Welcome to the Media Gateway Controller command line. Firmware Version: MGCCDC11 Management IP: 192.168.110.45 IPMG: 0 0 Primary CS IP Address: 192.168.110.40 Installed Daughterboards: 1 OS Created on: Date [Dec 5 2012] Time [10:29:29] SEC0029 Security Warning: This system contains insecure passwords, notify your system administrator oam> rdall Reading /e/rpt/LOG00003.RPT Newest File Name : "/e/rpt/LOG00003.RPT" File being viewed : "/e/rpt/LOG00003.RPT" Capacity in bytes : 1000000 Capacity in records : 1190 Number of records = 1092 Oldest record = 0, logged at 03/10/2022 10:22:50 Newest record = 1091, logged at 03/10/2022 12:06:39 Current Record = 1091 Display Increment = 10 records [0000] 03/10/2022 10:22:50 PCH0110 PATCH 4 ACTIVATED. Name="p32419_1", Ref#="ISS1:1OF1", CR#="wi01068593", File="/p/patch/p32419_1.mgc" PCH0110 PATCH x ACTIVATED. Name=a, Ref#=b, PRS#=c, File=d. Patch x is put into service. This message is sent as an SNMP trap for Linux-based applications (except the Call Server); otherwise the message is not sent as an SNMP trap. [0001] 03/10/2022 10:22:51 PCH0110 PATCH 5 ACTIVATED. Name="p32765_1", Ref#="ISS1:1OF1", CR#="wi01101572", File="/p/patch/p32765_1.mgc"... [0002] 03/10/2022 10:22:52 PCH0110 PATCH 6 ACTIVATED. Name="p33611_1", Ref#="ISS1:1OF1", CR#="CS1000-7136", File="/p/patch/p33611_1.mgc"... [0003] 03/10/2022 10:22:52 PCH0110 PATCH 7 ACTIVATED. Name="p33711_1", Ref#="ISS1:1OF1", CR#="CS1000-7781", File="/p/patch/p33711_1.mgc"... [0004] 03/10/2022 10:22:53 PCH0110 PATCH 8 ACTIVATED. Name="p33609_1", Ref#="ISS1:1OF1", CR#="CS1000-7133", File="/p/patch/p33609_1.mgc"... [0005] 03/10/2022 10:22:54 PCH0110 PATCH 9 ACTIVATED. Name="p33822_1", Ref#="ISS1:1OF1", CR#="CS1000-7771", File="/p/patch/p33822_1.mgc"... [0006] 03/10/2022 10:22:54 PCH0110 PATCH 10 ACTIVATED. Name="p32820_1", Ref#="ISS1:1OF1", CR#="wi01108195", File="/p/patch/p32820_1.mgc"... [0007] 03/10/2022 10:22:55 PCH0110 PATCH 11 ACTIVATED. Name="p32431_1", Ref#="ISS1:1OF1", CR#="wi01068578", File="/p/patch/p32431_1.mgc"... [0008] 03/10/2022 10:22:55 PCH0110 PATCH 12 ACTIVATED. Name="p33429_1", Ref#="ISS1:1OF1", CR#="wi01201948", File="/p/patch/p33429_1.mgc"... [0009] 03/10/2022 10:22:56 PCH0110 PATCH 13 ACTIVATED. Name="p33564_1", Ref#="ISS1:1OF1", CR#="CS1000-7034", File="/p/patch/p33564_1.mgc"... [0010] 03/10/2022 10:22:56 PCH0110 PATCH 14 ACTIVATED. Name="p33385_1", Ref#="ISS1:1OF1", CR#="wi01193007", File="/p/patch/p33385_1.mgc"... [0011] 03/10/2022 10:22:57 PCH0110 PATCH 15 ACTIVATED. Name="p32427_1", Ref#="ISS1:1OF1", CR#="wi01166564", File="/p/patch/p32427_1.mgc"... [0012] 03/10/2022 10:22:57 PCH0110 PATCH 16 ACTIVATED. Name="p33480_1", Ref#="ISS1:1OF1", CR#="wi01212348", File="/p/patch/p33480_1.mgc"... [0013] 03/10/2022 10:22:58 PCH0110 PATCH 17 ACTIVATED. Name="p32741_1", Ref#="ISS1:1OF1", CR#="Wi01097446", File="/p/patch/p32741_1.mgc"... [0014] 03/10/2022 10:22:59 PCH0110 PATCH 18 ACTIVATED. Name="p33789_1", Ref#="ISS1:1OF1", CR#="CS1000-7628", File="/p/patch/p33789_1.mgc"... [0015] 03/10/2022 10:23:00 PCH0110 PATCH 19 ACTIVATED. Name="p33824_1", Ref#="ISS1:1OF1", CR#="CS1000-7775", File="/p/patch/p33824_1.mgc"... [0016] 03/10/2022 10:23:00 PCH0110 PATCH 20 ACTIVATED. Name="p33447_1", Ref#="ISS1:1OF1", CR#="wi01207044", File="/p/patch/p33447_1.mgc"... [0017] 03/10/2022 10:23:01 PCH0110 PATCH 21 ACTIVATED. Name="p33775_1", Ref#="ISS1:1OF1", CR#="CS1000-7578", File="/p/patch/p33775_1.mgc"... [0018] 03/10/2022 10:23:01 PCH0110 PATCH 22 ACTIVATED. Name="p32385_1", Ref#="ISS1:1OF1", CR#="wi01060807", File="/p/patch/p32385_1.mgc"... [0019] 03/10/2022 10:23:02 PCH0110 PATCH 23 ACTIVATED. Name="p32480_1", Ref#="ISS1:1OF1", CR#="wi01119120", File="/p/patch/p32480_1.mgc"... [0020] 03/10/2022 10:23:12 LOG0006 applStart: mgcConfigStart initialization succeeded [0021] 03/10/2022 10:23:12 LOG0006 applStart: Task mgcSysSpawn enters initialization [0022] 03/10/2022 10:23:13 LOG0006 applStart: Task mgcSysSpawn initialization succeeded [0023] 03/10/2022 10:23:13 LOG0006 MGCSYS: Xmsg Daemon task spawn is successful [0024] 03/10/2022 10:23:15 LOG0006 applStart: mdioSemCreate initialization succeeded [0025] 03/10/2022 10:23:15 LOG0006 applStart: mgcImageVerRead initialization succeeded [0026] 03/10/2022 10:23:15 LOG0006 applStart: mgcSysUtilSpawn initialization succeeded [0027] 03/10/2022 10:23:15 LOG0006 applStart: tlanInit initialization succeeded [0028] 03/10/2022 10:23:15 LOG0006 applStart: sysInfoFlashInit initialization succeeded [0029] 03/10/2022 10:23:15 LOG0006 applStart: gwcA31Main initialization succeeded [0030] 03/10/2022 10:23:15 LOG0006 applStart: vapiLayerInit initialization succeeded [0031] 03/10/2022 10:23:15 LOG0006 applStart: afsInitialize initialization succeeded [0032] 03/10/2022 10:23:15 LOG0006 applStart: afsSubscriberInit initialization succeeded [0033] 03/10/2022 10:23:15 LOG0006 applStart: afsPublisherInit initialization succeeded [0034] 03/10/2022 10:23:15 LOG0006 applStart: ISSS Init succeeded [0035] 03/10/2022 10:23:15 LOG0006 applStart: mamISECStart initialization succeeded [0036] 03/10/2022 10:23:15 LOG0006 applStart: tncInit initialization succeeded [0037] 03/10/2022 10:23:15 LOG0006 applStart: mgcStartUp initialization succeeded [0038] 03/10/2022 10:23:15 LOG0006 applStart: mgcClanInit initialization succeeded [0039] 03/10/2022 10:23:15 LOG0006 applStart: mgcInitRegister initialization succeeded [0040] 03/10/2022 10:23:15 LOG0006 applStart: mgcVgwAppStart initialization succeeded [0041] 03/10/2022 10:23:15 LOG0004 tMgcVgwAppStart: Waiting for mgcdb.xml from Primary Call Server [0042] 03/10/2022 10:23:15 SEC0105 USR=initialization, EVT=global port access state change to off, RESULT=success SEC0105 User= SRC = DST = EVT= port access state change to , RESULT = User can have the following values: 1. The actual user name for a manual change. 2. "initialization" from system bootup. 