Brocade, Brocade Assurance, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, MLX, NetIron, SAN Health, ServerIron,
TurboIron, VCS, and VDX are registered trademarks, and AnyIO, Brocade One, CloudPlex, Effortless Networking, ICX, NET Health,
OpenScript, and The Effortless Network are trademarks of Brocade Communications Systems, Inc., in the United States and/or in
other countries. Other brands, products, or service names mentioned may be trademarks of their respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find-out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Document History
TitlePublication
number
Diagnostic and System Error
Message Reference v3.0, v4.0
Diagnostic and System Error
Message Reference v3.1.0
Diagnostic and System Error
Message Reference v4.1.0
Diagnostic and System Error
Message Reference v4.1.2
Diagnostic and System Error
Message Reference v4.2.0
Diagnostic and System Error
Message Reference v4.2.0
53-0000210-02 First releaseMarch 2002
53-0000511-04 Major content reorganizationJune 2003
54-0000515-02 Major content reorganizationJune 2003
53-0000515-06 Minor editorial changesOctober 2003
53-0000515-07Added FW and PLATFORM messagesDecember 2003
53-0000515-08 Updated software and hardware supportMarch 2004
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
Summary of changesDate
TitlePublication
number
Summary of changesDate
Fabric OS System Error Message
Reference Manual
Fabric OS System Error Message
Reference Manual
Fabric OS System Error Message
Reference Manual
Fabric OS System Error Message
Reference Manual
Fabric OS System Error Message
Reference Manual
Fabric OS Message Reference53-1000242-01Updated for Fabric OS v5.2.0:
Fabric OS Message Reference53-1000437-01Updated for Fabric OS v5.3.0:
Fabric OS Message Reference53-1000600-01 Updated for Fabric OS v6.0.0:
Fabric OS Message Reference53-1000600-02 Updated for Fabric OS v6.1.0:
Fabric OS Message Reference53-1001116-01Updated for Fabric OS v6.1.1_enc:
53-0000515-09 Updated for v4.4.0,
First RASLog release
53-0000515-10Added 22 ZONE messagesApril 2005
53-0000515-11Added FICU-1010, HAMK-1004, and
PLAT-1001
53-1000046-01 Added BM, FCR, IPS, FCIP, SEC, and
ZONE messages
53-1000046-02 Minor updates to a few messages.June 2006
-Changed doc title and number
-Added the following new modules: IBPD,
ICPD, ISCSI, ISNSCD.
Added Audit messages: AUTH, CONF,
HTTP, SEC, SNMP, SULB, ZONE.
-Updated Introduction chapter with AUDIT
log information.
-Updated chapter titles.
-Added new chapters: AG, BKSW, IBD,
IPAD, SAS.
Revised and added new messages to:
AUTH, CDR, CONF, EM, FABR, HAM, ISNS,
ISW, PDM,SEC,TS, KTRC.SEC, TS.
This document is organized to help you find the information that you want as quickly and easily as
possible.
The document contains the following components:
• Chapter 1, “Introduction to System Messages” provides basic information on system
messages.
• Chapter 2, “Log Messages” includes a lookup list for LOG messages.
• Chapter 3, “Audit Messages” includes a lookup list for Audit messages.
• Chapter 4, “FFDC Messages” includes a lookup list for FFDC messages.
• Chapter 5, “Fabric OS System Messages” provides message text, probable cause,
recommended action, and severity for each of the messages.
Supported hardware and software
In those instances in which procedures or parts of procedures documented here apply to some
switches but not to others, this guide identifies exactly which switches are supported and which are
not.
Although many different software and hardware configurations are tested and supported by
Brocade Communications Systems, Inc. for Fabric OS v7.1.0, documenting all possible
configurations and scenarios is beyond the scope of this document.
Fabric OS Message Referencexiii
53-1002749-01
The following hardware platforms are supported by this release of Fabric OS:
• Brocade 300
• Brocade 5100
• Brocade 5300
• Brocade 5410
• Brocade 5424
• Brocade 5430
• Brocade 5450
• Brocade 5460
• Brocade 5470
• Brocade 5480
• Brocade 6505
• Brocade 6510
• Brocade 6520
• Brocade 7800
• Brocade 8000
• Brocade Encryption Switch
• Brocade DCX Backbone and Brocade DCX-4S Backbone
-FC8-16 port blade
-FC8-32 port blade
-FC8-48 port blade
-FC8-64 port blade
-FCOE10-24 DCX Blade
-FS8-18 Encryption Blade
-FX8-24 DCX Extension Blade
• Brocade DCX 8510-8 Backbone and Brocade DCX 8510-4 Backbone
-FC8-32E port blade
-FC8-48E port blade
-FC8-64 port blade
-FC16-32 port blade
-FC16-48 port blade
-FS8-18 Encryption Blade
-FX8-24 DCX Extension Blade
• Brocade VA-40FC
xivFabric OS Message Reference
53-1002749-01
What’s new in this document
The following changes have been made since this document was last released:
• The lookup lists in Chapter 2 through Chapter 4 provide hyperlinks to messages by type (LOG,
Audit, and FFDC).
• Information that was added:
-AG Messages
-ANV Messages
-BL Messages
-C2 Messages
-C3 Messages
-CDR Messages
-CONF Messages
-CVLM Messages
-EM Messages
-FABR Messages
-FCR Messages
-FSPF Messages
-FW Messages
-HAM Messages
-HIL Messages
-KAC Messages
-LOG Messages
-MM Messages
-MS Messages
-NBFS Messages
-PLAT Messages
-PS Messages
-RAS Messages
-SEC Messages
-SS Messages
-SWCH Messages
-TRCE Messages
-VDR Messages
-XTUN Messages
-ZEUS Messages
-ZONE Messages
Fabric OS Message Referencexv
53-1002749-01
• Information that was changed:
-AN Messages
-AUTH Messages
-BL Messages
-C2 Messages
-C3 Messages
-CDR Messages
-CAL Messages
-CNM Messages
-DOT1 Messages
-FABR Messages
-FCOE Messages
-FCPD Messages
-FCR Messages
-FICU Messages
-FSPF Messages
-FSS Messages
-HIL Messages
-HSL Messages
-HTTP Messages
-IPS Messages
-KAC Messages
-KTRC Messages
-L2SS Messages
-LFM Messages
-PMGR Messages
-PS Messages
-RCS Messages
-RTWR Messages
-SEC Messages
-ZONE Messages
xviFabric OS Message Reference
53-1002749-01
• Information that was deleted:
-BLL System Messages
-CER System Messages
-EM Messages
-FCIP System Messages
-FCOE Messages
-HAM Messages
-IBPD System Messages
-ICPD System Messages
-SNMP Messages
-SYSC Messages
-UCST Messages
-ZONE Messages
For further information about new features and documentation updates for this release, refer to
the release notes.
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
bold textIdentifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords and operands
Identifies text to enter at the GUI or CLI
italic textProvides emphasis
Identifies variables
Identifies paths and Internet addresses
Identifies document titles
code textIdentifies CLI output
Identifies command syntax examples
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, switchShow. In actual examples, command lettercase is all lowercase.
Command syntax conventions
Command syntax in this manual follows these conventions:
Fabric OS Message Referencexvii
53-1002749-01
commandCommands are printed in bold.
--option, optionCommand options are printed in bold.
-argument, argArguments.
[ ]Optional element.
variableVariables are printed in italics. In the help pages, values are underlined
enclosed in angled brackets < >.
...Repeat the previous element, for example “member[;member...]”
valueFixed values following arguments are printed in plain font. For example,
--show WWN
|Boolean. Elements are exclusive. Example:
--show -mode egress | ingress
or
Command examples
This book describes how to perform configuration tasks using the Fabric OS command line
interface, but does not describe the commands in detail. For complete descriptions of all Fabric OS
commands, including syntax, operand description, and sample output, see the Fabric OS Command Reference.
Notes, cautions, and warnings
The following notices and statements are used in this manual. They are listed below in order of
increasing severity of potential hazards.
NOTE
A note provides a tip, guidance, or advice, emphasizes important information, or provides a
reference to related information.
