Mib Guide
Mib Guide
Border Controller
MIB Guide
Release S-Cz9.1.0
F51861-09
October 2024
Oracle Communications Session Border Controller MIB Guide, Release S-Cz9.1.0
F51861-09
This software and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or
allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit,
perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation
of this software, unless required by law for interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find
any errors, please report them to us in writing.
If this is software, software documentation, data (as defined in the Federal Acquisition Regulation), or related
documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then
the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any
programs embedded, installed, or activated on delivered hardware, and modifications of such programs) and Oracle
computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial
computer software," "commercial computer software documentation," or "limited rights data" pursuant to the applicable
Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction,
duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle
programs (including any operating system, integrated software, any programs embedded, installed, or activated on
delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle
data, is subject to the rights and limitations specified in the license contained in the applicable contract. The terms
governing the U.S. Government's use of Oracle cloud services are defined by the applicable contract for such services.
No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not
developed or intended for use in any inherently dangerous applications, including applications that may create a risk of
personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all
appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its
affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.
Oracle®, Java, MySQL, and NetSuite are registered trademarks of Oracle and/or its affiliates. Other names may be
trademarks of their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used
under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc, and the AMD logo
are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open
Group.
This software or hardware and documentation may provide access to or information about content, products, and
services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all
warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an
applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss,
costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth
in an applicable agreement between you and Oracle.
Contents
About this Guide
My Oracle Support viii
Revision History
1 SNMP Configuration
Overview 1-1
Basic SNMP Parameters 1-1
SNMPv1v2 Community Configuration 1-2
SNMPv1v2 Trap Receiver Configuration 1-2
SNMP IPv6 Support 1-2
SNMP Configuration Overview 1-2
Configure SNMP System and Agent Parameters 1-2
SNMPv3 1-3
SNMPv3 Users 1-4
Configure an SNMPv3 User Identity 1-4
SNMPv3 User Groups 1-5
Configure SNMPv3 User Group 1-5
SNMPv3 Manager Access 1-7
Configure SNMPv3 Manager Access 1-7
SNMPv3 Views 1-8
Specify SNMPv3 View Access to a MIB 1-8
SNMPv1 and SNMPv2 1-9
SNMPv1v2 Community Configuration 1-9
Configure the SNMP Community 1-9
SNMPv1v2 Trap Receiver Configuration 1-10
Configure Trap Receivers 1-10
Specify an NMS for EMS Generated Traps 1-11
Enabling Administrative Trap Types 1-12
Enabling Media Supervision Traps 1-13
View SNMP Address, Statistics and User Information 1-13
iii
Consideration for HA Nodes 1-15
iv
Interface Table 3-1
Interface Description in MIB 3-4
ifXTable Table 3-6
ip Object 3-10
ipAddrTable Table 3-13
icmp Object 3-14
TCP Object 3-15
tcpConnTable Table 3-17
UDP Object 3-17
System Object 3-18
Object Resource Information Object 3-20
SNMP Object 3-20
Physical Entity Table 3-21
v
System Management MIB ([Link]) 4-59
Notes on ENUM Server Names 4-79
Software Inventory MIB ([Link]) 4-80
Multicore Monitoring MIB ([Link]) 4-81
apUsbcSysDPDKObjects 4-84
apUsbcSysScalingObjects 4-84
A System Alarms
Alarm Severities A-11
vi
About this Guide
The Oracle Communications Session Border Controller MIB Reference Guide provides
information about the following:
• Management Information Base (MIBs)
• Acme Packet’s enterprise MIBs
• General trap information, including specific details about standard traps and enterprise
traps
• Simple Network Management Protocol (SNMP) GET query information, including standard
and enterprise SNMP GET query names, object identifier names and numbers, and
descriptions
• This guide also describes the correlation between system alarms and the MIBs that
support traps, and it provides reference information about log levels, syslog level severities
(the protocol used for the network logging of system and network events), and trap
receiver filter levels. Appendix A contains several trap examples. Appendix B contains the
location of documents where you can obtain more information.
Documentation Set
The following table describes the documentation set for this release.
vii
About this Guide
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility
Program website at [Link]
My Oracle Support
My Oracle Support ([Link] is your initial point of contact for all product
support and training needs. A representative at Customer Access Support (CAS) can assist
you with My Oracle Support registration.
Call the CAS main number at 1-800-223-1711 (toll-free in the US), or call the Oracle Support
hotline for your local country from the list at [Link]
[Link]. When calling, make the selections in the sequence shown below on the Support
telephone menu:
1. Select 2 for New Service Request.
2. Select 3 for Hardware, Networking, and Solaris Operating System Support.
viii
About this Guide
You are connected to a live agent who can assist you with My Oracle Support registration and
opening a support ticket.
My Oracle Support is available 24 hours a day, 7 days a week, 365 days a year.
Emergency Response
In the event of a critical service situation, emergency response is offered by the Customer
Access Support (CAS) main number at 1-800-223-1711 (toll-free in the US), or call the Oracle
Support hotline for your local country from the list at [Link]
[Link]. The emergency response provides immediate coverage, automatic escalation, and
other features to ensure that the critical situation is resolved as rapidly as possible.
A critical situation is defined as a problem with the installed equipment that severely affects
service, traffic, or maintenance capabilities, and requires immediate corrective action. Critical
situations affect service and/or system operation resulting in one or several of these situations:
• A total system failure that results in loss of all transaction processing capability
• Significant reduction in system capacity or traffic handling capability
• Loss of the system's ability to perform automatic system reconfiguration
• Inability to restart a processor or the system
• Corruption of system databases that requires service affecting corrective actions
• Loss of access for maintenance or recovery operations
• Loss of the system ability to provide any required critical or major trouble notification
Any other problem severely affecting service, capacity/traffic, billing, and maintenance
capabilities may be defined as critical by prior discussion and agreement with Oracle.
ix
About this Guide
x
Revision History
The following table provides the revision history for this document.
Date Description
March 2022 • Initial release.
May 2022 • Updates apSysMgmt Traps ([Link]) in
the Enterprise Traps section.
August 2022 • Adds MSRP MIBs for S-Cz9.1.0p2
February 2023 • Updates temperatures alarms for
3900/3950/4900.
• Added missing Enterprise Traps.
May 2023 • Clarifies the admin write fail and succeed
traps.
• Adds apSwinventory Traps topic.
• Adds values for apEnvMonPhyCardState.
September 2023 • Extends upon the FQDN session-agent
statistics function.
November 2023 • Adds STIR/SHAKEN traps to ap-Apps Traps.
August 2024 • Fix MIB table for apAppsStirServerTable
October 2024 • Adds OID numbers for CAC utilization traps.
• Corrects three apSigRealmStats statistics
descriptions.
• Removes erroneous references to the
deprecated TSCF feature.
xi
1
SNMP Configuration
The Simple Network Management Protocol (SNMP) allows you to monitor system and health
conditions for an Oracle Communications Session Border Controller (SBC) through an external
network management (northbound) system, such as the Oracle Communications Session
Delivery Manager or an SNMP manager. The system supports SNMPv3, v2 or v1 to interface
with a range of external NMS systems.
Note:
SNMP configuration is not required for the service operation of the SBC, but is
performed on the majority of systems. Most network administrators are familiar with,
or become familiar with SNMP.
Overview
SNMP is comprised of three groups of settings on a Oracle Communications Session Border
Controller (SBC). These settings includes:
• System-wide configuration
• Access Configuration, including:
– SNMPv1v2 Community Settings
– SNMP IPv3 Authentication, Encryption and Filter Settings
• Trap Receiver Configuration
You can configure an SNMP manager to query the SBC or be a trap receiver. You can
configure an SNMP manager to perform both functions by configuring two snmp-address-
entry elements that have the same IP address, but different names.
1-1
Chapter 1
SNMP Configuration Overview
– environmental
– system monitoring
Note:
Configure each Oracle Communications Session Delivery Manager that manages an
SBC as trap receivers on the SBC.
1-2
Chapter 1
SNMPv3
ORACLE(system-config)# select
ORACLE(system-config)#
Note:
To create a v2 snmp-user-group, you configure the mp-model parameter to
v1v2 and leave the community-string parameter blank. The system then
matches hosts' SNMP version 2 community strings with the user-list
parameter value. You also configure snmp-user-entry and snmp-address-
entry elements to complete your v2 group configuration.
ORACLE(system-config)options +lower-snmp-priority=enabled
If you type the option without the plus sign, you overwrite any previously configured
options. To append the new option to the options list, prepend the new option with a plus
sign as shown in the previous example.
10. Type done to save your configuration.
SNMPv3
The Oracle Communications Session Border Controller supports SNMPv3 by default. To
secure your SNMPv3 system, you must configure SNMP users and groups, SNMP managers,
and view access to MIB trees. SNMPv3 provides the SNMP agent and SNMP Network
1-3
Chapter 1
SNMPv3
Management System (NMS) with protocol security enhancements used to protect your system
against a variety of attacks, such as increased authentication, privacy, MIB object access
control and trap filtering capabilities.
SNMPv3 Users
An identity must be created for an SNMPv3 user to specify their name, security protocol
choices, passwords for secure authentication and privacy, and the ability to receive secured
traps. You configure SNMPv3 users to protect your SNMPv3 system from any unauthorized
SNMP agent that uses message capture and replay or a network traffic source that uses an
incorrect password or security level.
2. Type snmp-user-entry and press Enter. The system prompt changes to let you know that
you can begin configuring individual parameters used to create an identity for an SNMPv3
user.
ORACLE(system)# snmp-user-entry
ORACLE(snmp-user-entry)#
3. user-name—Enter the name of the user authorized for retrieving SNMPv3 traps.
Values:
• <user name string>—that is 1 to 24 characters.
4. auth-protocol—Specify the authentication protocol.
• sha256—HMAC-SHA2-256 authentication protocol.
• sha512—(Default) HMAC-SHA2-512 authentication protocol.
5. priv-protocol—Specify the privacy algorithm.
• aes128—Authenticates using the AES128 algorithm.
6. auth-password—Enter the authorization password for this user.
Value:
• <password-string>— that is 6 to 64 characters.
7. priv-password—Enter the privilege password for this user.
Value:
• <password-string>— that is 6 to 64 characters.
8. address-list—Enter the host IP address(es) that are associated with this user.
• <address-string>— that is 1 to 24 characters. You can specify multiple address list
names by enclosing them within brackets "()".
9. Type done to save your configuration.
1-4
Chapter 1
SNMPv3
Note:
Repeat the previous steps if you need to add more SNMPv3 users.
2. Type snmp-group-entry and press Enter. The system prompt changes to let you know
that you can begin configuring individual parameters used to configure a group of users
that belong to a particular security model who can read, write, and add SNMP objects and
receive trap notifications.
ORACLE(system)# snmp-group-entry
ORACLE(snmp-group-entry)#
1-5
Chapter 1
SNMPv3
Note:
If the mp-model parameter is specified with the v1v2 value, the community-
string parameter (not configured) defines a coexistence configuration where
SNMP version 2 messages with the community string from the hosts is indicated
by the user-list parameter, and the corresponding snmp-user-entry and snmp-
address-entry elements are accepted.
5. security-level—Specify the security level of the SNMP group, which are consistent for the
user and can be used across multiple SBC devices.
• noAuthNoPriv—This value specifies that the user group is authenticated by a string
match of the user name and requires no authorization and no privacy similar to
SNMPv1 and SNMPv2. This value is specified with the mp-model parameter and its
v1v2 value and can only be used with the community-string parameter not specified.
• authNoPriv—This value specifies that the user group is authenticated by using either
the HMAC-SHA2-256 or HMAC-SHA2-512 authentication protocols to produce a key
used to authenticate the trap and ensure the identity of the user.
• authPriv—This default value specifies that the user group is authenticated by using
either the HMAC-SHA2-256 or HMAC-SHA2-512 authentication protocols and the
privacy password is encrypted using the AES128 algorithm. Using this security level
provides user authentication and ensures message privacy so that the trap is not
tampered with during transit. This value is specified with the SNMP mp-model
parameter and its v3 value.
Note:
If there is a switchover on a high-availability SBC device, the SNMPEngineID
varies and your network management system (NMS) should be updated with the
SNMPEngineID of the standby SBC device.
1-6
Chapter 1
SNMPv3
Note:
Repeat the previous steps if you need to add more groups.
2. Type snmp-address-entry and press Enter. The system prompt changes to let you know
that you can begin configuring individual parameters used to identify the SNMP manager.
ORACLE(system-config)# snmp-address-entry
ORACLE(snmp-address-entry)#
Values:
• <ip-address>—IP address in IPv4 or IPv6 standard format.
• /<num-bits>—specifies the mask, in number of bits, used to route to the address.
• <:port>—this optional parameter to enter a subnetwork (subnet) mask. The default
subnet mask is [Link]. Set this value if the manager is a trap-receiver. Do
not set this value if the manager is performing queries.
5. trap-filter-level— Set this value if the manager is a trap-receiver. Select a priority level
that is equal to or lower than the value of the filter-level. Do not set this value if the
manager is performing queries.
Values:
• "" (Default)—The field's setting is blank. The user is not configured to receive any
trap.
• ALL—A user can view all trap conditions.
1-7
Chapter 1
SNMPv3
• Minor—A user can view trap error conditions that exist on a device.
• Major—A user can view trap critical conditions that exist on a device.
• Critical—A user can view trap conditions that require an immediate action for a
device.
6. Type done to save your configuration.
Note:
Repeat the previous steps if you need to add more SNMPv3 target IP addresses.
SNMPv3 Views
SNMPv3 utilizes a view-access-control model (VACM) for checking whether a specific type of
access to a specific managed object is allowed through the SNMPv3. You can configure
individual parameters used to include or exclude view access to single or multiple MIB OID
nodes for an SNMPv3 view name.
