Security Related Events
The Table below lists the Type of Event, Description, and a link to the respective procedure to further explain the event.
Tellabs 1100 Series Optical LAN - Security Related Events
| Type | Description |
| ADDROLE-FAILURE | Indicates an admin user was unsuccessful in creating a new user role category. |
| ADDROLE-SUCCESS | An admin user added a new user role. User roles are used to control what a user can or cannot do on the system. |
| ADDUSER-FAILURE | Indicates that an attempt was made to create a user, but the create attempt failed. This could have been caused by:
|
| ADDUSER-SUCCESS | Records the time and date a CLI or EMS user is added to the user database. |
| CERTIFICATE-EXPIRING | Signaled when the device has a certificate that is due to expire within the configured warning period. This event is sent weekly (or the configured interval) within the warning period. The detailed event text includes the date, CN, and number of days. For example:"Certificate CN=xxxx expires in 10 days on 10/5/2011."Note: It is IMPORTANT that the certificate be updated prior to the expiration date given in the warning.
|
| CERTIFICATE-REVOKED | Signaled when the device attempts to validate a certificate of a peer and the OCSP Online Certificate Status Protocol returns that the certificate has been revoked. The OCSP is used to revoke valid unexpired certificates and deny access to the system.Note: The Additional Text field provides details of which certificate has been found to have been revoked |
| CHGPWD-FAILURE | Records the time and date a CLI or EMS user failed in attempting to change their password. |
| CHGPWD-SUCCESS | Records the time and date that a CLI or EMS user changed their password.Note: The Additional Text field indicates: Change Password for User ID <admin>. |
| DEBUG-ACCESS | Records the time and date a user activated access to the Tellabs debug menus. Users can be restricted from this function by unchecking the "Allow admin debug access" in the Edit Menu > NE User Administration > Local Craft User Configuration screen. |
| DELROLE-FAILURE | Records the time and date a CLI or EMS user failed in changing their assigned role. |
| DELROLE-SUCCESS | Indicates that an admin user has deleted a role from the EMS. |
| DELUSER-FAILURE | Indicates that a user account has been deleted. |
| DELUSER-SUCCESS | Indicates that a user account has been deleted. |
| DEVICE-CERTIFICATE-DOWNLOAD-FAILED | Sent when the device cannot download a Certificate to the device. The current certificate is maintained. The detailed text on the alarm includes the certificate type and name. For example:"CA Certificate download xxx.pem failed" or "Device Certificate download xxx.p12 failed." |
| DEVICE-CERTIFICATE-INSTALLED | Sent when a device successfully installs a new certificate on a device.Note: This event is to ensure that all changes in certificates are logged in the security log. This event does not imply any issue within the system and is provided as a part of security logging. |
| DISABLEUSER-FAILURE | Records the time and date a CLI or EMS user being disabled failed. |
| DISABLEUSER-SUCCESS | Indicates that a user account was disabled by an administrative user. |
| DISPLAY-SECURITY-LOG | Records the time and date the security log was displayed. |
| DOWNLOADED-CERTIFICATE-INVALID | Sent when a device attempts to download a certificate and finds that the certificate is invalid. The existing certificate is left in place when the downloaded certificate is determined to be invalid and the invalid certificate is discarded. Service to the unit should not be affected. This event could be due to one of the following causes:
|
| ENABLEUSER-FAILED | Indicates the failure to enable the user |
| ENABLEUSER-SUCCESS | Indicates that a user account has been enabled. When disabled, an account cannot be used. The user that enabled the account is shown in the userID field. |
| LOGIN-FAILURE | Records the time and date a user failed to log into the system due to invalid credentials. The username used in the attempted login is shown in the log.Note: The Additional Text field gives the reason for the login failure such as invalid password, expired user, etc. |
| LOGIN-SUCCESS | Records the time and date a user successfully logged into the system. The username used login is shown in the log. |
| LOGINFAILURE-EXCESSIVE-ATTEMPTS | Indicates that a user has failed to successfully log i to the EMS and the retry limit has been reached. |
| LOGINFAILURE-NOTFOUND | Indicates that a user has attempted to log into the system and the user name was not found in the username database. |
| LOGINFAILURE-PORT-LOCKED |
The user has provided incorrect username or password beyond the set login failure limit and has been temporarily locked out of the system. The most probable cause of this event is: Invalid Login Attempt - A user has used an incorrect username or password too many times and has been temporarily locked out of the system. The system lockout time is configurable. The incident should be investigated to ensure someone is not attempting to gain improper access to the system. The username will be included in the event. The user account can be disabled at the EMS GUI or NE CLI to prevent further accesses by this user. |
