This chapter contains all the CLI commands available on the SCE platform. Each command description is broken down into the following sub-sections:

Size: px
Start display at page:

Download "This chapter contains all the CLI commands available on the SCE platform. Each command description is broken down into the following sub-sections:"

Transcription

1 CHAPTER 2 This chapter contains all the CLI commands available on the SCE platform. Each command description is broken down into the following sub-sections: Command syntax Description Default Authorization Mode Parameters Usage guidelines The general format of the command. Description of what the command does. If relevant, the default setting for the command. The level of user authorization required for using the command. The mode (command line) from which the command can be invoked. Description of parameters and switches for the command. Information about when to invoke the command and additional details Syntax and Conventions The CLI commands are written in the following format: command required-parameter [optional-parameter] [no] is an optional parameter that may appear before the command name. When typing commands, you may enclose parameters in double-quote marks, and you must do so when there is a space within a parameter name. 2-1

2 debug aaa Chapter 2 debug aaa Displays debug information regarding Authentication, Authorization and Accounting functions. debug aaa show accounting methods debug aaa show counters debug aaa show enable methods debug aaa show login This command has no arguments or keywords. Displays the following debug information regarding Authentication, Authorization and Accounting functions: accounting methods list aaa counters enable methods list login methods list 2-2

3 Chapter 2 debug app debug app Extracts the xml section from the application file (SLI) to a specified file. debug app application-filename extract-to-file out-filename debug app-loader directory-name application-filename out-filename Name of the application file Name of the output xml file 2-3

4 debug app-loader Chapter 2 debug app-loader Recursively loads all the files in the specified directory. This can be useful in order to verify the load of certain applications in an automated manner on the SCE itself. debug boot-params-to-defaults directory-name The name of the directory from which to load the application files 2-4

5 Chapter 2 debug boot-params-to-defaults debug boot-params-to-defaults Resets the boot parameters to their default values. debug boot-params-to-defaults This command has no arguments or keywords. Changes the boot parameters to their default values, performing the following operations: Loads the default image from the SCE disk Verifies that the system is not in recovery mode Enables the management port This command can be useful in many cases, such as: Taking the system out of recovery mode Verifying that a non-standard configuration exists for running a regression 2-5

6 debug cli Chapter 2 debug cli Manipulates dynamic CLI commands. debug cli add level level# tableid tableid# numtokens num-of-tokens token1 [token2 [token3... [token6]]] debug cli remove handle handle# debug cli text sessionid session# (more no-more) outtext text-string level# Authorization level ID (0, 5, 10, or 15) tableid# ID number of the specified table num-of-tokens Number of tokens (maximum of 6) token1, token2, Up to six tokens token3,... token6 handle# Command handle number session# Session ID number text-string Text to be supplied to command This command can be used to perform the following actions on dynamic CLI commands: Add a dynamic CLI command Remove a dynamic CLI command Supply text for an invoked dynamic CLI command Note the following: add : text : : Make sure that the value specified for numtokens matches the actual number of tokens that are defined in the command. A maximum of six tokens can be defined in a single command. Use the more keyword to instruct the system to wait for more text. Use the no-more keyword to instruct the system not to wait for more text. 2-6

7 Chapter 2 debug cpa-client debug cpa-client Provides debug information related to the SurfControl URL filtering feature. debug cpa-client check-setup debug cpa-client get-category host-name host-name The name of the URL in the CPA server There are two options: check-setup Checks various SCE configuration parameters (for example, that URL filtering RDRs are sent to the mgmt-agent) to make sure that the system is properly configured for URL filtering. get-category Looks up the category ID of a URL in the CPA server. This is useful when troubleshooting connectivity problems between the SCE and the CPA server. 2-7

8 debug db Chapter 2 debug db The db is a database that holds a large number of configuration variables that affect the SCE operation. debug db get variable-name index-number debug db set variable-name index-number new-value debug db how-many debug db name-by-index variable-index debug db show variable-name debug db show-all variable-name index-number new-value variable-index Name of the variable Specifies which member of the variable array to set or get Value to which to set the specified member of the variable ID number of the variable The following debug commands allow you to view the values of variables in the db and in certain cases to change them. get Displays the value of a specified DB variable set Sets the value of a specified DB variable how-many Displays the total number of currently defined DB variables name-by-index Displays the name of a DB variable specified by ID number show Displays information about a DB variable specified by name show-all Displays all existing DB variables 2-8

9 Chapter 2 debug dbg interpret debug dbg interpret The debug log in the SCE is maintained in binary format and should be interpreted on demand. There are a number of flavors for the interpretation process as described below. debug dbg interpret [input-file in-filename last-failure] output-file out-filename [no-dumps] debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level cpu-list (all cpu1#,cpu2#, ) message-list message1#,message2#,message3# debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level cpu-list (all cpu1#,cpu2#, ) module-list module1#,module2#,module3# debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level cpu-list (all cpu1#,cpu2#, ) no-dumps debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level segment start-string start-marker end-string end-marker debug dbg interpret non-volatile-hitogram in-filename Name of the input debug file out-filename Name of the output text file error-level Fatality level for interpretation (Error, Fatal, Info, or Warning) cpu1#,cpu2#, List of cpu numbers separated by commas (e.g. 0,2,3 ) message1#,message2#, message3# module1#,module2#,m odule3# start-marker end-marker List of module names and message number separated by commas (e.g. logger::5,formatter::7,rdb_gen::11) List of module names separated by commas (e.g. logger,formatter,rdb_gen) The segment Start-Marker (exact message string) The segment End-Marker (exact message string) Available modifiers: output-file The name of the output file after interpretation (it is recommended to use the.txt suffix) input-file The name of an external binary file to be interpreted on the SCE platform instead of the original dbglog that resides on the SCE 2-9

10 debug dbg interpret Chapter 2 last-failure Interprets the dbglog, which is a file copied by the SCE each time there is a failure non-volatile-hitogram Shows the histogram of all message types that were written to the log since the last time the counters were reset (not since the system was reset) 2-10

11 Chapter 2 debug dbg module debug dbg module Allows the user to control the tracing level of the various debug modules that are capable of writing debug messages to the log. debug dbg module module-id fatality-level error-level debug dbg module module-id message message# rate-control (on off) debug dbg module module-id message message# set-period num-of-messages debug dbg module module-id message message# set-status (on off) debug dbg module module-id message message# show-fatality debug dbg module module-id message message# show-period debug dbg module module-id message message# show-string debug dbg module module-id show-messages error-level module-id message# Fatality level for interpretation (Error, Fatal, Info, Warning) Module ID, in a format starting with '0x' Number of the message Use this command to set the following options for the specified module: fatality-level Set fatality level of the module message Manage debug messages rate-control Change rate control mode for this message set-period Set the message period set-status Set the message status to all processors show-fatality Show the message fatality show-period Show the message period show-string Show the message string show-messages Show the module messages information 2-11

12 debug dbg output-format Chapter 2 debug dbg output-format Allow the user to determine whether some of the fields that are generated during log interpretation should be suppressed. debug dbg output-format date (off on) time (off on) cpu (off on) sequence (off on) This command has no arguments or keywords. The following options are available: date time cpu sequence 2-12

13 Chapter 2 debug dbg ruc-debugging debug dbg ruc-debugging Enables RuC logging. debug dbg ruc-debugging (enable disable show) This command has no arguments or keywords. Since there is an additional performance cost for dbg messages in the data plane (the Traffic Processor or the RuC), you must enable RuC logging in order to debug the RuC. Therefore, in order to optimize performance, there is a global enabler for all RuC logging. The following options are available: disable Disable RUC Info messages (including vertical debugging) enable Enable RUC Info messages (including vertical debugging) show Display the status of RUC Info messages 2-13

