Fw-1296, Fw-1297, Fw-1298 – Dell POWEREDGE M1000E User Manual

Page 505

Advertising
background image

Fabric OS Message Reference

483

53-1002749-01

FW-1296

5

FW-1296

Message

<Label>, value has changed(High=<High value>, Low=<Low value>). Current value is
<Value> <Unit>.

Message Type

LOG

Severity

INFO

Probable Cause

Indicates that the number of Telnet violations has changed. Telnet violations indicate that a Telnet
connection request has been received from an unauthorized IP address. The TELNET_POLICY contains
a list of IP addresses that are authorized to establish Telnet connections to switches in the fabric.

Recommended

Action

Execute the errShow command to determine the IP address that sent the request. Responses to
security-class messages depend on user policies. Consult your security administrator for response
strategies and policies.

FW-1297

Message

<Label>, is below low boundary(High=<High value>, Low=<Low value>). Current value
is <Value> <Unit>.

Message Type

LOG

Severity

INFO

Probable Cause

Indicates that the number of Telnet violations has fallen below the low boundary. Telnet violations indicate
that a Telnet connection request has been received from an unauthorized IP address. The
TELNET_POLICY contains a list of IP addresses that are authorized to establish Telnet connections to
switches in the fabric.

Recommended

Action

No action is required.

FW-1298

Message

<Label>, is above high boundary(High=<High value>, Low=<Low value>). Current value
is <Value> <Unit>.

Message Type

LOG

Severity

WARNING

Probable Cause

Indicates that the number of Telnet violations has risen above the high boundary. Telnet violations
indicate that a Telnet connection request has been received from an unauthorized IP address. The
TELNET_POLICY contains a list of IP addresses that are authorized to establish Telnet connections to
switches in the fabric.

Recommended

Action

Execute the errShow command to determine the IP address that sent the request. Responses to
security-class messages depend on user policies. Consult your security administrator for response
strategies and policies.

Advertising