Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
13-71
Wireless Network Management
Logging and Alarms
Status—If the alarm has been acknowledged, then an administrator has
seen it and presumably dealt with it.
Time Stamp—Among other purposes, you can view the time stamp to:
check whether a problem is ongoing
look for the cause of a behavior that you know occurred at a particular
time
track patterns of activity
determine the duration of a problem
SeveritySeverity signals the relative threat to network functions and
security.
Module Name—You can use the name of the module that reported the
alarm to point you toward the cause.
Typ e—You should quickly focus on this information, as it is, in many ways,
the alarm. It indicates the type of problem or behavior.
Message—The message, which varies according to the alarm’s type,
includes specific information about the particular event. For example, the
message for the “radiusAuthFailed” alarm is the MAC address of the
station that failed to authenticate and the radio to which the station
attempted to connect. You could use this information to track down the
station.
By default, the alarm log lists alarms according to index number. However,
you can sort the alarms according to any of the information described above,
by simply clicking on the heading for the column.
For example, you might want to focus on only the most serious events. Click
Severity and scroll to the top of the list to view the most crucial alarms.
Or, if you are troubleshooting a particular problem, you might want to group
alarms by Module Name—to see, for example, all the logs associated with
wireless stations when you are troubleshooting a station having difficulty with
its connection.
You can take action on alarms using the four buttons at the bottom of the
screen:
Details
Delete
Acknowledge
Export