3. "CS Update" on MGC and MC32S from CS initiated change. SRC is only relevant to manual changes and will give the session info (tip, rlogin, ssh, telnet, etc) and IP address if applicable DST is only relevant to manua l changes and describes the shell (sl1, pdt, ldb, etc) that the user was logged into Scope can have the following values: 1. Global - if initiated from the CS ld117 administration commands. 2. Local - if initiated from pdt or ldb shell on any device. State can have these values: 1. Off 2. Default 3. Custom 4. Unknown - only occurs on MGC and MC32S if an incorrect state was sent. A four character identifier for the custom file will be displayed. [0043] 03/10/2022 10:23:15 LOG0006 applStart: portAccessInit initialization succeeded [0044] 03/10/2022 10:23:15 LOG0006 tIpExpStartup: Registered successfully to Primary Call Server[192.168.110.40] [0045] 03/10/2022 10:23:16 LOG0006 applStart: securityDomainElemPropValueSet initialization succeeded [0046] 03/10/2022 10:23:17 LOG0006 tIpExpStartup: Received configuration data from Primary Call Server on attempt[1] [0047] 03/10/2022 10:23:17 LOG0006 MGCUTIL: IPMG Cabinet is non-MG1010 [0048] 03/10/2022 10:23:24 SRPT0017 OMM: IP link is UP between Primary Call Server and IPMG[0 0] SRPT0017 OMM: IP link is UP between Call Server and Media Gateway number . [0049] 03/10/2022 10:23:24 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started. [0050] 03/10/2022 10:23:24 SRPT0307 (cont'd) ... [0051] 03/10/2022 10:23:25 LOG0006 TNC: CHANNEL CREATION SUCCESSFUL [0052] 03/10/2022 10:23:27 LOG0006 CLAN: Slot: 3, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 1 [0053] 03/10/2022 10:23:27 LOG0006 CLAN: Slot: 4, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0054] 03/10/2022 10:23:27 LOG0006 CLAN: Slot: 7, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0055] 03/10/2022 10:23:28 LOG0006 CLAN: Slot: 5, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0056] 03/10/2022 10:23:28 LOG0006 CLAN: Slot: 6, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0057] 03/10/2022 10:23:31 LOG0006 CLAN: Slot: 2, Card Type: UNKNOWN (47), Signaling Type: A10 (2), Map Type: 1 [0058] 03/10/2022 10:23:32 LOG0006 CLAN: Slot: 1, Card Type: PRI2 2.048MBPS (44), Signaling Type: A10 (2), Map Type: 5 [0059] 03/10/2022 10:23:32 IOD0008 checkNonConfigDevs : unconfigured card @ slot 1 IOD0008 Interrupt: checkNonConfigDevs: unconfigured card in slot 2 generated unexpected CEMUX interrupt. generated cemux interrupt [0060] 03/10/2022 10:23:37 LOG0003 AFS: Failed to send mgcVgwConfigFile Update message - tVGW task is not running. [0061] 03/10/2022 10:23:46 LOG0006 SYS: VGW5000 Card initialized, all alarms cleared. (202) [0062] 03/10/2022 10:23:46 LOG0001 SYS: VGW1036 Call server communication link: 192.168.110.40 down (20) [0063] 03/10/2022 10:23:46 LOG0006 SYS: Waiting for PBX RUDP link to be established, timeout is set to 5 [0064] 03/10/2022 10:23:46 LOG0006 tConfigProcess: AlarmConfigClient Registered with CP successfully [0065] 03/10/2022 10:23:46 LOG0006 tConfigProcess: Server socket closed [0066] 03/10/2022 10:23:46 LOG0006 tConfigProcess: Opened Server socket [0067] 03/10/2022 10:23:51 LOG0003 SYS: Failed to establish PBX RUDP link [0068] 03/10/2022 10:23:52 LOG0006 VGW: DSP DB1 is High Density(128 DSP ports). [0069] 03/10/2022 10:23:53 LOG0006 VGW: vgwTimerInit: setPollingPeriod data is NOT ready yet, force setPollingPeriod to default 30 [0070] 03/10/2022 10:23:53 LOG0006 VGW: VGW5014 Ethernet carrier: eth0, OK (9) [0071] 03/10/2022 10:24:00 LOG0004 tRUDPSS: Forwarding for connect Id = 0x84d1e238, error of type = 6 (connection lost). [0072] 03/10/2022 10:24:00 LOG0003 tRUDPSS: pbxErrorCallBack on link 0, reset link(s) [0073] 03/10/2022 10:24:04 LOG0006 VGW: Successfully enabled MIPS_CALCULATION_INTERVAL command on device 1 [0074] 03/10/2022 10:24:04 LOG0006 VGW: Successfully enabled SPU_LOW_MIPS_ALERT command on device 1 [0075] 03/10/2022 10:24:04 LOG0006 VGW: Successfully enabled ARM_LOW_MIPS_ALERT command on device 1 [0076] 03/10/2022 10:24:04 LOG0006 tGtlRx: ARM_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current ARM free MIPS: 976 [0077] 03/10/2022 10:24:04 LOG0006 tGtlRx: SPU_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current DSP free MIPS: 1000 [0078] 03/10/2022 10:32:03 SRPT0306 SSD Client socket closed. SRPT0306 SSD Client socket closed. Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0079] 03/10/2022 10:32:03 SRPT0308 [CemuxMaintLinkMgmt]: Connection closed. Return Status[-1] SRPT0308 Connection with IPMG closed. Return Status Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0080] 03/10/2022 10:32:03 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0081] 03/10/2022 10:32:03 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0082] 03/10/2022 10:32:03 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0083] 03/10/2022 10:32:03 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started. [0084] 03/10/2022 10:32:54 SRPT0016 OMM: IP link is DOWN between Primary Call Server and IPMG[0 0] SRPT0016 OMM: IP link is DOWN between Call Server and Media Gateway number . [0085] 03/10/2022 10:32:58 SRPT0017 OMM: IP link is UP between Primary Call Server and IPMG[0 0] SRPT0017 OMM: IP link is UP between Call Server and Media Gateway number . [0086] 03/10/2022 10:32:58 LOG0006 tRegCab: Registered successfully to Primary Call Server[192.168.110.40] [0087] 03/10/2022 10:32:58 SRPT1013 STARTUP: IPMG 0 0 registration denied: Call Server has cleaned up resources. SRPT1013 STARTUP: Cabinet %d registration denied: %s. [0088] 03/10/2022 10:32:58 SRPT1013 (cont'd) ... [0089] 03/10/2022 10:33:03 SRPT0781 RST 0: COLD START IN PROGRESS - Reason -1 SRPT0781 RST x: Cold Start in progress. Reason: (x) [0090] 03/10/2022 10:34:14 LOG0006 tRootTask: trBufLib_init OK, memory at 0x83fca208 of size 43650716 [0091] 03/10/2022 10:34:14 LOG0006 tRootTask: TR Memory Library initialization Ok [0092] 03/10/2022 10:34:14 SRPT0730 OS 0: Cold Start SRPT0730 x y z OS x cold start. Release y. Created z. Release: MGCCDC01 Created: Wednesday December 05 2012 10:33:29 EST [0093] 03/10/2022 10:34:17 SEC0119 Local authentication is being used. SEC0119 < Local or Central> authentication is being used. An information message to inform whether the system is set to use local or central authentication [0094] 03/10/2022 10:34:17 SRPT0107 Hardware reset reason = Hard Reset [register value = 0x0] SRPT0107 The FPGA Reset reason is %d [0095] 03/10/2022 10:34:29 PCH0110 PATCH 0 ACTIVATED. Name="p33265_1", Ref#="ISS1:1OF1", CR#="wi01170792", File="/p/patch/p33265_1.mgc" PCH0110 PATCH x ACTIVATED. Name=a, Ref#=b, PRS#=c, File=d. Patch x is put into service. This message is sent as an SNMP trap for Linux-based applications (except the Call Server); otherwise the message is not sent as an SNMP trap. [0096] 03/10/2022 10:34:30 PCH0110 PATCH 1 ACTIVATED. Name="p33294_1", Ref#="ISS1:1OF1", CR#="wi01176219", File="/p/patch/p33294_1.mgc"... [0097] 03/10/2022 10:34:30 PCH0110 PATCH 2 ACTIVATED. Name="p33713_1", Ref#="ISS1:1OF1", CR#="CS1000-6936", File="/p/patch/p33713_1.mgc"... [0098] 03/10/2022 10:34:31 PCH0110 PATCH 3 ACTIVATED. Name="p33587_1", Ref#="ISS1:1OF1", CR#="CS1000-7086", File="/p/patch/p33587_1.mgc"... [0099] 03/10/2022 10:34:31 PCH0110 PATCH 4 ACTIVATED. Name="p32419_1", Ref#="ISS1:1OF1", CR#="wi01068593", File="/p/patch/p32419_1.mgc"... [0100] 03/10/2022 10:34:33 PCH0110 PATCH 5 ACTIVATED. Name="p32765_1", Ref#="ISS1:1OF1", CR#="wi01101572", File="/p/patch/p32765_1.mgc"... [0101] 03/10/2022 10:34:33 PCH0110 PATCH 6 ACTIVATED. Name="p33611_1", Ref#="ISS1:1OF1", CR#="CS1000-7136", File="/p/patch/p33611_1.mgc"... [0102] 03/10/2022 10:34:34 PCH0110 PATCH 7 ACTIVATED. Name="p33711_1", Ref#="ISS1:1OF1", CR#="CS1000-7781", File="/p/patch/p33711_1.mgc"... [0103] 03/10/2022 10:34:35 PCH0110 PATCH 8 ACTIVATED. Name="p33609_1", Ref#="ISS1:1OF1", CR#="CS1000-7133", File="/p/patch/p33609_1.mgc"... [0104] 03/10/2022 10:34:35 PCH0110 PATCH 9 ACTIVATED. Name="p33822_1", Ref#="ISS1:1OF1", CR#="CS1000-7771", File="/p/patch/p33822_1.mgc"... [0105] 03/10/2022 10:34:36 PCH0110 PATCH 10 ACTIVATED. Name="p32820_1", Ref#="ISS1:1OF1", CR#="wi01108195", File="/p/patch/p32820_1.mgc"... [0106] 03/10/2022 10:34:36 PCH0110 PATCH 11 ACTIVATED. Name="p32431_1", Ref#="ISS1:1OF1", CR#="wi01068578", File="/p/patch/p32431_1.mgc"... [0107] 03/10/2022 10:34:37 PCH0110 PATCH 12 ACTIVATED. Name="p33429_1", Ref#="ISS1:1OF1", CR#="wi01201948", File="/p/patch/p33429_1.mgc"... [0108] 03/10/2022 10:34:37 PCH0110 PATCH 13 ACTIVATED. Name="p33564_1", Ref#="ISS1:1OF1", CR#="CS1000-7034", File="/p/patch/p33564_1.mgc"... [0109] 03/10/2022 10:34:38 PCH0110 PATCH 14 ACTIVATED. Name="p33385_1", Ref#="ISS1:1OF1", CR#="wi01193007", File="/p/patch/p33385_1.mgc"... [0110] 03/10/2022 10:34:39 PCH0110 PATCH 15 ACTIVATED. Name="p32427_1", Ref#="ISS1:1OF1", CR#="wi01166564", File="/p/patch/p32427_1.mgc"... [0111] 03/10/2022 10:34:39 PCH0110 PATCH 16 ACTIVATED. Name="p33480_1", Ref#="ISS1:1OF1", CR#="wi01212348", File="/p/patch/p33480_1.mgc"... [0112] 03/10/2022 10:34:40 PCH0110 PATCH 17 ACTIVATED. Name="p32741_1", Ref#="ISS1:1OF1", CR#="Wi01097446", File="/p/patch/p32741_1.mgc"... [0113] 03/10/2022 10:34:41 PCH0110 PATCH 18 ACTIVATED. Name="p33789_1", Ref#="ISS1:1OF1", CR#="CS1000-7628", File="/p/patch/p33789_1.mgc"... [0114] 03/10/2022 10:34:41 PCH0110 PATCH 19 ACTIVATED. Name="p33824_1", Ref#="ISS1:1OF1", CR#="CS1000-7775", File="/p/patch/p33824_1.mgc"... [0115] 03/10/2022 10:34:42 PCH0110 PATCH 20 ACTIVATED. Name="p33447_1", Ref#="ISS1:1OF1", CR#="wi01207044", File="/p/patch/p33447_1.mgc"... [0116] 03/10/2022 10:34:42 PCH0110 PATCH 21 ACTIVATED. Name="p33775_1", Ref#="ISS1:1OF1", CR#="CS1000-7578", File="/p/patch/p33775_1.mgc"... [0117] 03/10/2022 10:34:43 PCH0110 PATCH 22 ACTIVATED. Name="p32385_1", Ref#="ISS1:1OF1", CR#="wi01060807", File="/p/patch/p32385_1.mgc"... [0118] 03/10/2022 10:34:43 PCH0110 PATCH 23 ACTIVATED. Name="p32480_1", Ref#="ISS1:1OF1", CR#="wi01119120", File="/p/patch/p32480_1.mgc"... [0119] 03/10/2022 10:34:54 LOG0006 applStart: mgcConfigStart initialization succeeded [0120] 03/10/2022 10:34:54 LOG0006 applStart: Task mgcSysSpawn enters initialization [0121] 03/10/2022 10:34:55 LOG0006 applStart: Task mgcSysSpawn initialization succeeded [0122] 03/10/2022 10:34:55 LOG0006 MGCSYS: Xmsg Daemon task spawn is successful [0123] 03/10/2022 10:34:57 LOG0006 applStart: mdioSemCreate initialization succeeded [0124] 03/10/2022 10:34:57 LOG0006 applStart: mgcImageVerRead initialization succeeded [0125] 03/10/2022 10:34:57 LOG0006 applStart: mgcSysUtilSpawn initialization succeeded [0126] 03/10/2022 10:34:57 LOG0006 applStart: tlanInit initialization succeeded [0127] 03/10/2022 10:34:57 LOG0006 applStart: sysInfoFlashInit initialization succeeded [0128] 03/10/2022 10:34:57 LOG0006 applStart: gwcA31Main initialization succeeded [0129] 03/10/2022 10:34:57 LOG0006 applStart: vapiLayerInit initialization succeeded [0130] 03/10/2022 10:34:57 LOG0006 applStart: afsInitialize initialization succeeded [0131] 03/10/2022 10:34:57 LOG0006 applStart: afsSubscriberInit initialization succeeded [0132] 03/10/2022 10:34:57 LOG0006 applStart: afsPublisherInit initialization succeeded [0133] 03/10/2022 10:34:57 LOG0006 applStart: ISSS Init succeeded [0134] 03/10/2022 10:34:57 LOG0006 applStart: mamISECStart initialization succeeded [0135] 03/10/2022 10:34:57 LOG0006 applStart: tncInit initialization succeeded [0136] 03/10/2022 10:34:57 LOG0006 applStart: mgcStartUp initialization succeeded [0137] 03/10/2022 10:34:57 LOG0006 applStart: mgcClanInit initialization succeeded [0138] 03/10/2022 10:34:57 LOG0006 applStart: mgcInitRegister initialization succeeded [0139] 03/10/2022 10:34:57 LOG0006 applStart: mgcVgwAppStart initialization succeeded [0140] 03/10/2022 10:34:57 LOG0004 tMgcVgwAppStart: Waiting for mgcdb.xml from Primary Call Server [0141] 03/10/2022 10:34:57 SEC0105 USR=initialization, EVT=global port access state change to off, RESULT=success SEC0105 User= SRC = DST = EVT= port access state change to , RESULT = User can have the following values: 1. The actual user name for a manual change. 2. "initialization" from system bootup. 