ATTENTION
An Attention statement indicates potential damage to hardware or data.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or extremely
hazardous to you. Safety labels are also attached directly to products to warn of these conditions
or situations.
xviiiFabric OS Message Reference
53-1002749-01
Key terms
For definitions specific to Brocade and Fibre Channel, see the technical glossaries on MyBrocade.
See “Brocade resources” on page xix for instructions on accessing MyBrocade.
For definitions of SAN-specific terms, visit the Storage Networking Industry Association online
dictionary at:
http://www.snia.org/education/dictionary
Notice to the reader
This document may contain references to the trademarks of the following corporations. These
trademarks are the properties of their respective companies and corporations.
These references are made for informational purposes only.
CorporationReferenced Trademarks and Products
Red Hat, Inc.Red Hat, Red Hat Network, Maximum RPM, Linux Undercover
Additional information
This section lists additional Brocade and industry-specific documentation that you might find
helpful.
Brocade resources
To get up-to-the-minute information, go to http://my.brocade.com to register at no cost for a user ID
and password.
White papers, online demonstrations, and data sheets are available through the Brocade website
at:
For additional Brocade documentation, visit the Brocade website:
http://www.brocade.com
Release notes are available on the MyBrocade website.
Other industry resources
For additional resource information, visit the Technical Committee T11 website. This website
provides interface standards for high-performance and mass storage applications for Fibre
Channel, storage management, and other applications:
http://www.t11.org
Fabric OS Message Referencexix
53-1002749-01
For information about the Fibre Channel industry, visit the Fibre Channel Industry Association
website:
http://www.fibrechannel.org
Getting technical help
Contact your switch support supplier for hardware, firmware, and software support, including
product repairs and part ordering. To expedite your call, have the following information available:
1. General Information
• Switch model
• Switch operating system version
• Software name and software version, if applicable
• Error numbers and messages received
• supportSave command output
• Detailed description of the problem, including the switch or fabric behavior immediately
following the problem, and specific questions
• Description of any troubleshooting steps already performed and the results
• Serial console and Telnet session logs
• syslog message logs
2. Switch Serial Number
The switch serial number and corresponding bar code are provided on the serial number label,
as illustrated below.
Encryption Switch—On the switch ID pull-out tab located inside the chassis on the port side
on the left.
• Brocade 5410, 5424, 5430, 5450, 5460, 5470, 5480—Serial number label attached to
the module.
• Brocade DCX and DCX 8510-8—On the port side of the chassis, on the lower right side and
directly above the cable management comb.
• Brocade DCX-4S and DCX 8510-4—On the non-port side of the chassis, on the lower left
side.
3. World Wide Name (WWN)
Use the licenseIdShow command to display the WWN of the chassis.
xxFabric OS Message Reference
53-1002749-01
If you cannot use the licenseIdShow command because the switch is inoperable, you can get
the WWN from the same place as the serial number, except for the Brocade DCX. For the
Brocade DCX, access the numbers on the WWN cards by removing the Brocade logo plate at
the top of the non-port side of the chassis.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
This guide supports Fabric OS v7.1.0 and documents system messages that can help you diagnose
and fix problems with a switch or fabric. The messages are organized alphabetically by module
name. A module is a subsystem in the Fabric OS. Each module generates a set of numbered
messages. For each message, this guide provides message text, probable cause, recommended
action, and severity level. There may be more than one cause and more than one recommended
action for any given message. This guide discusses the most probable cause and typical action
recommended.
System message types
Fabric OS supports three types of system messages. A system message can be of one or more of
the following types:
• RASLog messages
• Audit log messages
• FFDC messages
Fabric OS supports a different methodology for storing and accessing each type of message.
Fabric OS Message Reference1
53-1002749-01
Overview of system messages
1
RASLog messages
RASLog messages report significant system events (failure, error, or critical conditions) or
information and are also used to show the status of the high-level user-initiated actions. RASLog
messages are forwarded to the console, to the configured syslog servers, and to the SNMP
management station through the Simple Network Management Protocol (SNMP) traps or informs.
The following is an example of a RASLog system message.
2012/10/25-17:51:05, [C3-1001], 937, CHASSIS, ERROR, switch, Port 18 failed due to
SFP validation failure. Check if the SFP is valid for the configuration.
For information on displaying and clearing the RASLog messages, refer to “Displaying system
message logs and attributes” on page 17.
Audit log messages
Event auditing is designed to support post-event audits and problem determination based on
high-frequency events of certain types such as security violations, zoning configuration changes,
firmware downloads, and certain types of fabric events. Audit messages flagged as AUDIT are not
saved in the switch error logs. The switch can be configured to stream Audit messages to the switch
console and to forward the messages to specified syslog servers. The Audit log messages are not
forwarded to an SNMP management station. There is no limit to the number of audit events.
For any given event, Audit messages capture the following information:
• User Name - The name of the user who triggered the action.
• User Role - The access level of the user, such as root or admin.
• Event Name - The name of the event that occurred.
• Event Information - Information about the event.
The seven event classes described in Table 1 can be audited.
TABLE 1Event classes
Operand Event classDescription
1ZoneYou can audit zone event configuration changes, but not the actual
values that were changed. For example, you may receive a message
that states “Zone configuration has changed,” but the message
does not display the actual values that were changed.
2SecurityYou can audit any user-initiated security event for all management
interfaces. For events that have an impact on the entire fabric, an
audit is only generated for the switch from which the event was
initiated.
3ConfigurationYou can audit configuration downloads of existing SNMP
configuration parameters. Configuration uploads are not audited.
4FirmwareYou can audit configuration downloads of existing SNMP
configuration parameters. Configuration uploads are not audited.
5FabricYou can audit Administration Domain-related changes.
2Fabric OS Message Reference
53-1002749-01
Overview of system messages
TABLE 1Event classes (Continued)
Operand Event classDescription
6FWYou can audit Fabric Watch (FW)-related changes.
7LSYou can audit Virtual Fabric (Logical Switch)-related changes.
8CLIYou can audit the CLI commands executed on the switch.
N/ARASUsed to audit or track the RASLog messages or modules that are
enabled or disabled using the rasAdmin command.
NOTE: The RAS class is not configurable, and it is always enabled
internally.
Fabric OS v7.1.0 generates component-specific Audit messages.
Event auditing is a configurable feature, which is by default disabled. You mus t enable event
auditing using the auditCfg
--enable command to send the events to a configured remote host.
Syslogd must be configured for logging audit messages. You can set up filters to screen out
particular classes of events using the auditCfg command. The defined set of Audit messages is
sent to the configured remote host in the Audit message format, so that they are easily
distinguishable from other syslog events that may occur in the network. For details on how to
configure event auditing, refer to “Configuring event auditing” on page 15.
1
FFDC messages
First Failure Data Capture (FFDC) is used to capture failure-specific data when a problem or failure
is noted for the first time and before the switch reboots, or trace and log buffer get wrapped. All
subsequent iterations of the same error are ignored. This critical debug information is saved in
nonvolatile storage and can be retrieved using the supportSave command. The FFDC data is used
for debugging or analyzing the problem. FFDC is intended for use by Brocade technical support.
FFDC is enabled by default. Execute the supportFfdc command to enable or disable FFDC. If FFDC
is disabled, the FFDC daemon does not capture any data, even when a message with an FFDC
attribute is logged.
The following is an example of the FFDC message.
2000/12/17-08:30:13, [SS-1000], 88, SLOT 6 | FFDC | CHASSIS, INFO, DCX,
supportSave has uploaded support information to the host with IP address
192.0.2.2.
Message severity levels
Tab le 2 shows the four levels of severity for system messages, ranging from CRITICAL (1) to INFO
(4). In general, the definitions are wide ranging and are to be used as general guidelines for
troubleshooting. For all cases, you must look at each specific error message description thoroughly
before taking action.
Fabric OS Message Reference3
53-1002749-01
Overview of system messages
1
TABLE 2Severity levels of a message
Severity levelDescription
1 = CRITICALCritical-level messages indicate that the software has detected serious problems that
2 = ERRORError-level messages represent an error condition that does not impact overall system
3 = WARNINGWarning-level messages highlight a current operating condition that should be
4 = INFOInfo-level messages report the current non-error status of the system components: for
System error message logging
will cause a partial or complete failure of a subsystem if not corrected immediately; for
example, a power supply failure or rise in temperature must receive immediate
attention.
functionality significantly. For example, error-level messages might indicate time-outs
on certain operations, failures of certain operations after retries, invalid parameters, or
failure to perform a requested operation.
checked or it may lead to a failure in the future. For example, a power supply failure in
a redundant system relays a warning that the system is no longer operating in
redundant mode unless the failed power supply is replaced or fixed.
example, detecting online and offline status of a fabric port.
