Allot SNMP Integration (16.5 and NW-S 15.3) v10 b9
Allot SNMP Integration (16.5 and NW-S 15.3) v10 b9
Integration Guide
AOS, NX, DM, SMP, CS 16.5
NW-S 15.3
Document Version History
V10b9 21.05.20 Dan Shalem MIB versioning and compatibility details updated
V10b8 16.05.20 Dan Shalem More details added about ALLOT-NX-MIB. Name of
MIB corrected (from ALLOT-NX-MIB-16_5)
V10b7 27.04.20 Dan Shalem Updated to ALLOT-MIB rev 202005021700Z for 16.5
Added alIntegratedServiceServerUpVer2Trap,
alIntegratedServiceServerDownVer2Trap,
alDataSourceDownV2Trap and alDataSourceUpV2Trap
all with IPv6 support (s2.2.1.1)
Updated to ALLOT-MD-MIB to 202005041700Z for 16.5
Added alSmpFupConnectLossAlarmDownTrap and
alSmpFupConnectLossAlarmUpTrap. Fixed typo in
alSMPcrfConnectAlarmUpTrap
Updated to ALLOT-DATAMED-MIB rev 202005011700Z
Updated to ALLOT-NX-MIB rev 202005031200Z for
16.5 with support for IPv6
Removed support for SNMP v1.
Added procedure for setting SNMP version for NX trap
forwarding, as well as User, Authentication and Privacy
for SNMPv3.
SG-HA (AOS-RP) Traps added (s2.2.1.1)
NHR-NA (ID 168) added to NX trap forwarding table
(s2.1.3.3)
V10b5 25.11.19 Ben Gold Consolidated CPU, Storate and Memory in Health
Monitoring
Updated command to change the version of SNMP
that NX uses to send traps
Added a note in the Health Monitoring >
NetworkSecure section about not using special
characters in, for example, server names.
SNMP Integration i
Overview
V10b4 29.10.19 Dan Shalem Limitation on SMP KPIs in PCC mode only removed.
(From 15.1, SMP only works in PCC mode, even when
managing subscribers)
v9b7 25.3.19 Dan Shalem Section on Unix Based Traps (2.3.7) added. Section on
Management Platform Health Monitoring (3.2)
amended.
v9b6 11.3.19 Dan Shalem Expanded scope of section on IBM IMM traps to cover
all Remote Management of COTS servers.
v9b5 10.3.19 Dan Shalem Removed section on “Polling NX for Policy Level
Statistics (MRTG only)
v9b4 03.9.18 Dan Shalem Updated relevant Allot MIB for 15.1.60
• ALLOT-MIB rev 201809021600Z
• Added SG-9700, SG-VE 200 virtual board
types and ASP (Network Secure) entities
Clarified procedure for changing SNMPv2c community
on intel-based SGs.
ii
Overview
v9b2 10.6.18 Dan Shalem Fixed error with documentation of 2603.5.4.3 to 5.4.8
v9b1 31.10.17 Dan Shalem Updated relevant Allot MIBs for SW version 15.1:
• ALLOT-MIB rev 201710241400Z
• ALLOT-MD-MIB rev 201710241400Z
Traps Added:
• SMP Active Directory Trap added
• 6 new traps added to Allot-MIB
• AOS alApplicationInfoTrap – new usage for
exceeding host catalog capacities.
Updated Important Notices section
v8b6 01.10.17 Dan Shalem Added polling memory for non-intel platforms (SG-
9x00)
v8b5 28.09.17 Dan Shalem Fixed typing error in command for changing default
communities
v8b4 26.09.17 Dan Shalem Updated relevant Allot MIBs for SW version 14.7:
• Allot-MIB rev 201705291400Z
(no significant changes)
• Allot-CLEARSEE-MIB rev 201706011400Z (no
significant changes)
• Allot-DATAMED-MIB rev 201706011700Z (no
significant changes)
Update of ClearSee traps
v8b3 08.07.17 Dan Shalem Additional information added about changing SNMPv2
communities and adding SNMPv3 users.
v8b2 14.03.17 Dan Shalem Added clarification about CPU Health Monitoring for
in-line platforms.
v8b1 14.06.16 Dan Shalem Updated to relevant Allot MIBs for SW 14.5:
• Allot-MIB rev 201606131400Z
(new licenses added to alLicenseInfoTable)
• Allot-DATAMED-MIB rev 201606131700Z
(new bucket types identified in DM KPIs)
• Allot-MD-MIB (no change)
• Allot-CLEARSEE-MIB (no change)
iii
Overview
v7b3 20.09.15 Dan Shalem Fixed error with SNMPv3 user name to read MD5
v7b2 22.06.15 Dan Shalem Updated to relevant Allot MIBs for SW 14.1:
• Allot-MIB rev 201506211700Z
• Allot-MD-MIB rev 201506211700Z
Including new dynamic rule KPIs
• Allot-DATAMED-MIB rev 201506211700Z
Including additional DM KPIs and new traps
• Allot-CLEARSEE-MIB
v6b4 10.12.14 Dan Shalem Ch3 (Health Monitoring) updated with SG-Tera blades
and sensors.
v6b3 11.11.14 Dan Shalem Added VDO MIB and associated VDC KPIs (13.1.450)
v6b1 02.10.14 Dan Shalem Updated to relevant Allot MIBs for SW 13.4.
• Allot-MIB rev 201410021500Z
v5b2 21.05.14 Dan Shalem Updated to relevant Allot MIBs for SW 13.3
• Allot-MIB rev 201403091000Z
• Allot-MD-MIB rev 201402221100Z
• Allot-DATAMED-MIB rev 201310061400Z
Allot-MD-MIB updated to include new Sd KPIs and new
"Peak Average" KPIs for Gx, Gy and Sd.
iv
Overview
v4b8 01.10.13 Dan Shalem Clarification about average calculation for throughput
statistics
V4b7 08.08.13 Dan Shalem Setting additional trap destinations command fixed.
V4b3 26.12.12 Dan Shalem Fixed typos and AC-3000 port number error. Fixed text
describing how to view trap server configured.
V4b1 15.11.12 Dan Shalem Added new KPIs for In-Line Platforms, SMP and STC.
Reformatted Guide. Separation between KPIs and
Health Monitoring sections.
Updated to MIBs supporting version 13.1:
• ALLOT-MIB: 201209271600Z
• ALLOT-MD: 201208151600Z
• ALLOT-DATAMED-MIB: 201205281600Z
V3b2 31.01.12 Dan Shalem Added note on inability to use SNMPv1 to poll NX
Updated to Allot.mib rev201201301000Z Allot-
MD.mib updated (alProvsioningType)
V3b1 15.12.11 Dan Shalem Updated for SG-Sigma E and AOS NetEnforcers
Updated to Allot.mib rev 201111201400Z
v
Overview
V2b7 04.03.11 Dan Shalem Updated to AOS11.2 and NX11.2; Statistics features
added.
V2b1 10.05.10 Dan Shalem Updated with new SNMP features for AOS10.2.1
V1b14 04.02.10 Dan Shalem Updated to Allot.mib rev from 04.02.2010; Fixed
syntax errors on p9
V1b10 05.11.09 Dan Shalem Updated to Allot.Mib rev 200910290948Z New KPIs
added.
V1b5 22.06.09 Dan Shalem How to set devices (NE, NX, SG, SMP, STC) to send
traps to external server & how to set NX to send traps
to external server both added.
vi
Overview
Product SW Versions
Covered in
this Guide
NetXplorer NX16.5
SMP SMP16.5
SG-VE AOS16.5
SG-9x00 AOS16.5
(SG-9008, SG-9100,
SG-9500, SG-9700)
SG-Tera AOS16.5
NetworkSecure NWS15.3
SG-Sigma E AOS14.1
SG-Sigma AOS13.3
NetEnforcer AOS13.1
Note: In some cases, KPIs and traps described in this document may be available only for some of the
products listed above. Wherever this is the case, a note is added in the document
vii
Overview
NOTES:
• All of the latest MIB files above can be downloaded from the Allot Knowledge Base,
with the exception of the OPTENETv2-MIB. This file can be downloaded from each
NWS server once the solution has been installed and configured. It is available from
the path:
• MIB files are accumulative. If in the backwards compatibility column it is written
“works with all previous Software versions”, this means that you can take the latest
MIB file revision, use it with older software versions and maintain all previous SNMP
functionality. Additional functionalities supported in the latest MIB revision, will not
be supported.
viii
Overview
Contents
Document Version History ................................................................................................. i
Product Versions Covered ................................................................................................vii
MIB Versions Covered ..................................................................................................... viii
Contents ........................................................................................................................... ix
1 Overview .............................................................................................................. 1-1
1.1 Available MIB Files ................................................................................... 1-2
1.2 MIB File Structure .................................................................................... 1-2
1.3 Supported SNMP Types............................................................................ 1-4
1.3.1 SNMPv2c ..................................................................................... 1-4
1.3.2 SNMPv3 ...................................................................................... 1-6
2 SNMP Traps .......................................................................................................... 2-1
2.1 How to Send Traps to an External Server ................................................. 2-1
2.1.1 Service Gateway ......................................................................... 2-1
2.1.2 NetworkSecure ........................................................................... 2-5
2.1.3 NetXplorer (Trap Forwarding) ..................................................... 2-7
2.2 List of Traps Sent from Allot Network Elements..................................... 2-16
2.2.1 Service Gateway Traps .............................................................. 2-16
2.2.2 SMP Traps ................................................................................. 2-24
2.2.3 Data Mediator Traps ................................................................. 2-27
2.2.4 ClearSee Traps .......................................................................... 2-27
2.2.5 NX Trap Forwarding .................................................................. 2-31
2.2.6 COTS Hardware Traps ............................................................... 2-34
2.2.7 NetworkSecure Traps................................................................ 2-35
2.2.8 ACP (Unix) Traps ..................................................................... 2-123
3 Health Monitoring ................................................................................................ 3-1
3.1 Service Gateway (and NetEnforcer) ......................................................... 3-1
3.1.1 Temperature ............................................................................... 3-2
3.1.2 Fans............................................................................................. 3-6
ix
Overview
x
Overview
xi
Overview
xii
Overview
1 Overview
The Allot solution typically requires the deployment of equipment at the Network
Element Layer and the Element Management System layer of the service provider
or carrier network.
At the Network Element Layer, the Service Gateway (SG) platforms are responsible
for implementing application control and subscriber management policies and
collecting network usage data.
At the Element Management System Layer, the NetXplorer (NX) manages and
communicates with the different clients that access the system. It facilitates
Service Gateway configuration, policy provisioning and alarms. Data Mediator
collects data from the different data sources (Service Gateway, SMP,
NetworkSecure) and performs ETL functions - extract and transforming the data
before loading it to the ClearSee analytics system. Depending on the services
deployed, NetworkSecure and DDoS Secure may also be part of the network
architecture. Finally, when the Subscriber Management Platform (SMP) is
deployed, an SMP server integrates with the Service Provider’s IP allocation
system, as well as billing, charging and rules functions to ensure subscriber-level
awareness and policy enforcement for the Allot solution.
At the Network Element layer, the Service Gateways run standard SNMP Agents
which communicate over SNMP V2c or V3 and maintain standard MIB-II
information together with Allot MIB extensions.
1-1
Overview
Note: When polling the NetXplorer server for KPIs, you cannot use SNMPv1. The
NetXplorer server can only be polled using later versions of SNMP.
These MIB extensions maintain information on the device such as alarms, statistics
and status. The SNMP Agent enables the in-line platform to be remotely configured
and controlled, and includes the ability to set traps on major KPI values.
1-2
Overview
As can be seen in the figure above, the Allot-MIB MIB file consists of 4 groups:
• alEvents Group (1.3.6.1.4.1.2603.0)
• alActivation Group (1.3.6.1.4.1.2603.4)
• alObjects Group (1.3.6.1.4.1.2603.5)
• alConf Group (1.3.6.1.4.1.2603.6)
An additional fifth group, the Allot NX MIB (1.3.6.1.4.1.2603.10) is added when the
Allot-NX-MIB.mib file is loaded.
An additional sixth group, the Allot MD MIB (1.3.6.1.4.1.2603.11) is added when
the Allot-MD-MIB.mib file is loaded.
1-3
Overview
1.3.1 SNMPv2c
When working with SNMPv2c, the default community settings are as follows:
SG-Tera SG-9x00 NX STC, SMP, NetworkSecure
NetEnforcers SG-VE DM
SSG
Read allotcomm allotcomm allotcomm allotcomm allotcomm
Write allotcomm N/A N/A allotcomm N/A
1-4
Overview
snmpset -v 2c -c allotcomm
10.4.40.2 .1.3.6.1.6.3.18.1.1.1.8.\'v1v2Config\' i 2
.1.3.6.1.6.3.18.1.1.1.2.\'v1v2Config\'
s ThisIsATest99 .1.3.6.1.6.3.18.1.1.1.8.\'v1v2Config\' i 1
5. In order to change read-write community string on Sigma at IP address
10.4.40.2 to ThisIsATest99 do the following command (NOTE: allotcomm
is the current write community that is being used for execution of the
command):
snmpset -v 2c -c allotcomm
10.4.40.2 .1.3.6.1.6.3.18.1.1.1.8.'v1v2Admin' i 2
.1.3.6.1.6.3.18.1.1.1.2.'v1v2Admin'
s ThisIsATest99 .1.3.6.1.6.3.18.1.1.1.8.'v1v2Admin' i 1
1-5
Overview
5. Verify that the community change has been successful, by entering the
following command:
snmpwalk -v 2c -c new_comm 192.168.12.17
.1.3.6.1.6.3.18.1.1.1.8
If the community change was unsuccessful, you will receive a no response timeout.
If the community was successfully changed, you will receive the output below:
SNMP-COMMUNITY-MIB::snmpCommunityStatus.'allotcomm' =
INTEGER: active(1)
1.3.2 SNMPv3
SNMPv3 provides extra security with its built-in authentication and encryption
functions.
1-6
Overview
An additional SNMPv3 user can be added to the same SNMP group using the go
config snmp command. This command can be used on non-intel platforms (e.g:
SG-Tera, NetEnforcers). It will not work on intel-based AOS platforms (e.g: SG-9x00
series, SG-VE, SSG). It is fully documented in the AOS Operation Guide.
As an example, to add a user called “test” to the “admin” group which already has
an authentication and privacy (authPriv) security level, you should follow the
procedure below:
go config snmp -snmpLogin admin:authPriv:usmHMACMD5:usmDES -
users +test:usm:admin:usmHMACMD5:usmDES
Please Enter admin's Login Authentication PassPhrase: \\
adminPassPhraseAuth
Please Enter admin's Login Privacy PassPhrase: \\
adminPassPhrasePriv
Please Enter prieltest's Authentication PassPhrase: \\
Whatever you want as long as it is sufficiently long.
Please Enter prieltest's Privacy PassPhrase: \\
Whatever you want as long as it is sufficiently long.
Request completed successfully.
After executing the command above, you can use the newly added user to perform
SNMP queries:
root@SBR-SBH[1/7/14]: ~ # snmpget -v 3 -u test -a MD5 -A
pass_i_chose_12345 -l authPriv -x DES -X pass_i_chose_12345
localhost 1.3.6.1.4.1.2603.5.2.6.21.5.0
iso.3.6.1.4.1.2603.5.2.6.21.5.0 = INTEGER: 2
1-7
Overview
When using the NX as a trap forwarder, you can decide whether to use SNMPv2,
SNMPv3 or SNMP v2 and v3. By default, SNMPv2 is used.
The following NetXplorer Server CLI command can be used to change the SNMP
version used for the traps forwarded from the NetXplorer.
NOTE: Please refer to the NetXplorer Installation & Administration Guide Chapter
6 for full instructions on how to run CLI commands on the NX server.
ConfigurationCLI.sh -setParam -paramName ENTERPRISE_SNMP_TOPIC
-paramSubName traps_security_mode -setIntegerParam 3
In the command above, the following values are available for -setIntegerParam:
1 SNMP v2
2 SNMP v3
3 SNMP v2 and v3
NOTE: After running this command you will need to reboot the NetXplorer!
Parameter Authentication
1 MD5
3 HMAC128SHA224
4 HMAC192SHA256
5 HMAC256SHA384
1-8
Overview
Parameter Authentication
1 DES
2 AES128
3 AES192
4 AES256
NOTE: After running this command you will need to reboot the NetXplorer!
1-9
SNMP Traps
2 SNMP Traps
The Allot Network elements (NetEnforcer and/or Service Gateway) send standard
SNMP traps both to the NetXplorer and to the Service Provider or Carrier’s
monitoring system. The SMP server, which is part of the Element Management
System Layer also sends traps to the NX server and to a third party server where
defined. In addition, the NetXplorer can serve as a single point of integration for
system administrators. Its SNMP agent forwards traps to the NOC collected from
the managed entities.
2-1
SNMP Traps
2-2
SNMP Traps
In the section of the snmpset command labeled “port”, you should enter the SNMP
port number to be used (e.g: 162)
2-3
SNMP Traps
would insert in the command below 67.
iso.3.6.1.6.3.12.1.2.1.5.66 = INTEGER: 3
iso.3.6.1.6.3.12.1.2.1.5.65.83 = INTEGER: 1
iso.3.6.1.6.3.12.1.2.1.8.66 = INTEGER: 3
iso.3.6.1.6.3.12.1.2.1.8.65.83 = INTEGER: 3
iso.3.6.1.6.3.12.1.2.1.9.66 = INTEGER: 1
iso.3.6.1.6.3.12.1.2.1.9.65.83 = INTEGER: 1
In the third line in the output above, the 4 left hexa octets (CB 50 7B 4F) are the IP
of the NX server. In the fourth line of the output above, the 4 left hexa octets (CB
50 7A 34) represent the IP address of the additional trap server.
2-4
SNMP Traps
2.1.2 NetworkSecure
The following sections describe how to define NetworkSecure’s performance
thresholds and configure NetworkSecure traps.
Where:
⧫ [CM IP] is the IP of the Central Manager.
⧫ [THRESHOLD] is the type of server threshold that you want to change,
as follows:
Enter this as [THRESHOLD]: Which you can monitor as described here:
CPU usage: CPU CPU Indicator
Memory usage: MEM Memory Indicator
Server Hard Disk Usage: Server Hard Disk Usage
Disk#default
Network errors: Server Network Usage
NIC#default#RX
NIC#default#TX
2-5
SNMP Traps
⧫ [KEY] is the key that you want to change, either Max for the threshold
or Time for the length of time above which the alarm is sent.
⧫ [VALUE] is the value that to which you want to change the threshold.
Use the following rules of thumb:
⧫ A server’s CPU maximum should be 90% of its total amount of CPUs.
For example, if the server has 14 CPUs, the total CPU equal to 1400,
then the maximum should be 1260.
⧫ A server’s memory maximum should be 90% of its total memory. For
example, if the server has 48137 in total, then the maximum should
be 43323.
2-6
SNMP Traps
4595 Machine has recovered its used CPU limit (%s %%) to reach at: %s %%
4596 Machine has recovered its free Memory limit (%s MB) to reach at: %s MB
Machine has recovered its free Disk limit (%s MB) to reach at: %s MB (file
4597
system %s)
4598 %s has recovered its CPU limit (%s %%) to reach at: %s %%
4599 %s has recovered its Memory limit (%s MB) to reach at: %s MB
4600 %s has recovered its Virtual Memory limit (%s MB) to reach at: %s MB
5066 There were lost %s packet(s) at interface %s
2-7
SNMP Traps
2-8
SNMP Traps
2-9
SNMP Traps
Trap Sent to External Server Event Sent
to NX UI
ID Event By Default Configurable
12 Software Problem X X
14 Link Down X X X
15 Link Up X
16 Cold Start X X
17 Warm Start X X
18 Authentication Failure X X
22 Device Status Up X
23 Application Info X X X
30 Link Down X X X
31 Link Up X
2-10
SNMP Traps
Trap Sent to External Server Event Sent
to NX UI
ID Event By Default Configurable
2-11
SNMP Traps
Trap Sent to External Server Event Sent
to NX UI
ID Event By Default Configurable
161 Board is up X
2-12
SNMP Traps
Trap Sent to External Server Event Sent
to NX UI
ID Event By Default Configurable
2-13
SNMP Traps
Trap Sent to External Server Event Sent
to NX UI
ID Event By Default Configurable
2-14
SNMP Traps
Trap Sent to External Server Event Sent
to NX UI
ID Event By Default Configurable
2-15
SNMP Traps
If you wish traps to be sent (either manually or automatically) for additional events, please
contact [email protected] . A full list of events can be found in Appendix C of the NetXplorer
Installation and Administration Guide.
2-16
SNMP Traps
Name Description OID
pipes (e.g: a pipe has
been added, or a catalog
has been assigned to an
existing pipe)
alVCConfChangeTrap This trap is sent if a
1.3.6.1.4.1.2603.0.5
configuration change has
been made on one of the
virtual channels (e.g: a VC
has been added, or a
catalog has been
assigned to an existing
VC)
alAlertRisingTrap This trap is sent if one of
1.3.6.1.4.1.2603.0.6
the alerts crossed the
defined threshold. For
the SG, only “disk
overflow” and “memory
overflow” can be defined.
alAlertFallingTrap This trap is sent if the 1.3.6.1.4.1.2603.0.7
alert value returned
below the normal
threshold
alDataSourceDownTrap This trap is sent if the
1.3.6.1.4.1.2603.0.10
data source is
unreachable (e.g: NTP
server is unreachable).
The relevant data source
is listed in the trap and
list of data sources is
contained in
alDataSourceType.
Currently the trap will
only be sent for the NTP
data source.
Replaced by …2603.0.48
alDataSourceUpTrap This trap is sent once the
1.3.6.1.4.1.2603.0.11
data source is reachable
again (e.g: NTP server can
now be reached)
Replaced by …2603.0.49
alSoftwareProblemTrap This trap is sent in the
1.3.6.1.4.1.2603.0.12
event of an internal
software problem. (e.g: If
a blade reboots). If you
2-17
SNMP Traps
Name Description OID
receive this trap you
should contact
[email protected] for
assistance.
alAccessViolationTrap This trap is sent if an
1.3.6.1.4.1.2603.0.13
access violation attempt
is discovered at the Linux
level.
alIpAddrConfChangeTrap This trap is sent if the IP
1.3.6.1.4.1.2603.0.14
Address of the
management port has
been added, removed or
modified.
alConnRouteConfChangeTrap This trap is sent if there
1.3.6.1.4.1.2603.0.15
has been a change in the
connection routing
configuration.
alDeviceStatusUpTrap
This trap is sent if any of 1.3.6.1.4.1.2603.0.16
the following device
status changed from
down to up:
• Bypass Setting (for
parallel redundancy
only)
• Power Status
• Fan Status
• Remote Bypass
• Bypass
The reading is taken from
the alSystemStatus table.
alDeviceStatusDownTrap
This trap is sent if any of 1.3.6.1.4.1.2603.0.17
the device status listed
above have changed
from up to down.
alApplicationInfoTrap This trap is for
1.3.6.1.4.1.2603.0.18
information only, and is
reserved for
customization as per
requirements. From
AOS15.1, this trap will be
sent should the 5,000
maximum addresses /
2-18
SNMP Traps
Name Description OID
ranges limit of IPv4 and
IPv6 traffic be breached.
