This chapter contains all the CLI commands available on the SCE platform. Each command description is broken down into the following sub-sections:
|
|
- Amberlynn Hubbard
- 6 years ago
- Views:
Transcription
1 CHAPTER 2 This chapter contains all the CLI commands available on the SCE platform. Each command description is broken down into the following sub-sections: Command syntax Description Default Authorization Mode Parameters Usage guidelines The general format of the command. Description of what the command does. If relevant, the default setting for the command. The level of user authorization required for using the command. The mode (command line) from which the command can be invoked. Description of parameters and switches for the command. Information about when to invoke the command and additional details Syntax and Conventions The CLI commands are written in the following format: command required-parameter [optional-parameter] [no] is an optional parameter that may appear before the command name. When typing commands, you may enclose parameters in double-quote marks, and you must do so when there is a space within a parameter name. 2-1
2 debug aaa Chapter 2 debug aaa Displays debug information regarding Authentication, Authorization and Accounting functions. debug aaa show accounting methods debug aaa show counters debug aaa show enable methods debug aaa show login This command has no arguments or keywords. Displays the following debug information regarding Authentication, Authorization and Accounting functions: accounting methods list aaa counters enable methods list login methods list 2-2
3 Chapter 2 debug app debug app Extracts the xml section from the application file (SLI) to a specified file. debug app application-filename extract-to-file out-filename debug app-loader directory-name application-filename out-filename Name of the application file Name of the output xml file 2-3
4 debug app-loader Chapter 2 debug app-loader Recursively loads all the files in the specified directory. This can be useful in order to verify the load of certain applications in an automated manner on the SCE itself. debug boot-params-to-defaults directory-name The name of the directory from which to load the application files 2-4
5 Chapter 2 debug boot-params-to-defaults debug boot-params-to-defaults Resets the boot parameters to their default values. debug boot-params-to-defaults This command has no arguments or keywords. Changes the boot parameters to their default values, performing the following operations: Loads the default image from the SCE disk Verifies that the system is not in recovery mode Enables the management port This command can be useful in many cases, such as: Taking the system out of recovery mode Verifying that a non-standard configuration exists for running a regression 2-5
6 debug cli Chapter 2 debug cli Manipulates dynamic CLI commands. debug cli add level level# tableid tableid# numtokens num-of-tokens token1 [token2 [token3... [token6]]] debug cli remove handle handle# debug cli text sessionid session# (more no-more) outtext text-string level# Authorization level ID (0, 5, 10, or 15) tableid# ID number of the specified table num-of-tokens Number of tokens (maximum of 6) token1, token2, Up to six tokens token3,... token6 handle# Command handle number session# Session ID number text-string Text to be supplied to command This command can be used to perform the following actions on dynamic CLI commands: Add a dynamic CLI command Remove a dynamic CLI command Supply text for an invoked dynamic CLI command Note the following: add : text : : Make sure that the value specified for numtokens matches the actual number of tokens that are defined in the command. A maximum of six tokens can be defined in a single command. Use the more keyword to instruct the system to wait for more text. Use the no-more keyword to instruct the system not to wait for more text. 2-6
7 Chapter 2 debug cpa-client debug cpa-client Provides debug information related to the SurfControl URL filtering feature. debug cpa-client check-setup debug cpa-client get-category host-name host-name The name of the URL in the CPA server There are two options: check-setup Checks various SCE configuration parameters (for example, that URL filtering RDRs are sent to the mgmt-agent) to make sure that the system is properly configured for URL filtering. get-category Looks up the category ID of a URL in the CPA server. This is useful when troubleshooting connectivity problems between the SCE and the CPA server. 2-7
8 debug db Chapter 2 debug db The db is a database that holds a large number of configuration variables that affect the SCE operation. debug db get variable-name index-number debug db set variable-name index-number new-value debug db how-many debug db name-by-index variable-index debug db show variable-name debug db show-all variable-name index-number new-value variable-index Name of the variable Specifies which member of the variable array to set or get Value to which to set the specified member of the variable ID number of the variable The following debug commands allow you to view the values of variables in the db and in certain cases to change them. get Displays the value of a specified DB variable set Sets the value of a specified DB variable how-many Displays the total number of currently defined DB variables name-by-index Displays the name of a DB variable specified by ID number show Displays information about a DB variable specified by name show-all Displays all existing DB variables 2-8
9 Chapter 2 debug dbg interpret debug dbg interpret The debug log in the SCE is maintained in binary format and should be interpreted on demand. There are a number of flavors for the interpretation process as described below. debug dbg interpret [input-file in-filename last-failure] output-file out-filename [no-dumps] debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level cpu-list (all cpu1#,cpu2#, ) message-list message1#,message2#,message3# debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level cpu-list (all cpu1#,cpu2#, ) module-list module1#,module2#,module3# debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level cpu-list (all cpu1#,cpu2#, ) no-dumps debug dbg interpret [input-file in-filename last-failure] output-file out-filename fatality-level error-level segment start-string start-marker end-string end-marker debug dbg interpret non-volatile-hitogram in-filename Name of the input debug file out-filename Name of the output text file error-level Fatality level for interpretation (Error, Fatal, Info, or Warning) cpu1#,cpu2#, List of cpu numbers separated by commas (e.g. 0,2,3 ) message1#,message2#, message3# module1#,module2#,m odule3# start-marker end-marker List of module names and message number separated by commas (e.g. logger::5,formatter::7,rdb_gen::11) List of module names separated by commas (e.g. logger,formatter,rdb_gen) The segment Start-Marker (exact message string) The segment End-Marker (exact message string) Available modifiers: output-file The name of the output file after interpretation (it is recommended to use the.txt suffix) input-file The name of an external binary file to be interpreted on the SCE platform instead of the original dbglog that resides on the SCE 2-9
10 debug dbg interpret Chapter 2 last-failure Interprets the dbglog, which is a file copied by the SCE each time there is a failure non-volatile-hitogram Shows the histogram of all message types that were written to the log since the last time the counters were reset (not since the system was reset) 2-10
11 Chapter 2 debug dbg module debug dbg module Allows the user to control the tracing level of the various debug modules that are capable of writing debug messages to the log. debug dbg module module-id fatality-level error-level debug dbg module module-id message message# rate-control (on off) debug dbg module module-id message message# set-period num-of-messages debug dbg module module-id message message# set-status (on off) debug dbg module module-id message message# show-fatality debug dbg module module-id message message# show-period debug dbg module module-id message message# show-string debug dbg module module-id show-messages error-level module-id message# Fatality level for interpretation (Error, Fatal, Info, Warning) Module ID, in a format starting with '0x' Number of the message Use this command to set the following options for the specified module: fatality-level Set fatality level of the module message Manage debug messages rate-control Change rate control mode for this message set-period Set the message period set-status Set the message status to all processors show-fatality Show the message fatality show-period Show the message period show-string Show the message string show-messages Show the module messages information 2-11