2. Type snmp-view-entry and press Enter. The system prompt changes to let you know that
you can begin configuring individual parameters used to include or exclude view access.
ORACLE(system)# snmp-view-entry
ORACLE(snmp-view-entry)#
1-8
Chapter 1
SNMPv1 and SNMPv2
• <OID(s)>— Object Identifier number separated by a dot (.), in which each subsequent
number is a sub-identifier. Each subtree OID starts with the prefix [Link].
For example:
– [Link].4.1.9148.3.3
– ([Link].4.1.9148.3.3 [Link].4.1.9148.3.5) - You can enter multiple values
enclosed in parenthesis and separated by space or comma.
7. Type done to save your configuration.
Note:
Repeat the previous steps if you need to add more SNMPv3 views.
3. access-mode—Set the access level for all network management servers (NMSs) defined
within this SNMP community. The access level determines the permissions that other NMS
hosts can wield over this Oracle Communications Session Border Controller. The default is
read-only. The valid values are:
• read-only—allows GET requests.
• read-write—unsupported.
4. ip-addresses—Specify a valid IPv4 or IPv6 address within this SNMP community that
corresponds to one or more NMS that monitors or configures this SBC. If you are
1-9
Chapter 1
SNMPv1 and SNMPv2
specifying more than one IP address, separate each IP address with a space and enclose
with parenthesis.
Note:
Configure each Oracle Communications Session Delivery Manager that manages an
SBC as trap receivers on the SBC.
ORACLE(trap-receiver)# select
<ip-address>:
ORACLE(trap-receiver)#
3. ip-address — Set the IPv4 or IPv6 address of an authorized network management system
(NMS) where traps are sent. If you do not specify a port number, the default SNMP trap
port of 162 is be used.
4. filter-level — Set the filter level threshold that indicates the severity level at which a trap is
to be sent to this particular trap receiver. The default for this parameter is critical.
Example: When a trap with a severity level of critical is generated, the SNMP agent sends
this trap only to NMSs that are configured in a trap-receiver element and have a filter-level
value of critical.
The following table maps Syslog and SNMP alarms to trap receiver filter levels.
1-10
Chapter 1
Specify an NMS for EMS Generated Traps
When configuring the trap-receiver element for use with Oracle Communications Session
Element Manager systems, Oracle recommends that the value of filter-level be set to All
for that configuration element that includes those servers.
5. community-name — Set the community name to which this trap receiver belongs. This
community must be defined in the SNMP community element.
6. Type done to save your configuration.
1-11
Chapter 1
Enabling Administrative Trap Types
ORACLE(system-config)# select
ORACLE(system-config)#
1-12
Chapter 1
Enabling Media Supervision Traps
apSysMgmtMediaSupervisionTimerExpTrap NOTIFICATION-TYPE
OBJECTS { apSysMgmtCallId }
STATUS current
DESCRIPTION
" The trap will be generated when a media supervision timer
has expired. This behavior is disabled by default but may
be enabled by changing the 'media-supervision-traps'
parameter of the 'media-manager' configuration element. The
included object is the call identifer for the call which had
the timer expire."
::= { apSystemManagementMonitors 34 }
Note:
The system does not send this trap when functioning as an integrated SBC.
The media supervision trap is disabled by default. You can enable the trap by changing the
media-supervision-traps parameter to enabled in the media-manager configuration element.
1-13
Chapter 1
View SNMP Address, Statistics and User Information
name : acme82
address : [Link]:161
mask : [Link]
total requests in : 3
total replies out : 3
total traps out : 1
snmp-address-entry
name : acmepc58
address : [Link]:161
mask : [Link]
total requests in : 0
total replies out : 0
total traps out : 1
show snmp-info statistics—View the SNMP agent mode and statistics for the SNMP engine
in Superuser mode. For example:
show snmp-info snmp-user—View information and traffic associated with SNMP users in
Superuser mode. For example:
1-14
Chapter 1
Consideration for HA Nodes
1-15
2
Introduction to MIBs and Traps
This chapter describes Management Information Bases (MIBs) and the correlation between
system alarms and the MIBs that support traps. It also provides reference information about
log levels, syslog level severities (the protocol used for the network logging of system and
network events), and trap receiver filter levels.
About MIBs
Each network device managed by SNMP must have a MIB that describes its manageable
objects. MIBs are collections of objects or definitions that define the properties of the managed
objects. Each managed object has specific characteristics.
The manager relies upon the database of definitions and information about the properties of
managed resources and the services the agents support. When new agents are added to
extend the management domain of a manager, the manager must be provided with a new MIB
component that defines the manageable features of the resources managed through that
agent.
The data types and the representations of resources within a MIB, as well as the structure of a
particular MIB, are defined in a standard called the Structure of Management Information
(SMI).
2-1
Chapter 2
About MIBs
2-2
Chapter 2
About MIBs
iso
(1)
org 1.3
(3)
dod 1.3.6
(6)
[Link]
internet
(1)
The diagram shows the Acme Packet node has the value 9148; this is Oracle's vendor-specific
number that uniquely identifies an Acme Packet product MIB. This node is the highest level of
the private (proprietary) branch containing Acme Packet managed objects. The number 9148
was assigned by the Internet Assigned Numbers Authority (IANA).
2-3
Chapter 2
MIBs Supported
Managed Objects
Managed objects are made up of one or more object instances, which are essentially
variables. Managed objects can be scalar (defining a single object instance) or tabular
(defining multiple, related instances).
SNMP Traps
The MIB also contains information about SNMP traps, which enable an agent to notify the
management station of significant events by way of an unsolicited SNMP message. When an
element sends a TRAP packet, it can include OID and value information (bindings) to clarify
the event.
MIBs Supported
The system supports both standard MIBs and Oracle-specific MIBs (enterprise MIBs). The
configurable system elements are identified in the MIBs provided by Oracle. Every system
maintains a database of values for each of the definitions written in these MIBs.
Standard MIBS
The values in the standard MIBs are defined in RFC-1213, (one of the governing specifications
for SNMP). A standard MIB includes objects to measure and monitor IP activity, TCP activity,
UDP activity, IP routes, TCP connections, interfaces, and general system description. Each of
2-4
Chapter 2
MIBs Supported
these values is associated both an official name (such as sysUpTime, which is the elapsed
time since the managed device was booted) and a numeric value expressed in dot-notation
(such as [Link].[Link].0, which is the OID for sysUpTime).
Oracle provides the following standard MIBs:
• [Link]
• [Link]
• [Link]
• [Link]
• [Link] (Oracle supports the ifName entry of the ifXTable, which is an extension to
the interface table and which replaces ifExtnsTable. See RFC 2863 for details.)
• [Link]
• [Link]
• [Link]
• [Link]
Enterprise MIBs
Oracle provides the following enterprise MIBs:
2-5
Chapter 2
Traps
Traps
A trap is initiated by tasks to report that an event has happened on the system. SNMP traps
enable an SNMP agent to notify the NMS of significant events using an unsolicited SNMP
message.
Oracle uses SNMPv2c. These notification definitions are used to send standard and enterprise
traps.
Traps are sent according to the criteria established in the following:
• IETF RFC 1907 Management Information Base for Version 2 of the Simple Network
Management Protocol
• IETF RFC 2233 The Interfaces Group MIB using SMIv2
• Appropriate enterprise MIB (for example the syslog MIB or the System Management MIB).
Standard Traps
The following table identifies the standard traps that the system supports.
2-6
Chapter 2
Traps
Enterprise Traps
The following sections list traps available on the Oracle Communications Session Border
Controller. Traps are divided by the mib file they are contained within.
Trap Description
apSyslogMessageGenerated: Generated by a syslog event. For example, this trap
[Link].4.1.9148.[Link].1 is generated if a switchover alarm occurs (for High
Availability (HA) system peers only), or if an HA
system peer times out or goes out-of-service.
Trap Description
apSysMgmtGroupTrap: Generated when a significant threshold for a
[Link].4.1.9148.[Link].1 system resource use or health score is exceeded.
For example, if Network Address Translation (NAT)
table usage, Address Resolution Protocol (ARP)
table usage, memory usage, or Central Processing
Unit (CPU) usage reaches 90% or greater of its
capacity, the apSysMgmtGroupTrap is generated. If
the health score (for HA peers only) falls below 60,
the apSysMgmtGroupTrap is generated. This trap
is sent for sessions only if tiered thresholds for
sessions have been configured in system-config,
alarm-threshold. If no tiered thresholds have been
configured for sessions, then the
apSysMgmtLicenseCapacity is sent.
2-7
Chapter 2
Traps
Trap Description
apSysMgmtGroupClearTrap: Generated when the SBC’s system resource use or
[Link].4.1.9148.[Link].2 its health score returns to levels that are within
thresholds. For example, NAT table usage or
memory usage could return to acceptable levels,
and the systems health score could return to a
level above 60.
apSysMgmtFanTrap Generated if a fan unit speed falls below the
[Link].4.1.9148.[Link].3 monitoring level.
apSysMgmtGatewayUnreachableTrap: Generated if the gateway specified becomes
[Link].4.1.9148.[Link].10 unreachable by the system.
apSysMgmtCfgSaveFailTrap: Generated if an error occurs while the system is
[Link].4.1.9148.[Link].13 trying to save the configuration to memory.
apSysMgmtAuthenticationFailedTrap: Generated upon an unsuccessful login attempt.
[Link].4.1.9148.[Link].16 The trap includes the following information:
• level (login, user, priv, shell, li-admin,
provisioners)
• protocol (console, telnet, ftp, ssh, sftp, http,
https)
• origin (<IP address>:<port>)
apSysMgmtAlgdCPULoadTrap: Generated if the CPU utilization percentage of
[Link].4.1.9148.[Link].24 application tasks has exceeded the threshold algd-
load-limit.
apSysMgmtAlgdCPULoadClearTrap: Generated when the CPU utilization percentage of
[Link].4.1.9148.[Link].25 application tasks has fallen below the threshold
algd-load-limit.
apSysMgmtENUMStatusChangeTrap: Generated if the reachability status of an ENUM
[Link].4.1.9148.[Link].27 server changes; contains:
• apENUMConfigName
• apENUMServerIpAddress
• apENUMServerStatus
apSysMgmtCollectorPushSuccessTrap: Generated when the collector successfully
[Link].4.1.9148.[Link].44 completes a push operation.
apSysMgmtGatewaySynchronizedTrap: Generated when the default gateway is
[Link].4.1.9148.[Link].49 synchronized in the ARP table.
apSysMgmtCallRecordingStateChangeTrap: Generated when a call recording server changes
[Link].4.1.9148.[Link].50 state.
apSysMgmtCDRPushReceiverFailureTrap: Generated when an enabled CDR push receiver
[Link].4.1.9148.[Link].53 fails. Returns the address, the address type, and
the failure reason code.
apSysMgmtCDRPushReceiverFailureClearTrap: Generated when an enabled CDR push receiver
[Link].4.1.9148.[Link].54 resumes normal operation after a failure.
apSysMgmtCDRPushAllReceiversFailureTrap: Generated when all enabled CDR push receivers
[Link].4.1.9148.[Link].55 fail.
apSysMgmtCDRPushAllReceiversFailureClearTrap Generated when one or more enabled CDR push
[Link].4.1.9148.[Link].56 receivers return to normal operation after failures
were encountered on all push receivers.
apSysMgmtRejectedMesagesThresholdExeededTr Generates when the number of rejected messages
ap exceeds the configured threshold within the
[Link].4.1.9148.[Link].57 configured window. This trap is used for both
whitelists and HMR rejected messages. The trap
does not indicate which feature enabled this trap.
To indicate which messages and rules generated
the trap, you can consult the [Link] file.
2-8
Chapter 2
Traps
Trap Description
apSysMgmtAdminAuditLogFullTrap: Generated when one of the audit logs full threshold
[Link].4.1.9148.[Link].58 is met:
• time interval
• file size
• percentage full
apSysMgmtAdminAuditLogFullClearTrap: Generated when free audit log storage space
[Link].4.1.9148.[Link].59 becomes available.
apSysMgmtAdminAuditPushFailTrap: Generated when the audit file transfer fails.
[Link].4.1.9148.[Link].60
apSysMgmtAdminAuditPushFailClearTrap: Generated when the audit file is successfully
[Link].4.1.9148.[Link].61 transferred.
apSysMgmtAdminAuthLockoutTrap: Generated upon system lockout after multiple
[Link].4.1.9148.[Link].64 authentication failures.
apSysMgmtCdrFileDeleteTrap Generated when a CDR file is deleted because of
[Link].4.1.9148.[Link].70 lack of space on the partition or the drive exceeds
the number of files specified.
apSysMgmtExpDOSTrap Generated when a device exceeds configured
[Link].4.1.9148.[Link].2 thresholds and is denied access by the SBC.
apSysMgmtGatewayUnreachableClear Generated when the system determines that the
[Link].4.1.9148.[Link].21 gateway in question is once again reachable.
apSysMgmtH323InitFailTrap Generated if an H.323 stack has failed to initialize
[Link].4.1.9148.[Link].12 properly and has been terminated.
apSysMgmtHardwareErrorTrap: Provides a text string indicating the type of
[Link].4.1.9148.[Link].14 hardware error that has occurred. If the message
text exceeds 255 bytes, the message is truncated
to 255 bytes.
apSysMgmtInetAddrWithReasonDOSTrap: Generated when an IP address is placed on a deny
[Link].4.1.9148.[Link].4 list because of denial-of-service attempts. It
provides the IP address that has been demoted,
the realm ID of that IP address (if available), the
URI portion of the SIP From header for the
message that caused the demotion, and the reason
for the demotion.
apSysMgmtInetAddrTrustedToUntrustedDOSTrap Generated when an IP is placed on a untrusted list
[Link].4.1.9148.[Link].5 from trusted list. Contains the ip address that has
been demoted, the realm-id of that IP (if available) ,
and the URI portion of the SIP From header of the
message that caused the demotion.
apSysMgmtInterfaceStatusChangeTrap: Generated when there is a change in the status of
[Link].4.1.9148.[Link].26 the SIP interface; either the SIP interface is in
service or constraints have been exceeded.
