
C-28
Troubleshooting
Using the Event Log for Troubleshooting Switch Problems
D
(debug) is reserved for ProCurve internal diagnostic information.
Date
is the date in the format
mm/dd/yy
when an entry is recorded in the log.
Time
is the time in the format
hh:mm:ss
when an entry is recorded in the log.
Event Number
is the number assigned to an event. You can turn event
numbering on and off with the [
no
]
log-number
command.
System Module
is the internal module (such as “ports:” for port manager) that
generated a log entry. If VLANs are configured, then a VLAN name also appears
for an event that is specific to an individual VLAN. Table C-1 lists the different
system modules with a description of each one.
Event Message
is a brief description of the operating event.
Table C-1.
Event Log System Modules
System
Module
Description
Documented in ProCurve Hardware/
Software guide
802.1x
802.1X authentication: Provides access control on a per-client
or per-port basis:
• Client-level security that allows LAN access to 802.1X
clients (up to 32 per port) with valid user credentials
• Port-level security that allows LAN access only on ports on
which a single 802.1X-capable client (supplicant) has
entered valid RADIUS user credentials
Access Security Guide
acl
Access Control Lists (ACLs): Filter layer-3 IP traffic to or from
a host to block unwanted IP traffic, and block or limit other
protocol traffic such as TCP, UDP, IGMP, and ICMP. Access
control entries (ACEs) specify the filter criteria and an action
(permit or deny) to take on a packet if it meets the criteria.
Advanced Traffic Management Guide
addrmgr
Address Table Manager: Manages MAC addresses that the
switch has learned and are stored in the switch’s address
table.
Management and Configuration Guide
arp-protect
Dynamic ARP Protection: Protects the network from ARP
cache poisoning. Only valid ARP requests and responses are
relayed or used to update the local ARP cache. ARP packets
with invalid IP-to-MAC address bindings advertised in the
source protocol address and source physical address fields
are discarded.
Access Security Guide
auth
Authorization: A connected client must receive authorization
through web, AMC, RADIUS-based, -based, or
802.1X authentication before it can send traffic to the switch.
Access Security Guide
3500-5400-6200-8200-MCG-Jan08-K_13_01.book Page 28 Monday, January 28, 2008 10:04 AM