3. "CS Update" on MGC and MC32S from CS initiated change. SRC is only relevant to manual changes and will give the session info (tip, rlogin, ssh, telnet, etc) and IP address if applicable DST is only relevant to manua l changes and describes the shell (sl1, pdt, ldb, etc) that the user was logged into Scope can have the following values: 1. Global - if initiated from the CS ld117 administration commands. 2. Local - if initiated from pdt or ldb shell on any device. State can have these values: 1. Off 2. Default 3. Custom 4. Unknown - only occurs on MGC and MC32S if an incorrect state was sent. A four character identifier for the custom file will be displayed. [0142] 03/10/2022 10:34:57 LOG0006 applStart: portAccessInit initialization succeeded [0143] 03/10/2022 10:34:57 LOG0006 applStart: securityDomainElemPropValueSet initialization succeeded [0144] 03/10/2022 10:34:57 LOG0006 tIpExpStartup: Registered successfully to Primary Call Server[192.168.110.40] [0145] 03/10/2022 10:34:58 LOG0006 tIpExpStartup: Received configuration data from Primary Call Server on attempt[1] [0146] 03/10/2022 10:34:58 LOG0006 MGCUTIL: IPMG Cabinet is non-MG1010 [0147] 03/10/2022 10:35:04 SRPT0017 OMM: IP link is UP between Primary Call Server and IPMG[0 0] SRPT0017 OMM: IP link is UP between Call Server and Media Gateway number . [0148] 03/10/2022 10:35:04 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started. [0149] 03/10/2022 10:35:04 SRPT0307 (cont'd) ... [0150] 03/10/2022 10:35:05 LOG0006 TNC: CHANNEL CREATION SUCCESSFUL [0151] 03/10/2022 10:35:08 LOG0006 CLAN: Slot: 3, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 1 [0152] 03/10/2022 10:35:09 LOG0006 CLAN: Slot: 4, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0153] 03/10/2022 10:35:09 LOG0006 CLAN: Slot: 7, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0154] 03/10/2022 10:35:09 LOG0006 CLAN: Slot: 5, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0155] 03/10/2022 10:35:09 LOG0006 CLAN: Slot: 6, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0156] 03/10/2022 10:35:12 LOG0006 CLAN: Slot: 2, Card Type: UNKNOWN (47), Signaling Type: A10 (2), Map Type: 1 [0157] 03/10/2022 10:35:13 LOG0006 CLAN: Slot: 1, Card Type: PRI2 2.048MBPS (44), Signaling Type: A10 (2), Map Type: 5 [0158] 03/10/2022 10:35:17 LOG0003 AFS: Failed to send mgcVgwConfigFile Update message - tVGW task is not running. [0159] 03/10/2022 10:35:27 LOG0006 SYS: VGW5000 Card initialized, all alarms cleared. (202) [0160] 03/10/2022 10:35:27 LOG0001 SYS: VGW1036 Call server communication link: 192.168.110.40 down (20) [0161] 03/10/2022 10:35:27 LOG0006 SYS: Waiting for PBX RUDP link to be established, timeout is set to 5 [0162] 03/10/2022 10:35:27 LOG0006 tConfigProcess: AlarmConfigClient Registered with CP successfully [0163] 03/10/2022 10:35:27 LOG0006 tConfigProcess: Server socket closed [0164] 03/10/2022 10:35:27 LOG0006 tConfigProcess: Opened Server socket [0165] 03/10/2022 10:35:32 LOG0003 SYS: Failed to establish PBX RUDP link [0166] 03/10/2022 10:35:32 LOG0006 VGW: DSP DB1 is High Density(128 DSP ports). [0167] 03/10/2022 10:35:34 LOG0006 VGW: vgwTimerInit: setPollingPeriod data is NOT ready yet, force setPollingPeriod to default 30 [0168] 03/10/2022 10:35:34 LOG0006 VGW: VGW5014 Ethernet carrier: eth0, OK (9) [0169] 03/10/2022 10:35:40 LOG0004 tRUDPSS: Forwarding for connect Id = 0x84d1e238, error of type = 6 (connection lost). [0170] 03/10/2022 10:35:40 LOG0003 tRUDPSS: pbxErrorCallBack on link 0, reset link(s) [0171] 03/10/2022 10:35:45 LOG0006 VGW: Successfully enabled MIPS_CALCULATION_INTERVAL command on device 1 [0172] 03/10/2022 10:35:45 LOG0006 VGW: Successfully enabled SPU_LOW_MIPS_ALERT command on device 1 [0173] 03/10/2022 10:35:45 LOG0006 VGW: Successfully enabled ARM_LOW_MIPS_ALERT command on device 1 [0174] 03/10/2022 10:35:45 LOG0006 tGtlRx: ARM_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current ARM free MIPS: 979 [0175] 03/10/2022 10:35:45 LOG0006 tGtlRx: SPU_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current DSP free MIPS: 1000 [0176] 03/10/2022 10:42:22 SRPT0306 SSD Client socket closed. SRPT0306 SSD Client socket closed. Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0177] 03/10/2022 10:42:22 SRPT0308 [CemuxMaintLinkMgmt]: Connection closed. Return Status[-1] SRPT0308 Connection with IPMG closed. Return Status Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0178] 03/10/2022 10:42:22 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0179] 03/10/2022 10:42:22 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0180] 03/10/2022 10:42:22 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0181] 03/10/2022 10:42:22 SRPT0311 Remote TTY: ttyClient: Failure reading socket 36 for Cabinet 1, Return Status[0x36] SRPT0311 Remote TTY: / :Failure reading socket for cabinet Return Status Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0182] 03/10/2022 10:42:22 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started. [0183] 03/10/2022 10:42:50 SRPT0016 OMM: IP link is DOWN between Primary Call Server and IPMG[0 0] SRPT0016 OMM: IP link is DOWN between Call Server and Media Gateway number . [0184] 03/10/2022 10:42:53 SRPT0017 OMM: IP link is UP between Primary Call Server and IPMG[0 0] SRPT0017 OMM: IP link is UP between Call Server and Media Gateway number . [0185] 03/10/2022 10:42:54 LOG0006 tRegCab: Registered successfully to Primary Call Server[192.168.110.40] [0186] 03/10/2022 10:42:54 SRPT1013 STARTUP: IPMG 0 0 registration denied: Call Server has cleaned up resources. SRPT1013 STARTUP: Cabinet %d registration denied: %s. [0187] 03/10/2022 10:42:54 SRPT1013 (cont'd) ... [0188] 03/10/2022 10:42:59 SRPT0781 RST 0: COLD START IN PROGRESS - Reason -1 SRPT0781 RST x: Cold Start in progress. Reason: (x) [0189] 03/10/2022 10:44:10 LOG0006 tRootTask: trBufLib_init OK, memory at 0x83fca208 of size 43650716 [0190] 03/10/2022 10:44:10 LOG0006 tRootTask: TR Memory Library initialization Ok [0191] 03/10/2022 10:44:10 SRPT0730 OS 0: Cold Start SRPT0730 x y z OS