Cisco Global Site Selector CLI Commands

Size: px
Start display at page:

Download "Cisco Global Site Selector CLI Commands"

Transcription

1 Cisco Global Site Selector CLI Commands CHAPTER 2 This chapter provides detailed information for the following types of Global Site Selector (GSS) CLI commands: General commands that you can enter after you log in to the GSS in user EXEC and privileged EXEC modes. Global configuration commands that you enter after you log in to the GSS in privileged EXEC mode. Interface configuration commands that you enter after logging in to the GSS in privileged EXEC mode. Global server load-balancing configuration commands that you enter after logging in to the GSS in privileged EXEC mode. Domain and source address list commands that you enter after you access the global server load-balancing configuration mode. Answer and answer group commands that you enter after you access the global server load-balancing configuration mode. Domain Name System (DNS) rule configuration commands that you enter after you access the global server load-balancing configuration mode. DNS sticky configuration commands that you enter after you access the global server load-balancing configuration mode. Proximity configuration commands that you enter after you access the global server load-balancing configuration mode. 2-1

2 General Commands Chapter 2 The documentation of each command contains the following information: Command Syntax Information about the correct structure and syntax for the command Detailed information that describes the purpose of the command and its proper application Examples Command syntax as it appears in a CLI session Other CLI commands with a purpose that is closely related to or dependent on the current command For more information about accessing a CLI session and using CLI commands, see Chapter 1, Using the Command-Line Interface. General Commands The following general commands are available to you immediately after you log in to a GSS. The commands that you can access depend on your permission level. User EXEC permission level provides access to the following commands and any associated no forms: cd ls dir ping dnslookup pwd enable scp exit show ftp tail help telnet lls type 2-2

3 Chapter 2 General Commands Privileged EXEC permission level provides access to all general commands. You can also access commands in the following modes: global configuration, interface configuration, global server load-balancing configuration, and subordinate global server load-balancing configuration modes. 2-3

4 General Commands Chapter 2? To display a list of the available commands and syntax options, use the? command.? This command has no keywords or arguments. All command modes This command displays the commands and syntax options available to you at the point at which you enter the command. For additional background on the use of GSS help, see Chapter 1, Using the Command-Line Interface. Examples The following example shows how to display a list of the available commands and syntax options: gss1.example.com>? cd Change directory cnr CNR Related commands dir Directory list ddos DDoS exec commands dnslookupresolve hostname (DNS) enable Turn on privileged commands exit Exit from the EXEC ftp Open FTP session to host help Description of the interactive help system lls list files in long info ls Directory list ping Ping a remote host pwd Show present working directory scp SecureCopy files [scp from to] show Show running system information tail Display last 10 lines of a file telnet Open telnet session to host type View a file 2-4

5 Chapter 2 General Commands host(config)# show? access-group Configure access lists access-list Configure access lists arp Display system ARP cache boot-config Display bootable GSS software images clock Display system clock ddos DDoS exec commands disk Display disk information ftp Display ftp status gslb-config Show configuration for gslb objects gslb-errors Show errors during most recent script-play interface Configure interface inventory Show inventory information ip Display IP information license Show license information logging Configure system logging logs Display GSS system log memory Display memory information ntp NTP service control processes Display processes on system properties Display system properties proximity Display Proximity subsystem information running-config Show running configuration services Display status of basic services snmp Display SNMP information ssh Display SSH status startup-config Show startup configuration statistics Display statistics sticky Display Sticky Database information system-status Report status of GSS tacacs Display TACACS+ configuration tech-support Display information useful to Cisco TAC telnet Display telnet status terminal-lengthdisplay terminal-length uptime Display system uptime user Display user information users Display configured users version Display system version help 2-5

6 General Commands Chapter 2 cd To change the directory, use the cd command. cd directoryname directoryname Name of the directory. User and privileged EXEC Use this command to maneuver between directories and for file management. The directory name becomes the default prefix for all relative paths. Relative paths do not begin with a slash (/). Absolute paths begin with a slash (/). Enter cd.. to move to the directory that is one level higher than the one that you are in. Examples The following example shows the relative path: gss1.example.com> cd local1 The following example shows the absolute path: gss1.example.com> cd /local1 dir lls ls lsof pwd 2-6

7 Chapter 2 General Commands clear To reset GSS statistics for a specific subsystem, use the clear command. clear statistics {boomerang ddos [all attacks drops global ] dns drpagent keepalive {all cra http-head icmp kalap ns tcp} proximity sticky {mesh} tacacs} statistics Resets load-balancing statistics on the GSS. boomerang Resets statistics that relate to the boomerang server component of the GSS. ddos Resets statistics that relate to the Distributed Denial of Service (DDoS) detection and mitigation component of the GSS. global (Optional) Resets global statistics that relate to the GSS DDoS detection and mitigation component. attacks (Optional) Resets attack statistics that relate to the GSS DDoS detection and mitigation component. dns Resets statistics that relate to the Domain Name System (DNS) server component of the GSS, including proximity and sticky DNS rule statistics. dpragent Resets statistics that relate to the DRP agent component of the GSS. keepalive Resets statistics that relate to the keepalive function of the GSS software. all Resets statistics for all keepalive types maintained by the GSS. cra Resets statistics for only content routing agent (CRA)-type keepalives maintained by the GSS. http-head Resets statistics for only the VIP HTTP-HEAD type keepalive maintained by the GSS. icmp Resets statistics for only the VIP ICMP-type keepalive maintained by the GSS 2-7

8 General Commands Chapter 2 kalap ns scripted-kal tcp proximity sticky mesh tacacs Resets statistics for only the VIP KAL-AP-type keepalive maintained by the GSS. Resets statistics for the Name Server-type keepalive maintained by the GSS. Resets statistics for the Scripted-Kal-type keepalive maintained by the GSS. Resets statistics for the IP and port TCP-type keepalive maintained by the GSS. Resets statistics for the network proximity function. Resets statistics for the DNS sticky function. Resets mesh and session statistics for the local GSS node of the global sticky mesh. Resets TACACS+GSSM statistics. Privileged EXEC Use the clear command to reset global server load-balancing statistics for one or more of your GSS components. Clearing the statistics for a GSS component will erase all record of routing activity and performance for that device. Examples The following example shows how to use the clear command: gss1.example.com# clear statistics boomerang Are you sure? (yes/no) yes gss1.example.com# clear statistics dns Are you sure? (yes/no) yes cra keepalive statistics cleared gss1.example.com# clear statistics keepalive kalap Are you sure? (yes/no) yes kal-ap keepalive statistics cleared gss1.example.com# clear statistics proximity Are you sure? (yes/no) yes proximity statistics cleared 2-8

9 Chapter 2 General Commands clear ddos-config To clear the configuration from the Distributed Denial of Service (DDoS) detection and mitigation subsystem, use the clear ddos-config command. clear ddos-config This command has no keywords or arguments. Privileged EXEC Examples The following example shows how to clear the configuration from the DDoS detection and mitigation subsystem: gss1.example.com# clear ddos-config gss1.example.com# 2-9

10 General Commands Chapter 2 clock To perform the following actions, use the clock command: Read the hardware calendar into the system clock Set the current time or time zone for a GSS device Set daylight saving time to some predefined summer time Reset the GSS to synchronize log time stamps to a new time zone Update the hardware calendar from the system clock Set a user-defined daylight saving time Specify a user-defined time zone clock {read-calendar set hh:mm:ss MONTH DD YYYY summer-time timezone timezone timezonename update-calendar user-summer-time summer-time name start time start day start week start month end time end day end week end month offset user-timezone timezone name hour_offset minute_offset} read-calendar Reads the hardware calendar into the system clock. You can use this command when the system clock is reset through NTP and you want to revert back to using the hardware clock. set Sets the device clock to the date and time provided. hh:mm:ss Current time to which the GSS device clock is being reset. Specify one or two digits for the hours, minutes, and seconds. 2-10