(NOTE: the 5,000 max is
based on the assumption
of 1000 addresses/ranges
for user defined lists and
4000 for Facebook
control traffic)
alBoardStatusChangeTrap This trap is sent if the
1.3.6.1.4.1.2603.0.19
hardware or software
status of any of the cards
in an AOS in-line platform
has been changed
(including platforms
based on a single card
such as AC-3000). The
trap will list the
following:
- Board ID. This indicates
the slot number of the
card
- Board Type. This can be
any of the following:
• third party
• apc (SGCC)
• dpic (SGFP)
• host (SGSV-110)
• byc (SGBP)
• spider (CC-220)
• scorpion (N/A)
• switch (SFC-200)
• dispatcher (FB-200)
• bypass (BP-204)
• VAS (NSS-MS/SP)
• exc-CC (CC-300
• exc-SBH (SFB-300)
• nex-1 (N/A)
• hsfb (1GE-300)
• vdc (VideoClass)
• vdcAPD (APD)
• vdcITR (ITR)
• smp
• vdcMGMT (MGMT)
• cc400 (CC-400)
• sfb400rio8c (SFB-400)
2-19
SNMP Traps
Name Description OID
• sfb420rio24c
• sfb420rio102c
• shelfManager
• sfb420rio102cf
• sg9500
• sgve
• sg9500A
• sg9100
• vasType2 (Artysen)
• sg9008
• ssg400
• Virtual Host (SG-VE
200)
• VirtualCC (SG-VE 200)
• Virtual FB (SG-VE 200)
• sg-9700
• ssg200
- Board SW Status (SGFP)
• not active (SGFP
bypass)
• active
• standby
• NA
- Board HW status
• Off
• On
alWebUpdateTrap This trap will be sent for
1.3.6.1.4.1.2603.0.20
each attempted web
update.
alAsymmetricRemoteDeviceConfTrap This trap will be sent
1.3.6.1.4.1.2603.0.21
when the configuration
of an asymmetric remote
device is changed or if
such a device has been
added or removed.
alAsymmetricRemoteDeviceStatusTrap This trap will be sent
1.3.6.1.4.1.2603.0.22
when the health check of
an asymmetric remote
device changes.
alLicenseWarnEventTrap This trap will be sent for
1.3.6.1.4.1.2603.0.23
warning level states of
the license. The trap
includes details about the
license parameter and its
value.
2-20
SNMP Traps
Name Description OID
alLicenseCritEventTrap This trap will be sent for
1.3.6.1.4.1.2603.0.24
critical level states of the
license. The trap includes
details about the license
parameter and its value.
alBoardTemperatureStatusTrap This trap is sent when
1.3.6.1.4.1.2603.0.25
temperature crosses the
range border
alURLFilteringUpdateTrap This trap will be sent for
1.3.6.1.4.1.2603.0.26
each attempted websafe
update
alGenericTrap This is for internal use
1.3.6.1.4.1.2603.0.27
only (communication
between AOS and NX)
alBoardHostActivityStatusChangeTrap This trap is sent when the
1.3.6.1.4.1.2603.0.28
host activity status of a
particular blade changes.
The possible options are:
-1- Not Ready (Host
status is neither active
nor on standby)
-2- Active (This blade is
currently being used as a
host)
-3- Standby (This blade is
ready to become an
active host)
-100-This blade does not
contain a host functional
element
alBoardStatusChangeExTrap This trap is identical to
1.3.6.1.4.1.2603.0.29
the
alBoardStatusChangeTrap
with the exception that
the board ID is also given
within a dedicated
varbind.
alOptIfInputTrap This trap is sent when the
1.3.6.1.4.1.2603.0.30
input optical signal alarm
status changes.
NOTE: this trap is
configured using the CLI
command:
2-21
SNMP Traps
Name Description OID
go config
optical_if_alarm
For more details see the
AOS Operation Guide.
alOptIfOutputTrap This trap is sent when the
1.3.6.1.4.1.2603.0.31
output optical signal
alarm status changes.
NOTE: this trap is
configured using the CLI
command
go config
optical_if_alarm
For more details see the
AOS Operation Guide.
alIfXInFrameErrorRateTrap This trap is sent when the
1.3.6.1.4.1.2603.0.32
input frame error rate
alarm status changes
alIfXOutFrameErrorRateTrap This trap is sent when the
1.3.6.1.4.1.2603.0.33
output frame error rate
alarm status changes
alLinkDown Link Down trap. May be
1.3.6.1.4.1.2603.0.34
used as an alternative to
the standard SNMPv2
linkDown trap
alLinkUp Link Up trap. May be
1.3.6.1.4.1.2603.0.35
used as an alternative to
the standard SNMPv2
linkUp trap
alIntegratedServiceServerUpTrap Integrated service server
1.3.6.1.4.1.2603.0.36
(steering server) is up
alIntegratedServiceServerDownTrap Integrated service server
1.3.6.1.4.1.2603.0.37
(steering server) is down
alIntegratedServiceUpTrap Connection to the
1.3.6.1.4.1.2603.0.38
integrated service cluster
is up
alIntegratedServiceDownTrap Connection to the
1.3.6.1.4.1.2603.0.39
integrated service cluster
is down
alBoardUpTrap Board is up. HW & SW
1.3.6.1.4.1.2603.0.40
are active
alBoardDownTrap Board is down. HW/SW
1.3.6.1.4.1.2603.0.41
failure
alSgNhrHaUpTrap SG Redundancy (AOSRP)
1.3.6.1.4.1.2603.0.42
is up
2-22
SNMP Traps
Name Description OID
alSgNhrHaDownTrap SG Redundancy (AOSRP)
1.3.6.1.4.1.2603.0.43
is down
alIntegratedServiceServerUpVer2Trap Same as …2603.0.36 with
1.3.6.1.4.1.2603.0.44
the addition of server
state reason (L2
Tracking/BFD, IPv4
Tracking, IPv6 Tracking)
alIntegratedServiceServerDownVer2Trap Same as …2603.0.37 with
1.3.6.1.4.1.2603.0.45
the addition of server
state reason (L2
Tracking/BFD, IPv4
Tracking, IPv6 Tracking)
alDataSourceDownV2Trap Replaces …2603.0.10
1.3.6.1.4.1.2603.0.46
Includes IPv6 addresses
alDataSourceUpV2Trap Replaces …2603.0.11
1.3.6.1.4.1.2603.0.47
Includes IPv6 addresses
2-23
SNMP Traps
2.2.2 SMP Traps
The SMP server sends 9 different types of traps to the NetXplorer. These traps can
also be sent to the Service Provider’s NOC.
Name Description OID
SMPProvisionErrTrap This provision error trap is 1.3.6.1.4.1.2603.11.3.1
now deprecated and is
superceded by
alSMPProvisionErrTrapIpv6
SMPMultiFailTrap This trap is sent whenever 1.3.6.1.4.1.2603.11.3.2
the same provision errors are
received for multiple
subscribers. It includes the
following details:
• Initiating Process (see
below)
• Fail Cause (see below)
SMPSystemTrap This communication trap is 1.3.6.1.4.1.2603.11.3.3
now deprecated and is
superceded by traps
…2603.11.3.6/7/8/9
alNetAwareTrap This trap is sent upon cell 1.3.6.1.4.1.2603.11.3.4
congestion or when
congestion in a cell is cleared
alSMPProvisionErrTrapIpv6 This trap is sent whenever 1.3.6.1.4.1.2603.11.3.5
the SMP server fails to
provision a particular
subscriber. The details
included in the trap are:
• Initiating Process (see
below)
• Provisioning Type (see
below)
• Fail Cause (see below)
• Subscriber Name
• Subscriber IP
• Subscriber IPv6
Address
• Subscriber IPv6 Prefix
This trap replaces the now
deprecated
alSMPProvisionErrTrap
2-24
SNMP Traps
Name Description OID
alSMPcrfConnectAlarmUpTrap This trap is sent to indicate 1.3.6.1.4.1.2603.11.3.6
that the SMP has lost
connection with the PCRF
alSmpPcrfConnectLossAlarmDownTrap This "clear" trap is sent to 1.3.6.1.4.1.2603.11.3.7
indicate that the SMP has re-
established its connection
with the PCRF
alSmpOcsConnectLossAlarmUpTrap This trap is sent to indicate 1.3.6.1.4.1.2603.11.3.8
that the SMP has lost
connection with the OCS
alSmpOcsConnectLossAlarmDownTrap This "clear" trap is sent to 1.3.6.1.4.1.2603.11.3.9
indicate that the SMP has re-
established its connection
with the OCS
alSmpAdDcConnectLossAlarmDownTrap SMP lost connection with 1.3.6.1.4.1.2603.11.3.10
Active Directory Domain
Controller
alSmpAdDcConnectLossAlarmUpTrap SMP re-established 1.3.6.1.4.1.2603.11.3.11
connection with Active
Directory Domain Controller
alSmpFupConnectLossAlarmDownTrap SMP lost FUP connection 1.3.6.1.4.1.2603.11.3.12
with Service Gateway
alSmpFupConnectLossAlarmUpTrap SMP reestablished FUP 1.3.6.1.4.1.2603.11.3.13
connection with Service
Gateway
2-25
SNMP Traps
2-26
SNMP Traps
2-27
SNMP Traps
Name Description OID
alCsStorageUtilAbove70Ala This trap is sent if storage 1.3.6.1.4.1.2603.14.4.1
rmRisingTrap utilization reaches 70%, until it
reaches 80%.
alCsStorageUtilAbove70Ala This trap is sent if storage 1.3.6.1.4.1.2603.14.4.2
rmFallingTrap utilization drops below 70%.
alCsStorageUtilAbove80Ala This trap is sent if storage 1.3.6.1.4.1.2603.14.4.3
rmRisingTrap utilization reaches 80%, until it
reaches 90%.
alCsStorageUtilAbove80Ala This trap is sent if storage 1.3.6.1.4.1.2603.14.4.4
rmFallingTrap utilization drops below 80%.
alCsStorageUtilAbove90Ala This trap is sent if storage 1.3.6.1.4.1.2603.14.4.5
rmRisingTrap utilization reaches 90%.
alCsStorageUtilAbove90Ala This trap is sent if storage 1.3.6.1.4.1.2603.14.4.6
rmFallingTrap utilization drops below 90%.
alCsDmCommLossAlarmRis This trap is sent immediately if 1.3.6.1.4.1.2603.14.4.7
ingTrap a communication loss is
detected with the DM,
whether for communication
issues or the DM is down.
alCsDmCommLossAlarmFal This trap is sent after 1.3.6.1.4.1.2603.14.4.8
lingTrap communication is
reestablished with the DM,
which is determined by five
minutes without
communication loss.
alCsNoDataUploadedAlarm This trap is sent if no data is 1.3.6.1.4.1.2603.14.4.9
RisingTrap uploaded to ClearSee for three
consecutive intervals. ClearSee
finds files but fails to
extract/copy them, for
example, on account of an FTP
problem.
alCsNoDataUploadedAlarm This trap is sent after data is 1.3.6.1.4.1.2603.14.4.10
FallingTrap uploaded again to ClearSee for
three consecutive intervals.
alCsInCorruptedLastInterva This trap is sent if over 30% of 1.3.6.1.4.1.2603.14.4.11
lPercentAbove30RisingTra the incoming files since the
p last interval are corrupted.
alCsInCorruptedLastInterva This trap is sent if the number 1.3.6.1.4.1.2603.14.4.12
lPercentAbove30FallingTra of corrupted incoming files
p falls below 30%.
alCsHaFailoverEventTrap This trap is sent upon the 1.3.6.1.4.1.2603.14.4.13
event of a failover, which is
when a unit changes HA status
2-28
SNMP Traps
Name Description OID
from passive to active.
Applicable for BI only.
alCsHaPassiveAvailableEve This trap is sent by the active 1.3.6.1.4.1.2603.14.4.14
ntTrap unit when it connects to a
passive unit in HA mode.
Applicable for BI only.
alCsConfigurationFileDown This trap is sent by the 1.3.6.1.4.1.2603.14.4.15
loadFailedTrap ClearSee active unit when
Configuration File Download
has Failed
alCsConfigurationFileDown This trap is sent by the 1.3.6.1.4.1.2603.14.4.16
loadFailedClearTrap ClearSee active unit when a
Configuration File Download
has succeeded after a failure
alCsBIsyncErrorSetTrap This trap is sent by the 1.3.6.1.4.1.2603.14.4.17
ClearSee active unit when
connectivity is restored to
secondary unit and units are
out of sync
alCsBIsyncErrorClearTrap This trap is sent by the 1.3.6.1.4.1.2603.14.4.18
ClearSee active unit when both
BI units are in sync after sync
loss
alCsReportsUnavailableSet This trap is sent by the 1.3.6.1.4.1.2603.14.4.19
Trap ClearSee active unit when the
Report Service (MSTR) is down
on both BIs
alCsReportsUnavailableCle This trap is sent by the 1.3.6.1.4.1.2603.14.4.20
arTrap ClearSee active unit when
Report Service is restored on
at least a single BI node
alCsReportsHAdownSetTra This trap is sent by the 1.3.6.1.4.1.2603.14.4.21
p ClearSee active unit when One
of the BI servers is down and
the other is up (i.e: Report
Service (MSTR) is down on a BI
server)
alCsReportsHAdownClearT This trap is sent by the 1.3.6.1.4.1.2603.14.4.22
rap ClearSee active unit when the
Report Service on both BI
nodes is active
alCsSystemDownSetTrap This trap is sent by the 1.3.6.1.4.1.2603.14.4.23
ClearSee active unit when:
1. Data-Warehouse service is
down (Standalone Mode).
2-29
SNMP Traps
Name Description OID
2. Data-Warehouse service is
down on 2 or more Data-
Warehouse nodes (Cluster
Mode)
alCsSystemDownClearTrap This trap is sent by the 1.3.6.1.4.1.2603.14.4.24
ClearSee active unit when all
services are active in BI and
Data-Warehouse nodes after
System Down status
alCsDataWarehouseHADo This trap is sent by the 1.3.6.1.4.1.2603.14.4.25
wnSetTrap ClearSee active unit when
Data-Warehouse service is
down on one of the DWH
servers. This trap is relevant in
cluster mode only.
alCsDataWarehouseHADo This trap is sent by the 1.3.6.1.4.1.2603.14.4.26
wnClearTrap ClearSee active unit when all
Data-Warehouse servers are
up (Data-Warehouse Database
service is active) after one of
them was previously down
alCsSystemHADownSetTra This trap is sent by the 1.3.6.1.4.1.2603.14.4.27
p ClearSee active unit when the
Management Database Service
is down on one of the BI nodes
(Postgres DB is down). This
trap is relevant in cluster mode
only.
alCsSystemHADownClearTr This trap is sent by the 1.3.6.1.4.1.2603.14.4.28
ap ClearSee active unit when the
management Database Service
on both BI servers is active
(Postgres DB is active) after
one of them was previously
down. This trap is relevant in
cluster mode only.
alCsPDBDownSetTrap This trap is sent by the 1.3.6.1.4.1.2603.14.4.29
ClearSee active unit when:
1. Postgres DB is down
(Standalone Mode)
2. Postgres DB is down on
both BIs (Cluster Mode)
alCsPDBDownClearTrap This trap is sent by the 1.3.6.1.4.1.2603.14.4.30
ClearSee active unit when all
services are active in BI and
2-30
SNMP Traps
Name Description OID
Data-Warehouse nodes after a
System Down status.
For a full list of the traps which can be forwarded, refer to Appendix C of the
NetXplorer Installation and Administration Guide. Note the Event ID for each one.
This event ID appears in the details for each trap.
If you wish traps to be forwarded for additional events, please contact
[email protected] .
The trap received will also include the following four OIDs which provide the
administrator with information about the alarm which has been raised or cleared:
• AlSeverity: 1.3.6.1.4.1.2603.10.2.1.1.6
• AlDescription: 1.3.6.1.4.1.2603.10.2.1.1.7
• AlTimestamp: 1.3.6.1.4.1.2603.10.2.1.1.8
• AlIndex: 1.3.6.1.4.1.2603.10.2.1.1.9
We will examine each one of these in turn.
2.2.5.1 AlSeverity
The OID which will be displayed is as follows:
1.3.6.1.4.1.2603.10.2.1.1.6.a.b.c.d.alarm.x.y.z = integer N
Where:
a.b.c.d IP address of the element from which the alarm was received.
NOTE: The IP address may be IPv4 or IPv6. For IPv4
addresses, the a.b.c.d will be the standard dotted-decimal
2-31
SNMP Traps
notation, where each decimal is an octet of the address. With
IPv6 it is a non-standard representation where each decimal is
a 32-bit unsigned integer of the address.
You can recognize the the trap contains an IPv4 or IPv6
address by looking at the “a” value If “a” is <=255 then it is an
IPv4 address. Otherwise it is an IPv6 address.
alarm Alarm ID (as per table above)
x Card ID (0 by default)
y Source ID (0 by default)
z TCA – threshold crossing alarm ID
N Alarm severity (as per table below)
The alarm severity values which will be displayed in the trap are as follows
Value Meaning
0 Unknown
1 Cleared
2 Indeterminate
3 Critical
4 Major
5 Minor
6 Warning
2.2.5.2 AlDescription
The OID which will be displayed is as follows:
1.3.6.1.4.1.2603.10.2.1.1.7.a.b.c.d.alarm.x.y.z = STRING
The fields a.b.c.d.alarm.x.y.z are as described in AlSeverity above. The STRING here
will contain a description of the alarm, which will only be seen for a rising trap.
2.2.5.3 AlTimestamp
The OID which will be displayed is as follows:
1.3.6.1.4.1.2603.10.2.1.1.8.a.b.c.d.alarm.x.y.z = Counter 64
The fields a.b.c.d.alarm.x.y.z are as described in AlSeverity above. The timestamp
for the alarm is presented here in UTC format.
2.2.5.4 AlIndex
The OID which will be displayed is as follows:
2-32
SNMP Traps
1.3.6.1.4.1.2603.10.2.1.1.9.a.b.c.d.alarm.x.y.z = STRING
The fields a.b.c.d.alarm.x.y.z are as described in AlSeverity above. The string here
displays the alarm index (no new information is added here).
2.2.5.5 Example
A rising trap is forwarded to the trap receiver by NX 10.4.70.20. The forwarded trap
contains the details below:
2-33
SNMP Traps
• The trap is for a falling alarm (2603.10.0.2)
• The trap was received from a device with IP address 10.4.60.234. (as in the
rising alarm)
• The alarm ID of the trap is 100 (server is unreachable)
• As this is a falling alarm, the description of the alarm is empty “”, however we
can clearly tell to which alarm this refers from the alarm ID (100)
• The severity of the alarm provides a further indication that this is a “cleared
alarm” (indicated by Integer 1)
Using the respective remote management mechanism (IMM, TSM, XCC, iLO), each
COTS server can be configured to generate and send traps on different hardware
events.
2-34
SNMP Traps
2.2.6.2 Storage Device Traps
When Allot management (NX, SMP, DM) is deployed as a High Avaialbility Platform
(HAP), in some cases, a separate storage device is deployed in addition to two
server node.
The storage device may be based on different Commercial Off the Shelf hardware.
For example, depending on the generation of server shipped to the customer, the
storage sever in a HAP may be based on:
• IBM Storwize V5000 Family - V5010
• IBM Storwize V3000 Family - V3700
• IBM System Storage DS3200
In each case, the COTS Storage server can be configured to send traps to an
external NOC. Each storage type provides its own MIB files. Instructions on how to
configure each storage server to send traps can be found in the relevant Allot
Installation and Administration Guide.
2.2.7.1 Critical
These critical traps are from versions 1 and 2 of the NetworkSecure MIB.
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
event1 Unable to load [S]. Exiting program
This error is produced when an Operation module
cannot load a critical resource. Without it, the 1.3.6.1.4.1.30738.0.0.0.1 /
program must exit. The parameter is the critical 1.3.6.1.4.1.30738.5.1
resource name. Check that this resource exists and
that the module has rights to access it.
event2 Unable to reload [S]. Exiting program.
This error is produced when an Operation module
cannot reload a critical resource. Without it, the 1.3.6.1.4.1.30738.0.0.0.2 /
program must exit. The parameter is the critical 1.3.6.1.4.1.30738.5.2
resource name. Check that this resource exists and
that the module has rights to access it.
event3 Unable to start [S]. Exiting program.
This error is produced when an Operation module
cannot start some critical subprocesses (e.g. threads).
1.3.6.1.4.1.30738.0.0.0.3 /
Without them, the program must exit. Check that the
server has enough resources (disk space, RAM,
1.3.6.1.4.1.30738.5.3
available socket descriptors).
Modules: All
2-35
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
event4 Unable to start up MFCs. Exiting program
This error is produced when an Operation module
cannot start MFC´s library. Without these objects, 1.3.6.1.4.1.30738.0.0.0.4 /
windows sockets do not work and the program must 1.3.6.1.4.1.30738.5.4
exit. Only for Windows OS.
Modules: WF
event5 Thread [S] throws an exception that cannot be caught.
This error is produced when a thread launches an
exception the program does not catch. An uncaught 1.3.6.1.4.1.30738.0.0.0.5 /
exception is a critical error. The parameter is the name 1.3.6.1.4.1.30738.5.5
or the number of the thread.
Modules: WF
event6 Unable to get install directory. Exiting program.
This error is produced when an Operation module
cannot ask for its install directory. Without this 1.3.6.1.4.1.30738.0.0.0.6 /
parameter, the program does not work properly and 1.3.6.1.4.1.30738.5.6
must exit.
Modules: PM, CM, WF, RM
event7 Unable to check program license. Exiting program
This error is produced when an Operation module
1.3.6.1.4.1.30738.0.0.0.7 /
cannot check its license against remote license
servers.
1.3.6.1.4.1.30738.5.7
Modules: CT, CM, AS, WF, RM
event8 Invalid SOAP Port: [N]. Exiting program.
Some Operation modules need a SOAP
communication channel. This error appears when the
configured port cannot be used or it is busy. The 1.3.6.1.4.1.30738.0.0.0.8 /
parameter is the port number. Check that no other 1.3.6.1.4.1.30738.5.8
application is using that port or change the port
number in the configuration files.
Modules: CT
event9 [S] signal received. [S]
This error appears when an external signal is received
by the program. The first parameter is the signal 1.3.6.1.4.1.30738.0.0.0.9 /
received and the second is the description of that 1.3.6.1.4.1.30738.5.9
signal.
Modules: CT, CM
event10 Unable to set [S] service [S]. Exiting program.
The process cannot run as a service due to some
1.3.6.1.4.1.30738.0.0.0.10 /
reason (access denied, invalid name, invalid
parameter, service already exist…)
1.3.6.1.4.1.30738.5.10
Only in case of PC-Windows version.Modules: PM, WS
event11 Unable to get [S] port. Exiting program.
This error appears when the configured server port
cannot be used or is busy, for example. The parameter 1.3.6.1.4.1.30738.0.0.0.11 /
is the port number or the interface name that uses 1.3.6.1.4.1.30738.5.11
that port. Check that no other application is using that
port or change the port number in the configuration
2-36
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
files.
Modules: AS
2-37
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
event22 Master doesnt respond to heartbeats. Backup
activated.
1.3.6.1.4.1.30738.0.0.0.22 /
Deprecated 1.3.6.1.4.1.30738.5.22
event23 FATAL: no OptenetWebFilter running. Do
/etc/init.d/optenetOF restart ( or equivalent). If not 1.3.6.1.4.1.30738.0.0.0.23 /
working, check OptenetWebFilters log. 1.3.6.1.4.1.30738.5.23
Deprecated
event24 Interface [S] is just used by the operating system.
Exiting program.
Appears when CCOTTA cannot use the network 1.3.6.1.4.1.30738.0.0.0.24 /
interface to start up the bridge because it is already in 1.3.6.1.4.1.30738.5.24
use.
Modules: CT
event25 The bridge [S] is using more than one CCOTTAs
interfaces. Exiting program.