x cold start. Release y. Created z. Release: MGCCDC01 Created: Wednesday December 05 2012 10:33:29 EST [0192] 03/10/2022 10:44:12 SEC0119 Local authentication is being used. SEC0119 < Local or Central> authentication is being used. An information message to inform whether the system is set to use local or central authentication [0193] 03/10/2022 10:44:13 SRPT0107 Hardware reset reason = Hard Reset [register value = 0x0] SRPT0107 The FPGA Reset reason is %d [0194] 03/10/2022 10:44:25 PCH0110 PATCH 0 ACTIVATED. Name="p33265_1", Ref#="ISS1:1OF1", CR#="wi01170792", File="/p/patch/p33265_1.mgc" PCH0110 PATCH x ACTIVATED. Name=a, Ref#=b, PRS#=c, File=d. Patch x is put into service. This message is sent as an SNMP trap for Linux-based applications (except the Call Server); otherwise the message is not sent as an SNMP trap. [0195] 03/10/2022 10:44:26 PCH0110 PATCH 1 ACTIVATED. Name="p33294_1", Ref#="ISS1:1OF1", CR#="wi01176219", File="/p/patch/p33294_1.mgc"... [0196] 03/10/2022 10:44:26 PCH0110 PATCH 2 ACTIVATED. Name="p33713_1", Ref#="ISS1:1OF1", CR#="CS1000-6936", File="/p/patch/p33713_1.mgc"... [0197] 03/10/2022 10:44:27 PCH0110 PATCH 3 ACTIVATED. Name="p33587_1", Ref#="ISS1:1OF1", CR#="CS1000-7086", File="/p/patch/p33587_1.mgc"... [0198] 03/10/2022 10:44:27 PCH0110 PATCH 4 ACTIVATED. Name="p32419_1", Ref#="ISS1:1OF1", CR#="wi01068593", File="/p/patch/p32419_1.mgc"... [0199] 03/10/2022 10:44:29 PCH0110 PATCH 5 ACTIVATED. Name="p32765_1", Ref#="ISS1:1OF1", CR#="wi01101572", File="/p/patch/p32765_1.mgc"... [0200] 03/10/2022 10:44:29 PCH0110 PATCH 6 ACTIVATED. Name="p33611_1", Ref#="ISS1:1OF1", CR#="CS1000-7136", File="/p/patch/p33611_1.mgc"... [0201] 03/10/2022 10:44:30 PCH0110 PATCH 7 ACTIVATED. Name="p33711_1", Ref#="ISS1:1OF1", CR#="CS1000-7781", File="/p/patch/p33711_1.mgc"... [0202] 03/10/2022 10:44:30 PCH0110 PATCH 8 ACTIVATED. Name="p33609_1", Ref#="ISS1:1OF1", CR#="CS1000-7133", File="/p/patch/p33609_1.mgc"... [0203] 03/10/2022 10:44:31 PCH0110 PATCH 9 ACTIVATED. Name="p33822_1", Ref#="ISS1:1OF1", CR#="CS1000-7771", File="/p/patch/p33822_1.mgc"... [0204] 03/10/2022 10:44:31 PCH0110 PATCH 10 ACTIVATED. Name="p32820_1", Ref#="ISS1:1OF1", CR#="wi01108195", File="/p/patch/p32820_1.mgc"... [0205] 03/10/2022 10:44:32 PCH0110 PATCH 11 ACTIVATED. Name="p32431_1", Ref#="ISS1:1OF1", CR#="wi01068578", File="/p/patch/p32431_1.mgc"... [0206] 03/10/2022 10:44:33 PCH0110 PATCH 12 ACTIVATED. Name="p33429_1", Ref#="ISS1:1OF1", CR#="wi01201948", File="/p/patch/p33429_1.mgc"... [0207] 03/10/2022 10:44:33 PCH0110 PATCH 13 ACTIVATED. Name="p33564_1", Ref#="ISS1:1OF1", CR#="CS1000-7034", File="/p/patch/p33564_1.mgc"... [0208] 03/10/2022 10:44:34 PCH0110 PATCH 14 ACTIVATED. Name="p33385_1", Ref#="ISS1:1OF1", CR#="wi01193007", File="/p/patch/p33385_1.mgc"... [0209] 03/10/2022 10:44:34 PCH0110 PATCH 15 ACTIVATED. Name="p32427_1", Ref#="ISS1:1OF1", CR#="wi01166564", File="/p/patch/p32427_1.mgc"... [0210] 03/10/2022 10:44:35 PCH0110 PATCH 16 ACTIVATED. Name="p33480_1", Ref#="ISS1:1OF1", CR#="wi01212348", File="/p/patch/p33480_1.mgc"... [0211] 03/10/2022 10:44:35 PCH0110 PATCH 17 ACTIVATED. Name="p32741_1", Ref#="ISS1:1OF1", CR#="Wi01097446", File="/p/patch/p32741_1.mgc"... [0212] 03/10/2022 10:44:36 PCH0110 PATCH 18 ACTIVATED. Name="p33789_1", Ref#="ISS1:1OF1", CR#="CS1000-7628", File="/p/patch/p33789_1.mgc"... [0213] 03/10/2022 10:44:37 PCH0110 PATCH 19 ACTIVATED. Name="p33824_1", Ref#="ISS1:1OF1", CR#="CS1000-7775", File="/p/patch/p33824_1.mgc"... [0214] 03/10/2022 10:44:37 PCH0110 PATCH 20 ACTIVATED. Name="p33447_1", Ref#="ISS1:1OF1", CR#="wi01207044", File="/p/patch/p33447_1.mgc"... [0215] 03/10/2022 10:44:38 PCH0110 PATCH 21 ACTIVATED. Name="p33775_1", Ref#="ISS1:1OF1", CR#="CS1000-7578", File="/p/patch/p33775_1.mgc"... [0216] 03/10/2022 10:44:39 PCH0110 PATCH 22 ACTIVATED. Name="p32385_1", Ref#="ISS1:1OF1", CR#="wi01060807", File="/p/patch/p32385_1.mgc"... [0217] 03/10/2022 10:44:39 PCH0110 PATCH 23 ACTIVATED. Name="p32480_1", Ref#="ISS1:1OF1", CR#="wi01119120", File="/p/patch/p32480_1.mgc"... [0218] 03/10/2022 10:44:40 PCH0110 PATCH 24 ACTIVATED. Name="p32804_1", Ref#="ISS1:1OF1", CR#="wi01105448", File="/p/patch/p32804_1.mgc"... [0219] 03/10/2022 10:44:49 LOG0006 applStart: mgcConfigStart initialization succeeded [0220] 03/10/2022 10:44:49 LOG0006 applStart: Task mgcSysSpawn enters initialization [0221] 03/10/2022 10:44:50 LOG0006 applStart: Task mgcSysSpawn initialization succeeded [0222] 03/10/2022 10:44:50 LOG0006 MGCSYS: Xmsg Daemon task spawn is successful [0223] 03/10/2022 10:44:52 LOG0006 applStart: mdioSemCreate initialization succeeded [0224] 03/10/2022 10:44:52 LOG0006 applStart: mgcImageVerRead initialization succeeded [0225] 03/10/2022 10:44:52 LOG0006 applStart: mgcSysUtilSpawn initialization succeeded [0226] 03/10/2022 10:44:53 LOG0006 applStart: tlanInit initialization succeeded [0227] 03/10/2022 10:44:53 LOG0006 applStart: sysInfoFlashInit initialization succeeded [0228] 03/10/2022 10:44:53 LOG0006 applStart: gwcA31Main initialization succeeded [0229] 03/10/2022 10:44:53 LOG0006 applStart: vapiLayerInit initialization succeeded [0230] 03/10/2022 10:44:53 LOG0006 applStart: afsInitialize initialization succeeded [0231] 03/10/2022 10:44:53 LOG0006 applStart: afsSubscriberInit initialization succeeded [0232] 03/10/2022 10:44:53 LOG0006 applStart: afsPublisherInit initialization succeeded [0233] 03/10/2022 10:44:53 LOG0006 applStart: ISSS Init succeeded [0234] 03/10/2022 10:44:53 LOG0006 applStart: mamISECStart initialization succeeded [0235] 03/10/2022 10:44:53 LOG0006 applStart: tncInit initialization succeeded [0236] 03/10/2022 10:44:53 LOG0006 applStart: mgcStartUp initialization succeeded [0237] 03/10/2022 10:44:53 LOG0006 applStart: mgcClanInit initialization succeeded [0238] 03/10/2022 10:44:53 LOG0006 applStart: mgcInitRegister initialization succeeded [0239] 03/10/2022 10:44:53 LOG0006 applStart: mgcVgwAppStart initialization succeeded [0240] 03/10/2022 10:44:53 LOG0004 tMgcVgwAppStart: Waiting for mgcdb.xml from Primary Call Server [0241] 03/10/2022 10:44:53 LOG0006 tIpExpStartup: Registered successfully to Primary Call Server[192.168.110.40] [0242] 03/10/2022 10:44:53 SEC0105 USR=initialization, EVT=global port access state change to off, RESULT=success SEC0105 User= SRC = DST = EVT= port access state change to , RESULT = User can have the following values: 1. The actual user name for a manual change. 