14 debug dbg show-modules Chapter 2 debug dbg show-modules Displays all the supported dbg modules in order to determine the exact syntax of the modules before using the debug dbg module command. debug dbg show-modules This command has no arguments or keywords. 2-14

15 Chapter 2 debug dbg slot debug dbg slot Allows the dbg commands to be localized to a certain slot or traffic processor. The functionality of the modifiers is similar to the other debug dbg commands. debug dbg slot slot# module module-name fatality-level error-level debug dbg slot slot# module module-name message message# rate-control (on off) debug dbg slot slot# module module-name message message# set-period num-of-messages debug dbg slot slot# module module-name message message# set-status (on off) debug dbg slot slot# ppc ppc# module module-name fatality-level error-level debug dbg slot slot# ppc ppc# module module-name message message# rate-control (on off) debug dbg slot slot# ppc ppc# module module-name message message# set-period num-of-messages debug dbg slot slot# ppc ppc# module module-name message message# set-status (on off) debug dbg slot slot# ppc ppc# module module-name message message# show-rate-control debug dbg slot slot# ppc ppc# module module-name message message# show-status debug dbg slot slot# ppc ppc# ruc-debugging (enable disable show) error-level Fatality level for interpretation (Error, Fatal, Info, Warning) module-name Module name message# Number of the message num-of-messages Number of messages after which a message will be issued slot# The number of the identified slot. Enter a value of 0. ppc# The number of the PPC on the specified slot The following options are available: module fatality-level Set fatality level of the module message Manage debug messages rate-control Change rate control mode for this message set-period Set the message period 2-15

16 debug dbg slot Chapter 2 set-status Set the message status to all processors ppc module fatality-level Set fatality level of the module message Manage debug messages rate-control Change rate control mode for this message set-period Set the message period set-status Set the message status to all processors show-rate-control Show the rate control mode for this message show-status Show the message status for all processors ruc-debugging disable Disable RUC Info messages (including vertical debugging) enable Enable RUC Info messages (including vertical debugging) show Display the status of RUC Info messages 2-16

17 Chapter 2 debug engage debug engage Debugs the SCA BB application. debug engage run-after-apply-handler This command has no arguments or keywords. Note This command is relevant only when the SCA BB application is installed on the SCE platform. 2-17

18 debug ffs Chapter 2 debug ffs Debugs the flash file system. Shows the number of available file descriptors. debug ffs show used-fds This command has no arguments or keywords. 2-18

19 Chapter 2 debug flow-capture debug flow-capture Executes flow capture operations. debug flow-capture { start stop create-cap file-destination } file-destination Destination where the cap file should be created (may also be an FTP site path). If no absolute path is given, the file is saved in the root directory. The flow capture is a useful debugging capability that captures packets from the traffic stream in real time and stores them for later analysis using a standard cap format. The classification of the traffic portion to be captured is based on L4 attributes. The following operations are available: start Start recording stop Stop recording create-cap Creates a cap file in the given destination Note that traffic can be captured only when an application is loaded. To perform a flow capture, complete the following steps: 1. (Optional) Configure limits to the flow capture operation using the flow-capture controllers command, to prevent a negative impact on traffic processing. You may skip this step and use the default controller values. 2. Configure an appropriate recording rule using the traffic-rule command. Assign the flow-capture action to the rule (see traffic-rule (ROOT level options)). Note the following limitations: You must use the traffic-rule command to define the recording rule. Only one recording traffic rule can be defined in the system at a time. You cannot use the flow-filter command. 3. Start the actual capture. The capture will not start unless a valid recording rule has been defined. Use the debug flow-capture start command. 4. Stop the capture. Use the debug flow-capture stop command. 5. Create the cap file. The captured data is saved as a CAP file in Snoop v4 format. The cap file will not be created until both a start and stop command have been executed. Use the debug flow-capture create-cap command. 2-19

20 debug flow-capture Chapter 2 At any point, you can use the show interface linecard flow-capture command to display the flow capture status, including whether flow capture is currently recording or is stopped, the capacity already used and the number of packets recorded. 2-20

21 Chapter 2 debug ftp debug ftp Debugs the ftp client. By generating FTP get and put requests to a specified server, this command provides the ability to spawn a number of tasks that perform the same FTP operation in parallel. This allows you to test the system behavior under these conditions. debug ftp get filename [tasks num-tasks ] debug ftp put filename [tasks num-tasks ] filename num-tasks The name of the file to get from or upload to the FTP site. Number of tasks. If this option is not included, the operation is performed in the context of the CLI task. The following options are available: get Get a file from ftp put Put a file from ftp 2-21

22 debug get-recover-support-file Chapter 2 debug get-recover-support-file Generates a recover mode support file. debug get-recover-support-file filename filename The name of the file to get. This command is equivalent to running the "logger get support-file" command when the system is in recovery mode; however, this command can be performed even when not in recovery mode. In recovery mode, the support file is generated by the SCOS itself rather than the EM agent. Therefore, it only contains the debug, user, and stats logs. 2-22

23 Chapter 2 debug jvm debug jvm Performs jvm debug operations. debug jvm {free-memory get-max-memory run kill set-max-memory (mem-in-bytes ) shell (port# ) threads up-time user-thread-count} mem-in-bytes port# The amount of memory to allocate to the JVM The TCP port number on which the shell is to be opened. Use this command to perform the following jvm debug operations: display the amount of free jvm memory display the maximum amount of jvm memory run jvm kill jvm set the maximum amount of jvm memory start an interactive Perc shell on the specified TCP port display the jvm threads display the number of jvm threads display the jvm up time in milliseconds Use the run keyword to run jvm. Use the kill keyword to kill jvm. 2-23

24 debug logout Chapter 2 debug logout Terminates current console CLI task. This command is equivalent to the 'logout' command but is implemented in a different way. debug logout This command has no arguments or keywords. 2-24

25 Chapter 2 debug loop-forever debug loop-forever Runs an endless loop at the current CLI task. debug loop-forever This command has no arguments or keywords. Note After executing this command, no other command can be executed, including the logout command. Therefore the only way to terminate the loop is to close the Telnet/SSH session and wait until the SCE platform detects the timeout. 2-25

26 debug management-agent Chapter 2 debug management-agent Loads a support module to the management agent, providing developers access to various support methods. debug management-agent load support-mbean This command has no arguments or keywords. This command also adds the following support CLIs: debug management-agent gc Run garbage collection debug management-agent jdmk-agent [enable disable] Enable or disable the logging of JDMK calls 2-26

27 Chapter 2 debug memory-traps debug memory-traps Performs a large number of memory allocations, fills the memory locations with known contents, and later verifies whether the content has been changed. If it has, it indicates a memory corruption. This command runs forever and never returns. debug memory-traps {basic system} max-mem mem-in-bytes mem-in-bytes Maximum amount of memory to take for the trap (in bytes) 2-27

28 debug new_rpc Chapter 2 debug new_rpc Runs a simple internal RPC operation to each processor, using the "new RPC" mechanism, in order to debug the mechanism. debug new_rpc This command has no arguments or keywords. If no error is printed, the operation was successful. 2-28

29 Chapter 2 debug package debug package Performs package debug operations. debug package compare package-file-name basedir base-directory debug package extract {management-agent system} package-file-name package-file-name base-directory Name of the package file. The filename should end with the.pkg extension. Directory in which the file is to be found. (The currently installed package is always located at /tffs0/system ) Use this command to perform the following package debug operations: compare Compares the contents of a specified package file with the file currently found on disk. This option can be used to verify that the installed package is not corrupt (and of the same version), after it has been successfully installed. extract Opens the specified package file. This option can be used to perform a SCOS package installation. A reload is needed for the new SCOS to be used. The following file options are available for the extract operation: management-agent Extracts the management agent package file (as specified in the management-agent system command) system Extracts the system package file (as specified in the boot system command) 2-29

