System Message Guide vA2(3.0), Cisco ACE Application Control Engine Module
Index
Downloads: This chapterpdf (PDF - 267.0KB) The complete bookPDF (PDF - 3.69MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - H - I - L - M - N - O - P - Q - R - S - T - U - V - W -

Index

A

ACE

initialization failure 2-50

logging, enabling 1-29

logging levels 1-3

logging overview 1-2

network processor error 2-57

physical memory for load-balancing 2-56

subsystem levels 1-3

ACL resources

minimum not guaranteed 2-13

usage beyond limit 2-13

ACLs

compilation process out of memory 2-3

address translation slot

created 2-24

deleted 2-24

alert messages 3-1

ARP

collision 2-28

inspection check failure 2-27

poisoning 2-28

attacks

ARP poisoning 2-28

spoofing 2-2, 2-26, 2-27, 2-30

B

buffer

logging to 1-10

C

cache

alignment error 2-53

clearing

log messages 1-31

configuration

file replication failure 2-43

modified by command 2-2, 2-3

connection

setup and teardown syslog messages, enabling 1-30

console

logging to 1-14

content type verification

failed

unexpected number in message body 2-31

context

adding context with an associated sticky group 2-53

associated sticky group 2-53

configuration synchronization failure 2-45

removing with an associated sticky group 2-53

show command failure 2-53

state change 2-45

sticky entry request 2-52

control processor, unrecognized message 2-58

critical messages 3-2

D

debugging messages 3-9

debug logging failure 2-60

DNS

packet message 2-29

E

EMBLEM-format logging 1-16

enabling logging on the ACE 1-29

Encap table full 2-27

error messages 3-3

F

facility, changing 1-24

fault tolerance

See HA

Flash memory

logging to 1-19

FT group

context name mismatch 2-42

peer state change 2-59

two active devices detected 2-43

FT interface, peer unreachable 2-42

FTP port command

address other than the address used in the connection 2-29

low port number 2-29

FTP traffic

strict inspection policy denies request command 2-23

unrecognized command in request message when using strict inspection policy 2-23

FT track

state down 2-48

state up 2-48

H

HA

alternate pings 2-48, 2-49

communication failure 2-44

configuration replication failure 2-45

context name mismatch 2-42

context state change 2-45

data dropped 2-60

FT track state down 2-48

FT track state up 2-48

heartbeat interval mismatch 2-47

heartbeats unidirectional 2-47

initialization failure 2-44

internal error 2-44

mapping failure 2-58

module 2-44

peer compatibility 2-49

peer incompatibility 2-43

peer reachable 2-47, 2-49

peer state change 2-59

peer unreachable 2-42, 2-55

receive error 2-54

redundancy heartbeat stopped 2-49

replication failure 2-43, 2-45

replication in process 2-47

state transitions 2-45

two active devices detected 2-43

hash table, invalid index 2-56

heartbeat

interval mismatch 2-47

started 2-49

stopped 2-42, 2-48, 2-49

unidirectional 2-47

High Availability

See HA

HTTP

body length within configured range 2-33

body matches regular expression 2-31

header length within configured range 2-33

parser unable to detect valid message 2-32

request method matches regular expression 2-32

return code, threshold reached 2-60

transfer/content encoding matches regular expression 2-32

URI length within configured range 2-32

URI matches regular expression 2-31

HTTP content

instant messenger protocol detected 2-34

peer-to-peer protocol detected 2-34

tunneling protocol detected 2-33

HTTP header

matches regular expression 2-31, 2-33

I

ICMP

health probe error 2-7

initialization failure 2-25

memory failure 2-26

packet denied 2-25

probe error 2-6, 2-7

session established 2-22

session removed 2-22

unexpected server response 2-8

informational messages 3-7

initialization failure 2-44, 2-50

interfaces

configuration status down 2-30

configuration status up 2-30

line protocol change of state 2-29, 2-30

VLAN availability 2-41

invalid

lookup key 2-58

IP header option error 2-28

L

levels

changing 1-25

licenses

16G takes effects after reboot 2-38

evaluation time expired 2-38

evaluation time warning 2-38

failed checkout 2-37

installation completed 2-37

manager exiting 2-38

uninstall completed 2-37

limiting the syslog rate 1-27

line protocol, status change 2-29, 2-30

load balancing

cache alignment error 2-53

general error 2-51

HA data dropped 2-60

internal channel error 2-54

internal error 2-51

mapped memory 2-56

processor communications error 2-54

sticky database error 2-52, 2-56

sticky entry inconsistency 2-56

sticky error 2-52

transmit failure 2-51

unrecognized message 2-58

log files, logging levels 1-3

logging

changing message levels 1-8

connection setup and teardown syslog messages, enabling 1-30

disabling messages 1-25

EMBLEM-format logging 1-16

enabling 1-9, 1-29

facility, changing 1-24

levels 1-3

log messages, clearing 1-31

message queue size, changing 1-25

overview 1-2

quick start 1-7

severity level of messages, changing 1-25

syslog output locations, specifying 1-10

syslog rate, limiting 1-27

system message timestamp, enabling 1-21

to buffer 1-10

to console 1-14

to Flash memory 1-19

to SNMP NMS 1-17

to SSH session 1-12

