Loader

Download the PDF 

Using Syslog with OLAN

Introduction 

This document will outline the uses of Syslog and how to configure the Tellabs OLAN system to output system events to syslog collectors. Syslog is supported on both the OLT and Panorama PON EMS.

Applies To 

  • All OLT and EMS release SR29 and above for OLT Syslog.
  • All EMS release SR31.3 and above for EMS Syslog.

Document Number 

ENG-010555

Document Revision History 

This section describes changes to this document:

Revision Date Notes
Revision 21 April 2024 Updated from Document:  syslog-mapv21wDescription
Changes
  • Added 13 new Events (Highlighted in Red)
  1. DHCPOPT82INVALID
  2. DHCPMACINVALID
  3. MUTUALAUTHENABLED
  4. MUTUALAUTHDISABLED
  5. DHCPINVALIDRELEASE
  6. DHCPINVALIDRELAY
  7. RADIUSSVCDENIED
  8. RADIUSSERVERAVAILABLE
  9. RADIUSSERVERUNAVAILABLE
  10. DHCPSVRINVALID
  11. UNTRUSTEDGW
  12. USERCMD
  13. DHCPIPCONFLICT
  • Changed 17 Facility Priority Designations from 23 to 4 (Highlighted in Red)

What is Syslog? 

Syslog is a standard interface for message logging from software applications. The standardized interface allows system administrators to collect the informational and error logging from multiple systems and collect it into a single display.

The basic syslog architecture typically consists of a Syslog Originator, Syslog Collector, and optionally a Syslog Relay or Syslog Analyzer/Reporter.

  • Syslog Originator – A system such as a computer, switch, router, or application which needs to log messages.
  • Syslog Collector – A system which receives syslog messages from one or more syslog originators which at a minimum will log the messages to disk and possibly display them.
  • Syslog Analyzer/Reporter – A system which is typically co-located with the Syslog Collector and provides various functions.
  • Syslog Filtering – The ability to filter syslog messages by data contained within syslog messages. This allows the user to search for specific messages, or only messages from specific machines or time periods for use in troubleshooting.
  • Syslog Reporting – The ability to generate reports from syslog data for use in analysis of the network or reporting on network health.
  • Exporting of Data – Often tools can export data to a format usable by databases or spreadsheets.
  • Email Hooks – Many tools have email hooks so that upon the reception of specific syslog messages, the system administrator can be immediately informed. This is very useful for proactive monitoring of the system.

The capability to aggregate logs from many devices into a single interface allows for many benefits when a good syslog server is deployed. Some of the benefits are:

  • All failures/errors for the entire network or managed domain are collected in a single server.
  • Failures can be more easily analyzed and correlated with failures on other systems for troubleshooting.
  • Easier to see overall network health rather than looking at individual systems.

Once the fault or event has been analyzed, it can be then further analyzed by consulting the management system for the device which emitted the syslog message.

Anatomy of a Syslog Message 

While some of the basic parts of a syslog message are standardized, there is a great deal of variance in the specifics of the messages. This section will give a basic understanding of the format of a syslog message on Tellabs OLAN systems.

Fields of a Syslog Message:

