Alarm and System Message Overview

Size: px
Start display at page:

Download "Alarm and System Message Overview"

Transcription

1 CHAPTER 1 The Cisco ACNS Alarms and Error Messages Guide lists and describes the error messages for the Application and Content Networking System (ACNS). The system software sends these error messages to the console (and, optionally, to a logging server on another system) during operation. Not all error messages indicate problems with your system. Some messages are purely informational, while others may help diagnose problems with communications lines, internal hardware, or the system software. This chapter contains the following sections: System Message Structure, page 1-1 System Message Example, page 1-5 Searching for System Messages, page 1-5 Alarm Structure, page 1-6 Sample Alarm, page 1-6 System Message Structure System error messages are structured as follows: FACILITY-SEVERITY-MNEMONIC: Message-text FACILITY code The facility code consists of two or more uppercase letters that indicate the facility to which the message refers. A facility can be a hardware device, a protocol, or a module of the system software. In the ACNS context, the facility code is CE and refers to Content Engine. ACNS error messages also indicate where the system condition occurred. These messages are structured as follows: FACILITY-SOURCE-SEVERITY-MNEMONIC: Message-text Source indicates the location of the condition. Examples of source are ACQ, which indicates that the condition occurred in the Acquisition component, or SYSMON, which indicates that the condition occurred in the System Monitor component. Table 1-1 lists the source codes in ACNS. 1-1

2 System Message Structure Chapter 1 Table 1-1 List of Source Codes in ACNS Code ACL ACQ AUTH AUTHCACHE AUTHMOD AUTOREG BANDWD BMRNG BUFMGR BYPS CACHE CDNFS CIFSSVR CLEAN CLI CMS COMMONEDM CR CSE DDBG DHCP DISK DIST DNS DS FFS FTP FTP_EXPORT FTP_PROXY HTTP ICAP ICP INETD IPTVPM LIBCMN Component Description Access control list Acquisition Authentication Authentication cache Authentication mode Auto Registration Bandwidth Boomerang module Buffer Manager Bypass Cache Content Delivery Network file system Common Internet File System Server Cleanup CLI commands Content Management Service Common EDM Content routing Cisco streaming engine Debug Dynamic Host Configuration Protocol Disk Distribution Domain name server Data server Firewall feature set File Transfer Protocol File Transfer Protocol Export File Transfer Protocol Proxy Hypertext Transfer Protocol Interactive Communicating Application Protocol daemon Internet Cache Protocol Internet daemon IP/TV Program Manager Common library 1-2

3 Chapter 1 System Message Structure Table 1-1 List of Source Codes in ACNS (continued) Code LOGGING LSR MINGETTY MODUTILS NAS NODEMGR NTP PAM PARSER PFS PM POSTGRE PRELD RBCP REALPXY REALSRV RPC RSH RSM RTSP RTSPG RULES SCHED SMARTD SNMP SSHD SSRV STATS STDBY STREAMCACHE SYS SYSMON SYSUTL SYSVINIT TELNET TFTP Component Description Logging Label switch routing Minimal getty Module utilities Network attached storage Node manager Network Time Protocol Port to application mapping Parser PAC file server Preferences module Postgres server Preload Router Blade Configuration Protocol RealProxy RealSubscriber Remote proxy caching Remote Shell Protocol RealServer Manager Real-Time Streaming Protocol Real-Time Streaming Protocol Gateway URL filtering rules Scheduler SMARTD Simple Network Management Protocol Secure Shell Streaming server Statistics Provider application Standby Stream cache Kernel System Monitor System utility System V initialization Telnet Trivial File Transfer Protocol 1-3