The RASLog service generates and stores messages related to abnormal or erroneous system
behavior. It includes the following features:
• All RASLog error messages are saved to nonvolatile storage by default.
• The system error message log can save a maximum of 1024 messages in random access
memory (RAM).
• The system message log is implemented as a circular buffer. When more than the maximum
entries are added to the log file, old entries are overwritten by new entries.
• Messages are numbered sequentially from 1 to 2,147,483,647 (0x7ffffff). The sequence
number will continue to increase beyond the storage limit of 1024 messages. The sequence
number can be reset to 1 using the errClear command. The sequence number is persistent
across power cycles and switch reboots.
• Trace dump, FFDC, and core dump files can be uploaded to the FTP server using the
supportSave command.
• Brocade recommends that you configure the syslogd facility as a management tool for error
logs. This is particularly important for dual-domain switches because the syslogd facility saves
messages from two logical switches as a single file and in sequential order. For more
information, refer to “System logging daemon” on page 5.
• RASLog messages are streamed to the console, and are forwarded to the configured syslog
servers and to the SNMP management station through the SNMP traps (in SNMPv1 and
SNMPv3) or informs (in SNMPv3). Use the snmpConfig command to configure the SNMPv1
and SNMPv3 hosts and their configurations.
• Audit messages are streamed to the switch console, and are forwarded to the configured
syslog servers. The Audit log messages are not forwarded to an SNMP management station.
4Fabric OS Message Reference
53-1002749-01
Configuring the syslog message destinations
Configuring the syslog message destinations
You can configure the Fabric OS to send the syslog messages to the following output locations:
syslog daemon, system console, and SNMP management station.
System logging daemon
The system logging daemon (syslogd) is a process on UNIX, Linux, and some Windows systems that
reads and logs messages as specified by the system administrator.
Fabric OS can be configured to use a UNIX-style syslogd process to forward system events and error
messages to log files on a remote host system. The host system can be running UNIX, Linux, or any
other operating system that supports the standard syslogd functionality. Configuring for syslogd
involves configuring the host, enabling syslogd on the Brocade model, and, optionally, setting the
facility level.
For the Brocade DCX family of switches, each control processor (CP) has a unique error log,
depending on which CP was active when that message was reported. To fully understand message
logging, you should enable the syslogd, because the logs on the host computer are maintained in a
single merged file for both CPs and are in sequential order. Otherwise, you must examine the error
logs in both CPs, particularly for events such as firmwareDownload or haFailover, for which the
active CP changes.
1
For the Brocade DCX family of switches, any security violations that occur through Telnet, HTTP, or
serial connections are not propagated between CPs. Security violations on the active CP are not
propagated to the standby CP counters in the event of a failover, nor do security violations on the
standby CP get propagated to the active CP counters.
Configuring a syslog server
To configure the switch to forward all system events and error messages to the syslogd of one or
more servers, perform the following steps.
1. Log in to the switch as admin.
2. Execute the syslogdIpAdd IP address command to add a server to which system messages are
forwarded.
switch:admin> syslogdipadd 192.0.2.2
You can configure up to six syslog servers to receive the syslog messages.
3. Execute the syslogdIpShow command to verify the syslog configuration on the switch.
switch:admin> syslogdipshow
syslog.1 192.0.2.2
You can remove a configured syslog server using the syslogdIpRemove IP address command.
System console
The system console displays RASLog messages, Audit messages (if enabled), and panic dump
messages. These messages are mirrored to the system console; they are always saved in one of
the system logs.
Fabric OS Message Reference5
53-1002749-01
Configuring the syslog message destinations
1
The system console displays messages only through the serial port. If you log in to a switch through
the Ethernet port or modem port, you will not receive system console messages.
You can filter messages that display on the system console by severity using the errFilterSet
command. All messages are still sent to the system message log and syslogd (if configured).
Setting the system console severity level
You can limit the types of messages that are logged to the console using the errFilterSet command.
The system messages displayed on the console are filtered up to and include the configured
severity level. You can choose one of the following severity levels: INFO, WARNING, ERROR, or
CRITICAL.
To set the severity levels for the system console, perform the following steps.
1. Log in to the switch as admin.
2. Execute the errFilterSet [-d console -v severity] command to set the console severity level. The severity can be one of the following: INFO, WARNING, ERROR, or CRITICAL. The severity values
are not case-sensitive.
For example, to set the filter severity level for the console to ERROR, enter the following
command.
switch:admin> errfilterset -d console -v error
3. Execute the errFilterSet command to verify the configured filter settings.
An unsolicited message that comes to the management station from the SNMP agent on the
device is called a trap. When an event occurs and if the event severity level is at or below the set
severity level, the SNMP trap, swEventTrap, is sent to the configured trap recipients. The VarBind in
the Trap Data Unit contains the corresponding instance of the event index, time information, event
severity level, the repeat count, and description. The following are the possible severity levels:
• None (0)
• Critical (1)
• Error (2)
• Warning (3)
• Informational (4)
• Debug (5)
By default, the severity level is set to None, implying all traps are filtered and therefore no event
traps are received. When the severity level is set to Informational, all traps with the severity level of
Informational, Warning, Error, and Critical are received. For more information on changing the
severity level of swEventTrap, refer to “Changing the severity level of swEventTrap” on page 11.
NOTE
The Audit messages are not converted into swEventTrap.
6Fabric OS Message Reference
53-1002749-01
Configuring the syslog message destinations
1
The SNMP traps are unreliable because the trap recipient does not send any acknowledgment
when it receives a trap. Therefore, the SNMP agent cannot determine if the trap was received.
Brocade switches send traps out on UDP port 162. To receive traps, the management station IP
address must be configured on the switch. You can configure the SNMPv1 and SNMPv3 hosts to
receive the traps.
For more information on the swEventTrap, refer to the Fabric OS MIB Reference.
Configuring the SNMPv1 trap recipient
Use the snmpConfig --set snmpv1 command to specify the recipient of the SNMP trap. To
configure the SNMPv1 host to receive the trap, perform the following steps.
1. Log in to the switch as admin.
2. Execute the snmpConfig
switch:admin> snmpconfig --set snmpv1
SNMP community and trap recipient configuration:
Community (rw): [Secret C0de]
Trap Recipient's IP address : [192.0.2.2]
Trap recipient Severity level : (0..5) [4]
Trap recipient Port : (0..65535) [162]
Community (rw): [OrigEquipMfr]
Trap Recipient's IP address : [fec0:60:22bc:200:313:72ff:fe64:78b2]
--set snmpv1 command to configure the SNMP trap recipient.
NOTE
To receive the traps, the management station IP address must be configured on the switch.
3. Execute the snmpConfig
switch:admin> snmpconfig --show snmpv1
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
Trap recipient: 192.0.2.2
Trap port: 162
Trap recipient Severity level: 5
Community 2: OrigEquipMfr (rw)
Trap recipient: fec0:60:22bc:200:313:72ff:fe64:78b2
Trap port: 162
Trap recipient Severity level: 5
Community 3: private (rw)
Trap recipient: tools.lab.brocade.com
Trap port: 162
Trap recipient Severity level: 5
Community 4: public (ro)
Trap recipient: 192.0.10.10
Trap port: 65530
Trap recipient Severity level: 1
Community 5: common (ro)
Trap recipient: fec0:60:69bc:200:213:72ff:fe64:069f
Trap port: 11
Trap recipient Severity level: 2
Community 6: FibreChannel (ro)
Trap recipient: WT.org.brocade.com
Trap port: 65521
--show snmpv1 command to verify the SNMPv1 agent configuration.
Fabric OS Message Reference7
53-1002749-01
Configuring the syslog message destinations
1
Trap recipient Severity level: 2
SNMPv1:Enabled
Configuring the SNMPv3 trap recipient
To configure the SNMPv3 host to receive the trap, perform the following steps.