• apSysMgmtSipInterfaceRealmName—Realm
identifier for the SIP interface (OID
[Link].4.1.9148.[Link])
• apSysMgmtSipInterfaceIP—IP address of the
first SIP port in the SIP interface (OID
[Link].4.1.9148.[Link])
• apSysMgmtSipInterfaceStatus—Code is 0
(OID [Link].4.1.9148.[Link])
• apSysMgmtSipInterfaceStatusReason—Status
reasons and in-service (3) and
constraintExceeded (4) (OID
[Link].4.1.9148.[Link])
2-9
Chapter 2
Traps
Trap Description
apSysMgmtLDAPStatusChangeTrap: Generated if the status of whether a LDAP server is
[Link].4.1.9148.[Link].42 reachable changes.
apSysMgmtMediaBandwidthTrap: Generated if bandwidth allocation fails at a
[Link].4.1.9148.[Link].7 percentage higher or equal to the system’s default
threshold rate.
Bandwidth allocation failure rates are checked
every 30 seconds. The trap is sent when the failure
rate is at 50% or higher. After that time, the trap is
sent every 30 seconds until the failure rate drops
below 35%. The clear trap is sent once the failure
rate drops below 5%.
apSysMgmtMediaBandwidthClearTrap: Generated when the percentage rate of failure for
[Link].4.1.9148.[Link].19 media bandwidth allocation decreases to the
default allowable threshold.
apSysMgmtMediaOutofMemory: Generated if the media process cannot allocate
[Link].4.1.9148.[Link].8 memory.
apSysMgmtMediaOutOfMemoryClearr: Generated when the alarm for insufficient memory
[Link].4.1.9148.[Link].20 for media processes is cleared manually.
apSysMgmtMediaPortsTrap: Generated if port allocation fails at a percentage
[Link].4.1.9148.[Link].6 higher or equal to the system’s default threshold
rate.
Port allocation failure rates are checked every 30
seconds. The trap is sent when the failure rate is at
50% or higher. After that time, the trap is sent every
30 seconds until the failure rate drops below 35%.
The clear trap is sent once the failure rate drops
below 5%.
apSysMgmtMediaPortsClearTrap: Generated if the port allocation failure rate drops
[Link].4.1.9148.[Link].18 below the system’s default acceptable threshold.
apSysMgmtMediaUnknownRealm: Generated if the media process cannot find an
[Link].4.1.9148.[Link].9 associated realm for the media flow.
apSysMgmtNTPClockSkewTrap: Generated if the NTP has to adjust the clock by
[Link].4.1.9148.[Link].43 more than 1000 seconds.
apSysMgmtNTPServerUnreachableTrap: Generated if the specified NTP server becomes
[Link].4.1.9148.[Link].30 unreachable.
• apSysMgmtNTPServer—Server that is or was
formerly unreachable (OID
[Link].4.1.9148.[Link])
apSysMgmtNTPServerUnreachableClearTrap: Generated when an NTP server deemed
[Link].4.1.9148.[Link].31 unreachable subsequently becomes reachable.
apSysMgmtNTPServiceDownTrap: Generated if all configured NTP servers are
[Link].4.1.9148.[Link].32 unreachable.
apSysMgmtNTPServiceDownClearTrap: Generated if NTP service again becomes available.
[Link].4.1.9148.[Link].33
apSysMgmtPhyUtilThresholdTrap Generated when the media port’s utilization
crosses a configured threshold. Indicates whether
the OverloadProtection feature is active.
apSysMgmtPhyUtilThresholdClearTrap Generated when a media port’s utilization falls
below the lowest configured threshold.
apSysMgmtPowerTrap: Generated if a power supply is powered down,
[Link].4.1.9148.[Link].1 powered up, inserted/present or removed/not
present.
2-10
Chapter 2
Traps
Trap Description
apSysMgmtPushServerUnreachableTrap: Generated if the system collector cannot reach a
[Link].4.1.9148.[Link].28 specified server; used with the historical data
recording (HDR) feature.
apSysMgmtPushServerUnreachableClearTrap: Generated if the system collector can again reach
[Link].4.1.9148.[Link].29 a specified server that was unreachable; used with
the historical data recording (HDR) feature.
apSysMgmtRadiusDownTrap: Generated if all or some configured RADIUS
[Link].4.1.9148.[Link].11 accounting servers have timed out from a RADIUS
server.
2-11
Chapter 2
Traps
Trap Description
apSysMgmtRadiusDownClearTrap: Generated when some or all of the previously
[Link].4.1.9148.[Link].22 unreachable RADIUS servers can be again be
reached.
Note:
The SBC searches
for a TACACS+
server until it finds an
available one and
then stops searching.
However, in the
TACACS+ SNMP
implementation,
SNMP expects the
SBC to make
connection attempts
to all servers. When
there is only one
TACACS+ server and
that server goes
down, the SBC
behaves normally,
sending a
apSysMgmtTacacsDo
wnTrap trap when the
server goes down,
and a
apSysMgmtTacacsDo
wnClearTrap trap
when the server
comes back up.
When there is more
than one TACACS+
server and the active
server goes down, an
apSysMgmtTacacsDo
wnTrap trap is sent,
indicating that some
servers are down and
the next server is
tried. If all servers fail,
an
apSysMgmtTacacsDo
wnTrap is sent
indicating that all
servers are down. If
one of the servers
comes back up while
the rest are still down,
an
apSysMgmtTacacsDo
wnTrap is sent
indicating that some
servers are still down.
2-12
Chapter 2
Traps
Trap Description
apSysMgmtTacacsDownTrap Generated when a TACACS+ server becomes
[Link].4.1.9148.[Link].78 unreachable.
Note:
The SBC searches
for a TACACS+
server until it finds an
available one and
then stops searching.
However, in the
TACACS+ SNMP
implementation,
SNMP expects the
SBC to make
connection attempts
to all servers. When
there is only one
TACACS+ server and
that server goes
down, the SBC
behaves normally,
sending a
apSysMgmtTacacsDo
wnTrap trap when the
server goes down,
and a
apSysMgmtTacacsDo
wnClearTrap trap
when the server
comes back up.
When there is more
than one TACACS+
server and the active
server goes down, an
apSysMgmtTacacsDo
wnTrap trap is sent,
indicating that some
servers are down and
the next server is
tried. If all servers fail,
an
apSysMgmtTacacsDo
wnTrap is sent
indicating that all
servers are down. If
one of the servers
comes back up while
the rest are still down,
an
apSysMgmtTacacsDo
wnTrap is sent
indicating that some
servers are still down.
2-13
Chapter 2
Traps
Trap Description
apSysMgmtTacacsDownClearTrap Generated when a TACACS+ server that was
[Link].4.1.9148.[Link].79 unreachable becomes reachable.
apSysMgmtRealmIcmpFailureTrap: Generated when ICMP heartbeat failure occurs.
[Link].4.1.9148.[Link].51
apSysMgmtRealmIcmpFailureClearTrap: Generated when ICMP heartbeat failure clears.
[Link].4.1.9148.[Link].52
apSysMgmtRegCacheThresholdTrap: Generated when the number of contacts stored in
[Link].4.1.9148.[Link].46 the registration cache exceeds the configured
threshold.
apSysMgmtRegCacheThresholdClearTrap: Generated when the number of contacts stored in
[Link].4.1.9148.[Link].47 the registration cache falls below the configured
threshold.
apSysMgmtRealmMinutesExceedTrap: Generated if the monthly minutes for a realm are
[Link].4.1.9148.[Link].40 exceeded.
apSysMgmtRealmMinutesExceedClearTrap: Generated if monthly minutes for a realm are reset.
[Link].4.1.9148.[Link].41
apSysMgmtRealmStatusChangeTrap: Generated when there is a change in the status of
[Link].4.1.9148.[Link].45 the realm constraints.
apSysMgmtRedundancyTrap: Generated if a state change occurs on either the
[Link].4.1.9148.[Link].5 primary or secondary system in a redundant (HA)
pair.
apSysMgmtSAStatusChangeTrap: Generated when a session agent is declared
[Link].4.1.9148.[Link].15 unreachable or unresponsive for the following
reasons:
• signaling timeout (H.323 and SIP)
• session agent does not respond to SIP pings
(SIP only)
When session agents are declared unreachable or
unresponsive, they are placed out-of-service for a
configurable period of time.
apSysMgmtSipRejectionTrap: Generated when a SIP INVITE or REGISTRATION
[Link].4.1.9148.[Link].1 request fail.
apSysMgmtSpaceAvailThresholdTrap: Generated when the space available on a partition
[Link].4.1.9148.[Link].68 crosses a configured space threshold.
apSysMgmtSpaceAvailThresholdClearTrap: Generated when the space available on a partition
[Link].4.1.9148.[Link].69 falls below the lowest configured threshold.
apSysMgmtSurrogateRegFailed: Generated if a SIP user attempts to register more
[Link].4.1.9148.[Link].39 than the configured, allowable number of times;
supports SIP surrogate registration for IMS.
• apSysMgmtSurrogateRegHost (OID
[Link].4.1.9148.[Link].35)
• apSysMgmtSurrogateRegAor (OID
[Link].4.1.9148.[Link].36)
apSysMgmtSystemStateTrap: Generated when the SBC is instructed to change
[Link].4.1.9148.[Link].17 the system-state or the transition from becoming
offline to online occurs. This trap contains one field
called apSysMgmtSystemState, and that field has
three values:
• online(0)
• becoming-offline(1)
• offline(2)
2-14
Chapter 2
Traps
Trap Description
apSysMgmtTaskDelete: Generated to described what task was deleted.
[Link].4.1.9148.[Link] From Release C4.1.4 and C5.1.0 forward, this trap
contains text noting that the time has been reset
when the system clock time and remote clock time
are too far skewed.
apSysMgmtTaskDeleteTrap: [Reserved for future use.]
[Link].4.1.9148.[Link].23 Generated when a task is deleted; it reads
apSysMgmtTaskDelete and includes the test in the
trap.
apSysMgmtTaskSuspendTrap: Generated if a critical task running on the system
[Link].4.1.9148.[Link].4 enters a suspended state.
apSysMgmtTempTrap: Generated if the temperature falls below the
[Link].4.1.9148.[Link].2 monitoring level.
apSysMgmtAdminWriteFailTrap: Generated when a write to the admin audit or a
[Link].4.1.9148.[Link].62 history file fails.
apSysMgmtAdminWriteFailClearTrap: Generated when a write to the admin audit or a
[Link].4.1.9148.[Link].63 history file succeeds after a write to either had
previously failed.
apSysMgmtExtPolicyServerConnDownTrap Generated when the SBC is unable to connect to
[Link].4.1.9148.[Link].74 an external policy server
apSysMgmtExtPolicyServerConnEstTrap Generated when the SBC is able to re-establish a
[Link].4.1.9148.[Link].75 connection with an external policy server
apSecurityOCSRDownNotification: Generated when an OSCR server becomes
[Link].4.1.9148.[Link].0.1 unreachable.
apSecurityOCSRUpNotification: Generated when an OSCR server becomes
[Link].4.1.9148.[Link].0.2 available.
apSysMgmtOCSRDownTrap: Generated if all or some of the configured OSCR
[Link].4.1.9148.[Link].80 accounting servers are down.
apSysMgmtOCSRDownClearTrap: Generated if all OSCR accounting servers have
[Link].4.1.9148.[Link].81 resumed communications.
apSysMgmntH248AssociationLostClearTrap This trap will be generated when an H248 control
[Link].4.1.9148.[Link].36 association between a border gateway and session
controller has been restored. The included object is
the border gateway identifier.
apSysMgmntH248AssociationLostTrap This trap will be generated when an H248 control
[Link].4.1.9148.[Link].35 association between a border gateway and session
controller is lost. The included object is the border
gateway identifier.
apSysMgmtDatabaseRegCacheCapClearTrap The trap will be generated when the number of
[Link].4.1.9148.[Link].77 database-type contacts stored in the registration
cache falls below the licensed threshold.
apSysMgmtDatabaseRegCacheCapTrap The trap will be generated when the number of
[Link].4.1.9148.[Link].76 database-type contacts stored in the registration
cache exceeds the licensed threshold.
apSysMgmtH248PortMapUsageClearTrap The trap will be generated when the port map
[Link].4.1.9148.[Link].85 usage on H.248 core side Goes down below 90%.
apSysMgmtH248PortMapUsageTrap The trap will be geenerated when the port map
[Link].4.1.9148.[Link].84 usage on H.248 core side Exceeds 90%.