11 Chapter 2 General Commands MONTH DD YYYY summer-time timezone timezone Current date to which the GSS device clock is being reset. Specify the full name of the month, one or two digits for the day, and four digits for the year. The following month names are recognized: January February March April May June July August September October November December Sets daylight saving time to some predefined summer times. Name of the predefined time zone. The following time zones are recognized: ADT (Atlantic Daylight Time) AKDT (Alaska Standard Daylight Time) CDT (Central Daylight Time) EDT (Eastern Daylight Time) MDT (Mountain Daylight Time) PDT (Pacific Daylight Time) Resets the GSS to synchronize log time stamps to a new time zone. 2-11

12 General Commands Chapter 2 timezonename update-calendar user-summer-time summer-time name start time start day start week Name of the timezone. Enter? to list all supported time zones, countries, continents, and cities. The following options are available to set the local time zone for your GSS: Standard time zone (for example, GMT, EST, UTC) Country or part of a continent (for example, America, Europe, Egypt) Specific city (for example, New York, Paris) Updates the hardware calendar from the system clock. You can use this command when the system clock is reset through NTP and you want to synchronize the system time with the hardware clock. Sets a user-defined daylight saving time. Name of the user-defined summer time. Start time for the user-defined summer time in hours and minutes. Values from 0 23 are recognized. Start day for the user-defined summer time.the following days are recognized: Friday Saturday Sunday Monday Tuesday Wednesday Thursday Start week for the user-defined summer time. Values from 1 5 are recognized. 2-12

13 Chapter 2 General Commands start month end time end day end week Start month for the user-defined summer time. The following month names are recognized: January February March April May June July August September October November December End time for the user-defined summer time in hours and minutes. Values from 0 23 are recognized. End day for the user-defined summer time. The following days are recognized: Friday Saturday Sunday Monday Tuesday Wednesday Thursday End week for the user-defined summer time. Values from 1 5 are recognized. 2-13

14 General Commands Chapter 2 end month offset user-timezone timezone name hour_offset minute_offset End month for the user-defined summer time. The following month names are recognized: January February March April May June July August September October November December Offset (in minutes) for the user-defined time zone. Values from are recognized. Specifies a user-defined time zone. Name of the user-defined time zone. Hour offset for the user-defined time zone. Values from 23 to +24 are recognized. Minute offset for the user-defined time zone. Values from 0 59 are recognized. Note The clock update-calendar and read-calendar commands allow you to synchronize the hardware clock and system clock without reloading the GSS. Privileged EXEC, global configuration, and interface configuration. 2-14

15 Chapter 2 General Commands If you previously enabled NTP on a GSS using the ntp enable command, the GSS prevents you from using the clock set command and displays an error message. If you want to manually set the clock for the GSS, first disable NTP using the no ntp enable command before setting the clock. Examples The following example shows how to set the GSS device time: gss1.example.com# clock set 13:01:05 sept gss1.example.com# clock timezone GMT The following example shows how to set the GSS time zone: gss1.example.com# clock timezone europe paris The following example shows how to set a user-defined time zone on the GSS: gss1.example.com# clock user-timezone EST -5 0 Please restart the GSS (reload) to sync log timestamps to new timezone. The following example shows how to set the user-defined summer time on the GSS: gss1.example.com# clock user-summertime EDT 2:00 Sunday 1 April 2:00 Sunday 5 October 60 Timezone set Please restart the GSS (reload) to sync log timestamps to new timezone. The following example shows how to update the hardware calendar from the system clock: gss1.example.com# clock update-calendar The following example shows how to read the hardware calendar into the system clock: gss1.example.com# clock read-calendar 2-15

16 General Commands Chapter 2 configure To enter global configuration mode, use the configure command. configure This command has no keywords or arguments. Privileged EXEC To exit global configuration mode, use the end or exit commands, or by pressing the Ctrl-Z key sequence. Examples The following example shows how to enter global configuration mode: gss1.example.com# configure gss1.example.com(config)# end exit 2-16

17 Chapter 2 General Commands copy To copy configuration settings to or from the GSS device, use the copy command. copy {ddos-config disk filename disk startup-config filename gslb-config disk filename startup-config disk filename running-config [disk filename startup-config]} ddos-config disk filename disk startup-config gslb-config disk startup-config disk running-config disk running-config startup-config Copies the Distributed Denial of Service (DDoS) configuration file to a named file on disk. Name of the output file containing the GSLB-configuration, startup-configuration or running-configuration information. Loads the GSS device startup configuration settings from a named file located on the GSS. Copies the global server load-balancing configuration to a named file on the GSS. Copies the GSS device startup configuration to a named file on the GSS. Copies the GSS device current running configuration to a named file on the GSS. Copies the GSS device current running configuration as the new startup configuration. Privileged EXEC When supplying an output filename enter the name only. Do not include path information with the filename. 2-17

18 General Commands Chapter 2 Examples The following examples show that the copy command is used to load a new startup configuration to the device from a file and to copy the current running configuration to a file: gss1.example.com# copy disk startup-config configfile gss1.example.com# copy running config disk runconfigfile ftp scp 2-18

19 Chapter 2 General Commands cnr To enter the Cisco Network Registrar (CNR) command line interface (the nrcmd program), use the cnr command. cnr This command has no keywords or arguments. Privileged EXEC Note Before entering nrcmd, you must first install and enable CNR. Upon successful execution of this command, you are prompted for a username and password. See the Cisco Network Registrar CLI Reference Guide v6.2 for instructions about using the CNR configuration mode commands. Examples The following example shows how to enter CNR configuration mode: gssm1.example.com# cnr username: <user_name> password: ****** 100 OK session: cluster = localhost current-vpn = global default-format = user groups = superuser roles = superuser scope-edit-mode = staged user-name = admin visibility =

20 General Commands Chapter 2 zone-edit-mode = synchronous nrcmd> cnr enable cnr install/uninstall cnr shell 2-20

21 Chapter 2 General Commands cnr install/uninstall To install Cisco Network Registrar (CNR) on your GSS, use the cnr install command. To uninstall CNR, use the cnr uninstall command instead. cnr install cnr-package cnr uninstall cnr-package Name of the CNR package. Note You can install CNR without first obtaining the GSS license for the CNR module. It is not mandatory to have both the license file for installing CNR on the GSS and the CNR software package itself. The CNR software package contains the response file for silent installation, config_cnr, which configures the CNR ports that listen to the GSS. Privileged EXEC For information about installing and activating the CNR software, see the Cisco Global Site Selector Administration Guide. Examples The following example shows how to install the CNR package on the GSS: gssm1.example.com# cnr install cnr_pak.tar The following example shows how to uninstall the CNR package: gssm1.example.com# cnr uninstall 2-21

22 General Commands Chapter 2 cnr enable cnr cnr shell 2-22

23 Chapter 2 General Commands cnr shell To enter the restricted Cisco Network Registrar (CNR) shell and execute the available CNR utilities, use the cnr shell command. cnr shell This command has no keywords or arguments. Privileged EXEC Upon successful execution of this command, you can press the Tab key to see the available utilities in the CNR shell. You can then execute any of these utilities by entering the utility name. See the Cisco CNS Network Registrar User s Guide for more information about the available utilities. Examples The following example shows how to enter the CNR shell, display the utilities, and then execute the cnr_tactool utility: gssm1.example.com# cnr shell cnr shell> cnr <Tab> cnr_exim cnr_tactool.origcnrdb_load cnrdb_verify cnr_exim.orig cnrdb_archive cnrdb_printlog cnrservagt cnr_keygen cnrdb_checkpoint cnrdb_recover cnrsnmp cnr_keygen.origcnrdb_deadlock cnrdb_stat cnr_tactool cnrdb_dump cnrdb_upgrade cnr shell > cnr shell cnr shell> cnr shell> cnr_tactool user: password: cnr enable cnr cnr install/uninstall 2-23

