AdministrationGuide PDF
AdministrationGuide PDF
Administration Guide
This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to [email protected].
Notice
Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is subject to change.
Safety, Compliance, and Warranty Information
Before handling any Lucent Access Networks hardware product, read the Edge Access Safety and Compliance Guide included in your product package. See that guide also to determine how products comply with the electromagnetic interference (EMI) and network compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent Technologies provides for its products.
Security Statement
In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features.
Trademarks
4ESS, 5ESS, A Network of Expertise, AnyMedia, APX 8000, AqueView, AUDIX, B-STDX 8000, B-STDX 9000, ...Beyond Compare, CaseView, Cajun, CajunDocs, CAJUNVIEW, Callmaster, CallVisor, CBX 500, CellPipe, ChoiceNet, ClearReach, ComOS, cvMAX, DACScan, Dacsmate, Datakit, DEFINITY, Definity One, DSLMAX, DSL Terminator, DSLPipe, DSLTNT, Elemedia, Elemedia Enhanced, EMMI, End to End Solutions, EPAC, eSight, ESS, EVEREST, Gigabit-scaled campus networking, Globalview, GRF, GX 250, GX 550, HyperPATH, Inferno, InfernoSpaces, Intragy, IntragyAccess, IntragyCentral, Intuity, IP Navigator, IPWorX, LineReach, LinkReach, MAX, MAXENT, MAX TNT, Multiband, Multiband PLUS, Multiband RPM, MultiDSL, MultiVoice, MultiVPN, Navis, NavisAccess, NavisConnect, NavisCore, NavisRadius, NavisXtend, NetCare, NetLight, NetPartner, OneVision, Open Systems Innovations, OpenTrunk, P550, PacketStar, PathStar, Pinnacle, Pipeline, PMVision, PortMaster, SecureConnect, Selectools, Series56, SmoothConnect, Stinger, SYSTIMAX, True Access, WaveLAN, WaveMANAGER, WaveMODEM, WebXtend, and Where Network Solutions Never End are trademarks of Lucent Technologies Inc. Advantage Pak, Advantage Services, AnyMedia, ...Beyond Compare, End to End Solutions, Inter.NetWorking, MAXENT, and NetWork Knowledge Solutions are service marks of Lucent Technologies Inc. Other trademarks, service marks, and trade names mentioned in this publication belong to their respective owners.
Copyrights for Third-Party Software Included in Lucent Access Networks Software Products
C++ Standard Template Library software copyright 1994 Hewlett-Packard Company and copyright 1997 Silicon Graphics. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Neither Hewlett-Packard nor Silicon Graphics makes any representations about the suitability of this software for any purpose. It is provided as is without express or implied warranty. Berkeley Software Distribution (BSD) UNIX software copyright 1982, 1986, 1988, 1993 The Regents of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the University of California, Berkeley, and its contributors. 4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Ordering Information
You can order the most up-to-date product information and computer-based training online at http://www.lucent.com/ins/bookstore.
Feedback
Lucent Technologies appreciates your comments, either positive or negative, about this manual. Please send them to [email protected] .
Lucent Technologies
Customer Service
To obtain product and service information, software upgrades, and technical assistance, visit the eSight Service Center at http://www.esight.com. The center is open 24 hours a day, seven days a week.
iii
Contents
Customer Service ..................................................................................................................... iii
Chapter 1
Contents
Channelized T3 slot card parameters..................................................................... Using DS3 diagnostics.................................................................................................. Performing an external loopback........................................................................... Performing an internal loopback ........................................................................... Administering E1 cards........................................................................................................ Administering UDS3 cards .................................................................................................. Using the UDS3lines command.................................................................................... Using the UDS3Dump command ................................................................................. Administering modems ........................................................................................................ Displaying modem status.............................................................................................. Bringing a modem or channel up or down ................................................................... Disabling a modem ....................................................................................................... Deactivating digital modems ........................................................................................
1-24 1-25 1-26 1-26 1-27 1-28 1-28 1-29 1-31 1-31 1-31 1-32 1-32
Chapter 2
vi
Contents
Understanding the status window ................................................................................. Connection status information ...................................................................................... General status information............................................................................................ Log messages ................................................................................................................ Displaying WAN line information ............................................................................... Changing current status window sizes.......................................................................... Reviewing the fatal error log ............................................................................................... Configuring message logging .............................................................................................. Configuring system logging on a TAOS unit ............................................................... Specifying a session ID base ........................................................................................ Configuring Syslog on the TAOS unit ......................................................................... Configuring the Syslog daemon ................................................................................... Checking the power supplies ............................................................................................... Using a script to configure the TAOS unit .......................................................................... Creating a text file......................................................................................................... Logging into the TAOS unit ......................................................................................... Uploading the text file .................................................................................................. Displaying user session information .................................................................................... Using the Userstat command ........................................................................................ Userstat options to display address and username........................................................ Using the -o format specifier option...................................................................... Using the -a and -u options.................................................................................... Using the Finger command........................................................................................... Remote management of other units ..................................................................................... Opening a remote management session........................................................................ Terminating a remote management session.................................................................. Error messages .............................................................................................................. Reloading profiles from RADIUS ....................................................................................... Configuring the dialout timer...............................................................................................
2-22 2-22 2-23 2-23 2-24 2-24 2-24 2-25 2-26 2-26 2-27 2-28 2-28 2-28 2-29 2-29 2-30 2-30 2-30 2-31 2-32 2-32 2-33 2-34 2-34 2-35 2-35 2-36 2-37
Chapter 3
vii
Contents
Displaying general information about OSPF routing ................................................... Displaying the OSPF database...................................................................................... Displaying OSPF external AS advertisements ...................................................... Displaying OSPF internal AS advertisements....................................................... Displaying the OSPF link-state database...................................................................... Displaying OSPF link-state advertisements ................................................................. Displaying the OSPF routing table ............................................................................... Displaying information about OSPF areas ................................................................... Displaying information about OSPF routers ................................................................ Displaying OSPF interfaces.......................................................................................... Displaying summarized information ..................................................................... Displaying specific information about a specific interface ................................... Displaying OSPF neighbors.......................................................................................... Diagnostic tools for IPX routers .......................................................................................... Diagnostic tools for displaying filter information................................................................ Displaying filter information for all active sessions.............................................. Displaying filter details for a single active session....................................................... Displaying software version log messages .......................................................................... Displaying Ethernet packet contents....................................................................................
3-18 3-20 3-21 3-22 3-22 3-24 3-25 3-26 3-27 3-28 3-28 3-29 3-30 3-31 3-32 3-32 3-33 3-35 3-35
Chapter 4
Chapter 5
viii
Contents
Specifying status window information ........................................................................... 5-6 Setting log levels for each login ..................................................................................... 5-8 Logging in as a different user ......................................................................................... 5-8 Specifying a timeout for logins....................................................................................... 5-8 Finding the current user .................................................................................................. 5-9 Creating and managing remote user profile filters................................................................. 5-9 Current limitations .......................................................................................................... 5-9 Overview of local profile settings................................................................................... 5-9 Overview of RADIUS user profile settings........................................................... 5-10 Overview of RADIUS pseudo-user profile settings .............................................. 5-11 Examples of configuring a filter profile in RADIUS ............................................ 5-12 Examples of applying remote filters...................................................................... 5-12 Managing remote filters......................................................................................... 5-13 Parameter reference entries.................................................................................... 5-14
Chapter 6
ix
Contents
Ascend Firewall MIB (firewall.mib) ..................................................................... Ascend Flash MIB (flash.mib) .............................................................................. Ascend Frame Relay Profile MIB (mibfrmrl.mib) ................................................ Ascend Internet Profile MIB (mibinet.mib) .......................................................... Ascend Lan Modem MIB (lmodem.mib) .............................................................. Ascend Multicast MIB (mcast.mib) ...................................................................... Ascend Power Supply MIB (ps.mib)..................................................................... Ascend Private MIB (private.mib) ........................................................................ Ascend RADIUS MIB (radius.mib) ...................................................................... Ascend Remote Ping MIB (remoteping.mib)........................................................ Ascend Resources MIB (resource.mib)................................................................. Ascend Service Management MIB (srvcmgmt.mib) ............................................. Ascend Session MIB (session.mib) ....................................................................... Ascend UDS3 Profile MIB (mibuds3net.mib) ...................................................... Ascend WAN Dialout MIB (wandialout.mib) ...................................................... Lucent Chassis MIB (chassis.mib) ........................................................................ Modified method for adding SNMP object IDs............................................................ Ascend Enterprise traps ................................................................................................ Configuring SNMP access and security............................................................................... SNMP profile configuration overview ......................................................................... Sample SNMP profile configuration ............................................................................ Administering Read or Write Host Permissions........................................................... Reference descriptions........................................................................................... Setting up SNMP traps......................................................................................................... TAOS unit trap support................................................................................................. Individual SNMP traps ................................................................................................. Activating the SNMP agent .......................................................................................... Activating the agent............................................................................................... Enabling read-write access .................................................................................... Setting up address security .................................................................................... Activating SNMP traps................................................................................................. Specifying trap destinations................................................................................... Trap classes............................................................................................................ Examples of enabling traps and trap classes ......................................................... RFC 1850 OSPF traps................................................................................................... Overview of trap definitions.................................................................................. Example of setting traps in the Trap profile .......................................................... SNMP support for OSPF traps .............................................................................. SNMP support for the Idle Time variable .................................................................... SNMP trap configuration overview .............................................................................. Example SNMP trap configuration............................................................................... Managing SNMP interfaces ................................................................................................. Initiating interface state changes................................................................................... Resetting SNMP interface table sequentially ............................................................... Ascend MIB hierarchy ......................................................................................................... products (1) ............................................................................................................ slots (2) .................................................................................................................. hostTypes (3) ......................................................................................................... advancedAgent (4)................................................................................................. lanTypes (5) ........................................................................................................... doGroup (6) ........................................................................................................... hostStatus (7) .........................................................................................................
6-25 6-25 6-26 6-27 6-27 6-27 6-27 6-27 6-29 6-29 6-30 6-30 6-30 6-30 6-30 6-30 6-30 6-31 6-31 6-31 6-32 6-33 6-33 6-33 6-34 6-34 6-37 6-38 6-38 6-39 6-39 6-40 6-40 6-43 6-43 6-43 6-45 6-46 6-46 6-46 6-47 6-48 6-49 6-49 6-50 6-50 6-50 6-51 6-51 6-52 6-52 6-53
Contents
console (8) ............................................................................................................. systemStatusGroup (9) .......................................................................................... eventGroup (10)..................................................................................................... callStatusGroup (11).............................................................................................. sessionStatusGroup (12) ........................................................................................ radiusGroup (13).................................................................................................... mCastGroup (14) ................................................................................................... lanModemGroup (15) ............................................................................................ firewallGroup (16) ................................................................................................. wanDialoutPkt (17)................................................................................................ powerSupply (18) .................................................................................................. multiShelf (19)....................................................................................................... miscGroup (20)...................................................................................................... flashGroup (22)...................................................................................................... configuration (23) .................................................................................................. atmpGroup (24) .....................................................................................................
6-53 6-53 6-54 6-55 6-56 6-57 6-57 6-58 6-58 6-59 6-59 6-59 6-60 6-60 6-61 6-66
Chapter 7
Appendix A
xi
Contents
Appendix B
Appendix C
Index.......................................................................................... Index-1
xii
Figures
Figure 1-1 Figure 2-1 Figure 5-1 Figure 6-1 Example of a T3 card line-status window.......................................................... 1-7 System status window...................................................................................... 2-22 Information in the status window ...................................................................... 5-7 Ascend MIB hierarchy..................................................................................... 6-50
xiii
Tables
Table 1-1 Table 1-2 Table 1-3 Table 2-1 Table 2-2 Table 2-3 Table 5-1 Table 5-2 Table 6-1 Table 6-2 Table 6-3 Table 6-4 Table 6-5 Table 6-6 Table 6-7 Table B-1 Table B-2 Table B-3 Table B-4 T1-line maintenance tasks ............................................................................... 1-18 T1-Stats command fields ................................................................................ 1-22 E1-Stats command fields ................................................................................ 1-27 Permission levels .............................................................................................. 2-4 TAOS system administration commands ......................................................... 2-4 Overview of configuring logging on a TAOS unit ......................................... 2-26 Overview of User profile tasks .......................................................................... 5-2 Permissions and associated commands ............................................................. 5-3 TAOS unit support for RFC 2233 ..................................................................... 6-3 SNMP profile configuration tasks .................................................................. 6-31 Traps in the alarm class ................................................................................... 6-41 Traps in the security class ............................................................................... 6-42 Trap in the port class........................................................................................ 6-42 Trap in the slot class ........................................................................................ 6-43 SNMP trap configuration tasks ....................................................................... 6-46 Syslog message fields for Secure Access Firewalls ........................................ B-9 Load command error messages ....................................................................... B-10 Format command error messages ................................................................... B-11 Dircode command error messages .................................................................. B-11
xv
Warning: Before installing your TAOS unit, be sure to read the safety instructions in the Access Networks Safety and Compliance Guide. For information specific to your unit, see the Safety-Related Electrical, Physical, and Environmental Information appendix in your units hardware installation guide.
xvii
Documentation conventions
Following are all the special characters and typographical conventions used in this manual: Convention Meaning
Monospace text Represents text that appears on your computers screen, or that could appear on your computer s screen. Boldface Represents characters that you enter exactly as shown (unless the monospace text characters are also in italicssee Italics, below). If you could enter the characters but are not specifically instructed to, they do not appear in boldface. Italics Represent variable information. Do not enter the words themselves in the command. Enter the information they represent. In ordinary text, italics are used for titles of publications, for some terms that would otherwise be in quotation marks, and to show emphasis. Square brackets indicate an optional argument you might add to a command. To include such an argument, type only the information inside the brackets. Do not type the brackets unless they appear in boldface. Separates command choices that are mutually exclusive. Points to the next level in the path to a parameter or menu item. The item that follows the angle bracket is one of the options that appear when you select the item that precedes the angle bracket. Represents a combination keystroke. To enter a combination keystroke, press the first key and hold it down while you press one or more other keys. Release all the keys at the same time. (For example, Ctrl-H means hold down the Control key and press the H key.) Means press the Enter, or Return, key or its equivalent on your computer. Introduces important additional information. Warns that a failure to follow the recommended procedure could result in loss of data or damage to equipment. Warns that a failure to take appropriate safety precautions could result in physical injury.
[]
| >
Key1-Key2
!
Caution:
!
Warning:
xviii
Documentation set
The APX 8000/MAX TNT documentation set consists of the following manuals. Read me first: Access Networks Safety and Compliance Guide Contains important safety instructions and country-specific compliance information that you must read before installing a TAOS unit. TAOS Command-Line Interface Guide Introduces the TAOS command-line environment and shows how to use the command-line interface effectively. This manual describes keyboard shortcuts and introduces commands, security levels, profile structure, and parameter types.
Installation and basic configuration: APX 8000 Hardware Installation Guide Shows how to install APX 8000 hardware and includes technical specifications for these units. MAX TNT Hardware Installation Guide Shows how to install MAX TNT hardware and includes technical specifications for these units. APX 8000/MAX TNT Physical Interface Configuration Guide Shows how to configure the slot cards installed in a TAOS unit and their line attributes for such functions as framing, signaling, and channel usage. It also describes how calls are routed through the system and includes information about configuring the unit in a Signaling System 7 (SS7) environment. This guide explains shelf controller redundancy for an APX 8000 unit.
Configuration: APX 8000/MAX TNT ATM Configuration Guide Describes how to configure Asynchronous Transfer Mode (ATM) operations on a TAOS unit. This guide explains how to configure physical layer attributes and how to create permanent virtual circuit (PVC) and switched virtual circuit (SVC) ATM interfaces. It includes information about ATM direct and ATM-Frame Relay circuits. APX 8000/MAX TNT Frame Relay Configuration Guide Describes how to configure Frame Relay operations on a TAOS unit. This guide explains physical layer configuration and restrictions and how to create permanent virtual circuit (PVC) and switched virtual circuit (SVC) interfaces. It includes information about Multilink Frame Relay (MFR) and link management, as well as Frame Relay and Frame Relay direct circuits. APX 8000/MAX TNT WAN, Routing, and Tunneling Configuration Guide Shows how to configure LAN and WAN routing for analog and digital dial-in connections on a TAOS unit. This guide includes information about IP routing, Open Shortest Path First (OSPF) routing, Internet Group Management Protocol (IGMP) routing, multiprotocol routers, Virtual Routers (VRouters), and tunneling protocols. MultiVoice for MAX TNT Configuration Guide Shows how to configure the MultiVoice application to run on a MAX TNT unit in both Signaling System 7 (SS7) and H.323 Voice over IP (VoIP) configurations.
xix
About This Guide Documentation set RADIUS: TAOS RADIUS Guide and Reference Describes how to set up a TAOS unit to use the Remote Authentication Dial-In User Service (RADIUS) server and contains a complete reference to RADIUS attributes. Administration and troubleshooting: APX 8000/MAX TNT Administration Guide (this guide), Describes how to administer a TAOS unit, including how to monitor the system and cards, troubleshoot the unit, and configure the unit to use the Simple Network Management Protocol (SNMP).
Reference: APX 8000/MAX TNT Reference An alphabetic reference to all commands, profiles, and parameters supported on TAOS units. TAOS Glossary Defines terms used in documentation for TAOS units.
xx
Viewing installed slot cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1 Viewing information about slot cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Opening a session with a slot card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Changing a slot state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Changing a device state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 Removing a slot card and its configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Viewing the clock source for a slot card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Recovering from a failed slot-card installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6 Displaying line status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7 Administering DS3-ATM cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11 Administering Ethernet cards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16 Administering T1 and T3 cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18 Administering E1 cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27 Administering UDS3 cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28 Administering modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31 Typical system administration tasks for the TAOS units slot cards include viewing status information, removing a slot card configuration, and disabling lines. For information about managing your TAOS unit, see Chapter 2, TAOS System Administration.
1-1
{ { { { { { { { { { { { { { { { { { { { { { { { { { { {
shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1 shelf-1
slot-4 0 } slot-5 0 } slot-7 0 } slot-8 0 } slot-9 0 } slot-11 0 } slot-12 0 } slot-13 0 } slot-14 0 } slot-15 0 } slot-16 0 } slot-17 0 } slot-19 0 } slot-20 0 } slot-21 0 } slot-22 0 } slot-23 0 } slot-24 0 } slot-25 0 } slot-26 0 } slot-27 0 } slot-29 0 } slot-30 0 } slot-33 0 } slot-34 0 } slot-36 0 } slot-38 0 } slot-39 0 }
UP UP UP UP UP RESET UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP UP
hdlc2ec-card madd2-card oc3-atm-card hdlc2ec-card ether3-card 8e1-card hdlc2-card csmx-card hdlc2-card hdlc2ec-card hdlc2ec-card hdlc2ec-card ether3-card hdlc2-card hdlc2-card csmx-card t3-card hdlc2-card hdlc2-card csmx-card hdlc2-card ether3-card csmx-card t3-card hdlc2ec-card 8t1-card ether3-card ether3-card
The output lists the physical address of each slot in which a slot card is installed. The address is in the form {shelf slot item }. Each listing also shows the status of the card and the type of card installed. The status can be reported as follows: Status UP DOWN POST LOAD OCCUPIED Signifies Normal operational mode. Not in operational mode. The card is running power-on self tests. The card is loading code as part of booting up. The slot is occupied by a two-slot card (such as the 48 modem card in shelf 1, slots 3 and 4, in the example above). The card is being reset. The card has been swapped out, but its configuration remains in NVRAM.
RESET NONE
1-2
Administering Slot Cards Viewing information about slot cards The Show command can report the following types of slot cards: Label unknown 4/1ether-card 4ether-card 4ether2-card 48modem-card 48modem-56k-card 8e1-card 8t1-card csmx-card ds3-atm-card shelf-controller Signifies Current software does not recognize the card in the slot. Ethernet card with one 100Mbps and four 10Mbps ports. Ethernet card with four 10Mbps ports. Ethernet card with one 100Mbps and three 10Mbps ports. 48 V.34 modem card. Series56 Digital Modem card. 8-line E1 slot card. 8-line T1 slot card. Series56 II Digital Modem card. DS3 card with ATM support. Shelf-controller card.
1-3
cbStats ( debug ) checkd ( debug ) clear ( user ) clock-source ( diagnostic ) debug ( diagnostic ) debugd ( debug ) display ( debug ) dp-decode ( debug ) dp-ram-display ( debug ) dpram-test ( debug ) dspBypassClients ( debug ) dspDial ( debug ) dspSetDddTimeslot ( debug ) fakeCalledId ( debug ) fakeClid ( debug ) fe-loop ( diagnostic ) fill ( debug ) frreset ( debug ) [More? <ret>=next entry, <sp>=next page, <^C>=abort]
For information about the card-level commands, see the APX 8000/MAX TNT Reference. To exit the session with the card, enter quit, as in the following example: t1-1/7> quit
1-4
NONE } } } } } } } }
The NONE status indicates that the card was removed but its profiles have been saved. The TAOS unit remembers that a card was in that slot and saves its profiles until a card of a different type is installed in the same slot, or until the administrator enters the Slot -r command, as in the following example: admin> slot -r 13 slot 1/13 removed In either case, all the old profiles associated with the slot are deleted. If a different type of card is inserted, appropriate new profiles are created.
priority: 1
Sources with layer 2 up, which are preferred, are marked with an asterisk. For information about configuring the clock source see the hardware installation guide.
1-5
Caution: Using the Nvram command resets the entire system. This method cannot be done remotely because the Nvram command clears the TAOS units configuration, including its IP address. Before performing this procedure make sure you have access to the TAOS units serial port. To recover from a failed slot-card installation by this method: 1 Save the current system configuration. For example: admin>save network bonzo 971001 This saves the configuration to a file named 971001 in the TFTP home directory on a host named bonzo. 2 Clear the system configuration and restart the TAOS unit by executing the Nvram Clear command: admin>nvram clear 3 Restore the saved system configuration. You can either restore it through the serial port, or you can reassign an IP address and default gateway through the serial port, then use the Load command to load the rest of the configuration as in the following example: admin>load config network bonzo 971001 This restores the configuration from a file named 971001 in the TFTP home directory on a host named bonzo. For a complete description of saving and restoring configurations, see the Backing up and restoring a configuration on page 2-19.
1-6
admin> slot -r 1 1 4 Bring the card back up: admin> slot -u 1 1 5 Restore the configuration of any profiles on the card. For the T1 card in this example, you would enter the following command: admin>load config network bonzo 971001 This restores the configuration from a file named 971001 in the TFTP home directory on a host named bonzo.
Figure 1-1 shows an example of a line-status window for the T3 card. Figure 1-1. Example of a T3 card line-status window
1 Connections, 1 Sessions 0065 FRM2-SLC MPP 09/02/1 |"my T3" 1/15/00 LA la la la la la la la 56000| 1/15/01 LA T-------- -------- -------| 1/15/02 LA T-------- -------- -------| 1/15/03 LA T-------- -------- -------| 1/15/04 LA T-------- -------- -------| 1/15/05 LA T-------- -------- -------| 1/15/06 LA T-------- -------- -------| 1/15/07 LA T-------- -------- -------|----------------------------------------------|M: 520 L: notice Src: shelf-1/slot-15 | | Line 28 up | | | | -------------------------------------------------------------------------------[ Next/Last Line: <up/dn arw>, Next/Last Page: <pg up/dn>, Exit: <esc> ]
The first entry in the right-hand area of the screen shows the overall status of the DS3 line and each of its seven component DS2 channels. One DS2 includes 4 DS1s. The other entries represent each of the component DS1s.
1-7
Administering Slot Cards Displaying line status The Line commands put the window in line-status mode, in which the following message appears below the status window:
[Next/Last Conn:<dn/up arw>, Next/Last Page:<pg dn/up>,Exit: <esc>]
The message indicates the key sequences you can use for displaying additional information in the line status area. The Down Arrow and Up Arrow keys display the next and previous T1 line in the list, respectively. The Page Down and Page Up keys display the list a screen at a time. When the line-status mode message is displayed, the system prompt does not appear at the bottom of the window. Press the Escape key to exit this mode and return to the system prompt. Line status information includes the following identifiers and codes: Line identifier in shelf/slot/line format Two-character code indicating the lines link status Single-character code indicating channel status Single-character code indicating channel type
Description The line is active and physically connected Loss of Signal. No signal has been detected. Loss of Frame. A signal is present but is not valid for framing. The E1 line is active and configured as network-side equipment. The E1 line is active and configured as user-side equipment. The line is unconnected, improperly configured, experiencing a very high error rate, experiencing a loss-of-receive-signal, or is not supplying adequate synchronization. The TAOS unit is receiving a Yellow Alarm pattern, an indication that the other end of the line cannot recognize the signals the TAOS unit is transmitting. The D channel for a PRI line is not currently communicating. A keep-alive (also known as a Blue Alarm) signal is being sent from the PRI network to the TAOS unit to indicate that the line is currently inoperative. The DS3 interface has detected an Idle Signal transmitted from the other side. This generally indicates that the line is provisioned but is not in use. The DS3 interface has detected that the other side is using a framing format that differs from the one the local DS3 interface is configured for (C-bit-parity or M13).
YA (yellow alarm)
ID (idleDS3 only)
1-8
Administering Slot Cards Displaying line status Following are the channel-status codes: Code
. (period)
Description The channel is not available because of one of the following reasons: Line is disabled Channel has no physical link Channel does not exist Channel configuration specifies that it is unused Channel is reserved for framing (first E1 channel only)
* (asterisk) - (hyphen) b c
The channel is connected in a current call. The channel is currently idle (but in service). The channel is a backup NFAS D channel (T1 PRI only). The channel is currently not available because it is in the process of clearing the most recent call, or because it is in the process of sending echo cancellation tones to receive a call (inband signaling on T1 only). The TAOS unit is dialing from this channel for an outgoing call. The channel is ringing for an incoming call. The channel is in maintenance/backup mode (ISDN and SS7 only). The channel is nailed. The channel is out of service (ISDN and SS7 only). The channel is an active D channel (ISDN only).
d r m n o s
Following are the channel-type codes: Code E I N P S T Description E1 line T1 PRI signaling All other NFAS types NFAS Primary NFAS Secondary T1 inband signaling
1-9
Administering Slot Cards Displaying line status If you use the Line command without options, or with the all, enabled, top, or bottom arguments, it opens the Line status window. With the -p option, the command displays the status information at the command line. To use the Line command, you must have system permissions. The Line command supports the following syntax:
admin> help line line usage: line [ [all | enabled ] [ top | bottom] ] | [ -p ]
Option -p
With the -p option, the Line command displays line status information directly to screen. For example, the following is sample output for T1 lines:
admin> line -p Address 1/01/01 1/01/02 1/01/03 1/01/04 1/01/05 1/01/06 1/01/07 1/01/08 Line State CARR LOOP DS0 Channel Status Signaling Type ACTIVE -- LOOP ........ ........ ........ inband RED ALARM LOC -- ........ ........ ........ r1-inband ACTIVE --- -------- -------- -------- inband RED ALARM --- ........ ........ ........ isdn-nfas RED ALARM LOC -- ........ ........ ........ inband DISABLED --- @@@@@@@@ @@@@@@@@ @@@@@@@@ inband DISABLED --- @@@@@@@@ @@@@@@@@ @@@@@@@@ inband DISABLED --- @@@@@@@@ @@@@@@@@ @@@@@@@@ inband
The command displays the following line status information: Output field Address Description Shelf/Slot/Line number of the line. This information was displayed in the Line window in previous releases, and is documented in the APX 8000/MAX TNT Reference. Status of the line. This information was displayed in the Line window in previous releases, and is documented in the APX 8000/MAX TNT Reference. In addition, the LB line-state indicator has been added to indicate that an E1 line is looped back via the fe-loop command on the E1 card. (Carrier). If the system detects a loss of carrier on a line, LOC is displayed. If the line sees carrier, it displays dashes ( --).
Line State
CARR
1-10
Description (Loopback status). If the line is locally looped, LOOP is displayed. Otherwise, the column contains dashes (--). State of the individual DS0 lines. This information was displayed in the Line window in previous releases, and is documented in the APX 8000/MAX TNT Reference. The type of signaling in use on the line. This information was displayed in the Line window in previous releases, and is documented in the APX 8000/MAX TNT Reference.
Signaling Type
where -option may be one of the following: Option -a -d -f -u Effect Displays all available DS3-ATM lines. Displays disabled DS3-ATM lines. Displays free DS3-ATM lines. Displays in-use DS3-ATM lines.
