Technical data
Network OS Message Reference 139
53-1002489-01
SEC-1203
30
Recommended
Action
Check to see if an authorized access attempt is being made on the console. If so, add the switch
World Wide Name (WWN) to the serial policy. If the host is not allowed access to the fabric, this is a
valid violation message and an unauthorized entity is trying to access your fabric. Take appropriate
action, as defined by your enterprise security policy.
Severity INFO
SEC-1203
Message <timestamp>, [SEC-1203], <sequence-number>,, INFO, <switch-name>, Login
information: Login successful via TELNET/SSH/RSH. IP Addr: <IP address>.
Probable Cause Indicates the IP address of the remote station logging in.
Recommended
Action
No action is required.
Severity INFO
SEC-1307
Message <timestamp>, [SEC-1307], <sequence-number>,, INFO, <switch-name>, Got response
from <Radius/LDAP server identity> server <server>.
Probable Cause Indicates that after some servers timed out, the specified AAA (RADIUS/LDAP) server responded to
a switch request.
Recommended
Action
If the message appears frequently, reconfigure the list of servers such that the responding server is
the first server on the list.
Severity INFO
SEC-1308
Message <timestamp>, [SEC-1308], <sequence-number>,, INFO, <switch-name>, All
<Radius/Tacacs+ server identity> servers have failed to respond.
Probable Cause Indicates that all servers in the remote AAA (RADIUS) configuration have failed to respond to a
switch request within the specified timeout.
Recommended
Action
Verify the switch has proper network connectivity to the specified AAA (RADIUS/TACACS+) servers,
and the servers are correctly configured.
Severity INFO