Cisco Active Network Abstraction User Guide, 3.6.6
Supported Service Alarms

Table Of Contents

Supported Service Alarms

Service Alarms

Adaptive Polling

All IP Interfaces Down

BGP Link Down

BGP Neighbor Loss

BGP Process Down

Broken LSP Discovered

Card Down

Card Out

Cloud Problem

Component Unreachable

CPU Utilization

Device Unsupported

Dropped Packets

Discard Packets

GRE Tunnel Down

HSRP Group Status Changed

Interface Status

Investigation State

L2TP Peer Not Established

L2TP Sessions Threshold

Layer 2 Tunnel Down

LDP Neighbor Loss

Link Down

Link Utilization

Logical Port Down

Memory Utilization

MPLS Black Hole Found

MPLS Interface Removed

MPLS-TE Tunnel Down

Port Down

Rx Dormant

Rx Utilization

Shelf Out

Tx Dormant

Tx Utilization

Registry Parameters

Adaptive Polling

All IP Interfaces Down

BGP Link Down

BGP Link Down VRF

BGP Link Up

BGP Neighbor Loss

BGP Process Down

Broken LSP Discovered

Card Down

Card Out

Cloud Problem

Component Unreachable

CPU Utilization

Device Unsupported

Dropped Packets

Discard Packets

GRE Tunnel Down

HSRP Group Status Changed

Interface Status

Investigation State

L2TP Peer Not Established

L2tp Sessions Threshold

Layer 2 Tunnel Down

LDP Neighbor Loss

Link Down

Link Utilization

Logical Port Down

Memory Utilization

MPLS Black Hole Found

MPLS Interface Removed

MPLS TE Tunnel Down

Port Down

Rx Dormant

Rx Utilization

Shelf Out

Tx Dormant

Tx Utilization


Supported Service Alarms


These topics describe the service alarms supported by Cisco ANA:

Service Alarms

Registry Parameters

Each alarm is described in a section containing:

A short description, including background about the network state or system (Cisco ANA) state that caused the alarm. The short description of the service alarm is what appears in the ticket, in the Service tab of Cisco ANA EventVision. The short description for each type and subtype can be viewed in Registry Parameters.

When a flapping event occurs, the short description is changed.


Note The name of the service alarm is the same as the short description.


A table of all the subtype events that represent one of the states the alarm can be in, and a description of when they are issued. For example, the Link Down alarm can have multiple subtype events (states) which include Link Down Due to Admin Down, Link Down Due to Oper Down, and Link Up. The description also shows if the event is a clearing event.

Information related to the correlation of the alarm, mainly:

The alarm issue correlation process and location (local or network).

If other alarms can correlate to this alarm.

The keys that are used in the correlation process.

The specific correlation filters in use for the alarm, if any. The filter indicates if a specific event cannot be selected as the root cause event in the correlation process.

By default, any new event filters the following events: Cloud Problem, BGP Process Down, LDP Neighbor Down, MPLS Interface Removed, the event itself, and events with lower or equal correlation weight.

Each section describes a group of alarms sharing the same event type.

Service Alarms

The following service alarms are supported in Cisco ANA:

Adaptive Polling

All IP Interfaces Down

BGP Link Down

BGP Neighbor Loss

BGP Process Down

Broken LSP Discovered

Card Down

Card Out

Cloud Problem

Component Unreachable

CPU Utilization

Device Unsupported

Dropped Packets

Discard Packets

GRE Tunnel Down

HSRP Group Status Changed

Interface Status

Investigation State

L2TP Peer Not Established

L2TP Sessions Threshold

Layer 2 Tunnel Down

LDP Neighbor Loss

Link Down

Link Utilization

Logical Port Down

Memory Utilization

MPLS Black Hole Found

MPLS Interface Removed

MPLS-TE Tunnel Down

Port Down

Rx Dormant

Rx Utilization

Shelf Out

Tx Dormant

Tx Utilization

Adaptive Polling

Adaptive polling is a mechanism that handles situations in which the device CPU is crossing a predefined, configurable threshold. It reduces the polling when the CPU reaches high threshold values for a configurable sample, and returns the polling to a normal rate when the CPU reaches the lower threshold. Where the CPU stays high for several samplings, the VNE is automatically moved to the maintenance state to avoid continuous polling of the device.

In all cases, alarms are issued when the device or the VNE state changes.

The source OID of this alarm is the Managed Element OID (IManagedElementOid), page 17-2.

Table 16-1 Adaptive Polling—Subtype Events 

Subtype Event Name
Description

VNE Switched to Low Polling Rate Due to CPU High Usage

Issued when the CPU level has been above the high threshold (configurable, default=90%) for several samplings (configurable, default=5). The polling rate of the device is lowered by adding a delay between requests (default delay is 500 msec).

VNE Switched Back to Regular Polling Rate

Clearing event. Issued when the CPU level has been below the lower threshold (configurable, default=70%) for several samplings (configurable, default=2). The polling rate of the device is changed back to normal (no delay between requests).

VNE Switched to Maintenance Mode Due to CPU High Usage

Issued when the VNE polling rate is lower but the CPU stays high for several samplings (configurable, default=10). The VNE is automatically moved to the maintenance state, which means it stops polling the device.

This state cannot be automatically cleared when the CPU usage decreases; the user must manually change the VNE state from the maintenance state to Start (as described in Cisco Active Network Abstraction 3.6.6 Administrator Guide).


Correlation

The alarm correlates to other alarms using the local correlation mechanism with the ManagedElement key. No other alarms can correlate to it.

Source OID

See Managed Element OID (IManagedElementOid), page 17-2.

All IP Interfaces Down

The All IP Interfaces Down alarm is used when all IP interfaces configured on the same port are down, and implies that another fault has occurred in lower layers (such as the physical layer). In this case, one alarm is issued, and all IP interface status alarms are correlated to it.

Table 16-2 All IP Interfaces Down—Subtype Events 

Subtype Event Name
Description

All IP Interfaces Down

Issued when all the IP interfaces configured above a physical interface change their state to down.

Active IP Interface Found

Clearing event. Issued when at least one of the IP interfaces changes its state to up.


Correlation

The alarm correlates to other alarms using the local correlation mechanism with the PortLayer1 key representing the physical layer. The PortLayer1 key is the port that all the IP interfaces were configured on.

Other alarms might correlate to this alarm using the physical port key, in particular the Interface Status Down alarm.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

BGP Link Down

When a connection between two BGP peers is lost, no route information is exchanged between the two peers. This situation affects the network connectivity because route entries which are not refreshed start to be dropped from the routing table, causing packets to be dropped.

In this scenario, when a BGP neighbor has an adjacent peer (meaning that it is connected to another BGP neighbor with a discovered link), a BGP Link Down alarm is issued. When the adjacent peer is not managed, a BGP Neighbor Loss alarm is issued. A VNE identifies this situation based on changes in the BGP neighbor table of the device.

Due to the nature of this fault, it is possible that one of the devices may be unreachable. In this case, the respective VNE does not identify the changes in the BGP neighbor table of the unreachable device, but a BGP Link Down is still issued.

A negotiation process between the two link edges is issued when the BGP neighbor entry state changes from Established, indicating that a BGP Link Down should be invoked.

Table 16-3 BGP link down—Subtype Events 

Subtype Event Name
Description

BGP Link Down

Issued when a BGP neighbor entry has changed its state from Established to another state, or a BGP neighbor entry that had an Established state has been removed from the BGP neighbors table and the entry has an adjacent peer.

BGP neighbor state complies to the definitions in BGP4-MIB::bgpPeerState (1.3.6.1.2.1.15.3.1.2). In the case of a state change, any state other than Established implies the connection between the BGP peers is not fully functioning, meaning route information is not exchanged.

BGP Link Down VRF

Issued in the same conditions as the BGP Link Down alarm except that the neighbor is defined in the context of a VRF (BGP connection between PE router and CE router).

BGP Link Up

Clearing event. Issued when one of the edge BGP neighbor entries has changed its state from any state other than Established to Established. This is the clearing alarm for both the BGP Link Down alarms previously described.


Correlation

The alarm correlates to other alarms using the network correlation mechanism that runs a forward IP flow to the BGP neighbor peer IP. This flow runs a forward flow from each of the BGP neighbors to its peer IP, and might collect the following alarms: Interface Status Down, Port Down, Link Down, Device Unreachable, and so on.

Other alarms might correlate to it using the MPBgp key or the MPBgp key concatenated with the neighbor peer IP. Furthermore, the relevant BGP Neighbor Down syslogs are correlated to the service alarm.


Note The BGP Link Down and BGP Link Down VRF alarms do not filter out the BGP Process Down alarm in the correlation process.


Source OID

See MpBgp OID (IMpBgpOid), page 17-6.

BGP Neighbor Loss

A BGP Neighbor Loss alarm is issued when a BGP neighbor has an adjacent peer which is not managed.

When a connection between two BGP peers is lost, no route information is exchanged between the two peers. This situation affects the network connectivity because route entries which are not refreshed start to be dropped from the routing table after a while, causing packets to be dropped.