In the following example, the DS3-ATMlines command displays all DS3-ATM lines:
admin> ds3atmlines -a All DS3-ATM lines: (dvOp Line { 1 4 1 } (Up dvUpSt Idle dvRq UP sAdm UP nailg) 00000)
Regardless of which option you enter, the DS3-ATMlines command displays the following information: Column Name dvOp Description The operational state of the DS3 line. Values can be: Down Up
1-11
Description The up status of the DS3 line. Values can be: Idle Reserved Assigned Down Up Down Up
dvRq
SAdm
nailg
where -option is one of the following: Option -t -d Effect Toggles debug output. Dump ATM framer chip status information. The information this command displays is also available from the status lights on the card and in the DS3-ATM-Stat profile. Toggle a local loopback. Toggle a remote loopback. Synchronize to the DS3-ATM profile. The TAOS unit automatically re-reads the line configuration whenever it comes up. Clear the error counters. Displays this summary.
-l -r -s -c -?
For example, to view overall status information about the DS3-ATM line, enter the Framer command with the -d option:
ds3-atm-1/4> framer -d Framer is Enabled RED_ALARM_LED : Off YELLOW_ALARM_LED: Off
1-12
AIS_LED OOF_LED ACTIVE_LED F-Bit P-Bit C-PBit FEB BPV EZD Error Error Error Error Error Error
Following are the Framer command output fields with descriptions: State Red_Alarm_LED Description On indicates the line is not connected, or it is improperly configured, experiencing a very high error rate, or supplying inadequate synchronization. On indicates the card is receiving yellow-alarm from far end. On indicates the card is receiving alarm indication signal On indicates the near end is in an out of frame condition. On indicates multipoint established.
The remaining parameters indicate the errors on the DS3 line. (Refer to RFC 1407 for complete description of these errors.) Parameter F Bit Error Counter P Bit Error Counter Description Framing bit errors received since the last TAOS units reset or the error counters were cleared. P-bit errors indicate that TAOS unit received a P-bit code on the DS3 M-frame that differs from the locally calculated code. For C-Bit-Parity lines indicates that number of parity errors since the last TAOS units reset. Far end block errors received since the last TAOS units reset. Bipolar Violation (BPV) errors may indicate that the line sent consecutive one bits with the same polarity. It could also mean that three or more consecutive zeroes were sent or an incorrect polarity. Number of Excessive Zero Detect (EZD) line code violations that have occurred since the error counters were cleared.
1-13
For example, to view all ATM call blocks, enter the ATMDumpCall command with the -a option:
ds3-atm-1/3> atmdumpcall -a atmdumpcall -a ATM Call Block Table: Addr. E00C47F0 E00C4834 E00C4878 E00C48BC E00C4900 . . . E00C5868 E00C58AC 62 63 0 0 65535 65535 0 0 INACTIVE INACTIVE 0/0 0/0 No No Index Active 0 1 2 3 4 1 1 1 0 0 callID 1 2 3 65535 65535 routeID State 1 2 3 0 0 Vpi/Vci Prof_Name atm-30-sw Yossi-TNT Yoss-P220 Sess_Up Yes Yes Yes No No CONNECTED 1/43 CONNECTED 15/1023 CONNECTED 1/56 INACTIVE INACTIVE 0/0 0/0
1-14
Administering Slot Cards Administering DS3-ATM cards where option is one of the following: Option -e Description (End-to-End). Transmit an end-to-end OAM loop cell, to be looped by the user connection point. This option and the -s option are mutually exclusive, and one of them must be specified on the command line. (Segment). Transmit a segment OAM loop cell, to be looped by the first network connection point. This option and the -e option are mutually exclusive, and one of them must be specified on the command line. Transmit the specified number of cells. If this argument is not specified, the count defaults to 0, which means that the cells are transmitted continuously until the administrator sends an interrupt by pressing Ctrl-C. Transmit the cells at the specified interval in seconds. If this argument is not specified, the interval defaults to one second. Specifies the shelf in which the DS3-ATM card is located. Specifies the slot in which the DS3-ATM card is located. Specifies the Virtual Path Identifier on which to transmit the looped-back cells. Specifies the Virtual Channel Identifier on which to send the looped-back cells.
-s
c count
1-15
Effects This default specifies that the DS3 line is operating normally. During a facility loopback, the DS3 card returns the signal it receives on the DS3 line. During a local loopback, the DS3 receive path is connected to the DS3 transmit path at the DS3 multiplexer. The transmitted DS3 signal is still sent to the network as well.
Line statistics are displayed in the DS3-ATM-Stat profile. For information about this profile, see Using DS3-ATM-Stat profiles on page 7-9. To configure a loopback, proceed as follows: 1 Read the DS3-ATM profile:
admin> read ds3-atm {1 3 1}
1-16
Administering Slot Cards Administering Ethernet cards An interface may also be disabled by using the Ifmgr command, or it may be marked as down by the Ethernet driver when Link-State-Enabled is Yes and Link-State is Down. To enable an interface, set the Enabled parameter to Yes (the default), or use the Ifmgr Up option. Note, however, that if there are physical problems with the interface, specifying the interface as up might not enable it. To disable an interface with the Ifmgr command, proceed as in the following example: 1 Open a session with an Ethernet card: admin> open 1 4 ether-1/4> ifmgr 2 View the interface table:
ether-1/4> ifmgr -d if slot:if u p ifname mac addr local-addr -------------------------------------------------------------000 0:00:000 * pb0 000000000000 0.0.0.0/32 001 1:17:011 * ie1-4-1 00c07b6d23f0 11.1.1.1/32 002 1:17:013 * ie1-4-2 00c07b6d23f1 11.1.2.1/32 003 1:17:015 * ie1-4-3 00c07b6d23f2 11.1.3.1/32 004 1:17:017 * ie1-4-4 00c07b6d23f3 11.1.4.1/32 005 1:17:019 * ie1-4-5 00c07b6d23f4 11.1.5.1/32 <end>
Mark the interface as down by specifying its name: ether-1/4> ifmgr down ie1-4-1 The Ifmgr display indicates that the interface is disabled by displaying a dash instead of an asterisk in the Up column (u):
ether-1/4> ifmgr -d if slot:if u p ifname mac addr local-add -----------------------------------------------------------------000 0:00:000 * pb0 000000000000 0.0.0.0/32 001 1:17:011 ie1-4-1 00c07b6d23f0 0.0.0.0/32 002 1:17:013 * ie1-4-2 00c07b6d23f1 11.1.2.1/32 003 1:17:015 * ie1-4-3 00c07b6d23f2 11.1.3.1/32 004 1:17:017 * ie1-4-4 00c07b6d23f3 11.1.4.1/32 005 1:17:019 * ie1-4-5 00c07b6d23f4 11.1.5.1/32 <end>
Note: A disabled Ethernet interface is also shown with a dash in Netstat command output. To mark an interface as up, enter a command similar to the following: ether-1/4> ifmgr up ie1-4-1 For more information about the Ifmgr command, see IFMgr on page 4-16.
1-17
ie1-12-1-1 -
Deactivating a PRI line allows you to gradually take a line or channels out of service. Your T1 service provider can use Facilities Data Link (FDL) to monitor the status of your line.
1-18
Administering Slot Cards Administering T1 and T3 cards Table 1-1. T1-line maintenance tasks (continued) Task/section of this manual Description Associated parameter or command T1channel command
Checking the status of T1 channels on page 1-20. Displaying DS1-level diagnostics for T1 cards on page 1-21. Verifying proper hardware functionality on page 1-23.
Display the administrative state and nailed-group assignment of the T1 channels. Display T1 channel errors.
T1-Stats command
FE-Loop
Restoring a line or channel that has been quiesced can take up to 10 minutes.
1-19
admin> quiesce -q {1 2 4} QUIESCE: line 1/2/4, enable=T, isPri=T Restoring a line or channel that has been deactivated can take up to 3.5 minutes, because only one service message per channel is sent to the switch, at a rate of one per second. To restore the line deactivated in the preceding example: admin> quiesce -r {1 2 4} QUIESCE: line 1/2/4, enable=T, isPri=T Following is an example of deactivating a single channel: admin> quiesce -d {{1 2 4} 1}
Specifying FDL
The facilities data link (FDL) is used by the telephone company to monitor the quality and performance of T1 lines. If your carrier s maintenance devices require regular data-link reports, and if the line is not configured for D4 framing, you can specify the type of protocol to use (AT&T, ANSI, or Sprint). You cannot use FDL reporting on a line configured for D4 framing. However, you can obtain D4 and ESF performance statistics in the FDL Stats windows or the DSX MIB, even if you do not choose an FDL protocol. (For further information, see the Frame-Type parameter description in the APX 8000/MAX TNT Reference). Note: DS3-level FDL capabilities such as the Far-End Alarm and Control Channel (FEAC) and Path Maintenance Data Link are currently unsupported. To specify the type of FDL, proceed as in the following example: admin> read t1 {1 2 1} T1/{ shelf-1 slot-2 1 } read admin> set fdl = [none|at&t|ansi|sprint] admin> write
For example, to display all T1 channels available, use the -a option: admin> t1channels -a T1 channels available for use: (dvOp dvUpSt dvRq sAdm
1-20
nailg) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000) Channel 00000)
{ { { { { { { { { { { { { { { { { { { { { { { {
1 1 1 1 1 1 1 1 1 1 1 1
1 1 1 1 1 1 1 1 1 1 1 1
3 } 3 } 3 } 3 } 3 } 3 } 3 } 3 } 3 }
1 } 2 } 3 } 4 } 5 } 6 } 7 } 8 } 9 }
(Up (Up (Up (Up (Up (Up (Up (Up (Up (Up (Up (Up
Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle Idle
UP UP UP UP UP UP UP UP UP UP UP UP
UP UP UP UP UP UP UP UP UP UP UP UP
3 } 10 } 3 } 11 } 3 } 12 }
1-21
t1-1/13> t1-stats t1-stats [ -c ] <line> get error statistics for the line -c: reset statistics to zero To view DS1-level statistics on the first line on the card: t1-1/13> t1-stats 1 Line 1: CRC Errors: Frame Slips: Framing Bit Errors: Out of Frame Events: Line Code Violations:
0 8 0 0 0
Table 1-2 explains the T1-Stats fields. Table 1-2. T1-Stats command fields Field CRC Errors Event that increments the field Indicates that a CRC-6 checksum shows data corruption in the signal. The TAOS unit receives T1 data at a frequency higher or lower than the internal line clock. In the process of realigning itself to the transmitter, the TAOS unit can skip or repeat a frame. Framing bit errors occur when the TAOS unit receives T1 data at a frequency higher or lower than that of the internal line clock. In the process of realigning itself to the transmitter, the TAOS unit can skip or repeat a frame. The TAOS unit no longer detects a framing pattern in the receiving signal, or it detects a pattern at a different relative offset than expected. The TAOS unit detected either a Bipolar Violation or Excessive Zeros, which means that one of the low-level T1 rules for encoding data was violated in the received signal.
Frame Slips
The following example shows how to view and reset the statistics to zero on line 2: t1-1/13> t1-stats -c 2 Line 2: CRC Errors: Frame Slips: Framing Bit Errors: Out of Frame Events: Line Code Violations: Statistics cleared.
2 3 0 0 3
The Statistics cleared message at the end of the display indicates that the statistics have been reset to 0 (zero), because the command included the c option.
1-22
1-23
Example: set Loopback = No-Loopback Location: T3 {shelf-N slot-N N} Loss-Of-Frame Whether there is a loss-of-frame signal on the line. FalseNo loss of frame signal. TrueLoss of frame signal.
Example: loss-of-signal = False Location: T3-Stat {shelf-N slot-N N} Yellow-Receive Whether the TAOS unit is receiving a loss-of-frame signal from the remote end (also known as a Yellow Alarm). FalseNo loss of frame from the remote end. TrueLoss of frame from the remote end.
Example: yellow-receive = False Location: T3 {shelf-N slot-N N} Ais-Receive Whether the remote end is sending an alarm indication signal. FalseNo alarm indication signal from the remote end. TrueAlarm indication signal from the remote end.
1-24
Parameter
Specifies
t3-1/15> ds3link -option where -option is one of the following: Option -a -b on -b off -c -d 1 - 7 -i on -i off -l off -l off -s -t -? 3 Effect Displays current DS3 line alarms. Transmits a DS3 Alarm Indication Signal (blue alarm). Stops transmitting a DS3 Alarm Indication Signal (blue alarm). Displays and clears line error statistics. Displays current DS2 line state. Internally loops back the DS3 payload. Halt internal loop back. Externally loops back the DS3 payload. Halt external loop back. Displays line error statistics without clearing. Toggles debug output. Displays this summary. To display alarms on the line: t3-15> ds3link -a Loss of Signal: Out of Frame: Alarm Indication Signal: Idle Signal: Yellow Signal: In Red Alarm: C-bit parity framing: false false false false false false false
A display of true for C-bit parity framing does not indicate an alarm state, but that the far end is using C-bit parity.
1-25
Administering Slot Cards Administering T1 and T3 cards 4 To display and clear line error statistics: t3-1/15> ds3link -c Line Code Violations: Framing Errors: Excessive Zeros: P-bit Parity Errors: C-bit Parity Errors: Far End Block Errors: DS2 1 Framing Errors: DS2 2 Framing Errors: DS2 3 Framing Errors: DS2 4 Framing Errors: DS2 5 Framing Errors: DS2 6 Framing Errors: DS2 7 Framing Errors: Statistics cleared. 5 To display the line state of the third DS2: t3-1/15> ds3link -d 3 State of DS2 3: Out of Frame: Alarm Indication Signal: Yellow Signal: In Red Alarm: Reserved Bit: 2136611 67279 2098353 217318 0 0 8415 8415 8415 8415 8415 8415 8415
1-26
Administering Slot Cards Administering E1 cards these commands, first use the Open command to open a session with the card, as described in Opening a session with a slot card on page 1-3.
Administering E1 cards
The E1-Stats command reports DS1-level line errors on E1 cards. Before entering it, use the Open command to open a session with the installed card. For example, to open a session with a card in shelf 1, slot 13: admin> open 1 13 Then enter the E1-stats command. The following example shows the commands syntax: e1-1/13> e1-stats e1-stats [ -c ] <line> get error statistics for the line -c: reset statistics to zero
0 9872 0 0 0
0 9872 0 0 0
The Statistics cleared message at the end of the display indicates that the statistics have been reset to 0 (zero) because the command included the c option. Table 1-3 explains the E1-Stats fields. Table 1-3. E1-Stats command fields Field CRC Errors Frame Slips Event that increments the field A CRC-6 checksum shows data corruption in the signal. The TAOS unit receives E1 data at a frequency higher or lower than the internal line clock. In the process of realigning itself to the transmitter, the TAOS unit can skip or repeat a frame.
1-27
Administering Slot Cards Administering UDS3 cards Table 1-3. E1-Stats command fields (continued) Field Framing Bit Errors Event that increments the field Framing bit errors occur when the TAOS unit receives E1 data at a frequency higher or lower than that of the internal line clock. In the process of realigning itself to the transmitter, the TAOS unit can skip or repeat a frame. The TAOS unit no longer detects a framing pattern in the receiving signal, or it detects a pattern at a different relative offset than expected. The TAOS unit detected either a Bipolar Violation or Excessive Zeros, which means that one of the low-level E1 rules for encoding data was violated in the received signal. The far end reported an error in an E1 frame transmitted by the TAOS unit.
In the following example, the UDS3lines command displays the all UDS3 lines: admin> uds3lines -a All UDS3 lines: (dvOp nailg) Line 00131) { 1 13 1 } (Up dvUpSt Idle dvRq UP sAdm UP
1-28
Administering Slot Cards Administering UDS3 cards Regardless of which option you enter, the UDS3lines command displays the following information: Column Name dvOp Description The operational state of the UDS3 line. Values can be: dvUpSt dvRq SAdm nailg Down Up Idle Reserved Assigned Down Up Down Up
In the following example, the UDS3dump command displays the current interval table: uds3-1/13> uds3dump 0 Index PESs PSESs SEFSs UASs LCVs PCVs LESs CCVs CESs CSESs --------------------------------------------------------------0 0 0 0 1 0 0 0 0 0 0
1-29
Administering Slot Cards Administering UDS3 cards The output contains the following fields (refer to RFC 1407 for complete description of these errors): Field PESs Description A P-bit errored second is a second during which one of the following error conditions occurs: A P-Bit error An out of frame error An incoming A1S signal
Note that the count is not incremented by the number of unavailable seconds. PSESs A P-bit severely errored second is a second during which one of the following error conditions occurs: There are 44 or more P-Bit errors An out of frame error An incoming A1S signal
Note that the count is not incremented by the number of unavailable seconds. SEFSs A severely errored framing second is a second during which one of the following error conditions occurs: UASs LCVs An out of frame error An incoming A1S signal
The number of seconds the interface is unavailable. Note that only LES and SEFS errors are counted while the interface is unavailable. A line coding violation error is the sum of bipolar (BPV) and excessive zero (EXZ) errors. An excessive zero error increments the count by one no matter how many zeros are transmitted. P-bit errors indicate that TAOS unit received a P-bit code on the DS3 M-frame that differs from the locally calculated code. A line errored seconds is a second during which one of the following error conditions occurs: A C-bit coding violation error A loss of signal error
PCVs LESs
CCVs CESs
A C-bit coding violation error indicates a parity error. A C-bit errored second is a second during which one of the following error conditions occurs: A C-bit coding violation error An out of frame error An incoming A1S signal
This applies only to SYNTRAN and C-bit Parity DS3 lines. Note that the count is not incremented by the number of unavailable seconds.
1-30
Field CSESs
Description A C-bit severely errored second is a second during which one of the following error conditions occurs: There are 44 or more C-bit coding violation errors An out of frame error An incoming A1S signal
This applies only to SYNTRAN and C-bit Parity DS3 lines. Note that the count is not incremented by the number of unavailable seconds.
Administering modems
The TAOS unit provides diagnostic commands to display modem status, bring modems or channels up or down, or quiesce modems.
where -a Displays all available modems. -d Displays the disabled channels. -f Displays failed or non-existent modems. -g Displays available good modems. -i Displays in-use modems. -m Displays all possible modems. -s Displays suspect modems.
For example, to see which modems are in use: admin> modem -i Modems allocated/in-use Modem {1 14 1} (dv0p dvUpSt DvRq sAdm) (Up Assign UP UP )
For more information about the Modem command refer to the APX 8000/MAX TNT Reference.
1-31
admin> device -d {{1 3 24} 0} To bring the modem back up: admin> device -u {{1 3 24} 0}
Disabling a modem
To disable a modem: 1 Read in the LAN Modem profile. For example: admin> read LAN-Modem LAN-MODEM/{ shelf-1 slot-2 0 } read 2 Disable the modem: admin> set modem-disable-mode 1= disable 3 Write the profile to commit your changes: admin> write LAN-MODEM/{ shelf-1 slot-2 0 } written
1-32
admin> write LAN-MODEM/{ shelf-1 slot-6 0 } written Note: When you deactivate a modem, you can also deactivate an arbitrary idle T1 channel at the same time by using the Dis-Channel setting. For details, see the APX 8000/MAX TNT Reference.
1-33
Logging into the TAOS unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Securing the serial port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2 Specifying a management-only Ethernet interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 Overview of TAOS commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 Displaying system and slot card uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8 Displaying the system version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Viewing the factory configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Setting the system name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11 Setting the system time and date . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12 Managing onboard NVRAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12 Resetting the unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13 Viewing clock-source information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13 Using PCMCIA flash cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15 Updating system software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18 Using the status window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21 Reviewing the fatal error log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24 Configuring message logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25 Checking the power supplies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28 Using a script to configure the TAOS unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28 Displaying user session information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30 Remote management of other units . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-34 Reloading profiles from RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36 Configuring the dialout timer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-37 This chapter explains how to perform common system administration tasks on your TAOS unit. It focuses on tasks you can perform on the system as a whole, such as resetting the unit, setting the time and date, configuring logging, and backing up and restoring a configuration.
2-1
TAOS System Administration Logging into the TAOS unit For information about managing the TAOS slot cards, see Chapter 1, Administering Slot Cards.
admin> set password = top-secret admin> write USER/admin written All subsequent administrator logins will be required to supply the new password. (For more information about configuring User profiles, see Chapter 5, Creating User Profiles.)
2-2
TAOS System Administration Specifying a management-only Ethernet interface 3 Set Auto-Logout to Yes: admin>set auto-logout = yes This automatically logs out the current User profile if DTR is lost on the serial port. 4 Write the profile: admin>write Now users connecting to the serial port must supply a valid username and password for access to the TAOS unit.
Setting Management-Only-Interface to Yes means that incoming traffic on the interface terminates in the system itself. It is not forwarded on any other interface. In addition, only traffic generated by the system is forwarded on the management-only interface. Traffic generated externally is dropped on the interface. To configure a management interface, proceed as in the following example: admin> read ip-int {{ 1 12 1 } 0} IP-INTERFACE/{ { shelf-1 slot-12 1 } 0 } read admin> set management-only = yes admin> write IP-INTERFACE/{ { shelf-1 slot-12 1 } 0 } written The IfMgr d command displays a Management Only field to reflect the ports status.
Command permission-levels
Commands are organized by permission levels, as described in Table 2-1. A user gains access to a particular command by logging in to the TAOS unit by means of a user profile that
2-3
TAOS System Administration Overview of TAOS commands specifies the required permission level. (To create a User profile, see Chapter 5, Creating User Profiles.) By default, the Admin profile specifies permission to execute all commands. Table 2-1. Permission levels Permission level Code Description Allows you to format and manage the PCMCIA cards that store the system software. Specialized commands used to troubleshoot the cards. Under most circumstances, these commands are not required for correct operation of the TAOS unit, and in some circumstances might produce undesirable results. (For information about the debug commands, see Chapter 4, Using Debug Commands. Commands used to monitor the TAOS unit and its cards. Commands that allow you to manage and configure the TAOS unit. Accesses the TAOS units terminal server. Commands that allow you to update the system configuration. Simple commands available to all users that allow log in.
Debug
Diagnostic System
Commands overview
Table 2-2 briefly describes the TAOS commands available on the shelf-controller. Many of the commands are used in later sections of this manual to perform certain system administration tasks. For complete details of each command, see the APX 8000/MAX TNT Reference. Table 2-2. TAOS system administration commands Command Name ? Arptable Permission Level User System Effect Displays a list of commands. Displays or modifies the TAOS units Address Resolution Protocol (ARP) table. Selects a new User profile. Displays the call-routing database. Clears the terminal session screen and places the system prompt at the top row of the VT100 window. Displays clock-source statistics. Clears the fatal-error history log.
Clock-Source Clr-History
Diagnostic System
2-4
TAOS System Administration Overview of TAOS commands Table 2-2. TAOS system administration commands (continued) Command Name Connection Date Debug Delete Permission Level System Update Diagnostic Update Effect Displays the connection-status window. Sets the system date. Enables or disable diagnostic output. Permanently deletes a profile from local storage. Brings a device up or down. Lists profiles and profile types. Shows contents of PCMCIA card code. Displays DNS table entries. Displays DS3-ATM line information. Displays contents of received Ethernet packets. Displays help about a particular command. Lists fatal-error history log. Prepares a flash card for use. Verifies the filesystem on a PCMCIA flash card. If errors are detected, they are reported. No errors are fixed. Displays fields in a profile. Displays HDLC-channel information. Administer an interface. Displays IGMP multicast statistics. Displays the status of the IP address pools configured in the IP-Global profile. Displays IP route caches. Enables you to manually add or delete IP routes. Routing table changes made by using this command are not remembered across system resets. Displays the line status window.
Ipcache IProute
System System
Line
System
2-5
TAOS System Administration Overview of TAOS commands Table 2-2. TAOS system administration commands (continued) Command Name List Load Log Modem Netstat New NSlookup Permission Level System Update System System System System Diagnostic Effect Lists fields in working profile. Uploads code or saved configuration to flash. Invokes/controls the event log window. Displays modem information. Displays routing or interface tables. Creates a new profile. Resolves the IP address of a specified host name by performing a DNS lookup. Clears configuration and reboot system Starts session with slot card. Displays information related to OSPF routing, including Link-State Advertisements (LSAs), border routers routing tables, and the OSPF areas, interfaces, statistics, and routing table. Sends ICMP echo_request packets to the specified host as a way to verify that the host is up and the transmission path to the host is open. Displays power supply statistics. Temporarily disables a modem or DS0 channel. Makes the specified profile the working profile. Refreshes the remote configuration. Reboots the system. Saves profile for future restore. Changes the status window display size for the current session. Sets a parameter s value. Shows shelves, slots, or items. Administers a slot card.
Ping
Diagnostic
Power Quiesce
System System
Read
System
2-6
TAOS System Administration Overview of TAOS commands Table 2-2. TAOS system administration commands (continued) Command Name Status T1channels Telnet Terminal-Server Traceroute Permission Level System System Diagnostic Termserv Diagnostic Effect Displays system status or hide status window. Displays T1 channel information. Opens a Telnet session to another host. Enters terminal-server mode. Traces the route an IP packet follows by launching UDP probe packets. Displays unchannelized DS3 line information. Displays how long the TAOS unit has been up since its last reset. Displays user-session status. Displays software version information. Changes content of a status window. Displays current User profile name. Writes a profile.
UDS3lines Uptime
System Diagnostic
2-7
Without an argument, the command displays system uptime. But in the following example, the command displays the uptime for all slot cards in the UP state (cards that are not in the UP state are not reported):
super->uptime -a 22:03:43 { shelf-1 slot-2 } { shelf-1 slot-4 } { shelf-1 slot-5 } { shelf-1 slot-7 } { shelf-1 slot-8 } { shelf-1 slot-9 } { shelf-1 slot-12 } { shelf-1 slot-13 } { shelf-1 slot-14 } { shelf-1 slot-15 } { shelf-1 slot-16 } { shelf-1 slot-17 } { shelf-1 slot-19 } { shelf-1 slot-20 } { shelf-1 slot-21 } { shelf-1 slot-22 } { shelf-1 slot-23 } { shelf-1 slot-24 } { shelf-1 slot-25 } { shelf-1 slot-26 } { shelf-1 slot-27 } { shelf-1 slot-29 } csmx-card hdlc2ec-card madd2-card oc3-atm-card hdlc2ec-card ether3-card hdlc2-card csmx-card hdlc2-card hdlc2ec-card hdlc2ec-card hdlc2ec-card ether3-card hdlc2-card hdlc2-card csmx-card t3-card hdlc2-card hdlc2-card csmx-card hdlc2-card ether3-card 3 days 05:23:08 3 days 05:24:00 3 days 05:23:52 3 days 05:24:18 3 days 05:24:00 3 days 05:24:34 3 days 05:24:08 3 days 05:23:08 3 days 05:24:08 3 days 05:24:00 3 days 05:24:00 3 days 05:24:00 3 days 05:24:34 3 days 05:24:08 3 days 05:24:08 3 days 05:23:08 3 days 05:24:26 3 days 05:24:08 3 days 05:24:08 3 days 05:23:08 3 days 05:24:08 3 days 05:24:34 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5 8.0.2c5
2-8
{ shelf-1 slot-30 } { shelf-1 slot-33 } { shelf-1 slot-34 } { shelf-1 slot-36 } { shelf-1 slot-38 } { shelf-1 slot-39 }
3 days 05:23:08 3 days 05:24:26 3 days 05:24:00 3 days 05:24:46 3 days 05:24:34 3 days 05:24:34
shelf-controller
3 days 05:25:51 (
Note: The left and right controllers are both reported in the display. Uptime displays the current time (20:18:18 in the preceding example), identifies the slot card, the software version running on the card, and displays the length of time the system has been up, in days followed by hours:minutes:seconds. The following example shows that a csmx card in slot 2 has been up for 3 days, 5 hours, 23 minutes and 8 seconds:
2-9
data-call-enabled = yes r2-signaling-enabled = no serial-number = 7050270 hardware-level = 0 countries-enabled = 511 domestic-enabled = yes modem-dialout-enabled = yes firewalls-enabled = no network-management-enabled = no phs-support = no selectools-enabled = no routing-protocols-disabled = no apx-adsl-restricted = no apx-sdsl-restricted = no apx-idsl-restricted = no xcom-ss7 = disabled ss7asg = disabled atmp-enabled = enabled l2tp-enabled = disabled pptp-enabled = disabled ipinip-enabled = disabled The Base profile displays system information that is not modified across resets. These values are read from the system ROM, security PAL, and from the hardware assembly itself. (For information about the parameters, see the APX 8000/MAX TNT Reference.) Note: The shelf-number is always 1 in a single-shelf system.
The Width argument is a value from 80 to 256 and default is 80. For example:
admin> screen -w 256
The specified screen width is the number of characters that are visible without scrolling, including the system prompt and spaces following it. For example, if the screen width is 80 characters and the prompt is admin> (a 6-character prompt followed by a space), the maximum number of visible characters in a command is 72. If the user enters a long command,
2-10
TAOS System Administration Setting the system name for example that has 100 characters, 28 of the characters will not be visible at any one time. The user can scroll to the characters not currently visible by moving the cursor left or right. The following control sequence allows users to redraw the current line: Control sequence Ctrl-L, Ctrl-R Effect Redraw line
All existing control sequences continue to work as in previous releases. For details, see the TAOS Command-Line Interface Guide.
Parameter Screen-Width
Specifies Number of characters allowed on a command line or terminal-server banner. An integer from 80 (the default) to 255.