24 General Commands Chapter 2 ddos peacetime Different Domain Name System (DNS) zones may exhibit different behavior. A high traffic rate on one D-proxy may be perfectly normal for another. A peacetime learning process is required on the GSS. To configure peacetime learning in the GSS, use the ddos peacetime command and its related commands. ddos peacetime [apply [increment overwrite] database erase save filename show [filename status] start stop] apply [increment overwrite] database erase See the ddos peacetime apply command for a detailed syntax description. See the ddos peacetime database erase command for a detailed syntax description. save filename See the ddos peacetime save command for a detailed syntax description. show [filename status] See the ddos peacetime show command for a detailed syntax description. start stop See the ddos peacetime show command for a detailed syntax description. See the ddos peacetime stop command for a detailed syntax description. 2-24

25 Chapter 2 General Commands ddos peacetime apply To apply values learned during the peacetime learning process to the rate-limit database, use the ddos peacetime apply command. ddos peacetime apply [increment overwrite] increment overwrite Specifies that you want to apply the peacetime learned values incrementally to the database. Specifies that you want to restore all the values in the rate-limit database to their defaults and then update them with the values learned during peacetime. Privileged EXEC This command updates the rate-limit database with the peacetime learned values. The peacetime database location is specified in the (config-ddos) peacetime database command. If you do not specify this command, the in-memory database is used instead. Examples The following example shows how to apply values learned during the peacetime learning process to the rate-limit database: gssm1.example.com# ddos peacetime apply increment gssm1.example.com# ddos peacetime database erase ddos peacetime save ddos peacetime show ddos peacetime stop ddos restore-defaults 2-25

26 General Commands Chapter 2 ddos peacetime database erase To erase peacetime learning, use the ddos peacetime database erase command. ddos peacetime database erase This command has no keywords or arguments. Privileged EXEC Examples The following example shows how to erase peacetime learning: gssm1.example.com# ddos peacetime database erase gssm1.example.com# ddos peacetime apply ddos peacetime save ddos peacetime show ddos peacetime stop ddos restore-defaults 2-26

27 Chapter 2 General Commands ddos peacetime save To save peacetime learning to the memory or to a file on a disk, use the ddos peacetime save command in privileged EXEC mode. ddos peacetime save filename filename Name of the file on the disk to which you want to save peacetime learning. Privileged EXEC Examples The following example shows how to save peacetime learning: gssm1.example.com# ddos peacetime save samplefile gssm1.example.com# ddos peacetime apply ddos peacetime database erase ddos peacetime show ddos peacetime stop ddos restore-defaults 2-27

28 General Commands Chapter 2 ddos peacetime show To show values learned during the peacetime learning process or show the peacetime learning status, use the ddos peacetime show command. ddos peacetime show [filename status] filename status (Optional) Filename of the peacetime learning process that you want do display values. (Optional) Specifies that you want to display the current peacetime learning status. Privileged EXEC Examples The following example shows how to display the peacetime status: gssm1.example.com# ddos peacetime show status DDoS Peacetime Learning is running. gssm1.example.com# ddos peacetime apply ddos peacetime database erase ddos peacetime save ddos peacetime show ddos peacetime stop ddos restore-defaults 2-28

29 Chapter 2 General Commands ddos peacetime start To start the peacetime learning process, use the ddos peacetime start command. ddos peacetime start This command has no keywords or arguments. Privileged EXEC This command incrementally updates the values in the peacetime database. Examples The following example shows how to start peacetime learning: gssm1.example.com# ddos peacetime start gssm1.example.com# ddos peacetime apply ddos peacetime database erase ddos peacetime save ddos peacetime stop ddos peacetime show ddos restore-defaults 2-29

30 General Commands Chapter 2 ddos peacetime stop To stop peacetime learning, use the ddos peacetime stop command. ddos peacetime stop This command has no keywords or arguments. Privileged EXEC Examples The following example shows how to stop peacetime learning: gssm1.example.com# ddos peacetime stop gssm1.example.com# ddos peacetime apply ddos peacetime database erase ddos peacetime save ddos peacetime show ddos peacetime start ddos restore-defaults 2-30

31 Chapter 2 General Commands ddos restore-defaults To restore the default rate-limit values in the rate-limit database, use the ddos restore-defaults command. ddos restore-defaults ipaddress ipaddress D-proxy IP address. Indicates that you want to restore the rate limit of the designated D-proxy to the default rate and the state to Unknown. Privileged EXEC Examples The following example shows how to restore the defaults in the rate-limit database: gssm1.example.com# ddos restore-defaults gssm1.example.com# ddos peacetime apply ddos peacetime database erase ddos peacetime save ddos peacetime show ddos peacetime stop ddos peacetime start 2-31

32 General Commands Chapter 2 del To delete files from your GSS device, use the del command. del filename filename Name of the file to be deleted. Privileged EXEC Examples The following example shows how to delete files from your GSS device: gss1.example.com> enable gss1.example.com# del oldtechrept.tgz gss1.example.com# copy dir lls ls 2-32

33 Chapter 2 General Commands dir To view a long list of files in a directory, use the dir command. dir [directory] directory (Optional) Name of the directory to list. User and privileged EXEC Use this command to view a detailed list of files contained within the working directory, including names, sizes, and the time created. The equivalent command is lls. The current directory is the default directory. Examples The following example shows how to view a long list of files in a directory: gss1.example.com# dir total drwxrwxrwx 3 root root 4096 Oct 8 11:09. drwxrwxrwx 19 root root 4096 Oct 8 11:13.. drwx root root 4096 Jan ssh -rw-r--r-- 1 root root Jan ACR_new.upg -rw-r--r-- 1 root root Jan ACR_new1.upg -rw-r--r-- 1 root root Jan ACR_new2.upg -rw-r--r-- 1 root root Jan gss k9.upg -rw-r--r-- 1 root root Jan gss k9.upg -rw-r--r-- 1 root root Oct 8 10:54 gss k9.upg -rw-r--r-- 1 root root 2520 Oct 8 11:09 one -rw-r--r-- 1 root root 3634 Oct 8 11:06 proximityschema.xsd -rw-r--r-- 1 root root 3523 Oct 8 11:07 stickyschema.xsd gss1.example.com# 2-33

34 General Commands Chapter 2 lls ls pwd 2-34

35 Chapter 2 General Commands disable To turn off privileged EXEC mode, use the disable command. disable This command has no keywords or arguments. Privileged EXEC The disable command places you in user EXEC mode. To turn privileged EXEC mode back on, use the enable command. Examples The following example shows how to turn off privileged EXEC mode: gss1.example.com# disable gss1.example.com> enable exit 2-35

36 General Commands Chapter 2 dnslookup To resolve a host or domain name to an IP address, use the dnslookup command. dnslookup {hostname domainname} hostname domainname Name of the host on the network. Domain name. User and privileged EXEC Examples The following examples show how the dnslookup command is used to resolve the hostname myhost.cisco.com to IP address , cisco.com to IP address , and the IP address to gss.cisco.com: gss1.example.com# dnslookup myhost.cisco.com Server: mydnsserver.cisco.com Address: Name: myhost.cisco.com Address: gss1.example.com# dnslookup cisco.com Server: dns-bxb.cisco.com Address: Name: Address: gss1.example.com# dnslookup Server: dns-bxb.cisco.com Address: Name: gss.cisco.com Address:

37 Chapter 2 General Commands enable To access privileged EXEC commands, use the enable command. enable This command has no keywords or arguments. User and privileged EXEC To access privileged EXEC mode from user EXEC mode, use the enable command. The disable command takes you from privileged EXEC mode to user EXEC mode. Examples The following example shows how to access privileged EXEC commands: gss1.example.com> enable gss1.example.com# disable exit 2-37

38 General Commands Chapter 2 end To exit the EXEC or global configuration command shell, use the end command. end This command has no keywords or arguments. EXEC and global configuration Use the end command in any configuration mode to return to EXEC mode. This command is equivalent to pressing Ctrl-Z or using the exit command. The end command entered in the user-level EXEC shell terminates the console or Telnet session. Examples The following example shows how to exit the EXEC or global configuration command shell: gss1.example.com(config)# end gss1.example.com# end gss1.example.com> exit 2-38