2-15
Chapter 2
Traps
Trap Description
apSysMgmtLPLookupExceededTrap The trap will be generated the first time the
[Link].4.1.9148.[Link].65 Additional Local Policy Lookups limit is reached in
the recent window period. This trap will only occur
once during a window period.
apSysMgmtMediaSupervisionTimerExpTrap The trap will be generated when a media
[Link].4.1.9148.[Link].34 supervision timer has expired. This behavior is
disabled by default but may be enabled by
changing the 'media-supervision-traps' parameter
of the 'media-manager' configuration element. The
included object is the call identifier for the call
which had the timer expire.
apSysMgmtSataAccessErrorTrap The trap will be generated when there is fatal
[Link].4.1.9148.[Link].71 access error on the SATA hard drive.
apSysMgmtShortSessionExceedTrap The trap will be generated when the amount of
[Link].4.1.9148.[Link].48 short sessions in a realm exceeds the short
session threshold within the short session window.
apSysMgmtSingleUnitRedundancyTrap The trap will generated a slot's status changes. The
[Link].4.1.9148.[Link].3 varbinds contain the new information for the
generating slot.
apSysMgmtSipInterfaceRegCacheThresholdClearT The trap will be generated when the number of
rap contacts stored in the registration cache falls below
[Link].4.1.9148.[Link].83 the configured threshold for the sip interface.
apSysMgmtSipInterfaceRegCacheThresholdTrap The trap will be generated when the number of
[Link].4.1.9148.[Link].82 contacts stored in the registration cache exceeds
the configured threshold for the sip interface.
apSysMgmtTcaClearTrap The trap will be generated when a Threshold
[Link].4.1.9148.[Link].73 Crossing Alert counter has fallen below the lowest
configured TCA reset-threshold value
apSysMgmtTcaTrap The trap will be generated when a Threshold
[Link].4.1.9148.[Link].72 Crossing Alert counter crosses a configured TCA
threshold
apSysMgmtGroupTrap Traps
The apSysMgmtGroupTrap ([Link].4.1.9148.[Link].1) can convey multiple traps by
identifying a system event and corresponding value. The apSysMgmtGroupClearTrap
([Link].4.1.9148.[Link].2) is sent when this condition is cleared, according to the application.
apSysMgmtTrapType Description
apSysXCodeOpusCapacity When Opus session utilization exceeds 90%, this
[Link].4.1.9148.[Link].46 object is sent in the apSysMgmtGroupTrap. When
utilization falls below 85%, the
apSysMgmtGroupClearTrap is sent.
apSysXCodeSILKCapacity When SILK session utilization exceeds 90%, this
[Link].4.1.9148.[Link].47 object is sent in the apSysMgmtGroupTrap. When
utilization falls below 85%, the
apSysMgmtGroupClearTrap is sent.
2-16
Chapter 2
Traps
apSysMgmtTrapType Description
apSysResrvdNsepSessionCapacity When enabled, the system detects when it has
[Link].4.1.9148.[Link].50 exceeded either the minor, major or critical number
of reserved NSEP sessions, it sends this object in
the apSysMgmtGroupTrap. These thresholds are,
by default, 70%, 80% and 90% of your reserved
NSEP session pool, respectively.
When NSEP session utilization falls below the
triggered threshold, the system sends the
apSysMgmtGroupClearTrap.
Trap Description
apSwCfgActivateNotification: Generated when an activate-config command is
[Link].4.1.9148.[Link].1 issued and the configuration has been changed at
running time.
This trap includes the next two objects in this table.
apSwCfgTrapPreviousVersion The previous version before this trap happened
[Link].4.1.9148.[Link].1
apSwCfgTrapCurrentVersion The current version after this trap happened
[Link].4.1.9148.[Link].2
Trap Description
apEnvMonI2CFailNotification: Sent when the Inter-IC bus (I2C) state changes
[Link].4.1.9148.[Link].1 from normal (1) to not functioning (7).
apEnvMonPortChangeNotification: For the AP4500 only. Generated if a physical port is
[Link].4.1.9148.[Link].5 inserted/present or removed/not present.
apEnvMonStatusChangeNotification: Sent when any entry of any environment monitor
[Link].4.1.9148.[Link].2 table changes in the state of a device being
monitored. To receive this trap, you need to set the
system config’s enable- env- monitor- table value to
enabled.
2-17
Chapter 2
Traps
Trap Description
apLicenseApproachingCapacityNotification: Generated when the total number of active
[Link].4.1.9148.[Link].1 sessions on the system (across all protocols) is
within 98 - 100% of the licensed capacity.
apLicenseNotApproachingCapacityNotification: Generated when the total number of active
[Link].4.1.9148.[Link].2 sessions on the system (across all protocols) has
gone to or below 90% of its licensed capacity (but
no sooner than 15 seconds after the original alarm
was triggered).
apLicenseExpirationWarningNotification This trap is sent when a license is within 7 days of
[Link].4.1.9148.[Link].3 expiration.
Trap Description
apSecurityTunnelFailureNotification: Generated when an IPSec IKEV2 tunnel cannot be
[Link].4.1.9148.[Link].0.1 established.
apSecurityRadiusFailureNotification The notification will be generated whenever
[Link].4.1.9148.[Link].0.2 RADIUS authentication request fails.
apSecurityAuthFailureThresholdNotification Generated when IKE DDos auth-failure-threshold is
[Link].4.1.9148.[Link].0.3 reached and report mode includes SNMP trap.
apSecurityTacacsFailureNotification Generated when TACACS+ authentication request
[Link].4.1.9148.[Link].0.4 fails due to one of the following reasons:
• a TACACS+ daemon becomes unreachable
• an unreachable TACACS+ daemon becomes
reachable
• an authentication error occurs
• an authorization error occurs
apSecurityTunnelFailureInetNotification The notification will be generated whenever IPSEC
[Link].4.1.9148.[Link].0.5 IKEV2 tunnel fails to establish.
apSecurityAuthFailureThresholdInetNotification Generated when IKE DDos auth-failure-threshold is
[Link].4.1.9148.[Link].0.6 reached and report mode includes SNMP trap.
apSecurityTunnelDPDNotification: Generated when an IPSec IKEV2 tunnel fails
[Link].4.1.9148.[Link].0.1 because of Dead Peer Detection (DPD).
apSecurityIPsecTunCapNotification This notification is sent when the percentage of
[Link].4.1.9148.[Link].0.2 licensed IPsec tunnels exceeds an IPsec tunnel
alarm threshold. The apSecurityIPsecTunCapPct
object indicates the current percentage.
apSecurityIPsecTunCapClearNotification This trap is sent when the percentage of licensed
[Link].4.1.9148.[Link].0.3 IPsec tunnels no longer exceeds an IPsec tunnel
alarm threshold. The apSecurityIPsecTunCapPct
object indicates the current percentage.
apSecurityTunnelDPDInetNotification The notification will be generated whenever IPSEC
[Link].4.1.9148.[Link].0.4 IKEV2 tunnel fails due to Dead Peer Detection
(DPD).
apSecurityCRLInvalidNotification: Generated when an invalid CRL is detected.
[Link].4.1.9148.[Link].0.1
apSecurityCRLRetrievalFailNotification This notification is sent when there is a failure in
[Link].4.1.9148.[Link].0.1 CRL retrieval.
2-18
Chapter 2
Traps
Trap Description
apSecurityCRLRetrievalClearNotification This notification is sent when there is a success in
[Link].4.1.9148.[Link].0.2 CRL retrieval.
apSecurityCertExpiredNotification This trap is generated periodically if a locally
[Link].4.1.9148.[Link].0.1 installed certificate has expired. The interval of
minutes between this trap being generated is
configured in the local-cert-exp-trap-int
parameter.
apSecurityCertExpireSoonNotification This trap is generated if a locally installed
[Link].4.1.9148.[Link].0.2 certificate will soon expire. The number of days
before expiration in which this trap is sent is
configured in the local-cert-exp-warn-period
parameter.
apSecurityGTPLinkFailureNotification This notification is sent when there is a link failure
[Link].4.1.9148.[Link].0.1 with GGSN/PGW on GTP Profile.
apSecurityGTPLinkClearNotification This notification is sent when the link is restored
[Link].4.1.9148.[Link].0.2 with GGSN/PGW on GTP Profile.
apSecurityTacacsDownLocalAuthUsedTrap The trap will be generated when a user remotely
[Link].4.1.9148.[Link].0.1 logs into a system configured for TACACS+
authentication and is authenticated locally by the
system because all of the configured and enabled
TACACS+ servers have become unreachable or
unresponsive.
apSecurityTacacsDownLocalAuthUsedClearTrap The trap will be generated when a user remotely
[Link].4.1.9148.[Link].0.2 logs into a system configured for TACACS+
authentication and is successfully authenticated
(i.e., access accepted or denied) remotely by a
configured and enabled TACACS+ server.
apSecurityTlsEncryptionFailureNotification These notifications are sent when there is a failure
[Link].4.1.9148.[Link].0.1 during TLS packet encryption.
The MIB objects involved are:
• apSecuritySrcAddressFamily
([Link].4.1.9148.[Link])
• apSecuritySrcAddress
([Link].4.1.9148.[Link])
• apSecuritySrcPort
• apSecurityDstAddressFamily
([Link].4.1.9148.[Link])
• apSecurityDstAddress
([Link].4.1.9148.[Link])
• apSecurityDstPort
• apSecurityTlsEncryptionFailureCause
([Link].4.1.9148.[Link])
• apSecurityTlsCipherSuite
([Link].4.1.9148.[Link])
• apSecurityTlsSessionId
([Link].4.1.9148.[Link])
• apSecurityTlsPacketFailureCount
([Link].4.1.9148.[Link])
2-19
Chapter 2
Traps
Trap Description
apSecurityTlsDecryptionFailureNotification These notifications are sent when there is a failure
[Link].4.1.9148.[Link].0.2 during TLS packet decryption.
The MIB objects involved are:
• apSecuritySrcAddressFamily
([Link].4.1.9148.[Link])
• apSecuritySrcAddress
([Link].4.1.9148.[Link])
• apSecuritySrcPort
• apSecurityDstAddressFamily
([Link].4.1.9148.[Link])
• apSecurityDstAddress
([Link].4.1.9148.[Link])
• apSecurityDstPort
• apSecurityTlsDecryptionFailureCause
([Link].4.1.9148.[Link])
• apSecurityTlsCipherSuite
([Link].4.1.9148.[Link])
• apSecurityTlsSessionId
([Link].4.1.9148.[Link])
• apSecurityTlsPacketFailureCount
([Link].4.1.9148.[Link])
apSecuritySrtpEncryptionFailureNotification These notifications are sent when there is a failure
[Link].4.1.9148.[Link].0.1 during SRTP packet encryption.
The MIB objects involved are:
• apSecuritySrcAddressFamily
([Link].4.1.9148.[Link])
• apSecuritySrcAddress
([Link].4.1.9148.[Link])
• apSecuritySrcPort
• apSecurityDstAddressFamily
([Link].4.1.9148.[Link])
• apSecurityDstAddress
([Link].4.1.9148.[Link])
• apSecurityDstPort
• apSecuritySrtpEncryptionFailureCause
([Link].4.1.9148.[Link])
• apSecuritySrtpEncrAlgorithm
([Link].4.1.9148.[Link])
• apSecuritySrtpAuthAlgorithm
([Link].4.1.9148.[Link])
2-20
Chapter 2
Traps
Trap Description
apSecuritySrtpDecryptionFailureNotification These notifications are sent when there is a failure
[Link].4.1.9148.[Link].0.2 during SRTP packet decryption.
The MIB objects involved are:
• apSecuritySrcAddressFamily
([Link].4.1.9148.[Link])
• apSecuritySrcAddress
([Link].4.1.9148.[Link])
• apSecuritySrcPort
• apSecurityDstAddressFamily
([Link].4.1.9148.[Link])
• apSecurityDstAddress
([Link].4.1.9148.[Link])
• apSecurityDstPort
• apSecuritySrtpDecryptionFailureCause
([Link].4.1.9148.[Link])
• apSecuritySrtpEncrAlgorithm
([Link].4.1.9148.[Link])
• apSecuritySrtpAuthAlgorithm
([Link].4.1.9148.[Link])
apSecurityAuthFailureThresholdInetNotification
Trap Description
apSLBEndpointCapacityThresholdTrap The trap will be generated when the number of
[Link].4.1.9148.[Link].1 endpoints on the SLB exceeds the configured
threshold.
apSLBEndpointCapacityThresholdClearTrap The trap will be generated when the number of
[Link].4.1.9148.[Link].2 endpoints on the SLB falls below the configured
threshold.
apSLBUntrustedEndpointCapacityThresholdTrap The trap will be generated when the number of
[Link].4.1.9148.[Link].3 untrusted endpoints on the SLB exceeds the
configured threshold.
apSLBUntrustedEndpointCapacityThresholdClearTra The trap will be generated when the number of
p untrusted endpoints on the SLB falls below the
[Link].4.1.9148.[Link].4 configured threshold.
Trap Description
apH323StackMaxCallThresholdTrap: Generated when the number of H.323 calls
[Link].4.1.9148.[Link].1 increases the percentage of the max calls
threshold.
apH323StackMaxCallThresholdClearTrap: Generated when the number of H.323 calls
[Link].4.1.9148.[Link].2 decreases to below the lowest max calls threshold.
2-21
Chapter 2
Traps
Trap Description
apDiameterAcctSrvrUpTrap: Generated when a Diameter Accounting Server
.[Link].4.1.9148.[Link].2.0.1 goes up.
apDiameterAcctSrvrDownTrap: Generated when a Diameter Accounting Server
[Link].4.1.9148.[Link].2.0.2 goes down.
apAcctMsgQueueFullTrap: Generated when the accounting message queue is
[Link].4.1.9148.[Link].2.0.3 full and all accounting servers are down.
apAcctMsgQueueFullClearTrap: Generated when the apAcctMsgQueueFullTrap
[Link].4.1.9148.[Link].2.0.4 condition clears.
apDiameterSrvrErrorResultTrap: Generated when the Diameter Server returns 3xxx
[Link].4.1.9148.[Link].2.0.5 (Protocol Errors), 4xxx (Transient Failures), or 5xxx
(Permanent Failure) Result-Code AVP (268).
apDiameterSrvrSuccessResultTrap: After an error result, generated when the Diameter
[Link].4.1.9148.[Link].2.0.6 Server returns a 2xxx (Success) Result-Code AVP
(268).