Following is an example of how to customize a users profile for a screen width of 120 characters:
admin> read user admin USER/admin read admin> set screen-width = 120 admin> write -f USER/admin written
2-11
2-12
Caution: Make sure you have a recent backup before using the NVRAM command. To see how NVRAM is being used, enter the NVRAM command with the -u option: admin> nvram -u To clear NVRAM, restoring the unit to its initial, unconfigured state, enter the NVRAM command without specifying an option: admin> nvram To clear NVRAM and enter debug mode, use the -t option: admin> nvram -t
priority: 1
Sources with layer 2 up, which are preferred, are marked with an asterisk. For information about configuring the clock source, see the hardware installation guide.
2-13
File formats
The file allocation table-16 (FAT-16) file system is implemented on top of FTL. For details about the formats, see PCMCIA Media Storage Formats, Chapter 5: Flash Translation Layer Microsoft FAT12 and FAT16 volume formats. Note: Filenames on TAOS flash cards must be compatible with the DOS 8.3 format. A FAT-16 file system can store a large number of files in a hierarchy of directories. After you format flash under this software version, the flash card contains a top-level directory named /current, which contains the currently running version of the TAOS software as well as code image files for all supported slot cards. The slot card images are extracted from the tar file and stored as individual files with a .ffs filename extension. For example:
apxsr.ffs tnt8t1.ffs tnthdlc2.ffs
The new flash format also allows you to load a new software version or configuration data to the TAOS from a laptop running Windows or OS/2, rather than from a TFTP server. Because the FAT on FTL format is supported only on linear flash cards in this release, the laptop must have FTL linear flash.
When used to load a tar file, the Load command lists the filename of each code image in the file as the image is being extracted. For example:
admin> load tar network 10.10.10.10 apxrel.tar file apxrel.tar... untaring and loading image for... shelf controller (apxsr/apxsr.ffs)... 8t1-card (tnt8t1/tnt8t1.ffs)... skipping t3-card (tntt3/tntt3.ffs)...
2-14
ether3-card (tntenet3/tntenet3.ffs)... hdlc2-card (tnthdlc2/tnthdlc2.ffs)... skipping 4swan-card (tntswan/tntswan.ffs)... skipping 48modem-56k-card (tntmdm56k/tntmdm56k.ffs)... skipping 48modem-card (tntmdm/tntmdm.ffs)... done.
The following command creates a subdirectory named config1 within the oldconf directory:
admin> mkdir 1/oldconf/conf1
You can move files into a directory by using the mv command. For example, the following command moves a file named 0001conf to the new subdirectory on flash card 1:
admin> mv 1/current/0001conf 1/oldconf/conf1/0001conf
2-15
TAOS System Administration Using PCMCIA flash cards the flash cards contain code for the slot cards, the shelf-controller, and profiles. The system configuration is stored in the onboard NVRAM. The PCMCIA slots on the shelf-controller are labeled 1 (the slot on top) and 2 (the slot below).
The information displayed by this command includes the card number (1 or 2) and the size of the code directory. It also shows the following information about each code module: Type of card supported Subtype of the code, which can be regular or diagnostic Status, which can be good (present and complete), write (being copied), or bad (incomplete or corrupt)
2-16
TAOS System Administration Using PCMCIA flash cards Size of the code Date the code was loaded to the flash card Code version
For a list of error messages that might appear when using the Dircode command, see Dircode command messages on page B-11
2-17
Usable Clusters: 7864 Free Clusters: 6048 Clusters lost during interrupted writes: 0 Other reserved clusters: 1798 For details of the command-line options for the Fsck command, see the APX 8000/MAX TNT Reference.
2-18
Each parameter in the profile represents a card type, and can be set to Auto, Load, or Skip, to specify the action to take when the code image is present in a Tar file. (The Load-Select profile does not list the Shelf-Controller code, because that image is always loaded from the updated Tar file.) The Auto setting (the default) causes the system to load images for cards that are installed in the TAOS unit, and skip images for cards that are not installed. A card is considered present in the system if a Slot-Type profile exists for that card type. The system creates a Slot-Type profile when it first detects the presence of a card, and does not delete the profile unless the administrator uses the Slot r command to permanently remove a card that is no longer installed in the system, or clears NVRAM. To ensure that the system does not load unnecessary images, use Slot r to remove Slot-Type profiles for cards that are no longer installed in the system. The Load setting causes the system to load the image, even if there is no card of that type installed. The Skip setting causes the system to skip the image, even if there is a card of that type installed.
The system loads the 56K-modem image even if the Load-Select profile indicates that it should be skipped. For details on the Load command, see the APX 8000/MAX TNT Reference.
2-19
2-20
save save all configuration profiles, all profiles of a given type, or a specific profile by writing it in a form that can be replayed to a unit to restore its configuration usage: save [ -a ] [ -m ] < target > [ profile-type [ profile-index ] ] or specify a list of profiles to be included in or excluded from the network save operation usage: save [ -a ] [ -m ] network <host> <filename> [ -p | -x profile1 profile2 ...] < target >: network < host > < filename >, console, flash < device/filename > [ -a ]: explicitly save all fields, even those with default values [ -m ]: [ -p ]: [ -x ]: use mib tags instead of field and value names save specified list of profiles save all profiles, except the specified list
For details on using these commands, see the APX 8000/MAX TNT Reference.
2-21
Bottom: Log
2-22
admin> connection If the Status window is not displayed, the Connection command opens it and displays the connection-status-mode message below the Status window (if the Status window is already open, the Connection command just displays the message):
[Next/Last Conn:<dn/up arw>, Next/Last Page:<pg dn/up>,Exit: <esc>]
This message indicates the key sequences you can use for displaying additional information in the Connection status area. The Down Arrow and Up Arrow keys display the next and previous connection, respectively, in the list of active connections. When the connection-status-mode message is displayed, the system prompt does not appear at the bottom of the window. Press the Escape key to exit this mode and return to the system prompt.
Log messages
With the default setting in a User profile, the bottom area of the status window initially displays the most recent message from the TAOS units log buffer. The number of system event messages stored in the log is set by the Save-Number parameter in the Log profile. The first line of the event log window shows the log entry number (M: 00 through M: N, where N is set in the save-number parameter of the Log profile), the level of message, and the device on which the event occurred. The last line shows the date and time when the event occurred. The middle of the window displays the text of the most recent message. If the status window is not already displayed, or if you want to scroll through the log, use the Log command: super> log If the Status window is not displayed, the Log command opens it and displays the log-mode message below the Status window (if the Status window is already open, the Log command just displays the message):
[Back: <up arw>, Forward: <dn arw>, Start: <pg up>, End: <pg dn>, Exit: <esc>]
This message indicates the key sequences you can use for displaying additional information in the Log area:
2-23
TAOS System Administration Reviewing the fatal error log The Down Arrow and Up Arrow keys display the next and previous message in the buffer, respectively. The Page Up and Page Down. keys display the first and last message in the buffer, respectively.
When the log-mode message is displayed, the system prompt does not appear at the bottom of the window. Press the Escape key to exit this mode and return to the system prompt.
If you only specify the screen-length option, and it is not greater than the configured status-length by at least 6 lines, the TAOS unit automatically adjusts the length of the status windows. This is shown in the following example:
admin> screen 55 22 new screen-length 55 new status-length 22 admin> screen 24 error: screen-length conflict, adjusting status-length from 22 to 18 new screen-length 24 new status-length 18
2-24
TAOS System Administration Configuring message logging To view the log of fatal errors, enter the Fatal-History. For example:
admin> fatal-history OPERATOR RESET: Index: 99 Revision: 2.0 Time: 16:55:38 Shelf 1 (apxsr)
Date: 01/30/2000.
Reset from unknown, user profile admin. SYSTEM IS UP: Index: 100 Revision: 2.0 Time: 16:56:12 Shelf 1 (apxsr)
Date: 01/30/2000.
The commands output information includes the date and time at which the error occurred, the system software version that was running at that time, the slot number on which the error occurred, and a stack trace record of the event. (For a list of fatal error messages, see Appendix B, Log Messages on the TAOS Unit.) To clear the fatal error log, enter the Clr-History command: admin> clr-history
In the Log and User profiles you can configure the way in which the messages are handled . The Log profile defines system-wide event logging parameters, including the number and level of messages to save and whether to communicate with a Syslog daemon. Table 2-3 lists the sections describing common tasks you might have to perform to configure message logging on the TAOS unit. The table includes a brief description of each task, and lists the parameters you will use.
2-25
TAOS System Administration Configuring message logging (For complete information about the associated parameters, see the APX 8000/MAX TNT Reference.) Table 2-3. Overview of configuring logging on a TAOS unit Task Configuring system logging on a TAOS unit Description of task You can configure the level and number of messages that are logged to the TAOS units log. These messages are displayed in the log status window. Syslog is an IP protocol that allows you to track events on the TAOS unit. A host running a Syslog daemon is typically a UNIX host, but it may also be a Windows system. Related parameters Save-Number Save-Level
2-26
To configure Syslog reporting on the TAOS unit, proceed as in the following example: 1 Read in the Log profile: admin> read log LOG read 2 Enable Syslog: admin> set syslog-enabled = yes 3 Specify that you want end of call information sent: admin> set call-info=end-of-call 4 Specify the IP address of the host running Syslog: admin> set host=10.2.3.4 5 Specify the port the Syslog daemon is listening on: admin> set port=588
2-27
TAOS System Administration Checking the power supplies The TAOS unit will send all messages out on this port as soon as you write the Log profile. 6 Specify the Syslog facility: admin> set facility=local0 After setting a log facility number, you need to configure the Syslog daemon to write all messages containing that facility number to a particular log file. This file will be the TAOS unit log file. 7 8 Specify the format of Syslog messages: admin> set syslog-format = max Write the profile to save the changes: admin> write LOG written Note that Call-Info is intended for diagnostic support. It uses UDP, which provides no guaranteed delivery, so it should not be used for billing purposes.
2-28
TAOS System Administration Using a script to configure the TAOS unit 1 2 3 Create a text file that contains the configuration commands as you would enter them in the TAOS units CLI. Log into the TAOS unit with sufficient permissions to change the configuration. To upload the file to the TAOS unit, use the upload file feature of your Telnet or terminal software.
2-29
Following are the Userstat output fields with descriptions: Field SessionID Line/Chan Description Unique ID assigned to the session. Physical address (shelf.slot.line/channel) of the network port on which the connection was established, (for example, a T1 line/channel). Shelf:slot:item/logical-item of the host port to which the call was routed (for example, modem, HDLC channel). Transmit and receive rate. Note that for modem connections, the transmit rate is set automatically to the receive rate, because modem cards do not support asymmetric data rate connections.
2-30
Field Svc
Description Type of service in use for the session. Following are the possible values: --- (The service is being negotiated.) PPP (Point-to-Point Protocol) SLP (Serial Line IP) MPP (Multilink Protocol Plus) MP (Multilink Protocol) X25 (X.25) FRY (Frame Relay) EUR (EU-RAW) EUI (EU-UI) TLN (Telnet) BTN (Binary Telnet) TCP (raw TCP) TRM (Terminal Server) VCN (Virtual Connect) D25 (D-channel X.25) DTP (DTPT) The number dialed to initiate this session. The amount of time (in hours:minutes:seconds format) since the session was established. The amount of time (in hours:minutes:seconds format) since data was last transmitted across the connection.
Dialed# (displays only with -l option) ConnTime (displays only with -l option) IdleTime (displays only with -l option)
The Userstat command can terminate PPP, SLIP, MP+, Telnet, Telnet binary, Raw TCP, or terminal server user sessions. You cannot use the -k option to terminate Frame Relay or DTPT service types. You can configure the Userstat command output with the Userstat-Format parameter. For information, see the APX 8000/MAX TNT Reference.
2-31
admin> help userstat userstat usage: userstat -options [ params ] [ -o [format] ] command options: -s show users (default) -k <sessionID> kill a user session -a <ipAddress> show the session with matching <ipAddress> -u <username> show the session with matching <username> -l wide format (> 80 characters) -d dump, do not pass output through more format values: One or More of the following format characters %i SessionID %l Line/Chan %s Slot:Item %r Tx/Rx Rate %d Type of Service %a Address %u Username %c ConnTime %t IdleTime %n Dialed# default : %i %l %s %r %d %a %u %c %t %n
If you use the -o option and indicate the codes for SessionID and Line/Channel information, the command shows only the following details:
admin> userstat -o %i %l SessionID Line/Chan 288532030 1.01.01/012 <end user list> 1 active user(s)
2-32
1 active user(s)
Use the -u option to display information related to a known username. It requires a user-name argument on the command line. For example:
admin> userstat -u net1 SessionID Line/Chan Slot:Item Tx/Rx Rate Svc Address Username 288532030 1.01.01/012 1:03:01/002 56000/56000 PPP 1.1.1.238 net1 <end user list> 1 active user(s)
1 active user(s)
Setting the Finger parameter to Yes enables the TAOS unit to accept Finger queries and return the requested active session details to a remote client. The client can ask for a short or wide format. For example, a UNIX client can request the wide (140-character) format by using the -l option, as in the following command which displays, in wide format, session information for the system named apx1:
# finger -l @apx1
The following command displays the same information in narrow (80-character) format:
# finger @apx1
The client can also request the details of all sessions, or of a single session. For example, to request information about a single user named Tupshin:
# finger tupshin@apx1
2-33
TAOS System Administration Remote management of other units The Finger forwarding service, which uses the hostname format @host1@host2, is not supported. If the remote client uses the forwarding request format, the client sees the following message:
Finger forwarding service denied.
>1 Active
20-500 DYN Stat Qual Good 01:23:44 OK 1 channel CLU 100% ALU 100% 20-400 Ether Stat >Rx Pkt: 99871435 Tx Pkt: 76876757 Col: 73298 00-400 HW Config >BRI Interface Adrs: 00c05b45390 Enet I/F: AUI
20-300 WAN Stat >Rx Pkt: 667435 ^ Tx Pkt: 3276757 CRC: 323v 00-100 Sys Option >Security Prof:1 ^ Software +8.0+ S/N:4293801 v
Press Ctrl-n to move cursor to the next menu item. Press return to select it. Press Tab to move to another window--thick border indicates active window.
The Remote command argument is the station name, which must match the value of a Station parameter in a Connection profile, or the user ID at the start of a RADIUS profile. The connection must use the MP+ protocol, and the connection must already be established when you use the Remote command. When you use the Remote command on the shelf controller, it locates the host card that has an active connection to the remote unit. It then opens a session to that card, invokes the terminal-server interface, and uses the Remote command on the card to bring up the remote management session. The Remote command uses a proprietary protocol to connect to the remote unit and bring up its LCD menu, which can be used to reconfigure the unit. However, because your initial permissions are set by the default Security profile on the remote system,
2-34
TAOS System Administration Remote management of other units you might need to authenticate the Full Access or other administrator-level Security profile before managing the unit. You can also manually open a session with the host card that has an active connection to the remote unit, invoke the terminal-server, and run the Remote command on the slot card. For example:
admin> userstat -s SessionID Line/Chan Slot:Item Tx/Rx Rate Svc Address Username 228687860 1.01.02/01 1:03:01/01 56K/56K PPP 10.100.0.1 clarap75 228687861 1.02.03/02 1:04:02/00 28800/33600 MPP 10.168.6.24 allwynp50 <end user list> admin> open 1 4 hdlc2-1/4> terminal-server ascend% remote allwynp50 2 active user(s)
Error messages
The TAOS generates an error message for any condition that causes the session to terminate before sending the full number of packets. The following error messages can appear: Message
not authorized
Explanation Permissions are insufficient for beginning a remote management session. You must authenticate a User profile that enables the System permission. No profile was found for the specified station name. A profile was located for the specified station name, but it did not specify the MP+ encapsulation protocol. The MP+ connection to the remote station could not be established.
cannot find profile for <station> profile for <station> does not specify MPP cannot establish connection for <station>
2-35
Message
<station> did not negotiate MPP
Explanation The remote station did not negotiate an MP+ connection. Possibly the profile for the TAOS dial-in did not specify MP+. The remote station is running a version of TAOS that does not support remote management. A temporary condition, such as premature termination of the connection, caused the management session to fail. The remote station was configured to reject remote management. (The Remote Mgmt parameter was set to no in the remote stations System profile.)
far end does not support remote management management session failed
When you use the -n option, the TAOS unit requests a reload of all nailed profiles from the RADIUS server: admin> refresh -n You can specify how nailed connections are handled following a Refresh n by using the Perm-Conn-Upd-Mode parameter in the System profile. If set to All (the default), all existing permanent connections are brought down and then brought up again (along with any new connections) following the update. This causes service interruption every time any nailed profile is updated or added. If set to Changed, only new connections are created, and only those with modified attribute values are reestablished.
2-36
2-37
Network Administration
Diagnostic tools for TCP/IP networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1 Diagnostic tools for IGMP multicast interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16 Diagnostic tools for OSPF routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17 Diagnostic tools for IPX routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31 Diagnostic tools for displaying filter information . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32 Displaying software version log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35 Displaying Ethernet packet contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35 The TAOS unit supports several network management commands, which are useful for locating the sources of problems on the network and for communicating with other hosts for management purposes. Some of the network management tools focus on routing and interface information. They enable you to display the routing and interface tables, view real-time routing statistics, display route caches, and make changes to the routing table. The OSPF command supports numerous arguments for viewing information about the OSPF link-state database, adjacencies, and other aspects of the router configuration. Other tools are geared toward network usage, and enable you to display packets received on LAN interfaces, display the ARP cache, Ping a host, and log into a host by means of Rlogin or Telnet. For complete information about the commands described in this chapter, see the APX 8000/MAX TNT Reference.
Testing connectivity
The Ping command is useful for verifying that the transmission path between the TAOS unit and another station is open. Ping sends an ICMP echo_request packet to the specified station. It
3-1
Network Administration Diagnostic tools for TCP/IP networks the station receives the packet, it returns an ICMP echo_response packet. For example, to Ping the host techpubs: admin> ping techpubs PING techpubs (10.65.212.19): 56 data bytes 64 bytes from 10.65.212.19: icmp_seq=0 ttl=255 time=0 ms 64 bytes from 10.65.212.19: icmp_seq=3 ttl=255 time=0 ms ^C --- techpubs ping statistics --2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max = 0/0/0 ms You can terminate the Ping exchange at any time by pressing Ctrl-C. When you press Ctrl-C, the command reports the number of packets sent and received, the percentage of packet loss, the number of duplicate or damaged echo_response packets (if any), and round-trip statistics. In some cases, round-trip times cannot be calculated. During the Ping exchange, the TAOS unit displays information about the packet exchange, including the Time-To-Live (TTL) of each ICMP echo_response packet. The maximum TTL for ICMP Ping is 255, while and the maximum TTL for TCP is often 60 or lower, so you might be able to Ping a host but not be able to run a TCP application (such as Telnet or FTP) to that station. If you Ping a host running a version of Berkeley UNIX before 4.3BSD-Tahoe, the TTL report is 255 minus the number of routers in the round-trip path. If you Ping a host running the current version of Berkeley UNIX, the TTL report is 255 minus the number of routers in the path from the remote system to the station performing the Ping.
admin>netstat -i Name ie0 lo0 rj0 bh0 wanabe local mcast MTU 1500 1500 1500 1500 1500 Net/Dest 192.168.7.0/24 127.0.0.1/32 127.0.0.2/32 127.0.0.3/32 127.0.0.3/32 Address 192.168.7.135 127.0.0.1 127.0.0.2 127.0.0.3 127.0.0.3 127.0.0.1 224.0.0.0 192.168.7.135 Ipkts 71186 53195 0 0 0 59753 0 0 Ierr 2 0 0 0 0 0 0 0 Opkts 53131 53195 0 0 0 59753 0 0 Oerr 96 0 0 0 0 0 0 0
tunnel7 1500
3-2
Name
MTU
Net/Dest
Address
Ipkts 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Ierr 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Opkts 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Oerr 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
vr0main 1500 sip0 wan10 wan11 wan12 wan13 wan14 wan15 wan16 wan17 wan18 wan19 wan20 wan21 wan22 wan23
192.168.7.135/32 192.168.7.135 192.168.7.135 192.168.7.135 192.168.7.135 192.168.7.135 192.168.7.135 192.168.7.135 192.168.7.135 200.1.100.2 192.168.7.135 192.168.7.135 192.168.7.135 192.168.7.135 192.168.7.135 200.2.101.2
65535 1528 1528 1528 1528 1528 1528 1528 1500 1528 1528 1528 1528 1528 1500 200.4.2.2 200.5.2.2 200.6.1.2 200.6.2.2 200.100.2.2 200.100.3.2 200.4.4.2 200.6.100.2 200.4.4.3 200.4.2.3 200.3.2.2 200.3.1.2 200.4.103.2 200.4.101.3
.. .. .. ie1-5-1 1500 ie1-5-2 1500 ie1-5-3 1500 ie1-5-4 1500 ie1-5-5 1500
0 0 75837 0 0
0 0
1 1
0 0 0 0 0
0 75838 0 0 1 0
3-3
Network Administration Diagnostic tools for TCP/IP networks The interface table contains the following information: Column name
Name
Description Name of the interface: ie0-n The shelf-controller Ethernet interfaces. ie[shelf]-[slot]-[item]The Ethernet interfaces for Ethernet cards. lo0The loopback interface. rj0The reject interface, used in network summarization. bh0The blackhole interface, used in network summarization. wanN A WAN connection, entered as it becomes active. wanabeAn inactive RADIUS dialout profile. localThe local machine. mcastThe multicast interface, which represents the multicast forwarder for the entire class-D address space. tunnelNA pseudo-interface that is used only when the TAOS unit is configured as an ATMP Router Home Agent. In that configuration, the TAOS unit creates a route for each registered Mobile Client. Regardless of how many tunnels the Home Agent may terminate, there is always a single tunnel interface. (The number appended to the tunnel interface name is an internal number used by the system.)
MTU
(Maximum Transmission Unit) The maximum packet size allowed on the interface. Network or the target host this interface can reach. Address of this interface. Number of packets received. Number of packets that contain errors. Number of packets transmitted. Number of transmitted packets that contain errors.
3-4
SG CP CP CP CP CP CP CP
60 0 0 0 0 0 0 0
8 0 0 0 0 0 0 0
1456 0 0 0 0 0 0 0
255.255.255.255/32 -
The columns in the routing table contain the following information: Column Description
Destination The routes target address. To send a packet to this address, the TAOS unit uses this route. If the target address appears more than once in the routing table, the TAOS unit uses the most specific route (having the largest subnet mask) that matches that address. Gateway The next hop router that can forward packets to the given destination. Direct routes (without a gateway) show a hyphen in this column.
3-5
Column IF
Description The name of the interface through which to send packets over this route: ie0 or ie[shelf]-[slot]-[item] is an Ethernet interface. lo0 is the loopback interface. rj0 is the reject interface, used in network summarization. bh0 is the blackhole interface, used in network summarization. wanN is a WAN connection, entered as it becomes active. wanabe indicates an inactive RADIUS dialout profile. local indicates a single route targeted at the local machine. mcast indicates a route to a virtual device. The route encapsulates the multicast forwarder for the entire class D address space.
Flg
One or more of the following flags: Ca directly connected route, such as Ethernet Ian ICMP redirect dynamic route Nplaced in the table via SNMP MIB II OA route learned from OSPF Ra route learned from RIP ra transient RADIUS-like route S a static route ?a route of unknown origin, which indicates an error Gan indirect route via a gateway Pa private route Ta temporary route Ma multipath route *a backup static route for a transient RADIUS-like route
Pref Metric
The preference value. See the description of the Preference parameter for information about defaults for route preferences. A RIP-style metric for the route, with a range of 0-16. Routes learned from OSPF show a RIP metric of 10. OSPF cost-infinity routes show a RIP metric of 16. A count of the number of times the route was referenced since it was created. (Many of these references are internal, so this is not a count of the number of packets sent over this route.) The age of the route in seconds. RIP and ICMP entries are aged once every 10 seconds.
Use
Age
3-6
Network Administration Diagnostic tools for TCP/IP networks across system resets. RIP and OSPF updates can add back any route you remove with IProute Delete. Also, the TAOS unit restores all routes listed in the IP-Route profile after a system reset. The IProute command uses the following syntax: iproute option Syntax element
add delete
Description Add an IP route to the routing table. Delete an IP route from the routing table.
gateway_IPaddr [/subnet_mask]
pref metric
It adds a route to the 10.1.2.0 network and all of its subnets, through the IP router located at 10.0.0.3/24. The metric to the route is 1 (one hop away). If you try to add a route to a destination that is already in the routing table, the TAOS unit does not replace the existing route unless it has a higher metric than the route you attempt to add. If you get the message Warning: a better route appears to exist, the TAOS unit has rejected your attempt to add a route.
3-7
The arguments are the same as for IP Route Add. For example, the following command removes the route to the 10.1.2.0 network:
admin> iproute delete 10.1.2.0 10.0.0.3/24
You can also change the metric or preference value of an existing route by using the IProute command. For example, if the routing table contains the following route:
Destination 10.122.99.0/24 Gateway 10.122.99.1 IF wan4 Flg SG Pref Met 100 7 Use 0 Age 48630
You could change the metric as follows: admin> iproute add 10.122.99.0/24 10.122.99.1 50 3
Tracing routes
The TraceRoute command is useful for locating slow routers or diagnosing IP routing problems. It traces the route an IP packet follows, by launching UDP probe packets with a low Time-To-Live (TTL) value and then listening for an ICMP time exceeded reply from a router. For example, to trace the route to the host techpubs:
admin> traceroute techpubs traceroute to techpubs (10.65.212.19), 30 hops max, 0 byte packets 1 techpubs.eng.ascend.com (10.65.212.19) 0 ms 0 ms 0 ms
Probes start with a TTL of one and increase by one until of the following conditions occur: The TAOS unit receives an ICMP port unreachable message. (The UDP port in the probe packets is set to an unlikely value, such as 33434, because the target host is not intended to process the packets. A port unreachable message indicates that the packets reached the target host and were rejected.) The TTL value reaches the maximum value. (By default, the maximum TTL is set to 30.) You can use the -m option to specify a different TTL. For example:
admin> traceroute -m 60 techpubs traceroute to techpubs (10.65.212.19), 60 hops max, 0 byte packets 1 techpubs.eng.abc.com (10.65.212.19) 0 ms 0 ms 0 ms
TraceRoute sends three probes at each TTL setting. The second line of output shows the address of the router and the round trip time of each probe. If the probe answers come from different gateways, the address of each responding system is shown. If there is no response within a three-second timeout interval, the second line of output lists an asterisk. For the details of the TraceRoute command, see the APX 8000/MAX TNT Reference.
3-8
The ARP table displays the following information: Column IP Address MAC Address Type IF Description The address contained in ARP requests. The MAC address of the host. How the address was learned, that is, dynamically (DYN) or by specification of a static route (STAT). The interface on which the TAOS unit received the ARP request.
3-9
Description The number of retries needed to refresh the entry after it timed out. The number of packets sent out to refresh the entry after it timed out.
To add an ARP table entry, use the -a option, as in the following example: admin> arptable -a 10.65.212.3 00:00:81:3D:F0:48 To delete an ARP table entry, use the -d option, as in the following example: admin> arptable -a 10.9.8.20 To clear the entire ARP table, use the -f option: admin> arptable -f
3-10
1 2 3
0 0 0
32 128 128
0 0 0
0 0 0
-Socket- Local 1/c 1/c 1/c 1/c 1/c 0 192.168.7.135.79 1 192.168.7.135.1723 2 192.168.7.135.23 4 192.168.7.135.23 9 192.168.7.135.23
The output shows the queue depth of various UDP ports, as well as the total packets received and total packets dropped on each port. The total-packets-received count includes the total packets dropped. For this sample output, the SNMP queue depth was set to 32. For information about queue depths, see the APX 8000/MAX TNT WAN, Routing, and Tunneling Configuration Guide. The Netstat command supports the s option, which displays protocol statistics. The s option uses the following syntax: netstat -s identifiers If no identifiers follow the s option, all protocol statistics are shown. If specified, the identifiers determine the type of protocol statistics to display. Valid identifiers include udp, tcp, icmp, ip, igmp, or mcast. Following is an example that displays all statistics:
admin>netstat -s udp: 15636 packets received 0 packets received with no ports 0 packets received with errors 0 packets dropped 68 packets transmitted tcp: 0 active opens 7 passive opens 0 connect attempts failed 0 connections were reset 2 connections currently established 1457 segments received 0 segments received out of order 1728 segments transmitted 18 segments retransmitted 5 active closes 0 passive closes 0 disconnects while awaiting retransmission icmp: 216 packets received 0 packets received with errors Input histogram: 216 echo requests
3-11
271 packets transmitted 0 packets not transmitted due to lack of resources Output histogram: 216 echo replies 24 destination unreachable 31 time exceeded ip: 28860 packets received 0 packets received with header errors 0 packets received with address errors 0 packets received forwarded 0 packets received with unknown protocols 0 inbound packets discarded 17310 packets delivered to upper layers 2084 transmit requests 0 discarded transmit packets 49 outbound packets with no route 0 reassemblies timeout 268 reassemblies required 12 reassemblies succeeded 244 reassemblies failed 12 fragmentation succeeded 0 fragmentation failed 24 fragmented packets created 0 route discards due to lack of memory 64 default ttl igmp: 0 0 0 0 0 0 0 0 0 mcast: 0 0 0 0 0 packets packets packets packets packets received forwarded in error dropped transmitted packets received bad checksum packets received bad version packets received query packets received leave packets received packets transmitted query packets sent response packets sent leave packets sent
3-12
If you wish, you can change the default escape character from a tilde to any other character. For details, see the APX 8000/MAX TNT Reference. If your user name on the TAOS unit is different from your user name on the remote host, you can specify a user name on the Rlogin command line. For example: admin> rlogin -l marcel techpubs Password:
You can close the Telnet session by logging out of the remote host:
techpubs% logout Connection closed.