In this scenario, if only one of the peers is managed, a BGP Neighbor Loss alarm is issued instead of a BGP Link Down alarm. A VNE identifies this situation based on changes in the BGP neighbor table of the device.

Due to the nature of this fault, it is possible that one of the devices may be unreachable. In this case, the respective VNE cannot identify the changes in the BGP neighbor table of the unreachable device, and thus does not issue the alarm although the BGP connection has been lost. Only one alarm is issued from the reachable side.

Table 16-4 BGP Neighbor Loss—Subtype Events 

Subtype Event Name
Description

BGP Neighbor Loss.

Issued when a BGP neighbor entry has changed its state from Established to another state, or when a BGP neighbor entry with the Established state has been removed from the BGP neighbors table.

BGP neighbor state complies to the definitions in BGP4-MIB::bgpPeerState (1.3.6.1.2.1.15.3.1.2). In the case of a state change, any state other than Established implies that the connection between the BGP peers is not fully functioning, meaning that the route information is not exchanged.

BGP Neighbor Loss VRF

Issued in the same conditions as the BGP Neighbor Loss alarm, except that the neighbor is defined in the context of a VRF (BGP connection between PE router and CE router).

BGP Neighbor Found

Clearing event. Issued when a BGP neighbor entry has changed its state from any state other than Established to the Established state, or a new BGP neighbor entry that has an Established state has been discovered in the BGP neighbors table. This is the clearing alarm of both neighbor loss alarms previously described.


Correlation

The alarm correlates to other alarms using the network correlation mechanism that runs a forward IP flow to the BGP neighbor peer IP. This flow runs a forward flow from each of the BGP neighbors to its peer IP, and might collect the following alarms: Interface Status Down, Port Down, Link Down, Device Unreachable, and so on.

Other alarms might correlate to it using the MPBgp key or the MPBgp key concatenated with the neighbor peer IP. Furthermore, the relevant BGP Neighbor Down syslogs are correlated to the service alarm.


Note The BGP Neighbor Loss and BGP Neighbor Loss VRF alarms do not filter out the BGP Process Down alarm in the correlation process.


Impact Analysis

The alarm issues an impact analysis process that calculates the affected services of this fault. In this case, the affected service is represented as a pair of VRFs that cannot communicate due to this BGP Neighbor Loss fault.

The affected pair (service) can be marked as potentially affected or real affected. In this case, because the BGP reports on a neighbor loss only after a hold-time interval (default 180 sec), in which it did not get the hello message from its neighbor, it assumes that the connection was lost and cannot be recovered. The identified affected pairs are marked as real affected.

Source OID

See MpBgp OID (IMpBgpOid), page 17-6.

BGP Process Down

BGP Process Down is issued when the BGP process/service running on a device goes down. If such an alarm is not issued, a separate BGP Neighbor Loss alarm is created for each BGP neighbor, and these alarms are not correlated.

Table 16-5 BGP Process Down—Subtype Events 

Subtype Event Name
Description

BGP Process Down

Issued when the BGP process/service is down after it was up. The BGP component in the VNE identifies this change, updates its state, and issues the alarm.

BGP Process Up

Clearing event. Issued when the BGP process/service changes its state back to up. The BGP component in the VNE identifies this change, updates its state, and issues the clearing alarm.


Correlation

Due to the nature of this alarm, it cannot be correlated to other alarms, thus this alarm does not try to run any correlation process.

Other alarms might correlate to it using the MPBgp key, in particular BGP Neighbor Loss alarms caused by this failure correlate to it.

Source OID

See MpBgp OID (IMpBgpOid), page 17-6.

Broken LSP Discovered

A Broken LSP Discovered alarm is issued as a companion to the MPLS Black Hole Found alarm (see MPLS Black Hole Found.)

An Broken LSP Discovered event means that an LSP, at some point, went through an MPLS black hole. Because of this the MPLS labels were removed from the packet, and one of the following scenarios occurs:

1. If the packet contains more than one MPLS label (data contained in the packet is VPN traffic), the packet is dropped or is forwarded to an incorrect destination. This happens because the IP header in the packet belongs to a different routing domain.

2. If the packet contains only one MPLS label (data contained in the packet belongs to the same routing domain), the packet continues to be forwarded based on the IP header information instead of the MPLS labels. This is not a problem.

The following information applies to the Broken LSP Discovered alarm:

This alarm does not have a clearing alarm, which means that after it is issued, its severity cannot be changed.

To overcome the previous limitation, the alarm auto-clear flag is set to true. This means that this alarm severity does not have an impact on the severity of other alarms that it correlates to.

Though the Broken LSP Discovered alarm is issued as a companion to the MPLS Black Hole Found, it does not imply that it is issued from the same device that issued the MPLS Black Hole Found alarm.

After an MPLS Black Hole Found alarm is issued, a process starts and looks for broken LSPs that go through this MPLS black hole. The process of discovering the broken LSPs is as follows:

1. At the VNE on which the MPLS Black Hole Found was issued, all label switching entries that were destined for the black hole have an untagged out label. All MPLS labels are removed from packets traversing using this label switching entry.

2. Each untagged label switching entry starts traversing the LSP using a backward flow.


Note The direction of a backward flow traversing the VNE model is opposite that of a standard packet flow traversing the network.


3. On each device traversed in the backward flow,Cisco ANA checks for configured MPLS-based services on the device. Currently, the following identification services are supported:

Existence of VRFs (BGP/MPLS VPN services based on RFC2547).

Existence of MPLS Layer2 tunnels (PWE3 services based on RFC4448).

4. If the device contains such services, a Broken LSP Discovered alarm is issued for each LSP traversed backward to that point.

This means that only PE routers issue such alarms. It is possible that the same LSP has entry points in multiple devices, and thus multiple alarms are issued for it.

5. Information that is important for each broken LSP alarm issued is the entry point (label switching entry) and the exit point (the IP subnet destination).

This information is used in the impact analysis process to identify the relevant affected pairs (services).

Table 16-6 Broken LSP Discovered—Subtype Events 

Subtype Event Name
Description

Broken LSP Discovered

Issued as a companion to the MPLS Black Hole Found alarm as described previously. For every LSP traversing the black hole, a Broken LSP Discovered alarm is issued.

There is no clearing event.


Correlation

This alarm is correlated by definition to one of the following:

The MPLS Black Hole Found that triggered the discovery of this broken LSP.

Link Down alarm, if the link down caused the MPLS traffic to change its course and pass through the black hole.

No other alarms can correlate to it.

Impact Analysis

The alarm issues an impact analysis process that identifies the local affected services of this fault. In this case, affected services can be of two types:

A pair of VRFs that cannot communicate due to this broken LSP (for BGP/MPLS VPN services).

A pair of MPLS Layer 2 tunnel edges representing a PWE3 service endpoint.

The affected pairs in this alarm are marked as potentially affected.


Note The system can be configured to present the affected pairs for BGP/MPLS VPN services as pairs of VRF IP interfaces instead of just the VRFs. This creates, in most cases, additional pairs that might cause a load on the system. Configuring them as IP interfaces is disabled by default.


Source OID

See LSE Entry OID (IMplsEntryOid), page 17-8 (the LSE entry that is the entry point to the broken LSP).

Card Down

The Card Down alarm represents a state in which a card is not operational. This can be caused by a hardware failure, or by changing the administrative state of the card.

Table 16-7 Card Down—Subtype Events 

Subtype Event Name
Description

Card Down

Issued when the operational state of a card is changed to down. This can be caused by a hardware failure, or by changing the administrative state of the card

Card Up

Clearing event. Issued when the operational state of the card changes back to up.


Correlation

Due to the nature of this alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

Other alarms might correlate to it using the Card key.

Source OID

See Module OID (IModuleOid), page 17-5.

Card Out

The Card Out alarm represents a state where a card is removed from the device. The Card Out alarm is also issued when a device stops reporting on the existence of a card due to another failure, even if the card is actually still in the device. It is assumed that any functionality that was implemented by the card is not working anymore if the card had no redundancy configuration.


Note When a Card Out alarm occurs, Cisco ANA NetworkVision displays an alarm icon next to the affected card in the Inventory display. Even though the card has been physically removed, it is still displayed in Cisco ANA NetworkVision so that you can identify which network element is generating the alarm.


Table 16-8 Card Out—Subtype Events 

Subtype Event Name
Description

Card Out

Issued when a card is removed from the device. It is possible that some card failures are identified as Card Out because the device does not report on the card's existence after a failure.

Subcard Out

Issued when a card that is contained in another card is removed from the device. When a card that contains other cards is removed, in addition to the Card Out alarm issued on the main card, a Subcard Out alarm is issued for each of its subcards. It is possible that some failures of cards that contain subcards are identified as Card Down on the parent card and Subcard Out for the subcards, because the device stops reporting on the existence of the subcards.

Card In

Clearing event. Issued when the card is inserted back into the device.


Correlation

Due to the nature of the Card Out alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway where the event is the root cause alarm of the ticket. The Subcard Out alarm correlates to other alarms using the local correlation mechanism with Subcard key and its parent Card key.

