Troubleshooting Guide

Table Of Contents
Configuring a UNIX system log and syslog host.......................................................................  46
Job aid...........................................................................................................................  49
Configuring secure forwarding................................................................................................ 50
Variable definitions..........................................................................................................  51
Installing root certificate for syslog client.................................................................................. 52
Variable definition............................................................................................................ 52
Configuring logging................................................................................................................ 53
Configuring the remote host address for log transfer................................................................  54
Configuring system logging to external storage........................................................................ 55
Configuring system message control....................................................................................... 56
Extending system message control......................................................................................... 57
Viewing logs.........................................................................................................................  58
Configuring ACLI logging.......................................................................................................  60
Chapter 10: Log configuration using EDM........................................................................... 63
Configuring the system log..................................................................................................... 63
Configuring the system log table............................................................................................. 64
Chapter 11: SNMP trap configuration using ACLI............................................................... 66
Configuring an SNMP host..................................................................................................... 66
Configuring SNMP interfaces.................................................................................................  67
Enabling SNMP trap logging..................................................................................................  70
Chapter 12: SNMP trap configuration using EDM...............................................................  73
Configuring an SNMP host target address............................................................................... 73
Configuring target table parameters........................................................................................  75
Configuring SNMP notify filter profiles.....................................................................................  76
Configuring SNMP notify filter profile table parameters.............................................................  76
Enabling authentication traps.................................................................................................  77
Chapter 13: Traps reference..................................................................................................  79
Proprietary traps.................................................................................................................... 79
Standard traps......................................................................................................................  87
Chapter 14: Hardware troubleshooting................................................................................  91
Using trace to diagnose hardware problems............................................................................  91
Troubleshooting USB viewing problems..................................................................................  92
Chapter 15: Software troubleshooting.................................................................................. 94
Failure to read failed configuration file..................................................................................... 94
No Web management interface access to a device..................................................................  94
Cannot enable encryption......................................................................................................  94
Debug files...........................................................................................................................  95
Chapter 16: Software troubleshooting tool configuration using ACLI.............................. 96
Using ACLI for troubleshooting...............................................................................................  96
Using software record dumps...............................................................................................  100
Using trace to diagnose problems......................................................................................... 100
Using trace to diagnose IPv6 problems.................................................................................  103
Contents
January 2017 Troubleshooting 5
Comments on this document? infodev@avaya.com