3-13
Option -a -c n -d -e -i -u n
Description Set token counters to zero. If the system resets, all token counters are set to zero. If a card resets, counters on that card are set to zero. Set the counter for the specified token to zero. Disable the token-counting process. Enable the token-counting process. Display the current token search information, including the number found of each defined token. Define a search token pattern and assign it the specified number.
Each pattern can contain up to 20 characters, but the first specified character cannot be repeated in the pattern more than eight times. You can specify the pattern as a combination of alphanumeric, hexadecimal, octal, and special characters, but output on the host is always in hexadecimal format. The following special characters are significant when specifying the pattern: Characters
\x##
ASCII value N/A. To insert a 2-digit hexadecimal number in the pattern, precede the number with \x. N/A. To insert a 2-digit octal number, precede the number with a backslash. 7 8
\## \a \b
3-14
Characters
\f \n \r \t \v \\ \" \
Meaning Form feed Newline Return Tab Vertical tab Backslash Quotation mark Apostrophe
ASCII value 12 10 13 9 11 92 34 44
The next commands open a session with a modem card in shelf 5, slot 6 and display the token information gathered on that card:
admin> open 5 6 csm3-5/6> tokencount Tokencount is enabled "0xb00x350xff0x100x1" token received:0 "0x4c0x430xa" token received:0 "0x410x310xa0xd" token received:0 "0x70x80xc0xa0xd0x90xb0x5c0x270x22" received:0
The number specified in the Tokencount -u command is out of the valid range from 1 to 4.
error: max. token size is 20
3-15
Description Index to a hash table (displayed for debugging purposes only). IP multicast address used for the group. An asterisk indicates the IP multicast address being monitored, meaning that members join this address by local application. ID of each member of each multicast group. The zero ID represents members on the same Ethernet interface as the TAOS unit. All other IDs go to members of each group as they inform the TAOS unit that they have joined the group. If a client is a member of more than one group to which the TAOS unit forwards multicast packets, it has more than one multicast ID. When this membership expires. The TAOS unit sends out IGMP queries every 60 seconds, so the expiration time is usually renewed. If the expiration time is reached, the TAOS unit removes the entry from the table. If the field contains periods, this membership never expires. Number of packets forwarded to the client, number of packets dropped due to lack of resources, and the state of the membership. The state is displayed for debugging purposes.
Members
Expire time
Counts
3-16
RecvCount 0 39 33310
CLU 0 68 65
ALU 0 67 65
Description ID of the interface on which the client resides. The value 0 (zero) represents the Ethernet. Other numbers are WAN interfaces, numbered according to when they became active. Mbone is the interface on which the multicast router resides. Version of IGMP being used. Number of IGMP messages received on the clients interface. Current Line Utilization and Average Line Utilization. Both indicate the percentage of bandwidth utilized across this interface. If bandwidth utilization is high, some IGMP packet types are not forwarded.
3-17
ospf internal
OSPF Router ID: AS boundary capability: Attached areas: OSPF packets rcvd: Transit nodes allocated: LS adv. allocated: Queue headers alloc: # Dijkstra runs: Incremental VL udates: Multicast pkts sent: LS adv. aged out:
10.103.0.254 Yes 1 71788 812 2870 64 10 0 27343 0 Estimated # ext. (5) routes: 65536 OSPF packets rcvd w/errs: Transit nodes freed: LS adv. freed: Queue headers avail: Incremental summ. updates: Buffer alloc failures: Unicast pkts sent: LS adv. flushed: 19 788 2827 64 0 0 1154 507
External (Type 5) LSA database Current state: Number of LSAs: Number of overflows: Normal 43 0
The following table describes the output: Field OSPF version OSPF Router ID AS boundary capability Attached areas Estimated # ext.(5) routes OSPF packets rcvd Specifies Version of the OSPF protocols running. IP address assigned to the TAOS unit, which is typically the address specified for the Ethernet interface. Yes if the TAOS unit functions as an ASBR or No if it does not function as an ASBR. Number of areas to which this TAOS unit attaches. Number of ASE-5 routes that the TAOS unit can maintain before it goes into an overload state. Total number of OSPF packets received by the TAOS unit.
3-18
Specifies Total number of OSPF errored packets received by the TAOS unit. Allocated transit nodes generated only by Router LSAs (Type 1) and Network LSAs (Type 2).
Transit nodes freed Freed transit nodes generated only by Router LSAs (Type 1) and Network LSAs (Type 2). LS adv. freed Number of LSAs freed.
Queue headers alloc Number of queue headers allocated. LSAs can reside in multiple queues. Queue headers are the elements of the queues that contain the pointer to the LSA. Queue headers avail Available memory for queue headers. To prevent memory fragmentation, the TAOS unit allocates memory in blocks. The TAOS unit allocates queue headers from the memory blocks. When the TAOS unit frees all queue headers from a specific memory block, the TAOS unit returns the block to the pool of available memory blocks. # Dijkstra runs Incremental summ. updates Incremental VL updates Buffer alloc failures Number of times that the TAOS unit has run the Dijkstra algorithm (short path computation). Number of summary updates that the TAOS unit runs when small changes cause generation of Summary LSAs (Type 3) and Summary Router LSAs (Type 4). Number of incremental virtual link updates that the TAOS unit performs. Number of buffer allocation problems that the TAOS unit has detected and from which it has recovered.
Multicast pkts sent Number of multicast packets sent by OSPF. Unicast pkts sent LS adv. aged out LS adv. flushed Incremental ext.(5) updates Incremental ext.(7) updates Current state Number of LSAs Number of unicast packets sent by OSPF. Number of LSAs that the TAOS unit has aged and removed from its tables. Number of LSAs that the TAOS unit has flushed. Number of incremental ASE-5 updates. Number of incremental ASE-7 updates. State of the External (Type-5) LSA database: Normal or Overload. Number of LSAs in the External (Type-5) LSA database.
Number of overflows Number of ASE-5s that exceeded the limit of the database.
3-19
# advertisements: Checksum total: Type NET NET NET NET NET NET LS ID 10.101.0.1 10.102.0.1 10.104.0.2 10.105.0.8 10.123.0.6 100.103.100.204
Network Link States (Area: 0.0.0.0) LS originator Seqno Age Xsum 10.101.0.1 0x80000236 746 0x1d45 10.102.0.1 0x80000235 2592 0x1f40 10.104.0.2 0x80000179 830 0x67a8 10.123.0.8 0x80000304 1071 0x0ccd 12.151.0.2 0x8000023d 825 0x59ed 10.103.0.204 0x80000029 252 0x8b34 6 0x1961b
Type ASE5 ASE5 ASE5 ASE5 ASE5 ASE5 ASE5 ASE5 ASE5 ASE5 ASE5
LS ID 10.103.1.0 10.103.2.0 10.103.3.0 10.103.4.0 10.103.6.0 10.103.7.0 10.103.8.0 10.107.0.0 10.113.0.0 10.200.0.2 10.222.0.2
External ASE5 Link States LS originator Seqno 10.103.0.204 0x8000004f 10.103.0.204 0x8000004f 10.103.0.204 0x8000004f 10.103.0.204 0x8000004f 10.103.0.204 0x8000004f 10.103.0.204 0x8000004f 10.103.0.204 0x8000004f 10.103.0.254 0x80000104 10.103.0.254 0x80000121 10.103.0.254 0x80000001 10.103.0.254 0x80000001
Age 1726 1716 1704 1692 1672 1666 1641 250 250 231 202
Xsum 0xd23f 0xc749 0xbc53 0xb15d 0x9b71 0x907b 0x8585 0x1413 0x0e76 0xa823 0x9f16
3-20
44 0x191d3a
The following table describes the output: Field Type Specifies Type of link as defined in RFC 1583: Type 1 (RTR) are router-LSAs that describe the collected states of the router s interfaces. Type 2 (NET) are network-LSAs that describe the set of routers attached to the network. Types 3 and 4 (SUM) describe routes to networks in remote areas or AS boundary routers. Type 5 (ASE) are AS-external-LSAs that describe routes to destinations external to the Autonomous System. A default route for the Autonomous System can also be described by an AS-external-LSA. The ext option only displays ASE5 LSAs. Type 7 are ASE-7 link advertisements that are only flooded within an NSSA.
Target address of the route. Address of the advertising router. Hexadecimal number that begins with 80000000 and increments by one for each LSA received. Age of the route in seconds. Checksum of the LSA.
# advertisements Total number of entries in the database. Checksum total Checksum of the database.
3-21
The output of this command is the same as for the OSPF database command, with the exception of the Type. The OSPF Ext command only shows ASE5 type LSAs.
Cost 1 1 1 1 1 1
The following table describes the output: Field Area Destination Specifies Area in which the router resides. The routes target address. To send a packet to this address, the TAOS unit uses this route. If the target address appears more than once in the routing table, the TAOS unit uses the most specific route (having the largest subnet mask) that matches that address. Subnet mask of the route. Cost of the router.
Mask Cost
3-22
Type RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR RTR NET NET NET NET NET NET
Seqno 0x8000029f 0x800002d1 0x800002a2 0x800002cc 0x800001b8 0x800002fb 0x800002ab 0x80000191 0x80000297 0x800002e3 0x8000030e 0x800002ac 0x80000261 0x800003ff 0x800003ff 0x800006ec 0x80000398 0x800001a8 0x80000234 0x80000234 0x80000177 0x80000302 0x8000023b 0x80000027 24 0xa2ae6
Age 720 126 767 124 1147 167 751 1232 843 1032 1560 1178 194 1045 1149 799 1791 175 720 767 804 1045 799 226
Xsum 0x8fd6 0x189c 0x9dc0 0x862c 0x765d 0x8cc9 0xbd8c 0x2a58 0x4693 0x4847 0x5b73 0xd32c 0x4f23 0xf1ef 0xb236 0x092f 0xb648 0x5736 0x2143 0x213f 0x6ba6 0x10cb 0x5deb 0x8f32
The fields in the output contain the following information: Field Area Type Specifies Area ID. Indicates the type of link as defined in RFC 1583: LS ID LS originator Seqno Type 1 (RTR) are router-LSAs that describe the collected states of the router s interfaces. Type 2 (NET) are network-LSAs that describe the set of routers attached to the network. Types 3 and 4 (SUM) describe routes to networks in remote areas or AS boundary routers. Type 7 are ASE-7 link advertisements that are only flooded within an NSSA.
Specifies the target address of the route. Specifies the address of the advertising router. Indicates a hexadecimal number that begins with 80000000 and increments by one for each LSA received.
3-23
Specifies Specifies the age of the route in seconds. Indicates the checksum of the LSA.
advertisements Specifies the total number of entries in the link-state database. Checksum total Indicates the checksum of the link-state database. You can expand each entry in the link-state database to view additional information about a particular LSA, as explained in the next section.
The command requires that you include the first four fields of the LSA as listed in the database. You can select the first four fields and paste them in after typing the command. For example, to show an expanded view of the last entry in the link-state database shown in the previous section:
admin> ospf lsa 0.0.0.0 ase 10.5.2.160 10.5.2.162 LSA type: ASE ls id: 10.5.2.160 adv rtr: 110.5.2.162 age: 568 seq #: 80000037 cksum: 0xfffa Net mask: 255.255.255.255 Tos 0 metric: 10 E type: 1 Forwarding Address: 0.0.0.0 Tag: c0000000
The output differs depending on the type of link. The following is an example of a router LSA:
admin> ospf lsa 0.0.0.0 rtr 192.1.1.1 192.1.1.1 LS age: 66 LS options: (0x2) E LS type: 1 LS ID (destination): 192.1.1.1 LS originator: 192.1.1.1 LS sequence no: 0x80000399 LS checksum: 0xb449 LS length: 48 Router type: (0x2) ASBR # router ifcs: 2 Link ID: 10.105.0.8 Link Data: 10.105.0.7 Interface type: (2) TrnsNetwork No. of metrics: 0 TOS 0 metric: 10 (0) Link ID: 10.123.0.6 Link Data: 10.123.0.7 Interface type: (2) TrnsNetwork No. of metrics: 0 TOS 0 metric: 10 (0)
3-24
Network Administration Diagnostic tools for OSPF routers The next example is for a network LSA:
admin> ospf lsa 0.0.0.0 net 100.103.100.204 10.103.0.204 LS age: 814 LS options: (0x2) E LS type: 2 LS ID (destination): 100.103.100.204 LS originator: 10.103.0.204 LS sequence no: 0x80000027 LS checksum: 0x8f32 LS length: 36 Network mask: 255.255.0.0 Attached Router: 10.103.0.204 (1) Attached Router: 10.103.0.254 (1) Attached Router: 10.123.0.254 (1)
For information about the fields in the output of these commands, see the APX 8000/MAX TNT Reference or RFC 1583.
3-25
Network Administration Diagnostic tools for OSPF routers The fields in the output contain the following information: Field DType RType Specifies Internal route type. DType displays one of the following values: RTE (generic route), ASBR (AS border route), or BR (area border route). Internal router type. RType displays one of the following values: FIX (static route), NONE, DEL (deleted or bogus state), OSPF (OSPF-computed), OSE1 (type 1 external), or OSE2 (type 2 external). Destination address and subnet mask of the route. Area ID of the route. Cost of the route. Hexadecimal number representing an internal flag. Next hop in the route to the destination. Number of the interface used to reach the destination.
The fields in the output contain the following information: Field LSA type ls id adv rtr age seq # cksum Net mask Tos metric E type Forwarding Address Tag Specifies Type of Link-State Advertisement. Target address of the router. Address of the advertising router. Age of the route in seconds. Number that begins with 80000000 and increments by one for each LSA received. Checksum for the LSA. Subnet mask of the LSA. Type of Service for the LSA. Cost of the link, not of a route. The cost of a route is the sum of all intervening links, including the cost of the connected route. External type of the LSA indicating either 1 (Type 1) or 2 (Type 2) Forwarding Address of the LSA (described in RFC 1583). Tag of the LSA (described in RFC 1583).
3-26
#nets 0
#rtrs 2
#brdrs 0
#intnr 3
The fields in the output contain the following information: Field Area ID Authentication Area Type #ifcs #nets #rtrs #brdrs #intnr Specifies Area number in dotted-decimal format. Type of authentication: Simple-passwd, MD5, or Null. Type of OSPF area: Normal, Stub, or NSSA. Number of TAOS unit interfaces specified in the area. Number of reachable networks in the area. Number of reachable routers in the area. Number of reachable area border routers in the area. Number of reachable internal routers in the area.
3-27
Network Administration Diagnostic tools for OSPF routers The fields in the output contain the following information: Field DType RType Destination Area Cost Next hop(s) IfNum Specifies Internal route type. DType displays one of the following values: RTE (generic route), ASBR (AS border route), or BR (area border route). Internal router type. Router s IP address. Area in which the router resides. Cost of the router. Next hop in the route to the destination. Number of the interface used to reach the destination.
Brdcst DR Brdcst Other Brdcst Other P-P P-P P-P P-P P-P
P-P
120
The fields in the output contain the following information: Field Ifc Address Phys Assoc. Area Type State #nbrs #adjs Specifies Address assigned to the TAOS units Ethernet interface. To identify WAN links, use the Type and Cost fields. Name of the interface or the Connection profile for WAN links. Area in which the interface resides. Point-to-Point (P-P) or Broadcast (Brdcst). WAN links are P-P links. State of the link according to RFC 1583. There are many possible states, and not all states apply to all interfaces. Number of neighbors of the interface. Number of adjacencies on the interface.
3-28
Field DInt
Specifies Number of seconds that the TAOS unit waits for a router update before removing the router s entry from its table. The interval is called the Dead Interval.
For example:
admin> ospf intf 194.194.194.2 Interface address: 194.194.194.2 Attached area: 0.0.0.0 Physical interface: phani (wan1) Interface mask: 255.255.255.255 Interface type: P-P State: (0x8) P-P Designated Router: 0.0.0.0 Backup DR: 0.0.0.0 Remote Address: 194.194.194.3 DR Priority: 5 Hello interval: 30 Rxmt interval: Dead interval: 120 TX delay: 1 Poll interval: Max pkt size: 1500 TOS 0 cost: 10 # Neighbors: 1 # Adjacencies: 1 # Full adjs.: # Mcast floods: 1856 # Mcast acks: 1855
5 0 1
The fields in the output contain the following information: Field Interface Address Attached Area Physical interface Interface type State Designated Router Backup DR Remote Address DR Priority Hello interval Specifies IP address specified for the TAOS units Ethernet interface. Area in which the interface resides. Name of the interface or the Connection profile for WAN links. Point-to-Point (P-P) or Broadcast (Bcast). WAN links are P-P links. State of the link according to RFC 1583. There are many possible states, and not all states apply to all interfaces. IP address of the designated router for the interface. IP address of the backup designated router for the interface. IP address of the remote end of a Point to Point (WAN) link. Priority of the designated router. Interval in seconds that the TAOS unit sends Hello packets (as defined in RFC 1583).
3-29
Field Rxmt interval Dead interval TX delay Poll interval Max pkt size TOS 0 Count # neighbors # adjacencies # Full adjs. # Mcast floods # Mcast acks
Specifies Retransmission interval (as described in RFC 1583). Number of seconds that the TAOS unit waits for a router update before removing the router s entry from its table. Interface transmission delay. Poll interval of nonbroadcast multiaccess networks. Maximum size of a packet that the TAOS unit can send to the interface. Type of Service normal (0) cost. Number of neighbors. Number of adjacencies. Number of fully-formed adjacencies. Number of multicast floods on the interface. Number of multicast acknowledgments on the interface.
The fields in the output contain the following information: Field Neighbor ID Neighbor addr Specifies Address assigned to the interface. In the TAOS unit, the IP address is always the address assigned to the Ethernet interface. IP address of the router used to reach a neighbor (often the same address as the neighbor itself).
3-30
Field State
Specifies State of the link-state database exchange. Full indicates that the databases are fully aligned between the TAOS unit and its neighbor. For a description of possible states, see RFC 1583. Number of LSAs in the retransmission list. Number of LSAs in the database summary list. Number of LSAs in the request list. Designated router election priority assigned to the TAOS unit. Interface name for the Ethernet or Connection profile name for the WAN.
To display information about a particular OSPF neighbor, append the Neighbor ID to the nbrs option. For example: admin> ospf nbrs 10.105.0.4 OSPF Router ID: 10.105.0.4 Neighbor IP address: Neighbor State: Physical interface: DR choice: Backup choice: DR Priority: DB summ qlen: 0 LS rxmt qlen: Last hello: 6 # LS rxmits: 0 # Direct acks: # Old LS rcvd: 0 # Dup acks rcv: # Adj. resets: 0 10.105.0.4 (0x8) 2Way ie1-7-1 (ie1-7-1) 10.105.0.8 10.105.0.49 5 0 LS req qlen: 0 0 # Dup LS rcvd: # Nbr losses:
0 0 0
The output contains these fields: IPX address: The IPX address of the server. The address uses this format: network number:node number:socket number
3-31
Network Administration Diagnostic tools for displaying filter information type: The type of service available (in hexadecimal format). For example, 0451 designates a file server. server name: The first 35 characters of the server name.
To display the IPX routing table, enter the Show command with the netware networks option. For example:
ascend% show netware networks network CFFF0001 next router 00000000000 hops 0 ticks 1 origin Ethernet S
The output contains these fields: Fields network hops ticks origin Descriptions The IPX network number. The hop count from the shelf controller to the network. The tick count to the network. The name of the profile used to reach the network. If the origin is a network connected to a TAOS units Ethernet interface, the Origin field displays Ethernet.
next router The address of the next router, or 0 (zero) for a direct or WAN connection.
Note: An S or an H flag can appear next to the origin. S indicates a static route. H indicates a hidden static route. Hidden static routes occur when the router learns of a better route.
3-32
gen_callfilt
The output displays a session ID number, username, and an indication of where the session was authenticated (local or external). Sessions authenticated by local profiles display the filter names specified in the Connection profile. Externally authenticated sessions, such as RADIUS sessions, have no associated filter names so they appear with a <filters present> notation. The columns in the command output provide the following information: Output field ID Username Src Route-Filter Specifies Identification number for the session. Name of the authenticated profile. Source of the profile: whether it is downloaded through RADIUS (ext) or is a local profile (loc). If a route filter has been applied to the session. For sessions authenticated locally, the name of the filter is supplied. For externally authenticated sessions, <filters present> indicates that a route filter has been applied. If blank, no route filter applies. If a data filter has been applied to the session. For sessions authenticated locally, the name of the filter is supplied. For externally authenticated sessions, <filters present> indicates that a data filter has been applied. If blank, no data filter applies. If a call filter has been applied to the session. For sessions authenticated locally, the name of the filter is supplied. For externally authenticated sessions, <filters present> indicates that a call filter has been applied. If blank, no call filter applies. If a type of service (TOS) filter has been applied to the session. For sessions authenticated locally, the name of the filter is supplied. For externally authenticated sessions, <filters present> indicates that a TOS filter has been applied. If blank, no TOS filter applies.
Data-Filter
Call-Filter
TOS-Filter
The following sample output shows that no filters are applied to the sessions:
admin> filterdisp 23 Hostname: pvc5 No associated filters
3-33
In the following sample output, call filters have been applied to a session that was authenticated locally:
admin> filterdisp 22 Hostname: Call Filter Direction: In pvc4
Forward = no Type = Generic Filter offset = 0 len = 0 more = no comp-neq = no dummyForPadding = 0 mask = 00:00:00:00:00:00:00:00:00:00:00:00 value = 00:00:00:00:00:00:00:00:00:00:00:00 Call Filter Direction: Out Forward = yes Type = Generic Filter offset = 0 len = 0 more = no comp-neq = no dummyForPadding = 0 mask = 00:00:00:00:00:00:00:00:00:00:00:00 value = 00:00:00:00:00:00:00:00:00:00:00:00
The following sample output shows filters applied to an externally authenticated session:
admin> filterdisp 17 Hostname: edleung searching for external filters... Externally obtained filters exist Data Filter Direction: Out Forward = yes Type = IP Filter protocol = 0 source-address-mask = 0.0.0.0 source-address = 0.0.0.0 destination-address-mask = 0.0.0.0 destination-address = 0.0.0.0 Src-Port-Cmp = none source-port = 0 Dst-Port-Cmp = none dest-port = 0 tcp-estab = no Forward = yes Type = Generic Filter
3-34
Parameter Log-Software-Version
Specifies Enable/disable hourly log messages reporting the current software version. The message is sent to the Syslog host. If Debug permission is enabled, the message is also displayed on the screen.
3-35
ETHER XMIT: 12 of 407 octets 107E1350: 00 c0 80 89 03 d7 00 c0 {k.. ETHER XMIT: 12 of 161 octets 107E1350: 00 c0 80 89 03 d7 00 c0 {k.. ETHER RECV: 12 of 60 octets .. .. .. 7b 6b 9f d6 ........ 7b 6b 9f d6 ........
To stop displaying the Ethernet statistics, specify 0 (zero) octets: admin> ether-display 0 0 Alternatively, you can stop the display by disabling debug output: admin> debug off Diagnostic output disabled For complete information about the Ether-Display command, see the APX 8000/MAX TNT Reference.
3-36
Enabling debug permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 Enabling debug output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 Debug levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 Getting online help for debug commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Using combinations of commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Using the debug commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Alphabetical list of debug commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Special administrative debug commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-52 Note: Every attempt has been made to confirm that this chapter correctly describes the functionality and output of the TAOS units debug commands. However, while debug mode can be a very valuable troubleshooting tool for anyone, its primary focus is on the requirements of Lucents development engineers. For this reason, Lucent does not guarantee the completeness of the list of commands published for a given release nor the exhaustive cataloging of their functionality.
Caution: Under most circumstances, debug commands are not required for correct operation of the TAOS unit. And in some circumstances they might produce undesirable results. Please use the following information with caution. Contact Lucent Technical Support with any questions or concerns.
4-1
Using Debug Commands Enabling debug permissions Note that when you are logged into the TAOS unit with debug privileges, the interface might display normally unavailable parameters and commands, some of which are not configurable in certain situations. For this reason, you should create a special profile for debugging purposes, and only use that profile when you are debugging the TAOS unit.
4-2
admin> diag -l
Debug levels
Debug levels determine the number and type of messages displayed. But generally, the lower you set the debug level, the fewer messages the TAOS unit displays. Setting the debug level to 0 (zero) disables the debug output for the command. Set the debug level with the specific debug command followed by the -t option, as in the following examples: admin> ifmgr -t 0 ifmgr debug level is now 0 (disabled) admin> ifmgr -t 4 ifmgr debug level is now 4 (enabled)
4-3
To get basic help for a debug command, enter the Help command, followed by the name of the debug command, as in the following example: admin> help ifmgr ifmgr usage: ifmgr -option -d (d)isplay interface table entries. -d <ifNum> (d)etails of given i/f table entry. -t (t)oggle debug display. ifmgr [up|down] [ifNum|ifName]
4-4
Using Debug Commands Using the debug commands When troubleshooting modem-related issues, you might want to use Modemdrvstate, Modemdiag and Mdialout (if modem outdial is supported on your TAOS unit) to get all modem-related information for your calls. Using several commands simultaneously not only gives you a clearer picture of a given situation, it also shows you a chronological timeline of the events that are happening.
Frame Relay
The following commands display information about Frame Relay interfaces. FRDLstate FRdump FRinARP FRLinkState FRLMI FRMgrDump FRPriorityErrors FRScert FRstate
Calls
The following commands display information about how the TAOS unit handles calls. Callback Permconn-list Tntcall Routmgr
Authentication
The following commands display information about how the TAOS unit authenticates calls. Authendebug Lanval Radacct Raddbgdump Radif Radservdump
4-5
Host-side devices
The following commands display information about the TAOS units host devices. ModemDrvDump ModemDrvState Modemd1stats, Modemd2stats, Modemd3stats Ether-Stats Ifmgr
Network-side devices
The following commands display information about the TAOS units network devices. NetIF Networki Pridisplay WANdisplay WanEventsStats WANopening Wantoggle
Protocols
The following commands display information about the TAOS units protocols. Addrpool Brouterdebug Brouterload Ctcheck Ctdebug Ipxripdebug Lcstate Leakpool Ospfavltree Ospfdebug Sntp Tcpflushtimer
Tunneling
The following commands display TAOS unit tunneling information.
4-6
Using Debug Commands Alphabetical list of debug commands ATMP Dtunnel Tunneldebug Tunnelslot
Terminal server
The following commands display information about the TAOS units terminal server. Telnetdebug Tsbadterminfo
Acct-Failsafe
Description: The Acct-Failsafe debug command is available on the shelf contoller or the host cards for verifying correct accounting proxying. (Slot host cards do not include the -d option.)
admin> acct-failsafe usage: acct-failsafe -option [ params ] -d <shelf> <slot> (d)isplay AFS info for <shelf> <slot> -d (d)isplay AFS info for all relevant slots
4-7
To display information about the calls on any slot which are candidates for proxy accounting.:
admin> acct-failsafe -d Slot 1/8: HashTable @ 10542160, bucketCount: 192, callCount: 23, hashName <afs-1:8> Slot 2/5: HashTable @ 10585730, bucketCount: 48, callCount: 7, hashName <afs-2:5>
To display the same information for a single slot card in shelf 1, slot 8:
admin> acct-failsafe -d 1 8 Slot 1/8: HashTable @ 10542160, bucketCount: 192, callCount: 23, hashName <afs-1:8>
To specify which level of debug to use for the command, use the t option. A debug level of zero indicates none (no messages). A level of 7 is fairly verbose.