Trap Description
apDnsAlgStatusChangeTrap Generated if the reachability status of an DNS-ALG
[Link].4.1.9148.[Link].0.1 server changes from In-Service to either Timed out
or Out of Service.
apDnsAlgStatusChangeClearTrap Generated if the reachability status of an DNS-ALG
[Link].4.1.9148.[Link].0.2 server changes from either Timed out or Out of
Service to In-Service.
apDnsAlgConstraintStateChangeTrap Generated if a DNS-ALG configuration object's
[Link].4.1.9148.[Link].0.3 constraints state changes from In-Service to
Constraints Exceeded.
apDnsAlgConstraintStateChangeClearTrap Generated if a DNS-ALG configuration object's
[Link].4.1.9148.[Link].0.4 constraints state changes from Constraints
Exceeded to In-Service.
apDnsAlgSvrConstraintStateChangeTrap Generated if a DNS Server (i.e. IP-Address)
[Link].4.1.9148.[Link].0.5 constraints state changes from In-Service to
Constraints Exceeded.
apDnsAlgSvrConstraintStateChangeClearTrap Generated if a DNS Serve (i.e. IP-Address)
[Link].4.1.9148.[Link].0.6 constraints state changes from Constraints
Exceeded to In-Service.
2-22
Chapter 2
Traps
Trap Description
apAppsENUMServerStatusChangeTrap Generated if the reachability status of an ENUM
[Link].4.1.9148.[Link].1.0.1 server changes.
apAppsDnsServerStatusChangeTrap Generated if the reachability status of a DNS
[Link].4.1.9148.[Link].2.0.1 server changes.
apAclDropOverThresholdTrap Generated when the acl drop ratio exceeds the
[Link].4.1.9148.[Link].4.0.1 configured threshold.
apAclDropOverThresholdClearTrap Generated when the acl drop ratio goes below the
[Link].4.1.9148.[Link].4.0.2 configured threshold.
apMonitorCollectorDownTrap Generated when there is a disconnect between a
[Link].4.1.9148.[Link].3.0.1 Session Border Controller and a CommMonitor.
apMonitorCollectorClearTrap Generated when a Session Border Controller
[Link].4.1.9148.[Link].3.0.2 reconnects with the CommMonitor and normal
operation resumes.
apStirServerUnreachableTrap Generated when experiencing repeated sequential
[Link].4.1.9148.[Link].5.0.1 REST STI server response timeouts the SBC.
apStirServerUnreachableClearTrap Generated when experiencing repeated sequential
[Link].4.1.9148.[Link].5.0.2 REST STI server response timeouts the SBC stop
occurring.
2-23
Chapter 2
Traps
apAclDropOverThresholdTrap Objects
The following objects, which are part of the apAclDropOverThresholdTrap, are not available
with an SNMP GET.
2-24
Chapter 2
Persistent indexing of SNMP Tables
ObjectID Wrapping
The maximum value of an object that is persistently indexed is 4294967295. In the unlikely
event that the Net-Net SBC exhausts all index values, it will wrap beginning with the first,
lowest, unused index number.
Persistent Exception
Using the backup-config and the restore-backup-config commands do not impact the index
persistency. But, if a configuration file created on one Net-Net SBC is loaded on another Net-
Net SBC, the element IDs were assigned by the first Net-Net SBC are likely to be different that
the IDs used on the second Net-Net SBC.
If, after a backup is created, an element is deleted from the configuration and then later
created again, the element's ID will probably change. Then, if the operator restores an older
backup, a change in the MIB ID of the object will result.
2-25
Chapter 2
Log Levels and syslog Level Severities
Log Levels
The following table defines the log levels by name and number, and provides a description of
each level.
2-26
Chapter 2
Log Levels and syslog Level Severities
2-27
Chapter 2
Platform sysObjectIDs
The following table describes the types of events that an NMS can receive.
For more information about the filter-level field specifically or the trap-receiver element in
general, refer to the Configuration via the ACLI chapter of the Administration and Configuration
Guide for the ACLI.
Platform sysObjectIDs
Each hardware platform in the Acme Packet family has a designated system object ID
(sysObjectID). In addition to the system object ID, each platform includes a descriptive string
(sysDescr) comprised of the product name followed by a string identifying the full software
version operating on the system.
Platform sysObjectID
Acme Packet 3900 apNetNet3900: [Link].4.1.9148.1.3.3
Acme Packet 3950 apNetNet3950: [Link].4.1.9148.1.3.4
Acme Packet 4900 apNetNet4900: [Link].4.1.9148.1.1.4
Acme Packet 4600 apNetNet4600: [Link].4.1.9148.1.1.3
Acme Packet 6100 apNetNet6100: [Link].4.1.9148.1.5.2
Acme Packet 6300 apNetNet6300: [Link].4.1.9148.1.5.1
2-28
3
Standard SNMP GET Requests
This section explains the standard SNMP GET requests supported by the Oracle
Communications Session Border Controller. SNMP uses five basic messages, one of which is
the GET request that is used to query for information on or about a network entity.
Interfaces Object
Interface Table
The following table describes the standard SNMP Get support for the interfaces table, which
contains information on the entity's interfaces. Each interface is thought of as being attached to
3-1
Chapter 3
Interfaces Object
a subnetwork. (Note that this term should not be confused with subnet, which refers to an
addressing partitioning scheme used in the Internet suite of protocols.)
3-2
Chapter 3
Interfaces Object
3-3
Chapter 3
Interfaces Object
3-4
Chapter 3
Interfaces Object
separated from the first part by a space, a keyword that represents the internal interface type.
The values can be {ETH, FE, GE, OC, XE, null}.
RFC 3635 supercedes RFC 2665. RFC 2665 recommends, but RFC 3635 requires, that all
Ethernet-like interfaces use an ifType of ethernetCsmacd (6) regardless of the speed that the
interface is running or the link-layer encapsulation in use. Heretofore, Oracle Communications
Session Border Controllers could return values of fastEthernet (62) and gigaEthernet (117),
but, in accordance with RFC 3635, will now return ethernetCsmacd (6) for all Ethernet interface
types. To let users determine the type of Ethernet interface more readily than by some other
method, Oracle has changed the syntax for ifDescr to include the interface type.
The current values of ifDescr are either the names of physical or network interfaces (for
example, "wancom0", "lo", "s1p0", "Access", or "Core"), or, for sub-interfaces, interface names
appended with sub-interface numbers (for example, "Access.22" or "Core.33"). This change
adds to the ifDescr string, separated from the first part by a space, a keyword that represents
the internal interface type rather than the actual queried value. The current set of possible
values is {ETH, FE, GE, XE, null}.
Examples:
• wancom0 GE
• lo (Second part empty)
• s1p0 GE
• s0p0 XE
• Access GE
• Access.22 (Second part empty)
• Core.33 (Second part empty)
3-5
Chapter 3
ifXTable Table
ifXTable Table
The ifXTable is available to support 64-bit counters for interface statistics. Only Gets are
supported for this MIB Table, and are supported on all interfaces.
3-6
Chapter 3
ifXTable Table
3-7
Chapter 3
ifXTable Table
3-8
Chapter 3
ifXTable Table
3-9
Chapter 3
ip Object
ip Object
The following table describes the standard SNMP Get support for the IP group. Implementation
of the IP group is mandatory for all systems. The IP address table contains this entity's IP
addressing information
3-10
Chapter 3
ip Object
3-11
Chapter 3
ip Object
3-12
Chapter 3
ip Object
ipAddrTable Table
The table of addressing information relevant to this entity's IPv4 addresses.
3-13
Chapter 3
icmp Object
icmp Object
The following table describes the standard SNMP Get support for the Internet Control Message
Protocol (ICMP) group. Implementation of the ICMP group is mandatory for all systems.
3-14
Chapter 3
TCP Object
TCP Object
The following table describes the standard SNMP Get support for the TCP connection table,
which contains information about this entity's existing TCP connections.
3-15
Chapter 3
TCP Object
3-16
Chapter 3
UDP Object
tcpConnTable Table
Per connection, [Link]: [Link].[Link].1.x Refer to the following table
for all objects per connection.
UDP Object
The following table describes the standard SNMP Get support for the UDP group.
Implementation of the UDP group is mandatory for all systems which implement the UDP. The
UDP listener table contains information about this entity's UDP end-points on which a local
application is currently accepting datagrams.
3-17
Chapter 3
System Object
System Object
The following table describes the standard SNMP Get support for the system group which is a
collection of objects common to all managed systems.
3-18
Chapter 3
System Object
layer functionality
1 physical (for example, repeaters)
2 datalink/subnetwork (for example, bridges)
3 internet (for example, supports IP)
4 end-to-end (for example, supports TCP)
7 applications (for example., supports SMTP)
For systems including OSI protocols, layers 5 and 6 may also be counted.
3-19
Chapter 3
SNMP Object
SNMP Object
The following table describes the standard SNMP Get support for the SNMP group which is a
collection of objects providing basic instrumentation and control of an SNMP entity.
3-20
Chapter 3
Physical Entity Table
3-21
Chapter 3
Physical Entity Table
3-22
Chapter 3
Physical Entity Table
3-23
Chapter 3
Physical Entity Table
3-24
Chapter 3
Physical Entity Table
3-25
Chapter 3
Physical Entity Table
3-26
Chapter 3
Physical Entity Table
3-27
Chapter 3
Physical Entity Table
3-28
Chapter 3
Physical Entity Table
3-29
4
Enterprise SNMP GET Requests
This section explains the proprietary enterprise SNMP GET requests supported by the system.
The SNMP GET is used to query for information on or about a network entity.
apAppsENUMServerStatusTable Table
The following table all configured ENUM servers' status.
apAppsDnsServerStatusTable
The following table all configured ENUM servers' status.
4-1
Chapter 4
Applications MIB ([Link])
apAppsStirMIBObjects Table
The apAppsStirMIBObjects is an object that consists of all the STIR-related tables. This table
collects and assembles all STIR/SHAKEN MIB data for presentation using SNMP.
Tables within the apAppsStirMIBObjects ([Link].4.1.9148.[Link].4) table include:
• apAppsStirServerTable ([Link].4.1.9148.[Link].4.1), which references:
– apAppsStirServerEntry
– apStirServerIndex
– apStirServerName
• apAppsStirStatsTable ([Link].4.1.9148.[Link].4.2), which references:
– apAppsStirStatsEntry
– apStirStatsServerIndex
– apCounterStatsType
– apStirServerStats
– apStirStatsType
• apAppsStirAgentTable ([Link].4.1.9148.[Link].4.3), which references:
– apAppsStirAgentEntry
– apStirAgentIndex
– apStirAgentName
• apAppsStirAgentStatsTable ([Link].4.1.9148.[Link].4.4), which references:
– apAppsStirAgentStatsEntry
– apStirStatsAgentIndex
– apCounterStatsAgentType
– apStirAgentStatsType
– apStirAgentStats
• apAppsStirSipInterfaceTable ([Link].4.1.9148.[Link].4.5), which references:
– apAppsStirSipInterfaceEntry
– apStirSipInterfaceIndex
– apStirSipInterfaceName
• apAppsStirSipInterfaceStatsTable ([Link].4.1.9148.[Link].4.6), which references:
– apAppsStirSipInterfaceStatsEntry
– apStirStatsSipInterfaceIndex
– apCounterStatsSipInterfaceType
– apStirSipInterfaceStatsType
– apStirSipInterfaceStats
• apAppsStirRealmTable ([Link].4.1.9148.[Link].4.7), which references:
– apAppsStirRealmEntry
4-2
Chapter 4
Applications MIB ([Link])
– apStirRealmIndex
– apStirRealmName
• apAppsStirRealmStatsTable ([Link].4.1.9148.[Link].4.8), which references:
– apAppsStirRealmStatsEntry
– apStirStatsRealmIndex
– apCounterStatsRealmType
– apStirRealmStatsType
– apStirRealmStats
• apAppsStirSystemStatsTable ([Link].4.1.9148.[Link].4.9) , which references:
– apAppsStirSystemStatsEntry
– apCounterStatsSystemType
– apStirSystemStatsType
– apStirSystemStats
apAppsStirServerTable
The table lists STIR server names with object apStirServerName indexed by a persistent index
apStirServerIndex.
apAppsStirServerStatsTable
The following table collects information on all configured STIR servers' status.
The apStirServerName OID is [Link].4.1.9148.[Link].[Link].
The apAppsStirServerStatsTable uses three variables to specify each object, as follows:
1. The first index is the server index.
This component of the SNMP table uses the config-object ID the system creates when you
create the object. The STI server labels are contained in OID APAPPS-
MIB::apStirServerName.
2. The second index is an enumeration of the counter types:
• recent = 1
• total = 2
• permax = 3
3. The third index is the data category.
For example, the apStirServerStats instances have an OID of the form apStirServerStats.x.y.z,
where:
• apStirServerStats is [Link].4.1.9148.[Link].[Link];
• x is the stir server's index;
• y is the ApCounterStatsType (recent = 1, total = 2, or permax = 3)
• z is the data category
Each data category is found within each ApCounterStatsType. The "asQueries" category, for
example, is found within the recent, total, and permax counter types.
4-3
Chapter 4
Applications MIB ([Link])
4-4
Chapter 4
Applications MIB ([Link])
The apStirStatsTypeMax marks the end of the defined types. No object should have the index
with its value. If an object has this value, the number of the apStirServerStatsType values has
been expanded and either this MIB Guide or the MIB Package should be updated.
4-5
Chapter 4
Applications MIB ([Link])
The apStirStatsTypeMax marks the end of the defined types. No object should have the index
with its value. If an object has this value, the number of the apStirServerStatsType values has
been expanded and either this MIB Guide or the MIB Package should be updated.
apAppsStirAgentStatsTable
The following tables collect information on all configured STIR session agents' status. The
apAppsStirAgentStats reference is the name for all apAppsStirAgentStatsTable stats elements.
The apStirAgentName OID is [Link].4.1.9148.[Link].[Link].