30 debug party Chapter 2 debug party Gets or sets the value of a variable in a specific party context in the control card cache (not on a specific traffic processor). debug party name party-name variable var-name {get set value } party-name var-name value Name of party Name of the variable to get or set Value to set the variable to Use this command to perform either of the following actions for the specified party: get Gets a variable from the control cache set sets the value of a variable in the control cache 2-30

31 Chapter 2 debug performance aging-tuning debug performance aging-tuning Tunes the system aging time for each protocol. debug performance aging-tuning start original-aging-time aging-time aging-factor factor dormant-time dormant-time debug performance aging-tuning start signature-id hex-id signature-mask hex-mask aging-factor factor dormant-time dormant-time debug performance aging-tuning stop debug performance aging-tuning show aging-time hex-id The current aging time of the protocol to be tuned The 32 bit HEX signature ID of the tested protocol or protocol family. (Use with SCOS v and later only.) hex-mask The 32 bit HEX mask to use for the given signature. (Use with SCOS v and later only.) factor The factor by which the aging time would be reduced. dormant-time The aging time (in seconds) to assume for treating the flow as dormant. This feature is available for SCOS versions or later only. This feature allows you to tune the system aging time for each protocol, to find the best tradeoff of capacity vs performance vs classification accuracy. The main advantage of this feature versus testing on a live setup, is that this tool provides an immediate estimation of the percentage of zombie flows on each protocol on a global scope. This information indicates where to invest your time, making the process of aging tuning very efficient. The tool has a slight impact on performance while it is running. General instructions for SCOS versions before Decide on the protocol to be investigated for aging tuning. 2. Display the PL aging tunables. These reflect the protocols that can be tuned for aging. show applications slot 0 all-tunables include PL_AGING 3. Set the desired tunables to a unique value that is a multiple of 10. The values in the tunables are in 100mili units, while the aging actually works with seconds, therefore the value must be divisible by 10. For example, assume that the value of the tunable is set to 610 (which means 61 seconds of aging). 4. Run the command with the original aging time set to the tunable/10: 2-31

32 debug performance aging-tuning Chapter 2 debug performance aging-tuning start original-aging-time 61 aging-factor XX dormant-aging-time YY Where XX and YY are the values to be tested. 5. To view the current state of the measurement: debug performance aging-tuning show 6. To stop the current measurement: debug performance aging-tuning stop Note that the measurement should be run in a situation where there is enough traffic, and that the traffic is relatively constant (no variance in the number of active flows). General instructions for SCOS version or later 1. Decide on the protocol (or protocol family) to be investigated for aging tuning. 2. Find the signature of that protocol/family in //depot/app/libraries/pl/dev/src/com/pcube/libs/pl/common/common_protocol_type.san 3. Run the command with the signature ID and mask to specify the desired signature/family (replace the signature numbers with the relevant ones): debug performance aging-tuning start signature-id 0x signature-mask 0xff aging-factor XX dormant-aging-time YY Where XX and YY are the values to be tested. 4. To view the current state of the measurement: debug performance aging-tuning show 5. To stop the current measurement: debug performance aging-tuning stop Note that the measurement should be run in a situation where there is enough traffic, and that the traffic is relatively constant (no variance in the number of active flows). 2-32

33 Chapter 2 debug performance traversed-packets-histogram debug performance traversed-packets-histogram Produces data that can be converted to a histogram illustrating the percentage of flows at each number of packets. debug performance traversed-packets-histogram {create filename reset} filename Name of the csv output file. This feature is available for SCOS versions or later only. One of the most important aspects affecting the performance of the Service Control solution is the number of packets traversed per flow. This histogram provides a measure of how many flows require many packets and how many require less. General instructions for SCOS versions before Close all flows in the system, and disable flow handling: Configure >Interface linecard 0 >shutdown 2. Enable the feature: debug slot 0 for-each ppc func debugperftuningtphenable 1 3. Restart flow handling: Configure >Interface linecard 0 >no shutdown 4. Create the CSV file: debug performance traversed-packets-histogram create csv-filename 5. Disable the feature, to avoid impacting performance on a production system: debug slot 0 for-each ppc func debugperftuningtphenable 0 6. Use this Excel file to quickly create the bar graph from the CSV file, TraversedPacketsHistogram. General instructions for SCOS version or later 1. Close all flows in the system, and disable flow handling using: Configure >Interface linecard 0 >shutdown 2. Set the desired packets-type to count: debug slot 0 for-each ppc func debugperftuningtphsetpacketstype type type can be one of the following: 0 Traversed (default) 1 Handled 2-33

34 debug performance traversed-packets-histogram Chapter 2 2 Total 3. Set the desired transport type of flows to count: debug slot 0 for-each ppc func debugperftuningtphsettransporttype type type can be one of the following: 0 TCP 1 UDP 2 Non-TCP/UDP 3 ALL 4. Enable the feature: debug slot 0 for-each ppc func debugperftuningtphenable 1 5. Restart flow handling: Configure >Interface linecard 0 >no shutdown 6. Create the CSV file: debug performance traversed-packets-histogram create csv-filename 7. Disable the feature, to avoid impacting performance on a production system: debug slot 0 for-each ppc func debugperftuningtphenable 0 8. Use this Excel file to quickly create the bar graph from the CSV file, TraversedPacketsHistogram. 2-34

35 Chapter 2 debug rdr-formatter send-dummy-event debug rdr-formatter send-dummy-event Causes the RDR formatter to send a dummy event. debug rdr-formatter send-dummy-event [category category# ] category# The number of the category on which to send the dummy event. 2-35

36 debug reload-shutdown Chapter 2 debug reload-shutdown Performs 'reload shutdown '. debug reload-shutdown This command has no arguments or keywords. Do not shut down an SCE platform from a remote location. This command shuts down the SCE platform in an orderly manner, before turning it off. After issuing this command, the only way to revive the SCE platform from its power-down state is to turn it off, then back on. Because of this, the basic command reload shutdown command can only be issued from the serial CLI console port. This is done to prevent the possibility of shutting it down from a remote location, from which it is not possible to power back up. However, this debug command can be executed via a Telnet connection. If this is done, the SCE platform cannot be revived until and unless a technician is available at the physical location of the SCE platform to turn it off and then back on. 2-36

37 Chapter 2 debug rpc-adapter debug rpc-adapter Performs the specified debug operation on the PRPC adapter functions. debug rpc-adapter debug-mode {off on} debug rpc-adapter kill-session session-name message message-text debug rpc-adapter reload-cfg debug rpc-adapter reset-statistics debug rpc-adapter show {configuration debug-mode sessions statistics} session-name message-text Name of the PRPC session to kill Text of the message for the peer when killing a session Use this command to perform the following debug operations on the PRPC adapter functions: debug-mode Sets the PRPC debug mode kill-session Kills the specified session reload-cfg Reloads the configuration from configuration file reset-statistics Resets the PRPC adapter statistics show Shows the following PRPC information: configuration PRPC adapter configuration parameter debug mode Enabled (true) or disabled (false) sessions PRPC adapter session information statistics PRPC adapter statistics 2-37