Addrpool
Description: Displays messages related to dynamic address pooling. The command is a toggle that alternately enables and disables the debug display. Usage: Enter addrpool at the command prompt. Example: Following are several examples of output produced when Addrpool is active. With 18 addresses currently allocated from a pool: ADDRPOOL: lanAllocate index 0 inuse 18 The address 208.147.145.155 was just allocated: ADDRPOOL: allocate local pool address [208.147.145.155] The address 208.147.145.141 is to be freed because the user of that address has hung up. The TAOS unit must find the pool to which the address belonged, then free the address so it is available for another user: ADDRPOOL: found entry by base [208.147.145.141] entry [208.147.145.129] ADDRPOOL: free local pool address [208.147.145.141] In the IP Global profile, the Pool-Base-Address [1] is set to 192.168.8.8, and Assign-Count [1] is set to 4: ADDRPOOL: Deleting addrPool ADDRPOOL: New Addr pool rc = 0 addrPool index 1 ip [192.168.8.8] count 4 The Assign-Address parameter of an existing pool is changed from 4 to 3:
4-8
ADDRPOOL: Deleting addrPool ADDRPOOL: New Addr pool rc = 0 addrPool index 1 ip [192.168.8.8] count 3 A second pool is created. In the IP Global profile, the Pool-Base-Address [2] is set to 192.168.8.8, and Assign-Count [2] is set to 10: ADDRPOOL: Deleting addrPool ADDRPOOL: New Addr pool rc = 0 addrPool index 1 ip [192.168.8.8] count 4 ADDRPOOL: New Addr pool rc = 0 addrPool index 1 ip [192.168.8.8] count 4 addrPool index 2 ip [192.168.10.1] count 10 The second pool is deleted: ADDRPOOL: Deleting addrPool ADDRPOOL: New Addr pool rc = 0 addrPool index 1 ip [192.168.8.8] count 4
ATMPdebug
Description: Displays messages related to Lucents Ascend Tunnel Management Protocol (ATMP) sessions. (ATMP is described in RFC 2107.) The command is a toggle that alternately enables and disables the debug display. You would normally use this command with the Tunneldebug command. Usage: Enter atmpdebug at the command prompt. Example: The mobile node sends a request to foreign agent asking for connection to the home agent:
ATMP: sendRegReq: HA=200.67.1.254:5150 ATMP: Id=162, FA=130.67.40.254 ATMP:MC=141.111.40.82, HomeNetName=[] RcvUdp=5150
AuthenDebug
Description: Displays messages related to Link Control Protocol (LCP) authentication on the TAOS unit. The command is a toggle that alternately enables and disables the debug display. This command is available on host cards such as the HDLC card and the modem card. Usage: authendebug
4-9
Using Debug Commands Alphabetical list of debug commands Example: The following display indicates a successful PAP authentication. AUTH: lcp_pap_req(remote=0) AUTH-3: verify_pap(given<len.id=13:140.57.40.135, pwdLen=6>) AUTH-3: verify_pap No authData - getting one AUTH-3: verify_pap: authDispatcher() == OK AUTH-3: verify_pap_callback: AUTHCOMMAND_SUCCESS
BrouterDebug
Description: Displays messages related to the router functionality of the TAOS unit. The command is a toggle that alternately enables and disables the debug display. You can use this command for a general view of the load experienced by the TAOS unit. Usage: Enter brouterdebug at the command prompt. Example: Typically, brouterdebug displays very few messages. The following session took place over a period of several minutes on a TAOS unit with 4045 users active.
admin> brouterdebug BROUTER debug display is ON BROUTER_LOAD_MSG: time= 0 BROUTER_LOAD_MSG: time= 1 BROUTER_LOAD_MSG: time= 0 admin> brouterdebug BROUTER debug display is OFF
The BROUTER_LOAD_MSG message is an indication of how busy the TAOS units router function is. A low number, as is illustrated here, indicates the router is not experiencing any problems.
BrouterLoad
Description: Reports router backlog time, which indicates whether the TAOS unit is experiencing any delay. The time is shown in ticks. Multiply the number of ticks by ten to get the time in milliseconds. You can use this command for a general view of the load experienced by the TAOS unit. Usage: Enter brouterload at the command prompt. Example: The following display indicates no delays in the router. admin> brouterload BROUTER load time is 0 ticks (x10msec)
Ctdebug
Description: Displays messages related to CIDR routing. The command is a toggle that alternately enables and disables the debug display. Usage: Enter ctdebug at the command prompt. Example:
4-10
DTunnel
Description: Displays the status of enabled tunnels on the TAOS unit. Usage: Enter dtunnel at the command prompt. Example: admin> dtunnel MajDev Proto Agent Mode ------ ----- ---------7 ATMP Home-Agent Idle-Limit 120 mins
Tunnels: -------------------------------------------------Tunnel 36734 Ident=0x56 State 5 (UP) Remote client IfNum 65535 TN=0x47BF Majdev 7 Agent Address 130.67.40.254:5150 DnsSN=0 Home Network Name
HA Type ------Router
Client IP Address 141.111.40.86/32 -------------------------------------------------Tunnel 36732 Ident=0x55 State 5 (UP) Remote client IfNum 65535 TN=0x47BE Majdev 7 Agent Address 130.67.40.254:5150 DnsSN=0 Home Network Name
Ether-Stats
Description: Displays all statistics and error counters maintained by the 10Base-T Ethernet driver. Usage: ether-stats 0 n Where 0 is the first Ethernet port for which to display statistics and n is the last. Example:
admin> ether-stats 0 Tx unicast: 48382 non-unicast: 23736 octets: 10746332 collisions: 443 dma under: 0 cts loss: 0 no carrier: 0
4-11
late coll: Rx unicast: non-unicast: octets: collisions: short frame: dma over: no resource: Alignment: Unaligns: Length Errs: Restarts:
admin> ether-stats 0-10 Tx unicast: 48559 non-unicast: 23784 octets: 10805138 collisions: 443 dma under: 0 cts loss: 0 no carrier: 0 late coll: 0 Rx unicast: 46165 non-unicast: 31500 octets: 13576590 collisions: 0 short frame: 0 dma over: 0 no resource: 0 Alignment: 0 Unaligns: 0 Length Errs: 0 Restarts: 0
FRDLstate
Description: Displays information regarding the state of the Frame Relay connections, focusing mostly on Data Link information. The command is a toggle that alternately enables and disables the debug display. Usage: Enter frdlstate at the command prompt. Example: admin> frdlstate FRDLCALL state display is now ON In this example, an outgoing call is to be placed. A route to the destination is available over a Frame Relay link. The following message appears: FRDLCALL: Clear Call for route: 136 The following message indicates that an outgoing call is connected: FRDLCALL-136: call complete, status 1, 0 channels
4-12
Using Debug Commands Alphabetical list of debug commands The next message indicates that either the TAOS unit or the far end device has destroyed a route. The TAOS unit updates its table to reflect this routing change. FRDLCALL-136: dead call FRDLCALL-136: route destroyed
FRdump
Description: Displays a snapshot of the Frame Relay Interface table. The display shows data for each DLCI assigned to a Frame Relay link. Usage: Enter frdump at the command prompt. Example:
admin> frdump * Frname State DLinkAddr routeID.id frmgrLink dlIfNum dlIfSpeed frt14 CONNECTED 1012c920 15 0 738 512000 *dlci Addr ifNum routeID dataLink state 304 100cada0 23 136 1012c920 INACTIVE frt18 CONNECTED 1012ffa0 14 0 742 1536000 *dlci Addr ifNum routeID dataLink state 306 101719a0 33 36 1012ffa0 ACTIVE 604 10193c60 27 32 1012ffa0 ACTIVE 603 10191fe0 26 31 1012ffa0 ACTIVE frt17 CONNECTED 10149b60 13 0 741 1536000 *dlci Addr ifNum routeID dataLink state 305 101975e0 32 35 10149b60 ACTIVE 600 101910a0 24 30 10149b60 ACTIVE 303 1018cea0 22 28 10149b60 ACTIVE 301 10186360 20 26 10149b60 ACTIVE frt16 CONNECTED 1017ad20 7 0 740 1536000 *dlci Addr ifNum routeID dataLink state 605 101961e0 29 34 1017ad20 ACTIVE 300 1018a820 21 27 1017ad20 ACTIVE frswan4 CONNECTED 10125ba0 2 0 734 64000 *dlci Addr ifNum routeID dataLink state 411 101592a0 31 5 10125ba0 ACTIVE 407 10155ae0 30 4 10125ba0 ACTIVE 403 10153be0 25 3 10125ba0 ACTIVE
FRinARP
Description: Performs an Inverse ARP test over the specified Frame Relay link and DLCI. You can use FRinARP to help troubleshoot connectivity and routing problems over a Frame Relay link. Usage: frinarp Frame_Relay_profile_name DLCI Example:
admin> frinarp FR-1 38 frInArp: frinarp frname dlci
4-13
Inverse Arp op 2304 hw type 3840 prot type 8 hw len 2 prot len 4 Source Hw address 0401 Target Hw address 0000 Source Protocol address cd933401 Target Protocol address cd930005
FRLinkState
Description: Displays Frame Relay control messages. The command is a toggle that alternately enables and disables the debug display. Usage: Enter frlinkstate at the command prompt. Example:
admin> frlinkstate FR control msg display is ON
The following message indicates that the TAOS unit sent a Frame Relay Status Enquiry. The Send sequence number is 135. The Receive sequence number is 134.
FRMAIN: time 67192300, send status enquiry (135,134)
The next message indicates that DLCI 16 is being processed. This is a normal message. You should see one process message for each DLCI.
process pvc dlci 16
FRLMI
Description: Displays Frame Relay Local Management Interface (LMI) information. The command is a toggle that alternately enables and disables the debug display. Usage: Enter frlmi at the command prompt. Example:
admin> frlmi FRMAIN: Lmi display is ON FRMAIN: Setting timer DTE
The following message validates the consistency of sequence numbers in LMI messages. The 144 after want indicates the original sequence number the TAOS unit sent. The two numbers after the second got indicate the switchs Send sequence number and the Switchs report of the last sequence number it received from the TAOS unit, respectively. The original sequence number should match the switchs report of the last sequence number it received.
FRMAIN: Time 67201400, got link report: want (*,144), got (144,144)
FRMgrDump
Description: Displays the Frame Relay link and DLCI information, including states and counters. Usage: Enter frmgrdump at the command prompt. Example:
4-14
admin> frmgrdump
Data Link Info Status B04FBD40 ACTIVE B04C0480 1532 19759603 19530429 Status enq sent = 66710 rsp rcvd = 66763 upd rcvd = 53 timeouts = 1 Errors UI field = 0 PD field = 0 CR field = 0 msg type = 0 stat rsp = 0 lock shf = 0 inv info = 0 rpt type = 0 Last Error type = 5 time = 6100 Fr Type 0 value: 20 octets @ B04FBE26 [0000]: 04 91 03 CC 45 00 00 3A 4B 0E 00 00 7F 11 54 D7 [0010]: CD 93 08 07 LMI type = AnnexD DTE Monitor n391 = 6, t391 = 10, n392 = 3, n393 = 4 Event: recv seq 155 send Seq 155 Index = 0, cycles left = 4 OK OK OK OK OK OK OK OK OK OK DCE Monitor t392 = 15,n392 = 3, n393 = 4 Event: dce send seq 0 index = 0 OK OK OK OK OK OK OK OK OK OK DLCI info --addr-- dlci --state- userHndl n201 --check- -pkt xmit- -pkt recvB04C09A0 0 ACTIVE 0 1532 NO CHECK 66710 66763 ---DE--- --FECN-- --BECN-- -crTime- chgTime pending 0 0 0 100 100 FALSE
FRPriorityErrors
Description: Reports statistics about Frame Relay priority errors on a host card. All values in its output should be zero. A non-zero value indicates an extreme shortage of memory. For example:
hdlc-1/5> frPriorityErrs Output: _sendStatusEnquiryNoMbuf: 0 _mkStatusReplyNoBuf: 0 _mkStatusReplyMbuf: 0
FRScert
Description: Toggles between Sprint and Frame Relay Forum LMI checks. The default is the Sprint certification policy. In most cases, the default setting is correct and should not be changed. Usage: Enter frscert at the command prompt. Example:
admin> frscert frSCert is FRFCert admin> frscert frSCert is SCert
4-15
FRstate
Description: Displays messages related to Frame Relay state changes. The command is a toggle that alternately enables and disables the debug display. Usage: Enter frstate at the command prompt. Example: An administrator enables the display, data is received from the Frame Relay interface and processed, and the administrator disables the display.
admin> frstate FRrly state display is ON FRRLYIF: Calling frifRecv routeId 20 FR1490 dataFrom wan entry state 2 FRRLYIF: Send up stack ifnum 1 FRRLYIF: Calling frifRecv routeId 20 FR1490 dataFrom wan entry state 2 FRRLYIF: Send up stack ifnum 7 FRRLYIF: frIfSend ifNum 1 FR1490 data to wan entry state 2 FRRLYIF: datatoWan datalink B04C0480 admin> frstate FRrly state display is OFF
GRE
Description: Displays the TAOS units Generic Routing Encapsulation (GRE) information. The command has little practical use other than as a tool for developmental engineering.
IFMgr
Description: Displays interface-table entries for the Ethernet interface, toggles the debug display, and marks an interface as enabled or disabled. This command is available on the shelf controller and on host cards such as the Ethernet, modem, and HDLC cards. The output differs slightly depending on where the command is executed. Usage: ifmgr [-d [ifnam/ifnum] | -t ] [up|down ifnum|ifname] Syntax element -d -d ifname/ifnum -t Description Display interface table entries. Display details of the specified interface name or number. Toggle debug display.
up | down ifnum | ifname Enable or disable the specified interface. These options have the same effect as setting the Enabled parameter in the Ethernet profile, and are subject to the same limitations. Example: To view the IFMgr usage summary for an Ethernet card in slot 4, first open a session to the card:
4-16
admin> open 1 4
Then you can use the -d option to view the interface number and name:
ether-1/4> ifmgr -d if slot:if u p ifname mac addr local-addr --------------------------------------------------000 0:00:000 * pb0 000000000000 0.0.0.0/32 001 1:17:011 * ie1-4-1 00c07b6d23f0 11.1.1.1/32 002 1:17:013 * ie1-4-2 00c07b6d23f1 11.1.2.1/32 003 1:17:015 * ie1-4-3 00c07b6d23f2 11.1.3.1/32 004 1:17:017 * ie1-4-4 00c07b6d23f3 11.1.4.1/32 005 1:17:019 * ie1-4-5 00c07b6d23f4 11.1.5.1/32 <end>
The IFMgr -d output for an Ethernet card contains the following fields: Field if slot:if Description Ethernet interface number. Shelf, slot and system-wide interface number. (This interface number is reported by executing the IFMgr command on the shelf controller.) Flag indicating whether the interface is up (*) or down (-). Flag indicating whether the interface is permanent. A P indicates a permanent interface. A hyphen (-) or a blank indicates that it is not. A permanent interface is an interface configured in the command-line interface and stored in the TAOS units NVRAM. All the Ethernet interfaces and the virtual interfaces made for Connection profiles are permanent. Transient interfaces are those the TAOS unit builds from RADIUS, TACACS, or an Answer profile. These interfaces have no interface entry when the connection is down. ifname mac addr local-addr Interface name. Interface MAC address. Interface local address.
u p
The IFMgr -d output indicates that the interface is disabled by displaying a hyphen instead of an asterisk in the Up (u) column:
ether-1/4> ifmgr -d if slot:if u p ifname mac addr local-addr --------------------------------------------------000 0:00:000 * pb0 000000000000 0.0.0.0/32 001 1:17:011 ie1-4-1 00c07b6d23f0 0.0.0.0/32 002 1:17:013 * ie1-4-2 00c07b6d23f1 11.1.2.1/32
4-17
Note: The Netstat command also displays a hyphen to indicate a disabled Ethernet interface. To mark an interface as up, use the up option:
ether-1/4> ifmgr up ie1-4-1
An interface can be administratively disabled by using the IFMgr command or by updating the Ethernet profile, or it can be marked as down by the Ethernet driver when Link-State-Enabled is Yes and Link-State is Down. Therefore, using the Up option to the IFMgr command does not necessarily enable the interface. However, it does mark the interface as up. Following is an example of using the IFMgr command on the shelf controller:
admin>
ifmgr -d
host-name remote-addr 0.0.0.0/32 0.0.0.0/32 0.0.0.0/32 0.0.0.0/32 0.0.0.0/32 0.0.0.0/32 0.0.0.0/32 0.0.0.0/32 local-addr 192.168.7.133/32 127.0.0.1/32 127.0.0.2/32 127.0.0.3/32 127.0.0.3/32 127.0.0.1/32 224.0.0.0/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 100.6.100.2/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 192.168.7.133/32 200.6.1.2/32 0.0.0.0/32
bif slot sif u m p ifname 000 1:17 000 * 001 1:17 001 * 002 0:00 000 * 003 0:00 000 * 004 0:00 000 * 005 0:00 000 * 006 0:00 000 * 007 0:00 000 008 1:11 001 * 009 1:11 002 * 010 1:11 003 * 011 1:11 004 * 012 1:11 005 * 013 1:11 006 * 014 1:15 001 * 015 1:11 007 * 016 1:11 008 * 017 1:11 009 * 018 1:11 010 * 019 1:17 000 020 1:17 000 021 1:16 001 * ie0 lo0 rj0 bh0 wanabe local mcast tunnel7 p wan8 p wan9 p wan10 p wan11 p wan12 p wan13 p wan14 p wan15 p wan16 p wan17 p wan18 p wan19 p wan20 p wan21
----------------------------------------------------------------------------
apx-t1-t32 200.2.1.2/32 apx-t1-t32 200.2.2.2/32 apx-e1-t22 200.3.2.2/32 apx-e1-t32 200.5.1.2/32 apx-e1-t32 200.5.2.2/32 apx-t1-t22 200.1.1.2/32 apx-t1-s1- 100.1.100.2/32 apx-e1-t22 200.3.1.2/32 cisco-t221 200.4.103.2/32 m-e1-t2211 200.4.4.2/32 m-e1-t2212 200.4.4.3/32 m2t81 m41 200.8.1.2/32 200.4.1.2/32
p1321n<>p1 0.0.0.0/32
The IFMgr output on cards other than the Ethernet card includes the following fields: Field bin slot Description Bundle interface number. There is one interface number per bundle, including MPP connections. It is the global interface-table number. Shelf and slot the interface is assigned to.
4-18
Field sif u m p
Description Slot interface. Flag indicating whether the interface is up (*) or down (-). Indicates that the interface is part of an MP bundle. Flag indicating whether the interface is permanent. A P indicates a permanent interface. A hyphen (-) or a blank indicates that it is not. A permanent interface is an interface that is configured in the command-line interface and stored in the TAOS units NVRAM. All the Ethernet interfaces and the interfaces based on Connection profiles are permanent. Transient interfaces are those the TAOS unit builds from RADIUS, TACACS, or an Answer profile. These interfaces have no interface entry when the connection is down.
Interface name. Host name of remote device. Remote address of device as configured in a Connection profile. Local address of device as configured in a Connection profile.
Following is an example of displaying information about a particular interface: admin> ifmgr -d 009 inUse: Yes hostName: apx-t1-t3212-s4 dialoutName: ExternalAuth: No ExternFilters: No ExternRoutes @ 0 ExternIpxRoutes @ 0 miscInfo @ 0 reDirectDest: 0.0.0.0 DLCI routeId: 34 MP(P) id: 0 Logical iff: 2 virtual id: 0, virtual next @ 0, virtual main @ 0 minor device: 9 device status: 0x303 mtu: 1528 ip_addr: 192.168.9.133 dstip_addr: 100.2.1.2 netmask: 255.255.255.0 net: 192.168.9.0 subnet: 192.168.9.133 bcast: 192.168.9.255 nbcast: 192.168.9.133 directed-bcast: no macaddr: 000000000000 inp_qcnt: 0 out_qcnt: 0
4-19
nexthop: 0.0.0.0 Num pkts queued for brouter: 0 proxy_arp_mode: 0 proxy_arp_head: 0 No associated connection profile
The ICMP-Reply-Directed-Bcast parameter in the IP-Global profile specifies whether the TAOS unit responds to directed-broadcast ICMP echo requests. If set to No, the system does not respond to any directed-broadcast ICMP requests. The setting of this parameter is shown in the Directed-Bcast field in the Ifmgr output.
IPXRIPdebug
Description: Displays incoming and outgoing IPX RIP traffic. The command is a toggle that alternately enables and disables the debug display. Usage: Enter ipxripdebug at the command prompt. Example: admin> ipxripdebug IPX-RIP state display is ON The following message appears as the TAOS unit sends an IPX RIP packet announcing its route: IPXRIP: 10000a17 announced 0 routes on interface 1000: Next, a Pipeline 50 has dialed the TAOS unit. The TAOS unit receives a RIP route from the Pipeline. IPXRIP: received response from ac1b0001:00c07b5e04c0 (1 nets). The following message indicates that the TAOS unit is delaying sending a RIP packet to prevent the interpacket arrival time from being shorter than busy/slow boxes can handle. An IPX router should never violate the minimum broadcast delay. IPX-RIP: too soon to send on interface 1000. IPXRIP: IPXRIP: IPXRIP: IPXRIP: IPXRIP: 10000a81 received 10000aa6 received 10000abc announced 0 routes on interface 1000: response from ac1b0001:00c07b6204c0 (1 nets). announced 0 routes on interface 1000: response from ac1b0001:00c07b5504c0 (1 nets). announced 0 routes on interface 1000:
Lanval
Description: Displays messages related to external validation requests. You can use this command in conjunction with radif to troubleshoot authentication issues. Usage: Enter lanval at the command prompt. Example:
admin> lanval LANVAL state display is ON
4-20
LANVAL: radius auth, id B054AD60 LANVAL: radius callback, id B054AD60, auth SUCCESS LANVAL:_lanvFreeInfo: freeing iprof@B05A9360
LifDebug
Description: Displays ISDN layer 2 and layer 3 information. The command is a toggle that alternately enables and disables the debug display. Usage: Enter lifdebug at the command prompt. Example: Following are several examples of LifDebug output: admin> lifdebug LIF debug is now ON A packet is being sent over the WAN. The packet is constructed:
LIF_SendPkt(): DSL 0, source 0x400, destination 0x300, event 0x340, SAPI 0, CES 1, Call_Id 77, Chan_Id 0
MdbStr
Description: Modifies the default modem AT command strings used by the modems on the TAOS unit for both incoming and outgoing calls. Previously, you could not modify the AT command for modems on the TAOS unit. You could only affect the string in minor ways by modifying the parameters in the Terminal-Server>Modem-Configuration subprofile. Note that when the modem card or the TAOS unit is reset, the AT command strings revert to their defaults. The MdbStr command also allows you to return the string to its factory default settings.
4-21
Using Debug Commands Alphabetical list of debug commands The modem chip in the TAOS unit supports AT commands up to 56 characters in length. To fully support all possible functionality, each command is sent as two separate strings. You can modify one or both strings.
Caution: The AT command string initializes the modems it supports. When you change the AT command string, you are changing the functionality of the modems. Use this command with caution. Here are the two default strings for the TAOS unit: 1 2 AT&F0&C1V0W1X4 AT%C3\N3S2=255S95=44S91=10+MS=11,1,300,33600A
Usage: mdbstr [ 0 ] [ 1 ] [ 2 ] [ AT-command-string ] Example: The following examples show you how to modify each portion of the AT command string: To override the existing first string with a new string: mdbstr 1 AT&F0&C1V1W1 This will override the second portion of the AT command string: mdbstr 2 AT%C3\N3S2=255S95=44S91=10+MS=11,1,300,14400A This will return both strings to their factory default settings: mdbstr 0
MDialout
Description: Displays messages related to modem dial out. This command can be used in conjunction with the ModemDrvState command to get detailed information about outbound modem calls. The command is a toggle that alternately enables and disables the debug display. Usage: Enter mdialout at the command prompt. Example: In the following example, a modem on the TAOS unit prepares to make an outbound modem call, but never receives a dialtone. admin> mdialout MDIALOUT-2/4: >> CURR state=Await_Off_Hook, NEW event=Event_Off_Hook MDIALOUT-2/4: connected to DSP! MDIALOUT-2/4: rqst tone (14) via channelIndex 0 MDIALOUT-2/4: tone generation started. MDIALOUT-2/4: >> CURR state=Await_Dial_Tone, NEW event=Event_Dialtone_On MDIALOUT-2/4: decode timer started. MDIALOUT-2/4: << NEW state=Await_1st_Digit MDIALOUT-2/4: enabling tone search, channel index=0, timeslot=0 MDIALOUT-2/4: << NEW state=Await_1st_Digit
4-22
MDIALOUT-2/4: >> CURR state=Await_1st_Digit, NEW event=Event_On_Hook MDIALOUT-2/4: stopping decode timer. MDIALOUT-2/4: rqst tone (15) via channelIndex 0 MDIALOUT-2/4: disabling tone search, channel index=0 MDIALOUT-2/4: disconnected from DSP. MDIALOUT-2/4: << NEW state=Await_Off_Hook MDIALOUT-2/4: >> CURR state=Await_Off_Hook, NEW event=Event_Close_Rqst MDIALOUT-?/?: << NEW state= <DELETED>
MDialSess
Description: Displays all the active modem dialout sessions. Usage: Enter mdialsess at the command prompt. Example:
admin> mdialsess entry slot:mdm route port hookDetect DSP:tone:timr:decode state 1 6:4 145 16 pollForOff n : n : n : n Await_Off_Hook
4-23
1/15:
171
171
171
170
ModemDrvDump
Description: Displays information about the status of each modem. Usage: Enter modemdrvdump at the command prompt. Example: Following is a message about modem 0 (the first modem) in the modem card in slot 3 on the TAOS unit. The numbers in brackets indicate number of calls with unexpected open requests, unexpected Rcode events, unexpected release events, and unexpected timeouts: MODEMDRV-3/0: Unexp Open/Rcode/Rlsd/TimOut=[0,0,0,0]
ModemDrvState
Description: Displays communication to and from the modem driver on the TAOS unit. You can see which buffers are allocated and which AT command strings are being used to establish modem connections. You can also determine whether data is received from the modem in an understandable format. If line quality is poor, the modem driver attempts to parse incoming data from the modem, but it might not be successful. This command can be used in conjunction with the MDialout command to get detailed information about outbound modem calls. The command is a toggle that alternately enables and disables the debug display. Usage: Enter modemdrvstate at the command prompt. Example: Following are examples of a modem call coming into the TAOS unit, and a modem call being cleared from the TAOS unit:
admin> modemdrvstate MODEMDRV debug display is ON
Modem 1 on the modem card in slot 3 has been assigned to answer an incoming modem call:
MODEMDRV-3/1: modemOpen modemHandle B04E3898, hdlcHandle B026809C, orig 0
The next two lines show the TAOS units modem sending the first string:
MODEMDRV: Answer String, Part 1 - AT&F0E0+A8E=,,,0
A buffer needs to be allocated for sending the command out to the WAN:
MODEMDRV-3/1: _hdlcBufSentFnc: buffer = 2E12EAE0, status = SENT
Buffers are allocated for data being received from the WAN:
MODEMDRV-3/1: _hdlcBufRcvdFnc: data=2E13ADF0, len=8, parseState[n,v]=[0,0], status= RCVD
4-24
Now result codes are processed to clarify the characteristics of the connection.
MODEMDRV-1/1: _hdlcBufRcvdFnc: data=9880C628, len=48, parseState[n,v]=[1,0], stD MODEMDRV-1/1: data = CONNECT 115200/V34/LAPM/V42BIS/28800:TX/33600: MODEMDRV-1/1: decodeSLC[15]=<CONNECT 115200/> checking for error correction MODEMDRV-1/1: decodeSLC[4]=<V34/> checking for error correction MODEMDRV-1/1: decodeSLC[5]=<LAPM/> checking for error correction[29] MODEMDRV-1/1: decodeSLC[7]=<V42BIS/> checking for compression[21] MODEMDRV-1/1: decodeSLC[9]=<28800:TX/> checking for xmit[1] MODEMDRV-1/1: _hdlcBufRcvdFnc: data=9880C828, len=4, parseState[n,v]=[4,0], staD MODEMDRV-1/1: data = RX > checking for recv[0]C[9]=<33600:RX decodeSLC complete
At this point the modem call is up, and the modem driver has completed its tasks. The call will be passed to Ethernet resources:
MODEMDRV-3/1: _processRcodeEvent/AWAITING RLSD, mType=5, RLSD=0 MODEMDRV-3/1: _processRlsdChange/AWAITING RLSD = 1
Following is the normal sequence of steps for a modem call that is cleared (by either modem). Modem 5 on the modem card in slot 7 of the TAOS unit is freed from the previous call, and it is reinitialized (so it is available for the next call).