to Supervisor engine 1-18

to syslog server 1-15

to Telnet session 1-12

variables 1-4

viewing log message information 1-31

M

MAC

MAC address mapping change 2-30

mapping failure 2-58

memory mapping failure 2-60

messages

message queue size, changing 1-25

severity levels 3-1

timestamp, enabling 1-21

understanding 1-2

variables 1-4

N

network processor error, sticky 2-57

notification messages 3-5

numerical codes of system messages 2-1

O

output locations

buffer 1-10

console 1-14

Flash memory 1-19

SNMP 1-17

SNMP NMS 1-17

specifying 1-10

SSH session 1-12

Supervisor module 1-18

syslog server 1-15

Telnet 1-12

Telnet session 1-12

P

peer

alternate pings 2-48, 2-49

communication failure 2-44

heartbeat interval mismatch 2-47

heartbeats unidirectional 2-47

incompatibility 2-43

mapping failure 2-58

reachable 2-47, 2-49

receive error 2-54

replication failure 2-43, 2-45

replication in process 2-47

state change 2-59

unreachable 2-42, 2-55

probe

connectivity error 2-7

connectivity error for ICMP probe 2-7

empty health probe scripts 2-5

failure due to internal error 2-6

internal error for ICMP probe 2-6, 2-7

internal error when loading script 2-6

lost script file 2-5

memory allocation failure 2-5

unable to load script 2-6

unexpected ICMP server response 2-8

unexpected server response 2-8

processing

ACL compilation process out of memory 2-3

invalid lookup key 2-58

proxy connection rebalanced 2-55

Q

quick start

system message logging 1-7

R

real servers

HTTP return code threshold 2-60

state change 2-35, 2-36

state change to down 2-36

state change to up 2-36

redundancy

See HA

regex resources

minimum not guaranteed 2-61

usage beyond limit 2-61

reload

reasons 2-4

record 2-4

RTSP

connection, opened by ASA for specified IP address and ports 2-26

S

SCCP

command denied by inspection policy 2-41

connection preallocated for session-negotiated media streams 2-40

message over configured size dropped 2-40

message that is too small dropped 2-40

registration not completed 2-41

scripts

empty 2-5

error determining size 2-9

error reading 2-9

internal error when loading 2-6

lost file 2-5

memory allocation error 2-6

security context

added to system 2-39

removed from system 2-39

server connection

lost 2-51

rebalanced 2-55

server farms

failover back in service notification 2-35

failover to backup notification 2-35

HTTP return code threshold 2-60

severity codes of system messages 3-1

severity level messages

Level 1 messages 3-1

Level 2 messages 3-2

Level 3 messages 3-3

Level 4 messages 3-4

Level 5 messages 3-5

Level 6 messages 3-7

Level 7 messages 3-9

overview 1-3

severity levels

alerts 3-1

changing 1-25

critical 3-2

debugging 3-9

errors 3-3

informational 3-7

notifications 3-5

of messages 3-1

overview 1-3

warning 3-4

show command

failure message 2-53

site security policy, averting 2-29

SNMP

daemon initialization failure 2-4, 2-5

memory allocation failure 2-4, 2-5

network management station 1-17

Shadow Table error 2-34

spoofing attack 2-2, 2-26, 2-27, 2-30

SSH

session, sending syslog messages 1-12

SSL

certificate and keys removed 2-13

CRL, failure to retrieve 2-11

SSL certificate

expired 2-9, 2-11

invalid or nonexistent 2-11

not currently valid 2-9

revoked by certificate authority 2-10

signature invalid 2-10

sticky

associated group 2-53

database error 2-52

entries added or removed 2-57

entry dropped 2-58

entry inconsistency 2-56

initialization failure 2-50

key, invalid 2-58

network processor error 2-57

processor error 2-52, 2-57

request not responded to 2-55

resources exceeded 2-52

unexpected sticky group lookup result 2-55

subsystems 1-3

supervisor

logging to 1-18

syslog output locations

buffer 1-10

console 1-14

Flash memory 1-19

SNMP NMS 1-17

specifying 1-10

SSH session 1-12

Supervisor engine 1-18

syslog server 1-15

Telnet session 1-12

syslog rate, limiting 1-27

syslog server

device ID, specifying 1-23

EMBLEM-format logging 1-16

identifying messages sent 1-22

sending syslog messages 1-15

system message logging

connection setup and teardown syslog messages, enabling 1-30

disabling messages 1-25

EMBLEM-format logging 1-16

enabling 1-9, 1-29

facility, changing 1-24

log messages, clearing 1-31

overview 1-2

queue, changing 1-25

quick start 1-7

severity level, changing 1-25

syslog output locations, specifying 1-10

syslog rate, limiting 1-27

to buffer 1-10

to console 1-14

to Flash memory 1-19

to SNMP NMS 1-17

to SSH session 1-12

to Supervisor engine 1-18

to syslog server 1-15

to Telnet session 1-12

understanding 1-2

variables 1-4

viewing log message information 1-31

system messages

by numerical code 2-1

by severity code 3-1

timestamps, enabling 1-21

T

TCP

connection slot creation 2-20, 2-22

connection slot termination 2-20, 2-22

termination reasons 2-20, 2-22

TCP connection failure 2-44

Telnet

session, sending syslog messages 1-12

U

UDP

connection slot creation 2-21, 2-23

connection slot deletion 2-21, 2-23

DNS packet 2-29

URL

host access record 2-24

V

variables

fields 1-4

in messages 1-4

viewing log message information 1-31

VLANs

number availability 2-41

W

warning messages 3-4