This error appears when there is more than one bridge
1.3.6.1.4.1.30738.0.0.0.25 /
with the same network interface configured. To solve
this, review CCOTTA configuration and use a different
1.3.6.1.4.1.30738.5.25
network interface for each bridge.
Modules: CT
event26 [P]1 No Servers are available
Modules: LIB
1.3.6.1.4.1.30738.0.0.0.26 /
1.3.6.1.4.1.30738.5.26
event27 [P]1 There are no configured Servers
Modules: LIB
1.3.6.1.4.1.30738.0.0.0.27 /
1.3.6.1.4.1.30738.5.27
event28 [P]1 There are no configured Primary Servers
Modules: LIB
1.3.6.1.4.1.30738.0.0.0.28 /
1.3.6.1.4.1.30738.5.28
event29 Module health check failed: cavium bypass triggered
at [S]
1.3.6.1.4.1.30738.0.0.0.29 /
Modules: CT 1.3.6.1.4.1.30738.5.29
event30 Thread [P]1 stalled for [P]2 milliseconds
Modules: CT
1.3.6.1.4.1.30738.0.0.0.30 /
1.3.6.1.4.1.30738.5.30
event31 Processing [S] queue is full for the last [N] seconds
Modules: CT
1.3.6.1.4.1.30738.0.0.0.31 /
1.3.6.1.4.1.30738.5.31
event32 This module is not compatible with [S]. Exiting
program
1.3.6.1.4.1.30738.0.0.0.32 /
Modules: CT 1.3.6.1.4.1.30738.5.32
event33 Unable to allocate memory for [S] pool. Existing
program
1.3.6.1.4.1.30738.0.0.0.33 /
Modules: CT 1.3.6.1.4.1.30738.5.33
2-38
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
event34 [S] Antivirus bases are older than [N] hours. Bases UTC
date is [S]
This happens the antivirus engine couldn’t be updated
for configured number of hours (default value 96 1.3.6.1.4.1.30738.0.0.0.34 /
hours, key: etc/Global.conf 1.3.6.1.4.1.30738.5.34
Content#AntiVirusEngines#TimeDiffZ 345600)
Antitrap: 5228Related messages: 2086, 4653,
5250Modules: WF, CM
event35 File system has not passed DiskIO Health test ([S]).
Code: [S]. Action taken: [S]
1.3.6.1.4.1.30738.0.0.0.35 /
This message appears if there are HD failures (for
instance, it is not possible to write/read from a file)
1.3.6.1.4.1.30738.5.35
Antitrap: 7008Module: PM
event36 External message: [S]
This is a message that the Central Manager writes for
external modules in case there is a Critical Error. An
external script can call the SOAP
“WriteMessageAtInternalLog” to write this message in 1.3.6.1.4.1.30738.0.0.0.36 /
the Central Manager. Thus we could have internal 1.3.6.1.4.1.30738.5.36
messages in the Central Manager in case an external
Tool needs them.
Related messages:36: critical2087: error4654:
warning5243: infoModule: CM
event37 License status has changed to [S]
This message appears when there is a change in the 1.3.6.1.4.1.30738.0.0.0.37 /
license status from NORMAL to a different status. 1.3.6.1.4.1.30738.5.37
Antitrap: 7019Module: CM
event38 Unable to load [S]. Reporter cannot execute reports.
The reporter was not able to load one resource to
1.3.6.1.4.1.30738.0.0.0.38 /
execute reports. Check that the resource is
available/cofigurable
1.3.6.1.4.1.30738.5.38
Module: Central Reporter
event39 Cannot create directory [S]. [S]
This message appears when the module cannot create 1.3.6.1.4.1.30738.0.0.0.39 /
the directory specify in the message. 1.3.6.1.4.1.30738.5.39
Modules: SF
event40 Unable to load [S]. [S]
1.3.6.1.4.1.30738.0.0.0.40 /
1.3.6.1.4.1.30738.5.40
event41 Local RM-5 DB encryption configuration does not
match with current configuration. Exiting program
1.3.6.1.4.1.30738.0.0.0.41 /
1.3.6.1.4.1.30738.5.41
event42 Local RM-5 DB is already encrypted. Exiting program
1.3.6.1.4.1.30738.0.0.0.42 /
1.3.6.1.4.1.30738.5.42
2-39
SNMP Traps
2.2.7.2 Error
These error traps are from versions 1 and 2 of the NetworkSecure MIB.
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot open [S] file
This error appears when the program cannot open
a file. This event stops the program working
event501 1.3.6.1.4.1.30738.0.0.0.501
properly. The parameter is the file name. Check this
file exists and the module has rights to access it.
Modules: CT, CM, AS, QM, RA, RM
Cannot close [S] file
This error appears when the program cannot close
a file. This event stops the program working
event502 1.3.6.1.4.1.30738.0.0.0.502
properly. The parameter is the file name. Check this
file exists and the module has rights to write it.
Modules: AS
Cannot create [S] file.
This error appears when the program cannot create
a new file. This event stops the program working
event503 1.3.6.1.4.1.30738.0.0.0.503
properly. The parameter is the file name. Check this
file exists and the module has rights to create it.
Modules: LIB, CM
Cannot load [S] file
This error appears when the program cannot load a
file. This event stops the program working properly.
event504 1.3.6.1.4.1.30738.0.0.0.504
The parameter is the file name. Check this file exists
and the module has rights to read it.
Modules: CM, AS, WF
Cannot read at [S] file
This error appears when the program cannot read a
file. This event stops the program working properly.
event505 1.3.6.1.4.1.30738.0.0.0.505
The parameter is the file name. Check this file exists
and the module has rights to read it.
Modules: CT, AS, QM, RA
Cannot write at [S] file
This error appears when the program cannot write
in a file. This event stops the program working
event506 1.3.6.1.4.1.30738.0.0.0.506
properly. The parameter is the file name. Check this
file exists and the module has rights to write it.
Modules: CT, CM, AS, RA
Bad content in [S] file
This error appears when the program expects
different content from a file. This event stops the
event507 program working properly. The parameter is the file 1.3.6.1.4.1.30738.0.0.0.507
name. Check that this file exists, the module has
rights to read it and it is not corrupt.
Modules: CM, AS,
2-40
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Unable to find [S] file
This error appears when the program cannot find a
file on the disk. This event stops the program
event508 working properly. The parameter is the file name. 1.3.6.1.4.1.30738.0.0.0.508
Check this file exists and the module has rights to
read it
Modules: PM
Cannot parse line at [S] file correctly. Ignoring data.
This error appears when the program cannot
understand a line in a file. The program will ignore
event509 the line, but it can stop the program working 1.3.6.1.4.1.30738.0.0.0.509
properly. The parameter is the file name. Check file
content and syntax of the line.
Deprecated
Cannot parse line at [S] file correctly. Bad field: [S].
This error appears when the program cannot
understand a line in a file because it contains an
incorrect field. The program will ignore the line, but
event510 it can stop the program working properly. The first 1.3.6.1.4.1.30738.0.0.0.510
parameter is the file name and the second is the
bad field data name. Check file content and syntax
of the field in the line.
Deprecated
Cannot save data correctly at [S] file
This error appears when the program cannot save
data in a file. It can stop the program working
event511 1.3.6.1.4.1.30738.0.0.0.511
properly. The parameter is the file name. Check this
file exists and the module has rights to write it.
Modules: AS
Cannot reload [S] file
This error appears when the program cannot reload
data from a file. It can stop the program working
event512 1.3.6.1.4.1.30738.0.0.0.512
properly. The parameter is the file name. Check this
file exists and the module has rights to read it.
Deprecated
Error appending line in %s file, line: %s.
This error appears when the module cannot add a
event513 line to a file used for caching results (LDAP users for 1.3.6.1.4.1.30738.0.0.0.513
CM or antispam analysis results for AS for instance)
Modules: CM, AS
Corrupted line: [[S]] [S], in file [S].
This error appears when the module cannot read a
line from a caching file (LDAP users for CM or
event514 1.3.6.1.4.1.30738.0.0.0.514
antispam analysis results for AS for instance). This
line from the file will be ignored.
Modules: CM, AS
2-41
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Bad line length in [S] file, line: [S].
This error appears when the module read a line
event515 from a caching file which is shorter than it should 1.3.6.1.4.1.30738.0.0.0.515
be. This line from the file will be ignored.
Modules: CM, AS
Bad key in [S] file, line: [S].
This error appears when the key read from a
caching file which is not properly written (it should
event516 1.3.6.1.4.1.30738.0.0.0.516
be Hex digit key). This line from the file will be
ignored.
Modules: CM, AS
Bad key or line length in [S] file, line: [S].
This error appears when the key read from a
event517 caching file which is as long as it should be (32). This 1.3.6.1.4.1.30738.0.0.0.517
line from the file will be ignored.
Modules: CM, AS
Bad line length reading timestamp in [S] file, line:
[S].
This error appears when the module cannot read a
event518 1.3.6.1.4.1.30738.0.0.0.518
timestamp from a caching file. This line from the file
will be ignored.
Modules: CM, AS
Couldnt open file ([S]) for writing.
This error appears when the module cannot open
event519 1.3.6.1.4.1.30738.0.0.0.519
the caching file for writing.
Modules: CM, AS
Error encoding file (%s) for writing.
This error appears when writing the caching file, the
event520 1.3.6.1.4.1.30738.0.0.0.520
line to write cannot be encoded.
Modules: CM, AS
Error renaming file (%s) to (%s).
This error appears when the caching file cannot be
event521 1.3.6.1.4.1.30738.0.0.0.521
renamed
Modules: CM, AS
event525 Path size [S] is higher than max allowed [S] 1.3.6.1.4.1.30738.0.0.0.525
Deprecated
2-42
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-43
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Failed to create static database [S].
This appears when trying to create a new static
event539 1.3.6.1.4.1.30738.0.0.0.539
database of accumulated data.
Modules: RM
Failed to check integrity of just accumulated
database [S].
event540 This appears when trying to open an accumulated 1.3.6.1.4.1.30738.0.0.0.540
database.
Modules: RM
Failed to dump accumulation to static database [S].
This appears when trying add new register to the
event541 1.3.6.1.4.1.30738.0.0.0.541
accumulated database
Modules: RM
Failed to dump static database [S].
This appears when trying add new register to the
event542 1.3.6.1.4.1.30738.0.0.0.542
database
Modules: RM
Failed to flush dynamic database [S].
event543 If it wasn’t possible to flush the dynamic database 1.3.6.1.4.1.30738.0.0.0.543
Modules: RM
Failed to get [S] value cursor from database [S].
Fails if it was not possible to get the cursor from a
event544 1.3.6.1.4.1.30738.0.0.0.544
database while creating a report
Modules: RM
Failed to get next [S] value from database [S].
Fails if it was not possible to get a value from a
event545 1.3.6.1.4.1.30738.0.0.0.545
database while creating a report
Modules: RM
Failed to get next record from table [S] from
database [S].
event546 Fails if it was not possible to get the next record 1.3.6.1.4.1.30738.0.0.0.546
cursor from a database while creating a report
Modules: RM
Failed to get table [S] record cursor from database
[S].
event547 Fails if it was not possible to get the cursor from a 1.3.6.1.4.1.30738.0.0.0.547
table from a database while creating a report
Modules: RM
Failed to open static database [S].
event548 It was not possible to open a static BBDD 1.3.6.1.4.1.30738.0.0.0.548
Modules: RM
Failed to populate navigation times from [S] into
[S].
event549 This error appears when the record was 1.3.6.1.4.1.30738.0.0.0.549
accumulated in a superior unit
Modules: RM
2-44
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Failed to move accumulated database from [S] to
[S].
This error appears when it was not possible to
event550 1.3.6.1.4.1.30738.0.0.0.550
move the accumulated record from one database
to another
Modules: RM
Failed to rebuild dynamic database [S] from detail
file.
This error appears when it was not possible to
event551 1.3.6.1.4.1.30738.0.0.0.551
create again the dynamic database from the
detailed logs
Modules: RM
Hour change failed, workmode [S] not found.
This error appears when it was not possible to read
event552 1.3.6.1.4.1.30738.0.0.0.552
the workmode to change the hour
Modules: RM
Failed to set core limit.
This error appears during the startup of the module
event553 if it was not possible to set the core limit. If it’s 1.3.6.1.4.1.30738.0.0.0.553
configured Exit on limit error, the module will exit
Modules: RM
Failed to set file limit.
This error appears during the startup of the module
event554 if it was not possible to set the file limit. If it’s 1.3.6.1.4.1.30738.0.0.0.554
configured Exit on limit error, the module will exit
Modules: RM
Error performing migration
This error appears if there is an error during a
event555 1.3.6.1.4.1.30738.0.0.0.555
migration from an old database to the current one.
Modules: RM
Failed to migrate database [S], unknown work
mode [S].
This error appears if there is an error during a
event556 1.3.6.1.4.1.30738.0.0.0.556
migration from an old database to the current due
to one work mode
Modules: RM
Failed to create table [S] migrating database [S].
This error appears if there is an error during a
event557 migration from an old database to the current one 1.3.6.1.4.1.30738.0.0.0.557
while creating a table.
Modules: RM
Failed to add value [S] to value table [S] migrating
database [S].
This error appears if there is an error during a
event558 1.3.6.1.4.1.30738.0.0.0.558
migration from an old database to the current one
while adding a value to a table in the new BBDD.
Modules: RM
2-45
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Failed to add record to table [S] migrating database
[S].
This error appears if there is an error during a
event559 1.3.6.1.4.1.30738.0.0.0.559
migration from an old database to the current one
while adding a record.
Modules: RM
Failed to read programmed report instance [S].
This error appears if there is an error reading the
event560 programmed report instance (it was not possible to 1.3.6.1.4.1.30738.0.0.0.560
open the file)
Modules: RM
Failed to load programmed report instance [S].
This error appears if there is an error loading the
event561 1.3.6.1.4.1.30738.0.0.0.561
programmed report instance
Modules: RM
Failed to create programmed report instance [S].
This error appears if there is an error creating the
event562 1.3.6.1.4.1.30738.0.0.0.562
programmed report instance
Modules: RM
Failed to save programmed report instance [S].
This error appears if there is an error writing the
event563 1.3.6.1.4.1.30738.0.0.0.563
programmed report instance
Modules: RM
Failed to open programmed report instance [S].
This error appears if there is an error open the
event564 1.3.6.1.4.1.30738.0.0.0.564
programmed report instance
Modules: RM
Failed to migrate file [S].
This error appears if there is an error migrating a
event565 1.3.6.1.4.1.30738.0.0.0.565
file to the current format
Modules: RM
Failed to copy detail file [S].
This error appears in a migration, if there is an error
event566 1.3.6.1.4.1.30738.0.0.0.566
copying a detailed file from the old database.
Modules: RM
Failed to move detail file [S].
This error appears in a migration, if there is an error
event567 1.3.6.1.4.1.30738.0.0.0.567
moving a detailed file from the old database.
Modules: RM
Failed to sort database [S] in [S].
event568 This error appears if the database is not sorted. 1.3.6.1.4.1.30738.0.0.0.568
Modules: RM
Failed to upgrade: Unknown work mode [S].
This error appears if it’s not possible to know the
event569 1.3.6.1.4.1.30738.0.0.0.569
work modes while starting an upgrade
Modules: RM
2-46
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Error performing upgrade.
This error appears when it was not possible to
event570 1.3.6.1.4.1.30738.0.0.0.570
upgrade the database
Modules: RM
Failed to upgrade database [S], backup file [S]
already exists.
event571 This error appears while trying to upgrade a 1.3.6.1.4.1.30738.0.0.0.571
database and the backup file already exist
Modules: RM
Failed to open database [S].
This error appears while trying to upgrade a
event572 database and it was not possible to open the 1.3.6.1.4.1.30738.0.0.0.572
database
Modules: RM
Failed to create database [S].
This error appears while trying to upgrade a
event573 database and it was not possible to create a 1.3.6.1.4.1.30738.0.0.0.573
database.
Modules: RM
Failed to upgrade database [S].
This error appears while trying to upgrade a
event574 database and it was not possible to upgrade one 1.3.6.1.4.1.30738.0.0.0.574
database.
Modules: RM
Failed to upgrade detailed log [S], backup file [S]
already exists.
This error appears while trying to upgrade a
event575 1.3.6.1.4.1.30738.0.0.0.575
database and it was not possible to upgrade
detailed log because the backup file already exists.
Modules: RM
Failed to open detailed log [S].
This error appears while trying to upgrade a
event576 database and it was not possible to open the 1.3.6.1.4.1.30738.0.0.0.576
detailed log file.
Modules: RM
Failed to create detailed log [S].
This error appears while trying to upgrade a
event577 database and it was not possible to create the new 1.3.6.1.4.1.30738.0.0.0.577
detailed log file.
Modules: RM
Table definition [S] not found in schema.
This message appears when the Central Reporter
event578 1.3.6.1.4.1.30738.0.0.0.578
cannot get the schema from Vertica database.
Modules: Central Reporter
Unexpected workmode [S]
event579 This message appears when the Central Reporter 1.3.6.1.4.1.30738.0.0.0.579
cannot find the work mode requested in the Vertica
2-47
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
database.
Modules: Central Reporter
[S] is deprecated
This message appears when some parameters in
event580 1.3.6.1.4.1.30738.0.0.0.580
the query are deprecated.
Modules: Central Reporter
[S] is no longer available
This message appears when some parameters in
event581 1.3.6.1.4.1.30738.0.0.0.581
the query are no longer available.
Modules: Central Reporter
Cannot create socket [N]
This error appears when the program cannot create
a communication socket. It can stop the program
working properly. The parameter is the socket
event1001 1.3.6.1.4.1.30738.0.0.0.1001
number. Check that no other application is using
that port or change the port number in the
configuration files.
Modules: CT, AS, RA
Cannot create socket listening at [N] port.
This error appears when the program cannot create
a communication socket listening at a port. It can
stop the program working properly. The parameter
event1002 1.3.6.1.4.1.30738.0.0.0.1002
is the port number. Check that no other application
is using that port or change the port number in the
configuration files.
Modules: CT
Cannot connect at socket [N].
This error appears when the program cannot
connect with a communication socket. It can stop
event1003 the program working properly. The parameter is the 1.3.6.1.4.1.30738.0.0.0.1003
socket number. Check that the socket is listening
and that the module can access it (no firewall).
Deprecated
Cannot accept communication with socket [N]
This error appears when the program cannot accept
a communication with a socket. It can stop the
event1004 1.3.6.1.4.1.30738.0.0.0.1004
program working properly. The parameter is the
socket number.
Deprecated
2-48
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
number.
Modules: AS, WF
2-49
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
[S] server bad configured
This error appears if using the old license control
when trying to send an email informing about
event1013 1.3.6.1.4.1.30738.0.0.0.1013
License expiration and in the SMT server returns a
Warning message (between 200 and 400)
Modules: CM
setsockopt() failed. [S]
This error appears when trying to modify the
event1014 options of a socket reused in ICAP server of the WF 1.3.6.1.4.1.30738.0.0.0.1014
module
Modules: WF
Cannot enable address reuse at socket [N]
This error appears when the program cannot
event1015 activate the socket address reuse flag. The 1.3.6.1.4.1.30738.0.0.0.1015
parameter is the number of the specified socket.
Deprecated
2-50
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
RpcServerListen() failed. [S]
Unable to listen RPC requests. Check that the RPC
event1022 1.3.6.1.4.1.30738.0.0.0.1022
service is running
Modules: WF
RpcServerRegisterAuthInfo() failed. [S]
Unable to register authentication service. Check
event1023 1.3.6.1.4.1.30738.0.0.0.1023
that the RPC service is running
Modules: WF
RpcServerRegisterIf() failed. [S]
Unable to register RPC server. Check that the RPC
event1024 1.3.6.1.4.1.30738.0.0.0.1024
service is running.
Modules: WF
fcntl F_GETFL
Unable to get information about the socket
event1025 1.3.6.1.4.1.30738.0.0.0.1025
descriptor.
Modules: AS, WF
fcntl F_SETFL
event1026 Unable to set socket descriptor information. 1.3.6.1.4.1.30738.0.0.0.1026
Modules: AD, WF
2-51
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
space, RAM, available socket descriptors).
Modules: CT, RM, WS
2-52
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
The parameter is the thread name or number.
Modules: PM
2-54
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
event2017 License [S] has expired, please contact [S] to renew 1.3.6.1.4.1.30738.0.0.0.2017
Deprecated
2-55
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Registering sig handler: [S]
Unable to register this signal handle. The process
event2023 1.3.6.1.4.1.30738.0.0.0.2023
could not capture it.
Modules: WF
[S] service failed. [S]
This error appears when the service in the SOAP call
event2024 1.3.6.1.4.1.30738.0.0.0.2024
is not the correct one.
Modules: CM
RegisterServiceCtrlHandler failed [S]
Unable to register the service in the Service Control
event2025 1.3.6.1.4.1.30738.0.0.0.2025
Manager
Modules: PM, WF, QM, WS
SetServiceStatus failed. [S]
The service could not report its status to the Service
event2026 1.3.6.1.4.1.30738.0.0.0.2026
Control Manager.
Modules: PM, WF, QM, WS
StartServiceCtrlDispatcher failed. [S]
Unable to start the service control dispatcher due
event2027 1.3.6.1.4.1.30738.0.0.0.2027
to reported error.
Modules: PM, WF, QM, WS
DeleteService failed. [S]
event2028 Unable to delete this service. 1.3.6.1.4.1.30738.0.0.0.2028
Deprecated
event2029 Cannot load filter [S] settings: ill formed at file [S] 1.3.6.1.4.1.30738.0.0.0.2029
Deprecated
Cannot load quarantine [S] settings: ill formed at
event2030 file [S] 1.3.6.1.4.1.30738.0.0.0.2030
Deprecated
Cannot load reporter [S] settings: ill formed at file
event2031 [S] 1.3.6.1.4.1.30738.0.0.0.2031
Deprecated
event2034 Cannot get line from file while loading [S] 1.3.6.1.4.1.30738.0.0.0.2034
Deprecated
Cannot read mail from disk: [S]
This error appears when it was not possible to read
event2035 1.3.6.1.4.1.30738.0.0.0.2035
one mail from disk
Modules: QM
2-56
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-57
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
and the second is the request name.
Modules: RM, SMTP Filter
2-58
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Central Manager [S] is asking for transactions with a
state that this CM cannot assure it will get all
changes that have been made from that state [S]
event2056 If this happens, check the connectivity between the 1.3.6.1.4.1.30738.0.0.0.2056
modules and their transactions states. Execute a
setup, clean database and profiles.
Modules: CM
2-59
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
event2074 External tool [S] failed. See log [S]. Additional 1.3.6.1.4.1.30738.0.0.0.2074
Deprecated
No users analyzed in directories of Directories.conf.
Please check config and file systems. Reattempting
event2075 1.3.6.1.4.1.30738.0.0.0.2075
soon to read data.
Deprecated
2-60
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-61
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Exception captured. [S]
The module logs this error each time it is not
event2090 1.3.6.1.4.1.30738.0.0.0.2090
possible to access McAfee backend.
Module: CM
Unable to remove [S]
The module logs this error each time it is not
event2091 possible to remove McAfee data from a client 1.3.6.1.4.1.30738.0.0.0.2091
provisioned in the solution.
Module: CM
Query syntax
The module logs this error when the query sent to
event2092 the reporter is not correct. When received, check 1.3.6.1.4.1.30738.0.0.0.2092
the syntax.
Module: Central Reporter
Field [S] is not valid for workmode [S]
The module logs this error when the field requested
event2093 in the query is not valid for the work mode 1.3.6.1.4.1.30738.0.0.0.2093
requested
Module: Central Reporter
2.2.7.3 Warning
These warning traps are from versions 1 and 2 of the NetworkSecure MIB.
