Brocade Error Message Reference Guide v6.1.0 (53-1000600-02, June 2008)

Fabric OS Message Reference 249
53-1000600-02
FW-1366
30
Probable Cause Indicates that the number of time service (TS) out-of-sync violations has fallen below the low
boundary.
Recommended
Action
No action is required.
Severity INFO
FW-1366
Message <timestamp>, [FW-1366], <sequence-number>,, WARNING, <system-name>, <Label>, is
above high boundary(High=<High value>, Low=<Low value>). Current value is <Value>
<Unit>.
Probable Cause Indicates that the number of time service (TS) out-of-sync violations has risen above the high
boundary.
Recommended
Action
Responses to security-class messages depend on user policies. Consult your security administrator
for response strategies and policies.
Severity WARNING
FW-1367
Message <timestamp>, [FW-1367], <sequence-number>,, INFO, <system-name>, <Label>, is
between high and low boundaries(High=<High value>, Low=<Low value>). Current value
is <Value> <Unit>.
Probable Cause Indicates that the number of time service (TS) out-of-sync violations has changed from a value
outside of the acceptable range to a value within the acceptable range.
Recommended
Action
No action is required.
Severity INFO
FW-1368
Message <timestamp>, [FW-1368], <sequence-number>,, INFO, <system-name>, <Label>, value
has changed(High=<High value>, Low=<Low value>). Current value is <Value> <Unit>.
Probable Cause Indicates that the number of no-FCS violations has changed. This counter records how often the
switch loses contact with the primary fabric configuration server (FCS) fabric configuration server
(FCS) switch. When the primary FCS switch in the fabric sends its certificate to a switch, the
receiving switch saves the world-wide name (WWN) of that primary FCS switch. If a secure switch
finds that there are no FCSs in the fabric, but it still has the WWN of the last primary FCS switch, it
increments this counter and resets the WWN of the primary FCS to all zeroes.
Recommended
Action
Responses to security-class messages depend on user policies. Consult your security administrator
for response strategies and policies.