MODEMDRV-7/5: modemClose modemHandle B04E6F38 MODEMDRV-7/5: _closeConnection:ONLINE, event=3 MODEMDRV-7/5: _processTimeout/INIT
MPCMtoggle
Description: Displays information about related channel addition with Multilink Point-to-Point connections. This information is not related to MP+ or BACP connections. This
4-25
Using Debug Commands Alphabetical list of debug commands command displays only information from connections established as MP (RFC1717) connections. The command is a toggle that alternately enables and disables the debug display. Usage: Enter mpcmtoggle at the command prompt. Example:
admin> mpcmtoggle MPCM debug is now ON MPCM-432: adding 1 channels
MPentry
Description: Displays information for a specified, active, MP or MP+ connection, including the options negotiated in the connection. This command can be extremely helpful when researching MP or MP+ compatibility issues. Note: The MpID number that must be entered is an internally generated number. To get a list of all currently assigned MpID numbers on your TAOS unit, enter the IFmgr -d command and specify an interface name or number. Usage: Enter mpentry at the command prompt. Example: The following example shows an MP+ call (noted as MPP). The End Point Discriminator (used to bundle the channels together) is shown under bundle id. In this case, it is the hardware MAC address of the calling device.
admin> mpentry MpID required admin> mpentry 28 MP entry 28 @ B055DE60 MpID 28, Flags: delete No, remote No, ncp Yes, mpp Yes bacp No bundle id: 15 octets @ B0558BE0 [0000]: 03 00 C0 7B 53 97 07 73 65 63 61 2D 68 73 76 vjInfo @ B0562060 startTime 227521989, mrru: local 1524, peer 1524 send: ifIx 1, count 0, seq 77268 / recv: seq 75046 IF 50, send idle 0, recv idle 1, last seq 75045 mode 0 #chans 1 Head: Tail Reassembe packet cnt 0 bad lrg pkts 0
MPPCM
Description: Displays MP+ call-management information. The command is a toggle that alternately enables and disables the debug display. You can use it in conjunction with the MPtoggle command, since each command logs debug from a different place in code, but both display information based on multichannel connections. Usage: Enter mppcm at the command prompt. Example:
4-26
admin> mppcm MPPCM debug is now ON The following 8 messages indicate that a second channel is added to a 1-channel MP+ connection:
MPP-5: MPP-5: MPP-5: MPP-5: MPP-5: MPP-5: MPP-5: MPP-5: Event = Utilization, CurrentState = Idle/A check dynamic says: current = 1, recommended = 2 requesting 1 additional channel(s) 1 call(s) posssible. new state is: Add/C Event = RxAddComplete, CurrentState = Add/C enterIdleA, AddLock = Yes, RemoveLock = No new state is: Idle/A
The following 12 messages indicate that a remote management session is brought up for the MP+ user with MpID 28. You can open a remote session to an MP+ user from the terminal server.
MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: MPP-28: Event = StartRM, CurrentState = Idle/A start remote management new state is: Idle/A Event = RxRmRsp, CurrentState = Idle/A remote management response (0) new state is: Idle/A Event = RxRmTxReq, CurrentState = Idle/A new state is: Idle/A Event = RecvRMM, CurrentState = Idle/A new state is: Idle/A Event = StopRM, CurrentState = Idle/A stop remote management
MPtoggle
Description: Displays information about MP and MP+ connections. You can use this command in conjunction with the MPPCM command, since each command logs debug from a different place in code, but both display information based on multichannel connections. The command is a toggle that alternately enables and disables the debug display. Usage: Enter mptoggle at the command prompt. Example:
admin> mptoggle MP debug is now ON MP-26: sending control message 191 MP-5: sending control message 76 admin> mptoggle MP debug is now OFF
NetIF
Description: Displays the TAOS units network interface mappings.
4-27
Using Debug Commands Alphabetical list of debug commands Usage: netif -m -q -t -v -? Syntax element -m -q -t -v -? Description Display mappings for the specified map type. Display the queue for a map. Toggle debug display. Display valid mapping tables. Display this summary.
52 90 89 86 78 72 71 70 69 68 62 61
SlotID 2 58 57 56 51 50 49 48 47 46 45 44
PermConn-List
Description: Displays a list of all permanent connection profiles in the TAOS unit. Usage: Enter permconn-list at the command prompt.
Pools
Description: Displays a snapshot of a large selection of memory pools, the size of each pool, and the status of each pool. At the end of the list is a summary of the total memory allocation in the TAOS unit. Memory is dynamically allocated to support various tasks, and should be freed when a particular task has been completed. Taking pools snapshots over an extended period of time can help troubleshoot a problem with a memory leak, in which memory is allocated for a task but never freed.
4-28
Using Debug Commands Alphabetical list of debug commands Snapshots should never show the entire quantity of allocated memory (or even any single pool) increasing over an extended period of time. Usage: Enter pools at the command prompt. Example: The number of pools displayed is usually very large. The following example displays just a portion of the typical output.
admin> pools Pool Name size Accounting Session Change Registrants 103CCAE0 AcctEvnt 14 AfsHashEntry 191 AfsTaskMsg 219 AssignedChannelPool 32 AuthData 116 BrouterPool 80 . . . volatile profile instance 16 volatile profile type info 12 limit 8 0 0 0 0 0 0 inUse 0 127 0 0 127 0 2 hiWat 1 127 0 0 139 0 14 heapAdrs 1 103CCAE0 103CCBE0 103CCBE0 103CCAE0 103CCBE0 103CCB60
0 0
171 7
184 7
103CCAE0 103CCAE0
The first portion of the Pools command output includes the following fields: Field Pool name Size Limit InUse HiWat HeapAdrs Description Pool name. Size of the pool, in kilobytes. Maximum number of buffers that can be allocated to a pool. Number of pools in use. Highest number of pools allocated to a task since the TAOS unit was brought up. Memory address of pool.
Following the list of pools, the Pools command displays a summary of memory usage:
total pools: total buffers in use: total memalloc: total memfree: memalloc in use: memalloc failures: memfree failures: memalloc high water: 175 10593 261685 258558 3129 0 0 3146
Histogram of memallocd memory block sizes: 2659 buffers in range [64,127] 632 buffers in range [128,255]
4-29
2 buffers in range [256,511] 22 buffers in range [512,1023] 9 buffers in range [1024,2047] 21 buffers in range [2048,4095] 3 buffers in range [4096,8191] 7 buffers in range [8192,16383] 6 buffers in range [32768,65535] 2 buffers in range [131072,262143] 1 buffers in range [262144,524287] Total memory in use: 1295104 bytes in 3364 buffers Histogram of free memory block sizes: 12 buffers in range [128,255] 1 buffers in range [256,511] 2 buffers in range [1024,2047] 1 buffers in range [1048576,2097151] Total free memory: 1503680 bytes in 16 buffers
Following are descriptions of some of the more important fields in this display: Field total pools total buffers in use total memalloc total memfree memalloc in use memalloc failures memfree failures memalloc high water Description Total number of pools in use. Number of buffers in use. Total number of times the TAOS unit allocated a block of memory for use. Total number of times the TAOS unit freed a block of memory. This should be fairly close to total memalloc. Total number of memory pools in use. This is the difference between total allocated and total freed. Total number of times the TAOS unit failed to allocate a block of memory for use. Total number of times the TAOS unit failed to free a block of memory. The highest number of memory pools in use at any one time.
PortInfo
Description: Displays information about the TAOS units ports. Usage: portinfo port-number Example:
admin> portinfo 1 Printing fixed/allocated ports for slot 1 Linear Port: 1 - fixed: TRUE - relative #: 0
4-30
PPPdump
Description: Very similar to the WANdisplay diagnostic command. But the PPPdump command strips out escape characters that are present for asynchronous PPP users (who are dialing in with modems). The escape characters are necessary because of the asynchronous nature of the data stream. Stripping them out simply clarifies the presentation of the data. If you enter the command while traffic streams heavily through your TAOS unit, the resulting amount of output can make it tedious to find the information youre looking for. The screen might even display the message ----- data lost -----, which just means that not all the output can be displayed on the screen. You might prefer to use the PPPdump command during a period of low throughput. Usage: First open a session with a host card, then enter pppdump n where n is the number of octets to display per frame. Specifying a value of 0 (zero) disables the logging of this data. Example: Following are two examples of the display of an asynchronous call, one produced by WANdisplay and the other by PPPdump. The following frames were logged by entering wandisplay 64:
7E 20 7E 7D FF 7D 23 C0 21 7D 21 7D 21 7D 20 7D 37 7D 22 7D 26 7D 20 7D 2A 7D 7D 20 2D 7D 23 7D 26 3A AA 7E FF 7D 23 C0 21 7D 21 7D 21 7D 20 23 7D 20 7D 24 7D 20 7D 20 7D 22 7E
To get the data stream without escape characters, the 0x7D bytes need to be stripped, and the byte following each 0x7D byte needs to be decremented by 0x20. With PPP dump, the data is automatically converted and displayed:
7E FF 03 C0 21 01 01 00 17 02 06 00 0A 00 00 2D 03 06 3A AA 7E 7E FF 03 C0 21 01 01 00 23 00 24 00 00 02 7E
PPPFSM
Description: Displays changes to the PPP state machine as PPP users connect. The command is a toggle that alternately enables and disables the debug display. Usage: First open a session with a host card, then enter pppfsm at the command prompt. Example: The following display shows the complete establishment of a PPP session:
admin> pppfsm PPPFSM state display is ON PPPFSM-97: Layer 0 State INITIAL
Event OPEN...
4-31
PPPFSM-97: ...New State STARTING PPPFSM-97: Layer 0 State STARTING PPPFSM-97: ...New State REQSENT PPPFSM-97: Layer 1 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 2 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 3 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 4 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 5 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 6 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 7 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 8 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 9 State INITIAL PPPFSM-97: ...New State CLOSED PPPFSM-97: Layer 0 State REQSENT PPPFSM: irc_new scr 4 PPPFSM-97: ...New State REQSENT PPPFSM-97: Layer 0 State REQSENT PPPFSM-97: ...New State ACKRECD PPPFSM-97: Layer 0 State ACKRECD PPPFSM-97: ...New State ACKRECD PPPFSM-97: Layer 0 State ACKRECD PPPFSM-97: Layer 1 State CLOSED PPPFSM-97: ...New State REQSENT PPPFSM-97: ...New State OPENED PPPFSM: PAP Packet PPPFSM-97: Layer 6 State CLOSED PPPFSM-97: ...New State REQSENT PPPFSM-97: Layer 4 State CLOSED PPPFSM-97: ...New State REQSENT PPPFSM-97: Layer 4 State REQSENT PPPFSM-97: ...New State REQSENT PPPFSM: ccp Packet code 1 PPPFSM-97: Layer 6 State REQSENT PPPFSM-97: ...New State REQSENT PPPFSM: ccp Packet code 2 PPPFSM-97: Layer 6 State REQSENT PPPFSM-97: ...New State ACKRECD PPPFSM-97: Layer 4 State REQSENT PPPFSM-97: ...New State ACKRECD
Event UP... Event UP... Event UP... Event UP... Event UP... Event UP... Event UP... Event UP... Event UP... Event UP... Event RCONFREJ...
Event RCONFREQ...
PPPinfo
Description: Displays information about established PPP sessions. The command has little practical use other than as a tool for developmental engineering.
4-32
Using Debug Commands Alphabetical list of debug commands Usage: pppinfo index [ all ] Syntax element index all Description Selects a particular PPP information table. Displays information about embedded structures.
Example:
admin> pppinfo Ncp[LCP] Ncp[AUTH] Ncp[CHAP] Ncp[LQM] Ncp[IPNCP] Ncp[BNCP] Ncp[CCP] Ncp[IPXNCP] Ncp[ATNCP] Ncp[UNKNOWN] Mode nOpen pending LocalAsyncMap RemoteAsyncMap Peer Name Rmt Auth State aibuf ipcp vJinfo localVjInfo bncpInfo ipxInfo remote Bad FCS
1
= = = = = = = = = = = = = = = = = = = = = = = = B02B396C B02B39BC B02B3A0C B02B3A5C B02B3AAC B02B3AFC B02B3B4C B02B3B9C B02B3BEC B02B3C3C async 0 0 0 N/A RMT_NONE 0 B03E502C 0 0 B03E559C B03E55DC no a
PPPstate
Description: Displays the state of a PPP connection. Different PPP calls can be routed (call routing, as opposed to IP or IPX routing) through a TAOS unit differently. The command is a toggle that alternately enables and disables the debug display. The command has little practical use other than as a tool for developmental engineering. Usage: Enter pppstate at the command prompt. Example: The following message indicates that data is moved directly from the WAN to the Ethernet segment. WAN data can be redirected to other resources (X.75 handler or V.120 handler) before it is ready to be sent to the Ethernet segment. PPP-116: Redirect async wan direct
4-33
PRIdisplay
Description: Displays all ISDN PRI D-channel signaling packets that are either received or sent through the PRI interfaces. Usage: To use this command, first open a session with a network card configured for PRI signaling (for example, a T1 or E1 card). Then enter the PRIdisplay command. The command uses the following syntax: pridisplay number-of-octets-to-display line Syntax element Description
number-of-octets-to-display Specifies the number of octets in the PRI messages to display. Specify 0 (zero) to disable the display. line The PRI line to display. Specify 0 (zero) to display any line.
Example:
e1-1/15> pridisplay 128 0 Display the first 128 bytes of PRI messages e1-1/15> PRI-XMIT-7: 10:37:00: 4 of 4 octets 800F1020: 00 01 01 73 PRI-RCV-7: 10:37:00: 4 of 4 octets 800F3CA0: 00 01 01 73 PRI-XMIT-7: 10:37:10: 4 of 4 octets 800F1020: 00 01 01 73 PRI-RCV-7: 10:37:10: 4 of 4 octets 800F3CA0: 00 01 01 73 PRI-XMIT-7: 10:37:20: 4 of 4 octets 800F1020: 00 01 01 73 PRI-RCV-7: 10:37:20: 4 of 4 octets 800F3CA0: 00 01 01 73 PRI-XMIT-7: 10:37:30: 4 of 4 octets 800F38E0: 00 01 01 73 PRI-RCV-7: 10:37:30: 4 of 4 octets 800F3CE0: 00 01 01 73 pridisplay 0 PRI message display terminated
RADacct
Description: Displays RADIUS accounting information. The RADacct command displays very few messages if RADIUS Accounting is functioning correctly.(RADif displays more detailed information for troubleshooting RADIUS-related issues.) The RADacct command is a toggle that alternately enables and disables the debug display. Usage: Enter radacct at the command prompt. Example:
admin> radacct RADACCT debug display is ON
4-34
Using Debug Commands Alphabetical list of debug commands A user hangs up and a stop record is generated.
RADACCT-147:stopRadAcct
The following message indicates that there is some load on the network, and the sending of a stop record is delayed. This is not necessarily an indication of a problem.
RADACCT-147:_endRadAcct: STOP was delayed
RADif
Description: Displays RADIUS-related messages. RADif is a powerful diagnostic command, because it displays RADIUS messages the TAOS unit receives as well as messages that it sends. Output from RADif, in conjunction with running your RADIUS daemon in debug mode (using the -x option), gives you virtually all the information you need to clarify issues relating to user authentication. You can also validate the IP port that you have configured (or think you have configured), and the user name that is being sent by the client. The command is a toggle that alternately enables and disables the debug display. Usage: Enter radif at the command prompt. Example: Following are messages you might see for a successful RADIUS authentication:
RADIF: authenticating <8:my_name> with PAP RADIF: _radiusRequest: id 41, user name <9:my_name> RADIF: _radiusRequest: challenge len = <0>
The response is sent back from RADIUS. In this case, the user my_name has passed authentication. Following is a list of the most common responses: 1 - Authentication Request 2 - Positive acknowledgement 3 - Rejection 4 - Accounting request 5 - Accounting response 7 - Password change request 8 - Password change positive acknowledgement 9 - Password change rejection 11 - Access challenge 29 - Password - next code 30 - Password New PIN 31 - Password Terminate Session 32 - Password Expired RADIF: _radCallback, authcode = 2 RADIF: Authentication Ack
4-35
Using Debug Commands Alphabetical list of debug commands After, authenticating a user, the RADIUS daemon sends the attributes from the user profile to the TAOS unit. The TAOS unit creates the user s Connection profile from these attributes, and RADif displays them. (See the TAOS RADIUS Guide and Reference for a complete list of attribute numbers.)
RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: RADIF: attribute attribute attribute attribute attribute attribute attribute attribute attribute attribute attribute attribute attribute 6, len 6, 00 00 00 02 7, len 6, 00 00 00 01 8, len 6, ff ff ff fe 9, len 6, ff ff ff 00 11, len 12, 73 74 64 2e 12, len 6, 00 00 05 dc 10, len 6, 00 00 00 00 13, len 6, 00 00 00 01 244, len 6, 00 00 11 94 169, len 6, 00 00 11 94 170, len 6, 00 00 00 02 245, len 6, 00 00 00 00 235, len 6, 00 00 00 01
A RADIUS Accounting Start packet is sent to the RADIUS Accounting Server (using port 1646):
RADIF: RADIF: ID=42 RADIF: RADIF: RADIF: _radiusAcctRequest: id 42, user name <9:my_name> _radiusAcctRequest: socket 6 len 82 IP cf9e400b port 1646, _radCallback _radCallback, buf = B05433C0 _radProcAcctRsp: user:<9:my_name>, ID=42
RADservdump
Description: Use this command to verify the configuration you have set in the External-Auth profile. Usage: Enter radservdump at the command prompt. This does not display any information related to the configuration of either your RADIUS Authentication server or your RADIUS Accounting server. Example: For the following example, the TAOS unit has been configured with two RADIUS servers, 1.1.1.1 and 2.2.2.2. The port has not been changed from its default of 1700. admin> radservdump Rad serv vars: port=1700,sockId=8 0) clients=1010101 1) clients=2020202 2) clients=0 3) clients=0 4) clients=0 5) clients=0 6) clients=0 7) clients=0 8) clients=0
4-36
RADsessdump
Description: Displays the state of all RADIUS Accounting sessions. Usage: Enter radsessdump at the command prompt. Example: admin> radsessdump RadActSess: state loadd loadd loadd loadd loadd loadd loadd loadd loadd loadd loadd loadd route 00289 00288 00287 00286 00227 00226 00225 00224 00004 00003 00002 00001 sessID nasPort 252365175 012032 252365174 012032 252365173 012032 252365172 012032 252355493 012032 252355492 012032 252355491 012032 252355490 012032 252332182 012032 252332181 012032 252332180 012032 252332179 012032 authM local local local local local local local local none none none none evTime 523932 523946 523945 523946 370610 370611 370608 370609 29 28 27 26
The RADsessdump command displays the following information: Column Name: Route SessID NASPort Description Internal route ID. Session ID. This depends on the route ID. Statistics about the call. The first two digits indicate the type of call: 1 indicates a digital call, 2 indicates an analog call. The next two digits indicate the line on which the call was received. The last two digits indicate the channel on which the call was received. Method of authentication. Event time. This is a time stamp.
authM evTime
RADstats
Description: Displays a compilation of RADIUS Authentication and Accounting statistics. Usage: Enter radstats at the command prompt. Example: admin> radstats RADIUS authen stats: In the following message, A denotes Authentication. O denotes Other. There were 612 Authentication requests sent and 612 Authentication responses received:
0 sent[A,O]=[612,15], rcv[A,O]=[612,8]
4-37
Using Debug Commands Alphabetical list of debug commands 602 were authenticated successfully, and 18 were not:
timout[A,O]=[0,6], unexp=0, bad=18, authOK=602
In the next message, the IP address of the RADIUS server is 1.1.1.1, and the curServerFlag indicates whether or not this RADIUS server is the current authentication server. (You can have several configured RADIUS servers, but only one is current at any one time.) 0 indicates no. 1 indicates yes.
IpAddress 1.1.1.1, curServerFlag 1 RADIUS accounting stats:
The next message indicates that the TAOS unit sent 1557 Accounting packets and received 1555 responses (ACKs from the Accounting server). Therefore, the unexp value is 2. This is not necessarily an indication of a problem, but might be the result of the TAOS unit timing out a particular session before receiving an ACK from the RADIUS server. Momentary traffic load might cause this condition. The value of bad is the number of packets that were formatted incorrectly by either the TAOS unit or the RADIUS server.
0 sent=1557, rcv=1555, timout=0, unexp=2, bad=0
In the next message, note that the Accounting server is different from the Authentication server. The Accounting and Authentication servers do not need to be running on the same host, although they can be.
IpAddress 2.2.2.2, curServerFlag 1 Local Rad Acct Stats:
The next two messages can be used to look for traffic congestion problems or badly formatted Accounting packets. Under typical conditions, you might see a few packets whose acknowledgments fail. The following message indicates whether any RADIUS requests have been dropped by the TAOS unit. With this particular message, no requests were dropped. 1557 were sent successfully.
nSent[OK,fail]=[1557,0], nRcv=1557, nDrop[QFull,Other]=[0,0]
The following message indicates whether any session timeouts resulted from failure to receive RADIUS responses. The message also indicates responses that are received by the TAOS unit but do not match any expected responses. The TAOS unit keeps a list of sent requests, and expects a response for each request. In the following message, one response was received from the RADIUS server that did not match any of the requests that the TAOS unit had sent out. This might be caused by a corrupted response packet, or by the TAOS unit timing out the session before the response was received.
nRsp[TimOut,NoMatch]=[0,1], nBackoff[new,norsp]=[0,0]
Reset
Description: This command resets the TAOS unit. When you reset the unit, it restarts and all active connections are terminated. All users are logged out and the default security level is
4-38
Using Debug Commands Alphabetical list of debug commands reactivated. In addition, any active WAN lines are temporarily shut down due to loss of signaling or framing information. After a reset, the TAOS unit runs POST (power-on self-tests). Usage: reset Example: To reset the unit:
admin> reset
Resrcmgr
Description: Displays the information from the TAOS units shelf controller. Usage: Enter resrcmgr at the command prompt. Example: The following syntax is supported.
admin> ? resrcmgr usage: resrcmgr -i|u|? -i list resource (i)tem information -u list resource (u)sage information -? display this summary
Revision
Description: Displays the serial number of the box. Usage: Enter revision at the command prompt. Example: In the following message, 7172461 is the serial number of the TAOS unit.
admin> revision revision = 0 1 10 7172461
RoutMgr
Description: Displays information about the routing of incoming calls to either the Ethernet or modem ports. RoutMgr, when used in conjunction with Networki, can show valuable call routing information. If you have problems with users not connecting, and the incoming calls disconnect within one or two seconds of being presented to the TAOS unit , use RoutMgr and Networki to look for possible clues. The command is a toggle that alternately enables and disables the debug display. Usage: Enter routmgr at the command prompt. Example:
admin> routmgr ROUTMGR debug is now ON ROUTMGR: buildIncomingRoute, port 0, phone <4990> ROUTMGR: routMgrTask routeID=106, port=0, phone=4990 ROUTMGR-106: _matchPhoneNumber
4-39
Using Debug Commands Alphabetical list of debug commands There are no port limitations configured in the T1 profile:
ROUTMGR-106: _matchAnyPort
The next two messages show that the Bearer Capability in the ISDN setup message for the call indicates that it is a voice call, and that the call is routed to an available modem:
ROUTMGR-106: voice call ROUTMGR: giving call to lan/hostif
At this point, the call is passed to other TAOS unit functions to continue the connection setup. Following is output from RoutMgr when a call is cleared.
ROUTMGR: destroyRoute routeID = 106, cause = CLEAR ROUTMGR-106: port is 59 ROUTMGR: deallocateCapabilityrouteID=106, capability=ALL ROUTMGR: route 106 destroyed
SNTP
Description: Displays messages related to the Simple Network Time Protocol (SNTP) functionality of the TAOS unit. The command is a toggle that alternately enables and disables the debug display. Usage: Enter sntp at the command prompt. Example: Following are three examples of messages displayed with SNTP enabled. The TAOS unit accepts time from a configured NTP server. The following message appears if the TAOS unit does not accept a supplied time:
Reject:li= x stratum= y tx= z
The following message indicates that the TAOS unit accepts the time from a specified NTP server:
Server= 0 Time is b6dd82ed d94128e
Because the stored time is off by more than one second, it is adjusted:
SNTP: x Diff1= y Diff2= z
StackLimit
Description: If any TAOS unit function uses all but 128 or fewer of the bytes available for the stack, this command enables a checking routine that logs a warning to the Fatal-History log. The command is a toggle that alternately enables and disables the debug display. Description: This command will enable a checking routine that will log a warning to the Fatal-History log whenever any TAOS units function usage gets within 128 bytes from the end of the stack. The command is a toggle that alternately enables and disables the debug display. Usage: Enter stacklimit at the command prompt.
4-40
TDM
Description: Used to set up or query the TDM bus. Usage: tdm [-option ] [ itemA itemB ] [ connectionId ] where -option is one of the following: Option -a -c -d -f -r -s -l -t -u -? Allocate a TDM channel by round robin. Display TDM manager statistics. List all connections. Toggle TDM manager debug output. Display TDM channel usage statistics. Display this summary. Description Allocate by first available. (Used when setting up a TDM connection to test). Connect channels. Disconnect a channel.
The other syntax elements are: Element -x number itemA itemB connectionID Description Set the next TDM channel to check. Logical address to connect from. Logical address to connect to. ID of connection to disconnect.
Example: Following are some examples of output from the TDM command.
admin> tdm -l --id-- --cstate-- cnt 1 connected 8 tdm# 32 33 34 35 36 37 38 39 40 41 42 43 ---src(A)--01:02:04/001 01:02:04/002 01:02:04/003 01:02:04/004 01:02:04/005 01:02:04/006 01:02:04/007 01:02:04/008 01:02:06/001 01:02:06/002 01:02:06/003 01:02:06/004 ---dst(B)--01:11:01/001 01:11:01/002 01:11:01/003 01:11:01/004 01:11:01/005 01:11:01/006 01:11:01/007 01:11:01/008 01:11:01/009 01:11:01/010 01:11:01/011 01:11:01/012
2 connected
24
4-41
of of of of of of of of of of
total connections: 9 active connections: 9 available channels: 839 used channels: 185 disconnection errors: 0 bad received messages: 0 invalid events: 0 missing connections: 0 bad events: 0 bad states: 0
admin> tdm -u (non-empty entries ONLY) timslot nUsed --currSrc--32 1 01:02:04/001 33 1 01:02:04/001 34 1 01:02:04/001 35 1 01:02:04/001 36 1 01:02:04/001 37 1 01:02:04/001 38 1 01:02:04/001 39 1 01:02:04/001 40 1 01:02:06/001
TDMtst
Description: TDMtst runs on the HDLC card and tests the TDM bus. You can use it to verify communication between HDLC cards. Because the command tests byte-stream communication on the TDM bus, which must use a known time slot, it requires some setup before it can verify TDM traffic. Usage: tdmtst -option where -option is one of the following: Option -o channel physical-address logical-address -c channel -e channel count size -b channel count size -x channel string -s Description Open a TDM channel between the physical address and the logical address. Close the TDM channel. Send packets across the TDM bus on the open channel. Send packets across the TDM bus on the open channel. Send the specified string over the TDM channel. Display the TDM test statistics.
4-42
Option -t
TelnetDebug
Description: Displays messages as Telnet connections are attempted or established. The Telnet protocol negotiates several options as sessions are established, and TelnetDebug displays the Telnet option negotiations. The command is a toggle that alternately enables and disables the debug display. Usage: Enter telnetdebug at the command prompt. Example: The following session shows a successful Telnet connection from the TAOS units terminal server to another UNIX host.
admin> telnetdebug TELNET debug is now ON
For this Telnet session, the TAOS unit will support options 24 and 1. The UNIX host should respond with either DO or WONT:
TELNET-4: send WILL 24 TELNET-4: recv WILL 1
4-43
TNTMP
Description: Displays information about MP and MP+ bundles and their channels. You can execute the TNTMP command on a shelf controller or on an HDLC card. You must first execute the Open command to open a session with the card. Permission level: Debug Usage: tntmp -i Example: To display information about MP and MP+ bundles and their channels:
admin> tntmp -i mpBundleID=13 masterSlot=1/15 masterMpID=2 ifCount=2 rtIf=1/17:6 routeID slot ifNum localIfNum localMpID 32 1/15 1 1 2 33 9/ 2 193 1 2
This command works on HDLC cards as well. First, open a session with HDLC card, and then execute the TNTMP command. For example:
admin> open 1 15 hdlc-1/15> tntmp -i mpBundleID=13 masterSlot=1/15 masterMpID=2 ifCount=2 rtIf=1/17:6 routeID slot ifNum localIfNum localMpID 32 1/15 1 1 2 33 9/ 2 193 1 2
In this example, the output shows a two-channel MP or MP+ bundle, with the first channel in slot 1/15 and the second (slave) channel in slot 9/2. The command displays the following information: Field mpBundleID Description The globally known bundle ID for the whole system. If the connection adds channels for additional bandwidth on demand, the call for those channels is compared to the current bundle and assigned the same bundle ID as the other channels of the call. The channel that was established as the base channel of the connection. After the TAOS unit authenticates a call that is not part of an existing bundle, it establishes the base channel of the connection. That channel becomes the master of the multilink connection. The bundle ID at the master slot card. (The masterMpID is always the same as the localMpID for channels on the master slot card.) The number of channels in the bundle. The shelf/slot:id for the Route Logical Interface. The globally known ID for each call. The shelf/slot numbers of the channels in the MP or MP+ bundle. Channel number on the master slot card.
masterSlot
4-44
Field localIfNum
Description The channel number on the local slot card. For HDLC cards, the channels are numbered 1192. In the output in the example, the master slot (1/15) shows channel number 1. The interface number for the slave slot (9/2) is also 1, meaning the first channel on that card. However, at the master slot card, the slave interface number is mapped to a pseudo-interface number greater than 192, so it is not confused with channels on the master slot. The bundle ID known locally to the slot card.
localMpID
TSshow
Description: Displays uptime and revision information about the TAOS unit. The Uptime command and the Software-Version parameter display the same information. Usage: tsshow [ ? ] [ uptime ] [ revision ] Syntax element: ? uptime revision Description: List all options. Display system uptime. Display software and version currently running.