2. "initialization" from system bootup. 3. "CS Update" on MGC and MC32S from CS initiated change. SRC is only relevant to manual changes and will give the session info (tip, rlogin, ssh, telnet, etc) and IP address if applicable DST is only relevant to manua l changes and describes the shell (sl1, pdt, ldb, etc) that the user was logged into Scope can have the following values: 1. Global - if initiated from the CS ld117 administration commands. 2. Local - if initiated from pdt or ldb shell on any device. State can have these values: 1. Off 2. Default 3. Custom 4. Unknown - only occurs on MGC and MC32S if an incorrect state was sent. A four character identifier for the custom file will be displayed. [0243] 03/10/2022 10:44:53 LOG0006 applStart: portAccessInit initialization succeeded [0244] 03/10/2022 10:44:53 LOG0006 applStart: securityDomainElemPropValueSet initialization succeeded [0245] 03/10/2022 10:44:55 LOG0006 tIpExpStartup: Received configuration data from Primary Call Server on attempt[1] [0246] 03/10/2022 10:44:55 LOG0006 MGCUTIL: IPMG Cabinet is non-MG1010 [0247] 03/10/2022 10:45:02 SRPT0017 OMM: IP link is UP between Primary Call Server and IPMG[0 0] SRPT0017 OMM: IP link is UP between Call Server and Media Gateway number . [0248] 03/10/2022 10:45:02 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started. [0249] 03/10/2022 10:45:02 SRPT0307 (cont'd) ... [0250] 03/10/2022 10:45:03 LOG0006 TNC: CHANNEL CREATION SUCCESSFUL [0251] 03/10/2022 10:45:05 LOG0006 CLAN: Slot: 3, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 1 [0252] 03/10/2022 10:45:05 LOG0006 CLAN: Slot: 4, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0253] 03/10/2022 10:45:06 LOG0006 CLAN: Slot: 7, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0254] 03/10/2022 10:45:06 LOG0006 CLAN: Slot: 5, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0255] 03/10/2022 10:45:06 LOG0006 CLAN: Slot: 6, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0256] 03/10/2022 10:45:09 LOG0006 CLAN: Slot: 2, Card Type: UNKNOWN (47), Signaling Type: A10 (2), Map Type: 1 [0257] 03/10/2022 10:45:10 LOG0006 CLAN: Slot: 1, Card Type: PRI2 2.048MBPS (44), Signaling Type: A10 (2), Map Type: 5 [0258] 03/10/2022 10:45:10 IOD0008 checkNonConfigDevs : unconfigured card @ slot 1 IOD0008 Interrupt: checkNonConfigDevs: unconfigured card in slot 2 generated unexpected CEMUX interrupt. generated cemux interrupt [0259] 03/10/2022 10:45:14 LOG0003 AFS: Failed to send mgcVgwConfigFile Update message - tVGW task is not running. [0260] 03/10/2022 10:45:24 LOG0006 SYS: VGW5000 Card initialized, all alarms cleared. (202) [0261] 03/10/2022 10:45:24 LOG0001 SYS: VGW1036 Call server communication link: 192.168.110.40 down (20) [0262] 03/10/2022 10:45:24 LOG0006 SYS: Waiting for PBX RUDP link to be established, timeout is set to 5 [0263] 03/10/2022 10:45:24 LOG0006 tConfigProcess: AlarmConfigClient Registered with CP successfully [0264] 03/10/2022 10:45:24 LOG0006 tConfigProcess: Server socket closed [0265] 03/10/2022 10:45:24 LOG0006 tConfigProcess: Opened Server socket [0266] 03/10/2022 10:45:29 LOG0003 SYS: Failed to establish PBX RUDP link [0267] 03/10/2022 10:45:30 LOG0006 VGW: DSP DB1 is High Density(128 DSP ports). [0268] 03/10/2022 10:45:31 LOG0006 VGW: vgwTimerInit: setPollingPeriod data is NOT ready yet, force setPollingPeriod to default 30 [0269] 03/10/2022 10:45:31 LOG0006 VGW: VGW5014 Ethernet carrier: eth0, OK (9) [0270] 03/10/2022 10:45:38 LOG0004 tRUDPSS: Forwarding for connect Id = 0x84d1e238, error of type = 6 (connection lost). [0271] 03/10/2022 10:45:38 LOG0003 tRUDPSS: pbxErrorCallBack on link 0, reset link(s) [0272] 03/10/2022 10:45:42 LOG0006 VGW: Successfully enabled MIPS_CALCULATION_INTERVAL command on device 1 [0273] 03/10/2022 10:45:42 LOG0006 VGW: Successfully enabled SPU_LOW_MIPS_ALERT command on device 1 [0274] 03/10/2022 10:45:42 LOG0006 VGW: Successfully enabled ARM_LOW_MIPS_ALERT command on device 1 [0275] 03/10/2022 10:45:42 LOG0006 tGtlRx: ARM_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current ARM free MIPS: 979 [0276] 03/10/2022 10:45:42 LOG0006 tGtlRx: SPU_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current DSP free MIPS: 1000 [0277] 03/10/2022 10:52:43 SRPT0306 SSD Client socket closed. SRPT0306 SSD Client socket closed. Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0278] 03/10/2022 10:52:43 SRPT0308 [CemuxMaintLinkMgmt]: Connection closed. Return Status[-1] SRPT0308 Connection with IPMG closed. Return Status Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0279] 03/10/2022 10:52:43 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0280] 03/10/2022 10:52:43 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0281] 03/10/2022 10:52:43 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0282] 03/10/2022 10:52:43 SRPT0311 Remote TTY: ttyClient: Failure reading socket 36 for Cabinet 1, Return Status[0x36] SRPT0311 Remote TTY: / :Failure reading socket for cabinet Return Status Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0283] 03/10/2022 10:52:43 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started. [0284] 03/10/2022 10:53:09 SRPT0016 OMM: IP link is DOWN between Primary Call Server and IPMG[0 0] SRPT0016 OMM: IP link is DOWN between Call Server and Media Gateway number . [0285] 03/10/2022 10:53:13 SRPT0017 OMM: IP link is UP between Primary Call Server and IPMG[0 0] SRPT0017 OMM: IP link is UP between Call Server and Media Gateway number . [0286] 03/10/2022 10:53:13 LOG0006 tRegCab: Registered successfully to Primary Call Server[192.168.110.40] [0287] 03/10/2022 10:53:13 SRPT1013 STARTUP: IPMG 0 0 registration