AFFIRMED-SNMP-AN3000-TRAPS-MIB

        Traps MIB objects
    

Imported Objects

affirmedAlarmSeqId, affirmedAlarmDateTime, affirmedAlarmChassisName, affirmedAlarmSourceId, affirmedAlarmSeverity, affirmedAlarmRefSeqId, affirmedAlarmDetails, affirmedPotentialImpact, affirmedCorrectiveAction, affirmedVmSourceIpAddress, affirmedVmSourceName, name, chassis, slot, cpu, dirname, adminstate, resource, sensor, data, taskname, cid, sid, type, subtype, level, time, services, actions, ledname, ledcolor, usid, hardorsoft, readerrors, writeerrors, slotnumber, failuredescription, suggestedrecovery, netcontext, info, nodename, realmname, localhostidentity, peerrealmname, peerhostidentity, peername, clientid, servicename, apnname, imsi, statestring, filepath, ip, port, chassisid, slotid, cpuid, prefix, numpurged, node, diskid, interfacename, threshold, uepoolutilization, ipversiontype, ifindex, ifadminstatus, ifoperstatus, netctxtname, peeringname, localpeeripaddr, remotepeeripaddr, lasterrorcode, lasterrosubcode, currentstate, role, groupname, operation, state, status, activesize, standbysize, mcmslotnumber, requiredsize, availablesize, reason, importnum, resultstr, datetime, fault, action, unused, clusterid, nodeid, subsgroupname, subsidfilename, alarmid, xpath, ifname, sessionthreshold, sessionutilization, ipaddressthreshold, ipaddressutilization, portchunkthreshold, portchunkutilization, parent, destination, peeripaddress, gatewayname, gatewayipaddress, bfdsessiondescription, cafilename, expirydate, indexAFFIRMED-ALARM-MIB
affirmedSnmp, affirmedSnmpNotificationsAFFIRMED-SNMP-MIB
MODULE-IDENTITY, OBJECT-TYPE, Integer32, NOTIFICATION-TYPESNMPv2-SMI
DisplayStringSNMPv2-TC

Objects

affirmedSnmpAn3000Traps .1.3.6.1.4.1.37963.4.0.4
affirmedSnmpAn3000TrapsScalars .1.3.6.1.4.1.37963.4.0.4.1
affirmedSnmpAn3000TrapsTables .1.3.6.1.4.1.37963.4.0.4.2
affirmedSnmpAn3000TrapsNotifications .1.3.6.1.4.1.37963.4.0.4.3
affirmedSnmpAn3000TrapsNotificationPrefix .1.3.6.1.4.1.37963.4.0.4.3.0
affirmedSnmpAn3000TrapsNotificationObjects .1.3.6.1.4.1.37963.4.0.4.3.1

Notifications/Traps

NameOIDDescription
anSgwServiceDown












.1.3.6.1.4.1.37963.4.0.4.3.0.100
A SGW service is operationally down.
anPgwServiceUp












.1.3.6.1.4.1.37963.4.0.4.3.0.101
A PGW service is operationally up.
anPgwServiceDown












.1.3.6.1.4.1.37963.4.0.4.3.0.102
A PGW service is operationally down.
anGgsnServiceUp












.1.3.6.1.4.1.37963.4.0.4.3.0.103
A GGSN service is operationally up.
anGgsnServiceDown












.1.3.6.1.4.1.37963.4.0.4.3.0.104
A GGSN service is operationally down.
anApnAvailable













.1.3.6.1.4.1.37963.4.0.4.3.0.105
An APN is available for use by a specific GW service.
anApnNotAvailable













.1.3.6.1.4.1.37963.4.0.4.3.0.106
An APN is not available for use by a specific GW service.
anRedundancyOperState













.1.3.6.1.4.1.37963.4.0.4.3.0.107
Indicates whether MCM redundancy is operational. When the standby boots it has 10 minutes to establish redundancy before raising this alarm. If a standby task fails, the system gives 3 minutes to re-established redundancy before raising this alarm.
anCpuTosTaskState















.1.3.6.1.4.1.37963.4.0.4.3.0.108
Indicates whether all tos tasks are operationally UP on this CPU. After a card is booted all tasks have 10 minutes to come up before an alarm is issued. If a task goes down, the system gives 3 minutes for the task to come up before issuing this alarm.
anCntnUaProfFileInvalid











.1.3.6.1.4.1.37963.4.0.4.3.0.109
Adding UA profile file failed due to invalid profile file.
anDataFabricOperStateDown













.1.3.6.1.4.1.37963.4.0.4.3.0.110
Communication over the data fabric is down.
anNewCoreFileDetected












.1.3.6.1.4.1.37963.4.0.4.3.0.111
A new core file is detected on the chassis.
anfileftpfailure














.1.3.6.1.4.1.37963.4.0.4.3.0.112
Last try to ftp files to remote server failed.
anFmSlotFrequentReboot














.1.3.6.1.4.1.37963.4.0.4.3.0.114
Slot (CSM or SSM) has exceeded reboot frequency threshold.
anGeoRedundancyStandbyOperStatusDown












.1.3.6.1.4.1.37963.4.0.4.3.0.117
Indicates a Geo-redundant standby cluster is not ready and the active peer is not currently protected.
anGeoRedundancyActiveOperStatusDown












.1.3.6.1.4.1.37963.4.0.4.3.0.118
Geo-redundant active cluster is not fully functional due to link health status with neighboring network elements.
anForcedSyncStart