  • RTY
    • Date - Date of when the message was emitted.
  • Time - Time when the message was emitted.
  • Priority - Consists of two fields:
    • Facility - The subsystem which emitted the event. These were originally defined for unix systems. Olan like many systems reports all of its events by default on the local use 7 facility type or the security/authorization 4 facility.
      • 0             kernel messages
      • 1             user-level messages
      • 2             mail system
      • 3             system daemons
      • 4             security/authorization messages
      • 5             messages generated internally by syslogd
      • 6             line printer subsystem
      • 7             network news subsystem
      • 8             UUCP subsystem
      • 9             clock daemon
      • 10            security/authorization messages
      • 11            FTP daemon
      • 12            NTP subsystem
      • 13            log audit
      • 14            log alert
      • 15            clock daemon
      • 16            local use 0  (local0)
      • 17            local use 1  (local1)
      • 18            local use 2  (local2)
      • 19            local use 3  (local3)
      • 20            local use 4  (local4)
      • 21            local use 5  (local5)
      • 22            local use 6  (local6)
      • 23            local use 7  (local7) – Default facility for OLAN
    • Level - The severity level of the message.
      • 0 Emergency - System is unusable.
      • 1 Alert - Action must be taken immediately.
      • 2 Critical - Critical condition.
      • 3 Error - Error condition.
      • 4 Warning - Warning condition.
      • 5 Notice - normal but significant condition.
      • 6 Informational - Informational event, typically no an error, but just to log occurrences of events.
      • 7 Debug - Information logged to aid in later troubleshooting if an error does arise.
  • Hostname / IP - Which system the event came from.
  • Message - The body of the syslog message.

    CORP-1150 olan - 030002 - BOM %PROV-INFO-PROV UserID=emsuser From=172.28.224.15:1632 Command=setNACProfile Action=edit Object=PROFILE-NAC-GW-QoS-if02-p4-sv102-nv702

    The syslog message body in OLAN is a structured set of fields which are defined as follows:

    • Hostname – Gives the hostname of the OLT that emitted the message, in the example above CORP-1150.
    • Application Name – The name of the application which emitted the event. Will always be olan for Tellabs OLTs.
    • MSGID - Gives a numerical identifier for the type of message. In this example, it is 30002. This allows reporters and analyzers of syslog messages to have an easy way to filter messages. Later in this document, the MSGIDs for OLAN will be identified.
    • BOM - Standard field for syslog indicating Beginning OMessage body.
    • Structured Data - A set of structured fields which can be parsed. In this example: %PROV-INFO-PROV, which is of the form: CLASS-SEVERITY-EVENT.
      • CLASS - The class or type of event which has occurred. PROV in this example indicates it was a provisioning or configuration change.
        • AUTH - Authentication related events, login, logout, etc. Certificate related information will be displayed here if not already covered by an EVNT which goes to the EMS.
        • ALRM - Reporting of an Alarm Set or Clear
        • ACL - Reporting of an ACL violation
        • CLI - Reporting of changes initiated by CLI commands on the NE.
        • DEBUG - Capability to turn on debug logs and have them sent to syslog for debugging of specific issues. Those are logged to syslog with debug.
        • DNLD - Reporting of download and commanded switch events.
        • EVNT - Reporting of an Event message equivalent to the EMS event reports.
        • EXCPT - Messages that appear in the Exception log on the OLT. Those are typically high priority failures.
        • HTTP - Reporting of HTTP file transfer events.
        • INFO - Additional information items.
        • PROV - Reporting of a Provisioning change from the EMS.
        • PLATFM - Reporting of platform events, plug in, plug out, etc. Card reboots, startups, etc.
        • RADIUS - Reporting of events related to Radius.
        • SNMP - Reporting of events related to an SNMP agent.
        • SWITCH - Switching error/debug messages.
        • VOIP - Reporting of significant voice events.
      • SEVERITY - The message severity and it correlates with those defined for syslog (EMER/ALERT/CRIT/ERROR/WARN/NOTICE/INFO/DEBUG)
      • EVENT – If further classification can be given, the event field will further classify the event.
    • UserID – If the event involved a user action, the user id will be given. If the change was initiated by the EMS the userID will be EMS and the EMS log will have to be consulted to get the specific user.
    • From – If the event involved a change from a remote entity the IP address of the user session or EMS will be given.

Logging of Provisioning Changes 

Provisioning changes will all be logged using the %PROV-INFO-PROV structured data field.

