Port Utilization Alarm FSOS

Size: px
Start display at page:

Download "Port Utilization Alarm FSOS"

Transcription

1 FSOS Port Utilization Alarm

2 Contents 1. Utilization Alarm Overview for Utilization Alarm Utilization Alarm Configuration Configure the Port Utilization Alarm Configure the CPU Utilization Alarm Configuration Example for Utilization Alarm Mail Alarm Overview for Mail Alarm Function Configure the Alarm Configuration Example for Mail Alarm System Log System Log Overview System Log Configuration...5

3 1. Utilization Alarm 1.1 Overview for Utilization Alarm The device utilization alarm function is used to monitor the bandwidth of the device, CPU resource consumption, and generate alarm notification in the event of congestion, so that the administrator can keep abreast of the network and equipment running. The port utilization alarm function can set two trigger alarm thresholds. The detailed description is as follows: exceed:when the port bandwidth utilization equals or exceeds the "exceed" value, a congestion alarm is triggered. normal: When the port bandwidth utilization falls below the "normal" value, the recovered alarm is triggered. CPU utilization alarm function can also set two trigger alarm thresholds, described in detail as follows: busy: When the CPU utilization equals or exceeds the "busy" value, an alarm is triggered, indicating that the CPU is busy. unbusy:when the CPU utilization is equal to or lower than the "unbusy" value, an alarm is triggered, indicating that the CPU is idle. The alarm information is output to Syslog by default. If you want to output to the terminal, you need to enable the command. 1.2 Utilization Alarm Configuration Configure the Port Utilization Alarm Configure the Port Utilization Alarm Enter global configure terminal mode Enable/disable [no] alarm all-packets alarms on all ports 1

4 Enter the port mode Enable/disable port alarm Configure threshold information View the alarm information interface ethernet port-num [no] alarm all-packets alarm all-packets threshold exceed value normal value show alarm all-packets interface [ ethernet port-num ] Configure the CPU Utilization Alarm Configure the CPU Utilization Alarm Enter mode Enable/disable CPU alarm Configure threshold information View the alarm information global configure terminal [no] alarm cpu alarm cpu threshold {[busy value] [unbusy value]} show alarm cpu Configuration Example for Utilization Alarm 1.Network requirements When the utilization of the port 0/2 is up to 50M, alarm information is sent. When the CPU utilization reaches 90%, alarm information is sent. 2.Configuration steps # Configure the port alarm function Switch(config)#alarm all-packets Switch(config)#interface ethernet 0/0/2 Switch(config-if-ethernet-0/0/2)#alarm all-packets Switch(config-if-ethernet-0/0/2)#alarm all-packets threshold exceed 50 normal 40 # Configure the cpu alarm Switch(config)#alarm cpu Switch(config)#alarm cpu threshold busy 90 unbusy 85 2

5 3.Result validation # Enable the serial output log Switch(config)# logging monitor 0 # When the CPU reaches the configured threshold, the following alarm information is printed 02:44:02: Switch: %OAM-5-CPU_BUSY: cpu is busy. Switch(config)#show alarm cpu CPU status alarm : enable CPU busy threshold(%) : 90 CPU unbusy threshold(%) : 85 CPU status : busy # When the cpu utilization returned to normal, print as follows: 02:47:05: Switch: %OAM-5-CPU_UNBUSY: cpu is not busy. Switch(config)#show alarm cpu CPU status alarm : enable CPU busy threshold(%) : 90 CPU unbusy threshold(%) : 85 CPU status : unbusy 1.3 Mail Alarm Overview for Mail Alarm Function The DUT sends the system log to the specified mailbox by mail Configure the Alarm Enter Configure Mail Alarm mode Enable/disable mail alarm Configure the global configure terminal [no] mailalarm [no] mailalarm server ip-address smtp server Configure smtp mailalarm smtp authentication username name passwd identity password Configure the mail [no] mailalarm sender sender@co.com 3

6 sender Configure the mail recipient Configure the mail cc Configure the alarm log level View the [no] mailalarm receiver [no] mailalarm ccaddr [no] mailalarm logging level value show mailalarm Port Utilization Alarm 1.Mailalarm is disabled by default 2 The default log level uses 0, and when configured to n, logs of level 0-n are sent to the specified by mailalarm Configuration Example for Mail Alarm 1. Network description Let the DUT send 0-3 level logs to receive@126.com.the sender is test/test and mailbox is test@126.com, mail server is Configuration steps # Configuration Switch(config)#mailalarm Switch(config)#mailalarm server Switch(config)#mailalarm smtp authentication username test passwd test Switch(config)#mailalarm sender test@126.com Switch(config)#mailalarm receiver receive@126.com Switch(config)#mailalarm ccaddr cc@126.com Switch(config)#mailalarm logging level 3 # View the information Switch(config)#show mailalarm mailalarm state : on smtp authentication : on smtp server address : mailalarm logging level : 3 sender address : test@126.com receiver address : receive@126.com ccaddr : cc@126.com 4