.1.3.6.1.4.1.37963.4.0.4.3.0.125
Forced sync of images from active to standby.
anForcedSyncFailed











.1.3.6.1.4.1.37963.4.0.4.3.0.126
Forced sync failed or timed-out.
anPortStatusUp













.1.3.6.1.4.1.37963.4.0.4.3.0.127
Port Status is UP
anPortStatusDown













.1.3.6.1.4.1.37963.4.0.4.3.0.128
Port Status is Down
anPortStatusUP













.1.3.6.1.4.1.37963.4.0.4.3.0.129
Port Status is UP
anfilepurgedduetodiskfull













.1.3.6.1.4.1.37963.4.0.4.3.0.130
Files have been purged from disk since disk purge threshold was crossed (disk was getting close to full).
anSpsServerConnectFail













.1.3.6.1.4.1.37963.4.0.4.3.0.131
Failed to connect to SPS server.
anSpsServerConnectLost













.1.3.6.1.4.1.37963.4.0.4.3.0.132
SPS server connection lost.
anGeoRedundancyPrimaryNodeStandby












.1.3.6.1.4.1.37963.4.0.4.3.0.133
Geo-redundant node designated as HA-Role primary has entered HA-State standby.
anGeoRedundancySecondaryNodeActive












.1.3.6.1.4.1.37963.4.0.4.3.0.134
Geo-redundant node designated as HA-Role secondary has entered HA-State active.
anKernelOptionsModified















.1.3.6.1.4.1.37963.4.0.4.3.0.135
Kernel options have been automatically modified on the current module. They will take effect on the reboot.
anGeoRedundancyLinkDown












.1.3.6.1.4.1.37963.4.0.4.3.0.136
Geo-redundancy link is down.
anGeoRedundancyLinkVersionMismatch












.1.3.6.1.4.1.37963.4.0.4.3.0.137
Geo-redundant peers running incompatible software versions.
anFormatDisk













.1.3.6.1.4.1.37963.4.0.4.3.0.138
Disk format operation took place.
anDiskFull













.1.3.6.1.4.1.37963.4.0.4.3.0.139
Disk full
anCaleaPeerLinkDown












.1.3.6.1.4.1.37963.4.0.4.3.0.140
The alarm is generated when the transport connection to the CALEA peer is down. It is cleared when connectivity to the CALEA peer is restored.
anCaleaPeerLinkUp












.1.3.6.1.4.1.37963.4.0.4.3.0.141
Indicates when the transport connection to the CALEA peer comes up. It is deprecated and will be removed in future releases, as the anCaleaPeerLinkDown alarm delivers all link status change notifications. It is not used by the existing code.
anHwNodeDepartureEventData











.1.3.6.1.4.1.37963.4.0.4.3.0.142
Node has departed from cluster.
anGtpPeerUp











.1.3.6.1.4.1.37963.4.0.4.3.0.143
GTP Peer Up Event
anDataFabricOperStateDownPathA













.1.3.6.1.4.1.37963.4.0.4.3.0.144
Inter-node connectivity health check over data fabric path A is down.
anDataFabricOperStateDownPathB













.1.3.6.1.4.1.37963.4.0.4.3.0.145
Inter-node connectivity health check over data fabric path B is down.
anUEPoolThresholdAlarm














.1.3.6.1.4.1.37963.4.0.4.3.0.146
This alarm is generated when the configured threshold for UE pool utilization is crossed.
anBaseSwitchOperStateDownPathA













.1.3.6.1.4.1.37963.4.0.4.3.0.147
Inter-node connectivity health check over base switch path A is down.
anBaseSwitchOperStateDownPathB













.1.3.6.1.4.1.37963.4.0.4.3.0.148
Inter-node connectivity health check over base switch path B is down.
anBaseSwitchOperStateDown













.1.3.6.1.4.1.37963.4.0.4.3.0.149
Inter-node connectivity health check over base switch paths A and B are down.
anNtpSyncError











.1.3.6.1.4.1.37963.4.0.4.3.0.151
Cannot sync with configured NTP servers.
an3000WarmStart











.1.3.6.1.4.1.37963.4.0.4.3.0.152
A WarmStart trap signifies that the an3000/MCC is reinitializing itself such that its configuration is unaltered.
anLinkUp














.1.3.6.1.4.1.37963.4.0.4.3.0.153
A logical link has transitioned from state down to state up.
anLinkDown














.1.3.6.1.4.1.37963.4.0.4.3.0.154
A logical link has transitioned from state up to state down.
anNmLoginFailure











.1.3.6.1.4.1.37963.4.0.4.3.0.155
Failed login attempt
anCaleaTargetsCleared











.1.3.6.1.4.1.37963.4.0.4.3.0.162
The trap is generated when all CALEA targets have been removed and the size of the CALEA target data base becomes zero. It is an informational trap and therefore never cleared.
anCaleaInterfacesCleared











.1.3.6.1.4.1.37963.4.0.4.3.0.163
This alarm is generated when all Legal Intercept Mediation device Interfaces have been deleted. It is an informational alarm and is never cleared.
anCaleaUtilizationLow











.1.3.6.1.4.1.37963.4.0.4.3.0.164
The alarm is generated when the Configured Legal Intercept Targets Utilization is greater than 60% and less than 70% of the maximum capacity. It is cleared when the utilization becomes less than or equal to 60%.
anCaleaUtilizationMedium