12 debug dbg output-format Chapter 2 debug dbg output-format Allow the user to determine whether some of the fields that are generated during log interpretation should be suppressed. debug dbg output-format date (off on) time (off on) cpu (off on) sequence (off on) This command has no arguments or keywords. The following options are available: date time cpu sequence 2-12
13 Chapter 2 debug dbg ruc-debugging debug dbg ruc-debugging Enables RuC logging. debug dbg ruc-debugging (enable disable show) This command has no arguments or keywords. Since there is an additional performance cost for dbg messages in the data plane (the Traffic Processor or the RuC), you must enable RuC logging in order to debug the RuC. Therefore, in order to optimize performance, there is a global enabler for all RuC logging. The following options are available: disable Disable RUC Info messages (including vertical debugging) enable Enable RUC Info messages (including vertical debugging) show Display the status of RUC Info messages 2-13
14 debug dbg show-modules Chapter 2 debug dbg show-modules Displays all the supported dbg modules in order to determine the exact syntax of the modules before using the debug dbg module command. debug dbg show-modules This command has no arguments or keywords. 2-14
15 Chapter 2 debug dbg slot debug dbg slot Allows the dbg commands to be localized to a certain slot or traffic processor. The functionality of the modifiers is similar to the other debug dbg commands. debug dbg slot slot# module module-name fatality-level error-level debug dbg slot slot# module module-name message message# rate-control (on off) debug dbg slot slot# module module-name message message# set-period num-of-messages debug dbg slot slot# module module-name message message# set-status (on off) debug dbg slot slot# ppc ppc# module module-name fatality-level error-level debug dbg slot slot# ppc ppc# module module-name message message# rate-control (on off) debug dbg slot slot# ppc ppc# module module-name message message# set-period num-of-messages debug dbg slot slot# ppc ppc# module module-name message message# set-status (on off) debug dbg slot slot# ppc ppc# module module-name message message# show-rate-control debug dbg slot slot# ppc ppc# module module-name message message# show-status debug dbg slot slot# ppc ppc# ruc-debugging (enable disable show) error-level Fatality level for interpretation (Error, Fatal, Info, Warning) module-name Module name message# Number of the message num-of-messages Number of messages after which a message will be issued slot# The number of the identified slot. Enter a value of 0. ppc# The number of the PPC on the specified slot The following options are available: module fatality-level Set fatality level of the module message Manage debug messages rate-control Change rate control mode for this message set-period Set the message period 2-15
16 debug dbg slot Chapter 2 set-status Set the message status to all processors ppc module fatality-level Set fatality level of the module message Manage debug messages rate-control Change rate control mode for this message set-period Set the message period set-status Set the message status to all processors show-rate-control Show the rate control mode for this message show-status Show the message status for all processors ruc-debugging disable Disable RUC Info messages (including vertical debugging) enable Enable RUC Info messages (including vertical debugging) show Display the status of RUC Info messages 2-16
17 Chapter 2 debug engage debug engage Debugs the SCA BB application. debug engage run-after-apply-handler This command has no arguments or keywords. Note This command is relevant only when the SCA BB application is installed on the SCE platform. 2-17
18 debug ffs Chapter 2 debug ffs Debugs the flash file system. Shows the number of available file descriptors. debug ffs show used-fds This command has no arguments or keywords. 2-18
19 Chapter 2 debug flow-capture debug flow-capture Executes flow capture operations. debug flow-capture { start stop create-cap file-destination } file-destination Destination where the cap file should be created (may also be an FTP site path). If no absolute path is given, the file is saved in the root directory. The flow capture is a useful debugging capability that captures packets from the traffic stream in real time and stores them for later analysis using a standard cap format. The classification of the traffic portion to be captured is based on L4 attributes. The following operations are available: start Start recording stop Stop recording create-cap Creates a cap file in the given destination Note that traffic can be captured only when an application is loaded. To perform a flow capture, complete the following steps: 1. (Optional) Configure limits to the flow capture operation using the flow-capture controllers command, to prevent a negative impact on traffic processing. You may skip this step and use the default controller values. 2. Configure an appropriate recording rule using the traffic-rule command. Assign the flow-capture action to the rule (see traffic-rule (ROOT level options)). Note the following limitations: You must use the traffic-rule command to define the recording rule. Only one recording traffic rule can be defined in the system at a time. You cannot use the flow-filter command. 3. Start the actual capture. The capture will not start unless a valid recording rule has been defined. Use the debug flow-capture start command. 4. Stop the capture. Use the debug flow-capture stop command. 5. Create the cap file. The captured data is saved as a CAP file in Snoop v4 format. The cap file will not be created until both a start and stop command have been executed. Use the debug flow-capture create-cap command. 2-19
20 debug flow-capture Chapter 2 At any point, you can use the show interface linecard flow-capture command to display the flow capture status, including whether flow capture is currently recording or is stopped, the capacity already used and the number of packets recorded. 2-20
21 Chapter 2 debug ftp debug ftp Debugs the ftp client. By generating FTP get and put requests to a specified server, this command provides the ability to spawn a number of tasks that perform the same FTP operation in parallel. This allows you to test the system behavior under these conditions. debug ftp get filename [tasks num-tasks ] debug ftp put filename [tasks num-tasks ] filename num-tasks The name of the file to get from or upload to the FTP site. Number of tasks. If this option is not included, the operation is performed in the context of the CLI task. The following options are available: get Get a file from ftp put Put a file from ftp 2-21
22 debug get-recover-support-file Chapter 2 debug get-recover-support-file Generates a recover mode support file. debug get-recover-support-file filename filename The name of the file to get. This command is equivalent to running the "logger get support-file" command when the system is in recovery mode; however, this command can be performed even when not in recovery mode. In recovery mode, the support file is generated by the SCOS itself rather than the EM agent. Therefore, it only contains the debug, user, and stats logs. 2-22
23 Chapter 2 debug jvm debug jvm Performs jvm debug operations. debug jvm {free-memory get-max-memory run kill set-max-memory (mem-in-bytes ) shell (port# ) threads up-time user-thread-count} mem-in-bytes port# The amount of memory to allocate to the JVM The TCP port number on which the shell is to be opened. Use this command to perform the following jvm debug operations: display the amount of free jvm memory display the maximum amount of jvm memory run jvm kill jvm set the maximum amount of jvm memory start an interactive Perc shell on the specified TCP port display the jvm threads display the number of jvm threads display the jvm up time in milliseconds Use the run keyword to run jvm. Use the kill keyword to kill jvm. 2-23
24 debug logout Chapter 2 debug logout Terminates current console CLI task. This command is equivalent to the 'logout' command but is implemented in a different way. debug logout This command has no arguments or keywords. 2-24
25 Chapter 2 debug loop-forever debug loop-forever Runs an endless loop at the current CLI task. debug loop-forever This command has no arguments or keywords. Note After executing this command, no other command can be executed, including the logout command. Therefore the only way to terminate the loop is to close the Telnet/SSH session and wait until the SCE platform detects the timeout. 2-25