  %PROV-INFO-PROV UserID=emsuser From=172.28.224.15:1632 Command=setNACProfile Action=edit Object=PROFILE-NAC-GW-QoS-if02-p4-sv102-nv702

  • Command – This will indicate the provisioning command that was initiated, in this case setting of a NAC Profile.
  • Action – Edit/Create/Delete, indicates whether the object was created, edited, or deleted.
  • Object – Identification of the specific object that was modified. In the case of most changes it will be the name of a profile.

Logging of Alarms 

All alarms from the OLAN system are forwarded to syslog and so can be used to trigger emails or other notifications supported by the syslog server for automated dispatch on system failures.

A typical alarm is in the form of:

1 2015-11-16T15:58:16-06:00 BigD olan - 040075 - BOM %ALARM-WARN-ETHACCESS SET:AID=ETH1-1-1-32-1 SV=MN PC=ACCESS_VIOLATION ET=11/16/2015 15:58:16

Where:

  • Structured Data - %ALARM-<severity>-<alarm type>. In the example above, the alarm type would be ETHACCESS or an Ethernet Access Violation Alarm.
  • SET/CLEAR – Indicates whether the alarm was SET or Cleared.
  • AID – Access Identifier Where on the system the alarm occurred. In this case at port: ETH-1-1-31-1

Summary of Syslog Events 

The following section will define a catalog of reported syslog events.