.1.3.6.1.4.1.37963.4.0.4.3.0.165
This Alarm is generated when Configured Legal Intercept Targets are above 70% but below 80% of maximum allowed configurable targets. It is cleared when the utilization is less than or equal to 70%.
anCaleaUtilizationHigh











.1.3.6.1.4.1.37963.4.0.4.3.0.166
This Alarm is generated when Configured Legal Intercept Targets are above 80% but below 90% of maximum allowed targets. It is cleared when the utilization is less than or equal to 80%.
anCaleaUtilizationCritical











.1.3.6.1.4.1.37963.4.0.4.3.0.167
This Alarm is generated when Configured Legal Intercept Targets are above 90% but below 100% of maximum allowed targets. It is cleared when the utilization is less than or equal to 90%.
anBaseSwitchReachabilityDiffersPathAPathB













.1.3.6.1.4.1.37963.4.0.4.3.0.168
Base switch node reachability differs between path A and path B.
anDataFabricReachabilityDiffersPathAPathB













.1.3.6.1.4.1.37963.4.0.4.3.0.169
Map of reachable nodes over data fabric path A differs from path B.
anIpBgpPeerOperStatusDown


















.1.3.6.1.4.1.37963.4.0.4.3.0.186
A BGP peering is not in Established state. The alarm is raised when peering starts, restarts, cleared, or when a peering leaves Established state due to a protocol or networking event. The alarm is cleared when a peering enters Established state.
anCaleaCCBufferConfiguredSizeBelowThreshold












.1.3.6.1.4.1.37963.4.0.4.3.0.189
The alarm is generated when the configured size for the CC buffer on the interface group is less than the minimum threshold value (10MB).
fmSWCompMCMSwitchoverEventData














.1.3.6.1.4.1.37963.4.0.4.3.0.19
An MCM switchover has taken place.
anCaleaCCBufferUtilizationThresholdReached












.1.3.6.1.4.1.37963.4.0.4.3.0.190
This alarm is generated when the buffer utilization threshold is reached for the CC buffer on the interface group.
anCaleaIRIBufferUtilizationThresholdReached












.1.3.6.1.4.1.37963.4.0.4.3.0.191
This alarm is generated when the buffer utilization threshold is reached for the IRI buffer on the interface group.
anCaleaTargetDBMaxSubsLimitReached











.1.3.6.1.4.1.37963.4.0.4.3.0.192
The alarm is generated when the number of entries in the target DB reaches the maximum allowed value of 32,768.
anCaleaIRIBufferConfiguredSizeBelowThreshold












.1.3.6.1.4.1.37963.4.0.4.3.0.193
The alarm is generated when the configured size for the IRI buffer on the interface group is less than the minimum threshold value (1 MB).
anCaleaIfOrIfGroupConfigChange












.1.3.6.1.4.1.37963.4.0.4.3.0.194
The alarm is raised when the configuration for a CALEA interface/interface group is modified in any way (added, changed or deleted).
anCaleaLITargetCreatedOrDeleted











.1.3.6.1.4.1.37963.4.0.4.3.0.195
The alarm is generated whenever a CALEA Lawful Intercept target is created or deleted.
anCaleaInterfaceGroupStatusDown













.1.3.6.1.4.1.37963.4.0.4.3.0.196
The alarm is generated whenever the interface group status changes from up to down. It is cleared when the status changes back to up.
anCaleaCCBufferDataLost












.1.3.6.1.4.1.37963.4.0.4.3.0.197
The alarm is generated whenever CC buffer data is lost because the buffer size was exceeded and inserting additional data in the buffer caused earlier packets to be lost.
anCaleaIRIBufferDataLost












.1.3.6.1.4.1.37963.4.0.4.3.0.198
The alarm is generated whenever IRI buffer data is lost because the buffer size was exceeded and inserting additional data in the buffer caused earlier packets to be lost.
anHwExtStorageCreateFailure














.1.3.6.1.4.1.37963.4.0.4.3.0.199
Failure during the creation of an extended-storage disk partition
anHwExtStorageSizeMismatch













.1.3.6.1.4.1.37963.4.0.4.3.0.200
Alarm is generated when the extended-storage disk size is not matched between the Active and Standby MCMs
anHwNoExtStorageDiskAvailable












.1.3.6.1.4.1.37963.4.0.4.3.0.201
This alarm is generated when an ext-storage disk is required but none has been created
anHwNotEnoughFreeStorageSpace













.1.3.6.1.4.1.37963.4.0.4.3.0.202
Lack of sufficient free storage space available
anHwExtStorageMoveFilesTimeout












.1.3.6.1.4.1.37963.4.0.4.3.0.203
Event generated when moving files from one storage site to another exceeds timeout.
anHwExtStorageCloseFilesTimeout












.1.3.6.1.4.1.37963.4.0.4.3.0.204
Event generated when waiting for files to close on a disk partition exceeds a timeout
anDataRecordFailure











.1.3.6.1.4.1.37963.4.0.4.3.0.205
The system failed to log a data record (i.e. local CDR, HTDR or other such data records).  This failure can occur either at the source generating the data record or at the agent which is responsible for flush the data record to the disk.
anPacketEngineError














.1.3.6.1.4.1.37963.4.0.4.3.0.206
The network packet engine has encountered an error preventing any data plane communication on the current node (control plane is not affected)
anPacketEngineCongestion














.1.3.6.1.4.1.37963.4.0.4.3.0.207
The packet network engine is experiencing congestion, no impact at warning level. At critical alarm level, priority based packet drops are possible. Reception is affected until packet memory returns to an acceptable level.
anExtractionPending