Other alarms might correlate to it using the Card and Subcard keys.

Source OID

See Module OID (IModuleOid), page 17-5.

Cloud Problem

Cloud VNEs represent unmanaged network segments, so that operations such PathTracer and Root Cause Analysis (RCA) can be viewed or processed end-to-end. A Cloud VNE represents the unmanaged segment of a network as a single device to which two or more managed segments of the network can be connected.

In a network in which a segment of the network is unmanaged, Cisco ANA runs a correlation flow to find the root cause. If no root cause is found within the managed segment, a Cloud Problem service alarm is created, to which events are correlated.

Table 16-9 Cloud Problem—Subtype Events 

Subtype Event Name
Description

Cloud Problem

An alarm might use network correlation using IP-based forward flow to a destination. During the flow, the alarm collects possible alarms with which to correlate. If it can not find no such alarms, and the flow has traversed a Cloud VNE (that is a network segment which is unmanaged by Cisco ANA), at the end of the flow a Cloud Problem alarm is issued. The original alarm is correlated to it.

This alarm does not have a clearing alarm, thus the severity of the Cloud Problem alarm is informational


Correlation

Due to the nature of the Cloud Problem alarm, the event does not try to correlate to another event, but creates a new ticket in the gateway where the event is the root cause alarm of the ticket.


Note When required, a correlation filter filters the Cloud Problem alarm. This enables or disables the ability of an alarm to create a Cloud Problem alarm and to correlate to it. The default value is false for all alarms in the system, meaning that an alarm does not correlate to the Cloud Problem alarm by default. However, there are several events that override the default configuration (these events are specific to Cisco devices) and are set to true, as follows:

BGP Neighbor Down syslog

OSPF Neighbor Loss syslog

EIGRP Router Query to Neighbors Timeouted syslog


As described previously, other alarms might be correlated to it using the logic in the Cloud Problem subalarm. See Cloud Problem.


Note The Cloud Problem alarm does not filter the BGP Process Down alarm in the correlation process.


Source OID

See Managed Element OID (IManagedElementOid), page 17-2.

Component Unreachable

A VNE might be configured to poll its respective device in multiple network protocols (for example both SNMP and Telnet). In addition, each protocol can be configured for reachability testing. This means that when the VNE stops responding using a protocol, the device is considered unreachable.

Table 16-10 Component Unreachable—Subtype Events 

Subtype Event Name
Description

Device Unreachable

Issued when the device is not responding to at least one of the network protocols that are configured for reachability.

The VNE uses a retry mechanism to make sure the problem persists for a certain configurable duration before issuing an alarm. This means that it is resilient during short periods of network packet loss.

Note Cisco ANA will generate Device Unreachable events, with corresponding SNMP Timeout messages in the AVM log file, for devices with nonunique SNMP engine IDs. These IDs are normally derived from the device's unique MAC address and assigned automatically. They can also be user-customized. We recommend that you avoid custom SNMP engine IDs. If you do use them, make sure they are unique.

Device Reachable

Clearing event. Issued when the device responds to all the network protocols that are configured for reachability.


Source OID

See Managed Element OID (IManagedElementOid), page 17-2 (the managed element of the Cloud VNE).

Checking Reachability

Reachability used by the VNEs (to check the reachability between the VNEs and network elements) depends on the configuration of the VNE, and involves multiple connectivity tests using SNMP, Telnet/SSH, and ICMP, as appropriate.

The following table describes the various situations where an NE fails to respond to the protocols:

Table 16-11 Unreachable Network Elements 

VNE Type
Protocol Used to Check Reachability
Action Take When NE Fails to Respond
Action Taken When NE is Reachable

ICMP VNE

ICMP only. During the ICMP test, the unit pings the NE every configured interval.

ICMP ping is suspended, and a VNE Unreachable event is sent to the Cisco ANA Gateway. Thereafter, only the reachability tests are run to detect when the device is reachable again.

ICMP ping is restarted, and the alarm is cleared.

Generic VNE

SNMP only (default). Polls the sysoid of the NE using an SNMP get command during the SNMP reachability test, and expects to receive a response; or

SNMP only (default), and adding an ICMP test.

General polling is suspended, and a VNE Unreachable event is sent to the Cisco ANA Gateway. Thereafter, only the reachability tests are run to detect when the device is reachable again.

If more than one protocol is used, it is enough for one of them to become unreachable to generate the event. The event is generic to all the protocols.

General polling is restarted, and all commands are sent to the device, smoothed across the polling interval.

The alarm is cleared.

Full VNE

SNMP only (default). Polls the sysoid of the NE using an SNMP get command during the SNMP reachability test, and expects to receive a response; or

SNMP only (default), and adding ICMP and Telnet. During the Telnet test, the unit sends Enter via the open session and expects to get a prompt back.

General polling is suspended, and a VNE Unreachable event is sent to the Cisco ANA Gateway. Thereafter, only the reachability tests are run to detect when the device is reachable again.

If more than one protocol is used, it is enough for one of them to become unreachable to generate the event. The event is generic to all the protocols.

General polling is restarted, and all commands are sent to the device, smoothed across the polling interval.

The alarm is cleared.


Each of these scenarios has two possible settings in the registry:

Track reachability (true/false). The default is true.

When this parameter is true, reachability is tracked according to the specific protocol (ICMP, SNMP, Telnet, and so forth).

When this parameter is false, the test is not performed.

Lazy reachability (true/false). The default is false. This parameter determines whether there is a dedicated reachability command in charge of tracking reachability or whether reachability is determined by the regular polled commands.

When this parameter is true, reachability is based on polling, and a dedicated command is not activated.

When this parameter is false, a dedicated SNMP command is activated, and this test verifies the response from a specific SNMP OID (sysoid is the default that can be changed).

After the first failure of a command and all its retries, the device is considered unreachable. At this point, Cisco ANA starts to poll the device using the dedicated reachability command (see Table 16-11). In normal track reachability mode (lazy=false), the reachability commands run all the time. When the reachability test succeeds for the first time, it stops running and the device is considered reachable again.


Note Changes to the registry should be performed only with the support of Cisco. For details, contact your Cisco Account Team.


Correlation

The alarm correlates to other alarms using the network correlation mechanism, which runs a forward IP flow from the global routing entity to the management IP address (that is, to the IP address of the unit on which the VNE resides). This flow might collect the following alarms: Device Unreachable, Link Down, Port Down, Interface Status Down, BGP Neighbor Loss, and so forth.

Other alarms might correlate to it using the ManagedElement key.


Note The Device Unreachable alarm filters out the Link Down on Unreachable alarm in the correlation process. Events with the same weight are not filtered out.


Source OID

See Managed Element OID (IManagedElementOid), page 17-2.

CPU Utilization

VNEs are configured to trace their device CPU utilization. An alarm is issued when device CPU utilization crosses a configured thresholds. The upper and lower thresholds are defined in the registry under the managed element.

Table 16-12 CPU utilization—Subtype Events 

Subtype Event Name
Description

CPU Overutilized

Issued when the device CPU usage is above the configured upper threshold.

CPU Normal Utilization

Clearing event. Issued when the device CPU usage returns to below the lower threshold.


Correlation

Due to the nature of CPU utilization alarms, the event does not try to correlate to another event; it creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

No other alarm tries to correlate to this alarm.

Source OID

See Managed Element OID (IManagedElementOid), page 17-2.

Device Unsupported

A VNE identifies various loading situations that prevent regular operation of the VNE. When such a situation occurs, the VNE issues a Device Unsupported alarm.

Table 16-13 Device unsupported—Subtype Events 

Subtype Event Name
Description

Device Unsupported

Issued for the following scenarios:

The device type identified by its sysOid is not identified by the system.

The device software version is not supported, and the VNE is configured to react when a device is unsupported. Other possible actions are: use the default version, load generic VNE, or load ICMP VNE.

Registry problems occur when trying to load generic or ICMP VNEs.

The VNE failed to retrieve the device sysOid or software version.


Correlation

Due to the nature of the Device Unsupported alarm, the event does not try to correlate to another event and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

No other alarms can correlate to this alarm.

Source OID

See Managed Element OID (IManagedElementOid), page 17-2.

Dropped Packets

VNEs are configured to trace the dropped packet counters on their device ports. An alarm is issued when a dropped packet counter from a port crosses the configured thresholds. The upper and lower thresholds are defined in the registry under PortLayer1.

Table 16-14 Dropped packets—Subtype Events 

Subtype Event Name
Description

Dropped Packets on Port

Issued when the number of dropped packets on a device port is higher than the configured threshold.

Stopped Dropping Packets on Port

Clearing event. Issued when the number dropped packets on a device port is lower than the configured threshold.


Correlation

Due to the nature of the Dropped Packets on Port alarm, the event does not try to correlate to another event and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

No other alarms can correlate to this alarm.