38 debug scmp Chapter 2 debug scmp Performs the specified SCMP debug operation. debug scmp close name peer-name debug scmp query-by-id subscriber-id name peer-name debug scmp query-by-ip ip-address name peer-name peer-name subscriber-id ip-address Name of the SCMP peer to close of to query Subscriber ID or GUID IP address in dotted notation Use this command to perform the following SCMP debug operations: close Closes an SCMP connection query-by-id Sends a query-session by subscriber ID or GUID query-by-ip Sends a query-session by IP address 2-38

39 Chapter 2 debug simulation debug simulation debug simulation get-bw-records filename debug simulation reset debug simulation resume debug simulation run debug simulation stop debug simulation suspend filename Name of the file containing the bandwidth records Use this command to perform the following simulation operations: get-bw-records Gets the bandwidth records reset Resets the simulation resume Resumes the simulation run Runs the simulation stop Stops the simulation suspend Suspends the simulation 2-39

40 debug slot control-func Chapter 2 debug slot control-func Runs a control card debug function on the CLI context for the specified slot. debug slot slot-number control-func function-name [argument1 [argument2... [argument12]]] slot-number The number of the identified slot. Enter a value of 0. function-name The name of the control card function to run. Any exported control card function may be specified. argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. 2-40

41 Chapter 2 debug slot diagnostics debug slot diagnostics Switches to Diagnostics software after reload command. debug slot slot-number diagnostics slot-number The number of the identified slot. Enter a value of

42 debug slot for-each ppc clear Chapter 2 debug slot for-each ppc clear Clears the relevant counters on each ppc in the specified slot. debug slot slot-number for-each ppc clear counters slot-number The number of the identified slot. Enter a value of 0. To perform this debug task only on a specified PPC, see debug slot ppc clear. 2-42

43 Chapter 2 debug slot for-each ppc func debug slot for-each ppc func Executes a function on each ppc in the specified slot. debug slot slot-number for-each ppc func function-name [argument1 [argument2... argument12]]] slot-number The number of the identified slot. Enter a value of 0. function-name The function to execute. Any exported function may be specified (see "Functions" section of "" for a subset list of specific functions displayed explicitly in the CLI). argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. To perform this debug task only on a specified PPC, see debug slot ppc func. Functions The following is a listing of the subset of available functions that are displayed explicitly (and therefore also for which autocomplete is available) in the CLI: CLS_CAM_DumpTuples Dump all Tuples of the Classifier CAM CLS_SDRAM_DumpTuples Dump all Tuples of the Classifier SDRAM CLS_ShowCounter Display Classifier counters cps Clear RuC party statistics d Display memory da Disable Aging devs List devices drv List system drivers ea Enable Aging FCRate_getRate Display the Flow Context rate measured in the system fd List file descriptor names FF_ShowCounter Display Flow Filter counters for a given port i Tasks tcbs summary ir Initialize the general RuC statistics irdp Initialize the RuC dropped packets statistics 2-43

44 debug slot for-each ppc func Chapter 2 memshow System memory information paa Update aging time to immediate for all parties PARTY_debugShowDynamicStuf Dynamic party info PARTY_debugShowStaticStuff Static party info printerrno Print definition of error status RUC_DumpAllSubtasks Show the RuC subtasks running on this cpu. Argument = DumpLevel (0/1/2) RUC_HWCNTR_PrintMasterCntrs Display DP and Gmac counters for a given port RUC_HWCNTR_ResetMasterCntrs Reset DP and Gmac counters for a given port RUC_LUT_DumpCacheLutsInfo Dump all the Cache LUTs' info RUC_LUT_DumpLutEntries Dump a specific LUT's (ID) Entries RUC_LUT_DumpLutStats Dump a specific LUT's (ID) Stats RUC_LUT_Help Display the RUC_LUT (and cache LUT) debug help RUC_LUT_ResetLutEntries Reset a specific LUT's entries RUC_ResetAllSubtasks Reset all the RuC subtasks running on this cpu RUC_ShowSubtaskTables Show the names of the subtasks tables currently registered on this cpu. sd Display the test-end and Line Card state output sps Display RuC party statistics sr Display the general RuC statistics srdp Display RuC dropped packets statistics sysupdateflash Update the bootrom EXECUTE THIS COMMAND ONLY IF YOU ARE SURE. td Delete task telnetshell Start a Telnet daemon for remote target shell (SCE2000 only) ti Task TCB complete information tr Resume task ts Suspend task tt Task trace uaa Update Aging t.o/immed. of all FCs (*100 mili) wsr Display the RuC WAP traffic statistics As mentioned above, you may name any other exported function that does not appear on the above list Specify up to twelve arguments necessary for running the function in either decimal or HEX format. 2-44

45 Chapter 2 debug slot for-each ppc probe debug slot for-each ppc probe Performs the specified debug task for each ppc in the specified slot. debug slot slot-number for-each ppc probe clear flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe clear flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each ppc probe clear (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe clear path path debug slot slot-number for-each ppc probe list flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe list flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each ppc probe list (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe list path path debug slot slot-number for-each ppc probe show flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe show flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each ppc probe show (limits max-depth depth-value max-elements max-elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe show path path slot-number The number of the identified slot. Enter a value of 0. depth-value The maximum number of levels to probe (traversing depth) max-elements-value The maximum total number of elements node-elements-value The maximum number of single node elements path See "Path" section of "" 2-45

46 debug slot for-each ppc probe Chapter 2 Use this command to perform the specified debug task for each ppc in the specified slot. The following options are available: probe Manipulate probe processor data for each ppc clear Clear probe data list List probe elements show Display probe content To perform this debug task only on a specified PPC, see debug slot ppc probe. For each option (clear, list, show), specify one, two, or all of the following options (in the order listed; flags/limits/path or flags/path or limits/path or just path): flags Set command flags limits Set action limits path Path to starting node Flags The following is a description of the flag settings: log no-log Indicates whether or not to log the action details no-details Indicates whether or not to provide more details no Reserved for future flag 1 no Reserved for future flag 2 If you use the flags option, you must specify a setting for all four flags. Limits The following is a description of the action limits: max-depth Limits the traversing depth (number of levels) max-elements Limits the total number of elements max-node-elements Limit the number of elements per single node The default value for all limits is 0. Path The following is a listing of the explicitly specified available paths, which is a subset of all available paths: RUCMasterCntrs.DpVASCnt.* DP VAS counters [port][vas#].pkts/bytes RUCMasterCntrs.TxFromVASCnt.* TX transmitted from VAS(VLAN removed)[port][vas#] in bytes RUCMasterCntrs.TxToVASCnt.* TX transmitted to VAS (VLAN added) [port][vas#] in bytes RUCMasterCntrs.TxVQCnt.* TX GC counters [port][gc] in bytes traverser.* Traverser stats VAS.agent.counters.* VAS agent counters VAS.agent.data.* VAS agent data VAS.controlCard.counters.* VAS control card counters VAS.controlCard.data.* VAS control card data 2-46

47 Chapter 2 debug slot for-each ppc probe VAS.HCMonitor.data.* VAS HC monitor data VAS.lineCard.counters.* VAS line card counters VAS.lineCard.data.* VAS line card data You may specify any other custom path to a node. 2-47

48 debug slot for-each ppc set Chapter 2 debug slot for-each ppc set Set a value for a specified party variable for each ppc in the specified slot. debug slot slot-number for-each ppc set party party-name variable var-name value var-value slot-number The number of the identified slot. Enter a value of 0. party-name The name of the party (subscriber) to set the variable value for. var-name The name of the variable. var-value The value to set for the specified party variable. To perform this debug task only on a specified PPC, see debug slot ppc set. 2-48