1. Log in to the switch as admin.
2. Execute the snmpConfig
--set snmpv3 command to configure the SNMP trap recipient. Ignore
the step to enable the SNMP informs “SNMP Informs Enabled”.
switch:admin> snmpconfig --set snmpv3
SNMP Informs Enabled (true, t, false, f): [false]
SNMPv3 user configuration(snmp user not configured in FOS user database will
have physical AD and admin role as the default):
User (rw): [snmpadmin1]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (rw): [snmpadmin2]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (rw): [snmpadmin3]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (ro): [snmpuser1]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (ro): [snmpuser2]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (ro): [snmpuser3]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
To receive the SNMP traps, the username, the authentication protocol, the UDP port number,
and the privacy protocol must match between the switch and the management station.
8Fabric OS Message Reference
53-1002749-01
Configuring the syslog message destinations
1
3. Execute the snmpConfig --show snmpv3 command to verify the SNMP agent configuration.
An SNMP inform is similar to the SNMP trap except that the management station that receives an
SNMP inform acknowledges the system message with an SNMP response packet data unit (PDU).
If the sender does not receive the SNMP response PDU, the inform request can be sent again. An
SNMP inform request is saved in the switch memory until a response is received or the request
times out. The informs are more reliable and they consume more resources in the device and in the
network. Use SNMP informs only if it is important that the management station receives all event
notifications. Otherwise, use the SNMP traps. Brocade devices support SNMPv3 informs.
Configuring the SNMPv3 inform recipient
To configure the SNMPv3 host to receive the SNMP informs, perform the following steps.
1. Log in to the switch as admin.
2. Execute the snmpConfig
prompted to enable the SNMP informs, enter true or t. Informs are disabled by default.
switch:admin> snmpconfig --set snmpv3
SNMP Informs Enabled (true, t, false, f): [false] t
SNMPv3 user configuration(snmp user not configured in FOS user database will
have physical AD and admin role as the default):
User (rw): [snmpadmin1]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
--set snmpv3 command to configure the inform recipient. When
To receive the SNMP informs, the username, the authentication protocol, the privacy protocol,
the UDP port number, and the engine ID must match between the switch and the management
station.
The Fabric OS maintains an internal log of all port activity. Each switch or logical switch maintains a
log file for each port. Port logs are circular buffers that can save up to 8000 entries per logical
switch. When the log is full, the newest log entries overwrite the oldest log entries. Port logs capture
switch-to-device, device-to-switch, switch-to-switch, some device A-to-device B, and control
information. Port logs are not persistent and are lost over power cycles and reboots.
Execute the portLogShow command to display the port logs for a particular port.
Execute the portLogEventShow command to display the specific events reported for each port.
Port log functionality is completely separate from the system message log. Port logs are typically
used to troubleshoot device connections.
Changing the severity level of swEventTrap
When an event occurs and if the event severity level is at or below the set severity level, the SNMP
trap, swEventTrap, is sent to the configured trap recipients. By default, the severity level is set at 0
(None), implying that all the event traps are sent. Use the snmpConfig
command to modify the severity level of swEventTrap.
Fabric OS Message Reference11
53-1002749-01
--set mibCapability
Changing the severity level of swEventTrap
1
To change the severity level of swEventTrap, perform the following steps.
1. Log in to the switch as admin.
2. Execute the snmpConfig
--set mibCapability command to configure MIBs interactively. All the
supported MIBs and associated traps are displayed. You can change the DesiredSeverity for
swEventTrap to 1 (Critical), 2 (Error), 3 (Warning), or 4 (Informational). The default value is 0.
SW-TRAP (yes, y, no, n): [yes]
swFault (yes, y, no, n): [yes]
swSensorScn (yes, y, no, n): [yes]
swFCPortScn (yes, y, no, n): [yes]
swEventTrap (yes, y, no, n): [yes]
DesiredSeverity: (0..4) [4] 3
swFabricWatchTrap (yes, y, no, n): [yes]
DesiredSeverity: (0..4) [0] 2
swTrackChangesTrap (yes, y, no, n): [yes]
swIPv6ChangeTrap (yes, y, no, n): [yes]
swPmgrEventTrap (yes, y, no, n): [yes]
[...]
3. Execute the snmpConfig --show mibCapability command to verify the severity level of
swEventTrap.
Commands for displaying and configuring the system message logs
Tab le 3 describes commands that you can use to view or configure the system message logs. Most
commands require the admin access level. For detailed information on required access levels and
commands, refer to the Fabric OS Command Reference.
1
TABLE 3Commands for viewing or configuring the system parameters and message logs
Command Description
auditCfgConfigures the audit message log.
auditDumpDisplays or clears the audit log.
errClearClears all error log messages for all switch instances on this control processor (CP).
errDelimiterSetSets the error log start and end delimiter for messages pushed to the console.
errDumpDisplays the entire error log, without page breaks. Use the -r option to show the
messages in reverse order, from newest to oldest.
errFilterSetSets an error severity filter for the system console.
errModuleShowDisplays all the defined error log modules.
errShowDisplays the entire error log, with page breaks. Use the -r option to show the messages
in reverse order, from newest to oldest.
pdShowDisplays the contents of the panic dump and core dump files.
portErrShowDisplays the port error summary.
portLogClearClears the port log. If the port log is disabled, this command enables it.
portLogDisableDisables the port log facility.
portLogDumpDisplays the port log, without page breaks.
portLogDumpPortDisplays the port log of the specified port, without page breaks.
portLogEnableEnables the port log facility.
portLogEventShowDisplays which port log events are currently being reported.
portLoginShowDisplays port logins.
portLogPdiscSets or clears the debug pdisc_flag.
portLogResetEnables the port log facility.
Fabric OS Message Reference13
53-1002749-01
Displaying message content on switch
1
TABLE 3Commands for viewing or configuring the system parameters and message logs (Continued)
Command Description
portLogResizeResizes the port log to the specified number of entries.
portLogShowDisplays the port log, with page breaks.
portLogShowPortDisplays the port log of the specified port, with page breaks.
portLogTypeDisableDisables an event from reporting to the port log. Port log events are described by the
portLogTypeEnableEnables an event to report to the port log. Port log events are described by the
rasAdminUsed to enable or disable logging for selected messages or modules, to change the
rasManDisplays message documentation on switch.
setVerboseSets the verbose level of a particular module within the Fabric OS.
snmpConfigManages the SNMP agent configuration.
supportFfdcEnables and disables FFDC.
supportFtpSets, clears, or displays support FTP parameters or a time interval to check the FTP
supportSaveCollects RASLog, trace files, and supportShow (active CP only) information for the local
supportShowExecutes a list of diagnostic and error display commands. This output is used by your
syslogdFacilityChanges the syslogd facility.
syslogdIpAddAdds an IP address as a recipient of system messages.
syslogdIpRemoveRemoves an IP address as a recipient of system messages.
syslogdIpShowViews the currently configured IP addresses that are recipients of system messages.
traceDumpDisplays, initiates, or removes a Fabric OS module trace dump.
portLogEventShow command.
portLogEventShow command.
default severity level for a specified message, and to display configured RASLog
message settings.
server.
CP and then transfers the files to an FTP server. The operation can take several
minutes.
switch service provider to diagnose and correct problems with the switch. The output
from this command is very long.
Displaying message content on switch
Beginning with Fabric OS v7.1.0, you can view the message documentation such as the message
text, message type, class (for audit messages), message severity, cause, and action on the switch
console by using the rasMan message_ID command.
To display the message documentation on switch, perform the following steps.
1. Log in to the switch as admin.
2. Use the rasMan message_ID command to display the documentation of a message. The
message_ID values are case-sensitive.
14Fabric OS Message Reference
53-1002749-01
Configuring system messages and attributes
For example, execute the following command to display the documentation for PS-1007.
switch:admin> rasman PS-1007
Log Messages PS-1007(7m)
MESSAGE
PS-1007 - Failed to add Fabricmode Top Talker on
domain=<domain id>. <function name>.
MESSAGE TYPE
LOG
SEVERITY
WARNING
PROBABLE CAUSE
Indicates that FC Routing (FCR) is enabled on the specified
fabric.
RECOMMENDED ACTION
Top Talker cannot be installed on a fabric with FCR service
enabled. In case Top Talker must be installed on a fabric,
disable FCR using the fosconfig --disable fcr command.