Impact Analysis

By default, impact analysis is not supported for this alarm, but it can be enabled. If enabled, a flow starts to collect all the affected services passing this port. The endpoint of such services can be any termination point, such as an IP interface, VC, Port, VRF, and so on.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

Discard Packets

VNEs are configured to trace the discarded packet counters on their device ports. An alarm is issued when the discarded counter for a port crosses the configured thresholds. The upper and lower thresholds are defined in the registry under the PortLayer1.

Table 16-15 Discard packets—Subtype Events 

Subtype Event Name
Description

Discard Packets

Issued when the number of discarded packets on a device port is higher than the configured threshold.

Normal Discard Packets

Clearing alarm. Issued when the number of discarded packets on a devices port is lower than the configured threshold.


Correlation

Due to the nature of the Discard Packets alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

No other alarms can correlate to this alarm.

Impact Analysis

By default, impact analysis is not supported for this alarm, but it can be enabled. If enabled, a flow starts to collect all the affected services passing this port. The endpoint of such services can be any termination point, such as an IP interface, VC, Port, VRF, and so on.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

GRE Tunnel Down

Generic routing encapsulation (GRE) tunnels are basically stateless, meaning that when the tunnel is down, the tunnel edges might not identify this situation and continue reporting the tunnel as up. To overcome this, the GRE tunnel edge can be configured to send keepalive messages. If at some point a GRE tunnel edge does not receive keepalive messages, it can change its state to down.

The GRE Tunnel Down alarm is supported only on GRE tunnels that are configured with keepalive messages. When keepalive is configured on the GRE tunnel edge, if a failure occurs in the GRE tunnel at any point, both IP  interfaces of the GRE tunnel edges change their state to down. This ensures that the alarm is identified. If keepalive is not configured on the GRE tunnel edge, because the alarm creation is triggered by the state change of the IP  interface of the GRE tunnel, the GRE Tunnel Down alarm might not be generated.

Table 16-16 GRE Tunnel Down—Subtype Events 

Subtype Event Name
Description

GRE Tunnel Down

Issued when a GRE link exists between the two tunnel edges and the state of the IP interface of one of the GRE tunnel edges changes to down. A simple negotiation procedure is done to avoid sending the event from both edges of the GRE tunnel, and a GRE Tunnel Down event is issued.

GRE Tunnel Up

Clearing event. Issued when the IP interface state changes back to up. The clearing event is issued even if the GRE link does not exist (for example, if the user has executed clear&remove on the event).


Correlation

The GRE Tunnel Down alarm tries to correlate to other alarms using the network correlation mechanism that runs a forward IP flow from the local GRE tunnel edge to the tunnel destination IP. This flow might collect the following alarms: Link Down, Port Down, Interface Status Down, and more.

Other alarms might correlate to it using the TunnelGre key.

Source OID

See Topological Link OID (ITopologicalLinkOid), page 17-2 (each endpoint is Layer 2 GRE Tunnel OID (ITunnelGreOid).

HSRP Group Status Changed

Hot Standby Router Protocol (HSRP) is used in IP networks and allows one router to automatically assume the function of the second router if the second router fails. The current support relates to the instance where only one backup router is configured in the HSRP group, though it is possible to configure more than one.

Table 16-17 HSRP group status changed—Subtype Events 

Subtype Event Name
Description

Primary HSRP Interface Is Not Active

Issued when the primary interface within an HSRP group has changed its state to down. This means that one of the other interfaces in the group becomes the active interface in the group.

This alarm tries to correlate to other alarms using the network correlation mechanism that runs a forward IP flow from the local global routing entity to the HSRP group backup interface IP.

Alarms can correlate to this alarm using the local IPInterface key.

Primary HSRP Interface Is Active

Clearing event for the Primary HSRP Interface Is Not Active alarm. Issued when the primary interface within a HSRP group has changed its state back to up after it was down. This means that if one of the other interfaces in the group was currently active it becomes secondary. This alarm is the clearing alarm for the Primary HSRP Interface Is Not Active alarm.

Secondary HSRP Interface Is Active

Issued when a secondary interface within an HSRP group has changed its state to up. This happens when the original active interface changes its state to down and the backup interface takes over.

This alarm tries to correlate to other alarms using the network correlation mechanism that runs a forward IP flow from the local global routing entity to the HSRP group virtual IP.

Alarms can correlate to this alarm using the local IPInterface key.

Secondary HSRP Interface Is Not Active

Clearing event for the Secondary HSRP Interface Is Active alarm. Issued when a secondary interface within a HSRP group has changed its state back to down after it was up. This means that the original active interface in that group has changed its state to up.


Correlation

For correlation to work, there must be a correlation path between the routers. Correlation details are described in the relevant subtype events in Table 16-17.

Source OID

See IP Interface OID (IPInterfaceOid), page 17-6 (IP interface of the active or secondary interface).

Interface Status

VNEs are configured to trace the operational state of their IP interfaces. When the status of an IP interface changes, the VNE issues the relevant alarm. There are multiple subtype events for Interface Status Down, and the subtype that is issued depends on the scenario. Each has a different behavior; these are described in Table 16-18.

Table 16-18 Interface status—Subtype Events 

Subtype Event Name
Description

Interface Status Down
(GRE tunnel)

Issued when the IP interface on a GRE tunnel changes its state to down.

Correlation—This alarm issues a local correlation process and tries to correlate to the GRE Tunnel Down alarm. If the GRE tunnel down does not exist (for example, in the case where no GRE link exists), the alarm is issued as the root cause. When the GRE tunnel is issued from the other edge of the tunnel, it uses the local alarm to correlate to it.

Other alarms might correlate to it using the IPInterface key. This includes alarms such as Device Unreachable or any other alarms that perform network correlation and where the correlation flow traverses the IP interface.

Interface Status Down
(connection that is a point-to-point connection)

Issued when a point-to-point IP interface changes its state to down. The identification of this type of interface is done using the following:

1. The subnet mask is /30 or /31.

2. The IP interface is on one VC encapsulation.

Correlation—The alarm correlates to other alarms using the network correlation mechanism that runs a forward down IP flow from the IP interface to other IP addresses in the IP interface's IP address subnet. This flow might collect the following alarms: Link Down, Port Down, and so on.

Other alarms might correlate to it using the IPInterface or the physical port (PortLayer1) keys.

Interface Status Down
(nonconnection that is a multipoint connection)

Issued when a point-to-point IP interface changes its state to down. The identification of this type of interface is done using the following:

1. The number of encapsulations under the IP interface/MPLS is greater than one.

2. Any other case not covered in the previously-described scenarios.

Correlation—The alarm correlates to other alarms using the network correlation mechanism that runs a forward down flow from the IP interface to the Physical port (PortLayer1) under this interface.

Interface Status Up

Clearing event. Issued when an IP interface changes its operational state from down to up.


Correlation

Correlation details are described in the relevant subtype events in Table 16-18.

Source OID

See IP Interface OID (IPInterfaceOid), page 17-6.

Investigation State

Situations might occur where one or more physical components (specifically modules) are not identified by the physical investigation component in a VNE. This is not an unusual scenario because many devices have large sets of supported modules, and not all of the modules may be supported by the VNE. The Investigation State alarm is issued in this scenario.

Table 16-19 Investigation state—Subtype Events 

Subtype Event Name
Description

Investigation State

Issued when one or more modules are not identified by the physical investigation component of the VNE.

There is no clearing event.


Correlation

Due to the nature of the Investigation State alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

No other alarms can correlate to this alarm.

Source OID

See Managed Element OID (IManagedElementOid), page 17-2.

L2TP Peer Not Established

This alarm is specific to the Redback Networks implementation of Layer 2 Tunneling Protocol (L2TP), and is based on the state of an L2TP peer that is basically a logical entity from which L2TP tunnels are created. The L2TP peer is also used as a container for these L2TP tunnels. The alarm is issued when the L2TP peer has an incorrect tunnel configuration and the tunnels between the L2TP access concentrator (LAC) and the L2TP network server (LNS) cannot be created.

Table 16-20 L2TP Peer Not Established—Subtype Events 

Subtype Event Name
Description

l2TP Peer Not Established

Issued when the L2TP peer has an incorrect configuration, and L2TP tunnels cannot be created between the LAC and the LNS. This is identified by querying the state of the L2TP peer tunnels that do not change to Established.

l2TP Peer Is Removed

Issued when the L2TP peer is removed from the L2TP peer list, or when the first tunnel in the peer changes its state from Established to another state.

l2TP Peer Established

Clearing event. Issued when at least one tunnel of the L2TP peer is in an Established state.


Correlation

The alarm correlates to other alarms using the network correlation mechanism that runs a forward down flow from the L2TP peer to the remote IP.

Other alarms can correlate to this alarm using the local L2TPpeer key.

Source OID

See L2TP Peer OID (IL2tpPeerOid), page 17-9.

L2TP Sessions Threshold

This alarm is specific to the Redback Networks implementation of L2TP and is implemented as a TCA of the number of sessions in a L2TP peer. The alarm is issued when the number of L2TP sessions related to the L2TP peer crosses a configurable threshold.