4 System Message Structure Chapter 1 Table 1-1 List of Source Codes in ACNS (continued) Code TRNSLG TVOUT UNILOG UPG URLFLT UTILLIN VCRON WCCP WEBSENSESERVER WI WMT Component Description Translog TV Out Unilog Upgrade URL filter Linux utilities Vixie cron Web Cache Communication Protocol Websense server WebServer Windows Media Technologies Severity Level The severity level is a single-digit code from 0 to 7 that reflects the severity of the condition. The lower the number, the more serious the situation. Table 1-2 lists the message severity levels. Table 1-2 Message Severity Level Severity Level Description 0 - emergency System is unusable 1 - alert Immediate action is required 2 - critical Critical condition 3 - error Error condition 4 - warning Warning condition 5 - notification Normal but significant condition 6 - informational Informational message only 7 - debugging Message that appears during debugging only Mnemonic code The mnemonic code uniquely identifies the error message. Message-text Message-text is a text string that describes the condition. The text string sometimes contains detailed information about the event, including terminal port numbers, network addresses, or addresses that correspond to locations in the system memory address space. Because variable fields change from message to message, they are represented here by short strings enclosed in square brackets ([ ]). The variables give you more information about the system condition. A decimal number, for example, is represented as [dec]. Table 1-3 lists a sample of the variable fields that you will find in this publication. 1-4

5 Chapter 1 System Message Example Table 1-3 Representation of Variable Fields in Messages Representation [chars] or [char] [dec] [failure description] [x] or [y] [error] [module] [procedure] [additional information] [cli] [err] Type of Information Character string Decimal Explains the type and nature of system failure Characters Error code Name of the module Name of the procedure Additional information about the error message Command entered at the command line interface Error description System Message Example The following is an example of a system error message: CE-ACQ : Failed to read Channel=[chars], Channel table may have been dropped accidentally. Restarting acquirer to wait for its creation. CE is the facility code. ACQ is the source code. 2 is the severity level is the mnemonic code. Failed to read Channel=[chars], Channel table may have been dropped accidentally. Restarting acquirer to wait for its creation is the message text. Searching for System Messages If you search for the explanation and recommended action of a message that contains a SOURCE, remove the SOURCE from the text first, and then search for the message in the documentation. For example, instead of searching the documentation for the message CE-ACQ , remove the source identifier and search for the message CE When searching for a message in the Error Message Decoder (EMD) also, you must remove the source identifier. The EMD is located here: 1-5

6 Alarm Structure Chapter 1 Alarm Structure Cisco ACNS alarms are structured as follows: MESSAGE_TYPE-SEVERITY-SOURCE-MNEMONIC: Alarm-text MESSAGE_TYPE A three letter code indicating the message is an alarm. SEVERITY An alarm can have the severity levels critical, major, or minor. A critical alarm indicates that a critical problem exists somewhere in the network. Critical alarms cause failover. Critical alarms should be cleared immediately. A major alarm indicates that a serious problem exists that is disrupting service. Major alarms differ from critical alarms in that they do not cause failovers. Major alarms should also be cleared immediately. Minor alarms should be noted and cleared as soon as possible. SOURCE The component from where the alarm originated. MNEMONIC A unique code for identifying the alarm. ALARM TEXT A brief description of the alarm. Sample Alarm Given here is an example of an alarm: /alm/min/acquirer/zerobandwidth: specified content acquisition bandwidth is 0 alm is the message type. min is the severity level. acquirer is the source code. zerobandwidth is the mnemonic. specified content acquisition bandwidth is 0 is the alarm text. 1-6

Cisco VDS Service Broker 1.2 Alarms and Error Messages Guide

Cisco VDS Service Broker 1.2 Alarms and Error Messages Guide Cisco VDS Service Broker 1.2 Alarms and Error Messages Guide July 2013 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed

More information

Symbols. Numerics INDEX

Symbols. Numerics INDEX INDEX Symbols * (wildcard) character 8-48.asx files 6-3.nsc files 7-23.pac files 4-39 tag A-3, A-37 tag A-63 tag A-39 tag A-4, A-54 tag A-40

More information

Symbols INDEX. * wildcard character 7.gz extension 44.nsc file 39.pac files 37

Symbols INDEX. * wildcard character 7.gz extension 44.nsc file 39.pac files 37 INDEX Symbols * wildcard character 7.gz extension 44.nsc file 39.pac files 37 A AAA accounting activating on Content Engine 5 command accounting 2 displaying configuration of 8 EXEC shell accounting 2

More information

Introduction to System Messages for the Cisco MDS 9000 Family

Introduction to System Messages for the Cisco MDS 9000 Family CHAPTER 1 Introduction to System Messages f the Cisco MDS 9000 Family This chapter describes system messages, as defined by the syslog protocol (RFC 3164). It describes how to understand the syslog message