Example: Following are some samples of TSshow output: admin> tsshow Show what? Type tsshow ? for help. admin> tsshow ? tsshow ? Display help information tsshow uptime Display system uptime. tsshow revision Display system revision. admin> tsshow uptime system uptime: up 36 days, 9 hours, 59 minutes, 27 seconds admin> tsshow revision system revision: tntsr 2.0.0
TunnelDebug
Description: Displays messages related to setting up Generic Routing Encapsulation (GRE) tunnels on the TAOS unit. The command is a toggle that alternately enables and disables the debug display.You would normally use this command with the ATMPdebug command. Usage: Enter tunneldebug at the command prompt. Example: The following example shows an ATMP tunnel being set up:
TUNNELTNT.CB[1/7]: Event=Start-Tunnel SN=80 TUNNELTNT[1/7]: DUMP [Start-Tunnel] SN=80 MC=1/17/24/10052400 HN=[] priHA=[200.67.1.254] secHA=[] Udp=5150 pass=[ascend] IP=141.111.40.55 Mask=255.255.255.255 IPX=00000000:000000000000
4-45
TUNNEL: createFAsession: priHA=[200.67.1.254] secHA=[] udpPort=5150 ifNum=1/17/24/10052400 MajDev=7 password=ascend mcIpAddr=141.111.40.55/32 TUNNEL-411: Alloc 1019F660 Id=411 TN=411 TUNNEL-411: resolving 200.67.1.254, port=5150, SN=411 TUNNEL-START: In progress TUNNELTNT[1/7]: DUMP [Start-Tunnel-Rsp] SN=411 MC=1/7/4/10059440 LocalSN=80 GlobalSN=411 Status=In progress TUNNEL: _dnsCallback: name=[200.67.1.254], ip=200.67.1.254 DNS=411 TUNNEL-411: tunnelSetStatus: status=Good completion TUNNELTNT[1/7]: DUMP [Update-Tunnel] SN=411 TunnelNumber=405 mcRtIf=1/7/4/10059440 HomeRtIf=0/0/0/0 HomeAgent=200.67.1.254:5150 HomeNetwork=[] Flags=10 AgentMode=2 IP=141.111.40.55 Mask=255.255.255.255 IPX=00000000:000000000000 TUNNELTNT[1/7]: DUMP [Set-Status] SN=411 ErrorCode=0 TUNNELTNT[1/7]: DUMP [Start-Tunnel-Rsp] SN=411 MC=1/7/4/10059440 LocalSN=80 GlobalSN=411 Status=In progress
TunnelSlot
Description: The command has little practical use other than as a tool for developmental engineering.
Update
Description: Modifies optional functionality of the TAOS unit. To enable some options, you must obtain a set of hash codes (supplied by a Lucent Technical Support representative) that will enable the functionality in your TAOS unit. After each string is entered, the word complete appears, indicating that the TAOS unit accepted the hash code. If you enter update without a text string modifier, the TAOS unit displays a list of current configuration information. Usage: update [ text_string ] Example: admin> update Host interfaces: 4 Net interfaces: 4 Port 1 channels: 255 Port 2 channels: 255 Port 3 channels: 255 Port 4 channels: 255 Field features 1: 182 Field features 2: 33 Field features 3: 54 Protocols: 1 admin> update 5 1023 12321312312312321 The following two messages indicate that the text strings were entered incorrectly:
4-46
The following message indicates that the TAOS unit accepted the update string:
update command: command complete.
WANdisplay
Description: Displays all packets received from, or sent to any of the WAN interfaces. Because WANdisplay output shows what the TAOS unit is receiving from and sending to the remote device, the information can be very helpful in resolving PPP negotiation problems. If you enter the command on your TAOS unit while traffic is heavy, the resulting amount of output can make it tedious to find the information you are looking for. The screen might even display the message ----- data lost -----, which means that not all output can be displayed on the screen. Depending on the types of information you need to gather, you might prefer to use the WANdisplay command during a period of low throughput, or to use WANdsess, WANopen or WANnext to focus the display. Usage: wandisplay number-of-octets-to-display Enter wandisplay 0 to disable the logging of this information. Example: Following are several examples of WANdisplay output. Note that the bytes are displayed in hexadecimal format.
admin> wandisplay 24 Display the first 24 bytes of WAN messages > RECV-272:: 1 octets @ 5E138F74 [0000]: 0D RECV-272:: 13 octets @ 5E13958C [0000]: 0A 41 63 63 65 70 74 3A 20 69 6D 61 67 XMIT-276:: 1011 octets @ 2E12D8A4 [0000]: 7E 21 45 00 03 EE 54 2B 40 00 37 06 BA 09 CF 2B [0010]: 00 86 D0 93 91 90 1A 0A admin> wandisplay 0 WAN message display terminated
WANdsess
Description: Shows WAN data as it is received and transmitted for a particular user. The WANdsess command is very similar to the WANdisplay command, but when you use WANdsess, the TAOS unit displays only incoming and outgoing packets for a specific user. WANdsess is particularly helpful on a TAOS unit with several simultaneous active connections. The command acts as a filter, allowing you to focus your troubleshooting. Use the WANdsess command with host cards only. You must first execute the Open command to open a session with the modem or HDLC card.
4-47
Using Debug Commands Alphabetical list of debug commands Usage: wandsess session-name octets Syntax element
session-name octets
Description Name of a local Connection profile or a RADIUS user profile. Maximum number of octets to display per packet. If you specify 0 (zero), the TAOS unit does not display any data.
Example: To open a session with a modem card, and activate the display of WAN data for Tims sessions:
admin> open 1 7 modem-1/7> wandsess tim RECV-tim:300:: 1 octets @ 3E13403C [0000]: 7E 21 45 00 00 3E 15 00 00 00 20 7D 31 C2 D2 RECV-tim:300:: 15 octets @ 3E133A24 [0000]: D0 7D B3 7D B1 B3 D0 7D B3 90 02 04 03 00 35 XMIT-tim:300:: 84 octets @ 3E12D28C [0000]: 7E 21 45 00 00 4E C4 63 00 00 1C 7D 31 17 5F D0 [0010]: 93 90 02 D0 93 91 B3 00
Note that the bytes are displayed in hexadecimal format. See Also: WANdisplay, WANopening
WanEventsStats
Description: Displays statistics about WAN events of interest on a host card. Usage: First, open a session to a host card, then enter waneventstats at the command prompt. Example:
modem-1/2> wanEventStats Output: _sendCachedData() Counts: NullWanInfo 0 BufLen: 0 NullHandle: 0 BadState: 0 QueuingFails: 0 ToMbufFails: 0 SendOk: 0 _loseCachedData() Counts: NoBuf: 0 LoseOk: 0 _cachePrioData() Counts: BadData: 0 MallocFails: 0 PrevCache: 0 CacheOk: 0
4-48
WanInfo Instance Error Counts: _wanBufferSent: 0 _wanBufferRcvd: 0 _wanBreakRcvd: 0 _modemEventHandlerInstanceMismatch: 0 WanInfo TxPending Error Counts: 0 wanSendData() Counts: _wanSendDataOk: 1fd2e _wanSendDataHighPriority: 1fd2e _wanSendDataNormPriority: 0 _wanSendDataNoInpMbuf: 0 _wanSendDataBadLen: 0 _wanSendDataNormPrioNoBuf: 0 _wanSendDataNoRoute: 0
In this output, the following counters should always be set to zero (a non-zero value indicates an error condition):
NullWanInfo 0 BufLen: 0 NullHandle: 0 BadState: 0 NoBuf: 0 BadData: 0 _wanBufferSent: 0 _wanBufferRcvd: 0 _wanBreakRcvd: 0 _modemEventHandlerInstanceMismatch: 0 WanInfo TxPending Error Counts: 0 _wanSendDataNoInpMbuf: 0 _wanSendDataBadLen: 0
The rest of the counters can have non-zero values, although most of them indicate how busy the system is and should have small values. For example, the following counters record high-priority message caching events:
SendOk: 0 LoseOk: 0 CacheOk: 0
The next counters record send message requests. These are the only counters that record normal events rather than errors. The first _wanSendDataOk counter represents the count of all HDLC packets sent out, which may be quite a large number. The other two counters represent the two types of HDLC data, normal and high priority. Their sum should equal the value of _wanSendDataOk in the absence of errors. For example:
_wanSendDataOk: 1fd2e _wanSendDataHighPriority: 1fd2e _wanSendDataNormPriority: 0
The next counter records dropped normal priority messages. A non-zero value indicates the number of normal messages dropped due to lack of a buffer. To some extent this indicates how
4-49
Using Debug Commands Alphabetical list of debug commands busy the system is, but because sessions have a buffer quota, it is possible to drop a normal message and increment this counter even when the system is not overloaded and when it is not out of buffers.
_wanSendDataNormPrioNoBuf: 0
The next counter reports requests to send a packet being processed after the session has been terminated. This is a normal occurrence when a call terminates during data transfer. (Its value should normally be relatively small but not necessarily non-zero.)
_wanSendDataNoRoute: 0
The following counters record the systems inability to obtain a DRAM or HDLC buffer for high priority message caching:
QueuingFails: 0 ToMbufFails: 0 MallocFails: 0
The following counter records high priority messages that have been dropped from the cache due to the arrival of another high priority message for the same session:
PrevCache: 0
WANopening
Description: Shows WAN data as it is received and transmitted during connection establishment for all users. The WANopening command is particularly helpful for troubleshooting connection problems in which users make the initial connection, but are disconnected within a few seconds. The output of WANopening is very similar to the output of WANdisplay, but WANopening only shows packets until the connection has been completely negotiated. Use the WANopening command with host cards only. You must first execute the Open command to open a session with the modem or HDLC card. Usage: wanopening octets The octets value specifies the maximum number of octets to display per packet. If you specify 0 (zero), the TAOS unit does not log WAN data Example: To open a session with a modem card, and activate the display of WAN data received and transmitted during connection establishment:
admin> open 1 7 modem-1/7> wanopening Display the first 24 bytes of WAN messages RECV-272:: 1 octets @ 5E138F74 [0000]: 0D RECV-272:: 13 octets @ 5E13958C [0000]: 0A 41 63 63 65 70 74 3A 20 69 6D 61 67 XMIT-276:: 1011 octets @ 2E12D8A4 [0000]: 7E 21 45 00 03 EE 54 2B 40 00 37 06 BA 09 CF 2B [0010]: 00 86 D0 93 91 90 1A 0A
4-50
Using Debug Commands Alphabetical list of debug commands Note that the bytes are displayed in hexadecimal format. See Also: WANdisplay, WANdsess
WANtoggle
Description: Displays messages from the WAN drivers on the TAOS unit, including the status of calls that are passed from the TAOS units call routing routines as the connection is prepared to be passed to the Ethernet drivers. If you enter the command while traffic through your TAOS unit is heavy, the resulting amount of output can make it tedious to find the information you are looking for. The screen might even display the message ----- data lost -----, which just means that not all the output can be displayed on the screen. You might prefer to use this command during a period of low throughput. The command is a toggle that alternately enables and disables the debug display. Usage: Enter wantoggle at the command prompt. Example: Following is a typical example of output produced by a modem call into the TAOS unit. After the incoming call is determined to be an analog call, a modem is directed to answer it.
WAN-389: WAN-389: WAN-389: WAN-389: WAN-389: WAN-389: wanOpenAnswer modem redirected back to wan Startup frame received Detected unknown message Detected ASYNC PPP message wanRegisterData, I/F 58
The last message is not an indication of a problem. The modem clears the call a split second before the software releases its resources. The software does a check on the modem, which has already been released. This message is not an indication of a problem.
WAN-??: no modem assoc w WanInfo
4-51
Parameter
Specifies
Min-Warning-Core-Dump Minimum Warning message index value to cause a coredump. This value must be less than or equal to the Max-Warning-Core-Dump value. The default zero means that only Warnings from 101 to 121 cause a coredump. The valid range is from 1 to 9999. Max-Warning-Core-Dump Maximum Warning message index value to cause a coredump. This value must be greater than or equal to the Min-Warning-Core-Dump value. The default zero means that only Warnings from 101 to 121 cause a coredump. The valid range is from 1 to 9999. For example, the following command specify that in addition to Warnings 101 through 121, Warnings 500 through 600 will generate a coredump:
admin> read debug { 1 1 1} DEBUG/{ shelf-1 slot-1 1 } read admin> set min-warning-core-dump = 500 admin> set max-warning-core-dump = 600 admin> write DEBUG/{ shelf-1 slot-1 1 } written
4-52
Understanding the User profile parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2 Understanding command permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3 Sample User profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5 Customizing the environment for a User profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6 Creating and managing remote user profile filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9 User profiles are for TAOS unit system administration. Do not confuse them with Connection profiles. User profiles are used by administrators who need access to the TAOS units command line interface to monitor or configure the unit. Connection profiles contain authentication and configuration information for a remote device or user and allow the remote user to connect to the TAOS unit for WAN or LAN access. You can create any number of User profiles and fine-tune the privileges they allow. In addition to authentication and permission information, User profiles also contain parameters that affect how the user s environment appears at login. The TAOS unit ships with two predefined User profiles, named Admin and Default. The Admin account is the super-user, with full read-write permissions. Default is set to the other extreme. It authorizes the minimal use of commands. Many sites choose to create some administrative accounts in a read-only mode, to allow those users to check status windows, read log buffers, and execute diagnostic commands. You need at least one administrative account in read-write mode, but you may choose to create several such accounts.
5-1
When you create a new User profile with the New command, the system creates a default instance of the profile and reads it into the edit buffer. The name and password you assign to the profile represent a user or host name and a password used to authenticate that user at login. The User profile is activated when you first create it. If you set Active-Enabled to No, the profile is not available for use. Permissions control which actions the user who logs in with this profile can perform on the TAOS unit.
Active-Enabled
Assigning permissions
With the Idle-Timeout setting, you can specify the number of seconds a Telnet session can remain logged in with no keyboard activity. The default command-line prompt is TNT>. If you set the prompt to an asterisk, the TAOS unit uses the name parameter as the prompt. For example, for the admin User profile, the prompt would be admin>. You can display status windows by default at login, and you can specify what information should be displayed initially in the top, bottom, and left windows.
Prompt
You can specify that log messages should be displayed immediately in the interface, instead of written to a log. You can also specify at which level the immediate display should begin. The lowest level is none, indicating that no messages should be displayed in the command-line interface. The highest level is debug.
5-2
) )
Typically, read-write accounts enable the System command class. They might also enable the Update and Code command classes. Read-only accounts might be limited to the Diagnostic command class. Table 5-2 shows the commands associated with each permission: Table 5-2. Permissions and associated commands Permission N/A (always enabled) Command class User Commands in this class ? Auth Clear Help Quit Whoami
5-3
Creating User Profiles Understanding command permissions Table 5-2. Permissions and associated commands (continued) Permission Allow-System Command class System Commands in this class ARPtable BRIChannels Clr-History Connection Dir Dircode DNStab Fatal-History Get HDLC IGMP IPcache IP-Pools IProute Line List Log Modem Callroute Clock-Source Debug Device DS3ATMlines Ether-Display If-Admin NSlookup Date Delete Load Nvram Format Terminal-Server Netstat New OSPF Power Quiesce Read Refresh Screen Set Show Status SWANlines T1channels UDS3lines Userstat Version View
Allow-Diagnostic
Diagnostic
OAMLoop Open Ping Rlogin Slot Telnet Traceroute Uptime Reset Save Write
Allow-Update
Update
Allow-Code Allow-Termserv
Code Termserv. This permission enables the user to invoke the Terminal-Server command and use the terminal-server interface.
Fsck
5-4
Creating User Profiles Sample User profiles Table 5-2. Permissions and associated commands (continued) Permission Allow-Password Command class N/A Commands in this class The Allow-Password permission enables the user to view passwords. If set to No, the user sees a row of asterisks instead of the actual configured password. If the administrator that backs up system configurations does not have the Allow-Password permission set to Yes, passwords are not saved as part of the configuration.
5-5
admin> new user USER/default read admin> set name = techpubs admin> set password = december
admin> set allow-termserv= yes admin> set prompt = * admin> set log-display-level = none admin> write USER/techpubs written To log in by means of the new profile: admin> auth techpubs Password: december
5-6
Creating User Profiles Customizing the environment for a User profile The size of the status window are determined by the following parameters in a User profile (shown with their default values) Screen-Length = 24 Status-Length = 18
See the APX 8000/MAX TNT Reference for details of using these parameters. Figure 5-1 shows the default contents for each area of the status window: Figure 5-1. Information in the status window
Left: Connection
Top: General
2 Connections Status 001 tomw PPP 1/7/14 19200 Serial number: 6201732 002 timl MP 1/7/3 56000
Version: X.0.0
04/27/2000 12:20:15
Following is an example of configuring the User profile to display the status window upon login, and to show line information in the bottom area of the window. It also configures a larger terminal emulator window and status screens:
admin> read user test USER/test read admin> set default-status = yes admin> set bottom-status = line-status admin> set screen-length = 36 admin> set status-length = 30 admin> write USER/test written
5-7
5-8
Creating User Profiles Creating and managing remote user profile filters
Current limitations
In this release, the remote filter implementation is subject to the following limitations: Filters applied to dialout calls are not supported in this release. Call filters, route filters, and TOS filters are not supported in this release. Only data filters are currently supported.
5-9
Creating User Profiles Creating and managing remote user profile filters
Parameter Filter-Required
Specifies Whether access to the filter is required for the session. With the default value of No, the system establishes the session even if the specified filter is not found. If the parameter is set to yes, the system disconnects the call if the filter is not found. This setting does not apply if the profile does not refer to a filter by name. The Answer-Defaults setting is used for RADIUS user profiles that apply a filter and do not explicitly specify a value for Ascend-Filter-Required (50).
Data-Filter
Name of a Filter profile associated with the connection. The name can be of a local profile or a filter pseudo-user profile in RADIUS. However, if a local Connection profile does not use authentication, it cannot specify a RADIUS filter profile. Number of minutes to cache RADIUS filter profiles that do not include a value for Ascend-Cache-Time (57). The default is 1440 (24 hours). Once the cache timer expires, cached profiles are deleted from system memory. The next time a remote filter is needed, the system retrieves the profile from RADIUS and stores it in cache again. Keeping a profile in cache increases the performance of establishing sessions that use the filter, at the cost of some system memory. If this parameter is set to 0 (zero), the default timer is disabled so that only RADIUS profiles that specify a cache time are cached.
Default-Filter-CacheTime
5-10
Creating User Profiles Creating and managing remote user profile filters
The profile-name value is any name you assign to the profile. Duplicate filter names are not allowed. If a local Filter profile is already stored, the TAOS does not retrieve a filter profile of the same name from the RADIUS server. Filter profile definitions can include the following attribute-value pairs: RADIUS attribute Value
Ascend-Data-Filter (242) An abinary-format filter specification using one of the following formats:
"generic dir action offset mask value compare [more]" "ip dir action [ dstip n.n.n.n/nn ] [ srcip n.n.n.n/nn ][ proto ] [ destport cmp value ] [ srcport cmp value ] [est]]"
Ascend-Cache-Refresh (56)
Whether the timer for cached routes in this profile is reset each time a new session becomes active that refers to the pseudo-user profile. Refresh-No (0) does not reset the timer. Refresh-Yes (1) resets the cache timer when a session referring to the profile becomes active.
Ascend-Cache-Time (57) Number of minutes to cache the profile. Once the cache timer expires for a RADIUS profile, the profile is deleted from system memory. The next time it is needed, the system retrieves it from RADIUS and stores it in cache again. Keeping a profile in cache increases the performance of route lookups, at the cost of some system memory. The minimum possible cache time is 0 minutes, which causes the system to retrieve the profile for every route lookup in the table. This setting is usually not desirable. If this attribute is not specified, the IP-Global setting is used. To use these attributes, the RADIUS server must support vendor-specific attributes (VSAs) and the TAOS must be configured in VSA compatibility mode. Following are the relevant settings:
[in EXTERNAL-AUTH] auth-type = radius [in EXTERNAL-AUTH:rad-auth-client] auth-radius-compat = vendor-specific
For details about these settings, see the APX 8000/MAX TNT Reference. For details about defining data filters in RADIUS, see the APX 8000/MAX TNT WAN, Routing, and Tunneling Configuration Guide.
5-11
Creating User Profiles Creating and managing remote user profile filters
The cache timer has been set to 20 minutes, and the timer is reset each time the filter is applied to a session. The following commands configure a default cache time for RADIUS filter profiles:
admin> read ip-global IP-GLOBAL read admin> set default-filter-cache-time = 180 admin> write IP-GLOBAL written
Following is a sample RADIUS filter profile that makes use of the default because a value for Ascend-Cache-Time (57) is not explicitly specified:
filter-e Password = "ascend", Service-Type = Outbound Ascend-Data-Filter = "ip out forward tcp dstip 10.2.2.2/28", Ascend-Data-Filter = "ip out drop"
Following is a sample RADIUS profile that applies the same filter profile with the same requirements. This profile also specifies how the filters must be cached for this connection:
p50-v2 Password = "my-password", Service-Type = Framed Framed-Protocol = PPP, Framed-IP-Address = 10.1.1.1, Framed-IP-Netmask = 255.0.0.0, Filter-ID = "filter-c", Ascend-Filter-Required = Required-Yes
The following commands configure the system to reject incoming calls when the RADIUS user profile specifies a filter that is not found, and the user profile does not explicitly say what to do if the filter is not found:
admin> read answer-defaults ANSWER-DEFAULTS read
5-12
Creating User Profiles Creating and managing remote user profile filters
Following is a sample RADIUS profile that makes use of the default because a value for Ascend-Filter-Required (55) is not explicitly specified:
p50-v2 Password = "my-password", Service-Type = Framed Framed-Protocol = PPP, Framed-IP-Address = 10.1.1.1, Framed-IP-Netmask = 255.0.0.0, Filter-ID = "filter-c"
You can read and list the contents of the remote filters in the usual way, as if they were local profiles. For example:
admin> read filter filter-c FILTER/filter-c read (read-only) admin> list [in FILTER/filter-c] filter-name* = filter-c input-filters = [ { no no generic-filter { 0 0 no no + output-filters = [ { yes no ip-filter { 0 0 no no +
Note: You cannot change RADIUS filter specifications from the command-line interface. You can delete RADIUS filter profiles by using the delete command. For example:
admin> delete filter filter-c Delete profile FILTER/filter-c? [y/n] y FILTER/filter-c deleted
5-13
Creating User Profiles Creating and managing remote user profile filters
Example: set filter-required = yes Dependencies: Consider the following: If the call needs to be brought down, the cause code 425 results. If the call is allowed to come up, the system logs a notice-level message that the filter cannot be found. If the Ascend-Filter-Required attribute is missing in the RADIUS user profile, the TAOS uses the Filter-Required value in the Answer-Defaults profile.
5-14
SNMP Administration
SNMP support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1 Configuring SNMP access and security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-31 Setting up SNMP traps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-33 Managing SNMP interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-48 Ascend MIB hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-50 The TAOS unit supports SNMP (Simple Network Management Protocol) on a TCP/IP network. An SNMP management station that uses supported Management Information Bases (MIBs) can query the TAOS unit, set some parameters, sound alarms when certain conditions appear in the TAOS unit, and so forth. The TAOS unit has its own SNMP password security (community strings), which you should set up to protect the TAOS unit from being reconfigured from an SNMP station. The TAOS unit supports profiles that control which classes of events generate traps to be sent to an SNMP manager, which SNMP managers can access the unit, and community strings to protect that access.
SNMP support
This section describes the SNMP supported on the TAOS unit.
Standard MIBs
This section describes the standard MIBs supported on the TAOS unit.
6-1
Currently it is not possible to define new connections solely by using SNMP management, so many of the read-write and read-create parameters were changed to read-only.
6-2
SNMP Administration SNMP support This object is supported in the TAOS unit as a read-only Modem-Table-Index parameter in the Admin-State profile. The value of this parameter is allocated by the system when it first detects the presence of a modem card. The fact that the TAOS unit supports hot-swapable cards requires a relaxation of the MIB definition of the mdmIndex object in the same manner that RFC 1573 relaxes the ifIndex definition. The MIB definition of mdmIndex specifies that the index value must be in the range of 1 to mdmNumber, and the value must remain constant from one reinitialization of the network management agent to the next.
A modem card may be added to or removed from the TAOS unit without reinitializing the SNMP agent, which affects both of these definitions. For example, if a modem card is inserted into slot 1 of a new TAOS units system, its 48 modems are allocated the index values 1 through 48. If another modem card is inserted into slot 3, its modems are allocated the index values 49 through 96. If the TAOS unit is rebooted, these values remain constant. If the modem card in slot 1 is removed and the TAOS unit is rebooted again, the index values for the modem card in slot 3 still remain constant with the range 49 through 96, even though the value of mdmNumber is now 48.
6-3
SNMP Administration SNMP support Table 6-1. TAOS unit support for RFC 2233 (continued) RFC 2233 Table ifXTable Comment The TAOS unit supports this table with the following exceptions: ifStackTable ifRcvAddressTable ifTestTable The OwnerString object is not supported. The InterfaceIndexOrZero object is not supported. The 64-bit HighCounter objects are not supported. The ifPromiscuousMode object is read-only.
Not supported on the TAOS unit. Not supported on the TAOS unit. Not supported on the TAOS unit.
Set operations are not yet supported. In addition, the following SNMPv2-related changes were made to rfc2514.mib: The definition of atmMIB and atmMIBObjects were moved here from rfc2515.mib. All the definitions were modified to SNMPv1 Structure of Management Information (SMI). The SNMPv1 entries atmNoTrafficDescriptor, atmClpNoTaggingNoScr, and atmClpTaggingNoScr are deprecated.
The following SNMPv2-related changes were made to rfc2515.mib: The definitions of atmMIB and atmMIBObjects were moved to rfc2514.mib. All MIB fields with Current Status were changed to Mandatory. MAX-Access syntax was changed to Access for all the fields. Fields with read-create access were changed to read-write. Set functions are not supported on the following parameters, so they have been changed from read-write to read-only:
6-4
SNMP Administration SNMP support atmInterfaceConfEntry parameters atmVclReceiveTrafficDescrIndex , atmVclTransmitTrafficDescrIndex and atmVclAdminStatus in atmVclTable atmVccAalType, atmVccAal5CpcsTransmitSduSize, atmVccAal5CpcsReceiveSduSize , atmVccAal5EncapsType, atmVclRowStatus, atmVclCastType and atmVclConnKind in atmVclTable
Read-write permissions were changed to read-only permission in the following tables: atmTrafficDescrParamTable atmVplTable
Privacy Timeliness
6-5
SNMPv3 USM feature Description Discovery Allows one SNMP engine to obtain sufficient information about more than one TAOS units SNMP engine to establish communication between an SNMP manager station and the TAOS units. Added from SNMPv2 to allow the SNMPv3 manager to minimize the number of protocol exchanges required to retrieve a large amount of management information. The GetBulkRequest Protocol Data Unit (PDU) allows an SNMPv3 manager to request as large a response as possible.
GetBulkRequest
6-6
SNMP profile
Two parameters in the SNMP profile, Snmp-Message-Type and Security Level, support SNMP system security configuration. The Snmp-Message-Type parameter specifies the SNMP protocol type that communicates on TAOS units. The Security Level parameter specifies the security level of the SNMP agent. Definitions of the two SNMP parameters follow.
Parameter SNMP-Message-Type
Security-Level
v3-only: Forces the SNMP agent to communicate using only the SNMPv3 protocol. Any SNMP messages that arrive at the agent with a protocol type other than SNMPv3 are discarded. Security level of the SNMP agent when SNMPv3 is in use.
are authenticated and encrypted. All other messages are received with a REPORT message, which means the security level is not supported.
SNMPV3-USM-USER profile
The SNMPV3-USM-User profile provides the ability to create and edit users profiles. The following are configurable parameters within the SNMPV3-USM-USER profile. Name Auth-key
6-7
Following is a sample configuration of the relevant parameters in an SNMP-USM-User profile. admin> new snmpv3 testv3 SNMPv3-USM-USER/testv3 read admin> list in SNMPv3-USM-USER/testv3] name* = testv3 active-enabled = yes read-write-access = no(*) auth-protocol = md5-auth(*) priv-protocol = no-priv(*) auth-key = (*) priv-key = (*) Note: (*) This symbol represents a factory default value setting.