.1.3.6.1.4.1.37963.4.0.4.3.0.208
Fru entered Extraction pending state
anInsertionPending













.1.3.6.1.4.1.37963.4.0.4.3.0.209
Fru entered insertion pending state
anDataFabricPartialReachabilityPathA













.1.3.6.1.4.1.37963.4.0.4.3.0.210
Inter-node connectivity health check detects partial connectivity with peer nodes over data plane path A.
anRemoteMountFailed











.1.3.6.1.4.1.37963.4.0.4.3.0.211
This alarm is raised when a node cannot reach over the nfs mount to the disk on peer MCM.   For active MCM, the peer MCM is the standby MCM.  For all nodes, the peer MCM is the active MCM.
anEmergencyCallAttemptFailed












.1.3.6.1.4.1.37963.4.0.4.3.0.214
This alarm is generated when the system fails to setup emergency bearers for a session due to reasons such as lack of resources or memory or other call processing errors.
anEmergencyCallDropped












.1.3.6.1.4.1.37963.4.0.4.3.0.215
This alarm is generated when active emergency bearers are deactivated due to operator intervention such as deactivation initiated through CLI.
anCntnOnlineCatDBInstallationFailure














.1.3.6.1.4.1.37963.4.0.4.3.0.218
Online Categorization Database Installation Failed
anWagServiceDown












.1.3.6.1.4.1.37963.4.0.4.3.0.220
A WAG service is operationally down.
anWagServiceUp












.1.3.6.1.4.1.37963.4.0.4.3.0.221
A WAG service is operationally up.
anEdrServerConnectionFailed














.1.3.6.1.4.1.37963.4.0.4.3.0.222
The connection to the EDR server has failed.
anLicenseCapacityEnforcement











.1.3.6.1.4.1.37963.4.0.4.3.0.223
Approaching or crossed licensed service capacity enforcement level. Upon reaching X percent of the capacity enforcement level, a major event will be generated. The event will become critical as the enforcement level is crossed.
anLicenseCapacityLimit











.1.3.6.1.4.1.37963.4.0.4.3.0.224
Approaching or crossed licensed service capacity limit. Upon reaching X percent of the capacity limit, a major event will be generated. The event will become critical as the limit is crossed.
anLicenseLifetimeEnforcement











.1.3.6.1.4.1.37963.4.0.4.3.0.225
Approaching or passed licensed service enforcement expiration date. Upon reaching X percent of the license expiration date, a major event will be generated. The event will become critical as the expiration is passed.
anLicenseLifetime











.1.3.6.1.4.1.37963.4.0.4.3.0.226
Approaching or passed licensed service lifetime. Upon reaching X percent of the license lifetime, a major event will be generated. The event will become critical as the lifetime is passed.
anLicensePlsSeparation











.1.3.6.1.4.1.37963.4.0.4.3.0.227
The MCC has separated from the PLS server and enter local license management state. During this period, the MCC will manage licenses based on the last PLS view. Services will be impacted if the server is not restored within the grace period.
anLicensePlsGraceExpired











.1.3.6.1.4.1.37963.4.0.4.3.0.228
Connection to the PLS server has not reestablished within the grace period so license-able services are terminated.
fmNmAn3000ColdStart











.1.3.6.1.4.1.37963.4.0.4.3.0.23
A ColdStart trap signifies that the an3000/MCC is reinitializing itself and that its configuration may have been altered.
anEpdgServiceUp












.1.3.6.1.4.1.37963.4.0.4.3.0.230
An ePDG service is operationally up.
anEpdgServiceDown












.1.3.6.1.4.1.37963.4.0.4.3.0.231
An ePDG service is operationally down.
anPkix509expiring











.1.3.6.1.4.1.37963.4.0.4.3.0.232
An X509 certificate is approaching expiration
anPkix509expired











.1.3.6.1.4.1.37963.4.0.4.3.0.233
An X509 certificate has expired
anPkix509revoked











.1.3.6.1.4.1.37963.4.0.4.3.0.234
An X509 certificate has been revoked
anPkiobjunreachable











.1.3.6.1.4.1.37963.4.0.4.3.0.235
Attempts to update a pki object from a remote source have failed for more than 24 hours
anPkiobjadded











.1.3.6.1.4.1.37963.4.0.4.3.0.236
A new pki object has been added to the system
anPkiobjupdated











.1.3.6.1.4.1.37963.4.0.4.3.0.237
An existing pki object has been updated
anPkiobjremoved











.1.3.6.1.4.1.37963.4.0.4.3.0.238
A pki object has been removed from the system
anPacketEngineWatchdogAlarm














.1.3.6.1.4.1.37963.4.0.4.3.0.239
The packet network engine has experienced a critical error that is preventing packet processing.  Packet processing is stopped.
fmNmAn3000Test











.1.3.6.1.4.1.37963.4.0.4.3.0.24
A test event
anPkix509crlnextupdateavailable











.1.3.6.1.4.1.37963.4.0.4.3.0.240
The next update of this x509 certificate revocation list is available
anPacketEngineKNIConfigurationMismatch












.1.3.6.1.4.1.37963.4.0.4.3.0.241
A mismatch exists between the provisioned packet processing resources and what node booted with.
anIsolCpusMismatch












.1.3.6.1.4.1.37963.4.0.4.3.0.242
Incorrect number of Isol Cpus for this platform
anReleaseMismatch












.1.3.6.1.4.1.37963.4.0.4.3.0.244
one or more nodes are running a different tos release than they are intended to be running and neither an upgrade nor a rollback is in progress.
anIpsecTunnelOperStatusDown