7 1.4 System Log System Log Overview Syslog is the system information center, to complete the unified processing and output of information. The other modules in the system will send the output information to Syslog. Syslog determines the output format of the information according to the of the user and outputs the information to the specified display device according to the information switching and filtering rules of each output direction configured by the user. With the Syslog information producer, which is each module of output information, you do not need to export information to the console, Telnet terminal, or log host (Syslog server). You only need to output the information to Syslog. By configuring the appropriate filtering rules, information consumers, which are console, Telnet terminal, history buffer, log host and SNMP agent, can choose whatever they want to receive the information they need and discard unwanted information System Log Configuration 1) Enable/disable Syslog Enable/disable Syslog Enter global configure terminal mode Enable/disable log [no] logging function View the information Show logging 5

8 The logging function is enabled by default and stored in the buffer. 2) Configure the Log Serial Number Configure the Log Serial Number Enable/disable [no] logging sequence-numbers the log serial number The logging function is enabled by default. 3) Configure the Timestamp Configure Syslog Timestamp Configure the logging timestamps { notime uptime datetime } timestamp type Recover the no logging timestamps default There is no separate timestamp switch. There are three timestamp types: notime: do not show the time; uptime: show the boot time; Datetime: show the date and time. The default is uptime. 4) Output to the Terminal In privileged mode, configure the log to output to the terminal switch. In global mode, you 6

9 can configure information display and filtering rules. By default, the device logs are not output to the terminal, but output to the buffer. There is a slight difference between the command for the serial terminal and the Telnet or ssh terminal. Output to the Terminal User end mode Enable/disable [no] terminal monitor output to the terminal Global configure terminal mode Enable/disable log [no] logging monitor { all monitor-num } display logging monitor { all monitor-num } { level-value none Configure the level-list { start-level to end-level value } } [ module filtering rules module-name ] View the filtering show logging filter monitor monitor-num rules Delete the filtering rule no logging monitor { all monitor-num } filter 1. Log output to the terminal: In the serial console, the default is terminal monitor; in other terminal console, the default is no terminal monitor; 2. Log information display: In the non-console terminal, only affect this landing of the current terminal, the other terminals, the next landing of the current terminal is invalid; 3.monitor-num is 0 for the console, and 1 to 5 for Telnet and ssh terminals. 4. Output log default rule: all modules, log level 0-5,7. Deleting the filtering rule restores the default rule. 5) Output to Buffer Output Syslog to Buffer Enter global configure terminal mode Enable/disable [no] logging buffered 7

10 output to buffer Configure the filtering rules View the filtering rules Delete the filtering rule View the log information in the buffer logging buffered { level-value none level-list { start-level to end-level value } } [ module module-name ] show logging filter buffered no logging buffered filter Show logging buffered [ level-value level-list { start-level to end-level value } ] [ module module-name ] The default is log output to buffer. The default rule is to output all modules and logs at the level 0-6. Deleting the filtering rule restores the default rule. 6) Output to Flash In global mode, you can configure Syslog to save to Flash, which is not saved in flash memory by default. Output Syslog to Flash Enter global configure terminal mode Enable/disable output [no] logging flash to flash Configure the filtering logging flash { level-value none level-list { start-level rules to end-level value } } [ module module-name ] View the filtering rules show logging filter flash Delete the filtering rule no logging flash filter Configure the save [no] logging flash interval value period Configure the log size [no] logg flash msg-number value to be saved each time Check the log Show logging flash [ level-value level-list { start-level to information in the flash end-level value } ] [ module module-name ] 8

11 1. When the log is output to flash, the default rule is to output all modules and the log level is 0-5. Deleting the filtering rule restores the default rules. 2. When the log output to flash, the default cycle is 30M. By default, 100 logs are saved at one time. 7) Output to External Server Configure the specified server address for log output, information output switch, filtering rule, and logging tool and source address in global mode. Output Syslog to External Server Enter global configure terminal mode 必先 Configure the log server [no] logging ip-address Enable/disable the log server [no] logging host { all ip-address } Configure the filtering rules Recover the default filtering rules Configure the logging tool name Configure the sip for log packet logging host { all ip-address } { level-value none level-list { start-level to end-level value } } [ module module-name ] no logging host { all ip-address } filter [no] logging facility { clock1 clock2 ftp kernel lineprinter localuse0 localuse1 localuse2 localuse3 localuse4 localuse5 localuse6 localuse6 localuse7 logalert logaudit mail networkknews ntp security1 security2 syslogd system userlevel uucp } [no] logging source { ip-address loopback-interface if-id } 1. The sip of log messages must be the interface of the device. The Layer 3 device uses the IP address of the corresponding interface of the log server by default. The Layer 2 device automatically uses the system IP and does not need to be configured. 2. The default logging tool name uses localuse7. 9