1
Configuring system messages and attributes
This section provides information on configuring the system message logs and its attributes. All
admin-level commands mentioned in this section are used to enable or disable only the external
messages.
Configuring event auditing
To configure event auditing, perform the following steps.
1. Log in to the switch as admin.
2. Execute the auditCfg
switch:admin> auditcfg --enable
Audit filter is enabled.
3. Execute the auditCfg --class command to configure the event classes you want to audit.
switch:admin> auditcfg --class 1,2,3,4,5,6,7,8
Audit filter is configured.
NOTE
The class option 9 (MAPS) is for internal use only. The RAS class is not configurable, and it is
always enabled internally.
4. Execute the auditCfg
level. By default, all messages are logged. When the severity is set, only messages with the
configured severity and higher are displayed. Valid values for severity level are INFO, WARNING,
ERROR, and CRITICAL
--enable command to enable the audit feature.
--severity severity level command if you want to set the Audit severity
switch:admin> auditcfg --severity ERROR
Fabric OS Message Reference15
53-1002749-01
Configuring system messages and attributes
1
5. Execute the auditCfg --show command to verify the configuration.
You must configure the syslog daemon to send the Audit events to a configured remote host using
the syslogdIpAdd command. For more information on configuring the syslog server, refer to
“Configuring a syslog server” on page 5.
Disabling a RASLog message or module
To disable a single RASLog message or all messages in a module, perform the following steps.
1. Log in to the switch as admin.
2. Use the following commands to disable a single RASLog message or all messages that belong
to a module:
• Execute the rasadmin --disable -log messgae_ID command to disable a RASLog message.
For example, execute the following command to disable the BL-1001 message.
switch:admin> rasadmin --disable -log BL-1001
2012/07/20-13:30:41, [LOG-1005], 378, SLOT 4 | CHASSIS, INFO, switch, Log
message NSM-1009 has been disabled.
Use the rasadmin --show -log messgae_ID command to verify the status of the message.
• Execute the rasadmin --disable -module module_ID command to disable all messages in a
module. For example, execute the following command to disable all messages that belong
to the BL module.
switch:admin> rasadmin --disable -module BL
2012/07/20-13:28:37, [LOG-1007], 375, SLOT 4 | CHASSIS, INFO, switch, Log
Module BL has been disabled.
Use the rasadmin --show -module module_ID command to verify the status of the
messages that belong to a module.
NOTE
You cannot disable Audit and FFDC messages using the rasAdmin command.
16Fabric OS Message Reference
53-1002749-01
Displaying system message logs and attributes
1
Enabling a RASLog message or module
To enable a single RASLog message or all messages in a module that were previously disabled,
perform the following steps.
1. Log in to the switch as admin.
2. Use the following commands to enable a single RASLog message or all messages that belong
to a module:
• Execute the rasadmin --enable -log messgae_ID command to enable a single RASLog
message that has been disabled.
For example, execute the following command to enable BL-1001 message that was
previously disabled.
switch:admin> rasadmin --enable -log BL-1001
2012/10/15-13:24:30, [LOG-1006], 373, SLOT 4 | CHASSIS, INFO, switch, Log
message BL-1001 has been enabled.
Use the rasadmin --show -log messgae_ID command to verify the status of the message.
• Execute the rasadmin --enable -module module_ID command to enable all messages in a
module. For example, execute the following command to enable to all previously disabled
BL messages.
switch:admin> rasadmin --enable -module BL
2012/10/15-13:28:37, [LOG-1007], 375, SLOT 4 | CHASSIS, INFO, switch, Log
Module BL has been enabled.
Use the rasadmin --show -module module_ID command to verify the status of the
messages that belong to a module.
Setting the severity level of a RASLog message
To change the default severity level of a RASLog message, perform the following steps.
1. Log in to the switch as admin.
2. Use the rasadmin --set -log message_ID -severity [DEFAULT | INFO | WARNING | ERROR |
CRITICAL] to change the severity level of a message. For example, execute the following
command to change the severity level of C2-1004 message to WARNING.
This section provides information on displaying the system message logs. These procedures are
valid for all the supported platforms.
Fabric OS Message Reference17
53-1002749-01
Displaying system message logs and attributes
1
Displaying RASLog messages
To display the system message log on a switch with no page breaks, perform the following steps.
You can display the messages in reverse order using the reverse option. To display message logs in
all switches (logical switches), use the all option.
2011/11/11-05:55:04, [ZONE-1034], 2, FID 128, INFO, switch, A new zone
database file is created.
Type <CR> to continue, Q<CR> to stop:
2011/11/11-05:55:04, [FCR-1069], 3, FID 128, INFO, switch, The FC Routing
service is enabled.
Type <CR> to continue, Q<CR> to stop:
[...]
18Fabric OS Message Reference
53-1002749-01
Displaying system message logs and attributes
Displaying Audit messages
To display the Audit messages, perform the following steps. Beginning with Fabric OS v7.1.0
release, the RAS-3005 message is generated for each CLI command executed on switch and is
saved in the Audit message log.
1. Log in to the switch as admin.
2. Enter the auditDump -s command at the command line.
To display the severity level of a RASLog message, perform the following steps.
1. Log in to the switch as admin.
2. Use the rasadmin --show -severity message_ID command to display the severity level of a
RASLog message. For example, execute the following command to display the status of the
SEC-1203 message.
To display the RASLog messages based on the severity level, perform the following steps.
1. Log in to the switch as admin.
2. Execute the errdump --severity [DEFAULT | INFO | WARNING | ERROR | CRITICAL] command.
For more information on message severity levels, refer to “Message severity levels” on page 3.
You can set the count of messages to display using the count option. The following example
filters messages by severity level of ERROR.
switch:admin> errdump --count 4 --severity ERROR
Fabric OS: v7.1.0
2012/10/24-11:23:24, [C3-1001], 12, CHASSIS, ERROR, switch, Port 4 failed due
to SFP validation failure. Check if the SFP is valid for the configuration.
2012/10/24-11:23:24, [C3-1001], 13, CHASSIS, ERROR, switch, Port 5 failed due
to SFP validation failure. Check if the SFP is valid for the configuration.
2012/10/24-11:23:25, [C3-1001], 14, CHASSIS, ERROR, switch, Port 18 failed due
to SFP validation failure. Check if the SFP is valid for the configuration.
2012/10/24-11:46:14, [C3-1001], 27, CHASSIS, ERROR, switch, Port 4 failed due
to SFP validation failure. Check if the SFP is valid for the configuration.
Displaying RASLog messages by message ID
To display the RASLog messages based on the message ID, perform the following steps.
1. Log in to the switch as admin.
2. Execute the errdump --message message_ID command. The following example displays all
instances of the message HAM-1004.
The slot option is not supported on the non-bladed systems.
Viewing RASLog messages from Web Tools
To view the system message log for a switch from Web Tools, perform the following steps.
1. Launch Web Tools.
2. Select the desired switch from the Fabric Tree. The Switch View displays.
3. Click the Switch Events tab. You can view the switch events and messages in the Switch Events
Report displayed.
In dual-domain switches, an Event button exists for each logical switch. Only messages relating to
that switch (and chassis) will be displayed.
Clearing the system message logs
This section provides information on clearing the system message logs. These procedures are valid
for all the supported platforms.
Clearing the system message log
To clear the system message log for a particular switch instance, perform the following steps.
1. Log in to the switch as admin.
2. Execute the errClear command to clear all messages from memory.
NOTE
For products that have a single processor, all error log messages are cleared. For products that have
multiple processors, this command only clears the error logs of the processor from which it is
executed.
22Fabric OS Message Reference
53-1002749-01
Clearing the Audit message log
To clear the Audit message log for a particular switch instance, perform the following steps.
1. Log in to the switch as admin.
2. Execute the auditDump -c command to clear all Audit messages from memory.
Reading the system messages
This section provides information about reading the RASLog and Audit messages.
Reading a RAS system message
This section provides information about reading system messages.
The following example shows the format of a RAS system error message.
The following example shows a sample message from the error log.
Reading the system messages
1
2011/02/10-14:18:04, [SS-1000], 88, SLOT 6 | FFDC | CHASSIS, INFO, ESNSVT_DCX,
supportSave has uploaded support information to the host with IP address
192.0.2.2.