26 debug management-agent Chapter 2 debug management-agent Loads a support module to the management agent, providing developers access to various support methods. debug management-agent load support-mbean This command has no arguments or keywords. This command also adds the following support CLIs: debug management-agent gc Run garbage collection debug management-agent jdmk-agent [enable disable] Enable or disable the logging of JDMK calls 2-26
27 Chapter 2 debug memory-traps debug memory-traps Performs a large number of memory allocations, fills the memory locations with known contents, and later verifies whether the content has been changed. If it has, it indicates a memory corruption. This command runs forever and never returns. debug memory-traps {basic system} max-mem mem-in-bytes mem-in-bytes Maximum amount of memory to take for the trap (in bytes) 2-27
28 debug new_rpc Chapter 2 debug new_rpc Runs a simple internal RPC operation to each processor, using the "new RPC" mechanism, in order to debug the mechanism. debug new_rpc This command has no arguments or keywords. If no error is printed, the operation was successful. 2-28
29 Chapter 2 debug package debug package Performs package debug operations. debug package compare package-file-name basedir base-directory debug package extract {management-agent system} package-file-name package-file-name base-directory Name of the package file. The filename should end with the.pkg extension. Directory in which the file is to be found. (The currently installed package is always located at /tffs0/system ) Use this command to perform the following package debug operations: compare Compares the contents of a specified package file with the file currently found on disk. This option can be used to verify that the installed package is not corrupt (and of the same version), after it has been successfully installed. extract Opens the specified package file. This option can be used to perform a SCOS package installation. A reload is needed for the new SCOS to be used. The following file options are available for the extract operation: management-agent Extracts the management agent package file (as specified in the management-agent system command) system Extracts the system package file (as specified in the boot system command) 2-29
30 debug party Chapter 2 debug party Gets or sets the value of a variable in a specific party context in the control card cache (not on a specific traffic processor). debug party name party-name variable var-name {get set value } party-name var-name value Name of party Name of the variable to get or set Value to set the variable to Use this command to perform either of the following actions for the specified party: get Gets a variable from the control cache set sets the value of a variable in the control cache 2-30
31 Chapter 2 debug performance aging-tuning debug performance aging-tuning Tunes the system aging time for each protocol. debug performance aging-tuning start original-aging-time aging-time aging-factor factor dormant-time dormant-time debug performance aging-tuning start signature-id hex-id signature-mask hex-mask aging-factor factor dormant-time dormant-time debug performance aging-tuning stop debug performance aging-tuning show aging-time hex-id The current aging time of the protocol to be tuned The 32 bit HEX signature ID of the tested protocol or protocol family. (Use with SCOS v and later only.) hex-mask The 32 bit HEX mask to use for the given signature. (Use with SCOS v and later only.) factor The factor by which the aging time would be reduced. dormant-time The aging time (in seconds) to assume for treating the flow as dormant. This feature is available for SCOS versions or later only. This feature allows you to tune the system aging time for each protocol, to find the best tradeoff of capacity vs performance vs classification accuracy. The main advantage of this feature versus testing on a live setup, is that this tool provides an immediate estimation of the percentage of zombie flows on each protocol on a global scope. This information indicates where to invest your time, making the process of aging tuning very efficient. The tool has a slight impact on performance while it is running. General instructions for SCOS versions before Decide on the protocol to be investigated for aging tuning. 2. Display the PL aging tunables. These reflect the protocols that can be tuned for aging. show applications slot 0 all-tunables include PL_AGING 3. Set the desired tunables to a unique value that is a multiple of 10. The values in the tunables are in 100mili units, while the aging actually works with seconds, therefore the value must be divisible by 10. For example, assume that the value of the tunable is set to 610 (which means 61 seconds of aging). 4. Run the command with the original aging time set to the tunable/10: 2-31
32 debug performance aging-tuning Chapter 2 debug performance aging-tuning start original-aging-time 61 aging-factor XX dormant-aging-time YY Where XX and YY are the values to be tested. 5. To view the current state of the measurement: debug performance aging-tuning show 6. To stop the current measurement: debug performance aging-tuning stop Note that the measurement should be run in a situation where there is enough traffic, and that the traffic is relatively constant (no variance in the number of active flows). General instructions for SCOS version or later 1. Decide on the protocol (or protocol family) to be investigated for aging tuning. 2. Find the signature of that protocol/family in //depot/app/libraries/pl/dev/src/com/pcube/libs/pl/common/common_protocol_type.san 3. Run the command with the signature ID and mask to specify the desired signature/family (replace the signature numbers with the relevant ones): debug performance aging-tuning start signature-id 0x signature-mask 0xff aging-factor XX dormant-aging-time YY Where XX and YY are the values to be tested. 4. To view the current state of the measurement: debug performance aging-tuning show 5. To stop the current measurement: debug performance aging-tuning stop Note that the measurement should be run in a situation where there is enough traffic, and that the traffic is relatively constant (no variance in the number of active flows). 2-32
33 Chapter 2 debug performance traversed-packets-histogram debug performance traversed-packets-histogram Produces data that can be converted to a histogram illustrating the percentage of flows at each number of packets. debug performance traversed-packets-histogram {create filename reset} filename Name of the csv output file. This feature is available for SCOS versions or later only. One of the most important aspects affecting the performance of the Service Control solution is the number of packets traversed per flow. This histogram provides a measure of how many flows require many packets and how many require less. General instructions for SCOS versions before Close all flows in the system, and disable flow handling: Configure >Interface linecard 0 >shutdown 2. Enable the feature: debug slot 0 for-each ppc func debugperftuningtphenable 1 3. Restart flow handling: Configure >Interface linecard 0 >no shutdown 4. Create the CSV file: debug performance traversed-packets-histogram create csv-filename 5. Disable the feature, to avoid impacting performance on a production system: debug slot 0 for-each ppc func debugperftuningtphenable 0 6. Use this Excel file to quickly create the bar graph from the CSV file, TraversedPacketsHistogram. General instructions for SCOS version or later 1. Close all flows in the system, and disable flow handling using: Configure >Interface linecard 0 >shutdown 2. Set the desired packets-type to count: debug slot 0 for-each ppc func debugperftuningtphsetpacketstype type type can be one of the following: 0 Traversed (default) 1 Handled 2-33
34 debug performance traversed-packets-histogram Chapter 2 2 Total 3. Set the desired transport type of flows to count: debug slot 0 for-each ppc func debugperftuningtphsettransporttype type type can be one of the following: 0 TCP 1 UDP 2 Non-TCP/UDP 3 ALL 4. Enable the feature: debug slot 0 for-each ppc func debugperftuningtphenable 1 5. Restart flow handling: Configure >Interface linecard 0 >no shutdown 6. Create the CSV file: debug performance traversed-packets-histogram create csv-filename 7. Disable the feature, to avoid impacting performance on a production system: debug slot 0 for-each ppc func debugperftuningtphenable 0 8. Use this Excel file to quickly create the bar graph from the CSV file, TraversedPacketsHistogram. 2-34
35 Chapter 2 debug rdr-formatter send-dummy-event debug rdr-formatter send-dummy-event Causes the RDR formatter to send a dummy event. debug rdr-formatter send-dummy-event [category category# ] category# The number of the category on which to send the dummy event. 2-35