 facility Severity Class Event msgid Mnemonic Level Description
4 6 AUTH LOGIN 10002 SecurityAudit 1 User Logged into the system
4 6 AUTH LOGOUT 10003 SecurityAudit 1 User Logged out of the system.
4 6 AUTH LOGINFAILURE 10001 SecurityAudit 1 User failed to login due to an invalid username or password.
4 6 AUTH LOGINFAILUREDISABLED 10004 SecurityAudit 1 Interface is locked due to too many login failures.
4 6 AUTH LOGINFAILURENOTFOUND 10005 SecurityAudit 1  
4 6 AUTH LOGINTIMEOUT 10006 SecurityAudit 1 User logged out due to timeout.
4 6 AUTH TIMEOUTUNREACHABLE 10007 SecurityAudit 1  
4 6 AUTH CASINTERNALERROR 10008 SecurityAudit 1 Craft Authentication Server has an internal error.
4 6 AUTH USERCMD 10009 SecurityAudit 1 Content of User CLI command along with Success or Failure.
4 6 AUTH EXCESSIVELOGINATTEMPTS 10010 SecurityAudit 1 Excessive User Login Failures.
4 6 AUTH LOGINFAILUREPORTLOCKED 10011 SecurityAudit 1 Port Locked due to too many login failures.
4 6 AUTH PASSWORDCHG 10012 SecurityAudit 1 User changed password.
4 6 AUTH PASSWORDRESET 10013 SecurityAudit 1 User Password is reset by the administrator.
4 6 AUTH SECURITYATTRIBCHANGE 10014 SecurityAudit 1 Security attributes were modified by the administrator.
4 6 AUTH REMOTEACCESS 10015 SecurityAudit 1 Telnet or SSH session started.
4 6 AUTH USERADD 10016 SecurityAudit 1 User was added to the database.
4 6 AUTH USERDELETE 10017 SecurityAudit 1 User was deleted from the database.
4 6 AUTH USERDISABLED 10018 SecurityAudit 1 User account was disabled.
4 6 AUTH USERENABLED 10019 SecurityAudit 1 User account was enabled.
4 6 AUTH DEBUGACCESS 10020 SecurityAudit 1 User logged into debug system.
4 6 AUTH DISPLAYSECLOG 10021 SecurityAudit 1 User displayed the security log.
4 4 AUTH CERTEXPIRING 10091 SecurityAudit 1 Certificate is Expiring Soon.
4 6 AUTH CERTINSTALL 10088 SecurityAudit 1 New Certificate was installed into the system.
4 3 AUTH CERTEXPIRED 10100 SecurityAudit 1 The Current Certificate has expired.
4 3 AUTH CERTINVALID 10087 SecurityAudit 1 User Attempted to load invalid certificate, date range or cert invalid.
4 6 AUTH CERTDNLDFAIL 40089 SecurityAudit -1 Certificate Download to the system failed. Cert was not installed.
4 4 AUTH DHCPOPT82INVALID 10102 SecurityAudit -1 DHCP Option 82 message sent from UNI port discarded.
4 4 AUTH DHCPMACINVALID 10103 SecurityAudit -1 DHCP Client Hardware Address not equal to source MAC
4 6 AUTH MUTUALAUTHENABLED 10104 SecurityAudit -1 Mutual Authentication Enabled
4 6 AUTH MUTUALAUTHDISABLED 10105 SecurityAudit -1 Mutual Authentication Disabled
4 6 AUTH DHCPINVALIDRELEASE 10106 SecurityAudit -1 DHCP Client attempted to release IP it didn't own
4 6 AUTH DHCPINVALIDRELAY 10107 SecurityAudit -1 DHCP Client attempted to set Relay IP field
4 6 AUTH DHCPIPCONFLICT 10108 SecurityAudit -1 Static IP is using same address as DHCP Client
4 6 AUTH DELUSERFAIL 10028 SecurityAudit -1 User delete was attempted but failed.
4 6 AUTH ENABLEUSERFAIL 10031 SecurityAudit -1 User account enable failed.
4 6 AUTH LOGINLOCKED 10032 SecurityAudit -1 Logins are locked out for a timeout due to login failures.
4 6 AUTH RADIUSAUTHFAIL 10033 SecurityAudit -1 Radius AAA has rejected user credentials.
4 6 AUTH RADIUSAUTHSUCCESS 10037 SecurityAudit -1 Radius AAA has accepted user credentials.
4 6 AUTH PEERCERTINVALID 10092 SecurityAudit -1 System received invalid certificate from the peer in SSL exchange.
4 6 AUTH USERCHG 10036 SecurityAudit -1 User attributes changed.