49 Chapter 2 debug slot for-each ppc show debug slot for-each ppc show Displays the sr counters or the specified variable value for each ppc in the specified slot. debug slot slot-number for-each ppc show counters debug slot slot-number for-each ppc show variable var-name slot-number The number of the identified slot. Enter a value of 0. var-name The name of the variable. The following options are available: Display the values of the sr () counters Display the values of a specified global variable Make sure you use a global variable. To perform this debug task only on a specified PPC, see debug slot ppc show. 2-49

50 debug slot for-each ppc show-component Chapter 2 debug slot for-each ppc show-component Displays the dump for the specified component for each ppc in the specified slot. debug slot slot-number for-each ppc show-component component-name slot-number The number of the identified slot. Enter a value of 0. component-name The name of the component to display. To perform this debug task only on a specified PPC, see debug slot ppc show-component. 2-50

51 Chapter 2 debug slot for-each ppc show-counters debug slot for-each ppc show-counters Shows sr() counters for each ppc in the specified slot. debug slot slot-number for-each ppc show-counters slot-number The number of the identified slot. Enter a value of 0. To perform this debug task only on a specified PPC, see debug slot ppc show-counters. 2-51

52 debug slot for-each ppc spawn Chapter 2 debug slot for-each ppc spawn Executes a function on each ppc in the specified slot in a separate task. debug slot slot-number for-each ppc spawn prior priority# func func-name [argument1 [argument2... [argument12]]] slot-number The number of the identified slot. Enter a value of 0. priority# The priority to assign to the task. function-name The name of the function to execute (see "Functions" section of "Usage Guidelines"). argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. To perform this debug task only on a specified PPC, see debug slot ppc spawn. Functions The following is a listing of all the available functions: CLS_CAM_DumpTuples Dump all Tuples of the Classifier CAM CLS_SDRAM_DumpTuples Dump all Tuples of the Classifier SDRAM CLS_ShowCounter Display Classifier counters cps Clear RuC party statistics d Display memory da Disable Aging devs List devices drv List system drivers ea Enable Aging FCRate_getRate Display the Flow Context rate measured in the system fd List file descriptor names FF_ShowCounter Display Flow Filter counters for a given port i Tasks tcbs summary ir Initialize the general RuC statistics irdp Initialize the RuC dropped packets statistics memshow System memory information 2-52

53 Chapter 2 debug slot for-each ppc spawn paa Update aging time to immidiate for all parties PARTY_debugShowDynamicStuf Dynamic party info PARTY_debugShowStaticStuff Static party info printerrno Print definition of error status RUC_DumpAllSubtasks Show the RuC subtasks running on this cpu. Argument = DumpLevel (0/1/2) RUC_HWCNTR_PrintMasterCntrs Display DP and Gmac counters for a given port RUC_HWCNTR_ResetMasterCntrs Reset DP and Gmac counters for a given port RUC_LUT_DumpCacheLutsInfo Dump all the Cache LUTs' info RUC_LUT_DumpLutEntries Dump a specific LUT's (ID) Entries RUC_LUT_DumpLutStats Dump a specific LUT's (ID) Stats RUC_LUT_Help Display the RUC_LUT (and cache LUT) debug help RUC_LUT_ResetLutEntries Reset a specific LUT's entries RUC_ResetAllSubtasks Reset all the RuC subtasks running on this cpu RUC_ShowSubtaskTables Show the names of the subtasks tables currently registered on this cpu sd Display the test-end and Line Card state output sps Display RuC party statistics sr Display the general RuC statistics srdp Display RuC dropped packets statistics sysupdateflash Update the bootrom EXECUTE THIS COMMAND ONLY IF YOU ARE SURE. td Delete task telnetshell Start a Telnet daemon for remote target shell (SCE2000 only) ti Task TCB complete information tr Resume task ts Suspend task tt Task trace uaa Update Aging t.o/immed. of all FCs (*100 mili) wsr Display the RuC WAP traffic statistics STRING Name of any other function that does not appear on the above list 2-53

54 debug slot for-each traffic-processor clear counters Chapter 2 debug slot for-each traffic-processor clear counters Clears the relevant counters on each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor clear counters slot-number The number of the identified slot. Enter a value of

55 Chapter 2 debug slot for-each traffic-processor func debug slot for-each traffic-processor func Executes a function on for each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor func function-name [argument1 [argument2... [argument12]]] slot-number The number of the identified slot. Enter a value of 0. function-name The function to execute. Any exported function may be specified (see "Functions" section of "" for a subset list of specific functions displayed explicitly in the CLI). argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. Functions The following is a listing of the subset of available functions that are displayed explicitly (and therefore also for which autocomplete is available) in the CLI: CLS_CAM_DumpTuples Dump all Tuples of the Classifier CAM CLS_SDRAM_DumpTuples Dump all Tuples of the Classifier SDRAM CLS_ShowCounter Display Classifier counters cps Clear RuC party statistics d Display memory da Disable Aging devs List devices drv List system drivers ea Enable Aging FCRate_getRate Display the Flow Context rate measured in the system fd List file descriptor names FF_ShowCounter Display Flow Filter counters for a given port i Tasks tcbs summary ir Initialize the general RuC statistics irdp Initialize the RuC dropped packets statistics memshow System memory information 2-55

56 debug slot for-each traffic-processor func Chapter 2 paa Update aging time to immediate for all parties PARTY_debugShowDynamicStuf Dynamic party info PARTY_debugShowStaticStuff Static party info printerrno Print definition of error status RUC_DumpAllSubtasks Show the RuC subtasks running on this cpu. Argument = DumpLevel (0/1/2) RUC_HWCNTR_PrintMasterCntrs Display DP and Gmac counters for a given port RUC_HWCNTR_ResetMasterCntrs Reset DP and Gmac counters for a given port RUC_LUT_DumpCacheLutsInfo Dump all the Cache LUTs' info RUC_LUT_DumpLutEntries Dump a specific LUT's (ID) Entries RUC_LUT_DumpLutStats Dump a specific LUT's (ID) Stats RUC_LUT_Help Display the RUC_LUT (and cache LUT) debug help RUC_LUT_ResetLutEntries Reset a specific LUT's entries RUC_ResetAllSubtasks Reset all the RuC subtasks running on this cpu RUC_ShowSubtaskTables Show the names of the subtasks tables currently registered on this cpu sd Display the test-end and Line Card state output sps Display RuC party statistics sr Display the general RuC statistics srdp Display RuC dropped packets statistics sysupdateflash Update the bootrom EXECUTE THIS COMMAND ONLY IF YOU ARE SURE. td Delete task telnetshell Start a Telnet daemon for remote target shell (SCE2000 only) ti Task TCB complete information tr Resume task ts Suspend task tt Task trace uaa Update Aging t.o/immed. of all FCs (*100 mili) wsr Display the RuC WAP traffic statistics As mentioned above, you may name any other exported function that does not appear on the above list. Specify up to twelve arguments necessary for running the function in either decimal or HEX format. 2-56

57 Chapter 2 debug slot for-each traffic-processor probe debug slot for-each traffic-processor probe Manipulates the probe processor data for each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor probe clear flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe clear flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each traffic-processor probe clear (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe clear path path debug slot slot-number for-each traffic-processor probe list flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe list flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each traffic-processor probe list (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe list path path debug slot slot-number for-each traffic-processor probe show flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe show flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each traffic-processor probe show (limits max-depth depth-value max-elements max-elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe show path path slot-number The number of the identified slot. Enter a value of 0. depth-value The maximum number of levels to probe (traversing depth) max-elements-value The maximum total number of elements. node-elements-value The maximum number of single node elements. path See "Path" section of "". 2-57