denied: Call Server has cleaned up resources. SRPT1013 STARTUP: Cabinet %d registration denied: %s. [0288] 03/10/2022 10:53:13 SRPT1013 (cont'd) ... [0289] 03/10/2022 10:53:18 SRPT0781 RST 0: COLD START IN PROGRESS - Reason -1 SRPT0781 RST x: Cold Start in progress. Reason: (x) [0290] 03/10/2022 10:54:29 LOG0006 tRootTask: trBufLib_init OK, memory at 0x83fca208 of size 43650716 [0291] 03/10/2022 10:54:29 LOG0006 tRootTask: TR Memory Library initialization Ok [0292] 03/10/2022 10:54:29 SRPT0730 OS 0: Cold Start SRPT0730 x y z OS x cold start. Release y. Created z. Release: MGCCDC01 Created: Wednesday December 05 2012 10:33:29 EST [0293] 03/10/2022 10:54:31 SEC0119 Local authentication is being used. SEC0119 < Local or Central> authentication is being used. An information message to inform whether the system is set to use local or central authentication [0294] 03/10/2022 10:54:32 SRPT0107 Hardware reset reason = Hard Reset [register value = 0x0] SRPT0107 The FPGA Reset reason is %d [0295] 03/10/2022 10:54:44 PCH0110 PATCH 0 ACTIVATED. Name="p33265_1", Ref#="ISS1:1OF1", CR#="wi01170792", File="/p/patch/p33265_1.mgc" PCH0110 PATCH x ACTIVATED. Name=a, Ref#=b, PRS#=c, File=d. Patch x is put into service. This message is sent as an SNMP trap for Linux-based applications (except the Call Server); otherwise the message is not sent as an SNMP trap. [0296] 03/10/2022 10:54:45 PCH0110 PATCH 1 ACTIVATED. Name="p33294_1", Ref#="ISS1:1OF1", CR#="wi01176219", File="/p/patch/p33294_1.mgc"... [0297] 03/10/2022 10:54:45 PCH0110 PATCH 2 ACTIVATED. Name="p33713_1", Ref#="ISS1:1OF1", CR#="CS1000-6936", File="/p/patch/p33713_1.mgc"... [0298] 03/10/2022 10:54:46 PCH0110 PATCH 3 ACTIVATED. Name="p33587_1", Ref#="ISS1:1OF1", CR#="CS1000-7086", File="/p/patch/p33587_1.mgc"... [0299] 03/10/2022 10:54:46 PCH0110 PATCH 4 ACTIVATED. Name="p32419_1", Ref#="ISS1:1OF1", CR#="wi01068593", File="/p/patch/p32419_1.mgc"... [0300] 03/10/2022 10:54:48 PCH0110 PATCH 5 ACTIVATED. Name="p32765_1", Ref#="ISS1:1OF1", CR#="wi01101572", File="/p/patch/p32765_1.mgc"... [0301] 03/10/2022 10:54:49 PCH0110 PATCH 6 ACTIVATED. Name="p33611_1", Ref#="ISS1:1OF1", CR#="CS1000-7136", File="/p/patch/p33611_1.mgc"... [0302] 03/10/2022 10:54:49 PCH0110 PATCH 7 ACTIVATED. Name="p33711_1", Ref#="ISS1:1OF1", CR#="CS1000-7781", File="/p/patch/p33711_1.mgc"... [0303] 03/10/2022 10:54:50 PCH0110 PATCH 8 ACTIVATED. Name="p33609_1", Ref#="ISS1:1OF1", CR#="CS1000-7133", File="/p/patch/p33609_1.mgc"... [0304] 03/10/2022 10:54:50 PCH0110 PATCH 9 ACTIVATED. Name="p33822_1", Ref#="ISS1:1OF1", CR#="CS1000-7771", File="/p/patch/p33822_1.mgc"... [0305] 03/10/2022 10:54:51 PCH0110 PATCH 10 ACTIVATED. Name="p32820_1", Ref#="ISS1:1OF1", CR#="wi01108195", File="/p/patch/p32820_1.mgc"... [0306] 03/10/2022 10:54:52 PCH0110 PATCH 11 ACTIVATED. Name="p32431_1", Ref#="ISS1:1OF1", CR#="wi01068578", File="/p/patch/p32431_1.mgc"... [0307] 03/10/2022 10:54:52 PCH0110 PATCH 12 ACTIVATED. Name="p33429_1", Ref#="ISS1:1OF1", CR#="wi01201948", File="/p/patch/p33429_1.mgc"... [0308] 03/10/2022 10:54:53 PCH0110 PATCH 13 ACTIVATED. Name="p33564_1", Ref#="ISS1:1OF1", CR#="CS1000-7034", File="/p/patch/p33564_1.mgc"... [0309] 03/10/2022 10:54:53 PCH0110 PATCH 14 ACTIVATED. Name="p33385_1", Ref#="ISS1:1OF1", CR#="wi01193007", File="/p/patch/p33385_1.mgc"... [0310] 03/10/2022 10:54:54 PCH0110 PATCH 15 ACTIVATED. Name="p32427_1", Ref#="ISS1:1OF1", CR#="wi01166564", File="/p/patch/p32427_1.mgc"... [0311] 03/10/2022 10:54:54 PCH0110 PATCH 16 ACTIVATED. Name="p33480_1", Ref#="ISS1:1OF1", CR#="wi01212348", File="/p/patch/p33480_1.mgc"... [0312] 03/10/2022 10:54:55 PCH0110 PATCH 17 ACTIVATED. Name="p32741_1", Ref#="ISS1:1OF1", CR#="Wi01097446", File="/p/patch/p32741_1.mgc"... [0313] 03/10/2022 10:54:56 PCH0110 PATCH 18 ACTIVATED. Name="p33789_1", Ref#="ISS1:1OF1", CR#="CS1000-7628", File="/p/patch/p33789_1.mgc"... [0314] 03/10/2022 10:54:56 PCH0110 PATCH 19 ACTIVATED. Name="p33824_1", Ref#="ISS1:1OF1", CR#="CS1000-7775", File="/p/patch/p33824_1.mgc"... [0315] 03/10/2022 10:54:57 PCH0110 PATCH 20 ACTIVATED. Name="p33447_1", Ref#="ISS1:1OF1", CR#="wi01207044", File="/p/patch/p33447_1.mgc"... [0316] 03/10/2022 10:54:57 PCH0110 PATCH 21 ACTIVATED. Name="p33775_1", Ref#="ISS1:1OF1", CR#="CS1000-7578", File="/p/patch/p33775_1.mgc"... [0317] 03/10/2022 10:54:58 PCH0110 PATCH 22 ACTIVATED. Name="p32385_1", Ref#="ISS1:1OF1", CR#="wi01060807", File="/p/patch/p32385_1.mgc"... [0318] 03/10/2022 10:54:59 PCH0110 PATCH 23 ACTIVATED. Name="p32480_1", Ref#="ISS1:1OF1", CR#="wi01119120", File="/p/patch/p32480_1.mgc"... [0319] 03/10/2022 10:55:09 LOG0006 applStart: mgcConfigStart initialization succeeded [0320] 03/10/2022 10:55:09 LOG0006 applStart: Task mgcSysSpawn enters initialization [0321] 03/10/2022 10:55:10 LOG0006 applStart: Task mgcSysSpawn initialization succeeded [0322] 03/10/2022 10:55:10 LOG0006 MGCSYS: Xmsg Daemon task spawn is successful [0323] 03/10/2022 10:55:12 LOG0006 applStart: mdioSemCreate initialization succeeded [0324] 03/10/2022 10:55:12 LOG0006 applStart: mgcImageVerRead initialization succeeded [0325] 03/10/2022 10:55:12 LOG0006 applStart: mgcSysUtilSpawn initialization succeeded [0326] 03/10/2022 10:55:12 LOG0006 applStart: tlanInit initialization succeeded [0327] 03/10/2022 10:55:12 LOG0006 applStart: sysInfoFlashInit initialization succeeded [0328] 03/10/2022 10:55:12 LOG0006 applStart: gwcA31Main initialization succeeded [0329] 03/10/2022 10:55:12 LOG0006 applStart: vapiLayerInit initialization succeeded [0330] 03/10/2022 10:55:12 LOG0006 applStart: afsInitialize initialization succeeded [0331] 03/10/2022 10:55:12 LOG0006 applStart: afsSubscriberInit initialization succeeded [0332] 03/10/2022 10:55:12 LOG0006 applStart: afsPublisherInit initialization succeeded [0333] 03/10/2022 10:55:12 LOG0006 applStart: ISSS Init succeeded [0334] 03/10/2022 10:55:12 LOG0006 applStart: mamISECStart initialization succeeded [0335] 03/10/2022 10:55:12 LOG0006 applStart: tncInit initialization succeeded [0336] 03/10/2022 10:55:12 LOG0006 applStart: mgcStartUp initialization succeeded [0337] 03/10/2022 10:55:12 LOG0006 applStart: mgcClanInit initialization succeeded [0338] 03/10/2022 10:55:12 LOG0006 applStart: mgcInitRegister initialization succeeded [0339] 03/10/2022 10:55:12 LOG0006 applStart: mgcVgwAppStart initialization succeeded [0340] 03/10/2022 10:55:12 LOG0004 tMgcVgwAppStart: Waiting for mgcdb.xml from Primary Call Server [0341] 03/10/2022 10:55:12 LOG0006 tIpExpStartup: Registered successfully to Primary Call Server[192.168.110.40] [0342] 03/10/2022 10:55:13 SEC0105 USR=initialization, EVT=global port access state change to off, RESULT=success SEC0105 User= SRC = DST = EVT= port access state change to , RESULT = User can have the following values: 1. The actual user name for a manual change. 