4 6 AUTH CERTREVOKED 10086 SecurityAudit -1 Certificate revoked by OCSP
4 3 AUTH OCSPFAIL 10090 SecurityAudit 8 Online Certificate Status Check OCSP server failed to respond.
4 6 AUTH SSHKEYADDED 10034 SecurityAudit 1 User Added SSH Key to Keystore
4 6 AUTH SSHKEYDELETED 10035 SecurityAudit 1 User Deleted SSH Key from Keystore
4 6 AUTH SSHKEYINVALID 10038 SecurityAudit 1 User Access Denied due to Invalid ssh key
4 4 AUTH ARPDENY 10093 SecurityAudit -1 ARP Dropped by Dynamic ARP Inspection
4 4 AUTH ARPPERMIT 10094 SecurityAudit -1 ARP Dropped by Dynamic ARP Inspection
4 4 AUTH RADIUSPROFAPPLIED 10095 SecurityAudit -1 RADIUS applied a profile dynamically using FILTERID
4 4 AUTH RADIUSPROFREMOVED 10096 SecurityAudit -1 RADIUS removed a profile previously applied using FILTERID
4 4 AUTH RADIUSSVCDENIED 10097 SecurityAudit -1 RADIUS attempted to apply a service that was rejected.
4 4 AUTH RADIUSSERVERAVAILABLE 10098 SecurityAudit -1 RADIUS server is now available.
4 4 AUTH RADIUSSERVERUNAVAILABLE 10099 SecurityAudit -1 RADIUS server was detected as not being available.
4 4 AUTH DHCPSVRINVALID 10101 SecurityAudit -1 DHCP Server on Untrusted Port
4 6 AUTH UNTRUSTEDGW 10109 SecurityAudit -1 ROUTER on Untrusted Port
23 6 DNLD SWDLINIT 20000 EsuSWU 5 A software download has begun to the system.
23 6 DNLD SWDLCOMPLETE 20001 EsuSWU 5 A software download to the system has completed.
23 3 DNLD SWDLFAILED 20002 EsuSWU 5 A software download was attempted but failed.
23 6 DNLD SWSWITCH 20003 EsuSWU 5 A software switch was initiated.
23 6 DNLD SWITCHCMPLT 20004 EsuSWU 5 A software switch was completed.
23 4 ALARM ACPWRLOS 40023 AlarmHist 8 AC power has been lost at a battery backed device.
23 4 ALARM LWBATVG 40024 AlarmHist 8 An ONT battery pack is showing low voltage alarm.
23 4 ALARM PSFAIL 40025 AlarmHist 8 A power supply has failed.
23 4 ALARM PSMISS 40026 AlarmHist 8 A battery is missing from a battery backed up device.
23 4 ALARM LOPLLOS 40032 AlarmHist 8 Link to an ONT has failed.
23 4 ALARM LOPLLOF 40033 AlarmHist 8 Loss of Frame is detected.
23 4 ALARM LOPLSF 40034 AlarmHist 8 Optical link quality is below Signal Fail threshold.
23 4 ALARM LOPLLCD 40035 AlarmHist 8 Optical link cannot find frame delimiters.
23 4 ALARM LOPLCPE 40036 AlarmHist 8 Channel Phase Error ONT Transmission Drifing.
23 4 ALARM LOPLLOA 40037 AlarmHist 8 ONT has failed to Acknowledge OMCI message.
23 4 ALARM DYINGGASP 40038 AlarmHist 8 ONT has gone down due to total loss of power.
23 4 ALARM LOPLOAML 40039 AlarmHist 8 Three Consecutive GPON PLOAM messages missed.
23 4 ALARM LOPLPEE 40040 AlarmHist 8 Physical Equipment Error
23 4 ALARM ONTRDI 40041 AlarmHist 8 ONT has detected a remote defect indication.
23 4 ALARM ONTINTSFT 40042 AlarmHist 8 ONT internal software alarm.
23 4 ALARM ONTSDF 40043 AlarmHist 8 ONT Signal Degrade Alarm
23 4 ALARM VIDEOLOSONT 40048 AlarmHist 8 1550 Video signal has been lost at ONT.
23 4 ALARM ONTLANLOS 40076 AlarmHist 8 ONT UNI Port has failed.
23 4 ALARM DHCPSRVNORESP 40051 AlarmHist 8 SIP Voice Port cannot contact DHCP server.
23 4 ALARM DHCPSRVINCMPLRESP 40052 AlarmHist 8 SIP Voice Port did not get DNS entry from DHCP server.
23 4 ALARM CSRVDNAME 40053 AlarmHist 8 SIP Tconfig Server did not recognize device name.
23 4 ALARM CSRVNOTAUTH 40054 AlarmHist 8 SIP Tconfig Server login failed due to authorization.
23 4 ALARM CSRVTIMEOUT 40055 AlarmHist 8 SIP Tconfig Server message timed out.