The apAppsStirAgentStatsTable uses three variables to specify each object, as follows:
1. The first index is the STIR session agent index.
This component of the SNMP table uses the config-object ID the system creates when you
create the object. The STI agent labels are contained in OID APAPPS-
MIB::apStirAgentName.
2. The second index is an enumeration of the counter types:
• recent = 1
• total = 2
• permax = 3
3. The third index is the data category.
For example, the apAppsStirAgentStats instances have an OID of the form
apAppsStirAgentStats.x.y.z, where:
• apStirAgentStats is [Link].4.1.9148.[Link].[Link]
• x is the STIR sesion agent's index
• y is the ApCounterStatsType (recent = 1, total = 2, or permax = 3)
• z is the data category
Each data category is found within each ApCounterStatsType. The "asQueries" category, for
example, is found within the recent, total, and permax counter types.
4-6
Chapter 4
Applications MIB ([Link])
4-7
Chapter 4
Applications MIB ([Link])
The apStirStatsTypeMax marks the end of the defined types. No object should have the index
with its value. If an object has this value, the number of the apStirServerStatsType values has
been expanded and either this MIB Guide or the MIB Package should be updated.
4-8
Chapter 4
Applications MIB ([Link])
The apStirStatsTypeMax marks the end of the defined types. No object should have the index
with its value. If an object has this value, the number of the apStirServerStatsType values has
been expanded and either this MIB Guide or the MIB Package should be updated.
apAppsStirSipInterfaceStatsTable
The following table collects information on all configured sip-interface status. The
apStirSipInterfaceStats reference is the name for all apAppsStirSipInterfaceStatsTable stats
elements.
The apStirSipInterfaceName OID is [Link].4.1.9148.[Link].[Link].
The apAppsStirSipInterfaceStatsTable uses three variables to specify each object, as follows:
1. The first index is the sip-interface index.
This component of the SNMP table uses the config-object ID the system creates when you
create the object. The STI labels are contained in OID APAPPS-
MIB::apStirSipInterfaceName.
2. The second index is an enumeration of the counter types:
• recent = 1
• total = 2
• permax = 3
3. The third index is the data category.
For example, the apStirSipInterfaceStats instances have an OID of the form
apAppsStirSipInterfaceStats.x.y.z, where:
• apAppsStirSipInterfaceStats is [Link].4.1.9148.[Link].[Link]
• x is the sip-interface index
• y is the ApCounterStatsType (recent = 1, total = 2, or permax = 3)
• z is the data category
Each data category is found within each ApCounterStatsType. The "asQueries" category, for
example, is found within the recent, total, and permax counter types.
4-9
Chapter 4
Applications MIB ([Link])
4-10
Chapter 4
Applications MIB ([Link])
The apStirStatsTypeMax marks the end of the defined types. No object should have the index
with its value. If an object has this value, the number of the apStirServerStatsType values has
been expanded and either this MIB Guide or the MIB Package should be updated.
4-11
Chapter 4
Applications MIB ([Link])
apAppsStirRealmStatsTable
The following table collects information on all configured STIR realm' status. The
apRealmServerStats reference is the name for all apAppsStirRealmStatsTable stats elements.
The apStirRealmName OID is [Link].4.1.9148.[Link].[Link].
The apAppsStirRealmStatsTable uses three variables to specify each object, as follows:
1. The first index is the realm index.
This component of the SNMP table uses the config-object ID the system creates when you
create the object. The STI labels are contained in OID APAPPS-MIB::apStirRealmName.
2. The second index is an enumeration of the counter types:
• recent = 1
• total = 2
• permax = 3
3. The third index is the data category.
For example, the apAppsStirRealmStats instances have an OID of the form
apAppsRealmServerStats.x.y.z, where:
• apStirRealmStats is [Link].4.1.9148.[Link].[Link]
• x is the realm index
• y is the ApCounterStatsType (recent = 1, total = 2, or permax = 3)
• z is the data category
Each data category is found within each ApCounterStatsType. The "asQueries" category, for
example, is found within the recent, total, and permax counter types.
4-12
Chapter 4
Applications MIB ([Link])
4-13
Chapter 4
Applications MIB ([Link])
The apStirStatsTypeMax marks the end of the defined types. No object should have the index
with its value. If an object has this value, the number of the apStirServerStatsType values has
been expanded and either this MIB Guide or the MIB Package should be updated.
4-14
Chapter 4
Applications MIB ([Link])
apAppsStirSystemStatsTable
The following table collects information on the system's status. The apStirSystemStats
reference is the name for all apAppsStirSystemStatsTable stats elements.
The apAppsStirSystemStatsTable uses two variables to specify its data, as follows:
1. The first is an enumeration of the counter types:
• recent = 1
• total = 2
• permax = 3
2. The second is the data category.
For example, the apStirSystemStats instances have an OID of the form apStirSystemStats.y.z,
where:
• y is the ApCounterStatsType (recent = 1, total = 2, or permax = 3)
• z is the data category
Each data category is found within each ApCounterStatsType. The "asQueries" category, for
example, is found within the recent, total, and permax counter types.
4-15
Chapter 4
Applications MIB ([Link])
The apStirStatsTypeMax marks the end of the defined types. No object should have the index
with its value. If an object has this value, the number of the apStirServerStatsType values has
been expanded and either this MIB Guide or the MIB Package should be updated.
4-16
Chapter 4
Applications MIB ([Link])
apDosThresholdCountersGroup
The following group includes all configured DoS threshold counters.
SNMP MIB
[Link]
apDosThresholdCountersGroup
[Link].4.1.9148.3.16.5
This table lists and describes the apDosThresholdCountersGroup MIB objects. To form the
OID, add [Link].4.1.9148.3.16.5 to the value in the OID # column. The OID for Trusted Minor
Counter, for example, is [Link].4.1.9148.[Link].
4-17
Chapter 4
Applications MIB ([Link])
4-18
Chapter 4
Applications MIB ([Link])
4-19
Chapter 4
Applications MIB ([Link])
4-20
Chapter 4
Applications MIB ([Link])
4-21
Chapter 4
Applications MIB ([Link])
4-22
Chapter 4
Applications MIB ([Link])
4-23
Chapter 4
Applications MIB ([Link])
4-24
Chapter 4
Applications MIB ([Link])
4-25
Chapter 4
Applications MIB ([Link])
4-26
Chapter 4
Applications MIB ([Link])
4-27
Chapter 4
Applications MIB ([Link])
4-28
Chapter 4
Applications MIB ([Link])
4-29
Chapter 4
Applications MIB ([Link])
4-30
Chapter 4
Applications MIB ([Link])
4-31
Chapter 4
Applications MIB ([Link])
4-32
Chapter 4
Applications MIB ([Link])
4-33
Chapter 4
Applications MIB ([Link])
Note:
The system establishes realm level stats OIDs for the first (or single) realm by adding
the system-assigned realm identifier and the type and category as the suffix (.first
realm identifier.*.*) to the base OID. Should there be multiple realms, the OID is
similarly numbered using the suffix (.second realm identifier.*.*) for the second realm,
and (.third realm identifier.*.*) for the third realm and so forth.
4-34
Chapter 4
Codec and Transcoding MIB ([Link])
apCodecMIBObjects
4-35
Chapter 4
Codec and Transcoding MIB ([Link])
4-36
Chapter 4
Codec and Transcoding MIB ([Link])
apTranscodingMIBObjects
The apTranscodingMIBObjects object has the OID [Link].4.1.9148.3.7.2. The
apCodecTranscodingRealmStatsTable object has the OID [Link].4.1.9148.[Link]. The
apTranscodingRealmStatsEntry object has the OID [Link].4.1.9148.[Link].1.
apCodecTranscodingResourceMIBObjects
The apCodecTranscodingResourceMIBObjects object has the OID [Link].4.1.9148.[Link]. It
contains 5 OIDS that return overall system transcoding counts and statistics.
4-37
Chapter 4
Codec and Transcoding MIB ([Link])
apCodecPairStatsTable
This table, found in the [Link], provides a listing of all unique codec pairs currently
being transcoding and the session count of that pair currently in use. It conveys the same
information displayed in the show xcode codecs command. Use the apCodecTable for
correlation between Codec name (apCodecName) and Codec index (apCodecIndex) to define
apCodecPairAIndex and apCodecPairBIndex. When Ptimes for call legs in the codec pair
differ, they will be included as additional indices. When digit translation is active on the call and
digit translation types differ across call legs, indication of which call leg uses which digit
translation type is output as well. Use the ApCodecDigitTypes object for digit type value
correlation.
4-38
Chapter 4
Diameter MIB ([Link])
The following objects in the ap-diameter MIB are only available in the trap notifications:
4-39
Chapter 4
DNS ALG MIB ([Link])
apDNSALGServerStatusTable
This table, found in the [Link], provides a listing of DNS ALG status of a the DNS ALG
server. It conveys the same information displayed in the show dnsalg status command. This
table is indexed by the DNS ALG server
4-40
Chapter 4
DNS ALG MIB ([Link])
apDNSALGStatsTable
This table, found in the [Link], provides a listing of DNS ALG statistics and counts for a
specific realm. It conveys the same information displayed in the show dnsalg stats command.
This table is indexed by the DNS ALG realm.
4-41
Chapter 4
Environment Monitor MIB ([Link])
4-42
Chapter 4
Environment Monitor MIB ([Link])
4-43
Chapter 4
Environment Monitor MIB ([Link])
4-44
Chapter 4
Environment Monitor MIB ([Link])
4-45
Chapter 4
H.323 MIB ([Link])
4-46
Chapter 4
License MIB ([Link])
4-47
Chapter 4
Security MIB ([Link])
4-48
Chapter 4
SIP MIB ([Link])
apSecurityCertificateTable
This table, found in the [Link], provides information about installed security
certificates and their expiration. It conveys the same information displayed in the show
security certificates command.
4-49
Chapter 4
SIP MIB ([Link])
4-50
Chapter 4
SIP MIB ([Link])
4-51
Chapter 4
SIP MIB ([Link])
4-52
Chapter 4
SIP MIB ([Link])
4-53
Chapter 4
SIP MIB ([Link])
4-54
Chapter 4
SIP MIB ([Link])
4-55
Chapter 4
SIP MIB ([Link])
4-56
Chapter 4
syslog MIB ([Link])
Note:
Form the Object Identifier (OID) Number by concatenating the OID of apSyslogBasic
([Link].4.1.9148.[Link]) with the OID termination number.
4-57
Chapter 4
syslog MIB ([Link])
Note:
Form the Object Identifier (OID) Number by concatenating the OID of
apSyslogHistory ([Link].4.1.9148.[Link]) with the OID termination number.
4-58
Chapter 4
System Management MIB ([Link])
Note:
Form the Object Identifier (OID) Number by concatenating the OID of
apSyslogHistoryEntry ([Link].4.1.9148.[Link].3) with the OID termination number.
4-59
Chapter 4
System Management MIB ([Link])
4-60
Chapter 4
System Management MIB ([Link])
4-61
Chapter 4
System Management MIB ([Link])
4-62
Chapter 4
System Management MIB ([Link])
4-63
Chapter 4
System Management MIB ([Link])
4-64
Chapter 4
System Management MIB ([Link])
4-65
Chapter 4
System Management MIB ([Link])
4-66
Chapter 4
System Management MIB ([Link])
4-67
Chapter 4
System Management MIB ([Link])
Note:
This table is populated for realms on which H.323 and SIP are configured; this
supports aggregate statistics for H.323 and SIP.
4-68
Chapter 4
System Management MIB ([Link])
4-69
Chapter 4
System Management MIB ([Link])
4-70
Chapter 4
System Management MIB ([Link])
N
o
t
e
:
T
h
i
s
i
s
d
i
f
f
e
r
e
n
t
f
r
o
m
t
h
e
M
a
x
B
u
r
4-71
Chapter 4
System Management MIB ([Link])
s
t
R
a
t
e
v
a
l
u
e
i
n
t
h
e
A
C
L
I
c
o
m
m
a
n
d
"
s
h
o
w
s
i
p
d
r
e
a
l
m
"
.
I
n
t
h
e
A
C
L
I
,
i
4-72
Chapter 4
System Management MIB ([Link])
t
i
s
t
h
e
h
i
g
h
-
w
a
t
e
r
m
a
r
k
d
u
r
i
n
g
t
h
e
w
i
n
d
o
w
p
e
r
i
o
d
.
4-73
Chapter 4
System Management MIB ([Link])
4-74
Chapter 4
System Management MIB ([Link])
4-75
Chapter 4
System Management MIB ([Link])
4-76
Chapter 4
System Management MIB ([Link])
4-77
Chapter 4
System Management MIB ([Link])
4-78
Chapter 4
System Management MIB ([Link])
4-79
Chapter 4
Software Inventory MIB ([Link])
The entries would appear in the following order, with the following instance IDs:
1. cc [Link] would appear first because cc is the shortest name), and would be represented
by the instance ID: … .[Link].2.2.2
2. BBB entries would be next, sorted by IP address, because “BBB” is considered less than
aaa, and would be represented by the instance IDs: … .[Link].[Link] and
… .[Link].[Link]
3. aaa entries would appear last, represented by the instance IDs: ... .[Link].[Link]
and ... .[Link].[Link]
4-80
Chapter 4
Multicore Monitoring MIB ([Link])
4-81
Chapter 4
Multicore Monitoring MIB ([Link])
4-82
Chapter 4
Multicore Monitoring MIB ([Link])
This MIB reflects statistics displayed by the show platform cpu, show platform cpu-load,
and show platform memory commands. The following screen capture is annotated with the
correspondence.
4-83
Chapter 4
Multicore Monitoring MIB ([Link])
apUsbcSysDPDKObjects
This group of objects, found in the [Link], provide a listing of DPDK statistics.
apUsbcSysScalingObjects
This group of objects, found in the [Link], provide a listing of objects relating to
scaling VMs.