36 debug reload-shutdown Chapter 2 debug reload-shutdown Performs 'reload shutdown '. debug reload-shutdown This command has no arguments or keywords. Do not shut down an SCE platform from a remote location. This command shuts down the SCE platform in an orderly manner, before turning it off. After issuing this command, the only way to revive the SCE platform from its power-down state is to turn it off, then back on. Because of this, the basic command reload shutdown command can only be issued from the serial CLI console port. This is done to prevent the possibility of shutting it down from a remote location, from which it is not possible to power back up. However, this debug command can be executed via a Telnet connection. If this is done, the SCE platform cannot be revived until and unless a technician is available at the physical location of the SCE platform to turn it off and then back on. 2-36
37 Chapter 2 debug rpc-adapter debug rpc-adapter Performs the specified debug operation on the PRPC adapter functions. debug rpc-adapter debug-mode {off on} debug rpc-adapter kill-session session-name message message-text debug rpc-adapter reload-cfg debug rpc-adapter reset-statistics debug rpc-adapter show {configuration debug-mode sessions statistics} session-name message-text Name of the PRPC session to kill Text of the message for the peer when killing a session Use this command to perform the following debug operations on the PRPC adapter functions: debug-mode Sets the PRPC debug mode kill-session Kills the specified session reload-cfg Reloads the configuration from configuration file reset-statistics Resets the PRPC adapter statistics show Shows the following PRPC information: configuration PRPC adapter configuration parameter debug mode Enabled (true) or disabled (false) sessions PRPC adapter session information statistics PRPC adapter statistics 2-37
38 debug scmp Chapter 2 debug scmp Performs the specified SCMP debug operation. debug scmp close name peer-name debug scmp query-by-id subscriber-id name peer-name debug scmp query-by-ip ip-address name peer-name peer-name subscriber-id ip-address Name of the SCMP peer to close of to query Subscriber ID or GUID IP address in dotted notation Use this command to perform the following SCMP debug operations: close Closes an SCMP connection query-by-id Sends a query-session by subscriber ID or GUID query-by-ip Sends a query-session by IP address 2-38
39 Chapter 2 debug simulation debug simulation debug simulation get-bw-records filename debug simulation reset debug simulation resume debug simulation run debug simulation stop debug simulation suspend filename Name of the file containing the bandwidth records Use this command to perform the following simulation operations: get-bw-records Gets the bandwidth records reset Resets the simulation resume Resumes the simulation run Runs the simulation stop Stops the simulation suspend Suspends the simulation 2-39
40 debug slot control-func Chapter 2 debug slot control-func Runs a control card debug function on the CLI context for the specified slot. debug slot slot-number control-func function-name [argument1 [argument2... [argument12]]] slot-number The number of the identified slot. Enter a value of 0. function-name The name of the control card function to run. Any exported control card function may be specified. argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. 2-40
41 Chapter 2 debug slot diagnostics debug slot diagnostics Switches to Diagnostics software after reload command. debug slot slot-number diagnostics slot-number The number of the identified slot. Enter a value of
42 debug slot for-each ppc clear Chapter 2 debug slot for-each ppc clear Clears the relevant counters on each ppc in the specified slot. debug slot slot-number for-each ppc clear counters slot-number The number of the identified slot. Enter a value of 0. To perform this debug task only on a specified PPC, see debug slot ppc clear. 2-42
43 Chapter 2 debug slot for-each ppc func debug slot for-each ppc func Executes a function on each ppc in the specified slot. debug slot slot-number for-each ppc func function-name [argument1 [argument2... argument12]]] slot-number The number of the identified slot. Enter a value of 0. function-name The function to execute. Any exported function may be specified (see "Functions" section of "" for a subset list of specific functions displayed explicitly in the CLI). argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. To perform this debug task only on a specified PPC, see debug slot ppc func. Functions The following is a listing of the subset of available functions that are displayed explicitly (and therefore also for which autocomplete is available) in the CLI: CLS_CAM_DumpTuples Dump all Tuples of the Classifier CAM CLS_SDRAM_DumpTuples Dump all Tuples of the Classifier SDRAM CLS_ShowCounter Display Classifier counters cps Clear RuC party statistics d Display memory da Disable Aging devs List devices drv List system drivers ea Enable Aging FCRate_getRate Display the Flow Context rate measured in the system fd List file descriptor names FF_ShowCounter Display Flow Filter counters for a given port i Tasks tcbs summary ir Initialize the general RuC statistics irdp Initialize the RuC dropped packets statistics 2-43
44 debug slot for-each ppc func Chapter 2 memshow System memory information paa Update aging time to immediate for all parties PARTY_debugShowDynamicStuf Dynamic party info PARTY_debugShowStaticStuff Static party info printerrno Print definition of error status RUC_DumpAllSubtasks Show the RuC subtasks running on this cpu. Argument = DumpLevel (0/1/2) RUC_HWCNTR_PrintMasterCntrs Display DP and Gmac counters for a given port RUC_HWCNTR_ResetMasterCntrs Reset DP and Gmac counters for a given port RUC_LUT_DumpCacheLutsInfo Dump all the Cache LUTs' info RUC_LUT_DumpLutEntries Dump a specific LUT's (ID) Entries RUC_LUT_DumpLutStats Dump a specific LUT's (ID) Stats RUC_LUT_Help Display the RUC_LUT (and cache LUT) debug help RUC_LUT_ResetLutEntries Reset a specific LUT's entries RUC_ResetAllSubtasks Reset all the RuC subtasks running on this cpu RUC_ShowSubtaskTables Show the names of the subtasks tables currently registered on this cpu. sd Display the test-end and Line Card state output sps Display RuC party statistics sr Display the general RuC statistics srdp Display RuC dropped packets statistics sysupdateflash Update the bootrom EXECUTE THIS COMMAND ONLY IF YOU ARE SURE. td Delete task telnetshell Start a Telnet daemon for remote target shell (SCE2000 only) ti Task TCB complete information tr Resume task ts Suspend task tt Task trace uaa Update Aging t.o/immed. of all FCs (*100 mili) wsr Display the RuC WAP traffic statistics As mentioned above, you may name any other exported function that does not appear on the above list Specify up to twelve arguments necessary for running the function in either decimal or HEX format. 2-44
45 Chapter 2 debug slot for-each ppc probe debug slot for-each ppc probe Performs the specified debug task for each ppc in the specified slot. debug slot slot-number for-each ppc probe clear flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe clear flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each ppc probe clear (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe clear path path debug slot slot-number for-each ppc probe list flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe list flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each ppc probe list (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe list path path debug slot slot-number for-each ppc probe show flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe show flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each ppc probe show (limits max-depth depth-value max-elements max-elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each ppc probe show path path slot-number The number of the identified slot. Enter a value of 0. depth-value The maximum number of levels to probe (traversing depth) max-elements-value The maximum total number of elements node-elements-value The maximum number of single node elements path See "Path" section of "" 2-45