| LOGOUT | Records the time and date a user actively logged out of the system. |
| MODROLE-FAILURE | Records the time and date a CLI or EMS user failed when attempting to modify their assigned role. |
| MODROLE-SUCCESS | Indicates that an admin user has successfully modified attributes of one of the roles. |
| MODUSER-FAILURE | Records the time and date a CLI or EMS user failed attempting to modify their database entry. |
| MODUSER-SUCCESS | Indicates that an admin user has successfully modified a user's attributes. |
| PEER-CERT-FAIL-VALIDATION | Indicates that the peers certificate has been found to be invalid. This can only happen if encryption is being used and it is secured by non-stock certificates. The ESU to EMS interface is always encrypted, but by default stock certificates are used (which always validate). If non-stock certificates are used, the possibility exists that the certificate is bad, revoked or expired. Two interfaces use certificates. One is the EMS to NE management interface. The other is ONTs when secure voice is being used with TLS selected in an Equipment Profile.Note: If the peer certificate is invalid, voice calls cannot be initiated. EMS / NE management is not possible if the far end certificate is found to be invalid.The probable causes of this event include:
|
| PEER-CERT-FAIL-VALIDATION (cont’d) |
Peer Certificate is Invalid: It is possible that the peer being communicated with does have an invalid certificate and may possibly be a bad actor. The event gives the IP address of the peer and the Certificate Name (found in the SubjectName field) so that the peer can be traced back to the source. You can see the certificate details by clicking on the event in the EMS Events View.
|
| PEER-CERT-FAIL-VALIDATION (cont’d |
CertificateName does not resolve to correct IP: One of the checks on a certificate is the CN or Certificate Name is the hostname or IP address of the owner of the certificate. If the IP address the SSL socket is coming from does not match the hostname (after resolution by DNS to an IP) or the IP address in the certificate, then certificate validation will fail. Typically, this indicates a server is being spoofed and has a valid certificate but not the correct IP address/hostname that is associated with that certificate. It may also be due to an incorrect DNS entry causing the hostname/IP address to not be properly matched. You can see the certificate details by clicking on the event in the EMS Events View.![]() |
| REMOTE-ACCESS | Records the time and date that a CLI user logs into a remote board within the system. For example, logging into an ONT from the ESU can generate this event. |
| RESETPWD-FAILURE | Records the time and date that an EMS Admin user failed to reset a password. |
| RESETPWD-SUCCESS | Records the date and time that an EMS or CLI Admin user reset a user password. The user is forced to change their password on the next use. |
| SECURITY-MGR-CHG | Records the date and time a CLI or EMS system admin modifies the attributes applied to a system admin. This often occurs as a result of a user with admin privileges changes their password. This also occurs when an admin logs in due to the time of last login being updated. |
| SECURITY-USER-CHG | Records the date and time a CLI or EMS user modifies the properties of a selected OLT. |
| SERVER-STARTUP | Informs the user that the EMS server has been restarted and allows the event to be logged for troubleshooting purposes. |
| SETSECSETTINGS-FAILURE | Records the date and time a failed attempt to change the security settings. |
| SETSECSETTINGS-SUCCESS | Records the date and time a successful attempt to change the security settings. |
| TIMEOUT-LOCKED | Records the date and time a user session console is locked. The user is given 10 minutes to log back in. If the user does not log back in within 10 minutes, the session is ended, the user is logged out, and a TIMEOUT_LOGOUT event is generated. |
| TIMEOUT-LOGOUT | Records the date and time a user was logged out due to inactivity after being locked out due to inactivity. |
| TIMEOUT-UNLOCK-FAILURE | Records the date and time a user, who has been locked out due to inactivity, attempts to log back into the system and has attempted to enter the password three times without success. |
| TIMEOUT-UNLOCK-SUCCESS | Records the date and time a user, who has been locked out due to inactivity, logs back into the system. |
| TL1-LOGIN-FAILURE | Records the date and time a TL1 user has attempted to log into the system and has failed due to improper credentials. |
| TL1-LOGIN-SUCCESS | Records the date and time that a TL1 user successfully gained access to the system. |
| TL1-LOGOUT | Records the date and time a user did not keep the session active by re-attempting to login before the timeout and the user was logged out of the TL1 interface. |