39 Chapter 2 General Commands exit To access the EXEC command shell from the global or interface configuration command shells, use the exit command. exit This command has no keywords or arguments. All command modes Use the exit command in any configuration mode to return to EXEC mode. This command is equivalent to the end command or pressing Ctrl-Z. The exit command entered in the user-level EXEC shell terminates the console or Telnet session. Examples The following example shows how to access the EXEC command shell from the global or interface configuration command shells: gss1.example.com(config)# exit gss1.example.com# exit gss1.example.com> end 2-39

40 General Commands Chapter 2 ftp To launch an FTP session on your GSS device, use the ftp command. ftp ip_or_host ip_or_host IP address or hostname of the FTP server that you want to access. Enter an IP address in dotted-decimal notation (for example, ) or a mnemonic hostname (for example, myhost.mydomain.com). User EXEC and privileged EXEC Use the ftp command in EXEC mode to launch the FTP client and transfer a file to and from remote machines. Examples The following example shows how to launch an FTP session on your GSS device: gss1.example.com# ftp ftp enable show telnet telnet scp 2-40

41 Chapter 2 General Commands gss To manage your GSS devices, use the gss command. gss {disable enable {gssm-primary gssm-standby {primary_gssm_hostname primary_gssm_ip_address} gss {primary_gssm_hostname primary_gssm_ip_address} restart start status [verbose] stop} disable Disables the selected device (GSSM or GSS) and removes any existing configuration, including deleting the Global Site Selector Manager (GSSM) database from the GSS device and removing certificate attributes specified using the certificate set-attributes command. This keyword returns the GSS device to the initial, disabled state. Disabling a GSS device is only necessary when you want to switch the role of a GSS within a network (for example, change a GSS to a GSSM or if you need to move a GSS or GSSM to a different network of GSS devices. enable Enables the selected device to act as the type of device that you specify: either a GSSM or GSS. This keyword creates the embedded database on the primary GSSM that stores and manages the configuration information for the GSS network. It also performs all of the other initialization processes to enable the device in a network of GSS devices. Enabling a GSS device is a one-time initialization step that is required only when you first set up the device within a network of GSS devices. 2-41

42 General Commands Chapter 2 gssm-primary gssm-standby primary_gssm_hostname primary_gssm_ip_address gss restart start status Configures the selected device to act as the primary GSSM for your GSS network, responsible for maintaining status information about GSS devices and load-balancing information that is distributed to devices on the network. Configures the selected device to act as a standby GSSM which will take over GSS network management should the primary GSSM go offline. Domain Name System (DNS) hostname of the device currently serving as the primary GSSM. Network address of the device currently serving as the primary GSSM. Indicates that the selected device should function as a GSS on the GSS network. Stops and restarts the GSS software on the selected device. Starts the GSS software on the selected device following the initial configuration or a software upgrade. Displays detailed information about the current operating state of the GSS device including the online status, the software version, and the start date or time for the various components. The equivalent command is the show system-status command. Note The status of the License Manager (LM) and the Distributed Denial of Service (DDoS) prevention module do not appear in the output of the gss status command. Instead, you enter the show ddos status command to obtain DDoS information and the show processes grep license_manager command to obtain the LM status. 2-42

43 Chapter 2 General Commands verbose stop (Optional) Displays the same detailed information about the current operating state of the GSS device as with the gss status command, including the CPU utilization. Note Calculating the CPU utilization can take additional time when using the gss status verbose command. On a busy system, the gss status verbose command can take approximately 10 seconds to complete. If you do not require calculation of the CPU Utilization operating parameter, then we recommend that you use the gss status command. Stops the GSS software before a software upgrade, maintenance, or troubleshooting activities. Privileged EXEC The gss command provides a variety of options for managing your GSSs and GSSMs, including: Designating individual devices to act as a GSS, primary GSSM, or standby GSSM using the gss, gssm-primary, or gssm-standby keywords of the gss command. Controlling the GSS servers on the device so that you can perform the required maintenance and software upgrades using the start, stop, and restart commands. Examples The following example shows how to manage your GSS devices: gssm1.example.com# gss status Cisco GSS - 1.2(2) GSS [Thu Mar 31 21:09:09 UTC 2005] Registered to primary GSSM:

44 General Commands Chapter 2 Normal Operation [runmode = 5] START SERVER Nov30 Boomerang Nov30 Config Agent (crdirector) Nov30 Config Server (crm) Nov30 DNS Server Nov30 Database Nov30 GUI Server (tomcat) Nov30 Keepalive Engine Nov30 Node Manager Nov30 Proximity Nov30 Sticky Nov30 Web Server (apache) Nov30 DRP When the DNS server is ready to serve DNS requests, it generates the following subsystem log message and saves it in the system.log file: Mar 25 10:45:26 gssm1.example.com DNS-5-SELREADYINFO[2073] Selector ready to start serving DNS requests gss tech-report gssm show sticky show sticky global 2-44

45 Chapter 2 General Commands gss tech-report To generate a detailed report for use by Cisco Technical Assistance Center (TAC) representatives in troubleshooting persistent GSS problems, use the gss tech-report command. gss tech-report filename filename User-assigned name for the report generated by the gss tech-report command. Privileged EXEC The file generated is a tar- format archive file with a.tgz extension. Examples The following example shows how to generate a detailed report for use by TAC representatives in troubleshooting persistent GSS problems: gss1.example.com# gss stop gss1.example.com# gss tech-report gss_techrpt1 Creating report for Cisco TAC. This may take a few minutes... Created debug package: /home/techrpt1.tgz Use scp/ftp to retrieve. 2-45

46 General Commands Chapter 2 gssm To manage your primary and standby Global Site Selector Manager (GSSM) (GSSM) and your GSS database, use the gssm command. gssm backup full filename database {invalidate maintain purge-log-records {count number_records days number_days} report status validate} primary-to-standby restore filename standby-to-primary backup Performs a backup of GSSM data on the GSS device. full Performs a backup of both the database component of the GSSM and its network and device configuration information. The primary GSSM backup does not include user files that reside in the /home directory. filename Name of the database backup file. This file can be the target file for a database backup action or the source file for a database restore action. database Creates, configures, or removes the embedded database on the GSSM. invalidate Invalidates GSSM database records. maintain Cleans up the GSSM database by defragmenting and optimizing the space allocation. purge-log-records Purges system log messages from the GSSM database for a specified number or period of time. This keyword removes the system log messages that appear on the primary GSSM GUI, the System Log list page of the Tools navigation tab. count Purges a quantity of database records up to the last n records. number_records Number of database system log records, starting back from the last record, that will be retained when the database is purged. days Purges records that cover a set time period up to n days before today. 2-46

47 Chapter 2 General Commands number_days report status validate primary-to-standby restore filename standby-to-primary Number of days back, starting from today, for which database system log records will be retained when the database is purged. Generates and displays a report that identifies invalidated database records in the GSSM database. Reports the current running status of the GSSM database. Validates GSSM database records. Changes the role of the GSSM from the primary to the standby GSSM. Restores the GSSM from a full backup file. Name of the GSSM backup image that will be used to restore the device. Changes the role of the GSSM from standby to GSSM. Privileged EXEC Use the gssm database command and keyword to manage the embedded GSS database. The various command options allow you to monitor the status of your database and perform standard maintenance tasks such as backing up and restoring the database, validating the database content, and purging records. Use the gssm restore command and keyword to restore an earlier version of the GSSM from a full backup image. 2-47