46 debug slot for-each ppc probe Chapter 2 Use this command to perform the specified debug task for each ppc in the specified slot. The following options are available: probe Manipulate probe processor data for each ppc clear Clear probe data list List probe elements show Display probe content To perform this debug task only on a specified PPC, see debug slot ppc probe. For each option (clear, list, show), specify one, two, or all of the following options (in the order listed; flags/limits/path or flags/path or limits/path or just path): flags Set command flags limits Set action limits path Path to starting node Flags The following is a description of the flag settings: log no-log Indicates whether or not to log the action details no-details Indicates whether or not to provide more details no Reserved for future flag 1 no Reserved for future flag 2 If you use the flags option, you must specify a setting for all four flags. Limits The following is a description of the action limits: max-depth Limits the traversing depth (number of levels) max-elements Limits the total number of elements max-node-elements Limit the number of elements per single node The default value for all limits is 0. Path The following is a listing of the explicitly specified available paths, which is a subset of all available paths: RUCMasterCntrs.DpVASCnt.* DP VAS counters [port][vas#].pkts/bytes RUCMasterCntrs.TxFromVASCnt.* TX transmitted from VAS(VLAN removed)[port][vas#] in bytes RUCMasterCntrs.TxToVASCnt.* TX transmitted to VAS (VLAN added) [port][vas#] in bytes RUCMasterCntrs.TxVQCnt.* TX GC counters [port][gc] in bytes traverser.* Traverser stats VAS.agent.counters.* VAS agent counters VAS.agent.data.* VAS agent data VAS.controlCard.counters.* VAS control card counters VAS.controlCard.data.* VAS control card data 2-46
47 Chapter 2 debug slot for-each ppc probe VAS.HCMonitor.data.* VAS HC monitor data VAS.lineCard.counters.* VAS line card counters VAS.lineCard.data.* VAS line card data You may specify any other custom path to a node. 2-47
48 debug slot for-each ppc set Chapter 2 debug slot for-each ppc set Set a value for a specified party variable for each ppc in the specified slot. debug slot slot-number for-each ppc set party party-name variable var-name value var-value slot-number The number of the identified slot. Enter a value of 0. party-name The name of the party (subscriber) to set the variable value for. var-name The name of the variable. var-value The value to set for the specified party variable. To perform this debug task only on a specified PPC, see debug slot ppc set. 2-48
49 Chapter 2 debug slot for-each ppc show debug slot for-each ppc show Displays the sr counters or the specified variable value for each ppc in the specified slot. debug slot slot-number for-each ppc show counters debug slot slot-number for-each ppc show variable var-name slot-number The number of the identified slot. Enter a value of 0. var-name The name of the variable. The following options are available: Display the values of the sr () counters Display the values of a specified global variable Make sure you use a global variable. To perform this debug task only on a specified PPC, see debug slot ppc show. 2-49
50 debug slot for-each ppc show-component Chapter 2 debug slot for-each ppc show-component Displays the dump for the specified component for each ppc in the specified slot. debug slot slot-number for-each ppc show-component component-name slot-number The number of the identified slot. Enter a value of 0. component-name The name of the component to display. To perform this debug task only on a specified PPC, see debug slot ppc show-component. 2-50
51 Chapter 2 debug slot for-each ppc show-counters debug slot for-each ppc show-counters Shows sr() counters for each ppc in the specified slot. debug slot slot-number for-each ppc show-counters slot-number The number of the identified slot. Enter a value of 0. To perform this debug task only on a specified PPC, see debug slot ppc show-counters. 2-51
52 debug slot for-each ppc spawn Chapter 2 debug slot for-each ppc spawn Executes a function on each ppc in the specified slot in a separate task. debug slot slot-number for-each ppc spawn prior priority# func func-name [argument1 [argument2... [argument12]]] slot-number The number of the identified slot. Enter a value of 0. priority# The priority to assign to the task. function-name The name of the function to execute (see "Functions" section of "Usage Guidelines"). argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. To perform this debug task only on a specified PPC, see debug slot ppc spawn. Functions The following is a listing of all the available functions: CLS_CAM_DumpTuples Dump all Tuples of the Classifier CAM CLS_SDRAM_DumpTuples Dump all Tuples of the Classifier SDRAM CLS_ShowCounter Display Classifier counters cps Clear RuC party statistics d Display memory da Disable Aging devs List devices drv List system drivers ea Enable Aging FCRate_getRate Display the Flow Context rate measured in the system fd List file descriptor names FF_ShowCounter Display Flow Filter counters for a given port i Tasks tcbs summary ir Initialize the general RuC statistics irdp Initialize the RuC dropped packets statistics memshow System memory information 2-52
53 Chapter 2 debug slot for-each ppc spawn paa Update aging time to immidiate for all parties PARTY_debugShowDynamicStuf Dynamic party info PARTY_debugShowStaticStuff Static party info printerrno Print definition of error status RUC_DumpAllSubtasks Show the RuC subtasks running on this cpu. Argument = DumpLevel (0/1/2) RUC_HWCNTR_PrintMasterCntrs Display DP and Gmac counters for a given port RUC_HWCNTR_ResetMasterCntrs Reset DP and Gmac counters for a given port RUC_LUT_DumpCacheLutsInfo Dump all the Cache LUTs' info RUC_LUT_DumpLutEntries Dump a specific LUT's (ID) Entries RUC_LUT_DumpLutStats Dump a specific LUT's (ID) Stats RUC_LUT_Help Display the RUC_LUT (and cache LUT) debug help RUC_LUT_ResetLutEntries Reset a specific LUT's entries RUC_ResetAllSubtasks Reset all the RuC subtasks running on this cpu RUC_ShowSubtaskTables Show the names of the subtasks tables currently registered on this cpu sd Display the test-end and Line Card state output sps Display RuC party statistics sr Display the general RuC statistics srdp Display RuC dropped packets statistics sysupdateflash Update the bootrom EXECUTE THIS COMMAND ONLY IF YOU ARE SURE. td Delete task telnetshell Start a Telnet daemon for remote target shell (SCE2000 only) ti Task TCB complete information tr Resume task ts Suspend task tt Task trace uaa Update Aging t.o/immed. of all FCs (*100 mili) wsr Display the RuC WAP traffic statistics STRING Name of any other function that does not appear on the above list 2-53
54 debug slot for-each traffic-processor clear counters Chapter 2 debug slot for-each traffic-processor clear counters Clears the relevant counters on each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor clear counters slot-number The number of the identified slot. Enter a value of
55 Chapter 2 debug slot for-each traffic-processor func debug slot for-each traffic-processor func Executes a function on for each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor func function-name [argument1 [argument2... [argument12]]] slot-number The number of the identified slot. Enter a value of 0. function-name The function to execute. Any exported function may be specified (see "Functions" section of "" for a subset list of specific functions displayed explicitly in the CLI). argument1, argument2,... argument12 Up to twelve optional arguments required for the function in either decimal or HEX format. Functions The following is a listing of the subset of available functions that are displayed explicitly (and therefore also for which autocomplete is available) in the CLI: CLS_CAM_DumpTuples Dump all Tuples of the Classifier CAM CLS_SDRAM_DumpTuples Dump all Tuples of the Classifier SDRAM CLS_ShowCounter Display Classifier counters cps Clear RuC party statistics d Display memory da Disable Aging devs List devices drv List system drivers ea Enable Aging FCRate_getRate Display the Flow Context rate measured in the system fd List file descriptor names FF_ShowCounter Display Flow Filter counters for a given port i Tasks tcbs summary ir Initialize the general RuC statistics irdp Initialize the RuC dropped packets statistics memshow System memory information 2-55
56 debug slot for-each traffic-processor func Chapter 2 paa Update aging time to immediate for all parties PARTY_debugShowDynamicStuf Dynamic party info PARTY_debugShowStaticStuff Static party info printerrno Print definition of error status RUC_DumpAllSubtasks Show the RuC subtasks running on this cpu. Argument = DumpLevel (0/1/2) RUC_HWCNTR_PrintMasterCntrs Display DP and Gmac counters for a given port RUC_HWCNTR_ResetMasterCntrs Reset DP and Gmac counters for a given port RUC_LUT_DumpCacheLutsInfo Dump all the Cache LUTs' info RUC_LUT_DumpLutEntries Dump a specific LUT's (ID) Entries RUC_LUT_DumpLutStats Dump a specific LUT's (ID) Stats RUC_LUT_Help Display the RUC_LUT (and cache LUT) debug help RUC_LUT_ResetLutEntries Reset a specific LUT's entries RUC_ResetAllSubtasks Reset all the RuC subtasks running on this cpu RUC_ShowSubtaskTables Show the names of the subtasks tables currently registered on this cpu sd Display the test-end and Line Card state output sps Display RuC party statistics sr Display the general RuC statistics srdp Display RuC dropped packets statistics sysupdateflash Update the bootrom EXECUTE THIS COMMAND ONLY IF YOU ARE SURE. td Delete task telnetshell Start a Telnet daemon for remote target shell (SCE2000 only) ti Task TCB complete information tr Resume task ts Suspend task tt Task trace uaa Update Aging t.o/immed. of all FCs (*100 mili) wsr Display the RuC WAP traffic statistics As mentioned above, you may name any other exported function that does not appear on the above list. Specify up to twelve arguments necessary for running the function in either decimal or HEX format. 2-56