More information

Servicing ACNS Devices and Origin Servers

Servicing ACNS Devices and Origin Servers CHAPTER 13 This chapter explains how you can minimize the impact upon content delivery services when you perform maintenance on your ACNS network devices, such as replacing failed hardware or adding or

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Symbols INDEX. / (slash) 2-63? (question mark) 2-184

Symbols INDEX. / (slash) 2-63? (question mark) 2-184 INDEX Symbols! (exclamation point) 2-720, 2-730 - (hyphen) 2-185, 2-730, 2-774... (ellipsis) 2-730.bin files installing 2-186.nsc file 2-660.pax files installing 2-186 / (slash) 2-63? (question mark) 2-184

More information

Symbols INDEX > 12-14

Symbols INDEX > 12-14 INDEX Symbols > 12-14 A AAA accounting configuring 6-32 AAA-based management systems 2-25, 6-2 acceleration about 1-6, 12-1 features 1-6 TCP settings 12-17 accounts creating 7-3 creation process 7-2 deleting

More information

Creating and Managing Programs

Creating and Managing Programs CHAPTER 7 This chapter explains how to create and manage live, rebroadcast, TV-out, and export programs (for export to set top boxes). It contains the following sections: About Programs, page 7-1 Viewing

More information

System Message Format

System Message Format CHAPTER 1 This chapter describes the Cisco IOS system message structure and error message traceback report. This chapter contains the following sections: Message Structure, page 1-1 Error Message Traceback

More information

Viewing Log Files. Understanding GSS Logging Levels CHAPTER

Viewing Log Files. Understanding GSS Logging Levels CHAPTER CHAPTER 8 This chapter describes how to store and view logged information about your GSS devices. Each GSS device contains a number of log files that retain records of specified GSS-related activities

More information

Configuring WMT Streaming Media Services on Standalone Content Engines

Configuring WMT Streaming Media Services on Standalone Content Engines CHAPTER 9 Configuring WMT Streaming Media Services on Standalone Content Engines This chapter provides an overview of the Windows Media Technologies (WMT) streaming and caching services, and describes

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 642-618 Title : Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) Vendors : Cisco

More information

Configuring Content Authentication and Authorization on Standalone Content Engines

Configuring Content Authentication and Authorization on Standalone Content Engines CHAPTER 10 Configuring Content Authentication and Authorization on Standalone Content Engines This chapter describes how to configure content authentication and authorization on standalone Content Engines

More information

CONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1

CONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1 CONTENTS Preface xvii Document Revision History xvii Audience xvii Objective xviii Document Organization xviii Document Conventions xix Related Publications xx Obtaining Documentation and Submitting a

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 2 This chapter covers the tasks required for maintaining a Content Engine. Upgrading the System Software, page 2-1 Recovering the System Software, page 2-2 Maintaining the Hard Disk Storage, page

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

External Alerting with Alert Responses

External Alerting with Alert Responses The following topics describe how to send external event alerts from the Firepower Management Center using alert responses: Firepower Management Center Alert Responses, page 1 Creating an SNMP Alert Response,

More information

System Message Overview

System Message Overview 1 CHAPTER This guide describes the Catalyst 3750-X, 3750-E, 3560-X, or 3560-E-specific system messages. The system software sends these messages to the console (and, optionally, to a logging server on

More information

Chapter 4. Network Security. Part II

Chapter 4. Network Security. Part II Chapter 4 Network Security Part II CCNA4-1 Chapter 4-2 Introducing Network Security Securing Cisco Routers CCNA4-2 Chapter 4-2 Router Security Issues The Role of Routers in Network Security: Router security

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi)

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) Revised: November, 2013 Contents Overview, page 1 Guidelines and Limitations, page 1 Prerequisites, page 2 Installation

More information

Monitoring the Internet Streamer CDS

Monitoring the Internet Streamer CDS CHAPTER 7 The CDSM provides tools that can be used for system monitoring and system diagnostics. The topics covered in this chapter include: System Monitoring, page 7-1 Device Monitoring, page 7-8 Reports,

More information

Configuring Streaming Media Services

Configuring Streaming Media Services CHAPTER 9 Streaming media services enable the delivery of digital media directly to the end user from a point of origin, such as an origin server, encoder, or Content Engine cache. Streaming media can

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 7 This chapter describes the tasks required for maintaining the Content Router software: Upgrading the System Software, page 7-1 Recovering the Content Router System Software, page 7-4 Maintaining