12 8) Output to the SNMP Agent Configure Syslog output to the SNMP agent in global mode. To send Syslog messages to SNMP Workstation in trap messages, you must also configure the Trap host address. Refer to the SNMP instructions. By default, logs are not output to the SNMP agent. Output Syslog to SNMP Agent Enable/disable log output to the snmp agent [no] logging snmp-agent Configure the logging snmp-agent { level-value none level-list filtering rules { start-level to end-level value } } [ module module-name ] View the filtering show logging filter snmp-agent rules Recover the default filtering rules no logging snmp-agent filter 1. Log output to the snmp agent, the default rule: output all modules, the log level is ) Debugging Function In the global mode, you can configure the debugging function to print the debugging information of the corresponding module. By default, debugging information of all modules is disabled. Configure the Debugging Function Enable/disable [no] debug { all module-name } debugging function View the information show debug 10

13 10) Syslog Configuration Example 1.Network requirements Output the logs of the stp module and the device module at levels 0-4 to the console terminal; turns on the serial number display; timestamp use datetime; the log is output to the flash memory; the log information of level 3 and 4 is output to buffer; output logs to external server: ; open arp debugging information. 2.Configuration steps # Enable the terminal output function Switch#terminal monitor Switch#configure terminal # Enable the logging function Switch(config)#logging # Enable the terminal display function Switch(config)#logging monitor all # Output the logs of the stp module and the device module at levels 0-4 to the console terminal Switch(config)#logging monitor all level-list 0 to 4 module stp device # Enable the serial number display Switch(config)#logging sequence-numbers # Configure the timestamp to use datetime Switch(config)#logging timestamps datetime # Enable log output to flash Switch(config)#logging flash # Configure the buffer log filtering rule Switch(config)#logging buffered level-list 3 4 # Configure the log server Switch(config)#logging # Enable the log server Switch(config)#logging host # Configure the facility 11

14 Switch(config)#logging facility ftp # Enable the debugging function of the arp module Switch(config)#debug ARP # View the information Switch(config)#show logging state: on; logging sequence-numbers: on; logging timestamps: datetime; logging language: english logging monitor: Console: state: on; display: off; 96 logged; 0 lost; 0 overflow. logging buffered: state: on; 249 logged; 0 lost; 0 overflow. logging flash: state: on; 37 logged; 0 lost; 0 overflow. logging loghost: logging facility: ftp;logging source: off : state: on; 23 logged; 0 lost; 0 overflow. logging SNMP Agent: state: off; 0 logged; 0 lost; 0 overflow. 12

Syslog Function Configuration

Syslog Function Configuration Syslog Function Configuration Page 1 of 11 Contents Contents... 2 Chapter 1 Syslog Function Configuration...3 1.1 Syslog Introduction...3 1.1 Syslog Function Configuration...3 1.1.1 Syslog Function Configuration

More information

Configuring System Logs

Configuring System Logs CHAPTERS 1. Overview 2. 3. Configuration Example 4. Appendix: Default Parameters Overview This guide applies to: T1500G-10PS v2 or above, T1500G-8T v2 or above, T1500G-10MPS v2 or above, T1500-28PCT v3

More information

Shutdown-Control FSOS. Shutdown-Control Configuration

Shutdown-Control FSOS. Shutdown-Control Configuration FSOS Shutdown-Control Configuration Contents 1. Shutdown-Control...1 1.1 Overview... 1 1.1.1 Enable/disable Shutdown-Control... 1 1.1.2 Configure Recovery Mode...1 1.1.3 Manually Restore Shutdown Port...

More information

FSOS. Switch Management and Maintenance

FSOS. Switch Management and Maintenance FSOS Switch Management and Maintenance Contents Chapter 1 Configuration File Management... 3 1.1 Introduction to Configuration File... 3 1.2 Configuration File-Related Operations... 3 Chapter 2 BootROM

More information

Configuring System Message Logging

Configuring System Message Logging 58 CHAPTER This chapter describes how to configure system message logging on the Catalyst 4500 series switch. This chapter consists of these sections: About System Message Logging, page 58-1, page 58-2

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 31 This chapter describes how to configure system message logging on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : HP2-Z30 Title : Fast Track - Applying HP FlexNetwork Fundamentals Vendor : HP Version : DEMO Get Latest & Valid HP2-Z30

More information

Note that you can also use the password command but the secret command gives you a better encryption algorithm.