57 Chapter 2 debug slot for-each traffic-processor probe debug slot for-each traffic-processor probe Manipulates the probe processor data for each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor probe clear flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe clear flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each traffic-processor probe clear (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe clear path path debug slot slot-number for-each traffic-processor probe list flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe list flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each traffic-processor probe list (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe list path path debug slot slot-number for-each traffic-processor probe show flags (log no-log) (details no-details) no no (limits max-depth depth-value max-elements elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe show flags (log no-log) (details no-details) no no (path path ) debug slot slot-number for-each traffic-processor probe show (limits max-depth depth-value max-elements max-elements-value max-node-elements node-elements-value ) (path path ) debug slot slot-number for-each traffic-processor probe show path path slot-number The number of the identified slot. Enter a value of 0. depth-value The maximum number of levels to probe (traversing depth) max-elements-value The maximum total number of elements. node-elements-value The maximum number of single node elements. path See "Path" section of "". 2-57
58 debug slot for-each traffic-processor probe Chapter 2 The following main options are available: clear Clear probe data list List probe elements show Display probe content For each main option (clear, list, show), specify one, two, or all of the following options (in the order listed; flags/limits/path or flags/path or limits/path or just path): flags Set command flags limits Set action limits path Path to starting node Flags The following is a description of the flag settings: log no-log Indicates whether or not to log the action details no-details Indicates whether or not to provide more details no Reserved for future flag 1 no Reserved for future flag 2 If you use the flags option, you must specify a setting for all four flags. Limits The following is a description of the action limits: max-depth Limits the traversing depth (number of levels) max-elements Limits the total number of elements max-node-elements Limit the number of elements per single node The default value for all limits is 0. Path The following is a listing of the explicitly specified available paths, which is a subset of all available paths: RUCMasterCntrs.DpVASCnt.* DP VAS counters [port][vas#].pkts/bytes RUCMasterCntrs.TxFromVASCnt.* TX transmitted from VAS(VLAN removed)[port][vas#] in bytes RUCMasterCntrs.TxToVASCnt.* TX transmitted to VAS (VLAN added) [port][vas#] in bytes RUCMasterCntrs.TxVQCnt.* TX GC counters [port][gc] in bytes traverser.* Traverser stats VAS.agent.counters.* VAS agent counters VAS.agent.data.* VAS agent data VAS.controlCard.counters.* VAS control card counters VAS.controlCard.data.* VAS control card data VAS.HCMonitor.data.* VAS HC monitor data VAS.lineCard.counters.* VAS line card counters VAS.lineCard.data.* VAS line card data 2-58
59 Chapter 2 debug slot for-each traffic-processor probe You may specify any other custom path to a node. 2-59
60 debug slot for-each traffic-processor set Chapter 2 debug slot for-each traffic-processor set Sets a value for a specified party variable for each traffic-processor in the specified slot. debug slot slot-number for-each traffic-processor set party party-name variable var-name value var-value slot-number The number of the identified slot. Enter a value of 0. party-name The name of the party (subscriber) to set the variable value for. var-name The name of the variable. var-value The value to set for the specified party variable. 2-60
Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER
CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,
More informationConfiguring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
More informationAdditional Management Tools and Interfaces
This chapter provides details on additional management tools and interfaces available in Cisco Service Control. The Cisco SCA BB Service Configuration Utility, page 1 The Cisco SCA BB Signature Configuration
More informationManaging Subscribers
CHAPTER 9 The SCE platform is subscriber aware, that is, it can relate traffic and usage to specific customers. This ability to map between IP flows and a specific subscriber allows the system to do the
More informationCLI Commands to Verify a Successful Installation
APPENDIXB Revised: June 13, 2011, Introduction When you have completed the installation of your Cisco SCE 2000 platform, we recommend that you run a number of CLI commands to verify that the proper components
More informationValue Added Services (VAS) Traffic Forwarding
CHAPTER 12 Revised: June 27, 2011, Introduction This chapter provides an overview of VAS traffic forwarding, explaining what is it and how it works. It also explains the various procedures for configuring
More informationGetting Started with Cisco SCA BB Console
The module guides you through the process of installing or upgrading the Cisco SCA BB: Describes the concept of the Console as a collection of tools, presents each tool and its role. This module also describes
More informationConfiguring and Managing Embedded Event Manager Policies
Configuring and Managing Embedded Event Manager Policies The Cisco IOS XR Software Embedded Event Manager (EEM) functions as the central clearing house for the events detected by any portion of the Cisco
More informationRaw Data Formatting: The RDR Formatter and NetFlow Exporting
CHAPTER 9 Raw Data Formatting: The RDR Formatter and NetFlow Exporting Revised: September 27, 2012, Introduction Cisco Service Control is able to deliver gathered reporting data to an external application
More informationAdditional Management Tools and Interfaces
This chapter provides details on additional management tools and interfaces available in Cisco Service Control. The Cisco SCA BB Service Configuration Utility, page 1 The Cisco SCA BB Real-Time Monitoring
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationManaging GSS User Accounts Through a TACACS+ Server
4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationAdditional Management Tools and Interfaces
CHAPTER 13 The SCA BB Service Configuration Utility, page 13-1 The SCA BB Real-Time Monitoring Configuration Utility, page 13-5 The SCA BB Signature Configuration Utility, page 13-8 Overview of SNMP, MIB,
More informationTroubleshooting. Introduction CHAPTER
CHAPTER 8 Troubleshooting Revised: December 21, 2012, Introduction Your Cisco SCE 8000 GBE platform went through extensive testing before leaving the factory. However, if you encounter problems starting
More informationChapter 4 Software-Based IP Access Control Lists (ACLs)
Chapter 4 Software-Based IP Access Control Lists (ACLs) This chapter describes software-based ACLs, which are ACLs that processed traffic in software or CPU. (This type of ACL was also referred to as flow-based
More informationOperation Manual System Management. Table of Contents
Table of Contents Table of Contents Chapter 1 File System Management... 1-1 1.1 File System Configuration... 1-1 1.1.1 File System Overview... 1-1 1.1.2 Directory... 1-1 1.1.3 File... 1-2 1.1.4 Storage
More informationOverview of the Cisco Service Control Value Added Services Feature
CHAPTER 1 Overview of the Cisco Service Control Value Added Services Feature Revised: May 27, 2013, Introduction The VAS feature enables the Cisco SCE platform to access an external expert system for classification
More informationXPress-I/O Device Server Command Reference
XPress-I/O Device Server Command Reference Part Number 900-464 Revision B July 2007 Copyright & Trademark Contacts 2006, 2007, Lantronix. All rights reserved. No part of the contents of this book may be
More information#include /opt/cscocnsie/templates/ethernet_setup.cfgtpl. Now, you could centralize all the administration for Ethernet configuration in one file.