48 General Commands Chapter 2 Use the gssm standby-to-primary and primary-to-standby command and keywords to switch the role of the selected GSSM in your GSS network. You must make sure that your original primary GSSM is offline before attempting to enable the standby GSSM as the new primary GSSM. Having two primary GSSMs active at the same time may result in the inadvertent loss of configuration changes for your GSS network. If this dual primary GSSM configuration occurs, the two primary GSSMs revert to standby mode and you will need to reconfigure one of the GSSMs as the primary GSSM. The standby GSSM can temporarily take over the role as the primary GSSM if the the primary GSSM is unavailable (for example, you need to move the primary GSSM or you want to take it offline for repair or maintenance). The switching of roles between the designated primary GSSM and the standby GSSM is intended to be a temporary GSS network configuration until the original primary GSSM is back online. The interim primary GSSM can be used to monitor GSS behavior and make configuration changes if necessary. Once the original primary GSSM is available, reassign the two GSSMs to their original roles in the GSS network as described in the Cisco Global Site Selector Administration Guide. Examples The following examples show that the gssm database command is used to check the running status of the GSSM embedded database, back up the database to a file, purge all database records except for the last 50, and delete the database: gss1.example.com# gssm database report GSSM database validation report written to validation.log gss1.example.com# gssm database status GSSM database is running. gss1.example.com# gssm database validate GSSM database passed validation. gss1.example.com# gssm primary-to-standby Standby GSSM enabled. gss1.example.com# gssm standby-to-primary Standby GSSM disabled. gss gss tech-report gssm 2-48

49 Chapter 2 General Commands help To obtain online help for the GSS CLI, use the help command. help This command has no keywords or arguments. User EXEC, privileged EXEC, and global configuration You can get help at any point when specifying a CLI command by entering a question mark (?). If nothing matches, the help list will be empty, and you must back up until entering a? shows the available options. Two methods of help are provided at the CLI: Full help is available when you are ready to enter a command argument (for example, show?) and describes each possible argument. Partial help is provided when you enter an abbreviated command and you want to know what arguments match the input (for example, show clock?). Examples The following example shows how to obtain online help for the GSS CLI: gss1.example.com# help gss1.example.com# help copy? 2-49

50 General Commands Chapter 2 install To install a new version of the GSS software on your GSS device, use the install command. install filename filename Name of the software update file. Privileged EXEC Use this command to install a new image of the GSS software on the Cisco GSS hardware. The upgrade file must be present on the Cisco GSS before you execute this command. The install command cannot be executed while the Cisco GSS is running (for example, serving Domain Name System [DNS] requests). You must enter the gss stop command before executing the install command. Examples The following example shows how to install an updated version of the GSS software: gss1.example.com# install /gss.upg show version 2-50

51 Chapter 2 General Commands license To install or uninstall a license file on your GSS device, use the license command. license install filename uninstall filename install uninstall filename Installs a license file on the GSS. Uninstalls a license file on the GSS. Name of the license file. Note A valid license file always includes the.lic extension. Otherwise, it is considered invalid and is not installed. Privileged EXEC For information about obtaining and installing a license file, see the Cisco Global Site Selector Administration Guide. Examples The following example shows how to install the Distributed Denial of Service (DDoS) license on the GSS: gssm1.example.com# license install ddos.lic show license 2-51

52 General Commands Chapter 2 lls To view a long list of files in a directory, use the lls command. lls [directory] directory (Optional) Name of the directory to list. User EXEC and privileged EXEC Use this command to view a detailed list of files contained within the working directory, including names, sizes, and the time created. The equivalent command is dir. The current directory is the default directory. Examples The following example shows how to view a long list of files in a directory: gss1.example.com# lls total drwxrwxrwx 3 root root 4096 Oct 8 11:09. drwxrwxrwx 19 root root 4096 Oct 8 11:13.. drwx root root 4096 Jan ssh -rw-r--r-- 1 root root Jan ACR_new.upg -rw-r--r-- 1 root root Jan ACR_new1.upg -rw-r--r-- 1 root root Jan ACR_new2.upg -rw-r--r-- 1 root root Jan gss k9.upg -rw-r--r-- 1 root root Jan gss k9.upg -rw-r--r-- 1 root root Oct 8 10:54 gss k9.upg -rw-r--r-- 1 root root 2520 Oct 8 11:09 one -rw-r--r-- 1 root root 3634 Oct 8 11:06 proximityschema.xsd -rw-r--r-- 1 root root 3523 Oct 8 11:07 stickyschema.xsd gss1.example.com# 2-52

53 Chapter 2 General Commands dir ls lsof pwd 2-53

54 General Commands Chapter 2 ls To view a list of files or subdirectory names within a directory, use the ls command. ls [directory] directory (Optional) Name of the directory for which you want a list of files. User EXEC and privileged EXEC To list the filenames and subdirectories within a particular directory, use the ls directory command; to list the filenames and subdirectories of the current working directory, use the ls command. To view the present working directory, use the pwd command. The current directory is the default directory. Examples The following example shows how to view a list of files or subdirectory names within a directory: gss1.example.com# ls gss k9.upg id_rsa.pub megara.back.1_0.full rpms gss k9.upg gss_sample.full megara.back.1_1.full dir lls lsof pwd 2-54

55 Chapter 2 General Commands lsof To view a list of all open files on your GSS device, use the lsof command. lsof This command has no keywords or arguments. Privileged EXEC To list the names, file properties, and locations of all files that are currently open on your GSS device, use the lsof command. Examples The following example shows how to view a list of all open files on your GSS device: gss1.example.com# lsof COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME init 1 root cwd DIR 8, / init 1 root rtd DIR 8, / init 1 root txt REG 8, /sbin/init init 1 root mem REG 8, /lib/ld so init 1 root mem REG 8, /lib/libc so init 1 root 0u unix 0xf7f86f socket init 1 root 10u FIFO 8, /rw/dev/initctl kflushd 2 root cwd DIR 8, / kflushd 2 root rtd DIR 8, / kflushd 2 root 0u unix 0xf7f86f socket kflushd 2 root 10u FIFO 8, /rw/dev/initctl 2-55

56 General Commands Chapter 2 kupdate 3 root cwd DIR 8, / kupdate 3 root rtd DIR 8, / kupdate 3 root 0u unix 0xf7f86f socket kupdate 3 root 10u FIFO 8, /rw/dev/initctl kswapd 4 root cwd DIR 8, / kswapd 4 root rtd DIR 8, / kswapd 4 root 0u unix 0xf7f86f socket kswapd 4 root 10u FIFO 8, /rw/dev/initctl keventd 5 root cwd DIR 8, / keventd 5 root rtd DIR 8, / keventd 5 root 0u unix 0xf7f86f socket keventd 5 root 10u FIFO 8, /rw/dev/initctl... dir ls lls pwd 2-56

57 Chapter 2 General Commands no To negate a CLI command or set it to its default settings, use the no command. Some GSS CLI commands do not have a no form. no command copy ftp snmp telnet Disables the copying of GSS configuration information or technical support information. Disables the File Transfer Protocol (FTP) on a GSS device. Disables Simple Network Management Protocol (SNMP) on a GSS device. Disables Telnet operations on the GSS device. Interface configuration, global, and global server load-balancing configuration Use the no command to disable functions or negate a command. If you need to negate a specific command, such as the default gateway IP address, you must include the specific string in your command, such as no ip default-gateway ip-address. Examples The following example shows how to negate a CLI command or set it to its default settings: gss1.example.com(config)# no ip name-server gss1.example.com(config)# no ntp-server

58 General Commands Chapter 2 ping To send ICMP echo packets for diagnosing basic network connectivity on networks, use the ping command. ping {hostname ip-address} hostname ip-address Hostname of the system to send an ICMP echo packet. IP address of the system to send an ICMP echo packet. User and privileged EXEC To use this command with the hostname argument, make sure that the Domain Name System (DNS) functionality is configured on your GSS. To force the timeout of a nonresponsive host, or to eliminate a loop cycle, press the Ctrl-C key sequence. Examples The following example shows how to send ICMP echo packets for diagnosing basic network connectivity on networks: gss1.example.com# ping gss.cisco.com PING ( ) from : 56(84) bytes of data. 64 bytes from gss.cisco.com ( ): icmp_seq=0 ttl=35 time=57.3 ms 64 bytes from gss.cisco.com ( ): icmp_seq=1 ttl=35 time=55.8 ms 64 bytes from gss.cisco.com ( ): icmp_seq=2 ttl=35 time=55.5 ms 64 bytes from gss.cisco.com ( ): icmp_seq=3 ttl=35 time=57.6 ms 64 bytes from gss.cisco.com ( ): icmp_seq=4 ttl=35 time=55.3 ms 2-58