Note that you can also use the password command but the secret command gives you a better encryption algorithm. Router Device Security Lab Configuring Secure Passwords 1. Configure the enable secret and password enable password TRUSTME enable secret letmein Look at the configuration: show config terminal Note the

More information

Troubleshooting Tools. Tools for Gathering Information

Troubleshooting Tools. Tools for Gathering Information Internetwork Expert s CCNP Bootcamp Troubleshooting Tools http:// Tools for Gathering Information Before implementing a fix, information must be gathered about a problem to eliminate as many variables

More information

Configuring System Message Logs

Configuring System Message Logs Restrictions for, page 1 Information About, page 1 How to Configure System Message Logs, page 4 Monitoring and Maintaining System Message Logs, page 13 Configuration Examples for System Message Logs, page

More information

Configuring System Message Logs

Configuring System Message Logs Finding Feature Information, on page 1 Restrictions for, on page 1 Information About, on page 2 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12

More information

Attack Protection. FSOS Attack Protection Configuration

Attack Protection. FSOS Attack Protection Configuration FSOS Attack Protection Configuration Contents 2. Attack Protection... 1 1.1 Anti-DDOS Attack Function... 1 1.1.1 Anti-TTL Attack... 1 1.1.2 Configure Anti-IP Fragment Attack...1 1.1.3 Configuration Example...

More information

External Alerting for Intrusion Events

External Alerting for Intrusion Events The following topics describe how to configure external alerting for intrusion events: About, page 1 Configuring SNMP Alerting for Intrusion Events, page 2 Configuring Syslog Alerting for Intrusion Events,

More information

Table Of Contents. 1. Introduction... 1

Table Of Contents. 1. Introduction... 1 User Manual Table of Content Table Of Contents 1. Introduction... 1 1.1 Brief Introduction to Web Interfaces... 1 1.2 How to Log In... 1 1.3 General Setting... 2 1.3.1 Date and Time Setting... 2 1.3.2

More information

Configuring System Message Logs

Configuring System Message Logs Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2 How to Configure System Message Logs, page 5 Monitoring and Maintaining System Message Logs, page 13 Configuration

More information

Information in this document is subject to change without notice. Reproduction of this document in any manner, without the written permission of the

Information in this document is subject to change without notice. Reproduction of this document in any manner, without the written permission of the Information in this document is subject to change without notice. Reproduction of this document in any manner, without the written permission of the D-Link Corporation, is strictly forbidden. Trademarks

More information

Configuring System Message Logs

Configuring System Message Logs Information About, on page 1 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12 Configuration Examples for System Message Logs, on page 12 Additional

More information

Cisco.Actualtests v New Questions.by.Nev.32q.vce

Cisco.Actualtests v New Questions.by.Nev.32q.vce Cisco.Actualtests.200-120.v2014-01-10.New Questions.by.Nev.32q.vce Number: 200-120 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 1 Which three are

More information

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418 This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help

More information

Basic Port Configuration

Basic Port Configuration Basic Port Configuration Page 1 of 8 Contents Contents...2 Chapter 1 Port Security... 3 1.1 Port Security Description...3 1.1 Port Security Configuration...4 1.2 Configuration example...5 Page 2 of 8 Chapter

More information

EtherWAN Managed Switch Firmware Release Notes Copyright 2018 EtherWAN Systems, Inc. RELEASE SUMMARY Version: Release Date: 2018/May/15

EtherWAN Managed Switch Firmware Release Notes Copyright 2018 EtherWAN Systems, Inc. RELEASE SUMMARY Version: Release Date: 2018/May/15 EtherWAN Managed Switch Firmware Release Notes Copyright 2018 EtherWAN Systems, Inc. RELEASE SUMMARY Version: 1.94.6.3 Release Date: 2018/May/15 EX89000 Series EX87000 Series EX83000 Series EX78162 Series

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure

More information

Table of Contents 1 Information Center 1-1

Table of Contents 1 Information Center 1-1 Table of Contents 1 Information Center 1-1 Information Center Overview 1-1 Introduction to Information Center 1-1 System Information Format 1-4 Information Center Configuration 1-6 Introduction to the

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Network Management Card. User Manual

Network Management Card. User Manual User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1

More information

Configuring RMON. Understanding RMON CHAPTER

Configuring RMON. Understanding RMON CHAPTER 22 CHAPTER This chapter describes how to configure Remote Network Monitoring (RMON) on your switch. RMON is a standard monitoring specification that defines a set of statistics and functions that can be

More information

CLI COMMAND SUMMARY BY MODE

CLI COMMAND SUMMARY BY MODE CLI COMMAND SUMMARY BY MODE DDoS Module Configuration Mode Commands 267 (config-ddos) disable-as 269 (config-ddos) dproxy 271 (config-ddos) enable 273 (config-ddos) global-domain 275 (config-ddos) max-database-entries

More information

!! Last configuration change at 16:04:19 UTC Tue Feb by zdrillin! NVRAM config last updated at 21:07:18 UTC Thu Feb ! version 12.