4-84
Chapter 4
Multicore Monitoring MIB ([Link])
4-85
5
SNMP-based Application Features
This chapter contains Oracle Communications Session Border Controller features that involve
SNMP reporting on application activity.
Note:
Enabling extra-method-stats performs additional functions. Refer to this parameter's
description in the ACLI Reference Guide to see what other functionality you are
enabling.
apSIPRateIntfStatsTable
This table, found in the [Link], provides a listing of SIP message rate statistics per SIP
interface. It conveys the same information displayed in the show sipd rate interface
command. The table is indexed by the SIP Interface index and SIP method. The SIP Interface
to index number mapping is found in the apSipInterfaceTable in [Link]. The SIP method to
index mapping is found in the ApSipMethod object in [Link].
apSIPRateAgentStatsTable
This table, found in the [Link], provides a listing of SIP message rate statistics per SIP
agent (SIP session agent). It conveys the same information displayed in the show sipd rate
agent command. The table is indexed by the SIP agent index and SIP method. The SIP Agent
to index number mapping is found in the apSipAgentTable in [Link]. The SIP method to
index mapping is found in the ApSipMethod object in [Link].
5-1
Chapter 5
SNMP Reporting of Message Data Counters
apDnsAlgServerRateStatsTable
This table, found in the [Link], provides a listing of message rate statistics for a
specific DNS Alg Server. It conveys the same information displayed in the show dnsalg rate
realm-id and show dnsalg rate server-ip-addr commands. The table is indexed by the DNS
ALG realm index and DNS ALG server index. The table of rate statistics also includes the DNS
ALG server IP address and IP address type (IPv4 or IPv6). If a DNS ALG client realm, DNS
ALG server, and IP address are not configured, then the combination of those indices will
return no data. The DNS ALG Server to index mapping is found in the apDnsAlgServerTable in
the [Link]. The DNS ALG realm to index mapping is found in the
apDnsAlgConfigTable in the [Link].
apEnumServerRateStatsTable
This table, found in the [Link], provides a listing of ENUM message rate statistics for a
specific ENUM server. It conveys the same information displayed in the show enum rate
command. This table is indexed by the ENUM configuration name, ENUM Server IP address
and IP address type (IPv4 or IPv6).
Local and Remote Call Termination (BYE) Counters for SNMP Retrieval
Local and Remote Call Termination (BYE) counters are available by way of SNMP retrieval.
These counters are the same as that reported by the show sipd agents and show sipd
realms commands. The pertinent MIB objects are found in the [Link] file.
• apSipSaCallInfoStatusTable, including the Call Termination (BYE) counters:
– apSipSAStatsTotalCallDropsNormal
– apSipSAStatsTotalCallDropsLocal
5-2
Chapter 5
SNMP Reporting of Message Data Counters
The apSecuritySAIKEStats contains numerous session agent statistics concerning IKE traffic
and corresponds to the show sa stats ike command and sa-ike HDR group.
5-3
Chapter 5
SNMP Reporting of Message Data Counters
This object corresponds to show xcode load ACLI Command and xcode-codec-util HDR
group.
Note:
If the DSP is neither Active nor Overloaded then that DSP will not appear as an
instance of the table.
This object corresponds to show xcode load -detail ACLI Command and xcode-tcm-util HDR
group.
5-4
Chapter 5
FQDN-resolved Session Agent Statistics SNMP Retrieval
This object corresponds to show xcode load ACLI Command and xcode-codec-util HDR
group.
SNMPv2-SMI::enterprises.9148.[Link].[Link] = INTEGER: 36
SNMPv2-SMI::enterprises.9148.[Link].2.1.1.10000000 = INTEGER: 1000000
SNMPv2-SMI::enterprises.9148.[Link].2.1.1.10000001 = INTEGER: 1000001
SNMPv2-SMI::enterprises.9148.[Link].[Link] = STRING: "[Link]"
SNMPv2-SMI::enterprises.9148.[Link].2.1.2.10000000 = STRING:
"[Link]#[Link]"
SNMPv2-SMI::enterprises.9148.[Link].2.1.2.10000001 = STRING:
"[Link]#[Link]"
SNMPv2-SMI::enterprises.9148.[Link].[Link] = INTEGER: 1
SNMPv2-SMI::enterprises.9148.[Link].2.1.3.10000000 = INTEGER: 1
SNMPv2-SMI::enterprises.9148.[Link].2.1.3.1000001 = INTEGER: 1
SNMPv2-SMI::enterprises.9148.[Link].[Link] = Gauge32: 0
SNMPv2-SMI::enterprises.9148.[Link].2.1.4.10000000 = Gauge32: 0
SNMPv2-SMI::enterprises.9148.[Link].2.1.4.10000001 = Gauge32: 0
FQDN-resolved Session Agent Statistics SNMP Traps
5-5
Chapter 5
CAC Utilization Statistics via SNMP
This feature requires that you enable the sa-routes-stats and sa-routes-traps parameters in
the sip-config. This feature also requires that the session agent's ping-all-addresses function
be active.
The object establishing the session agent CAC utilization statistics objects follows:
apSipSaCacStatsEntry OBJECT-TYPE
SYNTAX ApSipSaCacStatsEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Connection Admission Control Statistics."
5-6
Chapter 5
CAC Utilization Statistics via SNMP
AUGMENTS { apSipSessionAgentStatsEntry }
::= { apSipSaCacStatsTable 1 }
The session agent CAC utilization statistics values include:
ApSipSaCacStatsEntry ::= SEQUENCE {
apSipSaCacSessionUtilLevel Gauge32,
apSipSaCacBurstRateUtilLevel Gauge32
}
The above objects, specifying the CAC utilization value for sessions and burst rate utilization
for session agents include:
apSipSaCacSessionUtilLevel OBJECT-TYPE
SYNTAX Gauge32
UNITS "percentage"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current session utilization level."
::= { apSipSaCacStatsEntry 1 }
apSipSaCacBurstRateUtilLevel OBJECT-TYPE
SYNTAX Gauge32
UNITS "percentage"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current burst rate utilization level."
::= { apSipSaCacStatsEntry 2 }
The MIB objects containing CAC utilization data for Realms are listed below.
The object establishing the statistics table for realm CAC utilization follows:
The object establishing the realm CAC utilization statistics objects follows:
apSigRealmCacStatsEntry OBJECT-TYPE
SYNTAX ApSigRealmCacStatsEntry
MAX-ACCESS not-accessible
STATUS current
DESCRIPTION
"Connection Admission Control Statistics."
AUGMENTS { apSigRealmStatsEntry }
::= { apSigRealmCacStatsTable 1 }
5-7
Chapter 5
CAC Utilization Statistics via SNMP
The above objects, specifying the CAC utilization value for sessions and burst rate utilization
for realms include:
apSigRealmCacSessionUtilLevel OBJECT-TYPE
SYNTAX Gauge32
UNITS "percentage"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current session utilization level."
::= { apSigRealmCacStatsEntry 1 }
apSigRealmCacBurstRateUtilLevel OBJECT-TYPE
SYNTAX Gauge32
UNITS "percentage"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current burst rate utilization level."
::= { apSigRealmCacStatsEntry 2 }
5-8
Chapter 5
External Policy Server Connection Status Reporting
• apSipCACUtilAlertTrap—[Link].4.1.9148.[Link].2.0.1
• apSipCACUtilClearTrap—[Link].4.1.9148.[Link].2.0.2
Note:
The SBC does not raise SNMP traps or connection down alarms when you cause the
event with a configuration change, such as disabling a server element.
Enterprise Traps
The following table identifies the proprietary traps that the ap-diameter supports.
5-9
Chapter 5
External Policy Server Connection Status Reporting
Alarms
Alarms that correspond with the traps above notify the user, as follows:
• When the SBC sends a connection down trap for a connection configured within a policy
server cluster, it generates a minor alarm.
• When the SBC sends a connection down trap for a connection configured with an IP
address and port, it generates a minor alarm.
• When the diameter connection is re-established, the SBC clears the alarm.
• When all connections associated with a single ext-policy-server are down, the SBC
generates a major alarm.
The table below shows alarm information associated with a failed connection to an ext-policy-
server.
ORACLE# display-alarms
1 alarms to show
ID Task Severity First Occurred Last Occurred
327689 97 4 2018-03-20 [Link] 2018-03-20 [Link]
Count Description
1 External Policy Server (RACF) connection lost!!!
When multiple server connections are lost, the alarm appears as follows:
ORACLE# display-alarms
1 alarms to show
ID Task Severity First Occurred Last Occurred
327689 97 4 2018-03-20 [Link] 2018-03-20 [Link]
Count Description
1 2 External Policy Server (RACF) connections lost!!!
5-10
Chapter 5
External Policy Server Connection Status Reporting
• 2 External Policy Servers (RACF) connection lost!!!" (more than one connection down)
5-11
A
System Alarms
A system alarm is triggered when a condition or event happens within either the system
hardware or software. Given a specific alarm, the system generates the appropriate SNMP
trap. These traps include a description of the event or condition that caused the trap to be
generated; or provides information associated with the alarm, such as the interface ID (ifIndex)/
status or object identifier/object type integer values.
The following table maps system alarms to SNMP traps. This table includes the following
information:
• alarm names
• alarm IDs
• alarm severities (including threshold values)
• alarm causes
• example log messages
In addition, this table specifies the type of traps that are generated for SNMP and the trap
reference locations (the supported MIB or RFC).
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
FAN STOPPED 65537 CRITICAL: Fan speed fan speed: apSyslogMessageGenera
any fan failure. XXXX, XXXX, ted
speed is NOTE: If this XXXX ([Link])
<50%. Or alarm occurs, (where xxxx apEnvMonStatusChange
speed of two the system xxxx xxxx is the Notification (ap-env-
or more fans turns up the revolutions per [Link])
is >50% and fan speed to minute (RPM)
apSysMgmtFanTrap (ap-
<75%. the fastest of each fan on
[Link])
MAJOR: possible the fan module)
speed of two speed.
or more fans
is > 75% and
< 90%. Or
speed of one
fan is >50%
and <75%
and the other
two fans are
at normal
speed.
MINOR:
speed of one
fan> 75%
and <90%,
the other two
fans are at
normal
speed.
A-1
Appendix A
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
TEMPERATURE 65538 apEnvMonFa Fans are Temperature: apSyslogMessageGenera
HIGH nState is set obstructed or [Link] C ted
to minor (M) stopped. The (where [Link] ([Link])
or critical (C) room is is the apEnvMonStatusChange
depending on abnormally temperature in Notification (ap-env-
the speed hot. degrees) [Link])
(RPM) of any
apSysMgmtTempTrap
fan.
([Link])
Acme Packet
4600/6100/6
300/6350:
• M: <
8000
• C: <
5000
(MINOR: a
fan is pulled)
Acme Packet
3950/4900:
• M: <
5500
inlets
• M: <
5000
outlets
• C: <
3666
inlets
• C: <
3333
outlets
Acme Packet
3900:
• M: <
6000
• C: <
4000
Acme Packet
1100:
• C: <
4000
Note: Fans
may not be
removed in
the field for
the Acme
Packet 3900
or 1100.
ENVIRONMENTA 65539 CRITICAL The Hardware apSyslogMessageGenera
L SENSOR environmental monitor failure! ted
FAILURE sensor Unable to ([Link])
component monitor fan apEnvMonI2CFailNotificat
cannot detect speed and ion
fan speed and temperature!
([Link])
temperature.
A-2
Appendix A
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
PLD POWER A 65540 MINOR Power supply Back Power apSyslogMessageGenera
FAILURE A has failed. Supply A has ted
Note: PLD stands failed! ([Link])
for Programmable apEnvMonStatusChange
Logical Device Notification
([Link])
apSysMgmtPowerTrap
([Link])
PLD POWER A 65541 MINOR Power supply Back Power apSyslogMessageGenera
UP A is now Supply A is ted
Note: If the system present and present! ([Link])
boots up with one functioning. apEnvMonStatusChange
power supply, the Notification
health score is
([Link])
100, and an alarm
is not generated. If apSysMgmtPowerTrap
another power ([Link])
supply is then
added to that
same system, this
alarm is
generated, but the
health score is not
decremented.
PLD POWER B 65542 MINOR Power supply Back Power apSyslogMessageGenera
FAILURE B has failed. Supply B has ted
failed! ([Link])
apEnvMonStatusChange
Notification
([Link])
apSysMgmtPowerTrap
([Link])
PLD POWER B 65543 MINOR Power supply Back Power apSyslogMessageGenera
UP B is now Supply B is ted
Note: If the system present and present! ([Link])
boots up with one functioning. apEnvMonStatusChange
power supply, the Notification
health score is
([Link])
100, and an alarm
is not generated. If apSysMgmtPowerTrap
another power ([Link])
supply is then
added to that
same system, this
alarm is
generated, but the
health score is not
decremented.
A-3
Appendix A
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
PHY0 Removed 65550 MAJOR Physical N/A apSyslogMessageGenera
interface card ted
0 was ([Link])
removed. apEnvMonStatusChange
Notification
([Link])
PHY0 Inserted 65552 MAJOR Physical N/A apSyslogMessageGenera
interface card ted
0 was inserted. ([Link])
apEnvMonStatusChange
Notification
([Link])
PHY1 Removed 65553 MAJOR Physical N/A apSyslogMessageGenera
interface card ted
1 was ([Link])
removed. apEnvMonStatusChange
Notification
([Link])
PHY1 Inserted 65554 MAJOR Physical N/A apSyslogMessageGenera
interface card ted
1 was inserted. ([Link])
apEnvMonStatusChange
Notification
([Link])
Alarm Name Alarm Alarm Causes Example Log Trap Generated (Trap
ID Severity Message Reference)
COMM MONITOR 327716 Major CommMonitor One or more apMonitorCollectorDown
CONNECTION (Hex disconnected CommMonitors Trap
DOWN 50024) are ([Link])
disconnected
LINK UP ALARM 131073 MINOR Gigabit Slot 0 port 0 UP linkUp (IETF RFC 2233)
GIGPORT Ethernet
interface 1
goes up.
