The following are the events related to MACsec.
Event ID: 4661
Message
|
Ceasing <SUSPENSION_MSG> message for <TIME>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
Ceasing a specific message log for a specific amount of time. Example of this RMON is : "Ceasing Detection of Macsec CAK Mismatch message for
<timeStr>".
|
Event ID: 4662 (Severity: Warning)
Message
|
MACsec Connectivity Association Failed on port <PORT_ID>: Mismatch in the Integrity Check Value (ICV).
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Warning
|
Description
|
This message is logged when MACsec connectivity association is failed due to ICV mismatch.
|
Event ID: 4663 (Severity: Warning)
Message
|
MACsec Connectivity Association Failed on port <PORT_ID>: Mismatch in the CA Key Name (CKN).
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Warning
|
Description
|
This message is logged when MACsec connectivity association is failed due to CA Key Name (CKN) mismatch.
|
Event ID: 4664
Message
|
The MACsec Connectivity Association established on port <PORT_ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
This message is logged when a MACsec connectivity association is formed (started) between two MACsec capable peers.
|
Event ID: 4665
Message
|
The MACsec Connectivity Association ended on port <PORT_ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
This message is logged when a MACsec connectivity association is ended (stopped) between two MACsec capable peers.
|
Event ID: 4666 (Severity: Warning)
Message
|
Possible replay attack on MACsec port <PORT_ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Warning
|
Description
|
This message is logged when a possible replay attack is detected on a port where MACsec is enabled.
|
Event ID: 4667 (Severity: Warning)
Message
|
New MACsec Participant detected on Interface <PORT_ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Warning
|
Description
|
This message is logged when a new MACsec participant is added to a port where a MACsec session already exist.
|
Event ID: 4668
Message
|
The MACsec is operating in Integrity Check (IC) mode on port <PORT_ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
This message is logged when MACsec session on a port (between two clients) is operating in confidentiality only mode. (Integrity only mode).
|
Event ID: 4669
Message
|
The MACsec is operating in Encryption mode on port <PORT_ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
This message is logged when MACsec session on a port (between two clients) is operating in encryption only mode.
|
Event ID: 4670
Message
|
Macsec Hard Expiry limit reached on Interface <PORT_ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
This message is logged when the packet number is reached to a hard threshold. Packet number has two different threshold 1. soft threshold 2. hard threshold. MACsec session key (SAK) must be rotated once the packet number reaches the hard threshold. The trigger for changing the SAK will be initiated as soon as the PN number reaches the soft threshold value.
|
Event ID: 4671
Message
|
FIPS bypass test failed on port <PORT_ID> in slot <SLOT-ID>
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
This message is logged when a FIPS Bypass test (test that validates the encryption functionality of PHY) fails on a port.
|
Event ID: 4672
Message
|
FIPS self-test failed on port <PORT_ID> in slot <SLOT-ID>.
|
Platforms
|
KB, WC
|
Category
|
MACsec
|
Severity
|
Information
|
Description
|
This message is logged when FIPS self-test (test that validates the encryption functionality during slot boot-up) fails on a port.
|