More information

Using the Transaction Logs

Using the Transaction Logs CHAPTER 19 This chapter explains how to use the transaction logs and contains the following sections: Understanding Transaction Log Formats, page 19-1 Transaction Logging and NTLM Authentication, page

More information

I N D E X. Numerics. 3DES (triple Data Encryption Standard), 199

I N D E X. Numerics. 3DES (triple Data Encryption Standard), 199 I N D E X Numerics A 3DES (triple Data Encryption Standard), 199 AAA (Authentication, Authorization, and Accounting), 111 114, 236 configuring, 114, 144 145 CSACS, 116 122 floodguard, 168 169 servers,

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Configuring Caching Services

Configuring Caching Services CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.

More information

KillTest. 半年免费更新服务

KillTest.   半年免费更新服务 KillTest 质量更高 服务更好 学习资料 http://www.killtest.cn 半年免费更新服务 Exam : 642-618 Title : Deploying Cisco ASA Firewall Solutions (FIREWALL v2.0) Version : DEMO 1 / 9 1.On the Cisco ASA, tcp-map can be applied to

More information

Configuring System Message Logging

Configuring System Message Logging 58 CHAPTER This chapter describes how to configure system message logging on the Catalyst 4500 series switch. This chapter consists of these sections: About System Message Logging, page 58-1, page 58-2

More information

Configuring Port to Application Mapping

Configuring Port to Application Mapping Configuring Port to Application Mapping Last Updated: January 19, 2012 This chapter describes the Cisco IOS Firewall Port to Application Mapping (PAM) feature. PAM enables CBAC-supported applications to

More information

Table of Contents 1 Information Center 1-1

Table of Contents 1 Information Center 1-1 Table of Contents 1 Information Center 1-1 Information Center Overview 1-1 Introduction to Information Center 1-1 System Information Format 1-4 Information Center Configuration 1-6 Introduction to the

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 3 This chapter describes how to configure system message logging on Cisco DCNM-SAN. It includes the following sections: Information About System Message Logging, page 3-1 Guidelines and Limitations,

More information

GLOSSARY. A syslog or SNMP message notifying an operator or administrator of a network problem.

GLOSSARY. A syslog or SNMP message notifying an operator or administrator of a network problem. GLOSSARY A active logs agent alert API audit logs These database log files contain data that has not yet written into the database. It is important to keep active log files until they become redundant.

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 31 This chapter describes how to configure system message logging on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Configuring System Message Logging

Configuring System Message Logging This chapter contains the following sections: Information About System Message Logging, page 1 Licensing Requirements for System Message Logging, page 2 Guidelines and Limitations for System Message Logging,

More information

WV-SMR10. Operating Instructions. Network Microphone. Model No.

WV-SMR10. Operating Instructions. Network Microphone. Model No. Operating Instructions Network Microphone Model No. WV-SMR10 Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. Preface

More information

Table A-1 defines the acronyms and abbreviations that are used in this publication.

Table A-1 defines the acronyms and abbreviations that are used in this publication. APPENDIXA defines the acronyms and abbreviations that are used in this publication. AAA ACL ACPI API ARP AS AUP BA BGP BIOS CAR CD CDNFS CDS CDSM CIFS CLF CLI CLNS CMS CoS CSNP CSS CTE DC List of authentication,

More information

User and System Administration

User and System Administration CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 3 This chapter describes how to configure system message logging on Cisco MDS 9000 Family switches. It includes the following sections: About System Message Logging, page 3-1 System Message Logging

More information

User Manual. For H.264 Cameras. Version 2.0.0

User Manual. For H.264 Cameras. Version 2.0.0 User Manual For H.264 Cameras Version 2.0.0 Catalogue Basic Operation... 3 Camera Settings... 3 System... 3 Device Name... 4 Time... 4 User... 4 Network... 5 IP... 5 Port... 5 WiFi... 6 UPnP... 6 DDNS...