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot open [S] file
This warning appears when the program cannot
open a file. If this event occurs repeatedly, the
event3001 1.3.6.1.4.1.30738.0.0.0.3001
program may stop working properly. The parameter
is the file name.
Modules: AS, RM
Cannot close [S] file
This warning appears when the program cannot
close a file. If this event occurs repeatedly, the
event3002 1.3.6.1.4.1.30738.0.0.0.3002
program may stop working properly. The parameter
is the file name.
Modules: RM
Cannot create [S] file.
This warning appears when the program cannot
create a file. If this event occurs repeatedly, the
event3003 1.3.6.1.4.1.30738.0.0.0.3003
program may stop working properly. The parameter
is the file name.
Modules: AS, WF
2-62
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot delete [S] file
This warning appears when the program cannot
delete a file. If this event occurs repeatedly, the
event3004 1.3.6.1.4.1.30738.0.0.0.3004
program may stop working properly. The parameter
is the file name.
Modules: RA, RM
Cannot load [S] file
This warning appears when the program cannot load
a file. If this event occurs repeatedly, the program
event3005 1.3.6.1.4.1.30738.0.0.0.3005
may stop working properly. The parameter is the file
name.
Modules: LIB, CT, WF
Cannot move [S] file
This warning appears when the program cannot
move a file. If this event occurs repeatedly, the
event3006 1.3.6.1.4.1.30738.0.0.0.3006
program may stop working properly. The parameter
is the file name.
Modules: RM
Cannot rename [S] file
This warning appears when the program cannot
rename a file. If this event occurs repeatedly, the
event3007 1.3.6.1.4.1.30738.0.0.0.3007
program may stop working properly. The parameter
is the file name.
Modules: AS
Cannot read at [S] file
event3008 1.3.6.1.4.1.30738.0.0.0.3008
Deprecated
Cannot write at [S] file
This warning appears when the program cannot
write in a file. If this event occurs repeatedly, the
event3009 1.3.6.1.4.1.30738.0.0.0.3009
program may stop working properly. The parameter
is the file name.
Modules: CM, AS, WF, RM
Unable to find [S] file
This warning appears when the program cannot find
a file on the disk. If this event occurs repeatedly, the
event3010 1.3.6.1.4.1.30738.0.0.0.3010
program may stop working properly. The parameter
is the file name.
Modules: PM, AS
2-63
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot parse [S] files line correctly.
This warning appears when the program cannot
parse a line in a file. If this event occurs repeatedly,
event3014 1.3.6.1.4.1.30738.0.0.0.3014
the program may stop working properly. The
parameter is the file name.
Modules: CM, RM
Access to [S] file must be exclusive
event3015 1.3.6.1.4.1.30738.0.0.0.3015
Deprecated
Bad content for [S] file.
This warning appears when the content of a file is
different to what the program expects. If this event
event3016 1.3.6.1.4.1.30738.0.0.0.3016
occurs repeatedly, the program may stop working
properly. The parameter is the file name.
Modules: AS
Cannot open [S] directory
event3017 1.3.6.1.4.1.30738.0.0.0.3017
Deprecated
2-64
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-65
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Unable to create process [S]
This warning appears when an Operation module
cannot create a subprocess. If this event occurs
event3036 1.3.6.1.4.1.30738.0.0.0.3036
repeatedly, the program may stop working properly.
The parameter is the subprocess name.
Modules: PM, WF
Wrong group_membership_query for user [S] from
[S].
The LDAP query for searching user groups (first %s)
event3037 in LDAP server (second %s) is wrong. Please check 1.3.6.1.4.1.30738.0.0.0.3037
LDAP configuration parameters, especially
GroupMembershipQuery parameter.
Modules: CM, WS
Wrong user_membership_query for user [S] from
[S].
The LDAP query for searching user groups (first %s)
event3038 in LDAP server (second %s) is wrong. Please check 1.3.6.1.4.1.30738.0.0.0.3038
LDAP configuration parameters, especially the
UserMembershipQuery parameter.
Modules: CM, WS
Wrong nested group_membership_query for user
[S] from [S].
The LDAP query for searching nested groups of user
event3039 groups (first %s) in LDAP server (second %s) is wrong. 1.3.6.1.4.1.30738.0.0.0.3039
Please check LDAP configuration parameters,
especially the GroupMembershipQuery parameter.
Modules: CM, WS
Discarding URL [S] in Heritrix job [S]
This warning appears when the URL to insert is not
event3040 1.3.6.1.4.1.30738.0.0.0.3040
well formed
Modules: WF
mywrite:
This warning appears when the module cannot write
event3041 1.3.6.1.4.1.30738.0.0.0.3041
the translated html line to the language desired
Modules: WF
Unable to start [S]
This warning appears when the program cannot start
event3042 a non-critical subprocess. The parameter is the 1.3.6.1.4.1.30738.0.0.0.3042
subprocess name
Modules: PM
Cannot open [S] process
This warning appears when the program cannot
event3043 open a non-critical subprocess. The parameter is the 1.3.6.1.4.1.30738.0.0.0.3043
subprocess name.
Modules: PM
Unable to set value into [S] registry key.
event3044 1.3.6.1.4.1.30738.0.0.0.3044
Deprecated
2-66
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-67
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
cannot read a line of the transaction state file.
Modules: CM, WF,
2-68
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
IP address: [[S]].
Only un Proxy deployment mode. This warning
appears when an Operation module finds something
event3063 wrong with an IP address. The first parameter is the 1.3.6.1.4.1.30738.0.0.0.3063
bad IP address. The second one is the description of
the problem (bad format, too long, etc.).
Modules: WF
Username: [[S]].
This warning appears when an Operation module
finds something wrong with a user name. The first
event3064 parameter is the bad user name. The second one is 1.3.6.1.4.1.30738.0.0.0.3064
the description of the problem (bad format, too long,
etc.).
Modules: WF
Unable to connect to transaction server.
This warning appears when an Operation module
cannot connect with the transaction server. This
event3065 1.3.6.1.4.1.30738.0.0.0.3065
server is used by the module to receive all new
updates.
Modules: AS, WF
Unable to write url database.
This warning appears when a Filtering Module
cannot write the URL database received from a
event3066 1.3.6.1.4.1.30738.0.0.0.3066
server. The filtering module will use the old URL
database.
Check space disk and write permissionsModules: WF
event3067 1.3.6.1.4.1.30738.0.0.0.3067
Deprecated
2-69
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-70
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
a specified value
Modules: WF
2-71
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
cannot send an email for a client programmed report
Modules: RM
2-72
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Inconsistency detected while processing lines from
[S]. Line [S] does not have consecutive numbering.
Logs Integrity. Prevention from detailed logs
modification. In the case the logs that the Reporter is
event3105 1.3.6.1.4.1.30738.0.0.0.3105
processing don’t have a correct Num Line, this
means that there have been added/removed lines to
the log file
Module: RM
Inconsistency detected while processing lines from
[S]. Line [S] does no have integrity fields.
Logs Integrity. Prevention from detailed logs
event3106 1.3.6.1.4.1.30738.0.0.0.3106
modification. The reporter shows this message in the
case the log line process doesn’t have integrity
Module: RM
2-73
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Suspicious socket [N] write 0 bytes.
This warning appears when the program writes 0
bytes at a socket. If this event occurs repeatedly, the
event3509 1.3.6.1.4.1.30738.0.0.0.3509
program may stop working properly. The parameter
is the socket number.
Modules: WF
Cannot establish communication with [S]. [S].
This warning appears when the program cannot
establish communication with a server. The first
event3510 1.3.6.1.4.1.30738.0.0.0.3510
parameter is the server name and the second is the
connection error description.
Modules: CM, QM, RA, RM
Request [S] to [S] ill formed.
This warning appears when the program finds an ill-
formed request for a specific server. The request will
event3511 be discarded by the program. The first parameter is 1.3.6.1.4.1.30738.0.0.0.3511
the request name and the second is the server name
that receives the request.
Modules: QM, WS
Request [S] to [S] is unknown
This warning appears when the program finds an
unknown request for a specific server. The request
event3512 will be discarded by the program. The first 1.3.6.1.4.1.30738.0.0.0.3512
parameter is the request name and the second is the
server name which receives the request.
Modules: AS, RA
Request [S] to [S] is missing
event3513 1.3.6.1.4.1.30738.0.0.0.3513
Deprecated
2-74
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
update the software (update only available in OSE
solution)
Modules: CT, CM
2-75
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-76
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
server was closed without response
Modules: QM
2-77
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-78
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot get new logs from filter [S]
This warning appears when the module request is
event3569 1.3.6.1.4.1.30738.0.0.0.3569
too long
Modules: CM
Cannot get host by name: [S].
event3570 1.3.6.1.4.1.30738.0.0.0.3570
Deprecated
event3573 1.3.6.1.4.1.30738.0.0.0.3573
Deprecated
2-79
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
with the QSyncClient
Modules: QM
2-80
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot reload [S] log workmode. Work mode hasnt
been modified.
event3591 This warning appears when it was not possible to 1.3.6.1.4.1.30738.0.0.0.3591
load a workmode.
Modules: RM
Cannot get remote file [S] from CentralManager
module
This warning appears when an Operation module
event3592 cannot get a file from the Central Manager. Normally 1.3.6.1.4.1.30738.0.0.0.3592
the file is a configuration file that must be reloaded.
The parameter is the name of the remote file.
Modules: AS, WF
Parameter [S] has an invalid value
Only in BGP deployment mode. This warning appears
event3593 when the parameter read from the config file (for 1.3.6.1.4.1.30738.0.0.0.3593
BGP configuration) has not a valid value
Modules: CT
Cannot get machine identifier
event3594 1.3.6.1.4.1.30738.0.0.0.3594
Deprecated
2-81
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
[S] has exceeded its used files limit ([S]) to reach at:
event3603 [S] 1.3.6.1.4.1.30738.0.0.0.3603
Modules: PM
[S] has recovered its used files limit ([S]) to reach at:
event3604 [S] 1.3.6.1.4.1.30738.0.0.0.3604
Modules: PM
[S] was killed to exceed its used files limit ([S]) to
event3605 reach at: [S] 1.3.6.1.4.1.30738.0.0.0.3605
Modules: PM
2-82
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
send an SMS with the programmed report of a client
because there is a wrong parameter in the
configuration
Modules: RM
Failed to send SMSs for programmed report [S].
Wrong parameters in programmed report
configuration.
This warning appears when it was not possible to
event3615 1.3.6.1.4.1.30738.0.0.0.3615
send an SMS with the programmed report of
because there is a wrong parameter in the
configuration
Modules: RM
Could not send SMS to receiver [S].
This warning appears when it was not possible to
event3616 1.3.6.1.4.1.30738.0.0.0.3616
send an SMS
Modules: RM
Table [S] does not contain all the required fields
This warning appears when a table is missing a
required field and when an unsupported
event3617 1.3.6.1.4.1.30738.0.0.0.3617
programmed report has been configured. Reporter
logs with:
3546 2 Parameter %s not found
Unsupported programmed report type: [S].
This warning appears when an unsupported
event3618 programmed report has been configured. Reporter 1.3.6.1.4.1.30738.0.0.0.3618
logs with:
3546 2 Parameter %s not found
[S] service failed. [S]
This message appears when reporting a failure to
event3619 1.3.6.1.4.1.30738.0.0.0.3619
contact IsecG SendMessage API
Modules: CM
Cannot get enough memory for [S]
Problems for allocating memory, the process will
event4001 continue running successfully. Check the Memory 1.3.6.1.4.1.30738.0.0.0.4001
available.
Modules: CM, AS, WF
There isnt enough free space in disk
This warning appears when the program cannot find
the necessary space to write some information on
event4002 1.3.6.1.4.1.30738.0.0.0.4002
the disk. If this event occurs repeatedly, the program
may stop working properly.
Modules: AS, QM
Cannot set default thread attributes: [S]
This warning appears when the default thread
event4003 settings cannot be set. The parameter is the problem 1.3.6.1.4.1.30738.0.0.0.4003
description.
Modules: PM, LIB
2-83
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot get default thread stack size: [S]
This warning appears when the default thread stack
event4004 size cannot be set. The parameter is the problem 1.3.6.1.4.1.30738.0.0.0.4004
description
Modules: PM, LIB
Cannot change default thread stack size: [S]
This warning appears when the default thread stack
event4005 size cannot be changed. The parameter is the 1.3.6.1.4.1.30738.0.0.0.4005
problem description.
Modules: LIB
A detached thread shouldnt be deleted
event4006 1.3.6.1.4.1.30738.0.0.0.4006
Deprecated
Cannot find free socket thread to handle requests
from port [N]. Not processed.
This warning appears when the program does not
have any free threads to receive an external request
event4007 1.3.6.1.4.1.30738.0.0.0.4007
from a port. The requests will not be processed by
the program. The parameter is the number of the
specified port.
Modules: PM, CM, WF, RM, WS
Thread pool empty for 60 seconds. Connection
event4008 rejected. 1.3.6.1.4.1.30738.0.0.0.4008
Deprecated
2-84
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-85
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Filter node [S] doesnt have the correct
event4514 user/password 1.3.6.1.4.1.30738.0.0.0.4514
Deprecated
2-86
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
duplicated order
Modules: CM
2-87
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Http
event4538 1.3.6.1.4.1.30738.0.0.0.4538
Modules: LIB, PM
2-88
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Ip [S] was already in use by client [S] now it is
associated to client [S]
This warning message appears when a current IP
event4550 1.3.6.1.4.1.30738.0.0.0.4550
address that was associated to one client now is
associated to another client.
Modules: CM
Over Number of failures while trying to contact
Central Manager
This warning appears when it was not possible to
event4551 1.3.6.1.4.1.30738.0.0.0.4551
contact with the Central Manager for a number of
times.
Modules: PM, AS
CCOTTA Under [P] WAP/Mobile Web requests
event4552 1.3.6.1.4.1.30738.0.0.0.4552
Deprecated
2-89
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
CentralManager Over Number of failures contacting
database: [S]
This warning appears when there were an over
event4562 1.3.6.1.4.1.30738.0.0.0.4562
number of failed attempts to communicate with
provision DB
Modules: CM
CentralManager Over Number of failures contacting
IWF database server: [S]
This warning appears when there were an over
event4563 1.3.6.1.4.1.30738.0.0.0.4563
number of failed attempts to communicate with IWF
Server
Modules: CM
CentralManager Over Number of times core data
was missing in Authentication cache: [S]
This warning appears when the MSISDN username is
event4564 1.3.6.1.4.1.30738.0.0.0.4564
not found in WF cache, so WF asks to CM for the
user
Modules: CM
CentralManager Over Number of wrong user
authentication
This warning appears when there was an over
event4565 1.3.6.1.4.1.30738.0.0.0.4565
number of user login (operator/administrator)
invalid
Modules: CM
CentralManager Over Number of requests for user
This warning appears when there was a client is not
event4566 1.3.6.1.4.1.30738.0.0.0.4566
found in cache for IP assignment
Modules: CM
CentralManager Over Number of authenticated
users in cache: [S]
event4567 This warning appears when there was an over 1.3.6.1.4.1.30738.0.0.0.4567
number of validated users in cache
Modules: CM
CentralManager Over Time between updates from
the IWF server: [S]
event4568 This warning appears when there was an over time 1.3.6.1.4.1.30738.0.0.0.4568
between updates from the IWF
Modules: CM
Reporter Over [P] Log server requests erroneous /
event4569 processed 1.3.6.1.4.1.30738.0.0.0.4569
Deprecated
2-90
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-91
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
[S] is not responding.
This warning appears to notify that the process
event4585 mentioned is not responding. In this case, the PM 1.3.6.1.4.1.30738.0.0.0.4585
will stop the process and restart again.
Modules: PM
Machine has exceeded its used CPU limit ([S] [P]) to
reach at: [S] [P]
event4586 This warning appears to notify that CPU has 1.3.6.1.4.1.30738.0.0.0.4586
exceeded the configured limit.
Modules: PM
Machine has less than its free Memory limit ([S] MB)
to reach at: [S] MB
event4587 This warning appears to notify that free Memory is 1.3.6.1.4.1.30738.0.0.0.4587
less than the configured limit.
Modules: PM
Machine has less than its free Disk limit ([S] MB) to
reach at: [S] MB (file system [S])
event4588 This warning appears to notify that free Disk is less 1.3.6.1.4.1.30738.0.0.0.4588
than the configured limit.
Modules: PM
[S] has exceeded its CPU limit ([S] [P]) to reach at: [S]
[P]
This warning appears to notify that the module
specified has exceeded the CPU limit configured. This
event4589 is a limit for warning. There is another limit that the 1.3.6.1.4.1.30738.0.0.0.4589
module cannot surpass. If the module surpasses this
second limit, it’ll be killed and another message will
be sent (see message 4590)
Modules: PM
[S] was killed to exceed its CPU limit ([S] [P]) to
reach at: [S] [P]
This warning appears to notify that the module
event4590 1.3.6.1.4.1.30738.0.0.0.4590
specified was killed because it has exceeded the CPU
limit configured.
Modules: PM
[S] has exceeded its Memory limit ([S] MB) to reach
at: [S] MB
This warning appears to notify that the module
specified has exceeded the Memory limit configured.
event4591 This is a limit for warning. There is another limit that 1.3.6.1.4.1.30738.0.0.0.4591
the module cannot surpass. If the module surpasses
this second limit, it’ll be killed and another message
will be sent (see message 4592)
Modules: PM
[S] was killed to exceed its Memory limit ([S] MB) to
reach at: [S] MB
event4592 1.3.6.1.4.1.30738.0.0.0.4592
This warning appears to notify that the module
specified was killed because it has exceeded the
2-92
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Memory limit configured.
Modules: PM
2-93
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
configured.
Modules: PM
2-94
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Response
event4620 1.3.6.1.4.1.30738.0.0.0.4620
Deprecated
no_blocking_write:: [S]
event4621 1.3.6.1.4.1.30738.0.0.0.4621
Deprecated
Exiting in emergency, without doing all users, it is
because there are only [N] seconds left before end of
event4622 1.3.6.1.4.1.30738.0.0.0.4622
allowed range of execution (file Programation.conf)
Deprecated
Machine has more reception
This warning appears to notify that there are more
event4623 1.3.6.1.4.1.30738.0.0.0.4623
receptions errors than the limit configured.
Modules: PM
Machine has recovered its reception
This warning appears to notify that has recover from
event4624 the limit configured of receptions errors (this is the 1.3.6.1.4.1.30738.0.0.0.4624
antitrap of 4623)
Modules: PM
2-95
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Machine has more transmission
This warning appears to notify that there are more
event4625 1.3.6.1.4.1.30738.0.0.0.4625
transmission errors than the limit configured.
Modules: PM
Machine has recovered its transmission
This warning appears to notify that has recover from
event4626 the limit configured of transmission errors (this is the 1.3.6.1.4.1.30738.0.0.0.4626
antitrap of 4625)
Modules: PM
File system has not pass SMART Health test ([S]) to
reach: [S] (file system [S])
event4627 This warning appears to notify that the filesystem 1.3.6.1.4.1.30738.0.0.0.4627
has not passed the SMART Health test indicated.
Modules: PM
File system has passed SMART Health test ([S]) to
reach: [S] (file system [S])
event4628 This warning appears to notify that the filesystem 1.3.6.1.4.1.30738.0.0.0.4628
has passed the SMART Health test indicated.
Modules: PM
Line [S] discarded in workmode [S], database feeder
event4629 database has not been initialized. 1.3.6.1.4.1.30738.0.0.0.4629
Modules: RM
Line [S] discarded in workmode [S], database feeder
event4630 mapping has not been initialized. 1.3.6.1.4.1.30738.0.0.0.4630
Modules: RM
Line [S] discarded in workmode [S], database feeder
event4631 record buffer has not been initialized. 1.3.6.1.4.1.30738.0.0.0.4631
Modules: RM
No suitable record table found in static database [S]
event4632 to feed memory database table [S]. 1.3.6.1.4.1.30738.0.0.0.4632
Deprecated
2-96
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Couldnt sent mail to receivers [S].
Modules: RM
event4638 }The default value is 2secs (if not present). It can be 1.3.6.1.4.1.30738.0.0.0.4638
written in any conf. file.When the connection is
restored writes 5202
Couldnt process task in [S]. [N] attempts left.
event4639 1.3.6.1.4.1.30738.0.0.0.4639
Modules: RM
[P]4:[P]2 Server is not Responding. [P]5
This warning appears when the module cannot
event4640 connect with a remote server. 1.3.6.1.4.1.30738.0.0.0.4640
Review the following key:General{
ServerConnectTimeout = 2 # seg.
DNS resolution
event4641 1.3.6.1.4.1.30738.0.0.0.4641
Modules: CM
None DNS domain could be resolved
This warning appears when the module was not able
event4642 to resolve the DNS. Please check the DNS conf at O.S: 1.3.6.1.4.1.30738.0.0.0.4642
/etc/resolv.conf
Modules: CM
Analysis cancelled, ScanId [N].
event4643 1.3.6.1.4.1.30738.0.0.0.4643
Deprecated
Update cancelled.
event4644 1.3.6.1.4.1.30738.0.0.0.4644
Deprecated
2-97
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
optimization.
Modules: CT
event4649 1.3.6.1.4.1.30738.0.0.0.4649
2-98
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot get from CM bases date for antivirus engine:
[S]
This message appears in case the filtering module is
event4657 not able to download the date for antivirus engine 1.3.6.1.4.1.30738.0.0.0.4657
bases. The module downloads the date in order to
know if it is updated or not.
Module: SMTP Filter, Web Filter
KPI [S] has [S]. Current value is [S]
This message is shown each time a KPI monitored by
event4658 Process Monitor has surpassed the configured 1.3.6.1.4.1.30738.0.0.0.4658
threshold (for example, packets drops, bypasses).
Antitrap: 7020Module: PM
Parameter [S] not found. Falling back to [S]
This parameter was not found. Falling back to
event4659 1.3.6.1.4.1.30738.0.0.0.4659
another value.
Module: Central Reporter
Resource [S] has a current limit value of [S] but this
module requires it to be [S]
The module requires a different limit for the
event4660 1.3.6.1.4.1.30738.0.0.0.4660
resource configured. Please check the limits and
update them accordingly.
Module: Central Reporter
2.2.7.4 Info
These informational traps are from versions 1 and 2 of the NetworkSecure MIB.
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-99
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
[S] closed.
event5004 1.3.6.1.4.1.30738.0.0.0.5004
Deprecated
[S] finished.
This info message appears when the indicated action
(Kerberos key renewal, AntiVirus update, URLs
event5009 1.3.6.1.4.1.30738.0.0.0.5009
resolution, database CRP update, database
consolidation…) was finished.
Modules: CM, AS, WF, QM
[S] started successfully.
This info message appears when the indicated action
event5010 (Module, URL resolution, Disk cache, database 1.3.6.1.4.1.30738.0.0.0.5010
update…) started successfully
Modules: PM, CT, CM, AS, WF, QM, RA, RM
[S] was killed.
This info message appears to inform that the process
event5011 1.3.6.1.4.1.30738.0.0.0.5011
indicated was killed
Modules: PM
[S] was stopped
This info message appears when the module is
event5012 1.3.6.1.4.1.30738.0.0.0.5012
stopped. After that, the module exists.