23 4 ALARM CSRVMALFCONFDOC 40056 AlarmHist 8 SIP Tconfig Server sent Malformed Document, check dial plan and parms.
23 4 ALARM CSRVSRVFAIL 40057 AlarmHist 8 SIP Tconfig Server sent server failure.
23 4 ALARM SIPUAREGDNAME 40058 AlarmHist 8 SIP UA Could Not Resolve Domain Name.
23 4 ALARM SIPUAREGAUTH 40059 AlarmHist 8 SIP UA Could Not Register due to Username or Password
23 4 ALARM SIPUAREGTIMEOUT 40060 AlarmHist 8 SIP UA timed out on Registering with the switch.
23 4 ALARM SIPUAREGRSPFAIL 40061 AlarmHist 8 SIP UA got a failure response from Registrar.
23 3 ALARM VERMISMATCH 40010 AlarmHist 8 Software Version is mismatched from configured version.
23 3 ALARM MISMATCH 40012 AlarmHist 8 Installed Card does not match provisioned card.
23 3 ALARM REPLUNITMISS 40013 AlarmHist 8 Required card is missing from a slot.
23 3 ALARM EMSCOMMLOS 40016 AlarmHist 8 NE and EMS cannot communicate.
23 2 ALARM GIGEPHYFAIL 40018 AlarmHist 8 An NE Uplink Port has failed.
23 4 ALARM DEGRADE 40019 AlarmHist 8 Signal Level on GPON or Uplink Port is too low.
23 3 ALARM LINECDPROB 40020 AlarmHist 8 Hardware problem detected with a line card.
23 4 ALARM CLFAN 40021 AlarmHist 8 Cooling Fan Failure maintenance required.
23 3 ALARM PWR 40022 AlarmHist 8 Power Problem Detected.
23 3 ALARM PONLOS 40045 AlarmHist 8 All ONTs on the PON have Loss Of Signal.
23 3 ALARM SYNCLOS 40046 AlarmHist 8 External Timing failure check timing cards.
23 4 ALARM MISC1 50601 AlarmHist 8 Miscellaneous Alarm Contact 1 Set
23 4 ALARM MISC2 50602 AlarmHist 8 Miscellaneous Alarm Contact 2 Set
23 4 ALARM MISC3 50603 AlarmHist 8 Miscellaneous Alarm Contact 3 Set
23 4 ALARM MISC4 50604 AlarmHist 8 Miscellaneous Alarm Contact 4 Set
23 4 ALARM MISC5 50605 AlarmHist 8 Miscellaneous Alarm Contact 5 Set
23 4 ALARM MISC6 50606 AlarmHist 8 Miscellaneous Alarm Contact 6 Set
23 4 ALARM MISC7 50607 AlarmHist 8 Miscellaneous Alarm Contact 7 Set
23 4 ALARM MISC8 50608 AlarmHist 8 Miscellaneous Alarm Contact 8 Set
23 4 ALARM MISC9 50609 AlarmHist 8 Miscellaneous Alarm Contact 9 Set
23 4 ALARM MISC10 50610 AlarmHist 8 Miscellaneous Alarm Contact 10 Set
23 4 ALARM MISC11 50611 AlarmHist 8 Miscellaneous Alarm Contact 11 Set
23 4 ALARM MISC12 50612 AlarmHist 8 Miscellaneous Alarm Contact 12 Set
23 4 ALARM MISC13 50613 AlarmHist 8 Miscellaneous Alarm Contact 13 Set
23 4 ALARM MISC14 50614 AlarmHist 8 Miscellaneous Alarm Contact 14 Set
23 4 ALARM MISC15 50615 AlarmHist 8 Miscellaneous Alarm Contact 15 Set
23 4 ALARM MISC16 50616 AlarmHist 8 Miscellaneous Alarm Contact 16 Set
23 3 ALARM RPINOTPROV 40066 AlarmHist 8 No Ring Protection Interface Provisioned
23 3 ALARM RPIMULTIPROV 40067 AlarmHist 8 More than One Ring Protection Interface Configured
23 3 ALARM RPINOTAVAIL 40068 AlarmHist 8 Ring is On Protect.
23 3 ALARM RINGCCMFAIL 40069 AlarmHist 8 Ring detected loss of Continity Check Messages
23 3 ALARM RINGIDMISMATCH 40072 AlarmHist 8 Ring improperly cabled two rings joined.
23 3 ALARM LACPGRPFAIL 40073 AlarmHist 8 LACP Group Failed no LACPDUs found.
23 4 ALARM VIDEOOVERLOAD 40049 AlarmHist 8 Video Level too high at ONT.
23 4 ALARM VIDEOSDONT 40050 AlarmHist 8 Video Level below Signal Degrade Threshold
23 3 ALARM VLANPROVERR 40071 AlarmHist 8 VLAN Provisioning Error.
23 4 ALARM ETHAISP 40070 AlarmHist 8 No Ethernet Flow on Extension DS1
23 4 ALARM ETHACCESS 40075 AlarmHist 8 Ethernet Access Violation
23 4 ALARM GPONOVERLOAD 40064 AlarmHist 8 GPON Signal Level too high.
