User's Manual
Appendix A Log Descriptions
ISG50 User’s Guide
805
Access control rule %u
of %s was appended.
A new built-in service access control rule was appended.
%u is the index of the access control rule.
%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %u
of %s was inserted.
An access control rule was inserted successfully.
%u is the index of the access control rule.
%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %u
of %s was modified.
An access control rule was modified successfully.
%u is the index of the access control rule.
%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %u
of %s was deleted.
An access control rule was removed successfully.
%u is the index of the access control rule.
%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
Access control rule %d
of %s was moved to %d.
An access control rule was moved successfully.
1st %d is the previous index .
%s is HTTP/HTTPS/SSH/SNMP/FTP/TELNET.
2nd %d is current previous index.
SNMP trap can not be
sent successfully
Cannot send a SNMP trap to a remote host due to network error
Table 326 System Logs
LOG MESSAGE DESCRIPTION
Port %d is up!!
When LINK is up, %d is the port number.
Port %d is down!!
When LINK is down, %d is the port number.
%s is dead at %s
A daemon (process) is gone (was killed by the operating system).
1st %s: Daemon Name, 2nd %s: date and time
%s process count is
incorrect at %s
The count of the listed process is incorrect.
1st %s: Daemon Name, 2nd %s: date and time
%s becomes Zombie at
%s
A process is present but not functioning.
1st %s: Daemon Name, 2nd %s: date and time
When memory usage exceed threshold-max, memory usage reaches
%d%% :mem-threshold-max.
When local storage usage exceeds threshold-max, %s: Partition
name file system usage reaches %d%%: disk-threshold-max.
When memory usage drops below threshold-min, System Memory
usage drops below the threshold of %d%%: mem-threshold-min.
When local storage usage drops below threshold-min, %s:
partition_name file system drops below the threshold of %d%%:
disk-threshold-min.
Table 325 Built-in Services Logs (continued)
LOG MESSAGE DESCRIPTION