!! Last configuration change at 16:04:19 UTC Tue Feb by zdrillin! NVRAM config last updated at 21:07:18 UTC Thu Feb ! version 12. Last configuration change at 16:04:19 UTC Tue Feb 15 2011 by zdrillin NVRAM config last updated at 21:07:18 UTC Thu Feb 10 2011 version 12.2 no service pad service timestamps debug datetime msec service

More information

External Alerting with Alert Responses

External Alerting with Alert Responses The following topics describe how to send external event alerts from the Firepower Management Center using alert responses: Firepower Management Center Alert Responses, page 1 Creating an SNMP Alert Response,

More information

Operation Manual System Management. Table of Contents

Operation Manual System Management. Table of Contents Table of Contents Table of Contents Chapter 1 File System Management... 1-1 1.1 File System Configuration... 1-1 1.1.1 File System Overview... 1-1 1.1.2 Directory... 1-1 1.1.3 File... 1-2 1.1.4 Storage

More information

Configuring NTP. Information About NTP NTP. This chapter describes how to configure the Network Time Protocol (NTP) on Cisco MDS 9000 Series switches.

Configuring NTP. Information About NTP NTP. This chapter describes how to configure the Network Time Protocol (NTP) on Cisco MDS 9000 Series switches. This chapter describes how to configure the Network Time Protocol (NTP) on Cisco MDS 9000 Series switches. Information About NTP Information About NTP, on page 1 Prerequisites for NTP, on page 2 Guidelines

More information

Configuring VRF-lite CHAPTER

Configuring VRF-lite CHAPTER CHAPTER 36 Virtual Private Networks (VPNs) provide a secure way for customers to share bandwidth over an ISP backbone network. A VPN is a collection of sites sharing a common routing table. A customer

More information

This document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501.

This document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501. 1.0 Overview This document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501. 2.0 PIX Config The following is the PIX config

More information

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.

Logging. About Logging. This chapter describes how to log system messages and use them for troubleshooting. This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System

More information

DGS-3000 Series Layer 2 Managed Gigabit Ethernet Switch Web UI Reference Guide

DGS-3000 Series Layer 2 Managed Gigabit Ethernet Switch Web UI Reference Guide Information in this document is subject to change without notice. 2013 D-Link Corporation. All rights reserved. Reproduction of this document in any manner whatsoever without the written permission of

More information

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine

HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal

More information

User and System Administration

User and System Administration CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical

More information

xstack DES-3200 Series Layer 2 Managed Fast Ethernet Switch

xstack DES-3200 Series Layer 2 Managed Fast Ethernet Switch Information in this document is subject to change without notice. 2014 D-Link Corporation. All rights reserved. Reproduction of this document in any manner whatsoever without the written permission of

More information

Network security session 9-2 Router Security. Network II

Network security session 9-2 Router Security. Network II Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 74 CHAPTER This chapter describes how to configure and manage logs for the ASA, and includes the following sections: Information About Logging, page 74-1 Licensing Requirements for Logging, page 74-5 Prerequisites

More information

Configuration Commands. Generic Commands. description. shutdown SR OS System Management Guide Page 399. Event and Accounting Logs

Configuration Commands. Generic Commands. description. shutdown SR OS System Management Guide Page 399. Event and Accounting Logs Event and Accounting Logs Configuration Commands Generic Commands description description string no description config>log>filter config>log>filte>entry config>log>log-id config>log>accounting-policy config>log>file-id

More information

SNMP Commands CHAPTER

SNMP Commands CHAPTER CHAPTER 7 This chapter contains the Cisco ONS 15540 ESP-specific SNMP commands. For the complete list of SNMP commands supported on the Cisco ONS 15540 ESP, and their descriptions, refer to Cisco IOS Configuration

More information

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13 INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa

More information

Appendix A Remote Network Monitoring

Appendix A Remote Network Monitoring Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Viewing System Information You can access software and hardware specifics for an HP

More information

SKYWAY-XM SERIES PTP Microwave Radio System User Interface Guide

SKYWAY-XM SERIES PTP Microwave Radio System User Interface Guide SKYWAY-XM SERIES PTP Microwave Radio System User Interface Guide April 2010 Rev 1.2 PN: 1563102 Contents 1. Introduction... 5 1.1 Overview... 5 1.2 Modes of User Interfaces... 5 1.3 Features Overview...