.1.3.6.1.4.1.37963.4.0.4.3.0.246
IPsec TUNNEL-DOWN
anIpsecTunnelOperStatusUp












.1.3.6.1.4.1.37963.4.0.4.3.0.247
IPsec TUNNEL-UP
anPkiobjupdatenotavailable











.1.3.6.1.4.1.37963.4.0.4.3.0.248
Attempts to get an updated version of a pki object from a remote source have failed for more than 24 hours
anPkisshauthorizedkeyaddedtouser











.1.3.6.1.4.1.37963.4.0.4.3.0.249
An ssh public key has been configured to authenticate ssh for a user
fmNmAn3000Commit











.1.3.6.1.4.1.37963.4.0.4.3.0.25
An NMD configuration has been committed.
anPkisshauthorizedkeyremovedfromuser











.1.3.6.1.4.1.37963.4.0.4.3.0.250
An ssh public key has been removed from those that may authenticate ssh for a user
anPkisshauthorizedkeyaddedtogroup











.1.3.6.1.4.1.37963.4.0.4.3.0.251
An ssh public key has been configured to authenticate ssh for all users in a group
anPkisshauthorizedkeyremovedfromgroup











.1.3.6.1.4.1.37963.4.0.4.3.0.252
An ssh public key has been removed from those that may authenticate ssh for all users in a group
anPkisshtrustedcakeyaddedtocluster











.1.3.6.1.4.1.37963.4.0.4.3.0.253
An ssh public key has been trusted as a certificate authority key to validate certificates used to authenticate ssh for any user in the cluster
anPkisshtrustedcakeyremovedfromcluster











.1.3.6.1.4.1.37963.4.0.4.3.0.254
An ssh public key that had been trusted as a certificate authority key to validate certificates used to authenticate ssh for any user in the cluster has been removed
anPkisshtrustedcakeyaddedtogroup











.1.3.6.1.4.1.37963.4.0.4.3.0.255
An ssh public key has been trusted as a certificate authority key to validate certificates used to authenticate ssh for all users in a group
anPkisshtrustedcakeyremovedfromgroup











.1.3.6.1.4.1.37963.4.0.4.3.0.256
An ssh public key that had been trusted as a certificate authority key to validate certificates used to authenticate ssh for all users in a group has been removed
anPkisshuseraddedtoauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.257
A user has been added to the group list of authorized principals
anPkisshuserremovedfromauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.258
A user has been removed from the group list of authorized principals
anPkisshgroupaddedtoauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.259
All users in a group have been added to the group list of authorized principals
anPkisshgroupremovedfromauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.260
All users in a group have been removed from the group list of authorized principals
anfileexportfailure












.1.3.6.1.4.1.37963.4.0.4.3.0.261
Last try to export files to the export directory (as per configuration) failed.
anPkisshnamesaddedtogroupauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.262
One or mores names have been added to a group authorized principals list
anPkissherrorapplyingconfigurationtosshcontrolfiles











.1.3.6.1.4.1.37963.4.0.4.3.0.263
An error has occurred converting pki ssh configuration to ssh authorizedkeys/authorizedprincipals/trustedusercakeys files
anPkisshnamesremovedfromauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.264
One or mores names have been removed from a user authorized principals list
anPkisshnamesaddedtoauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.265
One or mores names have been added to a user authorized principals list
anPkisshnamesremovedfromgroupauthorizedprincipals











.1.3.6.1.4.1.37963.4.0.4.3.0.266
One or mores names have been removed from a group authorized principals list
anPkisshmaximumsecuritylevelset











.1.3.6.1.4.1.37963.4.0.4.3.0.267
The ssh security level for the cluster has been changed to maximum
anPkisshcompatiblesecuritylevelset











.1.3.6.1.4.1.37963.4.0.4.3.0.268
The ssh security level for the cluster has been changed to compatible
anPkisshstricthostkeycheckingsettono











.1.3.6.1.4.1.37963.4.0.4.3.0.269
The ssh strict host key checking for the cluster has been changed to no
anPkisshstricthostkeycheckingsettoask











.1.3.6.1.4.1.37963.4.0.4.3.0.270
The ssh strict host key checking for the cluster has been changed to ask
anPkisshstricthostkeycheckingsettoyes











.1.3.6.1.4.1.37963.4.0.4.3.0.271
The ssh strict host key checking for the cluster has been changed to yes
anPkisshverifyhostkeydnssettono











.1.3.6.1.4.1.37963.4.0.4.3.0.272
The ssh verify host key with dns for the cluster has been changed to no
anPkisshverifyhostkeydnssettoyes











.1.3.6.1.4.1.37963.4.0.4.3.0.273
The ssh verify host key with dns for the cluster has been changed to yes
anPkisshverifyhostkeydnssettoask











.1.3.6.1.4.1.37963.4.0.4.3.0.274
The ssh verify host key with dns for the cluster has been changed to ask
anPkisshknownhostcakeyremoved











.1.3.6.1.4.1.37963.4.0.4.3.0.275
The ssh public key of a certificate authority has been removed from ssh_known_hosts.
anPkisshknownhostcakeyadded











.1.3.6.1.4.1.37963.4.0.4.3.0.276
The ssh public key of a certificate authority has been added to ssh_known_hosts to validate the host certificates presented on connection by ssh/scp/sftp to external servers
anPkisshknownhostkeyremoved