LINK UP ALARM 131074 MINOR Gigabit Slot 1 port 0 UP linkUp(IETF RFC 2233)
GIGPORT Ethernet
interface 2
goes up.
LINK DOWN 131075 MAJOR Gigabit Slot 0 port 0 linkDown (IETF RFC
ALARM GIGPORT Ethernet DOWN 2233)
interface 1
goes down.
LINK DOWN 131076 MAJOR Gigabit Slot 1 port 0 linkDown (IETF RFC
ALARM GIGPORT Ethernet DOWN 2233)
interface 2
goes down.
A-4
Appendix A
Alarm Name Alarm Alarm Causes Example Log Trap Generated (Trap
ID Severity Message Reference)
LINK UP ALARM 131077 MINOR Control wancom0 UP linkUp (IETF RFC 2233)
VXINTF interface 0
goes up.
LINK UP ALARM 131078 MINOR Control wancom1 UP linkUp (IETF RFC 2233)
VXINTF interface 1
goes up.
LINK UP ALARM 131079 MINOR Control wancom2 UP linkUp (IETF RFC 2233)
VXINTF interface 2
goes up.
LINK DOWN 131080 MAJOR Control wancom0 linkDown (IETF RFC
ALARM VXINTF interface 0 DOWN 2233)
goes down.
LINK DOWN 131081 MAJOR Control wancom1 linkDown (IETF RFC
ALARM VXINTF interface 1 DOWN 2233)
goes down.
LINK DOWN 131082 MAJOR Control wancom2 linkDown (IETF RFC
ALARM VXINTF interface 2 DOWN 2233)
goes down.
LINK UP ALARM 131083 MAJOR Fast Ethernet Slot 0 port 0 UP linkUp (IETF RFC 2233)
FEPORT slot 0, port 0
goes up.
LINK UP ALARM 131084 MAJOR Fast Ethernet Slot 1 port 0 UP linkUp (IETF RFC 2233)
FEPORT slot 1, port 0
goes up.
LINK UP ALARM 131085 MINOR Fast Ethernet Slot 0 port 1 UP linkUp (IETF RFC 2233)
FEPORT slot 0, port 1
goes up.
LINK UP ALARM 131086 MINOR Fast Ethernet Slot 1 port 1 linkUp (IETF RFC 2233)
FEPORT slot 1, port 1 DOWN
up.
LINK UP ALARM 131087 MINOR Fast Ethernet Slot 0 port 2 UP linkUp (IETF RFC 2233)
FEPORT slot 0, port 2
goes up.
LINK UP ALARM 131088 MINOR Fast Ethernet Slot 1 port 2 UP linkUp (IETF RFC 2233)
FEPORT slot 1, port 2
goes up.
LINK UP ALARM 131089 MINOR Fast Ethernet Slot 0 port 3 UP linkUp (IETF RFC 2233)
FEPORT slot 0, port 3
goes up.
LINK UP ALARM 131090 MINOR Fast Ethernet Slot 1 port 3 UP linkUp (IETF RFC 2233)
FEPORT slot 1, port 3
goes up.
LINK DOWN 131091 MAJOR Fast Ethernet Slot 0 port 0 linkDown (IETF RFC
ALARM FEPORT slot 0, port 0 DOWN 2233)
goes down.
LINK DOWN 131092 MAJOR Fast Ethernet Slot 1 port 0 linkDown (IETF RFC
ALARM FEPORT slot 1, port 0 DOWN 2233)
goes down.
LINK DOWN 131093 MAJOR Fast Ethernet Slot 0 port 1 linkDown (IETF RFC
ALARM FEPORT slot 0, port 1 DOWN 2233)
goes down.
A-5
Appendix A
Alarm Name Alarm Alarm Causes Example Log Trap Generated (Trap
ID Severity Message Reference)
LINK DOWN 131094 MAJOR Fast Ethernet Slot 1 port 1 linkDown (IETF RFC
ALARM FEPORT slot 1, port 1 DOWN 2233)
goes down.
LINK DOWN 131095 MAJOR Fast Ethernet Slot 0 port 2 linkDown (IETF RFC
ALARM FEPORT slot 0, port 2 DOWN 2233)
goes down.
LINK DOWN 131096 MAJOR Fast Ethernet Slot 1 port 2 linkDown (IETF RFC
ALARM FEPORT slot 1, port 2 DOWN 2233)
goes down.
LINK DOWN 131097 MAJOR Fast Ethernet Slot 0 port 3 linkDown (IETF RFC
ALARM FEPORT slot 0, port 3 DOWN 2233)
goes down.
LINK DOWN 131098 MAJOR Fast Ethernet Slot 1 port 3 linkDown (IETF RFC
ALARM FEPORT slot 1, port 3 DOWN 2233)
goes down.
CPU UTILIZATION 131099 MINOR CPU usage CPU usage X% apSysMgmtGroupTrap
reached 90% over threshold ([Link])
or greater of its X%
capacity.
MEMORY 131100 CRITICAL Memory usage Memory usage apSysMgmtGroupTrap
UTILIZATION reached 90% X% over ([Link])
or greater of its threshold X%
capacity.
HEALTH SCORE 131101 MAJOR system’s Health score X apSysMgmtGroupTrap
health score is under ([Link])
fell below 60. threshold
(where X is the
health score)
NAT TABLE 131102 MINOR NAT table NAT table apSysMgmtGroupTrap
UTILIZATION usage reached usage X% over ([Link])
90% or greater threshold X%
of its capacity.
ARP TABLE 131103 MINOR ARP table ARP table X% apSysMgmtGroupTrap
UTILIZATION usage reached over threshold ([Link])
90% or greater X%
of its capacity.
REDUNDANT 131104 CRITICAL A state Switchover, apSyslogMessageGenera
SWITCH-TO- transition <state to ted
ACTIVE occurred from state>, active ([Link])
Standby/ peer <name of apSysMgmtRedundancyT
BecomingStan HA peer> has rap
dby to timed out or
([Link])
BecomingActiv Switchover,
e. <state to
state>, active
peer <name of
HA peer> has
unacceptable
health (x)
(where x is the
health score) or
Switchover,
<state to
state>, forced
by command
A-6
Appendix A
Alarm Name Alarm Alarm Causes Example Log Trap Generated (Trap
ID Severity Message Reference)
REDUNDANT 131105 CRITICAL A state Switchover, apSyslogMessageGenera
SWITCH-TO- transition <state to ted
STANDBY occurred from state>, peer ([Link])
Active/ <name of HA apSysMgmtRedundancyT
BecomingActiv peer> is rap
e to healthier (x)
([Link])
BecomingStan than us (x)
dby/ (where x is the
RelinquishingA health score)
ctive. or Switchover,
<state to
state>, forced
by command
REDUNDANT 131106 MAJOR An HA system Peer <name of apSyslogMessageGenera
TIMEOUT peer was not HA peer> timed ted
heard from out in state x, ([Link])
within the my state is x apSysMgmtRedundancyT
configured (where x is the rap
silence state (e.g.,
([Link])
window. BecomingStand
by))
REDUNDANT 131107 CRITICAL Unable to Unable to apSyslogMessageGenera
OUT OF SERVICE synchronize synchronize ted
Note: The with Active HA with Active ([Link])
activate-config system peer redundant peer apSysMgmtRedundancyT
failed log message within within rap
appears for those BecomingStan BecomingStand
([Link])
cases in which the dby timeout. by timeout,
execution of the going
activate config OutOfService
command failed or
on the standby activate-config
SBC. failed, process
busy
or
activate-config
failed, must do
save-config
before
activating.
or
activate-config
failed, could not
get current
config version
from file
or
activate-config
failed, could not
set running
config version
to file.
A-7
Appendix A
Alarm Name Alarm Alarm Causes Example Log Trap Generated (Trap
ID Severity Message Reference)
SYSTEM TASK 131108 CRITICAL A system task Task X apSyslogMessageGenera
SUSPENDED (process) suspended, ted
suspends or which ([Link])
fails. decremented apSysMgmtTaskSuspend
health by 75! Trap
(where X is the
([Link])
task/process
name)
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
MBCD ALARM 262145 CRITICAL: No further Flow: Cannot apSyslogMessageGenera
OUT OF for flow memory can create free port ted
MEMORY MAJOR: for be allocated for list for realm. ([Link])
media (if MBCD. Media Server: apSysMgmtMediaOutofM
server cannot Failed to emory
allocate a allocate new
([Link])
new context) context.
MBCD ALARM 262147 MAJOR: if Media server is Realm type apSyslogMessageGenera
UNKNOWN media server unable to find (ingress, ted
REALM is adding a realm interface. egress, hairpin) ([Link])
new flow X, not found apSysMgmtUnknownReal
m
([Link])
MBCD ALARM 262149 CRITICAL: The realm is Out of apSyslogMessageGenera
OUT OF failure rate = out of bandwidth ted
BANDWIDTH 100% bandwidth. ([Link])
MAJOR: apSysMgmtMediaBandwi
failure rate > dthTrap
or = 50%
([Link])
MBCD ALARM 262150 CRITICAL: The realm is Out of steering apSyslogMessageGenera
OUT OF PORTS failure rate = out of steering ports ted
100% ports. ([Link])
MAJOR: apSysMgmtMediaPortsTr
failure rate > ap
or = 50%
([Link])
SRTP MAJOR Decryption for SRTP apSecuritySrtpDecryption
DECRYPTION SRTP packets Decryption FailureNotification
ERROR fails. Failed ([Link])
SRTP 327744 MAJOR Encryption SRTP apSecuritySrtpEncryption
ENCRYPTION integrity check Encryption FailureNotification
ERROR for SRTP Failed ([Link])
packets fails.
TLS MAJOR Decryption for TLS Decryption apSecurityTlsDecryptionF
DECRYPTION TLS packets Failed ailureNotification
ERROR fails. ([Link])
TLS MAJOR Encryption TLS Encryption apSecurityTlsEncryptionF
ENCRYPTION integrity check Failed ailureNotification
ERROR for TLS ([Link])
packets fails.
A-8
Appendix A
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
GATEWAY dynami MAJOR The SBC lost gateway apSysMgmtGatewayUnre
UNREACHABLE cID ARP X.X.X.X achableTrap
connectivity to unreachable on (ap_smgmt.mib)
a front slot Y port Z
interface subport ZZ
gateway. (where X.X.X.X
is the IPv4
address of the
front interface
gateway, Y is
the front
interface slot
number, Z is
the front
interface port
number, and ZZ
is the subport
ID)
Note:
The value of this alarm ID is dynamic. That is, it changes based on a numbers of
factors, but the total alarm ID range falls between 196608 and 262143. The alarm ID
is calculated based on the compilation of the following information: a hexadecimal
number that represents the VLAN ID and the front interface port/slot numbers.
A-9
Appendix A
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
RADIUS 327681 CRITICAL: if The enabled CRITICAL: All apSyslogMessageGenera
ACCOUNTING all enabled connections to enabled ted
CONNECTION and RADIUS accounting ([Link])
DOWN configured servers have connections apSysMgmtRadiusDownT
Remote timed-out have been lost! rap
Authenticatio without a Check
([Link])
n Dial-in User response from accounting
Service the RADIUS status for more
(RADIUS) server. details.
accounting MAJOR: One or
server more enabled
connections accounting
have timed- connections
out without have been lost!
response Check
from the accounting
RADIUS status for more
server details.
MAJOR: if
some, but not
all configured
RADIUS
accounting
server
connections
have timed-
out without
response
from the
RADIUS
server.
ENUM SERVER XX CRITICAL: The enabled CRITICAL: All apSysMgmtENUMStatus
STATUS All ENUM connections to ENUM Servers ChangeTrap
New to Release servers are ENUM servers are currently ([Link])
C5.0 unreachable have been lost. unreachable!
MAJOR: MAJOR: One or
Some ENUM more ENUM
servers are Servers are
unreachable currently
unreachable!
H.323 ALARM 327682 CRITICAL The H.323 [H.323 | IWF] apSyslogMessageGenera
STACK stack has failed stack <stack- ted
INITIALIZATION to initialize name> has ([Link])
FAILURE properly and is failed to ([Link])
terminated. initialize and is
terminated
A-10
Appendix A
Alarm Severities
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
CFG ALARM 393217 MAJOR The save- save-config apSyslogMessageGenera
SAVE FAILED config failed on ted
command targetName!/ ([Link])
execution code full, config apSysMgmtCfgSaveFailTr
failed on a sync stopped! ap
standby SBC or
([Link])
peer operating save-config
as part of an failed on
HA pair. targetName!/
code full, config
sync stopped!
(where the
targetName is
the target name
(tn) configured
in the boot
parameters)
Alarm Name Alarm Alarm Cause(s) Example Log Trap Generated (Trap
ID Severity Message Reference)
LICENSE 50004 MAJOR Total session apSyslogMessageGenera
APPROACH count is ted
CAPACITY approaching ([Link])
the license apLicenseApproachingCa
capacity pacityNotification
allowed (98%
([Link])
or higher)
This alarm is
cleared when
total sessions
is less than
90% of license
capacity.
For additional information about system alarms for the components of the system, refer to the
Alarms section of the Monitoring via the ACLI chapter of the Administration and Configuration
Guide for the ACLI.
Alarm Severities
The system architecture includes five levels of alarm severity. These levels have been
designated so that the system can take action that is appropriate to the situation triggering the
alarm.
A-11
Appendix A
Alarm Severities
A-12