CHAPTER 12 When creating a template, it is possible to specify variables that will be contextually substituted. Many of these variables are available in the drop-down menu in the Template Editor (see Figure
More informationUsing the Cable Monitor Tool
APPENDIX B This appendix describes the Cisco ubr905 and Cisco ubr925 cable access routers Cable Monitor tool. The Cable Monitor is part of the router s onboard software that provides a web-based diagnostic
More informationConfiguring the Cisco NAM 2220 Appliance
CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the
More informationCisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using RDRs, Release 4.1.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using RDRs, Release 4.1.x 1 Overview 2 Configuring Behavioral Targeting Support:
More informationC H A P T E R Commands Cisco SFS Product Family Command Reference OL
CHAPTER 3 This chapter documents the following commands: aaa accounting, page 3-8 aaa authorization, page 3-9 action, page 3-11 addr-option, page 3-12 authentication, page 3-14 auto-negotiate (Ethernet
More informationMaintenance Tasks CHAPTER
CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-4 Configuring Date and Time Properties,
More informationRaw Data Formatting: The RDR Formatter and NetFlow Exporting
CHAPTER 8 Raw Data Formatting: The RDR Formatter and NetFlow Exporting Cisco Service Control is able to deliver gathered reporting data to an external application for collecting, aggregation, storage and
More informationAvailable Commands CHAPTER
CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,
More informationProprietary MIB Reference
APPENDIXB This appendix describes the pcube proprietary MIB supported by the SCE platform. A MIB (Management Information Base) is a database of objects that can be monitored by a network management system
More informationMaintaining the System Software
CHAPTER 2 This chapter covers the tasks required for maintaining a Content Engine. Upgrading the System Software, page 2-1 Recovering the System Software, page 2-2 Maintaining the Hard Disk Storage, page
More informationConfiguring the Embedded Event Manager
This chapter describes how to configure the Embedded Event Manager (EEM) to detect and handle critical events on Cisco NX-OS devices. This chapter includes the following sections: About EEM, page 1 Licensing
More informationCisco WAAS Software Command Summary
2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are
More informationMaintenance Tasks CHAPTER
CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-3 Configuring Date and Time Properties,
More informationSymbols INDEX > 12-14
INDEX Symbols > 12-14 A AAA accounting configuring 6-32 AAA-based management systems 2-25, 6-2 acceleration about 1-6, 12-1 features 1-6 TCP settings 12-17 accounts creating 7-3 creation process 7-2 deleting
More informationSCE- Subscriber API. SM-API Adapter. Adapter. Diameter Stack
CHAPTER 4 Revised: October 25, 2011, Introduction The Gy interface is used for reporting and charging. In SCA BB, support of the Gy interface is divided into two components. The two components reside on
More informationConfiguring VLAN Interfaces
CHAPTER1 The Cisco Application Control Engine (ACE) module does not have any external physical interfaces to receive traffic from clients and servers. Instead, it uses internal VLAN interfaces. You assign
More informationGSS Administration and Troubleshooting
CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM
More informationmail-server through service image-version efsu
mail-server, on page 2 mdr download reserve memory image, on page 4 mls ip multicast sso, on page 6 mode (redundancy), on page 8 monitor event-trace sbc (EXEC), on page 10 monitor event-trace sbc (global),
More informationManaging the SCMP. About SCMP CHAPTER
CHAPTER 13 This module provides an overview of the Service Control Management Protocol (SCMP) capabilities. It also explains the various procedures for configuring and monitoring SCMP. About SCMP, page
More informationMonitoring GSS Global Server Load-Balancing Operation
CHAPTER 10 Monitoring GSS Global Server Load-Balancing Operation This chapter describes the following tools for monitoring the status of global server load-balancing on your GSS network: CLI-based commands
More informationEnabling Remote Access to the ACE
CHAPTER 3 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. All features described in this chapter are supported with IPv6 unless otherwise
More informationTable of Contents 1 Commands for Access Controller Switch Interface Board 1-1
Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key
More informationConfiguring Security with Passwords, Privileges, and Logins
Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating
More informationAmerican Dynamics RAID Storage System iscsi Software User s Manual
American Dynamics RAID Storage System iscsi Software User s Manual Release v2.0 April 2006 # /tmp/hello Hello, World! 3 + 4 = 7 How to Contact American Dynamics American Dynamics (800) 507-6268 or (561)
More informationAdministration Manual
Administration Manual SAP J2EE Engine 6.20 Contents About This Manual... 10 Target Audience and Prerequisites... 10 Structure... 10 Documentation Conventions... 11 Further Reading... 11 Administration
More informationTroubleshooting the Network Analysis Module. Netflow Data Export. Web Application CHAPTER
CHAPTER 5 This chapter describes how to troubleshoot the NAM and includes these sections: Netflow Data Export, page 5-1 Error Messages, page 5-9 Web Username and Password Guidelines, page 5-15 Supported
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationConfiguring the Management Interface and Security
CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various
More informationUsing Cisco IOS XE Software
This chapter describes the basics of using the Cisco IOS XE software and includes the following section: Accessing the CLI Using a Router Console, on page 1 Accessing the CLI Using a Router Console Before
More informationConfiguring Logging. Information About Logging CHAPTER
74 CHAPTER This chapter describes how to configure and manage logs for the ASA, and includes the following sections: Information About Logging, page 74-1 Licensing Requirements for Logging, page 74-5 Prerequisites
More informationCommand Manual Network Protocol. Table of Contents
Table of Contents Table of Contents Chapter 1 IP Address Configuration Commands... 1-1 1.1 IP Address Configuration Commands... 1-1 1.1.1 display ip host... 1-1 1.1.2 display ip interface... 1-1 1.1.3
More informationVSB Backup and Recovery
CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,
More informationUser and System Administration
CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays
More informationHPE ilo Federation User Guide for ilo 5
HPE ilo Federation User Guide for ilo 5 Abstract This guide explains how to configure and use the HPE ilo Federation features. It is intended for system administrators, Hewlett Packard Enterprise representatives,
More informationMultiprocessor WAN Application Module
1 CHAPTER This chapter describes the (MWAM) and includes the following sections: Product Overview, page 1-2 MWAM Ordering Information, page 1-2 Hardware Description, page 1-3 Functional Description, page
More informationConfiguring Virtual Service Blades
CHAPTER 4 This chapter describes how to create and configure virtual service blades and includes the following sections: Information About Virtual Service Blades, page 4-1 Guidelines and Limitations, page
More informationXPort Pro Command Reference
XPort Pro Command Reference Part Number 900-558 Revision A September 2009 Copyright & Trademark 2009, Lantronix. All rights reserved. No part of the contents of this book may be transmitted or reproduced
More informationConfiguring and Managing Embedded Event Manager Policies
Configuring and Managing Embedded Event Manager Policies The Cisco IOS XR Software Embedded Event Manager (EEM) functions as the central clearing house for the events detected by any portion of the Cisco
More informationUsing NetFlow Sampling to Select the Network Traffic to Track
Using NetFlow Sampling to Select the Network Traffic to Track This module contains information about and instructions for selecting the network traffic to track through the use of NetFlow sampling. The
More informationPerforming Path Traces
About Path Trace, page 1 Performing a Path Trace, page 13 Collecting QoS and Interface Statistics in a Path Trace, page 15 About Path Trace With Path Trace, the controller reviews and collects network
More informationDetects Potential Problems. Customizable Data Columns. Support for International Characters
Home Buy Download Support Company Blog Features Home Features HttpWatch Home Overview Features Compare Editions New in Version 9.x Awards and Reviews Download Pricing Our Customers Who is using it? What