Table 16-21 L2tp sessions threshold—Subtype Events 

Subtype Event Name
Description

l2TP Sessions Count Exceeds Maximum Threshold

Issued when the number of active sessions associated with the L2TP peer crosses a configurable threshold (the default is 80%). The calculation is done as follows:

active-sessions/(max-session-per-tunnel * max-tunnels-per-peer) * 100.

l2TP Sessions Count Has Returned To Normal

Clearing event. Issued when the number of active sessions associated with the L2TP peer drops below the lower threshold (the default is 70%).


Correlation

Due to the nature of the L2TP Sessions Count Exceeds Maximum Threshold alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

No other alarms can correlate to this alarm.

Source OID

See L2TP Peer OID (IL2tpPeerOid), page 17-9.


Note This alarm is implemented as TCA, which means that no information about this alarm is found in the standard event-related registry.


Layer 2 Tunnel Down

A Layer 2 tunnel represents a point-to-point pseudowire in the network, also known as an AToM. This alarm is issued when the operational state of a Layer 2 tunnel changes.

Table 16-22 Layer 2 tunnel down—Subtype Events 

Subtype Event Name
Description

Layer 2 Tunnel Down

Issued when the operational state of the Layer 2 tunnel changes its state to down. This can happen due to a problem between the two edges of the tunnel or on the local tunnel interface.

When the state changes on both edges, a simple negotiation procedure is done to avoid sending the alarm from both edges of the Layer 2 tunnel.

Layer 2 Tunnel Up

Clearing event. Issued when the Layer 2 tunnel changes its state back to up.


Correlation

Because this alarm can be caused by multiple conditions, it issues multiple network correlation flows, which run as follows:

A network flow from the Layer 2 tunnel to the remote IP to identify problems that occur between the tunnel edges.

This flow might collect the following alarms: Link Down, Port Down, MPLS alarms, and so on.

A network flow from the local Layer 2 tunnel edge to the physical port on which it is configured, to identify problems that occur on the local physical interface.

This flow might collect the following alarms: Link Down, Port Down, and so on.

A network flow from the remote Layer 2 tunnel edge to the physical port on which it is configured, to identify problems that occur on the remote physical interface.

This flow might collect the following alarms: Link Down, Port Down, and so on.

Any alarm can correlate to this alarm using the PTPLayer2MplsTunnel (which represents the Layer 2 tunnel edge) key.


Note The Layer 2 Tunnel Down alarm does not filter out the LDP Neighbor Down alarm in the correlation process.


Source OID

See Topological Link OID (ITopologicalLinkOid), page 17-2 (each endpoint is Layer 2 Mpls Tunnel OID (IPTPMplsLayer2TunnelOid).

LDP Neighbor Loss

VNEs are configured to trace the state of the current LDP neighbor of their devices. The VNE issues the relevant alarm when it identifies that an existing LDP neighbor has been removed, or that an LDP neighbor that was removed has been restored.

The identification of this alarm is expedited by notifications such as syslogs or traps.

Table 16-23 LDP neighbor loss—Subtype Events 

Subtype Event Name
Description

LDP Neighbor Down

Issued when an LDP neighbor of the device that was previously discovered is removed.

LDP Neighbor Up

Clearing event. Issued when the LDP neighbor that was previously removed is restored and is currently active.


Correlation

This alarm issues a network correlation flow that runs a forward down flow from the global routing entity to the LDP peer IP address.

This flow might collect the following alarms: MPLS Interface Removed, Link Down, Port Down, and so on.

Any alarm can correlate to this alarm using the LDPPeer or LDPpeerDiscoverySources keys.


Note The LDP Neighbor Down alarm does not filter out the MPLS Interface Removed alarm in the correlation process.


Source OID

See LSE OID (ILseOid), page 17-7 (Label Switching Entity with the differentiator object of the LDP peer).

Link Down

This is one of the basic service alarms supported in the system. When a port has an adjacent peer (that is, it is connected to another port and has a discovered link), and its operational state changes from up to down or from down to up, the alarm is issued. When the port is not adjacent, a Port Down alarm is issued instead of a Link Down alarm. See Port Down.

The negotiation process between the two link edges occurs when the port's operational state changes to down to identify the exact event that should be issued.

Table 16-24 Link Down—Subtype Events 

Subtype Event Name
Description

Link Down Due To Admin Down

Issued when the admin state of at least one of the link ports changes to down.

Correlation—Due to the nature of this alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway that is the root cause alarm of the ticket.

Link Down Due To Oper Down

Issued when the admin state is up on both ports and none of the scenarios described below occur.

Correlation—This alarm issues a local correlation process and tries to correlate to other alarms using the physical port (PortLayer1) key.

Link Down Due To Card Event

Issued when at least one of the ports is on a card that was removed from the device, or is currently in an operational down state.

Correlation—This alarm issues a local correlation process and tries to correlate to other alarms (specifically Card Out or Card Down) using the Module key.

Link Down On Unreachable

Issued when at least one of the ports is on a device that is currently unreachable by its VNE.

Correlation—This alarm issues a local correlation process in order to correlate to the Device Unreachable alarm (using the ManagedElement key).

Link Up

Clearing event. Issued when the port operational state changes back to up.


Link Down supports flapping with the following subevents:

Link Down Flapping

Link Down Flapping Update

Link Down Stopped Flapping Cleared

Link Down Stopped Flapping Noncleared


Note In Cisco ANA EventVision, these flapping subevent names are displayed in the event's short description field.


Correlation

Other alarms can try to correlate to any link down alarm using the Physical port (PortLayer1) key.

Source OID

Topological Link OID (ITopologicalLinkOid), page 17-2 (where each endpoint is Physical Layer OID (IPhysicalLayerOid), page 17-4).

Link Utilization

VNEs are configured to trace the Rx and Tx counters on their device ports, where a port has an adjacent peer (that is, it is connected to another port), and it already issued a Rx Overutilized or Tx Overutilized alarm. (For more information on these alarms, see Rx Utilization and Tx Utilization.) This alarm has complementary functionality so that all the utilization alarms from both ports of the link correlate to it, instead of issuing multiple root cause alarms.

Table 16-25 Link utilization—Subtype Events 

Subtype Event Name
Description

Link Overutilized

Issued after Tx Overutilized or Rx Overutilized alarms are issued on a physical port, if the port has an adjacent peer to enable correlation of all port level utilizations alarms from the ports on both sides of the link to one link utilization alarm.

Link Utilization Normal

Clearing event. Issued if both sides of the link send clearing alarms on the Tx utilization and Rx utilization alarms.


Correlation

Due to the nature of this alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

Other alarms can correlate to this alarm using the physical port (PortLayer1) key.

Source OID

Topological Link OID (ITopologicalLinkOid), page 17-2 (where each endpoint is Physical Layer OID (IPhysicalLayerOid), page 17-4).

Logical Port Down

Logical ports are logical interfaces that are defined on physical ports. Logical ports are used to logically separate the traffic of the physical port, and to control the separated traffic in a different manner. Logical ports are currently implemented in Cisco ANA for specific VNE types (for example, Lucent WAN Switches) and specific technologies (such as ATM and Frame Relay). Each logical port has an independent administrative and operational state. When the operational state of a logical port changes, the VNE issues an alarm.

Table 16-26 Logical port down—Subtype Events 

Subtype Event Name
Description

Logical Port Down

Issued when the operational state of a logical port changes to down.

Logical Port Up

Clearing event. Issued when the operational state of a logical port changes back to up.


Correlation

This alarm issues a local correlation process and tries to correlate to alarms on the physical port using the physical port (PortLayer1) key. Possible alarms that this alarm can correlate to are Link Down, Port Down, or any alarm on the physical port.

Other alarms might correlate to it using the Logical port key, including alarms that perform network correlation, and the correlation flow traverses the logical port.


Note The Logical Port Down alarm does not filter out the BGP Process Down alarm in the correlation process.


Source OID

See Logical Port OID (ILogicalPortOid), page 17-9.

Memory Utilization

VNEs are configured to trace their device memory utilization. A memory utilization alarm is issued when the device memory utilization crosses a configured threshold. The upper and lower thresholds are defined in the registry under ManagedElement.

Table 16-27 Memory utilization—Subtype Events 

Subtype Event Name
Description

Memory Overutilized

Issued when the device memory usage is above the configured upper threshold.

Memory OK

Clearing event. Issued when the device memory usage is back below the lower threshold.


Correlation

Due to the nature of the Memory Utilization alarm, the event does not try to correlate to another event, and creates a new ticket in the gateway where the event is the root cause alarm of the ticket.

No other alarms can correlate to this alarm.

Source OID

See Managed Element OID (IManagedElementOid), page 17-2.

MPLS Black Hole Found

A MPLS black hole is an abnormal termination of an MPLS path (an LSP) inside an MPLS network. A MPLS black hole exists when there are untagged entries destined for a known PE router on a specific interface. Note that the untagged interfaces might exist in the network in normal situations. For example, where the boundary of the MPLS cloud has untagged interfaces, this is still considered normal.

