No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Alarm Handling

AR100, AR120, AR160, AR1200, AR2200, AR3200, and AR3600 V300R003

This document provides the trap description, attributes, parameters, impact on the system, possible causes, procedures, and references. This document provides a complete set of traps, through which intended readers are kept of the running status of the device so as to locate faults.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
PKI_1.3.6.1.4.1.2011.6.122.34.0.2.21 hwPKIRequestCertFailScep

PKI_1.3.6.1.4.1.2011.6.122.34.0.2.21 hwPKIRequestCertFailScep

Description

PKI/3/PKIGETCERTFAILSCEP: OID [oid] Requesting certificate through SCEP failed. (hwSCEPUrl=[scepurl], PkiRealmName=[realmname])

Application for a certificate through SCEP failed.

Attribute

Alarm ID Alarm Severity Alarm Type
1.3.6.1.4.1.2011.6.122.34.0.2.21 Minor communicationsAlarm

Parameters

Name Meaning
oid Indicates the MIB object ID of the alarm.
scepurl Indicates the URL of the SCEP server.
realmname Indicates the name of the PKI realm.

Impact on the System

The service related the certificate cannot be used.

Possible Causes

  • There is no reachable route between the device and CA server.
  • The PKI configurations of the device and CA server are incorrect.
  • The CA server is faulty.

Procedure

  1. Run the ping command to check whether there is a reachable route between the device and CA server.

    If not, check the route and link to ensure that there is a reachable route between the device and CA server.

  2. Run the display pki realm command to check whether the PKI configurations of the device and CA server are correct. The PKI configurations include the CA server URL, CA name, digest algorithm used to sign certificate enrollment requests, challenge password used in SCEP certificate application, and CA certificate digital fingerprint.

    If not, ensure that the PKI configurations are correct.

  3. Check whether the CA server is working properly.

    If not, ensure that the CA server is working properly.

  4. Collect alarm and configuration information, and contact technical support personnel.
Translation
Download
Updated: 2019-03-06

Document ID: EDOC1100041475

Views: 69489

Downloads: 45

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next