2. "initialization" from system bootup. 3. "CS Update" on MGC and MC32S from CS initiated change. SRC is only relevant to manual changes and will give the session info (tip, rlogin, ssh, telnet, etc) and IP address if applicable DST is only relevant to manua l changes and describes the shell (sl1, pdt, ldb, etc) that the user was logged into Scope can have the following values: 1. Global - if initiated from the CS ld117 administration commands. 2. Local - if initiated from pdt or ldb shell on any device. State can have these values: 1. Off 2. Default 3. Custom 4. Unknown - only occurs on MGC and MC32S if an incorrect state was sent. A four character identifier for the custom file will be displayed. [0343] 03/10/2022 10:55:13 LOG0006 applStart: portAccessInit initialization succeeded [0344] 03/10/2022 10:55:13 LOG0006 applStart: securityDomainElemPropValueSet initialization succeeded [0345] 03/10/2022 10:55:13 LOG0006 tIpExpStartup: Received configuration data from Primary Call Server on attempt[1] [0346] 03/10/2022 10:55:13 LOG0006 MGCUTIL: IPMG Cabinet is non-MG1010 [0347] 03/10/2022 10:55:20 SRPT0017 OMM: IP link is UP between Primary Call Server and IPMG[0 0] SRPT0017 OMM: IP link is UP between Call Server and Media Gateway number . [0348] 03/10/2022 10:55:20 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started. [0349] 03/10/2022 10:55:20 SRPT0307 (cont'd) ... [0350] 03/10/2022 10:55:20 LOG0006 TNC: CHANNEL CREATION SUCCESSFUL [0351] 03/10/2022 10:55:23 LOG0006 CLAN: Slot: 3, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 1 [0352] 03/10/2022 10:55:23 LOG0006 CLAN: Slot: 4, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0353] 03/10/2022 10:55:24 LOG0006 CLAN: Slot: 7, Card Type: XDLC (17), Signaling Type: X12 (1), Map Type: 3 [0354] 03/10/2022 10:55:24 LOG0006 CLAN: Slot: 5, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0355] 03/10/2022 10:55:24 LOG0006 CLAN: Slot: 6, Card Type: XMLC (24), Signaling Type: A10 (2), Map Type: 3 [0356] 03/10/2022 10:55:27 LOG0006 CLAN: Slot: 2, Card Type: UNKNOWN (47), Signaling Type: A10 (2), Map Type: 1 [0357] 03/10/2022 10:55:28 LOG0006 CLAN: Slot: 1, Card Type: PRI2 2.048MBPS (44), Signaling Type: A10 (2), Map Type: 5 [0358] 03/10/2022 10:55:31 LOG0003 AFS: Failed to send mgcVgwConfigFile Update message - tVGW task is not running. [0359] 03/10/2022 10:55:34 IOD0008 checkNonConfigDevs : unconfigured card @ slot 1 IOD0008 Interrupt: checkNonConfigDevs: unconfigured card in slot 2 generated unexpected CEMUX interrupt. generated cemux interrupt [0360] 03/10/2022 10:55:42 LOG0006 SYS: VGW5000 Card initialized, all alarms cleared. (202) [0361] 03/10/2022 10:55:42 LOG0001 SYS: VGW1036 Call server communication link: 192.168.110.40 down (20) [0362] 03/10/2022 10:55:42 LOG0006 SYS: Waiting for PBX RUDP link to be established, timeout is set to 5 [0363] 03/10/2022 10:55:42 LOG0006 tConfigProcess: AlarmConfigClient Registered with CP successfully [0364] 03/10/2022 10:55:42 LOG0006 tConfigProcess: Server socket closed [0365] 03/10/2022 10:55:42 LOG0006 tConfigProcess: Opened Server socket [0366] 03/10/2022 10:55:47 LOG0003 SYS: Failed to establish PBX RUDP link [0367] 03/10/2022 10:55:47 LOG0006 VGW: DSP DB1 is High Density(128 DSP ports). [0368] 03/10/2022 10:55:49 LOG0006 VGW: vgwTimerInit: setPollingPeriod data is NOT ready yet, force setPollingPeriod to default 30 [0369] 03/10/2022 10:55:49 LOG0006 VGW: VGW5014 Ethernet carrier: eth0, OK (9) [0370] 03/10/2022 10:55:55 LOG0004 tRUDPSS: Forwarding for connect Id = 0x84d1e238, error of type = 6 (connection lost). [0371] 03/10/2022 10:55:55 LOG0003 tRUDPSS: pbxErrorCallBack on link 0, reset link(s) [0372] 03/10/2022 10:56:00 LOG0006 VGW: Successfully enabled MIPS_CALCULATION_INTERVAL command on device 1 [0373] 03/10/2022 10:56:00 LOG0006 VGW: Successfully enabled SPU_LOW_MIPS_ALERT command on device 1 [0374] 03/10/2022 10:56:00 LOG0006 VGW: Successfully enabled ARM_LOW_MIPS_ALERT command on device 1 [0375] 03/10/2022 10:56:00 LOG0006 tGtlRx: ARM_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current ARM free MIPS: 979 [0376] 03/10/2022 10:56:00 LOG0006 tGtlRx: SPU_LOW_MIPS_ALERT tcid 1, low(0)/high(1) threshold: 1, current DSP free MIPS: 1000 [0377] 03/10/2022 11:03:02 SRPT0306 SSD Client socket closed. SRPT0306 SSD Client socket closed. Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0378] 03/10/2022 11:03:02 SRPT0308 [CemuxMaintLinkMgmt]: Connection closed. Return Status[-1] SRPT0308 Connection with IPMG closed. Return Status Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0379] 03/10/2022 11:03:02 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0380] 03/10/2022 11:03:02 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0381] 03/10/2022 11:03:02 SRPT0308 [CemuxIOLinkMgmt]: Connection closed. Return Status[-1]... [0382] 03/10/2022 11:03:02 SRPT0311 Remote TTY: ttyClient: Failure reading socket 36 for Cabinet 1, Return Status[0x36] SRPT0311 Remote TTY: / :Failure reading socket for cabinet Return Status Action: Analyze the failure; this error can be caused by Call Server SYSLOAD/INI. If the problem persists, contact your next-level technical support. [0383] 03/10/2022 11:03:02 SRPT0307 SSD Client re-started. SRPT0307 SSD Client re-started.