2011/02/10-14:13:34, [SS-1001], 87, SLOT 6/1 | FFDC | CHASSIS, WARNING,
ESNSVT_DCX, supportSave's upload operation to host IP address aborted.
2011/02/10-15:44:51, [SEC-1203], 89, SLOT 6 | FFDC | FID 128, INFO, ESNSVT_DCX,
Login information: Login successful via TELNET/SSH/RSH. IP Addr:192.0.2.2.
NOTE
Any reference to slot 0 in a system message is a reference to the blade within the switch platform,
for example, Brocade DCX contains FC8-48 blade, FC8-32 blade, FC8-16 blade, and so on.
The fields in the error message are described in Table 4.
TABLE 4System message field description
Variable nameDescription
Time StampThe system time (UTC) when the message was generated on the switch. The
RASLog subsystem supports an internationalized time stamp format based on
the “LOCAL” setting.
Event IDThe message module and number. These values uniquely identify each
message in the Fabric OS and reference the cause and actions recommended
in this manual. Note that not all message numbers are used; there can be
gaps in the numeric message sequence.
Fabric OS Message Reference23
53-1002749-01
Reading the system messages
1
TABLE 4System message field description (Continued)
Variable nameDescription
Sequence NumberThe error message position in the log. When a new message is added to the
FlagsFor most messages, this field contains a space character (null value)
Severity LevelThe severity of the error, which can be one of the following:
Switch nameThe defined switch name or the chassis name of the switch depending on the
Event-specific informationA text string explaining the error encountered and providing parameters
log, this number is incremented by 1.
The message sequence number starts at 1 after a firmwareDownload and will
increase up to a value of 2,147,483,647 (0x7ffffff).
The sequence number continues to increase after the message log wraps
around, i.e. the oldest message in the log is deleted when a new message is
added. The sequence number can be reset to 1 using the errClear command.
The sequence number is persistent across power cycles and switch reboots.
indicating that the message is neither an AUDIT or FFDC message. Messages
may contain the following values:
• FFDC – Indicates that additional first failure data capture information has
also been generated for this event.
• FID – The Fabric ID that can range from 0 to 128. FID 128 means the
message was generated by the default switch instance.
• CHASSIS – The message that was generated by the chassis instance.
• SLOT number – Indicates the message was generated from slot # blade
main CPU.
• SLOT #/1 – Indicates the message was generated from slot # blade
Co-CPU.
• 1 – CRITICAL
• 2 – ERROR
• 3 – WARNING
• 4 – INFO
action; for example, high availability (HA) messages typically show the chassis
name, and login failures show the logical switch name.
This value is truncated if it exceeds 16 characters in length. Run either the
chassisName command to name the chassis or the switchName command to
rename the logical switch.
supplied by the software at runtime.
Reading an Audit message
Compared to RASLog error messages, messages flagged as AUDIT provide additional user and
system-related information of interest for post-event auditing and troubleshooting the problem.
The following example shows the format of the Audit event message.
The fields in the error message are described in Table 5.
TABLE 5Audit message field description
Variable nameDescription
Sequence NumberThe error message position in the log.
Audit flagIdentifies the message as an Audit message.
Time StampThe system time (UTC) when the message was generated on the switch. The
RASLog subsystem will support an internationalized time stamp format
based on the “LOCAL” setting.
Event IDThe message module and number. These values uniquely identify each
message in the Fabric OS and reference the cause and actions
recommended in this manual. Note that not all message numbers are used;
there can be gaps in the numeric message sequence.
Severity The severity of the error, which can be one of the following:
• 1 – CRITICAL
• 2 – ERROR
• 3 – WARNING
• 4 – INFO
Event ClassThe event class, which can be one of the following:
• CFG
• CLI
• FABRIC
• FIRMWARE
• FW
• LS
• MAPS (internal use only)
• RAS
• SECURITY
• ZONE
User IDThe user ID.
RoleThe role of the user ID.
IP addressThe IP address.
InterfaceThe interface being used.
Application NameThe application name being used on the interface.
Admin DomainThe Admin Domain, if there is one.
Switch nameThe defined switch name or the chassis name of the switch depending on
the action; for example, HA messages typically show the chassis name and
login failures show the logical switch name.
This value is truncated if it is over 16 characters in length.
Execute the chassisName command to name the chassis or the switchName
command to rename the logical switch.
Reserved field for future
expansion
Event-specific informationA text string explaining the error encountered and providing parameters
This field is reserved for future use and contains a space character (null
value).
supplied by the software at runtime.
1
Fabric OS Message Reference25
53-1002749-01
Responding to a system message
1
Responding to a system message
This section provides procedures on gathering information on system messages.
Looking up a system message
Messages in this manual are arranged alphabetically by Module ID, and then numerically within a
given module. To look up a message, copy down the module (see Table 6 on page 28) and the error
code and compare this with the Table of Contents or look up lists to determine the location of the
information for that message.
The following information is provided for each message:
• Module and code name for the error
• Message text
• Message type
• Class (for Audit messages only)
• Message severity
• Probable cause
• Recommended action
Gathering information about the problem
Questions to ask yourself when troubleshooting a system message are as follows:
• What is the current Fabric OS level?
• What is the switch hardware version?
• Is the switch operational?
• Assess impact and urgency:
-Is the switch down?
-Is it a standalone switch?
-How large is the fabric?
-Is the fabric redundant?
• Execute the errDump command on each logical switch.
• Execute the supportFtp command (as needed) to set up automatic FTP transfers, and then run
the supportSave command.
• Document the sequence of events by answering the following questions:
-What happened just prior to the problem?
-Is the problem repeatable?
-If so, what are the steps to produce the problem?
-What configuration was in place when the problem occurred?
• Did a failover occur?
• Was security enabled?
• Was POST enabled?
26Fabric OS Message Reference
53-1002749-01
Responding to a system message
1
• Are serial port (console) logs available?
• Which CP was master?
• What and when were the last actions or changes made to the system?
Common steps to be followed when troubleshooting a system message are as follows:
• Execute the errDump command on each logical switch.
• Execute the supportFtp command (as needed) to set up automatic FTP transfers, and then
execute the supportSave command.
Support
Fabric OS creates a number of files that can help support personnel troubleshoot and diagnose a
problem. This section describes those files and how to access or save the information for support
personnel.
Panic dump and core dump files
The Fabric OS creates panic dump files and core files when there are problems in the Fabric OS
kernel. You can view panic dump files using the pdShow command. These files can build up in the
kernel partition (typically because of failovers) and might need to be periodically deleted or
downloaded using the supportSave command.
The software watchdog process (SWD) is responsible for monitoring daemons critical to the
function of a healthy switch. The SWD holds a list of critical daemons that ping the SWD periodically
at a predetermined interval defined for each daemon. The ping interval is set at 133 seconds, with
the exception of the Fabric Watch daemon and the IP storage demon, which ping the SWD every
333 seconds. (For a complete listing of daemons, refer to the KSWD entry in Tab le 6.)
If a daemon fails to ping the SWD within the defined interval, or if the daemon terminates
unexpectedly, then the SWD dumps information to the panic dump files, which helps to diagnose
the root cause of the unexpected failure.
Execute the pdShow command to view these files or the supportSave command to send them to a
host workstation using FTP. The panic dump files and core files are intended for support personnel
use only.
Trace dumps
The Fabric OS produces trace dumps when problems are encountered within Fabric OS modules.
The Fabric OS trace dump files are intended for support personnel use only. You can use the
supportSave or supportFTP commands to collect trace dump files to a specified remote location to
provide to support when requested.
supportSave command
The supportSave command can be used to send the output of the system messages (RASLog), the
trace files, and the output of the supportShow command to an off-switch storage location through
FTP. Prior to running the supportSave command, you can optionally set up the FTP parameters
using the supportFtp command. The supportShow command runs a large number of dump and
show commands to provide a global output of the status of the switch. Refer to the Fabric OS Command Reference for more information on these commands.
Fabric OS Message Reference27
53-1002749-01
System module descriptions
1
System module descriptions
Tab le 6 provides a summary of the system modules for which messages are documented in this
guide; the system modules are listed alphabetically by name. A module is a subsystem in the Fabric
OS. Each module generates a set of numbered messages.
