WESM zl Management and Configuration Guide WT.01.28 and greater

12-72
Wireless Network Management
Logging and Alarms
Index—Alarms are numbered in the order in which they were received.
Status—If the alarm has been acknowledged, then an administrator has seen it
and presumably dealt with it.
Time Stamp—Among other purposes, you can view the time stamp to:
check whether a problem is ongoing
look for the cause of a behavior that you know occurred at a particular time
track patterns of activity
determine the duration of a problem
Severity—Severity signals the relative threat to network functions and security.
Module Name—You can use the name of the module that reported the alarm to
point you toward the cause.
Typ e—You should quickly focus on this information, as it is, in many ways, the
alarm. It indicates the type of problem or behavior.
Message—The message, which varies according to the alarm’s type, includes
specific information about the particular event. For example, the message for
the “radiusAuthFailed” alarm is the MAC address of the station that failed to
authenticate and the radio to which the station attempted to connect. You could
use this information to track down the station.
By default, the alarm log lists alarms according to index number. However, you can
sort the alarms according to any of the information described above, by simply
clicking on the heading for the column.
For example, you might want to focus on only the most serious events. Click Severity
and scroll to the top of the list to view the most crucial alarms.
Or, if you are troubleshooting a particular problem, you might want to group alarms
by Module Name—to see, for example, all the logs associated with wireless stations
when you are troubleshooting a station having difficulty with its connection.
You can take action on alarms using the four buttons at the bottom of the screen:
Details
Delete
Acknowledge
Export