More information

Configuring the Management Access List

Configuring the Management Access List The following topics explain how to configure the various system settings that are grouped together on the page. The settings cover overall system function. Configuring the Management Access List, page

More information

Using Alarms and Logs on Cisco Unified MeetingPlace

Using Alarms and Logs on Cisco Unified MeetingPlace Using Alarms and Logs on Cisco Unified MeetingPlace Release 7.1 Revised: April 6, 2011 12:14 pm About Alarms, page 1 How to View the Alarm Table and Clear Alarms, page 5 Configuring the System to Call

More information

Configuring General Settings for the EN-4000

Configuring General Settings for the EN-4000 EN-4000 Reference Manual Document 4 Configuring General Settings for the EN-4000 T he EN-4000 is the newest member of Encore Networks family of routers. It provides wireless and cabled connections to a

More information

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3

Table of Contents 1 V3 & V4 Appliance Quick Start V4 Appliance Reference...3 Table of Contents 1 V & V4 Appliance Quick Start...1 1.1 Quick Start...1 1.2 Accessing Appliance Menus...1 1. Updating Appliance...1 1.4 Webmin...1 1.5 Setting Hostname IP Address...2 1.6 Starting and

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 42 This chapter describes how to configure web-based authentication. It consists of these sections: About Web-Based Authentication, page 42-1, page 42-5 Displaying Web-Based Authentication Status,

More information

Monitoring the Enterprise CDS

Monitoring the Enterprise CDS CHAPTER 10 The following sections describe how to use CDSM tools for system monitoring and system diagnostics: System Monitoring, page 10-1 Device Monitoring, page 10-9 Viewing Reports, page 10-22 Delivery

More information

QUICK START GUIDE. STEP X - Name of Step LES1708A, LES1716A, LES1732A, LES1748A CONSOLE SERVERS

QUICK START GUIDE. STEP X - Name of Step LES1708A, LES1716A, LES1732A, LES1748A CONSOLE SERVERS STEP X - Name of Step QUICK START GUIDE LES1708A, LES1716A, LES1732A, LES1748A CONSOLE SERVERS 24/7 TECHNICAL SUPPORT AT 877.877.2269 OR VISIT BLACKBOX.COM STEP 1 - Check Kit Contents PACKAGE INCLUDES

More information

Cisco.Actualtests v New Questions.by.Nev.32q.vce

Cisco.Actualtests v New Questions.by.Nev.32q.vce Cisco.Actualtests.200-120.v2014-01-10.New Questions.by.Nev.32q.vce Number: 200-120 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 1 Which three are

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Configuring the Cisco IOS Auto-Upgrade Manager

Configuring the Cisco IOS Auto-Upgrade Manager Configuring the Cisco IOS Auto-Upgrade Manager The Cisco IOS Auto-Upgrade Manager (AUM) feature simplifies the software image upgrade process by providing a simple interface to specify, download, and upgrade

More information

Configuring the Rules Template on Standalone Content Engines

Configuring the Rules Template on Standalone Content Engines CHAPTER 13 Configuring the Rules Template on Standalone Content Engines This chapter describes how to configure the Rules Template on standalone Content Engines. The Rules Template specifies the rules

More information

Troubleshooting Tools. Tools for Gathering Information

Troubleshooting Tools. Tools for Gathering Information Internetwork Expert s CCNP Bootcamp Troubleshooting Tools http:// Tools for Gathering Information Before implementing a fix, information must be gathered about a problem to eliminate as many variables

More information

About the Configuration Guides for HP Unified

About the Configuration Guides for HP Unified About the Configuration Guides for HP Unified Wired-W Products HP 830 Unified Wired-W PoE+ Switch Series HP 850 Unified Wired-W Appliance HP 870 Unified Wired-W Appliance HP 11900/10500/7500 20G Unified

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Monitoring WAAS Using WAAS Central Manager. Monitoring WAAS Network Health. Using the WAAS Dashboard CHAPTER

Monitoring WAAS Using WAAS Central Manager. Monitoring WAAS Network Health. Using the WAAS Dashboard CHAPTER CHAPTER 1 This chapter describes how to use WAAS Central Manager to monitor network health, device health, and traffic interception of the WAAS environment. This chapter contains the following sections:

More information

Deployment Scenarios for Standalone Content Engines

Deployment Scenarios for Standalone Content Engines CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This

More information

NAM 6.3(2) Image Contents Upgrading to NAM 6.3(2) Verifying NAM 6.3(2) Image Installation Known Issues in Release 6.3(2)...