59 Chapter 2 General Commands proximity database delete To remove entries from the proximity database (PDB), use the proximity database delete command. proximity database delete {all assigned group {name} inactive minutes ip {ip-address} netmask {netmask} no-rtt probed} Caution Use the proximity database delete all command in special instances when you want to remove all entries from the PDB in order to have an empty database. Ensure that you want to permanently delete entries from the PDB before you enter this command. You cannot retrieve PDB entries once they are deleted. all assigned group name inactive minutes ip ip_address netmask netmask no-rtt probed Removes all proximity database entries from the GSS memory. Removes all static entries from the PBD. Removes all entries that belong to a named proximity group. Specify the exact name of a previously created proximity group. Removes all dynamic entries that have been inactive for a specified time. Valid values are minutes. Removes all proximity entries related to a D-proxy IP address and subnet mask. Specify the IP address and subnet mask of the requesting client s D-proxy in dotted-decimal notation (for example, ). Removes all entries from the PDB that do not have valid RTT values. Removes all dynamic entries from the PDB. Privileged EXEC 2-59

60 General Commands Chapter 2 You can remove all PDB entries from the GSS memory by using the proximity database delete all CLI command. This command, however, does not delete PDB entries saved as part of an automatic dump to a backup file on a disk, which the GSS loads upon a reboot or restart to initialize the PDB. To ensure that you successfully remove all PDB entries from both the GSS memory and disk, enter the proximity database delete all command followed by the proximity database periodic-backup now command to force an immediate backup of the empty PDB residing in the GSS memory. The prompt Are you sure? appears to confirm the deletion of all PDB entries. Specify y to delete all entries or n to cancel the deletion operation. Examples The following example shows how to remove entries from the proximity database: gss1.example.com# proximity database delete ip proximity database delete proximity database dump proximity database load proximity database periodic-backup (config-gslb) proximity group 2-60

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Cisco Global Site Selector (GSS) software. The command summary

More information

CLI COMMAND SUMMARY BY MODE

CLI COMMAND SUMMARY BY MODE CLI COMMAND SUMMARY BY MODE DDoS Module Configuration Mode Commands 267 (config-ddos) disable-as 269 (config-ddos) dproxy 271 (config-ddos) enable 273 (config-ddos) global-domain 275 (config-ddos) max-database-entries

More information

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Global Site Selector software. The command summary tables are

More information

Configuring DDoS Prevention

Configuring DDoS Prevention CHAPTER 10 This chapter describes how to configure a GSS to prevent Distributed Denial of Service (DDoS) attacks. It contains the following major sections: Logging in to the CLI and Enabling Privileged

More information

Monitoring GSS Operation

Monitoring GSS Operation CHAPTER 9 The GSS software includes a number of tools that allow you to monitor the operating status of the GSS devices on your GSS network. These tools include CLI-based commands and the primary GSSM

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Viewing Log Files. Understanding GSS Logging Levels CHAPTER

Viewing Log Files. Understanding GSS Logging Levels CHAPTER CHAPTER 8 This chapter describes how to store and view logged information about your GSS devices. Each GSS device contains a number of log files that retain records of specified GSS-related activities

More information

Configuring DNS Sticky

Configuring DNS Sticky CHAPTER 8 This chapter describes how to configure a GSS to support Domain Name System (DNS) stickiness to answer requests received from client D-proxies. The GSS supports DNS sticky both locally and globally

More information

Monitoring GSS Global Server Load-Balancing Operation

Monitoring GSS Global Server Load-Balancing Operation CHAPTER 10 Monitoring GSS Global Server Load-Balancing Operation This chapter describes the following tools for monitoring the status of global server load-balancing on your GSS network: CLI-based commands

More information

Using the Command-Line Interface

Using the Command-Line Interface CHAPTER 1 The command-line interface (CLI) is a line-oriented user interface that provides commands for configuring, managing, and monitoring the GSS. To help you use these commands, this chapter contains

More information

Configuring Network Proximity

Configuring Network Proximity CHAPTER 9 This chapter describes how to configure a Global Site Selector to perform network proximity to determine the best (most proximate) resource for handling global load-balancing requests. This chapter

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Managing GSS Devices from the GUI

Managing GSS Devices from the GUI CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes

More information

Managing the GSS from the CLI

Managing the GSS from the CLI CHAPTER 2 This chapter describes how to manage the GSS software from the CLI. It contains the following major sections: Logging in to the CLI and Enabling Privileged EXEC Mode Using the startup-config

More information

Configuring and Monitoring the GeoDB

Configuring and Monitoring the GeoDB CHAPTER 8 This chapter describes how to implement the GeoIP database (GeoDB) proximity computation mechanism in GSS. From the latitudinal and longitudinal information in the GeoDB, GSS decides the proximity,

More information

Building and Modifying DNS Rules

Building and Modifying DNS Rules CHAPTER 7 This chapter describes how to build and modify Domain Name System (DNS) rules on your GSS network. After you configure your source address lists, domain lists, answers, and answer groups, you

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Basic Device Management

Basic Device Management This chapter contains the following sections: About, page 1 Licensing Requirements for, page 2 Default Settings for Basic Device Parameters, page 3 Changing the Device Hostname, page 3 Configuring the

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Available Commands CHAPTER

Available Commands CHAPTER CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Maintenance Tasks CHAPTER

Maintenance Tasks CHAPTER CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-4 Configuring Date and Time Properties,

More information

Configuring the Hostname, Domain Name, Passwords, and Other Basic Settings

Configuring the Hostname, Domain Name, Passwords, and Other Basic Settings CHAPTER 5 Configuring the Hostname, Domain Name, Passwords, and Other Basic Settings This chapter describes how to configure basic settings on your ASA 1000V that are typically required for a functioning

More information

Maintenance Tasks CHAPTER

Maintenance Tasks CHAPTER CHAPTER 5 These topics describe the Maintenance tasks of Element Manager: Viewing Basic System Information, page 5-2 Configuring Basic System Information, page 5-3 Configuring Date and Time Properties,

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Maintenance Tasks. About A/B Partition CHAPTER

Maintenance Tasks. About A/B Partition CHAPTER CHAPTER 4 These topics describe the Chassis Manager maintenance tasks: About A/B Partition, page 4-1 Configuring Basic System Information, page 4-2 Configuring System Global Settings, page 4-4 Configuring

More information

Maintaining the System Software

Maintaining the System Software CHAPTER 2 This chapter covers the tasks required for maintaining a Content Engine. Upgrading the System Software, page 2-1 Recovering the System Software, page 2-2 Maintaining the Hard Disk Storage, page

More information

Configuring Answers and Answer Groups

Configuring Answers and Answer Groups CHAPTER 6 Configuring Answers and Answer Groups This chapter describes how to create and configure answers and answer groups for your GSS network. It contains the following major sections: Configuring

More information

Configuring Answers and Answer Groups

Configuring Answers and Answer Groups CHAPTER 6 This chapter describes how to create and configure answers and answer groups for your GSS network. It contains the following major sections: Configuring and Modifying Answers Configuring and

More information

Introducing the Global Site Selector

Introducing the Global Site Selector CHAPTER 1 This chapter describes the Cisco Global Site Selector (GSS) and introduces you to the terms and concepts necessary to help you understand and operate the GSS. This chapter contains the following

More information

Introducing the Global Site Selector

Introducing the Global Site Selector CHAPTER 1 This chapter describes the Cisco Global Site Selector (GSS) and introduces you to the terms and concepts necessary to help you understand and operate the GSS device. This chapter contains the

More information

Assigning the Switch IP Address and Default Gateway

Assigning the Switch IP Address and Default Gateway CHAPTER 4 Assigning the Switch IP Address and Default Gateway This chapter describes how to create the initial switch configuration (for example, assigning the switch IP address and default gateway information)