.1.3.6.1.4.1.37963.4.0.4.3.0.277
An ssh public key has been removed from ssh_known_hosts.
anPkisshknownhostkeyadded











.1.3.6.1.4.1.37963.4.0.4.3.0.278
An ssh public key has been added to ssh_known_hosts to validate connections by ssh/scp/sftp to external servers
anPkisshlocalhostcertificatereplaced











.1.3.6.1.4.1.37963.4.0.4.3.0.279
The previous local ssh host certificate has been replaced by a new ssh certificate.
fmHmCacheOperStateDown











.1.3.6.1.4.1.37963.4.0.4.3.0.28
CSM cache operationally down.
anPkisshlocalhostcertificateremoved











.1.3.6.1.4.1.37963.4.0.4.3.0.280
The local ssh host certificate has been removed.
anPkisshlocalhostcertificateadded











.1.3.6.1.4.1.37963.4.0.4.3.0.281
The local ssh host certificate has been added.
anPkisshrevoked











.1.3.6.1.4.1.37963.4.0.4.3.0.282
An ssh key or certificate has been revoked by an ssh krl file
anPkimanuallyrevoked











.1.3.6.1.4.1.37963.4.0.4.3.0.283
An ssh key or certificate has been manually reported as revoked by a revoke cli command
anPkisshuserkrlreplaced











.1.3.6.1.4.1.37963.4.0.4.3.0.285
A new or updated pki ssh krl file has replaced the previous ssh krl as the RevokedKeys file to the sshd servers.
anPkisshuserkrladded











.1.3.6.1.4.1.37963.4.0.4.3.0.286
A pki ssh krl file has been added as the RevokedKeys file to the sshd servers.
anPkisshuserkrlremoved











.1.3.6.1.4.1.37963.4.0.4.3.0.287
The ssh krl file that was providing a list of revoked ssh keys has been removed from RevokedKeys on the sshd servers.
anPkisshcertexpiring











.1.3.6.1.4.1.37963.4.0.4.3.0.288
An ssh certificate is approaching expiration
anPkisshcertexpired











.1.3.6.1.4.1.37963.4.0.4.3.0.289
An ssh certificate has expired
anTemperatureAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.29
HW sensor raising temperature alarm.
anCntnFilterHashListFileInvalidEntry











.1.3.6.1.4.1.37963.4.0.4.3.0.291
Adding filterHashList got error as file has invalid entry.
anCntnFilterHashListFileNotFound











.1.3.6.1.4.1.37963.4.0.4.3.0.292
Adding filterHashList failed as file does not exist on NE.
anCntnFilterHashListFileOverflow











.1.3.6.1.4.1.37963.4.0.4.3.0.293
Adding FilterHashList failed as exceeded max supported filter entries per filter database size.
anCntnFilterHashListFileTooBig











.1.3.6.1.4.1.37963.4.0.4.3.0.294
Adding filterHashList failed as file is too big.
anGwSubsGrpFileNotFound













.1.3.6.1.4.1.37963.4.0.4.3.0.296
File containing Subscriber IDs configured for the subscriber-group does not exist on the MCC.
anNewMemImageFileDetected












.1.3.6.1.4.1.37963.4.0.4.3.0.298
A new memory image file is detected on the chassis
anCaleaUserBanFeatureConfigChange












.1.3.6.1.4.1.37963.4.0.4.3.0.299
This alarm is generated when admin state of Calea User Ban Feature is changed
anVoltageAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.30
HW sensor raising voltage alarm.
anCaleaCCDataLost












.1.3.6.1.4.1.37963.4.0.4.3.0.300
The alarm is generated when CC data is first lost on an interface which is down (and no interface-group is provisioned for target)
anCaleaIRIDataLost












.1.3.6.1.4.1.37963.4.0.4.3.0.301
The alarm is generated when IRI data is first lost on an interface which is down (and no interface-group is provisioned for target)
anIpOspfv2NbrDown












.1.3.6.1.4.1.37963.4.0.4.3.0.302
An OSPFv2 neighbor is not in Full/2-Way state. The alarm will be generated when a neighbor leaves Full/2-Way state. The alarm is cleared when neighbor enters Full/2-Way state.
anIpOspfv3NbrDown












.1.3.6.1.4.1.37963.4.0.4.3.0.303
An OSPFv3 neighbor is not in Full/2-Way state. The alarm will be generated when a neighbor leaves Full/2-Way state. The alarm is cleared when neighbor enters Full/2-Way state.
anNatPoolSessionAlarmThreshold













.1.3.6.1.4.1.37963.4.0.4.3.0.304
The nat-pool session utilization has exceeded threshold. This may potentially lead to session or connection setup failures.
anNatPoolIpAddressAlarmThreshold













.1.3.6.1.4.1.37963.4.0.4.3.0.305
The nat-pool IP address utilization has exceeded threshold. This may potentially lead to session or connection setup failures.
anNatPoolPortChunkAlarmThreshold













.1.3.6.1.4.1.37963.4.0.4.3.0.306
The nat-pool Port chunk utilization has exceeded threshold. This may potentially lead to session or connection setup failures.
anNewFaultFileDetected












.1.3.6.1.4.1.37963.4.0.4.3.0.309
A new fault file has been detected on the chassis
anHotSwapAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.31
HW sensor raising hot swap alarm.
anTelcoAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.32
HW Sensor Raising Telco Alarm
anCntnHealthCheckStateDown













.1.3.6.1.4.1.37963.4.0.4.3.0.320
The service monitored by content health check is not reachable.
anPfcpPeerDown