23 4 ALARM GPONRXLOW 40065 AlarmHist 8 Gpon Signal Level too low.
23 4 ALARM SWPROCERR 40074 AlarmHist 8 Software Processing Error.
23 4 ALARM TCAPOEUSAGE 40077 AlarmHist 8 PoE Usage Threshold Exceeded Too Much Power Used.
23 4 ALARM TEMPWARNING 40079 AlarmHist 8 Temperature Warning.
23 4 ALARM TEMPHIGH 40080 AlarmHist 8 Temperature High!
23 4 ALARM PROFILEMISS 40081 AlarmHist 8 Profile is missing on NE.
23 4 ALARM RESRCLIMIT 40082 AlarmHist 8 Resource Limit.
23 3 ALARM CERTEXPIRED 40084 AlarmHist 8 Certificate Expired new certificate is required.
23 4 ALARM FILEERROR 40017 AlarmHist 8 Error Writing to File.
23 4 ALARM EXTDS1LOS 40027 AlarmHist 8 Extension DS1 Loss Of Signal.
23 4 ALARM LOWVOLTIN 40028 AlarmHist 8 Low Voltage Input Detected to power supply.
23 4 ALARM VOLTFAILOUT 40029 AlarmHist 8 Voltage Level Failed on power converter output.
23 4 ALARM ONTDEGRADE 40047 AlarmHist 8 ONT detected signal degraded.
23 4 ALARM ACPWRFAIL 40022 AlarmHist 8 AC Power has been lost.
23 4 ALARM ONTCLFAN 40030 AlarmHist 8 ONT Cooling Fan has failed.
23 4 ALARM XMTFAIL 40044 AlarmHist 8 Laser Transmitter is failed.
23 4 ALARM ETHACCESSRTP 40085 AlarmHist 8  
23 4 ALARM PONPROTECT 40091 AlarmHist 8 PON is on Protection Circuit, Primary Failed.
23 3 ALARM PONREVERTFAIL 40093 AlarmHist 8 PON failed to revert to Primary PON.
23 3 ALARM PONUNEXPECTEDONT 40094 AlarmHist 8 An unexpected ONT arrived on the PON.
23 3 ALARM PONBWTCAUP 40095 AlarmHist 8 PON Bandwidth TCA in the Upstream direction.
23 3 ALARM PONBWTCADN 40096 AlarmHist 8 PON Bandwidth TCA in the Downstream direction.
23 3 ALARM PONOVERSUBUP 40097 AlarmHist 8 PON CIR Oversubscription Upstream
23 3 ALARM PONCIROVERSUBDN 40098 AlarmHist 8 PON Oversubscription Downstream
23 3 ALARM ONTINTRUSION 40099 AlarmHist 8 ONT has been removed from the wall or enclosure.
23 6 EVENT CKTPACKINSERT 50000 EventSvc -1 Circuit Pack was inserted into system.
23 6 EVENT CKTPACKREMOVE 50001 EventSvc -1 Circuit Pack was removed from the system.
23 6 EVENT CKTPACKRESET 50002 EventSvc -1 Circuit Pack was reset.
23 6 EVENT DBRESTORESTAT 50003 EventSvc -1 Database Restore Status.
23 6 EVENT POEPORTSTATCHG 50004 EventSvc -1 PoE Port Status Change
23 6 EVENT STPTOPOLOGYCHG 50005 EventSvc -1 STP Topology Change
23 6 EVENT SWUPGRADE 50006 EventSvc -1 Software Upgrade
23 6 EVENT RESTART 50007 EventSvc -1 System Restarted
23 6 EVENT TCAEVENT 50008 EventSvc -1 Threshold Crossing Alarm
23 6 EVENT DISABLEUSERFAIL 50020 EventSvc -1 Disable of User Failed.
23 6 EVENT STPPORTSTATCHG 50021 EventSvc -1 STP Detected Port Status Change
23 6 EVENT STPDESGROOTCHG 50022 EventSvc -1 STP Port Changed to Designated Root
23 6 EVENT STPROLECHG 50023 EventSvc -1 STP Role Change
23 6 EVENT CHGPWDOK 50019 EventSvc ? User Changed Password.
23 6 PLATFM ONTARRIVE 30003 CPMgr 0 New ONT has arrived on the PON.
23 6 PLATFM ONTDEPART 30004 CPMgr 0 ONT has departed the PON.
23 6 PLATFM COLDBOOTINIT 30000 CPMgr 0 User has forced Cold Boot
23 6 PROV PROV 30002 OAM 0 User has Provisioned
23 6 EVENT EVENT 00020 EventSvc 0 Event
23 1 EXCEPT EXCEPT 09001 NULL 1 Exception Level 0
23 2 EXCEPT EXCEPT 09002 NULL 2 Exception Level 1
23 3 EXCEPT EXCEPT 09003 NULL 3 Exception Level 2
23 7 DEBUG DEBUG 09004 NULL 4 Debug Message
23 7 DEBUG DEBUG 09005 NULL 5 Debug Message
23 7 DEBUG DEBUG 09006 NULL 6 Debug Message
23 7 DEBUG DEBUG 09007 NULL 7 Debug Message
23 7 DEBUG DEBUG 09008 NULL 8 Debug Message
23 7 DEBUG DEBUG 09009 NULL 9 Debug Message
23 6 INFO INFO