More information

Appendix A Command Index

Appendix A Command Index Appendix A Command Index The command index includes all the commands in the Command Manual, which are arranged alphabetically. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A aaa nas-id profile 21-AAA

More information

SSG Configuration Example

SSG Configuration Example APPENDIX A Example A-1 is a sample SSG configuration for the Cisco 10000 series router based on the topology in Figure A-1. The configuration includes AAA, PPP, SSG, and RADIUS. The SSG configuration enables

More information

Managing Broadband Access Center

Managing Broadband Access Center CHAPTER 9 This chapter describes the various subcomponents within Cisco Broadband Access Center (BAC) that you can use to manage the system. These include: BAC Process Watchdog, page 9-1 Administrator

More information

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 3-1 Device Information window

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 3-1 Device Information window 3. System DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Device Information System Information Settings Peripheral Settings Port Configuration PoE (DGS-1510-28P Only) System Log

More information

Release Note of RMCARD 202/203 Ver (Release Date: 06/09/2017):

Release Note of RMCARD 202/203 Ver (Release Date: 06/09/2017): Release Note of RMCARD 202/203 Ver. 2.29 (Release Date: 06/09/2017): Unexpected reboot when E-mail notification was executed via Office365 SMTP Server. Fixed the system not sending the login fail event

More information

XIPLED Software User s Manual. For Firmware release V3.5.0.*

XIPLED Software User s Manual. For Firmware release V3.5.0.* XIPLED1080-36 Software User s Manual For Firmware release V3.5.0.* Product name: XIPLED1080-36 Release Date: 2014/10/02 Manual Revision: V02 Feature XIPLED1080-36 Live View All Series Camera/Video/Audio

More information

HP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

HP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract HP 5820X & 5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through

More information

Appendix A Command Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Appendix A Command Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z The command index includes all the commands in the Comware Command Manual, which are arranged alphabetically. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A access-limit accounting accounting optional

More information

Cisco Small Business SF200E Series Advanced Smart Switches

Cisco Small Business SF200E Series Advanced Smart Switches ADMINISTRATION GUIDE Cisco Small Business SF200E Series Advanced Smart Switches Contents Chapter 1: Getting Started 9 Starting the Web-Based Switch Configuration Utility 9 Launching the Utility 10 Logging

More information

ISCOM 2126 Series Switch Command Notebook

ISCOM 2126 Series Switch Command Notebook ISCOM 2126 Series Switch Notebook Software Version ISCOMOS 1.2 Beijing Raisecom Science & Technology Co., Ltd CONTENTS CHAPTER 1. PREFACE... 1 1.1 AUDIENCE... 1 1.2 ABBREVIATION... 1 1.3 REFERENCE... 1

More information

Performance Monitor Administrative Options

Performance Monitor Administrative Options CHAPTER 12 Effective network management requires the fastest possible identification and resolution of events that occur on mission-critical systems. Performance Monitor administrative options enable you

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright

More information

Symbols INDEX > 12-14

Symbols INDEX > 12-14 INDEX Symbols > 12-14 A AAA accounting configuring 6-32 AAA-based management systems 2-25, 6-2 acceleration about 1-6, 12-1 features 1-6 TCP settings 12-17 accounts creating 7-3 creation process 7-2 deleting

More information

Introduction to Change and Configuration Management

Introduction to Change and Configuration Management CHAPTER 1 Introduction to Change and Configuration Management Cisco Prime Network Change and Configuration Management provides tools that allow you to manage the software and device configuration changes

More information

AutoSecure. Finding Feature Information. Last Updated: January 18, 2012

AutoSecure. Finding Feature Information. Last Updated: January 18, 2012 AutoSecure Last Updated: January 18, 2012 The AutoSecure feature secures a router by using a single CLI command to disable common IP services that can be exploited for network attacks, enable IP services

More information

Three interface Router without NAT Cisco IOS Firewall Configuration

Three interface Router without NAT Cisco IOS Firewall Configuration Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations

More information

ZyXEL ES-3124 V3.80(TP.3)C0 Release Note/Manual Supplement

ZyXEL ES-3124 V3.80(TP.3)C0 Release Note/Manual Supplement ZyXEL ES-3124 V3.80(TP.3)C0 Release Note/Manual Supplement Date: June 17, 2011 This document describes the features in the ES-3124 product for its 3.80(TP.3)C0 release. Support Platforms: ZyXEL ES-3124

More information

NW Switch Configuration Guide DX2000. NEC Scalable Modular Server. 1. Introduction. 2. System Configuration. 3. Layer1 Configuration