MPLS black hole cause the loss of all the MPLS labels on a packet, including the VPN information that lies in the inner MPLS label. Therefore, if a packet goes through an untagged interface, the VPN information is lost. The VPN information loss translates directly to VPN sites losing connectivity.

Black hole alarms are detected in either of the following situations:

When the system is loaded for the first time and performs the initial discovery of the network.

Changes in the network are identified through the ongoing discovery process.

Table 16-28 MPLS Black Hole Found found—Subtype Events 

Subtype Event Name
Description

MPLS Black Hole Found

Issued when an MPLS interface has at least one untagged LSP leading to a known PE router; in other words, an LSE entry changed to an Untagged action with a PE as a next hop. After an MPLS Black Hole Found alarm is issued, a process begins looking for broken LSPs that go through the MPLS black hole. See Broken LSP Discovered.

MPLS Black Hole Cleared

Clearing event. Issued when the MPLS interface that had untagged LSPs to a known PE router has no more untagged entries to any known PE neighbor.


Correlation

The MPLS Black Hole Found alarm can correlate to MPLS Interface Removed and LDP Neighbor Loss alarms. Broken LSP Discovered alarms can correlate to MPLS Black Hole Found alarms.


Note The MPLS Black Hole Found alarm does not filter out the MPLS Interface Removed and LDP Neighbor Down alarms in the correlation process.


Source OID

See LSE OID (ILseOid), page 17-7 (appended with a differentiator of the next hop interface name).

MPLS Interface Removed

The MPLS interface is basically a representation of the MPLS sublayer in an interface configuration. The interface can be configured with or without MPLS capabilities. If this type of configuration change takes place while the VNE is loaded, it issues MPLS interface removed or added alarms.

Table 16-29 MPLS interface removed—Subtype Events 

Subtype Event Name
Description

MPLS Interface Removed

Issued when an MPLS interface has at least one untagged LSP leading to a known PE router (that is, an LSE entry changed to an Untagged action with a PE as a next hop). After an MPLS Black Hole Found alarm is issued, a process that looks for broken LSPs that go through this MPLS black hole is started. See Broken LSP Discovered.

MPLS Interface Added

Clearing event. Issued when the MPLS capabilities of an interface are enabled after they were disabled.


Correlation

The alarm correlates to other alarms using the network correlation mechanism which runs a forward flow to the underlying physical port. This flow might collect the Card Out and Card Down alarms, because the only other cases in which it happens are due to other faults that are hardware related.

Other alarms might correlate to it using the MPLS key, including MPLS black hole alarms, MPLS TE Tunnel Down alarm, and so on.

Source OID

See LSE OID (ILseOid), page 17-7 (Label Switching Entity with differentiator object of the MPLS interface description).

MPLS-TE Tunnel Down

VNEs are configured to trace the operational state of their MPLS TE tunnel interfaces. When the state of the tunnel changes, the VNE issues the relevant alarm.

Table 16-30 MPLS TE Tunnel Down—Subtype Events 

Subtype Event Name
Description

MPLS-TE tunnel Down

Issued when the tunnel changes it state to down.

MPLS-TE Tunnel Down alarm supports flapping with the following subevents:

MPLS-TE Tunnel Flapping

MPLS-TE Tunnel Update

MPLS-TE Tunnel Stopped Flapping Cleared

MPLS-TE Tunnel Stopped Flapping Noncleared

Note In Cisco ANA EventVision, these flapping subevent names are displayed in the event's short description field.

MPLS-TE Tunnel Up

Clearing event. Issued when an MPLS TE tunnel changes its operational state from down to up.


Correlation

For all the down alarms, any other alarm can try to correlate to this alarm using the MPLS TE tunnel OID (IMplsTETunnelOid) key. The alarm correlates to other alarms using the network correlation mechanism that runs a forward down IP flow from the MPLS TE tunnel to its tunnel destination IP address. This flow might collect the following alarms: Link Down, Port Down, and so on.

The MPLS-TE Tunnel Down alarm does not filter out the BGP Process Down alarm in the correlation process.

Source OID

See MPLS TE Tunnel OID (IMplsTETunnelOid), page 17-8.

Port Down

When a physical port does not have an adjacent peer (that is, it is connected to another port) and its operational state changes from up to down, or from down to up, port down alarms are issued. When the port does have an adjacent peer, instead of a Port Down alarm, a similar Link Down alarm is issued. See Link Down.

Table 16-31 Port Down—Subtype Events 

Subtype Event Name
Description

Port Down

Issued when the operational state of a physical port changes to down.

Port Down supports flapping with the following subevents:

Port Down Flapping

Port Down Flapping Update

Port Down Stopped Flapping Cleared

Port Down Stopped Flapping Noncleared.

Port Down Due To Card Event

Issued when the port is on a card that was removed from the device or is currently in an operational down state.

Correlation—This alarm issues a local correlation process and tries to correlate to other alarms (specifically Card Out or Card Down) using the Module key.

Port Up

Clearing event. Issued when the operational state of a logical port changes back to up.


Correlation

For all the down alarms, any other alarm can try to correlate to this alarm using the Physical port (PortLayer1) key.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

Rx Dormant

VNEs are configured to trace the Rx packet counters on their device ports. An alarm is issued when the Rx counter on a port drops below the configured threshold.


Note This alarm is disabled by default.


Table 16-32 Port Down—Subtype Events 

Subtype Event Name
Description

Rx Dormant

Issued when the number of Rx packets on a device port is lower than the configured threshold.

Rx Dormant Normal

Clearing event. Issued when the number of Rx packets on a device port returns to a number lower than the configured threshold.


Correlation

The port Rx Dormant alarm does not start a correlation process and is always issued as a root cause alarm.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

Rx Utilization

VNEs are configured to trace the Rx packet counters on their device ports. An alarm is issued when a the Rx counter for a port crosses the configured thresholds. The upper and lower thresholds are defined in the registry under the PortLayer1. Where the port has an adjacent peer (that is, it is connected to another port) a Link Utilization alarm is also issued. For more information on these alarms, see Link Utilization.

Table 16-33 Rx utilization—Subtype Events 

Subtype Event Name
Description

Rx Overutilized

Issued when the number of Rx packets on a device s port is higher than the configured threshold.

Rx Utilization Normal

Clearing event. Issued when the number of Rx packets on a device port returns to a number lower than the configured threshold.


Correlation

The Rx utilization alarms do not start a correlation process. No other alarms can correlate to this alarm, because there are no supported alarms that can be affected by the Rx utilization alarm.

Impact Analysis

Impact analysis is not supported by default for this alarm, but can be enabled. If it is enabled, a flow starts to collect all the affected services passing this port. The endpoint of such services can be any termination point, such as an IP interface, VC, port, VRF, and so on.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

Shelf Out

The Shelf Out alarm represents a state in which the shelf is removed from the device. The Shelf Out alarm is also issued when the device stops reporting on the existence of a shelf due to another failure, even if the shelf is actually still in the device. It is assumed that any functionality that was implemented by the shelf is not working anymore if the shelf had no redundancy configuration.

Table 16-34 Shelf out—Subtype Events 

Subtype Event Name
Description

Shelf Out

Issued when a shelf is removed from the device. It is possible that some shelf failures are identified as Shelf Out, because the device does not report on the shelf's existence after the failure.

Shelf In

Clearing event. Issued when the shelf is inserted back into the device.


Correlation

Due to the nature of the Shelf Out alarm, it does not start a correlation process and is always issued as a root cause alarm.

Other alarms might correlate to it using the Shelf key, such as the Card Out alarm.

Source OID

See Shelf OID (IShelfOid), page 17-5.

Tx Dormant

VNEs are configured to trace the Tx packet counters on their device ports. An alarm is issued when an Rx counter on a port drops below the configured thresholds. The upper and lower thresholds are defined in the registry under the PortLayer1.


Note This alarm is disabled by default.


Table 16-35 Shelf out—Subtype Events 

Subtype Event Name
Description

Tx Dormant

Issued when the number of Tx packets on a device port is lower than the configured threshold.

Tx Dormant Normal

Clearing event. Issued when the number of Tx packets on a device port returns to a number higher than the configured threshold.


Correlation

The port Tx Dormant alarm does not start a correlation process and is always issued as a root cause alarm.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

Tx Utilization

VNEs are configured to trace the Tx packets counters on their device ports. An alarm is issued when a Rx counter on a port crosses the configured thresholds. The upper and lower thresholds are defined in the registry under the PortLayer1. Where the port has an adjacent peer (that is, it is connected to another port), a Link Utilization alarm is also issued. For more information on these alarms, see Link Utilization.

Table 16-36 Shelf out—Subtype Events 

Subtype Event Name
Description

Tx Overutilized

Issued when the number of Tx packets on a device port is higher than the configured threshold.

Tx Utilization Normal

Clearing event. Issued when the number of Tx packets on a device port returns to a number lower than the configured threshold.


Correlation

The port Tx Utilization alarm does not start a correlation process. No other alarm tries to correlate to this alarm, because there are no supported alarms that can be affected by the Tx Utilization on Port alarm.