NAM 6.3(2) Image Contents Upgrading to NAM 6.3(2) Verifying NAM 6.3(2) Image Installation Known Issues in Release 6.3(2)... This document supports the release of the Cisco Prime Network Analysis Module (NAM) 6.3(2) image. This is a full image that can be used for initial or recovery installation, as well as for upgrading an

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 14 This chapter describes how to configure system message logging on the Cisco MDS 9020 Fabric Switch. It includes the following sections: About System Message Logging, page 14-1 System Message

More information

Configuring and Managing the IP Camera

Configuring and Managing the IP Camera CHAPTER 3 The Cisco Video Surveillance IP Camera provides configuration windows that you use to configure and manage the IP camera. This chapter explains how to access the configuration windows, describes

More information

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting. This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System

More information

AP-51XX v r Release Notes Part Number 72E

AP-51XX v r Release Notes Part Number 72E AP-51XX v2.3.0.0-019r Release Notes Part Number 72E-126383-01 Introduction New Features AP-51XX Hardware/ Software Compatibility Matrix AP-51XX Default Configurations Firmware Update Resetting the AP-51XX

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com IT Certification Guaranteed, The Easy Way! Exam : 642-655 Title : WAASFE-Wide Area Application Services for Field Engineers

More information

This chapter explains how to troubleshoot common problems and covers the following sections:

This chapter explains how to troubleshoot common problems and covers the following sections: This chapter explains how to troubleshoot common problems and covers the following sections: Using Debug Commands, page 1 Common Problems, page 4 Using Debug Commands AppNav-XE Debug Commands Clearing

More information

Configuring Transparent Redirection for Standalone Content Engines

Configuring Transparent Redirection for Standalone Content Engines CHAPTER 6 Configuring Transparent Redirection for Standalone Content Engines This chapter discusses the following methods for transparently redirecting content requests to standalone Content Engines: Web

More information

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft Light Mesh AP User s Guide 2009/2/20 v1.0 draft i FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 250-530 Title : Administration of Symantec Network Access Control 12.1 Vendors : Symantec

More information

Monitoring the Internet Streamer CDS

Monitoring the Internet Streamer CDS CHAPTER 7 The CDSM provides tools that can be used for system monitoring and system diagnostics. The topics covered in this chapter include: System Monitoring, page 7-1 Device Monitoring, page 7-11 Reports,

More information

Release Date March Release Notes: Appliance Controller 2.0.x 2. New Features for Release 2.0.x 4

Release Date March Release Notes: Appliance Controller 2.0.x 2. New Features for Release 2.0.x 4 Appliance Controller Release Notes Release 2.0.1 Supported Product Appliance Controller Date March 2018 Contents Release Notes: Appliance Controller 2.0.x 2 New Features for Release 2.0.x 4 5 2018 Quantum

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Getting Started with the VG248

Getting Started with the VG248 CHAPTER 2 Before you can configure the telephony features on the VG248 to interact with the analog phones, you must first configure the basic network, SNMP, and password settings. These settings enable

More information

Exam Name: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT v2.0)

Exam Name: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT v2.0) Vendor: Cisco Exam Code: 300-135 Exam Name: Troubleshooting and Maintaining Cisco IP Networks (TSHOOT v2.0) Version: DEMO QUESTION 1 The following commands are issued on a Cisco Router: Router(configuration)#access-list

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Granular Protocol Inspection

Granular Protocol Inspection The feature adds flexibility to the Cisco IOS Firewall by allowing it to perform a higher degree of inspection of TCP and User Data Protocol (UDP) traffic for most RFC 1700 application types. Finding Feature

More information

Customer Network to Cisco WebEx Cloud IP Ranges for Firewall Settings

Customer Network to Cisco WebEx Cloud IP Ranges for Firewall Settings Cisco_Unified_MeetingPlace,_Release_7.1 Network_Requirements Main page: Cisco Unified MeetingPlace, Release 7.1 Previous page: System Requirements Contents 1 Customer Network to Cisco WebEx Cloud IP Ranges

More information

Configuring Transparent and Proxy Media Redirection Using ACNS Software 4.x

Configuring Transparent and Proxy Media Redirection Using ACNS Software 4.x Configuring Transparent and Proxy Media Redirection Using ACNS Software 4.x Document ID: 4717 Contents Introduction Before You Begin Conventions Prerequisites Requirements Components Used Configure Network