NW Switch Configuration Guide DX2000. NEC Scalable Modular Server. 1. Introduction. 2. System Configuration. 3. Layer1 Configuration NW Switch Configuration Guide NEC Scalable Modular Server DX2000 1. Introduction 2. System Configuration 3. Layer1 Configuration 4. Layer2 Configuration Second edition November 2017 NEC Corporation 2017

More information

Security Hardening Checklist for Cisco Routers/Switches in 10 Steps

Security Hardening Checklist for Cisco Routers/Switches in 10 Steps Security Hardening Checklist for Cisco Routers/Switches in 10 Steps Network infrastructure devices (routers, switches, load balancers, firewalls etc) are among the assets of an enterprise that play an

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Table of Contents 1 Information Center Configuration Guide 1-1

Table of Contents 1 Information Center Configuration Guide 1-1 Table of Contents 1 Information Center Configuration Guide 1-1 Outputting Log Information to a Unix Log Host 1-1 Network Diagram 1-1 Networking and Configuration Requirements 1-1 Applicable Product Matrix

More information

co Configuring PIX to Router Dynamic to Static IPSec with

co Configuring PIX to Router Dynamic to Static IPSec with co Configuring PIX to Router Dynamic to Static IPSec with Table of Contents Configuring PIX to Router Dynamic to Static IPSec with NAT...1 Introduction...1 Configure...1 Components Used...1 Network Diagram...1

More information

System Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches)

System Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches) System Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Information about Network Security with ACLs

Information about Network Security with ACLs This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. Finding Feature Information,

More information

CounterACT Syslog Plugin

CounterACT Syslog Plugin Version 3.2.0 Table of Contents About the Syslog Plugin... 3 Multiple Destination Syslog Server Support... 3 Receiving Event Messages... 3 Sending Syslog Messages... 4 Sending CounterACT Event Messages...

More information

INDEX. Cisco Unity Express CLI Administrator Guide for Cisco CallManage, Release Cisco Unity Express Release 1.1

INDEX. Cisco Unity Express CLI Administrator Guide for Cisco CallManage, Release Cisco Unity Express Release 1.1 INDEX A active calls backup 105 restore 107 administration CLI 28 differences 29 GU and CLI 39 GUI 27 administrative privileges 84 administrator Cisco CallManager 29 Cisco Unity Express 29 password 35

More information

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300 holddown holddown To configure the Optimized Edge Routing (OER) prefix route dampening timer to set the minimum period of time that a new exit must be used before an alternate exit can be selected, use

More information

Configuring Embedded Event Manager

Configuring Embedded Event Manager CHAPTER 34 Unless otherwise noted, the term switch refers to a standalone switch or a switch stack. For complete syntax and usage information for the commands used in this chapter, see the Catalyst 3750

More information

PN5212/PN5320/PN7212/PN7320

PN5212/PN5320/PN7212/PN7320 PN522/PN520/PN722/PN720 Power Over the NET Power Distribution Units ALTUSEN Power Over the NET products are Power Distribution Units that offer outlet level control combined with remote access to give

More information

Symbols INDEX. ? command 120

Symbols INDEX. ? command 120 INDEX Symbols? command 120 A abbreviation command 12 Administration via Telephone 1137 administrative privilege 1137 application (ccn trigger http) command 13 AvT 1137 B backup category command 110 backup

More information

FS S5800-8TF12S Switch

FS S5800-8TF12S Switch FS S5800-8TF12S Switch Release Note Issue R1.1 Date 2018-08-14 Content 1 Introduction... 5 2 Version Information... 6 2.1 Basic Information...6 2.2 Release History... 6 2.3 Hardware Supported...8 2.4 Version

More information

User s Guide. SNMPWEBCARD Firmware Version Revision 3

User s Guide. SNMPWEBCARD Firmware Version Revision 3 WARRANTY REGISTRATION: register online today for a chance to win a FREE Tripp Lite product www.tripplite.com/warranty User s Guide SNMPWEBCARD Firmware Version 12.06.0062 Revision 3 Table of Contents 1.

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page

More information

This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN.

This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN. This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN. Requirements: When configuring NSRP-Lite for the NS-50, confirm the following necessary requirements: The NS-25 or

More information

Overview. About the Cisco Context-Aware Mobility Solution CHAPTER

Overview. About the Cisco Context-Aware Mobility Solution CHAPTER 1 CHAPTER This chapter describes the role of the Cisco 3300 series mobility services engine (MSE), a component of the Cisco Context-Aware Mobility (CAM) solution, within the overall Cisco Unified Wireless

More information

Network Management Card. User Manual

Network Management Card. User Manual User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 14 This chapter describes how to configure system message logging on the Cisco MDS 9020 Fabric Switch. It includes the following sections: About System Message Logging, page 14-1 System Message

More information

WLM1200-RMTS User s Guide

WLM1200-RMTS User s Guide WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................