Impact Analysis

Impact analysis is not supported by default for this alarm, but can be enabled. If impact analysis is enabled, a flow starts to collect all the affected services passing this port. The endpoint of such services can be any termination point, such as an IP interface, VC, port, VRF, and so on.

Source OID

See Physical Layer OID (IPhysicalLayerOid), page 17-4.

Registry Parameters

The following registry parameters are included in this section:

Adaptive Polling

All IP Interfaces Down

BGP Link Down

BGP Neighbor Loss

BGP Process Down

Broken LSP Discovered

Card Down

Card Out

Cloud Problem

Component Unreachable

CPU Utilization

Device Unsupported

Dropped Packets

Discard Packets

GRE Tunnel Down

HSRP Group Status Changed

Interface Status

Investigation State

L2TP Peer Not Established

L2tp Sessions Threshold

Layer 2 Tunnel Down

LDP Neighbor Loss

Link Down

Link Utilization

Logical Port Down

Memory Utilization

MPLS Black Hole Found

MPLS Interface Removed

MPLS TE Tunnel Down

Port Down

Rx Dormant

Rx Utilization

Shelf Out

Tx Dormant

Tx Utilization

Adaptive Polling

Table 16-37 VNE Switched to Low Polling Rate Due to CPU High Usage 

Service Alarm Setting
Registry Parameter

Type

Adaptive Polling

Subtype

high polling interval

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=124

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=VNE switched to low polling rate due to CPU high usage


Table 16-38 VNE Switched to Maintenance Mode Due to CPU High Usage 

Service Alarm Setting
Registry Parameter

Type

Adaptive polling

Subtype

maintenance

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=124

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=VNE switched to maintenance mode due to CPU high usage


Table 16-39 VNE Switched Back to Regular Polling Rate 

Service Alarm Setting
Registry Parameter

Type

Adaptive polling

Subtype

regular polling interval

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=124

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=VNE switched back to regular polling rate


All IP Interfaces Down

Table 16-40 Active IP Interface Found 

Event Setting
Registry Parameter

Type

All IP interfaces down

Subtype

active ip interfaces found

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=837

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Active ip interfaces found

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-41 All IP Interfaces Down 

Event Setting
Registry Parameter

Type

all ip interfaces down

Subtype

all ip interfaces down

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=750

Northbound metadata

alarm-type=837

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=All ip interfaces down

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


BGP Link Down

Table 16-42 BGP Link Down 

Event Setting
Registry Parameter

Type

BGP link down

Subtype

BGP link down

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=599

Northbound metadata

alarm-type=1221

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=BGP link down


BGP Link Down VRF

Table 16-43 BGP Link Down VVRF 

Event Setting
Registry Parameter

Type

BGP link down

Subtype

BGP link down vrf

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=400

Northbound metadata

alarm-type=1221

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=BGP link down vrf


BGP Link Up

Table 16-44 BGP Link Up 

Event Setting
Registry Parameter

Type

BGP link down

Subtype

BGP link up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=1221

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=BGP link up


BGP Neighbor Loss

Table 16-45 BGP Neighbor Found 

Event Setting
Registry Parameter

Type

BGP neighbor loss

Subtype

BGP neighbor found

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=127

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=BGP neighbor found


Table 16-46 BGP Neighbor Loss 

Event Setting
Registry Parameter

Type

BGP neighbor loss

Subtype

BGP neighbor loss

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=800

Northbound metadata

alarm-type=127

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=BGP neighbor loss


Table 16-47 BGP Neighbor Loss VRF 

Event Setting
Registry Parameter

Type

BGP neighbor loss

Subtype

bgp-neighbor-loss-vrf

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=400

Northbound metadata

alarm-type=127

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=BGP neighbor loss vrf


BGP Process Down

Table 16-48 BGP Process Down 

Event Setting
Registry Parameter

Type

bgp-process-down

Subtype

bgp-process-down

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=850

Northbound metadata

alarm-type=1501

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=BGP process down


Table 16-49 BGP Process Up 

Event Setting
Registry Parameter

Type

bgp-process-down

Subtype

bgp-process-up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=1501

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=BGP process up


Broken LSP Discovered

Table 16-50 Broken LSP Discovered 

Event Setting
Registry Parameter

Type

Broken LSP discovered

Subtype

Broken LSP discovered

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=129

auto-cleared=true

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Broken LSP discovered


Card Down

Table 16-51 Card Down 

Event Setting
Registry Parameter

Type

card down

Subtype

card down

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=100000

Northbound metadata

alarm-type=11

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Card down


Table 16-52 Card Up 

Event Setting
Registry Parameter

Type

card down

Subtype

card up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=11

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Card up


Card Out

Table 16-53 Card In 

Event Setting
Registry Parameter

Type

card out

Subtype

card in

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=3

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Card in


Table 16-54 Card Out 

Event Setting
Registry Parameter

Type

card out

Subtype

card out

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=100000

Northbound metadata

alarm-type=3

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Card out


Table 16-55 Subcard Out 

Event Setting
Registry Parameter

Type

card out

Subtype

subcard out

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=1000

Northbound metadata

alarm-type=3

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Card out


Cloud Problem

Table 16-56 Cloud Problem 

Event Setting
Registry Parameter

Type

cloud problem

Subtype

cloud problem

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=2000

Northbound metadata

alarm-type=122

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=INFO

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=cloud problem


Table 16-57 Cloud Problem Fixed 

Event Setting
Registry Parameter

Type

cloud problem

Subtype

cloud up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=122

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=cloud problem fixed


Component Unreachable

Table 16-58 Device Reachable 

Event Setting
Registry Parameter

Type

component unreachable

Subtype

component reachable

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=5

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Device reachable


Table 16-59 Device Unreachable 

Event Setting
Registry Parameter

Type

component unreachable

Subtype

component unreachable

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=600

Northbound metadata

alarm-type=5

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Device unreachable


CPU Utilization

Table 16-60 CPU Normal Utilization 

Event Setting
Registry Parameter

Type

cpu utilization

Subtype

cpu normal use

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=17

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=CPU normal utilization


Table 16-61 CPU Overutilized 

Event Setting
Registry Parameter

Type

cpu utilization

Subtype

cpu over utilized

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=17

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=CPU over utilized


Device Unsupported

Table 16-62 Device Initializing 

Event Setting
Registry Parameter

Type

device unsupported

Subtype

device initializing

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=16

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Device initializing


Table 16-63 Device Unsupported 

Event Setting
Registry Parameter

Type

device unsupported

Subtype

device unsupported

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=16

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Device unsupported


Dropped Packets

Table 16-64 Dropped Packets on Port 

Event Setting
Registry Parameter

Type

dropped packets

Subtype

dropped packets

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=10

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Dropped packets on port


Table 16-65 Stopped Dropping Packets on Port 

Event Setting
Registry Parameter

Type

dropped packets

Subtype

normal dropped packets

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=10

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Stopped dropping packets on port


Discard Packets

Table 16-66 Discard Packets 

Event Setting
Registry Parameter

Type

discard packets

Subtype

discard packets

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=9

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Drops exceed limit


Table 16-67 Normal Discard Packets 

Event Setting
Registry Parameter

Type

discard packets

Subtype

normal discard packets

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=9

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Drops don't exceed limit


GRE Tunnel Down

Table 16-68 GRE Tunnel Down 

Event Setting
Registry Parameter

Type

GRE tunnel down

Subtype

GRE tunnel down

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=830

Northbound metadata

alarm-type=358

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=GRE tunnel down


Table 16-69 GRE Tunnel Up 

Event Setting
Registry Parameter

Type

GRE tunnel down

Subtype

GRE tunnel up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=358

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=GRE tunnel up


HSRP Group Status Changed

Table 16-70 Primary HSRP Interface Is Active 

Event Setting
Registry Parameter

Type

hsrp group status changed

Subtype

Primary HSRP interface is active

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=22

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Primary HSRP interface is active


Table 16-71 Primary HSRP Interface Is Not Active 

Event Setting
Registry Parameter

Type

hsrp group status changed

Subtype

Primary HSRP interface is not active

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=720

Northbound metadata

alarm-type=22

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Primary HSRP interface is not active


Table 16-72 Secondary HSRP Interface Is Active 

Event Setting
Registry Parameter

Type

hsrp group status changed

Subtype

Secondary HSRP interface is active

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=720

Northbound metadata

alarm-type=22

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Secondary HSRP interface is active


Table 16-73 Secondary HSRP Interface Is Not Active 

Event Setting
Registry Parameter

Type

hsrp group status changed

Subtype

Secondary HSRP interface is not active

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=22

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Secondary HSRP interface is not active


