TROUBLESHOOTING GUIDE
Ascom Myco 3 Troubleshooting Tools
Ascom VoIP
Action Logs Encryption
1. Check the Event log (Log viewer).
2. If the event logs showed no relevant information,
perform debugging with timed logging during a
certain time, for example, log for 10 min.
1
Make sure to enable Additional SIP trace can be
enabled via Ascom settings > Troubleshooting >
Additional SIP trace. Extract logs and send to the
Ascom R&D for analysis.
NOTE: If there are sound issues, the “Additional SIP
trace” function should be disabled directly after
logging.
3. If the above-mentioned methods have not given the
required results, perform local PCAP logging or
RPCAP.
Event log (Log
viewer)
Not encrypted
Timed logging
with additional SIP
tracing
Encrypted
PCAP
Remote PCAP
Encrypted
2
1. To get the most out of your log data, be sure to add some extra logging time (before and after) to log the problem.
2. Except for PCAP logs from the Network packet logging.
Audio (VoIP calls)
Action Logs Encryption
1. Check the Event log (Log viewer).
Make sure that Wi-Fi event logging has been enabled.
This is done via Ascom settings > Location services >
Wi-Fi location > Wi-Fi location services.
2. Perform debugging with timed logging (Additional Wi-
Fi trace: disabled) during a certain time, for example,
log for 10 min.
1
Extract logs and send to the Ascom
R&D for analysis.
3. If the above-mentioned methods have not given the
required results, perform local PCAP logging or
RPCAP. Alternatively, use any of the external air
traces tools.
Event log (Log
viewer) with
additional Wi-Fi
events
Not encrypted
Timed logging Encrypted
PCAP
Remote PCAP
Encrypted
2
Air traces Encrypted
1. To get the most out of your log data, be sure to add some extra logging time (before and after) to log the problem.
2. Except for PCAP logs from the Network packet logging.
Cellular
Action Logs Encryption
1. Check the Event log (Log viewer).
2. If the Event log has not showed the required details,
perform debugging with timed logging (Additional Wi-
Fi trace: disabled) during a certain time, for example,
log for 10 min.
1
Extract logs and send to the Ascom
R&D for analysis.
Event log (Log
viewer)
Not encrypted
Timed logging Encrypted
1. To get the most out of your log data, be sure to add some extra logging time (before and after) to log the problem.
TD 93297EN / 19 December 2019 / Ver. B 23