.1.3.6.1.4.1.37963.4.0.4.3.0.321
PFCP Peer down indicates that the remote PFCP Peer is not responding to any of the PFCP messages sent to it.
anPfcpPeerUp















.1.3.6.1.4.1.37963.4.0.4.3.0.322
PFCP Peer is up, running and reachable.
anCaleaIfGrpSourceProfileConfigChange












.1.3.6.1.4.1.37963.4.0.4.3.0.323
The alarm is raised when the configuration for a CALEA interface-group-source-profile is modified in any way (added, changed or deleted).
anCaleaIfGrpSourceProfileNotFound












.1.3.6.1.4.1.37963.4.0.4.3.0.324
The alarm is raised when the CALEA subsystem is unable to find an interface-group-source-profile for a dynamic target interface/group.
anBfdSessionDown












.1.3.6.1.4.1.37963.4.0.4.3.0.329
This event is generated when a BFD session goes down. It is cleared when the BFD session goes up. A gratuitous clear will happen the first time the BFD session goes up. Toggled by ip-protocols/bfd/enable-bfd-session-down-alarms
anWatchdogAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.33
HW Sensor Raising Watchdog Alarm
anNodeRebootRequired












.1.3.6.1.4.1.37963.4.0.4.3.0.332
Node needs to be rebooted because one or more of the following have changed on the node. 1. isolcpus 2. core-layout
anPortmapFailure













.1.3.6.1.4.1.37963.4.0.4.3.0.333
The network ports are not in the correct order, which causes connectivity to the desired network to appear broken.
anRadiusAccountingOnMsgNotSent











.1.3.6.1.4.1.37963.4.0.4.3.0.334
PGW is not accepting sessions using RADIUS towards peer Radius server due to operator configuration
anCntnCACertExpired














.1.3.6.1.4.1.37963.4.0.4.3.0.335
One or multiple CA (Certificate Authority) certificates have expired.
anClusterRebootRequired












.1.3.6.1.4.1.37963.4.0.4.3.0.338
The cluster needs to be rebooted because one or more of the following have changed on one or more nodes in the cluster. 1. isolcpus 2. core-layout 3. max-packet-size
anFanAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.34
HW Sensor Raising Fan Alarm
anCaleaPdhirNotSupportedForSx3lifTunnelToCPF











.1.3.6.1.4.1.37963.4.0.4.3.0.342
This alarm is generated to indicate control plane will not deliver PDHIR events when CALEA target config is having PDHIR enabled in SX3LIF mode
anCaleaDecryptFail











.1.3.6.1.4.1.37963.4.0.4.3.0.343
The alarm is generated when encrypted CALEA Lawful Intercept data can not be decrypted (could be security key mismatch between CPF and UPF)
anDnsServerConfigLoadFail











.1.3.6.1.4.1.37963.4.0.4.3.0.348
Loading the config file for Dns Server Failed.
anDnsServerRecClientHardLimitExceeded











.1.3.6.1.4.1.37963.4.0.4.3.0.349
Hard quota for recursive clients reached. Incoming requests are dropped, and for each one, a pending request is dropped.
anAirFilterAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.35
HW sensor raising air filter alarm.
anDnsServerRecClientSoftLimitExceeded











.1.3.6.1.4.1.37963.4.0.4.3.0.350
Soft quota for recursive clients reached. Incoming requests are accepted, but for each one, a pending request is dropped. If recursive-clients is set greater than 1000, soft quota is recursive-clients minus 100; else it is 90% of recursive-clients.
anDnsServerZoneLoadFail











.1.3.6.1.4.1.37963.4.0.4.3.0.351
Loading the zone file for Dns Server Failed.
anTaskTermination












.1.3.6.1.4.1.37963.4.0.4.3.0.354
A task has been terminated
anTachAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.36
HW sensor raising tach alarm..
anHWAlarm















.1.3.6.1.4.1.37963.4.0.4.3.0.37
HW sensor raising hardware alarm.
fmCntnFilterCategoryFileTooBig











.1.3.6.1.4.1.37963.4.0.4.3.0.39
Adding CF category failed as file is too large.
fmCntnFilterCategoryFileNotFound











.1.3.6.1.4.1.37963.4.0.4.3.0.40
Adding CF category failed as file does not exist on NE.
fmCntnFilterCategoryFileOverflow











.1.3.6.1.4.1.37963.4.0.4.3.0.41
Adding CF category failed as exceeded max supported filter entries per filter database size.
fmCntnFilterBlacklistFileOverflow











.1.3.6.1.4.1.37963.4.0.4.3.0.42
Adding CF blacklist failed as exceeded max supported filter entries per filter database size.
fmCntnFilterBlacklistFileTooBig











.1.3.6.1.4.1.37963.4.0.4.3.0.44
Adding CF blacklist failed as file is too large.
fmCntnFilterBlacklistFileNotFound











.1.3.6.1.4.1.37963.4.0.4.3.0.45
Adding CF blacklist failed as file does not exist on NE.
anCardNotBootingUp











.1.3.6.1.4.1.37963.4.0.4.3.0.46
Card is plugged in but not operational
fmCntnFilterCategoryFileInvalidEntry











.1.3.6.1.4.1.37963.4.0.4.3.0.47
Adding CF category got error as file has invalid entry.
fmCntnFilterBlacklistFileInvalidEntry











.1.3.6.1.4.1.37963.4.0.4.3.0.48
Adding CF blacklist got error as file has invalid entry.
fmCntnHttpProxyServerConnectFail