More information

Post-Change Tasks and Verification

Post-Change Tasks and Verification Post-Change Task List for Cisco Unified Communications Manager Nodes, page 1 Post-Change Task List for IM and Presence Service Nodes, page 3 Perform Post-Change Tasks for Cisco Unified Communications Manager

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0)

Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0) Cisco 642-617 Deploying Cisco ASA Firewall Solutions (FIREWALL v1.0) Version: 4.8 QUESTION NO: 1 Which Cisco ASA feature enables the ASA to do these two things? 1) Act as a proxy for the server and generate

More information

Configuring Your Mail Server, Time Zone, and Locale

Configuring Your Mail Server, Time Zone, and Locale Configuring Your Mail Server, Time Zone, and Locale Configuring an Email (SMTP) Server, page 1 Setting the Time Zone, Language, and Locale, page 7 Creating Administrator Accounts, page 7 About System Testing,

More information

Configuring System Message Logging

Configuring System Message Logging This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter contains the following sections: About System Message Logging, page 1 Licensing Requirements for System

More information

Cisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2

Cisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2 Cisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2 The Cisco Network Analysis Module (NAM) is an integrated module that enables network managers

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

Cisco Unified IP Phone Settings

Cisco Unified IP Phone Settings Phone Settings Overview, page 1 Cisco Unified IP Phones 7906G and 7911G Menus, page 1 Phone Setup s, page 4 Network Configuration Menu, page 5 Device Configuration Menu, page 17 Security Configuration

More information

Managing the Mobility Express Network

Managing the Mobility Express Network Under the Management tab on the navigation pane, an admin users can do the following: 1 Configure access to the Mobility Express controller 2 Manage Admin Accounts 3 Configure Time 4 Perform a Software

More information

Release Date August Release Notes: Appliance Controller x 2. New Features for Controller x 4

Release Date August Release Notes: Appliance Controller x 2. New Features for Controller x 4 Appliance Controller Release Notes Release 2.0.1.2 Supported Product Appliance Controller Date August 2018 Contents Release Notes: Appliance Controller 2.0.1.x 2 New Features for Controller 2.0.1.x 4 6

More information

Table Of Contents. 1. Introduction... 1

Table Of Contents. 1. Introduction... 1 User Manual Table of Content Table Of Contents 1. Introduction... 1 1.1 Brief Introduction to Web Interfaces... 1 1.2 How to Log In... 1 1.3 General Setting... 2 1.3.1 Date and Time Setting... 2 1.3.2

More information

Troubleshooting. General Troubleshooting Information

Troubleshooting. General Troubleshooting Information General Information, page 1 Startup s, page 3 Phone Reset s, page 7 Phone Cannot Connect to LAN, page 9 Cisco IP Phone Security s, page 9 Video Call s, page 11 General Telephone Call s, page 12 Procedures,

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

MsActivator (VSOC 8.2) Administration Guide

MsActivator (VSOC 8.2) Administration Guide MsActivator (VSOC 8.2) Administration Guide 18-20 rue Henri Barbusse B.P. 2501 38035 GRENOBLE cedex 2 FRANCE Phone : +33 (0) 438 498 360 Fax : +33 (0) 438 498 361 support@ubiqube.com Copyright 2009 UBIqube

More information

Configuring Administrative Operations

Configuring Administrative Operations Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Configuring Backup Operations, page 1 Restoring a Backup Configuration, page

More information

Configuring System Message Logging

Configuring System Message Logging This chapter contains the following sections: Information About System Message Logging, page 1 System Message Logging Facilities, page 2 Guidelines and Limitations for System Message Logging, page 6 Default

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 61 This chapter describes how to configure web-based authentication. Cisco IOS Release 12.2(33)SXH and later releases support web-based authentication. Note For complete syntax and usage information

More information

Troubleshooting APPENDIX

Troubleshooting APPENDIX APPENDIX A This appendix addresses some common issues you might encounter while using the NAM Traffic Analyzer. Username and Password Issues, page A-2 Login Issues, page A-3 Packet Capturing and Spanning

More information

Platform Settings for Firepower Threat Defense

Platform Settings for Firepower Threat Defense Platform settings for devices configure a range of unrelated features whose values you might want to share among several devices. Even if you want different settings per device, you must create a shared

More information