Modules: AS, WF, QM, RM, WS
Connection to [S] server [S] established
This info message appears when the module has
event5013 1.3.6.1.4.1.30738.0.0.0.5013
established connection with the server indicated
Modules: CT, QM
Connection to [S] server [S] finished
This info message appears when the module loses the
event5014 1.3.6.1.4.1.30738.0.0.0.5014
connection with the server indicated
Modules: CT, QM, RM
Connection to [S] server [S] restored
event5015 1.3.6.1.4.1.30738.0.0.0.5015
This info message appears when the module was able
2-100
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
to restore a connection with the server indicated
Modules: CM, AS, WF, QM, RM
2-101
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
2-102
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Process [S] has to wait for other processes to be
event5039 started. 1.3.6.1.4.1.30738.0.0.0.5039
Deprecated
Process [S] suspended
This info message appears when CT cannot connect
event5040 1.3.6.1.4.1.30738.0.0.0.5040
with the filter to send the traffic (ping action fails).
Modules: CT
Process [S] resumed
This info message appears when CT reconnect with
event5041 1.3.6.1.4.1.30738.0.0.0.5041
the filter to send the traffic (ping action fails).
Modules: CT
Process suspension for more than 8 minutes detected
event5042 for [S] 1.3.6.1.4.1.30738.0.0.0.5042
Deprecated
2-103
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
[S] successfully updated.
This info message appears when it was updated the
event5052 1.3.6.1.4.1.30738.0.0.0.5052
AV in the module
Modules: CM, AS, WF
Couldnt download list: [S]
This info message appears when it was not possible to
event5053 1.3.6.1.4.1.30738.0.0.0.5053
download the list indicated in the message
Modules: CM, AS, WF
Possible
This info message appears when there could be an
event5054 1.3.6.1.4.1.30738.0.0.0.5054
integrity error in the list updated.
Modules: CM, AS
File [S] has been successfully downloaded.
This info message appears when the module has
event5055 1.3.6.1.4.1.30738.0.0.0.5055
downloaded the list indicated in the message
Modules: CM, AS, WF
Unblocking Request: [S]
This info message appears when the module receives
event5056 1.3.6.1.4.1.30738.0.0.0.5056
an unblocking request from the user.
Modules: CM
[S] removed from memory.
event5057 1.3.6.1.4.1.30738.0.0.0.5057
Deprecated
2-104
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
DNS lookup time avg=[S]us max=[S]us
This info message appears to inform about the
event5064 1.3.6.1.4.1.30738.0.0.0.5064
average and the maximum time of DNS lookup
Modules: CT
Key [S] is obsolete, use [S] instead.
event5065 1.3.6.1.4.1.30738.0.0.0.5065
Deprecated
There were lost [S] packet(s) at interface [S]
This info message appears to inform that there were
some packet loses in the indicated interface. This loses
event5066 1.3.6.1.4.1.30738.0.0.0.5066
could be due to High traffic volume (CCOTTA cannot
process the traffic)
Modules: CT
Before: [S]
This message appears to:
event5067 Indicate the accumulated activation 1.3.6.1.4.1.30738.0.0.0.5067
requestsAccumulated SMS requestsCompacting the
databaseBefore starting a processModules: CM
After: [S]
This message appears to:
event5068 Indicate the accumulated activation 1.3.6.1.4.1.30738.0.0.0.5068
requestsAccumulated SMS requestsCompacting the
databaseAfter finishing a processModules: LIB, CM
[N][P] Filtered
event5069 This message appears to indicate the port filtered 1.3.6.1.4.1.30738.0.0.0.5069
Modules: WF
Transaction not processed: [S]
This message appears to indicate that the transaction
event5070 1.3.6.1.4.1.30738.0.0.0.5070
indicated was not processed
Modules: CM, AS
Statistics dump: [S]
This message appears to present statistics about the
event5071 1.3.6.1.4.1.30738.0.0.0.5071
cps received, cps sent…
Modules: RA
[S] Antivirus initialized
event5072 1.3.6.1.4.1.30738.0.0.0.5072
Deprecated
2-105
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Cannot parse [S] response correctly.
Only for the Enterprise solution. This message appears
during the software update to indicate that it was not
event5075 1.3.6.1.4.1.30738.0.0.0.5075
possible to check the status of the installation update
when asking to the OSSInstaller
Modules: LIB, CM
File [S] has been requested by [S]
This message appears to indicate the file that was
event5076 1.3.6.1.4.1.30738.0.0.0.5076
requested by SOAP call
Modules: CM
[S] checked
Only for the Enterprise solution. This message appears
event5077 to indicate that there are no newer versions to 1.3.6.1.4.1.30738.0.0.0.5077
update.
Modules: CM
File [S] has not changed at [S] server. Download not
event5078 needed 1.3.6.1.4.1.30738.0.0.0.5078
Deprecated
AdditionalData-OCTO_NU_ADMINS = [S]
event5085 1.3.6.1.4.1.30738.0.0.0.5085
Deprecated
AdditionalData-NUM_OCURRENCIAS = [S]
event5086 1.3.6.1.4.1.30738.0.0.0.5086
Deprecated
AdditionalData-DIRECCION_CORREO_1 = [S]
event5087 1.3.6.1.4.1.30738.0.0.0.5087
Deprecated
2-106
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
AdditionalData-TIPO_CREACION = [S]
event5088 1.3.6.1.4.1.30738.0.0.0.5088
Deprecated
AdditionalData-USER_ID_COL = [S]
event5090 1.3.6.1.4.1.30738.0.0.0.5090
Deprecated
AdditionalData-OPERACIONES(0) = [S]
event5092 1.3.6.1.4.1.30738.0.0.0.5092
Deprecated
AdditionalData-OPERACIONES(1) = [S]
event5093 1.3.6.1.4.1.30738.0.0.0.5093
Deprecated
AdditionalData-Equipos(0) = [S]
event5094 1.3.6.1.4.1.30738.0.0.0.5094
Deprecated
AdditionalData-Equipos(1) = [S]
event5095 1.3.6.1.4.1.30738.0.0.0.5095
Deprecated
AdditionalData-Cantidades(0) = [N]
event5096 1.3.6.1.4.1.30738.0.0.0.5096
Deprecated
AdditionalData-Cantidades(1) = [N]
event5097 1.3.6.1.4.1.30738.0.0.0.5097
Deprecated
External Execute
event5100 1.3.6.1.4.1.30738.0.0.0.5100
Deprecated
2-107
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Communication
event5112 1.3.6.1.4.1.30738.0.0.0.5112
Deprecated
2-108
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
-Cumplimentation-
event5117 1.3.6.1.4.1.30738.0.0.0.5117
Deprecated
SendERROR
event5119 1.3.6.1.4.1.30738.0.0.0.5119
Deprecated
Communication
event5121 1.3.6.1.4.1.30738.0.0.0.5121
Deprecated
Provisioning finished
event5122 1.3.6.1.4.1.30738.0.0.0.5122
Deprecated
ITR: [S]
event5128 1.3.6.1.4.1.30738.0.0.0.5128
Deprecated
TemplateFile: [S]
event5131 1.3.6.1.4.1.30738.0.0.0.5131
Deprecated
2-109
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
HTTPCleanRequest = [S]
event5133 1.3.6.1.4.1.30738.0.0.0.5133
Deprecated
HTTPRequestAuth = [S]
event5134 1.3.6.1.4.1.30738.0.0.0.5134
Deprecated
SincronousService authenticated.
event5145 1.3.6.1.4.1.30738.0.0.0.5145
Deprecated
2-110
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
RequestData-NumeroOrden = [S]
event5147 1.3.6.1.4.1.30738.0.0.0.5147
Deprecated
RequestData-tipoJalon = [S]
event5148 1.3.6.1.4.1.30738.0.0.0.5148
Deprecated
RequestData-codInt1Uo = [S]
event5149 1.3.6.1.4.1.30738.0.0.0.5149
Deprecated
RequestData-codInt2Uo = [S]
event5150 1.3.6.1.4.1.30738.0.0.0.5150
Deprecated
RequestData-intCentro = [S]
event5151 1.3.6.1.4.1.30738.0.0.0.5151
Deprecated
RequestData-intLocalizacion = [S]
event5152 1.3.6.1.4.1.30738.0.0.0.5152
Deprecated
RequestData-secuenciaActuacion = [S]
event5153 1.3.6.1.4.1.30738.0.0.0.5153
Deprecated
RequestData-versionActuacion = [S]
event5154 1.3.6.1.4.1.30738.0.0.0.5154
Deprecated
RequestData-unidadOperativa = [S]
event5155 1.3.6.1.4.1.30738.0.0.0.5155
Deprecated
RequestData-grupoOperativo = [S]
event5156 1.3.6.1.4.1.30738.0.0.0.5156
Deprecated
2-111
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Report event: [S]
Only for BGP deployment mode. This message appears
to indicate info about the status of BGP:
event5161 1.3.6.1.4.1.30738.0.0.0.5161
BGP WF communication is establishedBGP Default GW
is reachableDefault GW reachability has been
lostModules: CT
Unclear case, surely due to previous crash, or shortage
event5162 of electricity : [S][S]. Can cope with it. 1.3.6.1.4.1.30738.0.0.0.5162
Deprecated
[S] alive
event5163 1.3.6.1.4.1.30738.0.0.0.5163
Deprecated
[S]
This message appears to indicate that there were
event5165 errors writing a packet. Indicates the interfaces and 1.3.6.1.4.1.30738.0.0.0.5165
the maximum packet size
Modules: CT
Accumulation dumped to static database [S].
This message appears to indicate that the
event5166 accumulation calculated has been saved in the 1.3.6.1.4.1.30738.0.0.0.5166
database
Modules: RM
Database [S] consolidated into [S].
This message appears to indicate the database that
event5167 1.3.6.1.4.1.30738.0.0.0.5167
was consolidated and the destination path
Modules: RM
Removed old database [S].
This message appears to indicate the database that
event5168 1.3.6.1.4.1.30738.0.0.0.5168
has been removed
Modules: RM
Removed temporal database [S].
This message appears to indicate that it was remove a
event5169 1.3.6.1.4.1.30738.0.0.0.5169
temporal database
Modules: RM
Temporal database [S] is not corrupted, moving to its
final destination and removing old fragments.
This message appears to indicate after a fall of the
event5170 module, that the temporal database used before the 1.3.6.1.4.1.30738.0.0.0.5170
fall is OK so that the Reporter process it to a final
destination
Modules: RM
Database fragment [S] removed.
event5171 This message appears to indicate after a fall of the 1.3.6.1.4.1.30738.0.0.0.5171
module that the fragments detected could not be
2-112
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
used so they are removed
Modules: RM
2-113
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Enlisting [S] to be accumulated over [S].
This message appears to indicate that the indicated
event5183 1.3.6.1.4.1.30738.0.0.0.5183
database was enlisted to be accumulated
Modules: RM
Database [S] moved to [S].
This message appears to indicate that the database
event5184 1.3.6.1.4.1.30738.0.0.0.5184
indicated was moved to another path
Modules: RM
Starting migration
This message appears to indicate that the reported
event5185 1.3.6.1.4.1.30738.0.0.0.5185
has started a new migration
Modules: RM
Migration completed
This message appears to indicate that the migration
event5186 1.3.6.1.4.1.30738.0.0.0.5186
was completed
Modules: RM
Migrating databases
This message appears to indicate that the reporter is
event5187 1.3.6.1.4.1.30738.0.0.0.5187
migrating all the databases
Modules: RM
Migrating database [S]
This message appears to indicate the database that
event5188 1.3.6.1.4.1.30738.0.0.0.5188
the reporter is migrating
Modules: RM
Migrating programmed report instances
This message appears to indicate it is migrating
event5189 1.3.6.1.4.1.30738.0.0.0.5189
programmed report to the current version
Modules: RM
Migrating programmed report instance [S]
This message appears to indicate the programmed
event5190 1.3.6.1.4.1.30738.0.0.0.5190
report that is currently migrating
Modules: RM
Migrating file [S].
This message appears to indicate the file that the
event5191 1.3.6.1.4.1.30738.0.0.0.5191
reporter is currently migrating
Modules: RM
Migrating detail [S] (copy).
This message appears to indicate the detail file that is
event5192 1.3.6.1.4.1.30738.0.0.0.5192
migrating to another copy
Modules: RM
Migrating detail [S] (move).
This message appears to indicate the detail file that is
event5193 1.3.6.1.4.1.30738.0.0.0.5193
migrating to another path
Modules: RM
Scripting engine message [S] received executing script
[S] from configuration file [S].
event5194 1.3.6.1.4.1.30738.0.0.0.5194
This message appears to indicate that the scripting
engine is running a script from the indicated
2-114
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
configuration file
Modules: RM, WS
Upgrading databases.
event5206 1.3.6.1.4.1.30738.0.0.0.5206
This message appears to indicate the databases are
2-115
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
being upgraded during the upgrade process.
Modules: RM
Update finished.
event5214 1.3.6.1.4.1.30738.0.0.0.5214
Deprecated
2-116
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
optimized it
Module: CT
2-117
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
[S] Antivirus engine successfully updated. Bases UTC
date is [S]
event5228 This message appears when the module could update 1.3.6.1.4.1.30738.0.0.0.5228
the AntiVirus bases successfully
Module: WF, CM
TCP Connections over the limit ([N])
The TCP connections have reach the top limit. This is
event5229 just informative. CCOTTA is not going to drop traffic. 1.3.6.1.4.1.30738.0.0.0.5229
The default configuration is the following:
Traps{ TCPConnectionsLive { Limit = 10000 Interval = 5
TCP Connections under the limit ([N])
TCP connections are now under the limit and CCOTTA
event5230 1.3.6.1.4.1.30738.0.0.0.5230
are accepting all the connections.
Module: CT
HTTP Parser pool empty, [N] used
The pool size is full and the parser cannot accept more
traffic. It is not going to filter that traffic. Please,
event5231 1.3.6.1.4.1.30738.0.0.0.5231
review the key: PoolSize at CCOTTA.conf –Antitrap:
5232
Module: CT
HTTP Parser pool recovered, [N] used
The pool size has been recovered and it’s down the
event5232 1.3.6.1.4.1.30738.0.0.0.5232
limit.
Module: CT
[N][P] Filtered by cpu[N]
Replaces to 5217 message. This message appears if
the CPU usage is over the limit. In that case, CCOTTA
event5233 1.3.6.1.4.1.30738.0.0.0.5233
will bypass the traffic to prevent from packet loses.
Antitrap: 5234
Module: CT
No packets lost at interface [S]
event5234 CCOTTA has recovered from the CPU usage. 1.3.6.1.4.1.30738.0.0.0.5234
Module: CT
HTTPS Parser pool empty, [N] used
This message appears in case CT has used completely
event5235 1.3.6.1.4.1.30738.0.0.0.5235
the pool for HTTPS and no more is available
Antitrap: 5235Module: CT
HTTPS Parser pool recovered, [N] used
This message appears in case CT recovers the pool for
event5236 1.3.6.1.4.1.30738.0.0.0.5236
HTTPS (is under the maximum)
Module: CT
FTP Parser pool empty, [N] used
This message appears in case CT has used completely
event5237 1.3.6.1.4.1.30738.0.0.0.5237
the pool for FTP and no more is available
Antitrap: 5238Module: CT
FTP Parser pool recovered, [N] used
event5238 1.3.6.1.4.1.30738.0.0.0.5238
This message appears in case CT recovers the pool for
2-118
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
FTP (is under the maximum)
Module: CT
2-119
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
Related messages: 2088, 4656, 5246, 5248,
5249Modules: WF
2-120
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
[S] compression terminated
This message appears when log file compression has
event5258 1.3.6.1.4.1.30738.0.0.0.5258
terminated.
Related messages: 5257Modules: RM
User [S] is encrypting the database
This message is logged by RM5 when encrypting the
event5259 1.3.6.1.4.1.30738.0.0.0.5259
database.
Modules: RM
Starting export
This message is logged by RM5 when commencing the
event5260 1.3.6.1.4.1.30738.0.0.0.5260
export of client data.
Related messages: 5261, 5262Modules: RM
Export completed
This message is logged by RM5 when the module has
event5261 1.3.6.1.4.1.30738.0.0.0.5261
finished exporting the data.
Related messages: 5261, 5262Modules: RM
Database [S] successfully exported
This message is logged by RM5 when the module has
event5262 1.3.6.1.4.1.30738.0.0.0.5262
finished exporting the database.
Related messages: 5260, 5261Modules: RM
2-121
SNMP Traps
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
SMS code [S] not accepted for client [S] . Reason: [S]
event7017 1.3.6.1.4.1.30738.0.0.0.7017
AMFId received [S] does not match with the one for
event7018 [S] 1.3.6.1.4.1.30738.0.0.0.7018
2-122
SNMP Traps
2.2.7.5 Debug
These debugging traps are from versions 1 and 2 of the NetworkSecure MIB.
NAME DESCRIPTION OID (NETWORKSECURE MIB V2 / V1)
OWS
event10001 1.3.6.1.4.1.30738.0.0.0.10001
Not implemented yet
Processing file [S]
This message appears when processing a file for
event10002 1.3.6.1.4.1.30738.0.0.0.10002
erasure or retrieving data from a subscriber by RM5.
Related messages: 5254, 5255Module: RM
2-123
SNMP Traps
• DDoS Secure (from 15.1 onwards)
2-124
Health Monitoring
3 Health Monitoring
Health monitoring metrics used to reflect the health of key elements of Allot
network equipment (e.g: Service Gateway) and their component parts (e.g: SFB
blades).
The Service Provider or Carrier can poll Allot Network Elements to monitor the
health status of different parameters including the following:
• Temperature
• Fans
• Power Supply
• CPU
• Memory usage
• Disk usage
• Hardware Status
• Software Status
3-1
Health Monitoring
SLOT SG-TERA BLADE SG-SIGMA E14 SG-SIGMA E6 SG-SIGMA
BLADE BLADE BLADE
5 CC-400 CC-300 CC-300
6 SFB-400 / SFB-420 SFB-300 FB-200
7 SFB-400 / SFB-420 SFB-300 SFC-200
8 SFB-400 / SFB-420 SFB-300 SFC-200
9 SFB-400 / SFB-420 SFB-300 FB-200
10 CC-400 CC-300 CC-220*
11 CC-400 CC-300
12 CC-400 CC-300 CC-220*
13 CC-400 CC-300
14 CC-400 CC-300 BP-204
For a full description of which KPIs can be polled on which blades, see the
reference table in the Appendix.
3.1.1 Temperature
This KPI measures the temperature in key sensors on different blades on the
Service Gateway and NetEnforcer.
Note: For the SG-9x00 family, the temperature cannot be polled via the Allot-MIB
file. You can access this information directly from the iLO interface (SG-9700,
9500 and 9008) under System Information – Temperature Information or from
the TSM (SG-9100 v1) or XCC/BMC (SG-9100 v2) interfaces as shown below.
3-2
Health Monitoring
• Middle (2): If temperature of at least one sensor on this blade is between
the non-critical and the critical threshold
• High (3): If the temperature of at least one sensor on this blade is between
the critical and non-recoverable threshold
3-3
Health Monitoring
Host PRC (010) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1010
Target PRC (011) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1011
SGSV-110 (SG- SBC Temp 1 (048) 1.3.6.1.4.1.2603.5.5.18.1.3.1.1048
Sigma) SBC Temp 2 (049) 1.3.6.1.4.1.2603.5.5.18.1.3.1.1049
SBC Temp 3 (050) 1.3.6.1.4.1.2603.5.5.18.1.3.1.1050
CPU 1 Temp (146) 1.3.6.1.4.1.2603.5.5.18.1.3.1.1046
SFC-200 (SG- Power Module (007) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1007
Sigma) CNODE Ambient (008) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1008
CNODE Airflow (009) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1009
440 Ambient (010) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1010
440 Core (011) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1011
Base Ambient (013) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1013
Base Core (014) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1014
Fabric Ambient (015) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1015
Fabric Core (016) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1016
FB-200 (SG- Pwr Module (007) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1007
Sigma) CNODE Ambient (008) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1008
XLR0 Ambient (010) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1010
XLR0 Core (011) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1011
XLR1 Ambient (014) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1014
XLR1 Core (015) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1015
FM3112 Ambient (017) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1017
FM3112 Core (018) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1018
BP-204 (SG- Bypass Sensor (007) 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1007
Sigma or SG-
Sigma E)
AC-6000 XLR1-AMB 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1001
XLR1 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1002
XLR2-AMB 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1003
XLR2 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1004
XLS-AMB 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1005
XLS 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1006
FM3224-AMB 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1007
FM3224 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.1008
AC-1400, 3000 Temperature (A) 1.3.6.1.4.1.2603.5.5.18.1.3.1.1001
or 500 Temperature (B) 1.3.6.1.4.1.2603.5.5.18.1.3.1.1002
3-4
Health Monitoring
Output Meaning Recommended Action
1 Low No Action is necessary
2 Middle • Monitor the sensor temperature for an extended period of time (e.g:
sampling every 15mins for 2-3 hours) to see if the threshold breach is
repeated
• If threshold breach is constant, check if any change has been made to
the physical operating environment of the in-line platform
3 High • Monitor the sensor temperature for an extended period of time (e.g:
sampling every 5mins for 1 hour) to see if the threshold breach is
repeated
• If threshold breach is constant, check if any change has been made to
the physical operating environment of the in-line platform
• If the breach is constant and no operating environment change can be
found, contact [email protected]
3.1.1.4 Temperature Indication via iLO Interface (SG-9700, SG-9500, SG-9008 Only)
For the SG-9700, 9500 and 9008 products an overview of system status (including temperature)
can be viewed under System Information in the Summary tab. A detailed view of the
temperatures of each sensor on the Service Gateway can be accessed from the Temperatures
tab as shown in the example below.
3-5
Health Monitoring
A similar procedure exists for accessing the XCC/BMC interface for SG-9100 v2 or the TSM
interface for SG-9100 v1. Refer to the SG-9100 Hardware Guide for more details.
3.1.2 Fans
The status of each of the fan trays in the chassis can be polled as shown in the table
below. For example, the 14 slot SG-Tera contains 2 fan trays - upper and lower (ID 1
and 2). The SG-Sigma and SG-Sigma E14 chassis both contain 3 front pluggable fan
trays (ID 1, 2 and 3). Each fan tray can be polled separately.
Note: For the SG-9x00 family, the fan-tray status cannot be polled via the Allot-MIB
file. You can access this information directly from the iLO interface (SG-9700,
9500 and 9008) under System Information – Fans or from the TSM (SG-9100
v1) or XCC/BMC (SG-9100 v2) interfaces as shown above.
.
PRODUCT FAN ID OID TO POLL
SG-Tera 001 1.3.6.1.4.1.2603.5.5.18.1.3.0.2001
002 1.3.6.1.4.1.2603.5.5.18.1.3.0.2002
SG-Sigma or SG-Sigma E14 001 1.3.6.1.4.1.2603.5.5.18.1.3.0.2001
002 1.3.6.1.4.1.2603.5.5.18.1.3.0.2002
003 1.3.6.1.4.1.2603.5.5.18.1.3.0.2003
SG-Sigma E6 001 1.3.6.1.4.1.2603.5.5.18.1.3.0.2001
002 1.3.6.1.4.1.2603.5.5.18.1.3.0.2002
NetEnforcer 001 1.3.6.1.4.1.2603.5.5.18.1.3.0.2001
002 1.3.6.1.4.1.2603.5.5.18.1.3.0.2002
003 1.3.6.1.4.1.2603.5.5.18.1.3.0.2003
004 1.3.6.1.4.1.2603.5.5.18.1.3.0.2004
3-6
Health Monitoring
RAG VALUE FAN SPEED RECOMMENDED ACTION
Green 2 None. Fans are working normally
Amber N/A N/A
Red 3 • Check the display module on the SG chassis fan tray
(See Service Gateway Hardware Guide).
• If the red Fan Tray alarm LED is lit, open a support
incident with [email protected]
3.1.2.3 Fans Indication via iLO Interface (SG-9700, 9500 and 9008 Only)
For the SG-9700, 9500 and 9008 an overview of system status (including fans) can
be viewed under System Information in the Summary tab. A detailed view of the
status and speed of each one of the fans on the Service Gateway can be accessed
from the Fans tab as shown in the example below.