.1.3.6.1.4.1.37963.4.0.4.3.0.49
http-proxy failed to connect server.
anCntnFilterWhitelistFileInvalidEntry











.1.3.6.1.4.1.37963.4.0.4.3.0.56
Adding CF whitelist got error as file has invalid entry.
anCntnFilterWhitelistFileOverflow











.1.3.6.1.4.1.37963.4.0.4.3.0.57
Adding CF whitelist failed as exceeded max supported filter entries per filter database size.
anCntnFilterWhitelistFileTooBig











.1.3.6.1.4.1.37963.4.0.4.3.0.58
Adding CF whitelist failed as file is too large.
anCntnFilterWhitelistFileNotFound











.1.3.6.1.4.1.37963.4.0.4.3.0.59
Adding CF whitelist failed as file does not exist on NE.
anGtpPeerDown











.1.3.6.1.4.1.37963.4.0.4.3.0.60
GTP peer down.  This indicates that the remote GTP peer is not responding to any GTP messages sent to it.  If the peer is statically provisioned, the severity is Major.  If the peer is dynamic, the severity is Info.
anCacheDiskOperationalStateAlarm











.1.3.6.1.4.1.37963.4.0.4.3.0.61
Monitor the cache SSD operational state.
anCntnUrlListFileInvalidEntry











.1.3.6.1.4.1.37963.4.0.4.3.0.62
Adding urlList got error as file has invalid entry.
anCntnUrlListFileOverflow











.1.3.6.1.4.1.37963.4.0.4.3.0.63
Adding UrlList failed as exceeded max supported filter entries per filter database size.
anCntnUrlListFileNotFound











.1.3.6.1.4.1.37963.4.0.4.3.0.64
Adding urlList failed as file does not exist on NE.
anCntnUrlListFileTooBig











.1.3.6.1.4.1.37963.4.0.4.3.0.65
Adding urlList failed as file is too big.
anPlaFileDownloadFail











.1.3.6.1.4.1.37963.4.0.4.3.0.67
Policy lists agent failed to download a policy file from external server.
anThresholdCrossingAlarm











.1.3.6.1.4.1.37963.4.0.4.3.0.68
A threshold has been crossed.
anTaskOverload



















.1.3.6.1.4.1.37963.4.0.4.3.0.69
A task has generated an overload event.
anBladeOverload

















.1.3.6.1.4.1.37963.4.0.4.3.0.70
This blade has generated an overload event.
anSystemOverload















.1.3.6.1.4.1.37963.4.0.4.3.0.71
This system has generated an overload event
anCantPageSubscriberOutOfBuffers














.1.3.6.1.4.1.37963.4.0.4.3.0.73
FP ran out of paging buffers
anLedStateChange















.1.3.6.1.4.1.37963.4.0.4.3.0.74
LED state change.
anRebootEvent













.1.3.6.1.4.1.37963.4.0.4.3.0.78
Module rebooted.
anCacheDiskErrorStateAlarm













.1.3.6.1.4.1.37963.4.0.4.3.0.79
Monitor the Cache SSD read/write error state.
anPayloadFailure














.1.3.6.1.4.1.37963.4.0.4.3.0.80
The specified payload has experienced a hardware or firmware failure.
anLDAPServerConnectFail














.1.3.6.1.4.1.37963.4.0.4.3.0.81
Failed to connect LDAP server.
anLDAPServerConnectLost














.1.3.6.1.4.1.37963.4.0.4.3.0.82
LDAP server connection lost.
anLDAPProfNoServerConnected












.1.3.6.1.4.1.37963.4.0.4.3.0.83
LDAP profile does not have a connection to remote server.
anCntnUaProfDefaultAttsMissing











.1.3.6.1.4.1.37963.4.0.4.3.0.86
Missing required attributes in the default UA profile.
anIpInterfaceOperStatusDown












.1.3.6.1.4.1.37963.4.0.4.3.0.88
The operational status of an IP interface is down.
anDiameterPeerLinkDown
















.1.3.6.1.4.1.37963.4.0.4.3.0.89
Transport connection to the diameter peer is down.
anDiameterPeerLinkUp
















.1.3.6.1.4.1.37963.4.0.4.3.0.90
Diameter Peer Transport Connection Up Event
anRadiusPeerDown













.1.3.6.1.4.1.37963.4.0.4.3.0.91
The RADIUS peer health check failed and this RADIUS peer is declared down.
anRadiusPeerUp













.1.3.6.1.4.1.37963.4.0.4.3.0.92
Radius Peer Up Event
anGtppPeerDown












.1.3.6.1.4.1.37963.4.0.4.3.0.93
The Transport connection to Gtpp peer is down.
anGtppPeerUp












.1.3.6.1.4.1.37963.4.0.4.3.0.94
Gtpp Peer Up Event
anSMSCServerConnectFail













.1.3.6.1.4.1.37963.4.0.4.3.0.95
Failed to connect to SMSC server.
anSMSCProfNotFound












.1.3.6.1.4.1.37963.4.0.4.3.0.96
SMSC profile not found.
anSMSCServerConnectLost













.1.3.6.1.4.1.37963.4.0.4.3.0.97
SMSC server connection lost.
anPdnSessionAntiSpoofing













.1.3.6.1.4.1.37963.4.0.4.3.0.98
The UE sent an IP packet with an unassigned source address.
anSgwServiceUp












.1.3.6.1.4.1.37963.4.0.4.3.0.99
A SGW service is operationally up.