09000

NULL 0 Debug Info Message

Configuration of OLT Syslog 

The following section will define how to configure the OLT to emit Syslog messages to a syslog collector. Syslog by default is off and a collector address must be configured to activate syslog.

  • Syslog Admin State - The admin state of the syslog on the OLT configures whether logging is on or off for ALL destinations.
  • IP/Hostname - IP or hostname of a syslog collector which you wish to send messages to.
  • Destination Configuration – For each destination, when you highlight it in the syslog IP/Hostname, you can configure the settings for that destination.
  • Transport Layer Mapping - How will the syslog messages be sent to the syslog collector.
    • Protocol – Can be one of the following:
      • UDP – Messages are sent using UDP messages are best effort. The default port is 514.
      • TCP – Messages are sent using TCP; messages are guaranteed if connectivity exists. The default port is 6514.
      • TLS – Messages are encrypted to prevent snooping of syslog information. The default port is 6514.
  • Facility Mapping – By default, Tellabs maps all messages to local7(23). If needed, specific types can be mapped to standard facilities. This allows segregation of messages by facility in the syslog collector.
  • Filters – Specific types of messages can be sent to a specific destination. For example, you may have one syslog server only concerned with security events. Syslog events can be filtered such that only security events go to that server. Messages can be filtered by level and class.

Configuration of Panorama PON EMS Syslog 

The EMS can also be configured to emit syslog events for all major events within the EMS. The EMS syslog is configured in a very similar method to the OLT syslog.

The EMS configuration is accessed via the Edit Menu: Edit -> Syslog Server Configuration.

  • IP/Hostname – Add new hostnames or IPs for each syslog destination you want to send to. For existing destinations, when you highlight it in the syslog IP/Hostname, you can configure the settings for that destination.
  • Transport Layer Mapping – How will the syslog messages be sent to the syslog collector?
    • Protocol – can be one of the following:
      • UDP – Messages are sent using UDP messages are best effort. Default port is 514.
      • TCP – Messages are sent using TCP, messages are guaranteed if connectivity exists. Default port is 6514.
  • Facility Mapping – Currently is static for the EMS with a class of Others, and a Local Facility.

Video 

FEEDBACK: Are you happy with this material?