Alarms used for troubleshooting devices
You can use the following table to help you troubleshoot devices. They explain the meaning of each alarm, its probable cause and corrective actions.
Devices' alarms
Alarm ID | Alarm name | Explanation | Possible Root Causes | Guidelines |
---|---|---|---|---|
001 | Battery level threshold (state-driven) | The power of the battery is very low. | The battery of the device has a very low power. | Change the battery of the device. |
002 | Traffic exceeds the downlink regulator settings (event-driven) | The device is receiving too many packets. |
|
|
003 | Traffic exceeds the uplink regulator settings (event-driven) | The device exceeds the Administrator policy. | The device may send too many packets. It may quickly discharge the battery. |
|
004 | No uplink activity warning (state-driven) | The device has not sent any packet for the past X hours according to the thresholds you have defined. To learn more, click |
|
|
005 | Node uses higher data rate than expected (state-driven) | The device sends packets whose Spreading Factor is too low (e.g. SF7 instead of SF10) |
|
|
006 | Node uses lower data rate than expected (state-driven) | The device sends packets whose Spreading Factor is too high (e.g. SF10 instead of SF8) |
|
|
007 | Join request replay detected (DevNonce replay) (event-driven) | A DevNonce replay has been detected in a Join request (Last occurrence was for the given DevNonce) |
|
If the device sent a join request containing a DevNonce already used, fix it. The device may be the victim of a join request replay attack. Stop the radio and try to identify the attacker.
|
008 | Wrong MIC detected in Join request (event-driven) | A wrong MIC has been detected in a Join request |
|
Check the device's information and behavior, and fix issues. The device may be the victim of a join request replay attack. Stop the radio and try to identify the attacker.
|
009 | Join request replay detected (wrong MIC correlation) (event-driven) | A wrong MIC correlation has been detected between a Join request and the following uplink packet (Last occurrence was for the given DevNonce) | The device is the victim of a join request replay attack. |
|
010 | Uplink frame replay detected (wrong FCnt) (event-driven) | A wrong FCnt has been detected in an uplink packet (Last occurrence was for the given FCnt) |
|
|
012 | MAC command transmission blocked (transmission rejected) (state-driven) | The transmission of the given MAC command has been blocked after a given attempts and rejected. | The device rejects the MAC command sent by the Network Server. |
|
013 | MAC command transmission blocked (no reply) (state-driven) | The transmission of the given MAC command has been blocked after a given number of attempts because of no reply. |
|
|
014 | Invalid AppEUI detected in Join request (event-driven) For LoRaWAN® 1.0 OTAA devices, only applies if the device supports counter-based DevNonce and has been created using a model activating this behavior. Applies to all LoRaWAN® 1.1 OTAA devices. | An invalid AppEUI issue has been detected in a Join request concerning the used AppEUI (or JoinEUI in LoRaWAN® 1.1). | The device has changed too many times its AppEUI/JoinEUI value (maximum allowed: 32). |
|
015 | Join request replay detected (invalid DevNonce) (event-driven) For LoRaWAN® 1.0 OTAA devices, only applies if the device supports counter-based DevNonce and has been created using a model activating this behavior. Applies to all LoRaWAN® 1.1 OTAA devices. | A DevNonce replay attack has been detected in a Join request concerning the DevNonce used with the AppEUI (or JoinEUI in LoRaWAN® 1.1). | A DevNonce has been reused with the same AppEUI/Join EUI: The device is the victim of a join request replay attack. |
|