TABLE 6System module descriptions
System
module
AGAccess Gateway (AG) allows multiple hosts (or HBAs) to access the fabric using fewer physical ports.
ANError or warning messages from the Bottleneck Detection module, including notification of detected
ANVANV error messages indicate problems with the driver that deal with the ENET application-specific
AUTHAuthentication error messages indicate problems with the authentication module of the Fabric OS.
BKSWBKSW messages are generated by the Fabric OS blade kernel software watchdog module.
BLBL error messages are a result of faulty hardware, transient out-of-memory conditions, ASIC errors,
BLSFibre Channel over IP port configuration messages over the Brocade 7800 and FX8-24 blade.
BMBlade management error messages are a result of autoleveling firmware upgrades performed by the
C2C2 error messages indicate problems with the 8 Gbps-capable FC module of the Fabric OS.
C3C3 error messages indicate problems with the 16 Gbps-capable FC module of the Fabric OS.
CALCommon Access Layer (CAL) provides XML interface for configuring switch parameters in an object
CCFGCCFG error messages indicate problems with the Converged Enhanced Ethernet (CEE) configuration
CDRDriver error messages.
CHSError messages reporting the problems in the management of the blades in the different slots of the
CNMCluster Node Manager (CNM) is a software daemon module of the Fabric OS. The messages from
CONFStatus messages for configUpload and configDownload operations.
CTAPA user-space daemon that forwards non-performance-critical messages from the TAPE driver to the
CVLCCrypto Virtual LUN Controller (CVLC) is a software module running on blade FOS (BFOS). The
CVLMCrypto Virtual LUN Manager (CVLM) is a software module of the Fabric OS. The messages of CVLM
DOT1DOT1 error messages indicate problems with the 802.1x authentication module of the Fabric OS.
Description
Access Gateway mode transforms the Brocade switches as well as embedded switches into a device
management tool that is compatible with different types of fabrics, including Brocade-, Cisco-, and
McDATA-based fabrics.
bottlenecks.
integrated circuits (ASICs) on the Fabric OS. They can be software- or hardware-related errors.
or inconsistencies in the software state between a blade and the environment monitor (EM) module.
control processor (CP).
model.
module of the Fabric OS.
chassis.
CNM are problems encountered by CNM, warnings, or information to the user of events.
Crypto Virtual LUN Controller (CVLC) and Security Processor (SP), and vice versa. This module also
maintains a cache of recently acquired keys, reducing requests to the key vault itself.
messages of CVLC are problems encountered by CVLC, warnings to alert the user, or information to
the user.
are problems encountered by CVLM, warnings to alert the user, or information to the user.
28Fabric OS Message Reference
53-1002749-01
System module descriptions
TABLE 6System module descriptions (Continued)
System
module
ECCError Checking and Correction (ECC) error messages indicate single-bit and multiple-bit errors in the
EMThe environmental monitor (EM) manages and monitors the various field-replaceable units (FRUs),
ESSExchange Switch Support (ESS) error messages indicate problems with the ESS module of the Fabric
ESWESW error messages indicate problems with the Ethernet switch module of Fabric OS.
EVMDEVMD is the event management module.
FABRFABRIC refers to a network of Fibre Channel switches. The FABR error messages come from the
FABSFabric OS system driver module.
FBCFirmware blade compatibility errors with the control processor (CP).
FCMCFibre Channel miscellaneous messages relate to problems with the physical layer used to send Fibre
FCOEFCoE error messages indicate problems with the FCoE module of the Fabric OS.
FCPDThe Fibre Channel Protocol daemon is responsible for probing the devices attached to the loop port.
FCPHThe Fibre Channel Physical Layer is used to send Fibre Channel traffic to and from the switch.
FCRFibre Channel router-related traffic and activity on the fabric or back-end fabric.
FICNThe FICN messages are generated during FICON emulation processing on an FCIP Tunnel.
FICUThe FICON-CUP daemon handles communication with fibre connectivity (FICON) on IBM FICON
FKLBFabric OS I/O kernel library module.
FLODFLOD is a part of the Fabric Shortest Path First (FSPF) protocol that handles synchronization of the
FSPFFabric Shortest Path First (FSPF) is a link state routing protocol that is used to determine how frames
Description
Dynamic Random Access Memory (DRAM) devices. ECC is a technology that helps to correct memory
errors.
including the port cards, control processor (CP) blades, blower assemblies, power supplies, and
World Wide Name (WWN) cards. EM controls the state of the FRUs during system startup, hot-plug
sequences, and fault recovery.
EM provides access to and monitors the sensor and status data from the FRUs and maintains the
integrity of the system using the environmental and power policies. EM reflects system status by CLI
commands, system light emitting diodes (LEDs), and status and alarm messages. EM also manages
some component-related data.
OS. ESS is an SW_ILS mechanism utilized by switches to exchange vendor and support information.
fabric daemon. The fabric daemon follows the FC-SW-3 standard for the fabric initialization process,
such as determining the E_Ports, assigning unique domain IDs to switches, creating a spanning tree,
throttling the trunking process, and distributing the domain and alias lists to all switches in the
fabric.
Channel traffic to and from the switch.
Probing is a process the switch uses to find the devices attached to the loop ports and to update the
Name Server with the information.
storage devices. Errors to this module are usually initiation errors or indications that FICON-CUP
prerequisites have not been met, such as a license key, core process ID (PID), and secure mode on
the fabric.
link state database (LSDB) and propagation of the link state records (LSRs).
should be routed. These messages are about protocol errors.
1
Fabric OS Message Reference29
53-1002749-01
System module descriptions
1
TABLE 6System module descriptions (Continued)
System
module
FSSThe Fabric OS state synchronization framework provides facilities by which the active control
FSSMThe Fabric OS state synchronization management module is defined both as a component and a
FWFW is the Fabric Watch module. This module monitors thresholds for many switch subsystems; for
HAMHAM is a user-space daemon responsible for high availability management.
HAMKThis is the kernel module for the high availability management (HAM) daemon.
HILHardware independent layer.
HLOHLO is a part of the Fabric Shortest Path First (FSPF) protocol that handles the HELLO protocol
HMONHealth monitor.
HSLHSL error messages indicate problems with the Hardware Subsystem Layer of the Fabric OS.
HTTPHTTP error messages.
IBDIBD generates messages related to port restart failure.
IPADSystem messages generated by the IP admin demon.
IPSFibre Channel over IP license, tunneling, and port-related messages.
ISNSISNS server and client status messages.
KACKAC error messages indicate problems associated with Fabric OS and the external key vaults.
KSWDThe kernel software watchdog (KSWD) watches daemons for unexpected terminations and “hang”
Description
processor (CP) can synchronize with the standby CP, enabling the standby CP to take control of the
switch nondisruptively during failures and software upgrades. These facilities include version
negotiation, state information transfer, and internal synchronization functions, enabling the
transition from standby to active operation.
FSS is defined both as a component and a service. A component is a module in the Fabric OS,
implementing a related set of functionality. A service is a collection of components grouped together
to achieve a modular software architecture.
service. A component is a module in Fabric OS, implementing a related set of functionality. A service
is a collection of components grouped together to achieve a modular software architecture.
example, temperature, voltage, fan speed, and switch status. Any changes that cross a specified
threshold are reported to the system message log.
between adjacent switches. The HELLO protocol is used to establish connectivity with a neighbor
switch, to establish the identity of the neighbor switch, and to exchange FSPF parameters and
capabilities.
conditions and informs the HAM module to take corrective actions such as failover or reboot.
The following daemons are monitored by KSWD:
• Link Aggregation Control Protocol daemon (lacpd)
• Management Server daemon (msd)
• MM daemon (mmd)
• Multicast Sub-System daemon (mcast_ssd)
• Multiple Spanning Tree Protocol daemon (mstpd)
• Name Server daemon (nsd)
• NSM daemon (nsmd)
• ONM daemon (onmd)
• Parity data manager daemon (pdmd)
• Proxy daemon (proxyd)
• PS daemon (psd)
• RASLOG daemon (raslogd)
• RCS daemon (rcsd)
• RM daemon (rmd)
• RMON daemon (rmond)
• Security daemon (secd)
• Sigma daemon (sigmad)
• SNMP daemon (snmpd)
• SP management daemon (spmd)
• SVP daemon (svpd)
• System services module daemon (ssmd)
• Time Service daemon (tsd)
• TRACE daemon (traced)
• Traffic daemon (trafd)
• VS daemon (vsd)
• Web linker daemon (weblinkerd)
• Web Tools daemon (webd)
• ZONE daemon (zoned)
KTRCKernel RAS trace module.