3-7
Health Monitoring
PRODUCT PEM ID OID TO POLL
SG-Tera, 001 1.3.6.1.4.1.2603.5.5.18.1.3.0.3001
SG-Sigma E14
002 1.3.6.1.4.1.2603.5.5.18.1.3.0.3002
or SG-Sigma
SG-Sigma E6 001 1.3.6.1.4.1.2603.5.5.18.1.3.0.3001
002 1.3.6.1.4.1.2603.5.5.18.1.3.0.3002
003 1.3.6.1.4.1.2603.5.5.18.1.3.0.3003
004 1.3.6.1.4.1.2603.5.5.18.1.3.0.3004
005 1.3.6.1.4.1.2603.5.5.18.1.3.0.3005
006 1.3.6.1.4.1.2603.5.5.18.1.3.0.3006
NetEnforcer 001 1.3.6.1.4.1.2603.5.5.18.1.3.0.3001
002 1.3.6.1.4.1.2603.5.5.18.1.3.0.3002
3-8
Health Monitoring
3.1.3.3 Power Supply Indication via iLO Interface (SG-9700, 9500 and 9008 Only)
For the SG-9700, 9500 and 9008, an overview of system status (including power)
can be viewed under System Information in the Summary tab. A detailed view of
the status of the power supplies on these platforms can be accessed from the
Power tab as shown in the example below.
3-9
Health Monitoring
3.1.4 CPU (All SG Platforms)
This KPI measures the load on the system (including, but not limited to CPU usage).
You can use it on all SG platforms, both Intel-based and non-Intel based.
3-10
Health Monitoring
3.1.5 CPU (Intel-Based Platforms)
You can use the HOST-RESOURCES MIB to poll Intel-based SG platforms for CPU
usage of each of the server cores.
3-11
Health Monitoring
Red 95 – 100% • Monitor the CPU average usage output over an extended
period of time (e.g: sampling every 15mins for 2-3 hours)
to see if the value returns to the normal range
• If CPU usage is over 95% for over 50% of the time open a
support incident with [email protected]
3-12
Health Monitoring
3.1.7 Memory (Non-Intel Based Platforms)
This KPI measures the RAM used on the various Service Gateway blades or on the
NetEnforcer. It can be polled on the following:
• SG-Tera: SFB-400, SFB-420 and CC-400
• SG-Sigma E: SFB-300 and CC-300
• SG-Sigma: SGSV-110 and CC-220
• Entire Device: NetEnforcer or Service Gateway
3-13
Health Monitoring
3.1.7.4 Memory Status Indication via iLO Interface (SG-9700, 9500 and 9008 Only)
For the SG-9700, 9500 and 9008 an overview of system status (including Memory
Status) can be viewed under System Information in the Summary tab. A detailed
view of the status of the memory status on these platforms can be accessed from
the Memory tab as shown in the example below.
3-14
Health Monitoring
3-15
Health Monitoring
These parameters are as follows:
• memTotalSwap: The total amount of swap space configured for this host.
• memAvailSwap: The amount of swap space currently unused or available.
• memTotalReal: The total amount of real/physical memory installed.
• memAvailReal: The amount of real/physical memory currently unused or
available.
• memTotalFree: The total amount of memory free or available for use on
this host. This value typically covers both real memory and swap space or
virtual memory.
• memMinimumSwap: The minimum amount of swap space expected to be
kept free or available during normal operation of this host. If this value (as
reported by 'memAvailSwap(4)') falls below the specified level, then
'memSwapError(100)' will be set to 1 and an error message made available
via 'memSwapErrorMsg(101)'.
• memShared: The total amount of real or virtual memory currently
allocated for use as shared memory. This object will not be implemented
on hosts where the underlying operating system does not explicitly identify
memory as specifically reserved for this purpose.
• memBuffer: The total amount of real or virtual memory currently allocated
for use as memory buffers. This object will not be implemented on hosts
where the underlying operating system does not explicitly identify memory
as specifically reserved for this purpose.
• memCached: The total amount of real or virtual memory currently
allocated for use as cached memory. This object will not be implemented
on hosts where the underlying operating system does not explicitly identify
memory as specifically reserved for this purpose.
• memSwapError: Indicates whether the amount of available swap space (as
reported by 'memAvailSwap(4)'), is less than the desired minimum
(specified by 'memMinimumSwap(12)').
• memSwapErrorMsg: Describes whether the amount of available swap
space (as reported by 'memAvailSwap(4)'), is less than the desired
minimum (specified by 'memMinimumSwap(12)').
3-16
Health Monitoring
3.1.9 Storage (Non-Intel Based Platforms)
This KPI measures the disk storage space used on the various Service Gateway
blades or on the NetEnforcer. It can be polled on the following:
• SG-Tera: SFB-400, SFB-420 and CC-400
• SG-Sigma E: SFB-300 and CC-300
• SG-Sigma: SGSV-110 and CC-220
• Entire Device: NetEnforcer or Service Gateway
On the SG-Tera there are two internal processors (XLPs) with separate OIDs to poll
for memory usage per blade:
XLP1: 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.6001
XLP2: 1.3.6.1.4.1.2603.5.5.18.1.3.Slot.6002
Note: On the SFB-400 you will expect to see results for both sensors 6001 and 6002.
However on the SFB-420 blades, where only a single CPU is present, you
should expect to see results on sensor 6001 only.
3-17
Health Monitoring
• Open a support incident with [email protected] attaching
the output of the df command.
3-18
Health Monitoring
3.1.10.4 Storage Indication via iLO Interface (SG-9700, 9500 and 9008 Only)
For the SG-9700, 9500 and 9008, an overview of system status (including Storage)
can be viewed under System Information in the Summary tab. A detailed view of
the status of the storage status on these platforms can be accessed from the
Storage tab as shown in the example below.
3-19
Health Monitoring
3-20
Health Monitoring
3.1.11 Software Status
This KPI shows the status of the software on each of the boards of the Service
Gateway or on the NetEnforcer as a whole
3-21
Health Monitoring
3.1.12 Hardware Status
This KPI shows the status of the hardware on each of the boards of the Service
Gateway or on the NetEnforcer as a whole.
3-22
Health Monitoring
• Storage Parameters (1.3.6.1.2.1.25.2). This contains information about the
storage.
• Device Parameters (1.3.6.1.2.1.25.3). This contains information about the
devices including processor table and disk storage table.
Note: Polling for memory usage is not relevant to the operation of the NetXplorer
Server. From NX10.2.1: The NX automatically allocates memory according to
the system capabilities
3.2.1 CPU
You can use the HOST-RESOURCES MIB to poll the management platform for CPU
usage of each of the server cores.
3-23
Health Monitoring
RAG VALUE AVERAGE RECOMMENDED ACTION
CPU USAGE
Green 0-90% Normal functioning. No action necessary
Amber 90 - 95% • Monitor the CPU average usage output over an extended
period of time (e.g: sampling every 15mins for 2-3 hours)
to see if the value returns to the normal range
Red 95 – 100% • Monitor the CPU average usage output over an extended
period of time (e.g: sampling every 15mins for 2-3 hours)
to see if the value returns to the normal range
• If CPU usage is over 95% for over 50% of the time open a
support incident with [email protected]
3.2.2 Memory
You can use the UCD-SNMP-MIB MIB to poll the management platform for a
number of used memory parameters.
3-24
Health Monitoring
• memTotalFree: The total amount of memory free or available for use on
this host. This value typically covers both real memory and swap space or
virtual memory.
• memMinimumSwap: The minimum amount of swap space expected to be
kept free or available during normal operation of this host. If this value (as
reported by 'memAvailSwap(4)') falls below the specified level, then
'memSwapError(100)' will be set to 1 and an error message made available
via 'memSwapErrorMsg(101)'.
• memShared: The total amount of real or virtual memory currently
allocated for use as shared memory. This object will not be implemented
on hosts where the underlying operating system does not explicitly identify
memory as specifically reserved for this purpose.
• memBuffer: The total amount of real or virtual memory currently allocated
for use as memory buffers. This object will not be implemented on hosts
where the underlying operating system does not explicitly identify memory
as specifically reserved for this purpose.
• memCached: The total amount of real or virtual memory currently
allocated for use as cached memory. This object will not be implemented
on hosts where the underlying operating system does not explicitly identify
memory as specifically reserved for this purpose.
• memSwapError: Indicates whether the amount of available swap space (as
reported by 'memAvailSwap(4)'), is less than the desired minimum
(specified by 'memMinimumSwap(12)').
• memSwapErrorMsg: Describes whether the amount of available swap
space (as reported by 'memAvailSwap(4)'), is less than the desired
minimum (specified by 'memMinimumSwap(12)').
3.2.3 Storage
You can use the HOST-RESOURCES MIB to poll the management platform for
available disk space in the disk relevant disk partitions:
• /
• /opt
• /sybase/data
3-25
Health Monitoring
3.2.3.1 OIDs to Poll
The OID to poll from the HOST-RESOURCES MIB is: hrStorageEntry:
1.3.6.1.2.1.25.2.3.1.1
Specifically, you can extract a table based on the following entries:
NAME DESCRIPTION OID
hrStorageDescr Describes the type and instance of each storage. 1.3.6.1.2.1.25.2.3.1.3
You should look here for the indexes for the 3
relevant partitions (/, /opt and /sybase/data)
hrStorageSize Shows the size of the storage for each of the 1.3.6.1.2.1.25.2.3.1.5
relevant partitions
hrStorageUsed Shows the amount of storage used for each of the 1.3.6.1.2.1.25.2.3.1.6
relevant partitions
3-26
Health Monitoring
3.3 NetworkSecure
In NetworkSecure, you can monitor the health of a server and of a module on a
server.
To define the thresholds on which the status polls are based, see Defining
NetworkSecure Performance Thresholds.
Where:
⧫ [MODULE TYPE] indicates the type of the module on that you want to
poll on the NetworkSecure server, for example, CCOTTA.
⧫ [MODULE NAME] indicates the name of the module that you want to
poll on the NetworkSecure server.
The following is returned:
3-27
Health Monitoring
[USED] Generated sub-OID for module instance string [[MODULE
TYPE][MODULE NAME]| [MODULE TYPE]]: [MODULE NAME SUB-OID]
Where [DEVICE] indicates the name of the device or partition that you
want to poll, for example devsda2 or devsda3
The following is returned:
[USED] Generated sub-OID for module instance string [[DEVICE]]: [DEVICE
SUB-OID]
Where [INTERFACE] indicates the name of the interface that you want to
poll, for example eth0 or eth1
The following is returned:
[USED] Generated sub-OID for module instance string [[INTERFACE]]:
[INTERFACE SUB-OID]
3-28
Health Monitoring
3.3.2 CPU Indicator
You can poll the CPU monitors for a server or a single module.
• CPU status:
⧫ MIB1: PP[SERVER]MEMSttValue
⧫ MIB2: pp[SERVER]CPUSttValue
⧫ OID: 1.3.6.1.4.1.30738.12.[SERVER SUB-OID].10.4.1
If the status is between the configured minimum and maximum levels, then
the response is OK. Otherwise, the status is an error.
Example for NetworkSecure MIB V2:
snmpget -v2c -c allotcomm localhost OPTENETv2-MIB:: PPOSS1CPUSttValue
OPTENETv2-MIB::ppOSS1CPUSttValue = STRING: OK
• CPU status:
⧫ MIB1: PP[MODULE TYPE][MODULE NAME]CPUSttValue
⧫ MIB2: pp[MODULE TYPE][MODULE NAME]CPUSttValue
⧫ OID: 1.3.6.1.4.1.30738.12.[MODULE TYPE SUB-OID].[MODULE NAME
SUB-OID].10.4.1
If the status is between the configured minimum and maximum levels, then
the response is OK. Otherwise, the status is an error.
Example for NetworkSecure MIB V2:
snmpget -v2c -c allotcomm localhost OPTENETv2-
MIB::ppWebFilterWF1CPUSttValue
OPTENETv2-MIB::ppWebFilterWF1CPUSttValue = STRING: OK
3-30
Health Monitoring
OPTENETv2-MIB::ppOSS1MEMCurValue = STRING: 150.94
• Memory status:
⧫ MIB1: PP[SERVER]MEMSttValue
⧫ MIB2: pp[SERVER]MEMSttValue
⧫ OID: 1.3.6.1.4.1.30738.12.[SERVER SUB-OID].12.4.1
If the status is between the configured minimum and maximum levels, then
the response is OK. Otherwise, the status is an error.
Example for NetworkSecure MIB V2:
snmpget -v2c -c allotcomm localhost OPTENETv2-MIB:ppOSS1MEMSttValue
OPTENETv2-MIB::ppOSS1MEMSttValue = STRING: OK
• Memory status:
⧫ MIB1: PP[MODULE TYPE][MODULE NAME]MEMSttValue
⧫ MIB2: pp[MODULE TYPE][MODULE NAME]MEMSttValue
⧫ OID: 1.3.6.1.4.1.30738.12.[MODULE TYPE SUB-OID].[MODULE NAME
SUB-OID].12.4.1
If the status is between the configured minimum and maximum levels, then
the response is OK. Otherwise, the status is an error.
3-31
Health Monitoring
Example for NetworkSecure MIB V2:
snmpget -v2c -c allotcomm localhost OPTENETv2-
MIB::ppWebFilterWF1MEMSttValue
OPTENETv2-MIB::ppWebFilterWF1MEMSttValue = STRING: OK
3-32
Health Monitoring
• [SERVER] indicates the name of the server in the NetworkSecure solution,
for example OSS1 or OSS2.
• [INTERFACE] indicates the network interface, for example eth0 or eth1.
NOTE: Remove special characters such as hyphens, if any, from the names of the
server and the interface.
You can poll the module for the following network usage health monitors:
• Number of Rx errors:
⧫ Rx for MIBv1: PP[SERVER][INTERFACE]RxCurValue
⧫ Rx for MIBv2: pp[SERVER][INTERFACE]RxCurValue
⧫ OID: 1.3.6.1.4.1.30738.12.[SERVER SUB-OID].[INTERFACE SUB-
OID].38722.1.1
• Number of Tx errors:
⧫ Tx for MIBv1: PP[SERVER][INTERFACE]TxCurValue
⧫ Tx for MIBv2: pp[SERVER][INTERFACE]TxCurValue
⧫ OID: 1.3.6.1.4.1.30738.12.[SERVER SUB-OID].[INTERFACE SUB-
OID].15844.1.1
Tx example for NetworkSecure MIB V2:
snmpget -v2c -c allotcomm localhost OPTENETv2-MIB::ppOSS1eth0TxCurValue
OPTENETv2-MIB::ppOSS1eth0TxCurValue = STRING: 0
3-33
Health Monitoring
3.3.6 Module Internal and External Interface Usage
This section describes polling a module’s internal interface (interface 0) and
external interface (interface 1) health monitors. These polls return absolute values
that update every 20 seconds.
In the following:
• [MODULE TYPE] indicates the type of the module on that you want to poll
on the NetworkSecure server, for example, CCOTTA.
• [MODULE NAME] indicates the name of the module that you want to poll
on the NetworkSecure server.
NOTE: Remove special characters such as hyphens, if any, from the name of the
module.
You can poll the module for the following interface health monitors (MIBv2):
• Internal interface polls:
⧫ RxBytes: moduleCounterValue.\" [MODULE TYPE]:[MODULE
NAME]\".\" KPI_IFACE_INTERFACE0_BYTES_RX\"
⧫ RxPackets: moduleCounterValue.\" [MODULE TYPE]:[MODULE
NAME]\".\" KPI_IFACE_INTERFACE0_PACKETS_RX\"
⧫ TxBytes: moduleCounterValue.\" [MODULE TYPE]:[MODULE
NAME]\".\" KPI_IFACE_INTERFACE0_BYTES_TX\"
⧫ TxPackets: moduleCounterValue.\" [MODULE TYPE]:[MODULE
NAME]\".\" KPI_IFACE_INTERFACE0_PACKETS_TX\"
⧫ Interface 0 lost packets: moduleCounterValue.\" [MODULE
TYPE]:[MODULE NAME]\".\" KPI_IFACE_INTERFACE0_LOST\"
Examples of internal Rx polls:
snmpget -v2c -c allot 127.0.0.1 OPTENETv2-
MIB::moduleCounterValue.\"CCOTTA:CT1\".\"KPI_IFACE_INTERFACE0_BYTES_RX\
"
OPTENETv2-
MIB::moduleCounterValue."CCOTTA:CT1"."KPI_IFACE_INTERFACE0_BYTES_RX" =
STRING: 704
3-34
Health Monitoring
⧫ RxPackets: moduleCounterValue.\" [MODULE TYPE]:[MODULE
NAME]\".\" KPI_IFACE_INTERFACE1_PACKETS_RX\"
⧫ TxBytes: moduleCounterValue.\" [MODULE TYPE]:[MODULE
NAME]\".\" KPI_IFACE_INTERFACE1_BYTES_TX\"
⧫ TxPackets: moduleCounterValue.\" [MODULE TYPE]:[MODULE
NAME]\".\" KPI_IFACE_INTERFACE1_PACKETS_TX\"
⧫ Interface 1 lost packets: moduleCounterValue.\" [MODULE
TYPE]:[MODULE NAME]\".\" KPI_IFACE_INTERFACE1_LOST\"
3-35
Key Performance Indicators
4-1
Key Performance Indicators
4.1.1.2 Throughput Per Blade
On multi-blade platforms, throughput can also be measured on each individual
blade. The slot number needs to be inserted in the OID as per the table below.
NAME DESCRIPTION OID
alUsStatValue Received throughput 1.3.6.1.4.1.2603.5.4.9.1.5.Slot.1.1000.3
(pre-QoS) in pps
alUsStatValue Received throughput 1.3.6.1.4.1.2603.5.4.9.1.5.Slot.1.1000.4
(pre-QoS) in Bps
NOTE: If the sole purpose of the TCA created is to activate statistic collection for
external polling, the NetXplorer administrator may wish to define
“unreasonably high” (or low) thresholds that will never be triggered. That way,
statistics for the line/pipe or VC will still be collected, but unnecessary alarms
will not be reported in the NetXplorer every time a TCA is breached.
4-2
Key Performance Indicators
alStatOctetsOut Ave outbound rate 1.3.6.1.4.1.2603.5.4.2.1.9.<line>.<pipe>.<vc>.48
(in 1024 bytes per
sec)
alStatOctetsTotal Ave total rate 1.3.6.1.4.1.2603.5.4.2.1.10.<line>.<pipe>.<vc>.48
(in/outbound in
1024 bytes per sec)
4-3
Key Performance Indicators
SFB SLOT SFB-PORT IFNAME INTERFACE
NUMBER
7 L4 SB_7_36 388
7 L5 SB_7_41 389
7 L6 SB_7_40 390
7 L7 SB_7_39 391
7 L8 SB_7_38 392
8 L1 SB_8_34 449
8 L2 SB_8_35 450
8 L3 SB_8_37 451
8 L4 SB_8_36 452
8 L5 SB_8_41 453
8 L6 SB_8_40 454
8 L7 SB_8_39 455
8 L8 SB_8_38 456
9 L1 SB_9_34 513
9 L2 SB_9_35 514
9 L3 SB_9_37 515
9 L4 SB_9_36 516
9 L5 SB_9_41 517
9 L6 SB_9_40 518
9 L7 SB_9_39 519
9 L8 SB_9_38 520
4-4
Key Performance Indicators
4.1.1.4.2 Polling Throughput Per Port Using Allot-MIB
The Allot-MIB.mib file includes several OIDs which can be polled to give system
level throuhgpu statistics for the Service Gateway. These statistics (which unlike
the policy related statistics, do not need to be activated) are summarized in the
table below.
In the example below, we wish to know the Tx packets per second on the L5
interface on the SFB in slot 7 of a Service Gateway. We first run an snmpwalk on
the alifxlabel OID to determine the label of the appropriate interface.
snmpwalk -v 2c -c v1v2Admin 10.4.41.200 1.3.6.1.4.1.2603.5.2.6.3.1.5
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.385 = STRING: "SB_7_L1"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.386 = STRING: "SB_7_L2"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.387 = STRING: "SB_7_L3"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.388 = STRING: "SB_7_L4"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.389 = STRING: "SB_7_L5"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.390 = STRING: "SB_7_L6"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.391 = STRING: "SB_7_L7"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.392 = STRING: "SB_7_L8"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.393 = STRING: "SB_7_C1.1"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.394 = STRING: "SB_7_C1.2"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.395 = STRING: "SB_7_C1.3"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.396 = STRING: "SB_7_C1.4"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.397 = STRING: "SB_7_C2.1"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.398 = STRING: "SB_7_C2.2"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.399 = STRING: "SB_7_C2.3"
4-5
Key Performance Indicators
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.400 = STRING: "SB_7_C2.4"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.401 = STRING: "SB_7_C3.1"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.402 = STRING: "SB_7_C3.2"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.403 = STRING: "SB_7_C3.3"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.404 = STRING: "SB_7_C3.4"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.960 = STRING: "LAG1"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.961 = STRING: "LAG2"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.962 = STRING: "LAG3"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.963 = STRING: "LAG4"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.964 = STRING: "LAG5"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.965 = STRING: "LAG6"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.966 = STRING: "LAG7"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.967 = STRING: "LAG8"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1056 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1057 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1058 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1059 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1060 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1061 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1062 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1063 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1064 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.1065 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.2559 = STRING: "MGMNT"
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.2560 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.2561 = ""
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.5.3000 = ""
From the output we see that the label for L5 on the SFB in slot 7 is 389. We can
now find the Packets Per Second on the Tx of this interface by running the
following:
[root@nx ~]# snmpwalk -v 2c -c v1v2Admin 10.4.41.200
1.3.6.1.4.1.2603.5.2.6.3.1.15.389
SNMPv2-SMI::enterprises.2603.5.2.6.3.1.15.389 = Counter64: 154219
We see that the Tx PPS on this interface is 154219 Packets per second.
4-6
Key Performance Indicators
4.1.1.4.3 Polling Throughput Per Port Using Standard MIBs
Throughput per port can also be measured using the standard IFMIB KPI.
Note: 32 bit traffic counters are presented in the standard ifTable (RFC1213-
MIB.interfaces.ifTable) 64 bit counters are presented in the standard ifXTable
(RFC1213-MIB.ifMib.ifMIBObjects.ifXTable).
The data will be received once every 5 seconds and the calculation is performed as
an average value for the last 5 seconds. The statistics MIBs which you can poll for
each interface are taken from the standard MIB - SMP MIB-2, (1.3.6.1.2.1).
The relevant OIDs from 1.3.6.1.2.1.31 (IfMIB) are shown in the table below:
NAME DESCRIPTION OID
ifHCInOctets Total number of bytes 1.3.6.1.2.1.31.1.1.1.6.<Interface
received on the interface Number>
including framing
characters
ifHCInUcastPkts Total number of unicast 1.3.6.1.2.1.31.1.1.1.7.<Interface
packets delivered Number>
ifHCInMulticastPkts Total number of packets 1.3.6.1.2.1.31.1.1.1.8.<Interface
delivered and addressed Number>
to a multicast address
ifHCInBroadcastPkts Total number of packets 1.3.6.1.2.1.31.1.1.1.9.<Interface
delivered and addressed Number>
to a broadcast address
ifHCOutOctets Total number of bytes 1.3.6.1.2.1.31.1.1.1.10.<Interface
transmitted out of the Number>
interface including framing
characters
ifHCOutUcastPkts Total number of unicast 1.3.6.1.2.1.31.1.1.1.11.<Interface
packets requested Number>
ifHCOutMulticastPkts Total number of packets 1.3.6.1.2.1.31.1.1.1.12.<Interface
requested and addressed Number>
to a multicast address
ifHCOutBroadcastPkts Total number of packets 1.3.6.1.2.1.31.1.1.1.13.<Interface
requested and addressed Number>
to a broadcast address
In addition, you may wish to poll the standard ifEntry OIDs of the ifTable, again a
part of the standard MIB-2 interfaces. The OID to poll is: 1.3.6.1.2.1.2.2.1. It
includes the following OIDs:
4-7
Key Performance Indicators
NAME DESCRIPTION OID
ifIndex A unique value for each interface. Its value 1.3.6.1.2.1.2.2.1.1
ranges between 1 and the value of ifNumber.