More information

INDEX. Symbols. Cisco Routers for the Desperate, 2nd Edition (C) 2009 by Michael W. Lucas

INDEX. Symbols. Cisco Routers for the Desperate, 2nd Edition (C) 2009 by Michael W. Lucas INDEX Symbols * (asterisk), 45, 78 : (colon), 69! (exclamation point), 14, 53 > (greater-than sign), 8. (period), 44, 53 (pipe symbol), 93 # (pound sign), 8, 14, 69? (question mark), 8 9 A abbreviations

More information

Configuring Embedded Event Manager

Configuring Embedded Event Manager CHAPTER 30 This chapter describes how to use the embedded manager (EEM) to monitor and manage the Cisco ME 3400 Ethernet Access switch and how to configure it. The switch must be running the metro IP access

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

FS Network TAP Series Configuration Guide

FS Network TAP Series Configuration Guide FS Network TAP Series Configuration Guide Table of Contents 1. Brief Introduction... 9 1.1 TAP Group introduction...9 1.1.2 Port mode... 10 1.1.3 Port with flow mode...10 1.2 FLOW types...11 1.3 Precondition...

More information

Configuring Ethernet OAM, CFM, and E-LMI

Configuring Ethernet OAM, CFM, and E-LMI CHAPTER 15 Ethernet Operations, Administration, and Maintenance (OAM) is a protocol for installing, monitoring, and troubleshooting Ethernet networks to increase management capability within the context

More information

Configuration Tasks. Configuring the System Using CLI Commands. Configuring the System Using the GUI

Configuration Tasks. Configuring the System Using CLI Commands. Configuring the System Using the GUI Last Update: June 28, 2007 This chapter lists the tasks for configuring and maintaining Cisco Unity Express and contains the following sections: Configuring the System Using CLI Commands, page 21 Configuring

More information

Configuring SNMP. Finding Feature Information. Prerequisites for SNMP

Configuring SNMP. Finding Feature Information. Prerequisites for SNMP Finding Feature Information, on page 1 Prerequisites for SNMP, on page 1 Restrictions for SNMP, on page 3 Information About SNMP, on page 4 How to Configure SNMP, on page 9 Monitoring SNMP Status, on page

More information

Configuring and Managing the IP Camera

Configuring and Managing the IP Camera CHAPTER 3 The Cisco Video Surveillance IP Camera provides configuration windows that you use to configure and manage the IP camera. This chapter explains how to access the configuration windows, describes

More information

802.1x Configuration. FSOS 802.1X Configuration

802.1x Configuration. FSOS 802.1X Configuration FSOS 802.1X Configuration Contents 1.1 802.1x Overview... 1 1.1.1 802.1x Authentication...1 1.1.2 802.1x Authentication Process...3 1.2 802.1X Configuration... 6 1.2.1 Configure EAP...6 1.2.2 Enable 802.1x...

More information

Operation Manual Login and User Interface. Table of Contents

Operation Manual Login and User Interface. Table of Contents Table of Contents Table of Contents Chapter 1 Switch Login... 1-1 1.1 Setting Up Configuration Environment Through the Console Port... 1-1 1.2 Setting Up Configuration Environment Through Telnet... 1-2

More information

Fibre Channel Slow Drain Device Detection and Congestion Avoidance- An Overview

Fibre Channel Slow Drain Device Detection and Congestion Avoidance- An Overview Fibre Channel Slow Drain Device Detection and Congestion Avoidance- An Overview All data traffic between end devices in the SAN fabric is carried by Fibre Channel Class 3, and in some cases, Class 2 services,

More information

The C2C can send a power-loss alarm to an SNMP manager. To enable this feature, do the following:

The C2C can send a power-loss alarm to an SNMP manager. To enable this feature, do the following: USATUSATCORP.COM Contact USATCORP.COM for more information or quantity pricing 1-888-550-8728! encor e n etworks TM C2C Power-Loss Alarm his document provides guidelines for setting a C2C or another BANDIT

More information

Logging in to the CLI

Logging in to the CLI Contents Logging in to the CLI 1 Login methods 1 Logging in through the console port 2 Introduction 2 Configuration procedure 2 Logging in through the AUX port 5 Configuration prerequisites 5 Configuration

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control CHAPTER 18 This chapter describes how to configure port-based traffic control features on the Catalyst 3750 Metro switch. For complete syntax and usage information for the commands used in this chapter,

More information