1 example log messages, 7 log commands, Table 38 system maintenance logs – ZyXEL Communications 802.11b/g Wireless Access Point NWA-1100 User Manual

Page 119

Advertising
background image

Chapter 13 Log Screens

ZyXEL NWA-1100 User’s Guide

119

13.6.1 Example Log Messages

The following tables provide descriptions of some example log messages that the ZyXEL
Device generates.

13.7 Log Commands

Go to the command interpreter interface (refer to

Appendix I on page 187

for the Command Interpreter

appendix explains how to access and use the commands).

13.7.1 Configuring What You Want the ZyXEL Device to Log

Use the sys logs load command to load the log setting buffer that allows you to configure which logs

the ZyXEL Device is to record.

Table 38 System Maintenance Logs

LOG MESSAGE

DESCRIPTION

WLAN: Radar interference
2412 MHz.

Wireless driver receives radar pulse at center frequency 2412

MHz.

WLAN: CW interference
2412 MHz.

Wireless driver receives noise interference pulse at center

frequency 2412 MHz.

WLAN service started.

Wireless port ath0 started.

WLAN service stopped.

Wireless port ath0 stopped.

AP MIC failed.

Wireless driver MIC checked failed.

AP MIC attacked.

Wireless driver received MIC attack packet.

Station authenticated.

AP received the request for authentication from station and

authenticated the station successfully.

Station authentication
failed.

AP received the request for authentication from station but the

authentication failed.

Station deauthenticated.

AP receive the deauthenticated packet from the STA which

connected with AP.

Station associated.

AP receive the association request packet from the STA which

connected with AP.

Station disassociated.

AP receive the disassociation request packet from the STA, which

connected with AP.

Station refused.

A STA wanted to connect to the AP but was refused.

Remote Bridge AP
configured.

Remote AP MAC address was configured.

Remote Bridge AP
deleted.

Remote AP MAC address was deleted.

CLI: Authorized user
from IP.

A device succesfully logs into the AP via Telnet (the device’s IP

address shows in the log message.)

CLI: Unauthorized user
from IP.

A device fails to log into the AP via Telnet (the device’s IP address

shows in the log message.)

WEB: Authorized user
from IP.

A device successfully logs into the AP via WWW (the device’s IP

address shows in the log message.)

WEB: Unauthorized user
from IP.

A device fails to log into the AP via WWW (the device’s IP address

shows in the log message.)

Advertising