristic of the P840 is its flexibility in configuration. It offers multiple port configurations, allowing for customization based on specific user needs. With options for both managed and unmanaged modes, the device can easily adapt to various network environments. This flexibility makes it suitable for diverse applications, including industrial automation, process control, and telecommunications.

The Perle P840 is designed for durability and reliability, featuring a rugged enclosure that can withstand demanding environments. Its solid-state components reduce the risk of failure, contributing to increased uptime and lower maintenance costs. Furthermore, the compact design allows for easy installation in tight spaces, making it a practical choice for various deployment scenarios.

In terms of management and monitoring, the P840 includes an intuitive web-based interface, enabling administrators to configure settings and monitor network performance effortlessly. SNMP support further enhances management capabilities, allowing for integration into larger network management systems.

Overall, the Perle P840 stands out as a powerful solution for enterprises seeking seamless connectivity, robust security, and flexibility in configuration. Its combination of advanced features and durable design makes it an ideal choice for industries requiring reliable serial and network connectivity in challenging environments. With the P840, businesses can build a resilient networking infrastructure that supports their growing demands while safeguarding their critical data.