More information

Introducing the Global Site Selector

Introducing the Global Site Selector CHAPTER 1 This chapter describes the Cisco Global Site Selector (GSS) and introduces you to the terms and concepts necessary to help you understand and operate the GSS. This chapter contains the following

More information

Symbols INDEX. / (slash) 2-63? (question mark) 2-184

Symbols INDEX. / (slash) 2-63? (question mark) 2-184 INDEX Symbols! (exclamation point) 2-720, 2-730 - (hyphen) 2-185, 2-730, 2-774... (ellipsis) 2-730.bin files installing 2-186.nsc file 2-660.pax files installing 2-186 / (slash) 2-63? (question mark) 2-184

More information

Introducing the Global Site Selector

Introducing the Global Site Selector CHAPTER 1 This chapter describes the Cisco Global Site Selector (GSS) and introduces you to the terms and concepts necessary to help you understand and operate the GSS device. This chapter contains the

More information

Cisco Global Site Selector Administration Guide

Cisco Global Site Selector Administration Guide Cisco Global Site Selector Administration Guide Software Version 1.2 November 2004 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel:

More information

Performing Software Maintenance Upgrades

Performing Software Maintenance Upgrades This chapter describes how to perform software maintenance upgrades (SMUs) on Cisco NX-OS devices. This chapter includes the following sections: About SMUs, page 1 Prerequisites for SMUs, page 3 Guidelines

More information

Building and Modifying DNS Rules

Building and Modifying DNS Rules CHAPTER 7 This chapter describes how to build and modify Domain Name System (DNS) rules on your GSS network. After you configure your source address lists, domain lists, answers, and answer groups, you

More information

Platform Administration

Platform Administration CHAPTER 6 Cisco provides these tools to manage the Cisco MobilityManager server platform: Cisco IPT web pages that provide complete platform administration functions. Command Line Interface (CLI) that

More information

Table of Contents 1 Basic Configuration Commands 1-1

Table of Contents 1 Basic Configuration Commands 1-1 Table of Contents 1 Basic Configuration Commands 1-1 Basic Configuration Commands 1-1 clock datetime 1-1 clock summer-time one-off 1-2 clock summer-time repeating 1-3 clock timezone 1-4 configure-user

More information

Cisco Prime Network Services Controller 3.0 CLI Configuration Guide

Cisco Prime Network Services Controller 3.0 CLI Configuration Guide Cisco Prime Network Services Controller 3.0 Configuration Guide January 29 2014 Chapter 1 Overview... 4 Information About Prime Network Services Controller... 4 Information About the Prime Network Services

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

Overview. ACE Appliance Device Manager Overview CHAPTER

Overview. ACE Appliance Device Manager Overview CHAPTER 1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager

More information

WLM1200-RMTS User s Guide

WLM1200-RMTS User s Guide WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

NAM CLI Commands: show password strong-policy - web user

NAM CLI Commands: show password strong-policy - web user CHAPTER 6 NAM CLI Commands: show password strong-policy - web user This chapter describes the following NAM CLI commands: show password strong-policy show patches show pkt-drop counters show preferences

More information

Table of Contents 1 Basic Configuration Commands 1-1

Table of Contents 1 Basic Configuration Commands 1-1 Table of Contents 1 Basic Configuration Commands 1-1 Basic Configuration Commands 1-1 clock datetime 1-1 clock summer-time one-off 1-2 clock summer-time repeating 1-3 clock timezone 1-4 command-privilege

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

User and System Administration

User and System Administration CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical

More information

Configuring Cisco Prime NAM

Configuring Cisco Prime NAM Cisco SRE NAM has an internal Gigabit Ethernet interface and an external interface. You can use either interface for Prime NAM management traffic such as the NAM web GUI, telnet or ssh, but not both. You

More information

Using the Startup Wizard

Using the Startup Wizard CHAPTER 3 This chapter describes the Startup wizard and how to use it to configure your sensor. It contains the following sections: Startup Wizard Introduction Window, page 3-1 Setting up the Sensor, page

More information

Setting Up the Sensor

Setting Up the Sensor CHAPTER 4 This chapter provides information for setting up the sensor. This chapter contains the following sections: Understanding Initialization, page 4-1 Configuring Network Settings, page 4-1 Configuring

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Assigning the Switch IP Address and Default Gateway

Assigning the Switch IP Address and Default Gateway CHAPTER 3 Assigning the Switch IP Address and Default Gateway This chapter describes how to create the initial switch configuration (for example, assigning the IP address and default gateway information)

More information

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,

More information

Performing Maintenance Operations

Performing Maintenance Operations This chapter describes how to back up and restore Cisco Mobility Services Engine (MSE) data and how to update the MSE software. It also describes other maintenance operations. Guidelines and Limitations,

More information

script To play or record a script, use the script command. For more information on scripts, refer to the Cisco Content Services Administration Guide.

script To play or record a script, use the script command. For more information on scripts, refer to the Cisco Content Services Administration Guide. script To play or record a script, use the script command. For more information on scripts, refer to the Cisco Content Services Administration Guide. script [play script_name { argument } record script_name]

More information

Clock Commands. Cisco IOS XR System Management Command Reference for the Cisco XR Series Router, Release 4.3.x OL

Clock Commands. Cisco IOS XR System Management Command Reference for the Cisco XR Series Router, Release 4.3.x OL This module describes the commands used to set and display the internal clock settings in Cisco IOS XR software. For more information about manually setting the router clock, see Cisco IOS XR Getting Started

More information

Table of Contents 1 Basic Configuration Commands 1-1

Table of Contents 1 Basic Configuration Commands 1-1 Table of Contents 1 Basic Configuration Commands 1-1 Basic Configuration Commands 1-1 clock datetime 1-1 clock summer-time one-off 1-1 clock summer-time repeating 1-2 clock timezone 1-4 command-privilege

More information

NAM CLI Commands: show patches - web user

NAM CLI Commands: show patches - web user CHAPTER 6 NAM CLI Commands: show patches - web user This chapter describes the following NAM CLI commands: show patches show preferences show protocol-feature show remote-storage show rxcounters show snmp

More information

Clock Commands on the Cisco IOS XR Software

Clock Commands on the Cisco IOS XR Software Clock Commands on the Cisco IOS XR Software This module describes the commands used to set and display the internal clock settings in Cisco IOS XR software. For more information about manually setting

More information

Working with Configuration Files

Working with Configuration Files This chapter contains the following sections: Finding Feature Information, page 1 Information About Configuration Files, page 1 Licensing Requirements for Configuration Files, page 2 Managing Configuration

More information

Clock Commands. Cisco IOS XR System Management Command Reference for the Cisco CRS Router, Release 4.2.x 1

Clock Commands. Cisco IOS XR System Management Command Reference for the Cisco CRS Router, Release 4.2.x 1 This module describes the commands used to set and display the internal clock settings in Cisco IOS XR software. For more information about manually setting the router clock, see Cisco IOS XR Getting Started

More information

System Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches)

System Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches) System Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Upgrading the Server Software

Upgrading the Server Software APPENDIXB This appendix describes how to upgrade or reinstall the Cisco PAM server software, desktop client software, and Gateway module firmware. Contents Upgrade Notes for Release 1.5.0, page B-2 Obtaining

More information

Using the Cisco NX-OS Setup Utility

Using the Cisco NX-OS Setup Utility This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

Clock Commands on the Cisco IOS XR Software

Clock Commands on the Cisco IOS XR Software This module describes the commands used to set and display the internal clock settings in Cisco IOS XR software. For more information about manually setting the router clock, see Cisco IOS XR Getting Started

More information

ExtraHop Command-line Reference

ExtraHop Command-line Reference ExtraHop Command-line Reference Published: 2018-12-15 You can manage many administrative tasks on your ExtraHop system through a command-line interface (CLI). You will typically manage your ExtraHop appliance