More informationChapter 5 Privileged EXEC Commands
Chapter 5 Privileged EXEC Commands 10gig copy Upgrades the Field-Programmable Gate Arrays (FPGAs) on a 10 Gigabit Ethernet module. Syntax: 10gig copy tftp [module ] tftp parameter
More informationChapter 6 Global CONFIG Commands
Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information
More informationUser and System Administration
CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical
More informationSCA Reporter Templates
APPENDIXD This appendix describes the Cisco Service Control Application Reporter (SCA Reporter) report templates. Information About Report Templates, page D-1 Global Monitoring Template Group, page D-7
More informationIntroduction to Traffic Processing
This chapter describes how the Cisco SCA BB installed on a Cisco Service Control Engine (Cisco SCE) platform processes traffic. The chapter also describes the main elements (service configuration entities)
More informationNo Service Password-Recovery
No Service Password-Recovery Last Updated: January 18, 2012 The No Service Password-Recovery feature is a security enhancement that prevents anyone with console access from accessing the router configuration
More informationUsing the Command Line Interface
CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs
More informationConfiguring Health Monitoring
CHAPTER1 This chapter describes how to configure health monitoring on the ACE to track the state of a server by sending out probes. Also referred to as out-of-band health monitoring, the ACE verifies the
More informationI through R. IP SLA Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) 1
I through R icmp-echo, page 2 icmp-jitter, page 4 ip sla, page 6 ip sla group schedule, page 9 ip sla logging traps, page 17 ip sla low-memory, page 19 ip sla reaction-trigger, page 21 ip sla reset, page
More informationUsing Debug Commands on Cisco IOS XR Software
Using Debug Commands on Cisco IOS XR Software This document describes how to use the Cisco IOS XR software debug commands to monitor system operations and troubleshoot errors. Contents Listing Available
More informationConfiguring System Message Logging
This chapter contains the following sections: Information About System Message Logging, page 1 Licensing Requirements for System Message Logging, page 2 Guidelines and Limitations for System Message Logging,
More informationCommand Reference for Firepower Threat Defense 1
t-z tail-logs, page 2 test aaa-server, page 4 traceroute, page 6 undebug, page 9 verify, page 11 vpn-sessiondb logoff, page 15 write net, page 16 write terminal, page 17 1 tail-logs t - z tail-logs To
More informationIBM Security Access Manager Version Appliance troubleshooting topics
IBM Security Access Manager Version 8.0.0.5 Appliance troubleshooting topics IBM Security Access Manager Version 8.0.0.5 Appliance troubleshooting topics ii IBM Security Access Manager Version 8.0.0.5:
More informationConfiguring Port-Based Traffic Control
Overview of Port-Based Traffic Control, page 2 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Finding Feature Information, page 9 Information
More informationConfiguring Traffic Policies
CHAPTER 11 Date: 4/23/09 Cisco Application Networking Manager helps you configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing through
More informationmatch protocol http cookie (cookie map submode)
Chapter 2 22 match protocol http cookie (cookie map submode) match protocol http cookie (cookie map submode) To add cookies to a cookie map, use the match protocol http cookie command in SLB cookie map
More informationIdentity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)
Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) First Published: January 29, 2013 Last Modified: January 29, 2013 Americas Headquarters Cisco Systems,
More informationInformation About Service Configuration Entities CSV File Formats
CHAPTER 5 CSV File Formats Revised: October 21, 2011, Introduction The Cisco Service Control Application for Broadband (SCA BB) provides several types of Comma-Separated Value (CSV) flat files that you
More informationLogging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.
This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System
More informationSAMI Cisco IOS PPC Commands
APPENDIXC The following commands, listed in alphabetical order, are introduced or modified for the Cisco SAMI Cisco IOS PPCs and are supported at the SAMI Cisco IOS PPC console: clear sami ixp statistics
More informationConfiguring the Cisco IOS XE DHCP Server
Configuring the Cisco IOS XE DHCP Server Last Updated: December 20, 2011 Cisco routers running Cisco IOS XE software include Dynamic Host Configuration Protocol (DHCP) server and relay agent software.
More informationUser Guide Addendum for the Avaya P550R and P880 Multiservice Switches, Software Version 5.3.2
User Guide Addendum for the Avaya P550R and P880 Multiservice Switches, Software Version 5.3.2 Overview New Software Features This addendum provides information and procedures that will be added to later
More informationK2289: Using advanced tcpdump filters
K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering
More informationAntiLogReader Command Line Application User Guide
AntiLogReader Command Line Application User Guide DOC/AntiLog/UG/2006004_1.0 13-Jul-2006 G Hatto (c) Anticyclone Systems Limited DOC/AntiLog/UG/2006004_1.0 Page 1 of 11 Copyright (c) Anticyclone Systems
More informationHigh Availability Synchronization PAN-OS 5.0.3
High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...
More informationAppendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.
Appendix A GLOSSARY SYS-ED/ Computer Education Techniques, Inc. $# Number of arguments passed to a script. $@ Holds the arguments; unlike $* it has the capability for separating the arguments. $* Holds
More informationWorking With Configuration Files
CHAPTER 15 This chapter describes how to use commands that show, copy, and erase the configuration file. It contains the following sections: Displaying the Current Configuration, page 15-1 Displaying the
More informationConfiguring Port-Based Traffic Control
CHAPTER 22 This chapter describes how to configure the port-based traffic control features on the Cisco ME 3400 Ethernet Access switch. For complete syntax and usage information for the commands used in
More informationWLM1200-RMTS User s Guide
WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................
More informationBefore Contacting Technical Support
APPENDIXA This appendix describes the steps to perform before calling for technical support for any Cisco MDS 9000 Family multilayer director and fabric switch. This appendix includes the following sections:
More informationDHCP Server RADIUS Proxy
The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies
More informationUNIX System Administration
$!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...
More informationNortel Secure Router 2330/4134 Configuration SIP Survivability. Release: 10.2 Document Revision: NN
Configuration SIP Survivability Release: 10.2 Document Revision: 01.01 www.nortel.com NN47263-510. . Release: 10.2 Publication: NN47263-510 Document release date: 7 September 2009 While the information
More informationManaging Services Modules
CHAPTER 58 This chapter describes how to manage the following module types: Security Services Cards (SSCs) Security Services Modules (SSMs) Security Services Processors (SSPs) Modules run advanced security
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationTroubleshooting the Security Appliance
CHAPTER 43 This chapter describes how to troubleshoot the security appliance, and includes the following sections: Testing Your Configuration, page 43-1 Reloading the Security Appliance, page 43-6 Performing
More informationCCNA 1 Chapter 6 v5.0 Exam Answers 2013
CCNA 1 Chapter 6 v5.0 Exam Answers 2013 1 After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router
More informationFlash Devices in the Cisco MDS 9000 Supervisor Module. External CompactFlash in the Cisco MDS 9000 Supervisor Module.
CHAPTER 4 This chapter lists the information you need to have before you begin using your MDS 9000 Switch. For information on setting up the switch and doing an initial configuration, refer to the Cisco
More informationDCLI User's Guide. Data Center Command-Line Interface
Data Center Command-Line Interface 2.10.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit
More informationConfiguring Port-Based Traffic Control
Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page
More informationTraffic Processing Overview
CHAPTER 3 Traffic Processing Overview Revised: August 08, 2013, Introduction This chapter describes how the Cisco SCA BB installed on a Service Control Engine (SCE) platform processes traffic. The chapter
More information