Interface Status

Table 16-74 Interface Status Down 

Event Setting
Registry Parameter

Type

interface status

Subtype

interface status down GRE tunnel

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=825

Northbound metadata

alarm-type=700

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Interface status down

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-75 Interface Status Down 

Event Setting
Registry Parameter

Type

interface status

Subtype

interface status down connection

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=500

Northbound metadata

alarm-type=700

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Interface status down

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-76 Interface Status Down 

Event Setting
Registry Parameter

Type

interface status

Subtype

interface status down non connection

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=700

Northbound metadata

alarm-type=700

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Interface status down

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-77 Interface Status Up 

Event Setting
Registry Parameter

Type

interface status

Subtype

interface status up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=700

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Interface status up

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Investigation State

Table 16-78 Investigation State 

Event Setting
Registry Parameter

Type

investigation state

Subtype

investigation state module unsupported

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=262

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Module unsupported


L2TP Peer Not Established

Table 16-79 l2TP Peer Established 

Event Setting
Registry Parameter

Type

l2tp peer not established

Subtype

l2tp peer established

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=185

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=l2tp peer established

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-80 l2TP Peer Is Removed 

Event Setting
Registry Parameter

Type

l2tp peer not established

Subtype

l2tp peer is removed

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=185

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=l2tp peer is removed

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-81 l2TP Peer Not Established 

Event Setting
Registry Parameter

Type

l2tp peer not established

Subtype

l2tp peer not established

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=185

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=l2tp peer not established

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


L2tp Sessions Threshold

Table 16-82 l2TP Sessions Count Exceeds Maximum Threshold 

Event Setting
Registry Parameter

Type

l2tp sessions threshold

Subtype

l2tp sessions count exceeds max threshold

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=N/A (TCA alarm)

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=l2tp sessions count exceeds max threshold


Table 16-83 l2TP Sessions Count Has Returned To Normal 

Event Setting
Registry Parameter

Type

l2tp sessions threshold

Subtype

l2tp sessions count has returned to normal

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=N/A (TCA alarm)

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=l2tp sessions count has returned to normal


Layer 2 Tunnel Down

Table 16-84 Layer 2 Tunnel Down 

Event Setting
Registry Parameter

Type

layer 2 tunnel down

Subtype

layer 2 tunnel down

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=179

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Layer 2 tunnel down


Table 16-85 Layer 2 Tunnel Up 

Event Setting
Registry Parameter

Type

layer 2 tunnel down

Subtype

layer 2 tunnel up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=179

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Layer 2 tunnel up


LDP Neighbor Loss

Table 16-86 LDP Neighbor Down 

Event Setting
Registry Parameter

Type

LDP neighbor loss

Subtype

LDP neighbor down

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=670

Northbound metadata

alarm-type=557

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=LDP neighbor down


Table 16-87 LDP Neighbor Up 

Event Setting
Registry Parameter

Type

LDP neighbor loss

Subtype

LDP neighbor up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=557

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=LDP neighbor up


Link Down

Table 16-88 Link Down Due To Admin Down 

Event Setting
Registry Parameter

Type

link down

Subtype

link down due to admin down

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=850

Northbound metadata

alarm-type=1

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Link down due to admin down

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-89 Link Down Due To Card Event 

Event Setting
Registry Parameter

Type

link down

Subtype

link down due to card

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=850

Northbound metadata

alarm-type=1

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Link down due to Card event

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-90 Link Down Due To Oper Down 

Event Setting
Registry Parameter

Type

link down

Subtype

link down due to oper down

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=850

Northbound metadata

alarm-type=1

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Link down due to oper down

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-91 Link Down On Unreachable 

Event Setting
Registry Parameter

Type

link down

Subtype

link down on unreachable

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=850

Northbound metadata

alarm-type=1

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CRITICAL

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Link down on unreachable

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-92 Link Up 

Event Setting
Registry Parameter

Type

link down

Subtype

link up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=1

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Link up

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Link Utilization

Table 16-93 Link Overutilized 

Event Setting
Registry Parameter

Type

link utilization

Subtype

link over Utilized

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=0

Northbound metadata

alarm-type=642

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Link over utilized


Table 16-94 Link Utilization Normal 

Event Setting
Registry Parameter

Type

link utilization

Subtype

link utilization normal

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=0

Northbound metadata

alarm-type=642

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Link utilization normal


Logical Port Down

Table 16-95 Logical Port Down 

Event Setting
Registry Parameter

Type

logical port down

Subtype

logical port down

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=0

Northbound metadata

alarm-type=198

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Logical port down


Table 16-96 Logical Port Up 

Event Setting
Registry Parameter

Type

logical port down

Subtype

logical port up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=198

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Logical port up


Memory Utilization

Table 16-97 Memory OK 

Event Setting
Registry Parameter

Type

memory utilization

Subtype

memory normal use

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=18

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Memory OK


Table 16-98 Memory Overutilized 

Event Setting
Registry Parameter

Type

memory utilization

Subtype

memory over utilized

Correlation information

activate-flow=-

correlate=-

is-correlation-allowed=-

weight=-

Northbound metadata

alarm-type=18

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Memory over utilized


MPLS Black Hole Found

Table 16-99 MPLS Black Hole Cleared 

Event Setting
Registry Parameter

Type

MPLS Black hole found

Subtype

MPLS Black hole cleared

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=128

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=MPLS Black hole cleared


Table 16-100 MPLS Black Hole Found 

Event Setting
Registry Parameter

Type

MPLS Black hole found

Subtype

MPLS Black hole found

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=650

Northbound metadata

alarm-type=128

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=WARNING

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=MPLS Black hole found


MPLS Interface Removed

Table 16-101 MPLS Interface Added 

Event Setting
Registry Parameter

Type

MPLS interface removed

Subtype

MPLS interface added

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=972

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=MPLS interface added


Table 16-102 MPLS Interface Removed

Event Setting
Registry Parameter

Type

MPLS interface removed

Subtype

MPLS interface removed

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=700

Northbound metadata

alarm-type=972

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=MPLS interface removed


MPLS TE Tunnel Down

Table 16-103 MPLS-TE tunnel Down 

Event Setting
Registry Parameter

Type

mpls te tunnel down

Subtype

mpls te tunnel down

Correlation information

activate-flow=true

correlate=true

is-correlation-allowed=true

weight=800

Northbound metadata

alarm-type=555

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=MPLS-TE tunnel down

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-104 MPLS-TE Tunnel Up 

Event Setting
Registry Parameter

Type

mpls te tunnel down

Subtype

mpls te tunnel up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=555

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=MPLS-TE tunnel up

Flapping information

clear-interval=240000

flapping-interval=60000

flapping-threshold=5

update-interval=200000

update-threshold=20


Port Down

Table 16-105 Port Down 

Event Setting
Registry Parameter

Type

port down

Subtype

port down

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=100000

Northbound metadata

alarm-type=2

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Port down

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-106 Port Down Due To Card Event 

Event Setting
Registry Parameter

Type

port down

Subtype

port down due to card

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=true

weight=900

Northbound metadata

alarm-type=2

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Port down due to Card event

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Table 16-107 Port Up 

Event Setting
Registry Parameter

Type

port down

Subtype

port up

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=2

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Port up

Flapping information

clear-interval=360000

flapping-interval=150000

flapping-threshold=5

update-interval=200000

update-threshold=20


Rx Dormant

Table 16-108 Rx Dormant 

Event Setting
Registry Parameter

Type

rx dormant

Subtype

rx dormant

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=378

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=rx dormant


Table 16-109 Rx Dormant Normal 

Event Setting
Registry Parameter

Type

rx dormant

Subtype

rx dormant normal

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=378

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=rx dormant normal


Rx Utilization

Table 16-110 Rx Overutilized 

Event Setting
Registry Parameter

Type

rx utilization

Subtype

rx over Utilized

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=8

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=RX over utilized


Table 16-111 Rx Utilization Normal 

Event Setting
Registry Parameter

Type

rx utilization

Subtype

rx utilization normal

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=8

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=RX utilization normal


Shelf Out

Table 16-112 Shelf In 

Event Setting
Registry Parameter

Type

shelf out

Subtype

shelf in

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=33

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=Shelf in


Table 16-113 Shelf Out 

Event Setting
Registry Parameter

Type

shelf out

Subtype

shelf out

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=true

weight=110000

Northbound metadata

alarm-type=33

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MAJOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=Shelf out


Tx Dormant

Table 16-114 Tx Dormant 

Event Setting
Registry Parameter

Type

tx dormant

Subtype

tx dormant

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=377

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=tx dormant


Table 16-115 Tx Dormant Normal 

Event Setting
Registry Parameter

Type

tx dormant

Subtype

tx dormant normal

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=377

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=tx dormant normal


Tx Utilization

Table 16-116 Tx Overutilized 

Event Setting
Registry Parameter

Type

tx utilization

Subtype

tx over Utilized

Correlation information

activate-flow=false

correlate=true

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=7

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=MINOR

gw-correlation-timeout=1200000

is-ticketable=true

send-to-gw=true

short-description=TX over utilized


Table 16-117 Tx Utilization Normal 

Event Setting
Registry Parameter

Type

tx utilization

Subtype

tx utilization normal

Correlation information

activate-flow=false

correlate=false

is-correlation-allowed=false

weight=0

Northbound metadata

alarm-type=7

auto-cleared=false

auto-removed=true

functionality-type=SERVICE

severity=CLEARED

gw-correlation-timeout=1200000

is-ticketable=false

send-to-gw=true

short-description=TX utilization normal