More information

Using the Cisco NX-OS Setup Utility

Using the Cisco NX-OS Setup Utility This chapter contains the following sections: Configuring the Switch, page 1 Configuring the Switch Image Files on the Switch The Cisco Nexus devices have the following images: BIOS and loader images combined

More information

System Configuration

System Configuration CHAPTER 2 This chapter provides information about how to use the Setup program to configure your host system for Cisco Configuration Engine, 2.0. Running Setup System configuration for Cisco Configuration

More information

INDEX. Cisco Unity Express 3.1 Voic CLI Administrator Guide 381 OL

INDEX. Cisco Unity Express 3.1 Voic CLI Administrator Guide 381 OL INDEX A active calls restore 1229 addressing remote messages 1194 administration CLI 114 GU and CLI 121 GUI 114 Administration via Telephone 1110 Administration viatelephone system configuring 1133 AIM

More information

Scheduling. Scheduling Tasks At Creation Time CHAPTER

Scheduling. Scheduling Tasks At Creation Time CHAPTER CHAPTER 13 This chapter explains the scheduling choices available when creating tasks and when scheduling tasks that have already been created. Tasks At Creation Time The tasks that have the scheduling

More information

Configuring VIP and Virtual Interface Redundancy

Configuring VIP and Virtual Interface Redundancy CHAPTER 6 Configuring VIP and Virtual Interface Redundancy This chapter describes how to plan for and configure virtual IP (VIP) redundancy and virtual interface redundancy on the CSS. Information in this

More information

Introducing the Global Site Selector

Introducing the Global Site Selector CHAPTER 1 This chapter describes the Cisco Global Site Selector (GSS) and introduces you to the terms and concepts necessary to properly understand and operate the GSS product. This chapter contains the

More information

C H A P T E R Commands Cisco SFS Product Family Command Reference OL

C H A P T E R Commands Cisco SFS Product Family Command Reference OL CHAPTER 3 This chapter documents the following commands: aaa accounting, page 3-8 aaa authorization, page 3-9 action, page 3-11 addr-option, page 3-12 authentication, page 3-14 auto-negotiate (Ethernet

More information

Release Notes for the Cisco Global Site Selector, Release 4.1(1)

Release Notes for the Cisco Global Site Selector, Release 4.1(1) Release s for the Cisco Global Site Selector, Release 4.1(1) November, 2011 The most current Cisco documentation for released products is available on Cisco.com. For the complete set of Cisco Global Site

More information

Set the Hostname, Domain Name, and the Enable and Telnet

Set the Hostname, Domain Name, and the Enable and Telnet This chapter describes how to configure basic settings on the ASA that are typically required for a functioning configuration. Set the Hostname, Domain Name, and the Enable and Telnet Passwords, page 1

More information

Utils Commands CHAPTER

Utils Commands CHAPTER CHAPTER 9 Published: October 31, 2011, This chapter contains the following utils commands: utils auditd disable utils auditd enable utils auditd status utils create report hardware utils create report

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

INDEX. Cisco Unity Express CLI Administrator Guide for Cisco CallManage, Release Cisco Unity Express Release 1.1

INDEX. Cisco Unity Express CLI Administrator Guide for Cisco CallManage, Release Cisco Unity Express Release 1.1 INDEX A active calls backup 105 restore 107 administration CLI 28 differences 29 GU and CLI 39 GUI 27 administrative privileges 84 administrator Cisco CallManager 29 Cisco Unity Express 29 password 35

More information

Enabling Remote Access to the ACE

Enabling Remote Access to the ACE CHAPTER 3 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. All features described in this chapter are supported with IPv6 unless otherwise

More information

Configuring the Cisco TelePresence System

Configuring the Cisco TelePresence System 3 CHAPTER Revised: August 2011, Contents This chapter contains the following sections: First Time Setup Wizard for the CTS 500 32, page 3-1 First Time Setup for All Other CTS Models, page 3-2 IP Settings,

More information

Working with the Cisco IOS File System, Configuration Files, and Software Images

Working with the Cisco IOS File System, Configuration Files, and Software Images APPENDIXB Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Catalyst 2960 switch flash file system, how to copy configuration

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine Supported VMware Versions, page 1 Support for VMware vmotion, page 1 Support for Open Virtualization Format, page 2 Virtual Machine Requirements, page 3 Virtual Machine Resource and Performance Checks,

More information

Managing Switches. Finding More Information About IOS Commands CHAPTER

Managing Switches. Finding More Information About IOS Commands CHAPTER CHAPTER 4 This chapter describes how to use the device-management features of the Cluster Management Suite (CMS). The features described in this chapter can all be implemented through Visual Switch Manager

More information

Bulk Statistics. Feature Summary and Revision History. This chapter provides configuration information for:

Bulk Statistics. Feature Summary and Revision History. This chapter provides configuration information for: This chapter provides configuration information for: Feature Summary and Revision History, page 1 Configuring Communication with the Collection Server, page 2 Viewing Collected Data, page 6 Collecting

More information

vserver vserver virtserver-name no vserver virtserver-name Syntax Description

vserver vserver virtserver-name no vserver virtserver-name Syntax Description Chapter 2 vserver vserver To identify a virtual server, and then enter the virtual server configuration submode, use the vserver command. To remove a virtual server from the configuration, use the no form

More information

Device management commands 1

Device management commands 1 Contents Device management commands 1 clock datetime 1 clock protocol 2 clock summer-time 2 clock timezone 4 command 5 copyright-info enable 6 display alarm 7 display asset-info 8 display clock 10 display

More information

Troubleshooting. Backing up the Monitoring Database in a Multi-Node Setup. This chapter contains the following sections:

Troubleshooting. Backing up the Monitoring Database in a Multi-Node Setup. This chapter contains the following sections: This chapter contains the following sections: Backing up the Monitoring Database in a Multi-Node Setup, page 1 Pinging the Hostname and IP Address, page 2 Viewing Tail Inframgr Logs, page 2 Collecting

More information

Working with the Cisco IOS File System, Configuration Files, and Software Images

Working with the Cisco IOS File System, Configuration Files, and Software Images CHAPTER B Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Catalyst 3750 Metro switch flash file system, how to copy configuration

More information

This chapter covers the following exam topics for the Secure PIX Firewall Advanced Exam (CSPFA 9E0-511): 5. User interface 6. Configuring the PIX

This chapter covers the following exam topics for the Secure PIX Firewall Advanced Exam (CSPFA 9E0-511): 5. User interface 6. Configuring the PIX This chapter covers the following exam topics for the Secure PIX Firewall Advanced Exam (CSPFA 9E0-511): 5. User interface 6. Configuring the PIX Firewall 8. Time setting and NTP support 13. DHCP server

More information

Utils Commands CHAPTER

Utils Commands CHAPTER CHAPTER 9 Published: October 26, 2010, This chapter contains the following utils commands: utils fior utils firewall utils iostat utils iothrottle enable utils iothrottle disable utils iothrottle status

More information

Managing the ACE Software

Managing the ACE Software CHAPTER 4 This chapter describes how to manage the software running on the Cisco 4700 Series Application Control Engine (ACE) appliance and contains the following sections: Saving Configuration Files Loading

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine Supported VMware Versions, page 1 Support for VMware vmotion, page 1 Support for Open Virtualization Format, page 2 Virtual Machine Requirements, page 3 Virtual Machine Resource and Performance Checks,

More information

Cisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2

Cisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2 Cisco Branch Routers Series Network Analysis Module (NME-NAM-120S) Installation and Configuration Note, 4.2 The Cisco Network Analysis Module (NAM) is an integrated module that enables network managers

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine ISE Features Not Supported in a Virtual Machine, page 1 Supported VMware Versions, page 1 Support for VMware vmotion, page 2 Support for Open Virtualization Format, page 2 Virtual Machine Requirements,

More information

Building and Modifying DNS Rules

Building and Modifying DNS Rules CHAPTER 7 Building and Modifying DNS Rules This chapter describes how to build and modify Domain Name System (DNS) rules on your GSS network. After you configure your source address lists, domain lists,

More information