58 debug slot for-each traffic-processor probe Chapter 2 The following main options are available: clear Clear probe data list List probe elements show Display probe content For each main option (clear, list, show), specify one, two, or all of the following options (in the order listed; flags/limits/path or flags/path or limits/path or just path): flags Set command flags limits Set action limits path Path to starting node Flags The following is a description of the flag settings: log no-log Indicates whether or not to log the action details no-details Indicates whether or not to provide more details no Reserved for future flag 1 no Reserved for future flag 2 If you use the flags option, you must specify a setting for all four flags. Limits The following is a description of the action limits: max-depth Limits the traversing depth (number of levels) max-elements Limits the total number of elements max-node-elements Limit the number of elements per single node The default value for all limits is 0. Path The following is a listing of the explicitly specified available paths, which is a subset of all available paths: RUCMasterCntrs.DpVASCnt.* DP VAS counters [port][vas#].pkts/bytes RUCMasterCntrs.TxFromVASCnt.* TX transmitted from VAS(VLAN removed)[port][vas#] in bytes RUCMasterCntrs.TxToVASCnt.* TX transmitted to VAS (VLAN added) [port][vas#] in bytes RUCMasterCntrs.TxVQCnt.* TX GC counters [port][gc] in bytes traverser.* Traverser stats VAS.agent.counters.* VAS agent counters VAS.agent.data.* VAS agent data VAS.controlCard.counters.* VAS control card counters VAS.controlCard.data.* VAS control card data VAS.HCMonitor.data.* VAS HC monitor data VAS.lineCard.counters.* VAS line card counters VAS.lineCard.data.* VAS line card data 2-58

59 Chapter 2 debug slot for-each traffic-processor probe You may specify any other custom path to a node. 2-59

60 debug slot for-each traffic-processor set Chapter 2 debug slot for-each traffic-processor set Sets a value for a specified party variable for each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor set party party-name variable var-name value var-value slot-number The number of the identified slot. Enter a value of 0. party-name The name of the party (subscriber) to set the variable value for. var-name The name of the variable. var-value The value to set for the specified party variable. 2-60

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

Additional Management Tools and Interfaces

Additional Management Tools and Interfaces This chapter provides details on additional management tools and interfaces available in Cisco Service Control. The Cisco SCA BB Service Configuration Utility, page 1 The Cisco SCA BB Signature Configuration

More information

Managing Subscribers

Managing Subscribers CHAPTER 9 The SCE platform is subscriber aware, that is, it can relate traffic and usage to specific customers. This ability to map between IP flows and a specific subscriber allows the system to do the

More information

CLI Commands to Verify a Successful Installation

CLI Commands to Verify a Successful Installation APPENDIXB Revised: June 13, 2011, Introduction When you have completed the installation of your Cisco SCE 2000 platform, we recommend that you run a number of CLI commands to verify that the proper components

More information

Value Added Services (VAS) Traffic Forwarding

Value Added Services (VAS) Traffic Forwarding CHAPTER 12 Revised: June 27, 2011, Introduction This chapter provides an overview of VAS traffic forwarding, explaining what is it and how it works. It also explains the various procedures for configuring

More information

Getting Started with Cisco SCA BB Console

Getting Started with Cisco SCA BB Console The module guides you through the process of installing or upgrading the Cisco SCA BB: Describes the concept of the Console as a collection of tools, presents each tool and its role. This module also describes

More information

Configuring and Managing Embedded Event Manager Policies

Configuring and Managing Embedded Event Manager Policies Configuring and Managing Embedded Event Manager Policies The Cisco IOS XR Software Embedded Event Manager (EEM) functions as the central clearing house for the events detected by any portion of the Cisco

More information

Raw Data Formatting: The RDR Formatter and NetFlow Exporting

Raw Data Formatting: The RDR Formatter and NetFlow Exporting CHAPTER 9 Raw Data Formatting: The RDR Formatter and NetFlow Exporting Revised: September 27, 2012, Introduction Cisco Service Control is able to deliver gathered reporting data to an external application

More information

Additional Management Tools and Interfaces

Additional Management Tools and Interfaces This chapter provides details on additional management tools and interfaces available in Cisco Service Control. The Cisco SCA BB Service Configuration Utility, page 1 The Cisco SCA BB Real-Time Monitoring

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Additional Management Tools and Interfaces

Additional Management Tools and Interfaces CHAPTER 13 The SCA BB Service Configuration Utility, page 13-1 The SCA BB Real-Time Monitoring Configuration Utility, page 13-5 The SCA BB Signature Configuration Utility, page 13-8 Overview of SNMP, MIB,

More information

Troubleshooting. Introduction CHAPTER

Troubleshooting. Introduction CHAPTER CHAPTER 8 Troubleshooting Revised: December 21, 2012, Introduction Your Cisco SCE 8000 GBE platform went through extensive testing before leaving the factory. However, if you encounter problems starting

More information

Chapter 4 Software-Based IP Access Control Lists (ACLs)

Chapter 4 Software-Based IP Access Control Lists (ACLs) Chapter 4 Software-Based IP Access Control Lists (ACLs) This chapter describes software-based ACLs, which are ACLs that processed traffic in software or CPU. (This type of ACL was also referred to as flow-based

More information

Operation Manual System Management. Table of Contents

Operation Manual System Management. Table of Contents Table of Contents Table of Contents Chapter 1 File System Management... 1-1 1.1 File System Configuration... 1-1 1.1.1 File System Overview... 1-1 1.1.2 Directory... 1-1 1.1.3 File... 1-2 1.1.4 Storage

More information

Overview of the Cisco Service Control Value Added Services Feature

Overview of the Cisco Service Control Value Added Services Feature CHAPTER 1 Overview of the Cisco Service Control Value Added Services Feature Revised: May 27, 2013, Introduction The VAS feature enables the Cisco SCE platform to access an external expert system for classification

More information

XPress-I/O Device Server Command Reference

XPress-I/O Device Server Command Reference XPress-I/O Device Server Command Reference Part Number 900-464 Revision B July 2007 Copyright & Trademark Contacts 2006, 2007, Lantronix. All rights reserved. No part of the contents of this book may be

More information

#include /opt/cscocnsie/templates/ethernet_setup.cfgtpl. Now, you could centralize all the administration for Ethernet configuration in one file.

#include /opt/cscocnsie/templates/ethernet_setup.cfgtpl. Now, you could centralize all the administration for Ethernet configuration in one file. CHAPTER 12 When creating a template, it is possible to specify variables that will be contextually substituted. Many of these variables are available in the drop-down menu in the Template Editor (see Figure

More information

Using the Cable Monitor Tool

Using the Cable Monitor Tool APPENDIX B This appendix describes the Cisco ubr905 and Cisco ubr925 cable access routers Cable Monitor tool. The Cable Monitor is part of the router s onboard software that provides a web-based diagnostic

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

Cisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using RDRs, Release 4.1.x

Cisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using RDRs, Release 4.1.x CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using RDRs, Release 4.1.x 1 Overview 2 Configuring Behavioral Targeting Support:

More information

C H A P T E R Commands Cisco SFS Product Family Command Reference OL

C H A P T E R Commands Cisco SFS Product Family Command Reference OL CHAPTER 3 This chapter documents the following commands: aaa accounting, page 3-8 aaa authorization, page 3-9 action, page 3-11 addr-option, page 3-12 authentication, page 3-14 auto-negotiate (Ethernet

More information

Maintenance Tasks CHAPTER

Maintenance Tasks CHAPTER CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-4 Configuring Date and Time Properties,

More information

Raw Data Formatting: The RDR Formatter and NetFlow Exporting

Raw Data Formatting: The RDR Formatter and NetFlow Exporting CHAPTER 8 Raw Data Formatting: The RDR Formatter and NetFlow Exporting Cisco Service Control is able to deliver gathered reporting data to an external application for collecting, aggregation, storage and