L2SSL2SYS error messages indicate problems with the Layer 2 System manager that controls the Layer 2
forwarding engine and controls the learning/aging/forwarding functionality.
LACPLACP error messages indicate problems with the Link Aggregation Control Protocol module of the
Fabric OS.
LANCELANCE error messages indicate problems with the LANCE module of the Fabric OS.
Fabric OS Message Reference31
53-1002749-01
System module descriptions
1
TABLE 6System module descriptions (Continued)
System
Description
module
LFMLFM error messages indicate problems with the logical fabric manager module that is responsible
for making a logical switch use XISLs. This involves creating and managing LISLs in a logical fabric.
LOGRASLog subsystem.
LSDBThe link state database is a part of the FSPF protocol that maintains records on the status of port
links. This database is used to route frames.
MCAST_SSThe Multicast Sub-System messages indicate any problems associated with the Layer 2 and Layer 3
Multicast platform support, including allocation of global platform resources such as MGIDs,
hardware acceleration resources for Multicast, and route programming into the hardware (Layer 2
EXM for IGMP Snooping).
MFICMS-FICON messages relate to Fibre Connection (FICON) installations. Fibre Connection control unit
port (FICON-CUP) messages are displayed under the FICU module.
MMMM message indicate problems with the management modules.
MPTHMulticast path uses the shortest path first (SPF) algorithm to dynamically compute a broadcast tree.
MQMessage queues are used for interprocess communication. Message queues allow many messages,
each of variable length, to be queued. Any process or interrupt service routine (ISR) can write
messages to a message queue. Any process can read messages from a message queue.
MSThe Management Service enables the user to obtain information about the Fibre Channel fabric
topology and attributes by providing a single management access point. MS provides for both
monitoring and control of the following areas:
• Fabric Configuration Server: Provides for the configuration management of the fabric.
• Unzoned Name Server: Provides access to Name Server information that is not subject to zone
constraints.
• Fabric Zone Server: Provides access to and control of zone information.
MSTPMSTP error messages indicate problems with Multiple Spanning Tree Protocol modules of the Fabric
OS.
NBFSNBFSM is a part of the Fabric Shortest Path First (FSPF) protocol that handles a neighboring or
adjacent switch’s finite state machine (FSM).
Input to the FSM changes the local switch from one state to another, based on specific events. For
example, when two switches are connected to each other using an interswitch link (ISL) cable, they
are in the Init state. After both switches receive HELLO messages, they move to the Database
Exchange state, and so on.
NBFSM states are Down (0), Init (1), Database Exchange (2), Database Acknowledge Wait (3),
Database Wait (4), and Full (5).
NSIndicates problems with the simple Name Server module.
NSMNSM error messages indicate problems with the Interface Management and VLAN Management
module of the Fabric OS.
ONMDONMD error messages indicate problems with the Operation, Administration and Maintenance
module of the Fabric OS.
PDMParity data manager (PDM) is a user-space daemon responsible for the replication of persistent
configuration files from the primary partition to the secondary partition and from the active CP blade
to the standby CP blade.
PDTRPDTR messages indicate panic dump trace files have been created.
PLATPLAT messages indicate hardware problems.
PMGRA group of messages relating to logical switch creation, deletion, and configuration.
32Fabric OS Message Reference
53-1002749-01
System module descriptions
TABLE 6System module descriptions (Continued)
System
module
PORTPORT error messages refer to the front-end user ports on the switch. Front-end user ports are
PSThe performance server daemon measures the amount of traffic between endpoints or traffic with
PSWPThe portswap feature and associated commands generate these error messages.
RASInformational messages when first failure data capture (FFDC) events are logged to the FFDC log
RCSThe reliable commit service daemon generates log entries when it receives a request from the
RKDThese messages are either error or informational messages pertaining to the re-key daemon of the
RMONRMON messages are error or informational messages pertaining to the RMOND daemon.
RPCDThe remote procedure call daemon (RPCD) is used by Fabric Access for API-related tasks.
RTERTE is responsible for determining the correct paths for each ingress frame and populating the
RTWRThe reliable transport write and read daemon helps deliver data messages either to specific
SCNThe internal state change notification daemon is used for state change notifications from the kernel
SECThe security daemon generates security errors, warnings, or information during security-related data
SFLOsFlow is a standard-based sampling technology embedded within switches and routers, which is
Description
directly accessible by users to connect end devices or connect to other switches.
particular frame formats, such as SCSI frames, IP frames, and customer-defined frames.
and size or roll-over warning.
zoning, security, or management server for passing data messages to switches in the fabric. RCS
then requests reliable transport write and read (RTWR) to deliver the message. RCS also acts as a
gatekeeper, limiting the number of outstanding requests for the Zoning, Security, or Management
Server modules.
Fabric OS.
routing tables in the ASICs with this information. The ASIC then uses the information available in the
routing tables to determine the path a particular ingress frame needs to take before it exits the
switch.
switches in the fabric or to all of the switches in the fabric. For example, if some of the switches are
not reachable or are offline, RTWR returns an “unreachable” message to the caller, allowing the
caller to take the appropriate action. If a switch is not responding, RTWR retries 100 times.
to the daemons within Fabric OS.
management or fabric merge operations. Administrators should watch for these messages to
distinguish between internal switch and fabric operation errors and external attacks.
used to monitor high-speed network traffic for Data Center Ethernet (DCE) and Converged Enhanced
Ethernet (CEE) platforms.
sFlow uses two types of sampling:
• Statistical packet-based sampling of switched or routed packet flows.
• Time-based sampling of interface counters.
SFLO messages indicate errors or information related to the sflowd daemon.
SNMPSimple Network Management Protocol (SNMP) is a universally supported low-level protocol that
allows simple get, get next, and set requests to go to the switch (acting as an SNMP agent). It also
allows the switch to send traps to the defined and configured management station. Brocade
switches support six management entities that can be configured to receive these traps.
SPCSPC messages indicate problems and informational updates associated with the security processor.
These messages could be triggered by the following three modules: Security processor controller, SP
system controller, and SP Keyapp.
SPMError messages indicating problems either with key or SP management.
SSThe supportSave command generates these error messages if problems are encountered.
1
Fabric OS Message Reference33
53-1002749-01
System module descriptions
1
TABLE 6System module descriptions (Continued)
System
module
SSMDSSMD error messages indicate problems with the System Services Module of the Fabric OS.
SULBThe software upgrade library provides the firmwareDownload command capability, which enables
SWCHThese messages are generated by the switch driver module that manages a Fibre Channel switch
SYSCSystem controller is a daemon that starts up and shuts down all Fabric OS modules in the proper
SYSMGeneral system messages.
TAPEA kernel-space driver that handles all I/O operations aimed at Tape containers.
TRCERAS TRACE error messages.
TRCKThe track change feature tracks the following events:
Description
firmware upgrades to both CP blades with a single command, as well as nondisruptive code load to
all Fabric OS switches. These messages might display if there are any problems during the
firmwareDownload procedure. Most messages are informational only and are generated even during
successful firmware download. For additional information, refer to the Fabric OS Administrator’s Guide.
instance.
sequence.
• Turning on or off the track change feature
• CONFIG_CHANGE
• LOGIN
• LOGOUT
• FAILED_LOGIN
If any of these events occur, a message is sent to the system message log. Additionally, if the SNMP
trap option is enabled, an SNMP trap is also sent.
For information on configuring the track change feature, refer to the Fabric OS Command Reference
or the Fabric OS Administrator’s Guide.
TSTime Service provides fabric time-synchronization by synchronizing all clocks in the fabric to the
clock time on the principal switch.
UCSTUCST is a part of the Fabric Shortest Path First (FSPF) protocol that manages the Unicast routing
table.
UPTHUPATH is a part of the FSPF protocol that uses the SPF algorithm to dynamically compute a Unicast