The value for each interface must remain
constant at least from one re-initialization of the
entity's network management system to the next
re-initialization.
ifDescr A textual string containing information about the 1.3.6.1.2.1.2.2.1.2
interface. This string should include the name of
the manufacturer, the product name and the
version of the hardware interface.
ifType The type of interface, distinguished according to 1.3.6.1.2.1.2.2.1.3
the physical/link protocol(s) immediately `below'
the network layer in the protocol stack.
ifMtu The size of the largest datagram which can be 1.3.6.1.2.1.2.2.1.4
sent/received on the interface, specified in
octets. For interfaces that are used for
transmitting network datagrams, this is the size
of the largest network datagram that can be sent
on the interface.
ifSpeed An estimate of the interface's current bandwidth 1.3.6.1.2.1.2.2.1.5
in bits per second. For interfaces which do not
vary in bandwidth or for those where no
accurate estimation can be made, this object
should contain the nominal bandwidth.
ifPhysAddress The interface's address at the protocol layer 1.3.6.1.2.1.2.2.1.6
immediately `below' the network layer in the
protocol stack. For interfaces which do not have
such an address (e.g., a serial line), this object
should contain an octet string of zero length.
ifAdminStatus The desired state of the interface. The testing(3) 1.3.6.1.2.1.2.2.1.7
state indicates that no operational packets can
be passed.
ifOperStatus The current operational state of the interface. 1.3.6.1.2.1.2.2.1.8
The testing(3) state indicates that no operational
packets can be passed.
ifLastChange The value of sysUpTime at the time the interface 1.3.6.1.2.1.2.2.1.9
entered its current operational state. If the
current state was entered prior to the last re-
initialization of the local network management
subsystem, then this object contains a zero
value.
ifInOctets The total number of octets received on the 1.3.6.1.2.1.2.2.1.10
interface, including framing characters.
ifInUcastPkts The number of subnetwork-unicast packets 1.3.6.1.2.1.2.2.1.11
delivered to a higher-layer protocol.
4-8
Key Performance Indicators
NAME DESCRIPTION OID
ifInNUcastPkts The number of non-unicast (i.e., subnetwork- 1.3.6.1.2.1.2.2.1.12
broadcast or subnetwork-multicast) packets
delivered to a higher-layer protocol.
ifInDiscards The number of inbound packets which were 1.3.6.1.2.1.2.2.1.13
chosen to be discarded even though no errors
had been detected to prevent their being
deliverable to a
higher-layer protocol. One possible reason for
discarding such a packet could be to free up
buffer space.
ifInErrors The number of inbound packets that contained 1.3.6.1.2.1.2.2.1.14
errors preventing them from being deliverable to
a higher-layer protocol.
ifInUnknownProtos The number of packets received via the interface 1.3.6.1.2.1.2.2.1.15
which were discarded because of an unknown or
unsupported protocol.
ifOutOctets The total number of octets transmitted out of 1.3.6.1.2.1.2.2.1.16
the interface, including framing characters.
ifOutUcastPkts The total number of packets that higher-level 1.3.6.1.2.1.2.2.1.17
protocols requested be transmitted to a
subnetwork-unicast address, including those that
were discarded or not sent.
ifOutNUcastPkts The total number of packets that higher-level 1.3.6.1.2.1.2.2.1.18
protocols requested be transmitted to a non-
unicast (i.e., a subnetwork-broadcast or
subnetwork-multicast) address, including those
that were discarded or not sent.
ifOutDiscards The number of outbound packets which were 1.3.6.1.2.1.2.2.1.19
chosen to be discarded even though no errors
had been detected to prevent their being
transmitted. One possible reason for discarding
such a packet could be to free up buffer space.
ifOutErrors The number of outbound packets that could not 1.3.6.1.2.1.2.2.1.20
be transmitted because of errors.
ifOutQLen The length of the output packet queue (in 1.3.6.1.2.1.2.2.1.21
packets).
4-9
Key Performance Indicators
NAME DESCRIPTION OID
ifSpecific A reference to MIB definitions specific to the 1.3.6.1.2.1.2.2.1.22
particular media being used to realize the
interface. For example, if the interface is
realized by an ethernet, then the value of this
object refers to a document defining objects
specific to ethernet. If this information is not
present, its value should be set to the OBJECT
IDENTIFIER { 0 0 }, which is a syntatically valid
object identifier, and any conformant
implementation of ASN.1 and BER must be able
to generate and recognize this value.
4-10
Key Performance Indicators
NAME DESCRIPTION OID
alUsStatValue Number of 1.3.6.1.4.1.2603.5.4.9.1.5.1000.1.1000.6
Connections
alSensorRawValue Number of 1.3.6.1.4.1.2603.5.5.18.1.3.0.11001
Connections
alNumberEstConnections Number of 1.3.6.1.4.1.2603.5.4.6
Connections
4-11
Key Performance Indicators
NOTE: The KPIs which you will be able to poll on the required policy element, are not
limited to the specific threshold defined in the TCA. E.g: After creating a TCA
which is triggered when a particular bandwidth threshold is crossed and
assigning it to Pipe X, you can subsequently poll that same pipe not only for
bandwidth, but also for “live connections” or “dropped connections” etc.
NOTE: If the sole purpose of the TCA created is to activate statistic collection for
external polling, the NetXplorer administrator may wish to define
“unreasonably high” (or low) thresholds that will never be triggered. That way,
statistics for the line/pipe or VC will still be collected, but unnecessary alarms
will not be reported in the NetXplorer every time a TCA is breached.
4-12
Key Performance Indicators
4.1.5 Number of Pipes
The total number of active pipes is calculated based on a sample every 30 seconds.
It can be run per Core Controller blade or per platform. The output is an integer
representing the total number of currently active pipes (including template
instances).
DESCRIPTION ENTITY OID
Number of Active For a given CC blade 1.3.6.1.4.1.2603.5.4.9.1.5.Slot.1.1000.8 OR
Pipes
1.3.6.1.4.1.2603.5.5.18.1.3.Slot.13001
For the whole chassis 1.3.6.1.4.1.2603.5.4.9.1.5.1000.1.1000.8 OR
1.3.6.1.4.1.2603.5.5.18.1.3.0.13001 OR
1.3.6.1.4.1.2603.5.4.3
4-13
Key Performance Indicators
4.1.8 Dropped Frames
The total number of dropped frames is based on a counter which accumulates from
the last boot time of the relevant board. The counter will reset to 0 when the
maximum value is reached. It can be measured for a core controller blade, a host
blade or on the entire platform. The output is an integer representing the total
number of dropped frames since the last reboot.
DESCRIPTION ENTITY OID
Dropped Frames For a given blade 1.3.6.1.4.1.2603.5.4.9.1.5.Slot.1.1000.11
For the whole chassis 1.3.6.1.4.1.2603.5.4.9.1.5.1000.1.1000.11
4-14
Key Performance Indicators
4.1.11 Video Detail Records (VDR)
The total number of Video Detail (VDR) Records and Files exported is based on a
counter which accumulates from the last boot time of the relevant board. The
counter will reset to 0 when the system reboots.
DESCRIPTION ENTITY OID
Number of VDR For a given blade 1.3.6.1.4.1.2603.5.4.9.1.5.Slot.1.1000.16
Records Exported
For the whole chassis 1.3.6.1.4.1.2603.5.4.9.1.5.1000.1.1000.16
Number of VDR Files For a given blade 1.3.6.1.4.1.2603.5.4.9.1.5.Slot.1.1000.17
Exported
For the whole chassis 1.3.6.1.4.1.2603.5.4.9.1.5.1000.1.1000.17
Note: If the CER rises above the defined specification for new connections per sec for
a given CC blade, additional connections opened and dispatched to that CC
will pass through the system without classification or QoS enforcement.
4-15
Key Performance Indicators
4-16
Key Performance Indicators
Note: From SMP13.1, the SMP removed the limit on the number of registered
subscribers. When working with SMP13.1 and above, the alsmpNumOfSubs
OID will return a value of "0" unless SMP has been configured to continue
working with the old "allot id"
Note: The output of an SNMPGET command on alsmpSpNumOfActiveSubs will be
the ServicePlan ID followed by decimal values of the ASCII codes for the
Service Plan Name. For example, if there were 50 subscribers in a Service Plan
called “UNLIMITED” (ID#13) and 55 subscribers in a Service Plan called
“DEFAULT” (ID#14) the output would be as follows:
1.3.6.1.4.1.2603.11.2.6.1.2.13.85.78.76.73.77.73.84.69.68 = Gauge32: 50
1.3.6.1.4.1.2603.11.2.6.1.2.14.68.69.70.65.85.76.84 = Gauge32: 55
4-17
Key Performance Indicators
In both cases, the rate is calculated over a 5 minute period divided by the number
of seconds in the period. The counter is reset every 5 minutes after the value is
updated.
NOTE: A single message can carry multiple FUP requests
Each KPI is measured in messages per second.
NAME DESCRIPTION OID
alSmpInFupMsgRate Incoming FUP message 1.3.6.1.4.1.2603.11.2.8.1
rate
alSmpOutFupMsgRate Outgoing FUP message 1.3.6.1.4.1.2603.11.2.8.2
rate
4-18
Key Performance Indicators
NAME DESCRIPTION OID
alSMPOutGxMsg All outgoing Gx messages 1.3.6.1.4.1.2603.11.2.9.5
alSMPOutCcriMsg Outgoing CCR-I Gx messages 1.3.6.1.4.1.2603.11.2.9.6
alSMPOutCcruMsg Outgoing CCR-U Gx 1.3.6.1.4.1.2603.11.2.9.7
messages
alSMPOutCcrtMsg Outgoing CCR-T Gx messages 1.3.6.1.4.1.2603.11.2.9.8
alSMPInGxRarMsg Incoming RAR Gx messages 1.3.6.1.4.1.2603.11.2.9.9
alSMPOutGxRaaMsg Outgoing RAA Gx messages 1.3.6.1.4.1.2603.11.2.9.10
alSMPInFailedGxMsg All failed incoming Gx 1.3.6.1.4.1.2603.11.2.9.11
messages
alSMPInFailedGxCcaiMsg Failed incoming CCA-I Gx 1.3.6.1.4.1.2603.11.2.9.12
messages
alSMPInFailedGxCcauMsg Failed incoming CCA-U Gx 1.3.6.1.4.1.2603.11.2.9.13
messages
alSMPInFailedGxCcatMsg Failed incoming CCA-T Gx 1.3.6.1.4.1.2603.11.2.9.14
messages
alSMPInFailedGxRarMsg Failed incoming RAR Gx 1.3.6.1.4.1.2603.11.2.9.15
messages
alSMPOutFailedGxMsg All failed outgoing Gx 1.3.6.1.4.1.2603.11.2.9.16
messages
alSMPOutFailedGxCcriMsg Failed outgoing CCR-I Gx 1.3.6.1.4.1.2603.11.2.9.17
messages
alSMPOutFailedGxCcruMsg Failed outgoing CCR-U Gx 1.3.6.1.4.1.2603.11.2.9.18
messages
alSMPOutFailedGxCcrtMsg Failed outgoing CCR-T Gx 1.3.6.1.4.1.2603.11.2.9.19
messages
alSMPOutFailedGxRaaMsg Failed outgoing RAA Gx 1.3.6.1.4.1.2603.11.2.9.20
messages
alSMPInGxMsgPeakRate Input Gx messages (total) 1.3.6.1.4.1.2603.11.2.9.21
peak rate in messages per
second
alSMPInGxCcaiMsgPeakRate Input Gx CCA-I messages 1.3.6.1.4.1.2603.11.2.9.22
(total) peak rate in messages
per second
4-19
Key Performance Indicators
NAME DESCRIPTION OID
alSMPInGxCcauMsgPeakRate Input Gx CCA-U messages 1.3.6.1.4.1.2603.11.2.9.23
(total) peak rate in messages
per second
alSMPInGxCcatMsgPeakRate Input Gx CCA-T messages 1.3.6.1.4.1.2603.11.2.9.24
(total) peak rate in messages
per second
alSMPOutGxMsgPeakRate Output Gx messages (total) 1.3.6.1.4.1.2603.11.2.9.25
peak rate in messages per
second
alSMPOutGxCcriMsgPeakRate Output Gx CCR-I messages 1.3.6.1.4.1.2603.11.2.9.26
(total) peak rate in messages
per second
alSMPOutGxCcruMsgPeakRate Output Gx CCR-U messages 1.3.6.1.4.1.2603.11.2.9.27
(total) peak rate in messages
per second
alSMPOutGxCcrtMsgPeakRate Output Gx CCR-T messages 1.3.6.1.4.1.2603.11.2.9.28
(total) peak rate, in
messages per second
alSMPInGxRarMsgPeakRate Input Gx RAR messages 1.3.6.1.4.1.2603.11.2.9.29
(total) peak rate, in
messages per second
alSMPOutGxRaaMsgPeakRate Output Gx RAA messages 1.3.6.1.4.1.2603.11.2.9.30
(total) peak rate, in
messages per second
4-20
Key Performance Indicators
All "peak record" KPIs are measured in messages per second, averaged over a 5
second interval during the last logging interval.
NAME DESCRIPTION OID
alSmpInGyMsg All incoming Gy messages 1.3.6.1.4.1.2603.11.2.10.1
alSmpInGyCcaiMsg Incoming CCA-I Gy messages 1.3.6.1.4.1.2603.11.2.10.2
alSmpInGyCcauMsg Incoming CCA-U Gy 1.3.6.1.4.1.2603.11.2.10.3
messages
alSmpInGyCcatMsg Incoming CCA-T Gy 1.3.6.1.4.1.2603.11.2.10.4
messages
alSmpInFailedGyMsg All failed incoming Gy 1.3.6.1.4.1.2603.11.2.10.5
messages
alSmpInFailedGyCcaiMsg Failed incoming CCA-I Gy 1.3.6.1.4.1.2603.11.2.10.6
messages
alSmpInFailedGyCcauMsg Failed incoming CCA-U Gy 1.3.6.1.4.1.2603.11.2.10.7
messages
alSmpInFailedGyCcatMsg Failed incoming CCA-T Gy 1.3.6.1.4.1.2603.11.2.10.8
messages
alSmpOutGyMsg All outgoing Gy messages 1.3.6.1.4.1.2603.11.2.10.9
alSmpOutGyCcriMsg Outgoing CCR-I Gy messages 1.3.6.1.4.1.2603.11.2.10.10
alSmpOutGyCcruMsg Outgoing CCR-U Gy 1.3.6.1.4.1.2603.11.2.10.11
messages
alSmpOutGyCcrtMsg Outgoing CCR-T Gy 1.3.6.1.4.1.2603.11.2.10.12
messages
alSmpOutFailedGyMsg All failed outgoing Gy 1.3.6.1.4.1.2603.11.2.10.13
messages
alSmpOutFailedGyCcriMsg Failed outgoing CCR-I Gy 1.3.6.1.4.1.2603.11.2.10.14
messages
alSmpOutFailedGyCcruMsg Failed outgoing CCR-U Gy 1.3.6.1.4.1.2603.11.2.10.15
messages
alSmpOutFailedGyCcrtMsg Failed outgoing CCR-T Gy 1.3.6.1.4.1.2603.11.2.10.16
messages
alSMPInGyMsgPeakRate Input Gy messages (total) 1.3.6.1.4.1.2603.11.2.10.17
peak rate in messages per
second
4-21
Key Performance Indicators
NAME DESCRIPTION OID
alSMPInGyCcaiMsgPeakRate Input Gy CCA-I messages 1.3.6.1.4.1.2603.11.2.10.18
(total) peak rate in
messages per second
alSMPInGyCcauMsgPeakRate Input Gy CCA-U messages 1.3.6.1.4.1.2603.11.2.10.19
(total) peak rate in
messages per second
alSMPInGyCcatMsgPeakRate Input Gy CCA-T messages 1.3.6.1.4.1.2603.11.2.10.20
(total) peak rate in
messages per second
alSMPOutGyMsgPeakRate Output Gy messages (total) 1.3.6.1.4.1.2603.11.2.10.21
peak rate in messages per
second
alSMPOutGyCcriMsgPeakRate Output Gy CCR-I messages 1.3.6.1.4.1.2603.11.2.10.22
(total) peak rate in
messages per second
alSMPOutGyCcruMsgPeakRate Output Gy CCR-U messages 1.3.6.1.4.1.2603.11.2.10.23
(total) peak rate in
messages per second
alSMPOutGyCcrtMsgPeakRate Output Gy CCR-T messages 1.3.6.1.4.1.2603.11.2.10.24
(total) peak rate, in
messages per second
4.2.6 Gz CDRs
SMP can be polled to measure the total number of Gz (CDR) messages written on
the SMP. The calculation is made by a counter which accumulates since the last
SMP boot. This counter is reset to 0 when the maximum value is reached.
NAME DESCRIPTION OID
alSmpOutGzRecords Output Gz records since last boot 1.3.6.1.4.1.2603.11.2.11.1
4-22
Key Performance Indicators
• Sd messages sent (all types, TSA, CCR-U, CCR-T or RAA)
• Sd messages which failed to be sent (all types, TSA, CCR-U, CCR-T or RAA)
• Peak average of Sd messages received per sec (all types, TSR, CCA-U, CCA-T
or RAR)
• Peak average of Gx messages sent per sec (all types, TSA, CCR-U, CCR-T or
RAA)
In each of these cases, the calculation is made by a counter which accumulates
since the last SMP boot. This counter is reset to 0 when the maximum value is
reached.
All "peak record" KPIs are measured in messages per second, averaged over a 5
second interval during the last logging interval.
NAME DESCRIPTION OID
alSMPInSdMsg All incoming Sd messages 1.3.6.1.4.1.2603.11.2.12.1
alSMPInSdTsrMsg Incoming TS-R Sd messages 1.3.6.1.4.1.2603.11.2.12.2
alSMPInSdCcauMsg Incoming CCA-U Sd 1.3.6.1.4.1.2603.11.2.12.3
messages
alSMPInSdCcatMsg Incoming CCA-T Sd messages 1.3.6.1.4.1.2603.11.2.12.4
alSMPOutSdMsg All outgoing Sd messages 1.3.6.1.4.1.2603.11.2.12.5
alSMPOutSdTsaMsg Outgoing TS-A Sd messages 1.3.6.1.4.1.2603.11.2.12.6
alSMPOutSdCcruMsg Outgoing CCR-U Sd 1.3.6.1.4.1.2603.11.2.12.7
messages
alSMPOutSdCcrtMsg Outgoing CCR-T Sd messages 1.3.6.1.4.1.2603.11.2.12.8
alSMPInSdRarMsg Incoming RAR Sd messages 1.3.6.1.4.1.2603.11.2.12.9
alSMPOutSdRaaMsg Outgoing RAA Sd messages 1.3.6.1.4.1.2603.11.2.12.10
alSMPInFailedSdMsg All failed incoming Sd 1.3.6.1.4.1.2603.11.2.12.11
messages
alSMPInFailedSdTsrMsg Failed incoming TS-R Sd 1.3.6.1.4.1.2603.11.2.12.12
messages
alSMPInFailedSdCcauMsg Failed incoming CCA-U Sd 1.3.6.1.4.1.2603.11.2.12.13
messages
alSMPInFailedSdCcatMsg Failed incoming CCA-T Sd 1.3.6.1.4.1.2603.11.2.12.14
messages
alSMPInFailedSdRarMsg Failed incoming RAR Sd 1.3.6.1.4.1.2603.11.2.12.15
messages
4-23
Key Performance Indicators
alSMPOutFailedSdMsg All failed outgoing Sd 1.3.6.1.4.1.2603.11.2.12.16
messages
alSMPOutFailedSdTsaMsg Failed outgoing TS-A Sd 1.3.6.1.4.1.2603.11.2.12.17
messages
alSMPOutFailedSdCcruMsg Failed outgoing CCR-U Sd 1.3.6.1.4.1.2603.11.2.12.18
messages
alSMPOutFailedSdCcrtMsg Failed outgoing CCR-T Sd 1.3.6.1.4.1.2603.11.2.12.19
messages
alSMPOutFailedSdRaaMsg Failed outgoing RAA Sd 1.3.6.1.4.1.2603.11.2.12.20
messages
alSMPInSdMsgPeakRate Input Sd messages (total) 1.3.6.1.4.1.2603.11.2.12.21
peak rate, in messages per
second
alSMPInSdTsrMsgPeakRate Input Sd TS-R messages 1.3.6.1.4.1.2603.11.2.12.22
(total) peak rate
alSMPInSdCcauMsgPeakRate Input Sd CCA-U messages 1.3.6.1.4.1.2603.11.2.12.23
(total) peak rate
alSMPInSdCcatMsgPeakRate Input Sd CCA-T messages 1.3.6.1.4.1.2603.11.2.12.24
(total) peak rate
alSMPOutSdMsgPeakRate Output Sd messages (total) 1.3.6.1.4.1.2603.11.2.12.25
peak rate
alSMPOutSdTsaMsgPeakRate Output Sd TS-A messages 1.3.6.1.4.1.2603.11.2.12.26
(total) peak rate
alSMPOutSdCcruMsgPeakRate Output Sd CCR-U messages 1.3.6.1.4.1.2603.11.2.12.27
(total) peak rate
alSMPOutSdCcrtMsgPeakRate Output Sd CCR-T messages 1.3.6.1.4.1.2603.11.2.12.28
(total) peak rate
alSMPInSdRarMsgPeakRate Input Sd RAR messages 1.3.6.1.4.1.2603.11.2.12.29
(total) peak rate
alSMPOutSdRaaMsgPeakRate Output Sd RAA messages 1.3.6.1.4.1.2603.11.2.12.30
(total) peak rate
4-24
Key Performance Indicators
• Dynamic service plan add-ons
For each of the KPIs in the table below, the total number of dynamic rules is based
on a single sample during the last logging interval (not an average).
The peak rate of new dynamic rules is measured in rules per second during a 5
second interval, as seen by SMP during the last logging interval (rules per second).
When 5 minutes are up, the SMP resets the current peak value to 0.
NAME DESCRIPTION OID
alSmpDynamicQosRule All incoming Sd 1.3.6.1.4.1.2603.11.2.12.31
messages
alSmpDynamicQosRulePeakRate Dynamic Qos 1.3.6.1.4.1.2603.11.2.12.32
Enforcement
Rules peak rate
4.3 STC
The KPIs for the Short Term Collector are defined in the Allot-MD-MIB file and are
divided here into incoming records and processed records.
4-25
Key Performance Indicators
• Number of incoming Conversation statistics records. Includes both 30sec
and 300sec buckets.
• Number of incoming SDR records from SMP to the extended collector. This
is only relevant if the Statistics Export license is enabled.
• Number of incoming UDR records from In-Line Platform to extended
collector. This is only relevant if the Statistics Export license is enabled.