More information

Available Commands CHAPTER

Available Commands CHAPTER CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,

More information

Proprietary MIB Reference

Proprietary MIB Reference APPENDIXB This appendix describes the pcube proprietary MIB supported by the SCE platform. A MIB (Management Information Base) is a database of objects that can be monitored by a network management system

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 2 This chapter covers the tasks required for maintaining a Content Engine. Upgrading the System Software, page 2-1 Recovering the System Software, page 2-2 Maintaining the Hard Disk Storage, page

More information

Configuring the Embedded Event Manager

Configuring the Embedded Event Manager This chapter describes how to configure the Embedded Event Manager (EEM) to detect and handle critical events on Cisco NX-OS devices. This chapter includes the following sections: About EEM, page 1 Licensing

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Maintenance Tasks CHAPTER

Maintenance Tasks CHAPTER CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-3 Configuring Date and Time Properties,

More information

Symbols INDEX > 12-14

Symbols INDEX > 12-14 INDEX Symbols > 12-14 A AAA accounting configuring 6-32 AAA-based management systems 2-25, 6-2 acceleration about 1-6, 12-1 features 1-6 TCP settings 12-17 accounts creating 7-3 creation process 7-2 deleting

More information

SCE- Subscriber API. SM-API Adapter. Adapter. Diameter Stack

SCE- Subscriber API. SM-API Adapter. Adapter. Diameter Stack CHAPTER 4 Revised: October 25, 2011, Introduction The Gy interface is used for reporting and charging. In SCA BB, support of the Gy interface is divided into two components. The two components reside on

More information

Configuring VLAN Interfaces

Configuring VLAN Interfaces CHAPTER1 The Cisco Application Control Engine (ACE) module does not have any external physical interfaces to receive traffic from clients and servers. Instead, it uses internal VLAN interfaces. You assign

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

mail-server through service image-version efsu

mail-server through service image-version efsu mail-server, on page 2 mdr download reserve memory image, on page 4 mls ip multicast sso, on page 6 mode (redundancy), on page 8 monitor event-trace sbc (EXEC), on page 10 monitor event-trace sbc (global),

More information

Managing the SCMP. About SCMP CHAPTER

Managing the SCMP. About SCMP CHAPTER CHAPTER 13 This module provides an overview of the Service Control Management Protocol (SCMP) capabilities. It also explains the various procedures for configuring and monitoring SCMP. About SCMP, page

More information

Monitoring GSS Global Server Load-Balancing Operation

Monitoring GSS Global Server Load-Balancing Operation CHAPTER 10 Monitoring GSS Global Server Load-Balancing Operation This chapter describes the following tools for monitoring the status of global server load-balancing on your GSS network: CLI-based commands

More information

Enabling Remote Access to the ACE

Enabling Remote Access to the ACE CHAPTER 3 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. All features described in this chapter are supported with IPv6 unless otherwise

More information

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key

More information

Configuring Security with Passwords, Privileges, and Logins

Configuring Security with Passwords, Privileges, and Logins Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating

More information

American Dynamics RAID Storage System iscsi Software User s Manual

American Dynamics RAID Storage System iscsi Software User s Manual American Dynamics RAID Storage System iscsi Software User s Manual Release v2.0 April 2006 # /tmp/hello Hello, World! 3 + 4 = 7 How to Contact American Dynamics American Dynamics (800) 507-6268 or (561)

More information

Administration Manual

Administration Manual Administration Manual SAP J2EE Engine 6.20 Contents About This Manual... 10 Target Audience and Prerequisites... 10 Structure... 10 Documentation Conventions... 11 Further Reading... 11 Administration

More information

Troubleshooting the Network Analysis Module. Netflow Data Export. Web Application CHAPTER

Troubleshooting the Network Analysis Module. Netflow Data Export. Web Application CHAPTER CHAPTER 5 This chapter describes how to troubleshoot the NAM and includes these sections: Netflow Data Export, page 5-1 Error Messages, page 5-9 Web Username and Password Guidelines, page 5-15 Supported

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Using Cisco IOS XE Software

Using Cisco IOS XE Software This chapter describes the basics of using the Cisco IOS XE software and includes the following section: Accessing the CLI Using a Router Console, on page 1 Accessing the CLI Using a Router Console Before

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 74 CHAPTER This chapter describes how to configure and manage logs for the ASA, and includes the following sections: Information About Logging, page 74-1 Licensing Requirements for Logging, page 74-5 Prerequisites

More information

Command Manual Network Protocol. Table of Contents

Command Manual Network Protocol. Table of Contents Table of Contents Table of Contents Chapter 1 IP Address Configuration Commands... 1-1 1.1 IP Address Configuration Commands... 1-1 1.1.1 display ip host... 1-1 1.1.2 display ip interface... 1-1 1.1.3

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

HPE ilo Federation User Guide for ilo 5

HPE ilo Federation User Guide for ilo 5 HPE ilo Federation User Guide for ilo 5 Abstract This guide explains how to configure and use the HPE ilo Federation features. It is intended for system administrators, Hewlett Packard Enterprise representatives,

More information

Multiprocessor WAN Application Module

Multiprocessor WAN Application Module 1 CHAPTER This chapter describes the (MWAM) and includes the following sections: Product Overview, page 1-2 MWAM Ordering Information, page 1-2 Hardware Description, page 1-3 Functional Description, page

More information

Configuring Virtual Service Blades

Configuring Virtual Service Blades CHAPTER 4 This chapter describes how to create and configure virtual service blades and includes the following sections: Information About Virtual Service Blades, page 4-1 Guidelines and Limitations, page

More information

XPort Pro Command Reference

XPort Pro Command Reference XPort Pro Command Reference Part Number 900-558 Revision A September 2009 Copyright & Trademark 2009, Lantronix. All rights reserved. No part of the contents of this book may be transmitted or reproduced

More information

Configuring and Managing Embedded Event Manager Policies

Configuring and Managing Embedded Event Manager Policies Configuring and Managing Embedded Event Manager Policies The Cisco IOS XR Software Embedded Event Manager (EEM) functions as the central clearing house for the events detected by any portion of the Cisco

More information

Using NetFlow Sampling to Select the Network Traffic to Track

Using NetFlow Sampling to Select the Network Traffic to Track Using NetFlow Sampling to Select the Network Traffic to Track This module contains information about and instructions for selecting the network traffic to track through the use of NetFlow sampling. The

More information

Performing Path Traces

Performing Path Traces About Path Trace, page 1 Performing a Path Trace, page 13 Collecting QoS and Interface Statistics in a Path Trace, page 15 About Path Trace With Path Trace, the controller reviews and collects network

More information

Detects Potential Problems. Customizable Data Columns. Support for International Characters

Detects Potential Problems. Customizable Data Columns. Support for International Characters Home Buy Download Support Company Blog Features Home Features HttpWatch Home Overview Features Compare Editions New in Version 9.x Awards and Reviews Download Pricing Our Customers Who is using it? What

More information

Chapter 5 Privileged EXEC Commands

Chapter 5 Privileged EXEC Commands Chapter 5 Privileged EXEC Commands 10gig copy Upgrades the Field-Programmable Gate Arrays (FPGAs) on a 10 Gigabit Ethernet module. Syntax: 10gig copy tftp [module ] tftp parameter

More information

Chapter 6 Global CONFIG Commands

Chapter 6 Global CONFIG Commands Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information

More information

User and System Administration

User and System Administration CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical

More information

SCA Reporter Templates

SCA Reporter Templates APPENDIXD This appendix describes the Cisco Service Control Application Reporter (SCA Reporter) report templates. Information About Report Templates, page D-1 Global Monitoring Template Group, page D-7

More information

Introduction to Traffic Processing

Introduction to Traffic Processing This chapter describes how the Cisco SCA BB installed on a Cisco Service Control Engine (Cisco SCE) platform processes traffic. The chapter also describes the main elements (service configuration entities)

More information

No Service Password-Recovery

No Service Password-Recovery No Service Password-Recovery Last Updated: January 18, 2012 The No Service Password-Recovery feature is a security enhancement that prevents anyone with console access from accessing the router configuration

More information

Using the Command Line Interface

Using the Command Line Interface CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the

More information

I through R. IP SLA Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) 1

I through R. IP SLA Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) 1 I through R icmp-echo, page 2 icmp-jitter, page 4 ip sla, page 6 ip sla group schedule, page 9 ip sla logging traps, page 17 ip sla low-memory, page 19 ip sla reaction-trigger, page 21 ip sla reset, page

More information

Using Debug Commands on Cisco IOS XR Software

Using Debug Commands on Cisco IOS XR Software Using Debug Commands on Cisco IOS XR Software This document describes how to use the Cisco IOS XR software debug commands to monitor system operations and troubleshoot errors. Contents Listing Available

More information

Configuring System Message Logging

Configuring System Message Logging This chapter contains the following sections: Information About System Message Logging, page 1 Licensing Requirements for System Message Logging, page 2 Guidelines and Limitations for System Message Logging,

More information

Command Reference for Firepower Threat Defense 1

Command Reference for Firepower Threat Defense 1 t-z tail-logs, page 2 test aaa-server, page 4 traceroute, page 6 undebug, page 9 verify, page 11 vpn-sessiondb logoff, page 15 write net, page 16 write terminal, page 17 1 tail-logs t - z tail-logs To

More information

IBM Security Access Manager Version Appliance troubleshooting topics

IBM Security Access Manager Version Appliance troubleshooting topics IBM Security Access Manager Version 8.0.0.5 Appliance troubleshooting topics IBM Security Access Manager Version 8.0.0.5 Appliance troubleshooting topics ii IBM Security Access Manager Version 8.0.0.5:

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 2 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Finding Feature Information, page 9 Information

More information

Configuring Traffic Policies

Configuring Traffic Policies CHAPTER 11 Date: 4/23/09 Cisco Application Networking Manager helps you configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing through

More information

match protocol http cookie (cookie map submode)

match protocol http cookie (cookie map submode) Chapter 2 22 match protocol http cookie (cookie map submode) match protocol http cookie (cookie map submode) To add cookies to a cookie map, use the match protocol http cookie command in SLB cookie map

More information

Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) First Published: January 29, 2013 Last Modified: January 29, 2013 Americas Headquarters Cisco Systems,

More information

Information About Service Configuration Entities CSV File Formats

Information About Service Configuration Entities CSV File Formats CHAPTER 5 CSV File Formats Revised: October 21, 2011, Introduction The Cisco Service Control Application for Broadband (SCA BB) provides several types of Comma-Separated Value (CSV) flat files that you

More information

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting. This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System

More information

SAMI Cisco IOS PPC Commands

SAMI Cisco IOS PPC Commands APPENDIXC The following commands, listed in alphabetical order, are introduced or modified for the Cisco SAMI Cisco IOS PPCs and are supported at the SAMI Cisco IOS PPC console: clear sami ixp statistics

More information

Configuring the Cisco IOS XE DHCP Server

Configuring the Cisco IOS XE DHCP Server Configuring the Cisco IOS XE DHCP Server Last Updated: December 20, 2011 Cisco routers running Cisco IOS XE software include Dynamic Host Configuration Protocol (DHCP) server and relay agent software.

More information

User Guide Addendum for the Avaya P550R and P880 Multiservice Switches, Software Version 5.3.2

User Guide Addendum for the Avaya P550R and P880 Multiservice Switches, Software Version 5.3.2 User Guide Addendum for the Avaya P550R and P880 Multiservice Switches, Software Version 5.3.2 Overview New Software Features This addendum provides information and procedures that will be added to later

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

AntiLogReader Command Line Application User Guide

AntiLogReader Command Line Application User Guide AntiLogReader Command Line Application User Guide DOC/AntiLog/UG/2006004_1.0 13-Jul-2006 G Hatto (c) Anticyclone Systems Limited DOC/AntiLog/UG/2006004_1.0 Page 1 of 11 Copyright (c) Anticyclone Systems

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc. Appendix A GLOSSARY SYS-ED/ Computer Education Techniques, Inc. $# Number of arguments passed to a script. $@ Holds the arguments; unlike $* it has the capability for separating the arguments. $* Holds

More information

Working With Configuration Files

Working With Configuration Files CHAPTER 15 This chapter describes how to use commands that show, copy, and erase the configuration file. It contains the following sections: Displaying the Current Configuration, page 15-1 Displaying the

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control CHAPTER 22 This chapter describes how to configure the port-based traffic control features on the Cisco ME 3400 Ethernet Access switch. For complete syntax and usage information for the commands used in

More information

WLM1200-RMTS User s Guide

WLM1200-RMTS User s Guide WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................

More information

Before Contacting Technical Support

Before Contacting Technical Support APPENDIXA This appendix describes the steps to perform before calling for technical support for any Cisco MDS 9000 Family multilayer director and fabric switch. This appendix includes the following sections:

More information

DHCP Server RADIUS Proxy

DHCP Server RADIUS Proxy The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies

More information

UNIX System Administration

UNIX System Administration $!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...

More information

Nortel Secure Router 2330/4134 Configuration SIP Survivability. Release: 10.2 Document Revision: NN

Nortel Secure Router 2330/4134 Configuration SIP Survivability. Release: 10.2 Document Revision: NN Configuration SIP Survivability Release: 10.2 Document Revision: 01.01 www.nortel.com NN47263-510. . Release: 10.2 Publication: NN47263-510 Document release date: 7 September 2009 While the information

More information

Managing Services Modules

Managing Services Modules CHAPTER 58 This chapter describes how to manage the following module types: Security Services Cards (SSCs) Security Services Modules (SSMs) Security Services Processors (SSPs) Modules run advanced security

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Troubleshooting the Security Appliance

Troubleshooting the Security Appliance CHAPTER 43 This chapter describes how to troubleshoot the security appliance, and includes the following sections: Testing Your Configuration, page 43-1 Reloading the Security Appliance, page 43-6 Performing

More information

CCNA 1 Chapter 6 v5.0 Exam Answers 2013

CCNA 1 Chapter 6 v5.0 Exam Answers 2013 CCNA 1 Chapter 6 v5.0 Exam Answers 2013 1 After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router

More information

Flash Devices in the Cisco MDS 9000 Supervisor Module. External CompactFlash in the Cisco MDS 9000 Supervisor Module.

Flash Devices in the Cisco MDS 9000 Supervisor Module. External CompactFlash in the Cisco MDS 9000 Supervisor Module. CHAPTER 4 This chapter lists the information you need to have before you begin using your MDS 9000 Switch. For information on setting up the switch and doing an initial configuration, refer to the Cisco

More information

DCLI User's Guide. Data Center Command-Line Interface

DCLI User's Guide. Data Center Command-Line Interface Data Center Command-Line Interface 2.10.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page

More information

Traffic Processing Overview

Traffic Processing Overview CHAPTER 3 Traffic Processing Overview Revised: August 08, 2013, Introduction This chapter describes how the Cisco SCA BB installed on a Service Control Engine (SCE) platform processes traffic. The chapter

More information