4-26
Key Performance Indicators
alDatColStatRecordsProcessedNum Total number of 1.3.6.1.4.1.2603.11.8.1.1.4.2.1
processed records (all
types)
alDatColStatRecordsProcessedNum Total number of 1.3.6.1.4.1.2603.11.8.1.1.4.2.7
processed VC records
alDatColStatRecordsProcessedNum Total number of 1.3.6.1.4.1.2603.11.8.1.1.4.2.6
processed
Conversation records
4-27
Key Performance Indicators
NAME DESCRIPTION OID
alDmKpiRecordsIncomingCorruptedNum Number of 1.3.6.1.4.1.2603.12.3.1.1.1.19
incoming records
failed during
parsing since last
boot
alDmKpiRecordsIncomingCorruptedLastInt Number of 1.3.6.1.4.1.2603.12.3.1.1.1.20
ervalNum incoming records
failed during
parsing in the last
(configurable)
duration from
now
alDmKpiRecordsGlobalExcludedNum Number of 1.3.6.1.4.1.2603.12.3.1.1.1.24
excluded
(filtered)
incoming records
created since
boot
alDmKpiRecordsGlobalExcludedLastInterval Number of 1.3.6.1.4.1.2603.12.3.1.1.1.25
Num excluded
(filtered)
incoming records
created during
parsing in the last
(configurable)
interval from
now.
4-28
Key Performance Indicators
NAME DESCRIPTION OID
alDmKpiFilesIncomingCorruptedNum Number of 1.3.6.1.4.1.2603.12.3.1.1.1.16
corrupted
incoming files
since boot
alDmKpiFilesIncomingCorruptedLastInterva Number of 1.3.6.1.4.1.2603.12.3.1.1.1.17
lNum corrupted
incoming files in
the last
(configurable)
duration from
now
alDmKpiFilesIncomingCorruptedLastInterva Percentage of 1.3.6.1.4.1.2603.12.3.1.1.1.18
lPercent corrupted
incoming files in
the last
(configurable)
duration from
now
4-29
Key Performance Indicators
mediator since the last
boot
alDmKpiOutputFilesPushSuccessNu The total number of files 1.3.6.1.4.1.2603.12.3.1.1.1.7
m successfully pushed by
the data mediator to the
operator’s SFTP server
since the last boot
alDmKpiOutputFilesPushFailNum The total attempts to 1.3.6.1.4.1.2603.12.3.1.1.1.8
push files by the data
mediator to the
operator’s SFTP server
since the last boot
which falied (note: this
is not the number of
files which have not
been pushed)
alDmKpiOutputFilesPendingPush Files to be pushed – the 1.3.6.1.4.1.2603.12.3.1.1.1.10
total number of files
waiting to be pushed.
4-30
Key Performance Indicators
4.5 ClearSee
The following KPIs can be polled from the ALLOT-CLEARSEE-MIB module.
4.5.1 Records
NAME DESCRIPTION OID
alCsKpiRecordsIncomingNum The number of incoming 1.3.6.1.4.1.2603.14.3.2.1.1.2
records since the last
boot
alCsKpiRecordsIncomingLastInterval The number of incoming 1.3.6.1.4.1.2603.14.3.2.1.1.3
Num records since the last
(configurable) interval
alCsKpiRecordsIncomingRate The average rate of 1.3.6.1.4.1.2603.14.3.2.1.1.4
incoming records, per
second, since boot.
alCsKpiRecordsIncomingLastInterval The average rate of 1.3.6.1.4.1.2603.14.3.2.1.1.5
Rate incoming records per
second since the last
interval
4.5.2 Files
NAME DESCRIPTION OID
alCsKpiFilesIncomingNum The number of incoming 1.3.6.1.4.1.2603.14.3.2.1.1.6
files since the last boot
alCsKpiFilesIncomingLastIntervalNu The number of incoming 1.3.6.1.4.1.2603.14.3.2.1.1.7
m files since the last
(configurable) interval
alCsKpiFilesIncomingCorruptedNum The number of 1.3.6.1.4.1.2603.14.3.2.1.1.8
corrupted incoming files
since the last boot
alCsKpiFilesIncomingCorruptedLastIn The number of 1.3.6.1.4.1.2603.14.3.2.1.1.9
tervalNum corrupted incoming files
since the last
(configurable) interval
alCsKpiFilesIncomingCorruptedLastIn The percentage of 1.3.6.1.4.1.2603.14.3.2.1.1.10
tervalPercent corrupted incoming files
since the last
(configurable) interval
4-31
Key Performance Indicators
For a given ITR 1.3.6.1.4.1.2603.1.1.1.1.5.19.8.UnitID
4-32
Key Performance Indicators
4.6 NetworkSecure
4.6.1 Central Manager
The Central Manger KPIs are in the ALLOT-ASP-CM-MIB. These counters are
calculated from the 1st of each month at 9:00 AM. The solution resets the counter
each month.
4-33
Key Performance Indicators
IP address are considered
active users.
4-34
Key Performance Indicators
sent via SOAP since the
network management
portion of the system
was last re-initialized.
4-35
Key Performance Indicators
• The transport service address by which the managed node receives
network management traffic
The topology MIB also contains the following:
NAME DESCRIPTION OID
alTopoGlobalProcessingLoad The conceptual 1.3.6.1.4.1.2603.17.1.2.0
processing load of the
system as a whole,
including all directly
managed nodes, on a
scale of 0 to 100.
4.6.3 Filter
The NetworkSecure Filter KPIs are in the ALLOT-ASP-FILTER-MIB. These counters
are calculated from the startup of the module. If the module is restarted, then
these counters are reset.
4-36
Key Performance Indicators
NAME DESCRIPTION OID
the last full hour on the hour
per system time (hrSystemDate)
Peak connection establishment
rate (CER) for other TCP traffic
during the last full hour on the
hour per system time
(hrSystemDate). This pertains to
TCP traffic not already
accounted for by a service-
specific gauge, such as
alAspCtOthrTcpPeakCerHrly alAspCtHttpPeakCerHrly. 1.3.6.1.4.1.2603.15.1.2.2.5
Peak connection establishment
rate (CER) for other UDP traffic
during the last full hour on the
hour per system time
(hrSystemDate). This pertains to
UDP traffic not already
accounted for by a service-
alAspCtOthrUdpPeakCerHrly specific gauge. 1.3.6.1.4.1.2603.15.1.2.2.6
Peak concurrently live total
connections during the last full
hour on the hour per system
alAspCtTotalPeakLiveConnsHrly time (hrSystemDate). 1.3.6.1.4.1.2603.15.1.2.2.7
Peak concurrently live HTTP
connections during the last full
hour on the hour per system
alAspCtHttpPeakLiveConnsHrly time (hrSystemDate). 1.3.6.1.4.1.2603.15.1.2.2.8
Peak concurrently live HTTPS
connections during the last full
hour on the hour per system
alAspCtHttpsPeakLiveConnsHrly time (hrSystemDate). 1.3.6.1.4.1.2603.15.1.2.2.9
Peak concurrently live FTP
connections during the last full
hour on the hour per system
alAspCtFtpPeakLiveConnsHrly time (hrSystemDate). 1.3.6.1.4.1.2603.15.1.2.2.10
Peak concurrently live other
TCP connections during the last
full hour on the hour per system
time (hrSystemDate). This
alAspCtOthrTcpPeakLiveConnsHrly 1.3.6.1.4.1.2603.15.1.2.2.11
pertains to TCP traffic not
4-37
Key Performance Indicators
NAME DESCRIPTION OID
already accounted for by a
service-specific gauge, such as
alAspCtHttpPeakLiveConnsHrly.
Peak concurrently live other
UDP connections during the last
full hour on the hour per system
time (hrSystemDate). This
pertains to UDP traffic not
already accounted for by a
alAspCtOthrUdpPeakLiveConnsHrly service-specific gauge. 1.3.6.1.4.1.2603.15.1.2.2.12
Total connections seen by the
system since the network
management portion of the
alAspCtTotalConns system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.2.13
Total HTTP connections seen by
the system since the network
management portion of the
alAspCtHttpConns system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.2.14
Total HTTP connections blocked
by the Firewall service since the
network management portion
of the system was last re-
alAspCtHttpFwlBlockedConns initialized. 1.3.6.1.4.1.2603.15.1.2.2.15
Total HTTPS connections seen
by the system since the network
management portion of the
alAspCtHttpsConns system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.2.16
Total HTTPS connections
blocked by the Firewall service
since the network management
portion of the system was last
alAspCtHttpsFwlBlockedConns re-initialized. 1.3.6.1.4.1.2603.15.1.2.2.17
Total FTP connections seen by
the system since the network
management portion of the
alAspCtFtpConns system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.2.18
Total FTP connections blocked
by the Firewall service since the
alAspCtFtpFwlBlockedConns 1.3.6.1.4.1.2603.15.1.2.2.19
network management portion
4-38
Key Performance Indicators
NAME DESCRIPTION OID
of the system was last re-
initialized.
Total other TCP connections
seen by the system since the
network management portion
of the system was last re-
initialized. This pertains to TCP
traffic not already accounted for
by a service-specific counter,
alAspCtOthrTcpConns such as alAspCtHttpConns. 1.3.6.1.4.1.2603.15.1.2.2.20
Total other TCP connections
blocked by the Firewall service
since the network management
portion of the system was last
re-initialized. This pertains to
TCP traffic not already
accounted for by a service-
specific counter, such as
alAspCtOthrTcpFwlBlockedConns alAspCtHttpConns. 1.3.6.1.4.1.2603.15.1.2.2.21
Total other UDP connections
seen by the system since the
network management portion
of the system was last re-
initialized. This pertains to UDP
traffic not already accounted for
alAspCtOthrUdpConns by a service-specific counter. 1.3.6.1.4.1.2603.15.1.2.2.22
Total other UDP connections
blocked by the Firewall service
since the network management
portion of the system was last
re-initialized. This pertains to
UDP traffic not already
accounted for by a service-
alAspCtOthrUdpFwlBlockedConns specific counter. 1.3.6.1.4.1.2603.15.1.2.2.23
The conceptual processing load
of the ASP CT, on a scale of 0 to
alAspCtProcessingLoad 100. 1.3.6.1.4.1.2603.15.1.2.2.24
4-39
Key Performance Indicators
4.6.3.2 Web Filter Statistics
Each leaf of the alAspWebFilterStatistics branch, OID 1.3.6.1.4.1.2603.15.1.2.3,
contains Web Filter final leaves.
NAME DESCRIPTION OID
The current number of users, broken
alAspWfUserStatistics down in different ways 1.3.6.1.4.1.2603.15.1.2.3.1
HTTP request inspected by the Filter,
alAspWfHttpStatistics broken down in different ways 1.3.6.1.4.1.2603.15.1.2.3.2
HTTPS request inspected by the
alAspWfHttpsStatistics Filter, broken down in different ways 1.3.6.1.4.1.2603.15.1.2.3.3
FTP request inspected by the Filter,
alAspWfFtpStatistics broken down in different ways 1.3.6.1.4.1.2603.15.1.2.3.4
The final leaves of the above leaves are described in the sections below.
4-40
Key Performance Indicators
NAME DESCRIPTION OID
the Content Filter service
(AKA Web/WAP) since the
network management
portion of the system was
last re-initialized.
Total HTTP requests
inspected and blocked by
the Anti Virus service since
alAspHttpVirusBlockedReqs 1.3.6.1.4.1.2603.15.1.2.3.2.3
the network management
portion of the system was
last re-initialized.
Total HTTP requests
inspected and blocked by
the Anti Phishing service
alAspHttpPhishingBlockedReqs since the network 1.3.6.1.4.1.2603.15.1.2.3.2.4
management portion of
the system was last re-
initialized.
Total HTTP requests
inspected and blocked by
the Ads Free service since
alAspHttpAdsFreeBlockedReqs 1.3.6.1.4.1.2603.15.1.2.3.2.5
the network management
portion of the system was
last re-initialized.
Total HTTP requests
inspected and blocked by
the Activation service (AKA
alAspHttpActivationBlockedReqs Auto Notices) since the 1.3.6.1.4.1.2603.15.1.2.3.2.6
network management
portion of the system was
last re-initialized.
Total HTTP requests
inspected and blocked by
the Anti Botnet service
alAspHttpBotnetBlockedReqs since the network 1.3.6.1.4.1.2603.15.1.2.3.2.7
management portion of
the system was last re-
initialized.
4-41
Key Performance Indicators
4.6.3.2.3 Web Filter HTTPS Requests
Each final leaf of the alAspWfHttpsStatistics branch, 1.3.6.1.4.1.2603.15.1.2.3.3,
shows HTTPS statistics relevant for the Web Filter.
NAME DESCRIPTION OID
Total HTTPS requests
inspected by Web Filter
since the network
alAspHttpsTotalReqs 1.3.6.1.4.1.2603.15.1.2.3.3.1
management portion of
the system was last re-
initialized.
Total HTTPS requests
inspected and blocked by
the Content Filter service
alAspHttpsCntntFltrBlockedReqs (AKA Web/WAP) since the 1.3.6.1.4.1.2603.15.1.2.3.3.2
network management
portion of the system was
last re-initialized.
Total HTTPS requests
inspected and blocked by
the Anti Virus service since
alAspHttpsVirusBlockedReqs 1.3.6.1.4.1.2603.15.1.2.3.3.3
the network management
portion of the system was
last re-initialized.
Total HTTPS requests
inspected and blocked by
the Anti Phishing service
alAspHttpsPhishingBlockedReqs since the network 1.3.6.1.4.1.2603.15.1.2.3.3.4
management portion of
the system was last re-
initialized.
Total HTTPS requests
inspected and blocked by
the Ads Free service since
alAspHttpsAdsFreeBlockedReqs 1.3.6.1.4.1.2603.15.1.2.3.3.5
the network management
portion of the system was
last re-initialized.
Total HTTPS requests
inspected and blocked by
alAspHttpsActivationBlockedReqs the Activation service (AKA 1.3.6.1.4.1.2603.15.1.2.3.3.6
Auto Notices) since the
network management
4-42
Key Performance Indicators
NAME DESCRIPTION OID
portion of the system was
last re-initialized.
Total HTTPS requests
inspected and blocked by
the Anti Botnet service
alAspHttpsBotnetBlockedReqs since the network 1.3.6.1.4.1.2603.15.1.2.3.3.7
management portion of
the system was last re-
initialized.
4-43
Key Performance Indicators
NAME DESCRIPTION OID
the system was last re-
initialized.
Total FTP requests
inspected and blocked by
the Ads Free service since
alAspFtpAdsFreeBlockedReqs 1.3.6.1.4.1.2603.15.1.2.3.4.5
the network management
portion of the system was
last re-initialized.
Total FTP requests
inspected and blocked by
the Activation service (AKA
alAspFtpActivationBlockedReqs Auto Notices) since the 1.3.6.1.4.1.2603.15.1.2.3.4.6
network management
portion of the system was
last re-initialized.
Total FTP requests
inspected and blocked by
the Anti Botnet service
alAspFtpBotnetBlockedReqs since the network 1.3.6.1.4.1.2603.15.1.2.3.4.7
management portion of
the system was last re-
initialized.
The conceptual processing
alAspWfProcessingLoad load of the Web Filter, on a 1.3.6.1.4.1.2603.15.1.2.3.5
scale of 0 to 100.
4-44
Key Performance Indicators
POP3 messages processed by the
alAspPop3Statistics Filter, broken down in different ways 1.3.6.1.4.1.2603.15.1.2.4.3
IMAP messages processed by the
alAspImapStatistics Filter, broken down in different ways 1.3.6.1.4.1.2603.15.1.2.4.4
The final leaves of the above leaves are described in the sections below.
4-45
Key Performance Indicators
NAME DESCRIPTION OID
deleted due to SPAM by the
system since the network
management portion of the
system was last re-
initialized.
Total inbound SMTP
messages processed and
quarantined due to SPAM
by the system since the
network management
portion of the system was
alAspSmtpInSpamQuarantinedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.6
Total inbound SMTP
messages processed and
rejected due to SPAM by
the system since the
network management
portion of the system was
alAspSmtpInSpamRejectedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.7
Total inbound SMTP
messages processed and
tagged as Phising by the
system since the network
management portion of the
system was last re-
alAspSmtpInPhishTaggedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.8
Total inbound SMTP
messages processed and
deleted due to Phising by
the system since the
network management
portion of the system was
alAspSmtpInPhishDeletedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.9
Total inbound SMTP
messages processed and
quarantined due to Phising
by the system since the
network management
portion of the system was
alAspSmtpInPhishQuarantinedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.10
4-46
Key Performance Indicators
NAME DESCRIPTION OID
Total inbound SMTP
messages processed and
rejected due to Phising by
the system since the
network management
portion of the system was
alAspSmtpInPhishRejectedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.11
Total inbound SMTP
messages processed and
tagged as Virus by the
system since the network
management portion of the
system was last re-
alAspSmtpInVirusTaggedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.12
Total inbound SMTP
messages processed and
deleted due to Virus by the
system since the network
management portion of the
system was last re-
alAspSmtpInVirusDeletedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.13
Total inbound SMTP
messages processed and
quarantined due to Virus by
the system since the
network management
portion of the system was
alAspSmtpInVirusQuarantinedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.14
Total inbound SMTP
messages processed and
rejected due to Virus by the
system since the network
management portion of the
system was last re-
alAspSmtpInVirusRejectedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.1.15
4-47
Key Performance Indicators
NAME DESCRIPTION OID
Total outbound SMTP
messages processed by the
system since the network
management portion of
the system was last re-
alAspSmtpOutProcessedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.1
Total outbound SMTP
messages processed and
delivered by the system
since the network
management portion of
the system was last re-
alAspSmtpOutDeliveredMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.2
Total outbound SMTP
messages processed and
not delivered by the
system since the network
management portion of
the system was last re-
alAspSmtpOutNotDeliveredMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.3
Total outbound SMTP
messages processed and
tagged as SPAM by the
system since the network
management portion of
the system was last re-
alAspSmtpOutSpamTaggedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.4
Total outbound SMTP
messages processed and
deleted due to SPAM by
the system since the
network management
portion of the system was
alAspSmtpOutSpamDeletedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.5
Total outbound SMTP
messages processed and
quarantined due to SPAM
by the system since the
network management
portion of the system was
alAspSmtpOutSpamQuarantinedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.6
4-48
Key Performance Indicators
NAME DESCRIPTION OID
Total outbound SMTP
messages processed and
rejected due to SPAM by
the system since the
network management
portion of the system was
alAspSmtpOutSpamRejectedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.7
Total outbound SMTP
messages processed and
tagged as Phising by the
system since the network
management portion of
the system was last re-
alAspSmtpOutPhishTaggedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.8
Total outbound SMTP
messages processed and
deleted due to Phising by
the system since the
network management
portion of the system was
alAspSmtpOutPhishDeletedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.9
Total outbound SMTP
messages processed and
quarantined due to Phising
by the system since the
network management
portion of the system was
alAspSmtpOutPhishQuarantinedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.10
Total outbound SMTP
messages processed and
rejected due to Phising by
the system since the
network management
portion of the system was
alAspSmtpOutPhishRejectedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.11
Total outbound SMTP
messages processed and
tagged as Virus by the
system since the network
alAspSmtpOutVirusTaggedMsgs 1.3.6.1.4.1.2603.15.1.2.4.2.12
management portion of
4-49
Key Performance Indicators
NAME DESCRIPTION OID
the system was last re-
initialized.
Total outbound SMTP
messages processed and
deleted due to Virus by the
system since the network
management portion of
the system was last re-
alAspSmtpOutVirusDeletedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.13
Total outbound SMTP
messages processed and
quarantined due to Virus
by the system since the
network management
portion of the system was
alAspSmtpOutVirusQuarantinedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.14
Total outbound SMTP
messages processed and
rejected due to Virus by
the system since the
network management
portion of the system was
alAspSmtpOutVirusRejectedMsgs last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.2.15
4-50
Key Performance Indicators
NAME DESCRIPTION OID
Total POP3 messages processed
and not delivered by the system
since the network management
portion of the system was last re-
alAspPop3NotDeliveredMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.3
Total POP3 messages processed
and tagged as SPAM by the
system since the network
management portion of the
alAspPop3SpamTaggedMsgs system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.4
Total POP3 messages processed
and deleted due to SPAM by the
system since the network
management portion of the
alAspPop3SpamDeletedMsgs system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.5
Total POP3 messages processed
and quarantined due to SPAM by
the system since the network
management portion of the
alAspPop3SpamQuarantinedMsgs system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.6
Total POP3 messages processed
and tagged as Phising by the
system since the network
management portion of the
alAspPop3PhishTaggedMsgs system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.8
Total POP3 messages processed
and deleted due to Phising by the
system since the network
management portion of the
alAspPop3PhishDeletedMsgs system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.9
Total inbound SMTP messages
processed and quarantined due to
Phising by the system since the
network management portion of
alAspPop3PhishQuarantinedMsgs the system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.10
Total inbound SMTP messages
processed and tagged as Virus by
the system since the network
management portion of the
alAspPop3VirusTaggedMsgs system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.12
4-51
Key Performance Indicators
NAME DESCRIPTION OID
Total inbound SMTP messages
processed and deleted due to
Virus by the system since the
network management portion of
alAspPop3VirusDeletedMsgs the system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.13
Total inbound SMTP messages
processed and quarantined due to
Virus by the system since the
network management portion of
alAspPop3VirusQuarantinedMsgs the system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.3.14
4-52
Key Performance Indicators
NAME DESCRIPTION OID
Total IMAP messages processed and
quarantined due to SPAM by the
system since the network
management portion of the system
alAspImapSpamQuarantinedMsgs was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.4.6
Total IMAP messages processed and
tagged as Phising by the system since
the network management portion of
alAspImapPhishTaggedMsgs the system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.4.8
Total IMAP messages processed and
deleted due to Phising by the system
since the network management
portion of the system was last re-
alAspImapPhishDeletedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.4.9
Total IMAP messages processed and
quarantined due to Phising by the
system since the network
management portion of the system
alAspImapPhishQuarantinedMsgs was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.4.10
Total IMAP messages processed and
tagged as Virus by the system since
the network management portion of
alAspImapVirusTaggedMsgs the system was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.4.12
Total IMAP messages processed and
deleted due to Virus by the system
since the network management
portion of the system was last re-
alAspImapVirusDeletedMsgs initialized. 1.3.6.1.4.1.2603.15.1.2.4.4.13
Total IMAP messages processed and
quarantined due to Virus by the
system since the network
management portion of the system
alAspImapVirusQuarantinedMsgs was last re-initialized. 1.3.6.1.4.1.2603.15.1.2.4.4.14
The conceptual processing load of
alAspMailFilterProcessingLoad the Mail Filter, on a scale of 0 to 100. 1.3.6.1.4.1.2603.15.1.2.4.5
4-53
Appendices
5 Appendices
5.1 Appendix A: KPIs Per SG Blade
KPIs in the alSensorTable (1.3.6.1.4.1.2603.5.5.18) in Allot-MIB.mib can be polled on
different blades in the Service Gateway chassis depending on the sensor type. This
appendix contains reference tables for the SG-Sigma and SG-Sigma E detailing which
KPIs can be run on which blade.
The table below shows which sensor type can be polled, for each of the SG-Sigma
blades.
5-1
Appendices
5.1.1 Examples
5.1.1.1 Running an snmpget Command
To find the memory usage for the SGSV installed in slot 14 of the SG-Omega, we need
to poll 1.3.6.1.4.1.2603.5.5.18.1.3.14.4001
Where 14=Slot 14, and 4001 represents Sensor Type 4 (CPU usage) and Sensor ID 001
5-2
Appendices
5.1.1.2 Running an snmpwalk Command
To query all sensors, run an snmpwalk command on 1.3.6.1.4.1.2603.5.5.18.1.3 . An
example of the output with the different readings for each sensor is shown below:
5-3
Appendices
5-4