Parameter Name
Specifies Username. Messages sent to or from the SNMP engine on behalf of this name use the security parameters specified in this profile. The value can contain up to 23 characters and can include special characters by using the \xNN format with the ASCII code for the character. For example, the value test\x20\x21 represents the string test !. Enable/disable SNMPV3 USM features for this user. The default value is no. Enable/disable read-write access to the TAOS units MIBs for this user. When the value is no (default), the user has read access only, which enables viewing but not modification of the MIBs. Enable/disable authentication of messages sent on behalf of this user to or from the SNMP engine, and if enabled, the type of authentication protocol to use. If this parameter is set to a value other than no-auth, the Password parameter must specify the password to be used. Following are the valid values: no-auth: no authentication required. md5-auth: (the default value) specifies that the MD5 protocol must be used for authentication. sha-auth: enables authentication and specifies that SHA protocol must be used.
Active-Enabled Read-Write-Access
Auth-Protocol
6-8
Parameter Priv-Protocol
Specifies Enable/disable encryption of messages sent on behalf of the user to or from the SNMP engine, and if enabled, the type of privacy protocol to be used. Default setting is no-priv. Following are the valid values: No-Priv (the default): no encryption is required and that privacy is disabled. DES-Priv: DES-based privacy is required. Incoming messages that are DES-encrypted are interpreted, and outgoing responses are encrypted using DES. Note that outgoing reports are not encrypted.
Auth-Key
Specifies an authentication key for SNMPv3 USM users. In most cases, you do not set this string directly. Instead, use the SnmpAuthPass command to generate the value. If you have permission to view passwords, the authentication key appears as a string with escape sequences for save and restore purposes. Otherwise, the authentication key appears as a row of asterisks. The default is null. If you change the value of Auth-Key directly, keep in mind that the length of the escape sequence must be 10 (16d in hexadecimal) if Message Digest 5 (MD5) is in use and 14 (20d in hexadecimal) if the Secure Hash Algorithm (SHA) is in use. If you specify an invalid value, the unit uses the previous key, if any, to communicate with the SNMP manager. If no previous key exists, this USM user cannot communicate with the network until a valid key is set by means of the snmpAuthPass command. Suppose you use the snmpAuthPass command to generate the following 16-byte string: 27 0a dc 75 f8 98 e5 7c 4c 03 22 7d dd ac 0d ef The system displays it as the following Auth-Key value:
\x0a\xdcu\xf8\x98\xe5|L\x03"}\xdd\xac\x0d\xef
Consider the following: You must generate the authentication key by means of the snmpAuthPass command before the SNMPV3-USM-User profile can be used for communication with the SNMP manager. If you change the authentication protocol from MD5 to SHA (or vice versa), you must change the authentication key by means of the snmpAuthPass command. The previous protocol-and-key combination is used until you specify a new one. If Auth-Protocol is No-Auth, Auth-Key does not apply.
6-9
Parameter Priv-Key
Specifies Specifies a privacy key for SNMPv3 USM users. In most cases, you do not set this string directly. Instead, use the snmpPrivPass command to generate the value. If you have permission to view passwords, the privacy key appears as a string with escape sequences for save and restore purposes. Otherwise, the privacy key appears as a row of asterisks. The default is null. If you change the value of Priv-Key directly, keep in mind that the length of the escape sequence must be 10 (16d in hexadecimal) if Message Digest 5 (MD5) is in use. The escape sequence must be 14 (20d in hexadecimal) if the Secure Hash Algorithm (SHA) is in use. If you specify an invalid value, the unit uses the previous key, if any, to communicate with the SNMP manager. If no previous key exists, this USM user cannot communicate with the network until a valid key is generated by means of the snmpPrivPass command. Suppose you use the snmpPrivPass command to generate the following 16-byte string: 27 0a dc 75 f8 98 e5 7c 4c 03 22 7d dd ac 0d ef The system displays it as the following Priv-Key value:
\x0a\xdcu\xf8\x98\xe5|L\x03"}\xdd\xac\x0d\xef
Consider the following: You must generate the privacy key by means of the snmpPrivPass command before the SNMPV3-USM-User profile can be used for communication with the SNMP manager. If you change the authentication protocol from MD5 to SHA (or vice versa), you must change the privacy key by means of the snmpPrivPass command. The previous protocol and key combination is used until you specify a new one. If Priv-Protocol is No-Auth, Priv-Key does not apply.
6-10
Command snmpAuthPass
Specifies Generates the authentication key of an SNMPv3 USM user. The snmpAuthPass command can accept a username in escape sequence format. To generate the authentication key of the user robin with the password abc123, first type the snmpAuthPass command followed by the user name and password: admin> snmpAuthPass robin abc123 The password you specify is not stored in the system. It is used to generate an authentication key when the user is authenticated. The key is stored in the system.
snmpPrivPass
Generates the privacy key of an SNMPv3 USM user. The snmpPrivPass command can accept a username in escape sequence format. To generate the privacy key of the user robin with the password abc123, first type the snmpPrivPass command followed by the user name and password: admin> snmpPrivPass robin abc123 The password you specify is not stored in the system. It is used to generate a privacy key when the user is authenticated. The key is stored in the system.
6-11
However, you must use the local interface rather than SNMP to enable authentication and privacy. In addition, you cannot create or modify more than one user in the same SNMP request.
Refer to RFC 2574 for complete details about how to create, modify and delete entries in the USM User Table.
6-12
Description An SNMP engines unique administrative identifier. Syntax: SnmpEngineID Access: Read-only Status: Mandatory
6-13
Description The number of times that the SNMP engine has started or restarted itself since the snmpEngineID was last configured. Syntax: Integer (1 to 2147483647) Access: Read-only
snmpEngineTime
Status: Mandatory The number of seconds since the value of the snmpEngineBoots object last changed. If incrementing this objects value exceeds the maximum, snmpEngineBoots is incremented as if a restart occurred and the value reverts to zero. Syntax: Integer (0 to 2147483647) Access: Read-only
Status: Mandatory snmpEngineMaxMessageSize The maximum length in octets of an SNMP message that this SNMP engine can send, receive, or process. The message length is determined by message size values supported by all of the transports available by the engine. Syntax: Integer (484 to 2147483647) Access: Read-only Status: Mandatory
Specifies The total number of packets received by the SNMP engine that were dropped because the requested security level was either unknown or unavailable. Syntax: Counter32 Access: Read-only Status: Mandatory
6-14
Specifies This group provides information on the total number of packets received by the SNMP engine which were dropped because they appeared outside of the authoritative SNMP engines window. Syntax: Counter32 Access: Read-only
usmStatsUnknownUserNames
Status: Mandatory The total number of packets received by the SNMP engine that were dropped because they referenced a user that was unknown to the SNMP engine. Syntax: Counter32 Access: Read-only
usmStatsUnknownEngineIDs
Status: Mandatory The total number of packets received by the SNMP engine that were dropped because they referenced an snmpEngineID that was unknown to the SNMP engine. Syntax: Counter32 Access: Read-only
usmStatsWrongDigests
Status: Mandatory The total number of packets received by the SNMP engine that were dropped because they contained an unexpected digest value. Syntax: Counter32 Access: Read-only
usmStatsDecryptionErrors
Status: Mandatory The total number of packets received by the SNMP engine that were dropped because they could not be decrypted. Syntax: Counter32 Access: Read-only Status: Mandatory
SNMPv3 notifications
TAOS units using TAOS 9.0 and higher now authenticate and encrypt Protocol Data Units (PDUs) as required by SNMPv3 and generate traps in SNMP version 2 (SNMPv2) Trap2 format. Depending on your configuration, a TAOS unit can send PDUs in SNMPv2 format or in pre-TAOS 9.0 format. You can specify the destinations for traps and the format of outgoing trap PDUs. In addition, two new MIBsSNMP-TARGET-MIB and SNMP-NOTIFICATION-MIBhave been added. With SNMPv3 notifications support enabled you can configure the TAOS unit to perform the following tasks: Send SNMPv1 traps (Trap PDUs) or SNMPv2 Traps (Trap2 PDUs). Send traps to a specified IP address and port. Send Trap2 PDUs with different levels of security.
6-15
SNMP Administration SNMP support Send Trap2 PDUs with different user names.
Set the following parameters: Parameter Specifies Name Active-Enabled Unique name for the profile, up to 16 characters. Whether the profile is used to generate notifications. Yes specifies that the profile is used to generate notifications. No (the default) specifies that it is not used to generate notifications. Value that links the SNMPv3-Notification profile with the Trap profile specifying the host address to which notification messages are sent. You can specify up to 255 characters. The default is null. Not currently implemented.
Tag
Type
6-16
Set the following parameters: Parameter Specifies Name Active-Enabled Unique name for the profile, up to 16 characters. The default is null. Whether the profile is used to generate notifications. Yes specifies that the profile is used to generate notifications. No (the default) specifies that it is not used to generate notifications. Message-processing model to use when generating SNMP messages. V1 (the default) specifies SNMP version 1. V3 specifies SNMP version 3. For SNMPv3 Notifications support, specify V3. Security model to use when generating SNMP messages. V1 (the default) specifies the SNMP version 1 security model. V3-USM specifies the SNMP version 3 User-based Security Model (USM). For SNMPv3 Notifications support, specify V3-USM. You can specify V1 only when you have also set Msg-Proc-Model to V1. You can specify V3-USM only when you set Msg-Proc-Model to V3. When Security-Model is set to V3-USM, you must configure an SNMPv3-USM-User profile with the name specified for the Security-Name parameter for the SNMPv3-Target-Param profile to have any effect. Security-Name Security name that identifies the user on whose behalf SNMPv3 USM messages are generated. You can specify up to 22 characters. The default is null. Security-Name applies only if Security-Model is set to V3-USM. Security-Level Level of security to use when generating messages. None (the default) specifies no authentication and no privacy. Auth-NoPriv specifies authentication and no privacy. Auth-Priv specifies authentication and privacy. For Auth-Priv to apply, you must set the Priv-Protocol and Priv-Password parameters in the SNMPv3-USM-User profile.
Msg-Proc-Model
Security-Model
6-17
Set the following parameters: Parameter Specifies Active-Enabled Whether traps are sent to the host specified by the profile. Yes (the default) specifies that traps are sent. No specifies that traps are not sent. IP address to which traps are sent. The default is 0.0.0.0. Port to which traps are sent. Specify a number from 1 to 65535. The default is 162. Not currently implemented. Not currently implemented. List of the Tag value(s) in each SNMPv3-Notification profile.
Target-Params-Name Value of the Name parameter in the SNMPv3-Target-Param profile, up to 22 characters. For further information on these SNMPv3 Notifications parameters see the APX 8000/MAX TNT Reference.
Parameter references
This section contains complete descriptions of each new parameter you use to configure SNMPv3 Notifications. The descriptions are arranged in alphabetical order. Parameter Active-Enabled Specifies Description: In an SNMPv3-Notifications or SNMPv3-Target-Param profile, specifies whether the profile is used to generate notifications. In a Trap profile, specifies whether traps are sent to the host specified by the profile. Usage: Specify Yes or No. Yes specifies that the profile is used to generate notifications or that traps are sent. No (the default) specifies that the profile is not used to generate notifications or that traps are not sent.
Example: set active-enabled = yes Host-Port Description: Specifies the port to which traps are sent. Usage: Specify a number from 1 to 65535. The default is 162. Example: set host-port = 20
6-18
Parameter Msg-Proc-Model
Specifies Description: Specifies the message-processing model to use when generating SNMP messages. Usage: Specify one of the following values: V1 (the default) specifies SNMP version 1. V3 specifies SNMP version 3. For SNMPv3 Notifications support, specify V3.
Example: set msg-proc-model = v3 Notify-Tag-List Description: Specifies the tag list indicated by the Tag parameter value in each SNMPv3-Notification profile. Usage: Specify the Tag value(s) you indicated in one or more SNMPv3-Notification profiles. Example: set notify-tag-list = default1 Security-Level Description: Specifies the level of security to use when generating messages. Usage: Specify one of the following settings: None (the default) specifies no authentication and no privacy. Auth-NoPriv specifies authentication and no privacy. Auth-Priv specifies authentication and privacy.
Example: set security-level = auth-priv Security-Model Description: Specifies the security model to use when generating SNMP messages. Usage: Specify one of the following values: V1 (the default) specifies the SNMP version 1 security model. V3-USM specifies the SNMP version 3 User-Based Security Model (USM). For SNMPv3 Notifications support, specify V3-USM.
Example: set security-model = v3-usm Security-Name Description: Specifies a security name that identifies the user on whose behalf SNMPv3 USM messages are generated. Usage: Specify up to 22 characters. The default is null. Example: set security-name = newuser Tag Description: Specifies a value that links the SNMPv3-Notification profile with the Trap profile specifying the host address to which notification messages are sent. Usage: Specify up to 255 characters. The default is null. Example: set tag = newtag
6-19
Parameter
Specifies
Target-Params-Name Description: Specifies the value indicated by the Name setting in the SNMPv3-Target-Param profile. Usage: Specify up to 22 characters. Example: set target-params-name = profile1
Changes to MIBs
The following sections describe changes to SNMP.
New MIBs
Two new MIBs are defined in the files rfc2573_1.mib and rfc2573_2.mib:
snmpTargetMIB MODULE-IDENTITY ORGANIZATION "IETF SNMPv3 Working Group" DESCRIPTION "This MIB module defines MIB objects which provide mechanisms to remotely configure the parameters used by an SNMP entity for the generation of SNMP messages." REVISION "9808040000Z" DESCRIPTION "Clarifications, published as RFC2573." REVISION "9707140000Z" DESCRIPTION "The initial revision, published as RFC2273." ::= { snmpModules 12 }
snmpNotificationMIB MODULE-IDENTITY ORGANIZATION "IETF SNMPv3 Working Group" DESCRIPTION "This MIB module defines MIB objects which provide mechanisms to remotely configure the parameters used by an SNMP entity for the generation of notifications." REVISION "9808040000Z" DESCRIPTION "Clarifications, published as RFC2573" REVISION "9707140000Z" DESCRIPTION "The initial revision, published as RFC2273." ::= { snmpModules 13 }
snmpTargetAddrTable contains:
6-20
snmpTargetParamsTable contains:
snmpTargetParamsName snmpTargetParamsMPModel snmpTargetParamsSecurityModel snmpTargetParamsSecurityName snmpTargetParamsSecurityLevel snmpTargetParamsStorageType snmpTargetParamsRowStatus
A PDU is encrypted as specified in the corresponding profile SNMPv3-Target-Param. But if the security name specified in the profile does not have a corresponding USM user name in the system, outgoing PDUs are discarded and a log message with level LOG_LEVEL_WARNING generated.
6-21
6-22
SNMP Administration SNMP support identifies nine possible line usages and 24 B channel states, yielding a total of 216 new variables that represent the sum of all B channels in a given state for a given line usage.
The callActiveTable in the Ascend Call MIB includes the following new fields: Field name callActiveCalledParyID callActiveCallingPartyID callActiveMultiLinkID Reports Called party number (if available). Calling party number (if available). For outgoing calls, this field is set to null. MP+ bundle ID for MP+ calls. For a non-MP+ call, this field is set to 0 (zero).
6-23
The T3 card has a new interface in the ifTable with the following values: ifDescrChannelize T3 Slot slot /item ifTypeds3(30) ifspeed44736000 ifNameds3 shelf-slot-item ifHighSpeed45 ifLinkUpDownTrapEnableenabled(1) ifConnectorPresenttrue(1)
Note: To get these interface entries into the ifTable, enter the slot -r command to restart the T3 card and then initialize the slot again. A link up/down trap is generated for the T3 line whenever the DS3 interface goes up or down.
6-24
SNMP Administration SNMP support definition of the eventUserIPAddress object in the event MIB has been modified as follows:
eventUserIPAddress OBJECT-TYPE SYNTAX IpAddress ACCESS read-only STATUS mandatory DESCRIPTION "IP address of the remote user or login host. Applicable only if eventType is serviceChanged(4) nameChanged(5) or callCleared. Value of a TCP-Clear login host IP address is returned once a TCP-Clear connection was successfully connected earlier in a serviceChanged event. The value 0.0.0.0 is returned if address is unknown or if not applicable." ::= { eventEntry 13 }
Syslog messages
When a TCP-Clear session is terminated, the login hosts IP address is displayed instead of the zero address (0.0.0.0) in the Syslog message. For example:
[3/7/2/0] STOP: johnfan; cause 11.; progress 43.; host 10.1.1.1 [MBID 2] [johnfan]
Note: If the TCP-Clear connection fails (if the login attempt has not been successfully established between the TAOS unit and any of the specified login hosts), the Userstat command shows the zero address in the Address field.
6-25
SNMP Administration SNMP support The flashOperationTftpPort object is defined in the Flash MIB and used in the load-config, save-config, and tftp-load Flash MIB operations. The objects default setting is 69, which is the default port for TFTP operations. The object is defined as follows in the Flash MIB:
flashOperationTftpPort OBJECT-TYPE SYNTAX INTEGER ACCESS read-write STATUS mandatory DESCRIPTION "This object defines the port # to use on the remote system when starting a TFTP operation using a flashOperationCommand. The default port is 69/(tcp/udp) Trivial File Transfer." ::= { flashOperation 8 }
6-26
The following portions of the MIB are implemented in TAOS 9.0 as read-only:
l2tpConfig: -l2pAdminState l2tpStats: - l2tpProtocolVersion - l2tpVendorName - l2tpFirmwareRevision l2tpDomainStatsTable: - l2tpDomainStatsIdentifier - l2tpDomainStatsTotalTunnels - l2tpDomainStatsFailedTunnels - l2tpDomainStatsFailedAuthentications - l2tpDomainStatsActiveTunnels - l2tpDomainStatsTotalSessions - l2tpDomainStatsFailedSessions - l2tpDomainStatsActiveSessions
6-27
SNMP Administration SNMP support The remaining counters are currently returned as zero:
l2tpTunnelStatsTable: - l2tpTunnelStatsIfIndex - l2tpTunnelStatsLocalTID - l2tpTunnelStatsRemoteTID - l2tpTunnelStatsState - l2tpTunnelStatsInitiated - l2tpTunnelStatsRemoteHostName - l2tpTunnelStatsRemoteVendorName - l2tpTunnelStatsRemoteFirmwareRevision - l2tpTunnelStatsRemoteProtocolVersion - l2tpTunnelStatsInitialRemoteRWS - l2tpTunnelStatsBearerCapabilities - l2tpTunnelStatsFramingCapabilities - l2tpTunnelStatsTotalSessions - l2tpTunnelStatsActiveSessions l2tpSessionStatsTable: - l2tpSessionStatsTunnelIfIndex - l2tpSessionStatsLocalCID - l2tpSessionStatsRemoteCID - l2tpSessionStatsUserName - l2tpSessionStatsState - l2tpSessionStatsCallType - l2tpSessionStatsCallSerialNumber - l2tpSessionStatsTxConnectSpeed - l2tpSessionStatsRxConnectSpeed - l2tpSessionStatsCallBearerType - l2tpSessionStatsFramingType - l2tpSessionStatsDNIS (*) - l2tpSessionStatsCLID (*) - l2tpSessionStatsSubAddress (*) - l2tpSessionStatsPrivateGroupID (**) - l2tpSessionStatsProxyLcp - l2tpSessionStatsAuthMethod - l2tpSessionStatsSequencingState (*) LNS only
6-28
Supported tables
TAOS units support the following tables in the Remote Ping MIB: Ping Control Table (pingCtlTable) Ping Results Table (pingResultsTable)
Supported traps
TAOS units support the following traps (event notifications) in the Remote Ping MIB: pingProbeFailed. Generated when a probe failure is detected. pingTestFailed. Generated when a Ping test fails. pingTestCompleted. Generated at the completion of a Ping test.
Currently, you cannot modify the following variables, so they have been changed to read-only: pingMaxConcurrentRequests pingCtlDataFill pingCtlMaxRows pingCtlStorageType pingCtlType pingCtlIfIndex pingCtlByPassRouteTable
The pingProbeHistoryTable in the Remote Ping MIB is not supported in TAOS 9.0.
6-29
The following object has been added to the Ascend Enterprise MIB (ascend.mib):
resourcesGroup OBJECT IDENTIFIER ::= { ascend 27 }
6-30
SNMP Administration Configuring SNMP access and security such conflicts much less likely. The MIB files distributed with the TAOS units ensure that SNMP managers begin using the newer dictionaries that will be maintained across future upgrades.
6-31
SNMP Administration Configuring SNMP access and security Table 6-2. SNMP profile configuration tasks (continued) Task Setting up and enforcing address security Description If the enforce-address-security parameter is set to No (its default value), any SNMP manager that presents the right community name will be allowed access. If it is set to Yes, the TAOS unit checks the source IP address of the SNMP manager and allows access only to those IP addresses listed in the read-access-host and write-access-host arrays. Each array can include up to five host addresses. The contact and location fields are SNMP readable and settable, and should indicate the person to contact about this unit, and its location. The default queue depth for SNMP requests is zero, which means the packets will not be dropped, no matter how busy the SNMP subsystem gets. If the queue were to grow too large in an extremely loaded routing environment, the system could ultimately run out of memory. Valid values for the queue depth are 01024.
Specifying who to contact about problems and the location of the unit Specifying a queue depth
6-32
Reference descriptions
Following are the descriptions for the Read-Access-Hosts and Write-Access-Hosts parameters in the SNMP profile. For further information on Read and Write Host Permissions see the APX 8000/MAX TNT Reference. Parameter Read-Access-Hosts Specifies An array containing up to eight IP addresses of SNMP managers that have Read permission. If Enforce-Address-Security is set to Yes, the TAOS unit responds to SNMP Get and Get-Next commands only from the SNMP managers you specify in the array. You must set the Enforce-Address-Security parameter to Yes in the SNMP profile for the Read-Access-Hosts setting to have any effect. Write-Access-Hosts An array specifying up to eight IP addresses of SNMP managers with Write permission. The TAOS unit responds to SNMP Set, Get, and Get-Next commands from only the SNMP managers you specify. For the Write-Access-Hosts setting to restrict read-write access to the TAOS unit, you must set the Enforce-Address-Security parameter to Yes in the SNMP profile.
6-33
SNMP Administration Setting up SNMP traps For details on the actual events that generate traps in the various classes, see the Ascend Enterprise MIB, or see the APX 8000/MAX TNT Reference.
In addition, the TAOS unit does not support billing features that include these traps: portUseExceeded systemUseExceeded
6-34
Parameter
Specifies
Slot-Card-Reset-Enabled An SNMP user can view the Fatal Log table, and the TAOS unit can inform the user of a reason for a restart when one is available. The following SNMP elements have been introduced to support this feature: The fatalLogTable object The slotCardResetTrap trap
A new slotCardResetTrap trap has been defined to inform the MIB manager that a slot card has been reset:
slotCardResetTrap TRAP-TYPE ENTERPRISE ascend VARIABLES { fatalLogIndex, fatalLogReason, sysAbsoluteCurrentTime, slotIndex } DESCRIPTION "This trap is sent to all managers having the alarm condition enabled"
Coldstart-Enabled
The system generates a trap when the TAOS unit reinitializes itself such that the configuration of the SNMP manager or the system itself might be altered. The system generates a trap when the TAOS unit reinitializes itself such that neither the configuration of SNMP manager or the system itself is altered. The system generates a trap when a failure occurs in a communication link between the unit and the SNMP manager. The system generates a trap when the communication link between the unit and the SNMP manager comes back up. (Also known as the Ascend Enterprise trap.) When both this parameter and Port-Enabled are set to Yes, a trap is generated to indicate a change of state in a host interface. All port connections are monitored in a state machine and reported via this trap.
Warmstart-Enabled
6-35
Parameter Call-Log-Dropped-PktEnabled
Specifies If enabled (the default), the system generates a trap when the value of the callLoggingDroppedPacketCount variable in the call-logging MIB is changed from 0 to 1 (which indicates that packets are being dropped) or from 1 to 0 (which indicates that packets are no longer being dropped). SNMP management stations can obtain the value of the variable at any time by using SNMP Get. The system generates a trap when the console has changed state. The console entry can be read to see what its current state is. The SNMP agent on the TAOS sends the consoles IP address in addition to the console index in the Console-State-Change trap. The Console-State-Change trap carries the information displayed in the following example:
1999-07-02 12:07:26 eng-fast-4.ascend.com [192.168.25.4] enterprises.529: Enterprise Specific Trap (12)Uptime:0:16:43 enterprises.529.8.2.1.1.2=2 enterprises.529.12.2.1.4.2=IpAddress:10.40.40.133
Console-Enabled Console-State-Change
Config-Change-Enabled
Enables or disables the configuration-change trap (Trap 30). The trap is enabled by default, which causes the system to issue the trap whenever the system configuration is modified or a new software version is loaded. If the parameter is set to no, the system does not issue the trap for those events. An SNMP management station can receive a Trap (30) and a string containing the date, time, and information about the user that changed the configuration. For an OSPF trap to be generated when the trap condition occurs, OSPF traps must be enabled, either in the Trap profile or by setting the corresponding bit in the new MIB object, ospfSetTrap, defined in RFC 1850. The system generates a trap when a specific port has exceeded the number of DS0 minutes allocated to it, or the system DS0 usage has been exceeded. When both this parameter and Security-Enabled are set to Yes, all failed Telnet login attempts generate a trap. If both this parameter and Alarm-Enabled are set to Yes, a trap is sent whenever a DLCI is brought up. If both this parameter and Alarm-Enabled are set to Yes, a trap is sent whenever a DLCI is brought down.
OSPF-Set-Trap-Enabled
Use-Exceeded-Enabled
Event-Overwrite-Enabled The system generates a trap when a new event has overwritten an unread event. This trap is sent only for systems which support the Ascend accounting MIB. Once sent, additional overwrites will not cause another trap to be sent until at least one table's worth of new events have occurred. RADIUS-ChangeEnabled The system generates a trap when a new RADIUS server is being accessed. This trap returns the objectID and IP address of the new server.
6-36
Parameter
Specifies
Suspect-Access-Resource Description: Specifies that whenever a terminating modem has received four successive calls for which it cannot establish a -Enabled connection, the unit sends a trap to all SNMP managers in the alarm group. Once the managing TAOS unit sends the trap, the suspect modem is not assigned to terminate calls until all available resources are exhausted. For example, if a modem drops five calls, the system generates the trap and places the offending modem at the end of the list of available terminating resources. Usage: Specify one of the following values: yes directs the TAOS to send the suspectAccessResource trap when a terminating modem card has received four or more calls for which it could not establish a connection. no instructs the TAOS not to send the suspectAccessResource trap.
Example: set suspect-access-resource-enabled = yes Dependencies: The Suspect-Access-Resource-Enabled parameter has an effect only on TAOS units with one or more of the following slot cards installed: Series56 II, and Series56 III Digital Modem MultiDSP
Location: Trap Mcast-Monitor-Enabled The system generates a trap when multicast heartbeat monitoring is configured and the system did not receive the configured number of heart-beat packets on a multicast interface. The system generates a trap when a digital modem is moved to the suspect list. The system generates a trap when a T-Online call comes in and no answer/subaddress has been received. The system generates a trap when a Slot-State profile is created due to slot insertion, or the current-state transitions into Oper-State-Down, Oper-State-Up, Oper-State-Dump, or Oper-State-None states. The system generates a trap when a power supply module is added or removed. The system generates a trap when an authentication failure occurs.
Power-Supply-Enabled Authentication-Enabled
6-37
SNMP Administration Setting up SNMP traps exclude SNMP access from host addresses other than those you have specified. Address security is optional but recommended. Following are the relevant parameters, shown with default settings:
[in SNMP] enabled = no read-community = public read-write-enabled = no read-write-community = write enforce-address-security = no read-access-hosts 1 = 0.0.0.0 read-access-hosts 2 = 0.0.0.0 read-access-hosts 3 = 0.0.0.0 read-access-hosts 4 = 0.0.0.0 read-access-hosts 5 = 0.0.0.0 read-access-hosts 6 = 0.0.0.0 read-access-hosts 7 = 0.0.0.0 read-access-hosts 8 = 0.0.0.0 write-access-hosts 1 = 0.0.0.0 write-access-hosts 2 = 0.0.0.0 write-access-hosts 3 = 0.0.0.0 write-access-hosts 4 = 0.0.0.0 write-access-hosts 5 = 0.0.0.0 write-access-hosts 6 = 0.0.0.0 write-access-hosts 7 = 0.0.0.0 write-access-hosts 8 = 0.0.0.0 contact = "" location = "" queue-depth = 0 csm-modem-diag = no snmp-message-type = v1-and-v3 security-level = none
For details about these parameters, see the APX 8000/MAX TNT Reference.
6-38
6-39
lan-modem-enabled = yes slot-profile-change-enabled = yes power-supply-enabled = yes authentication-enabled = yes config-change-enabled = yes sys-clock-drift-enabled = yes suspect-access-resource-enabled = yes watchdog-warning-enabled = yes controller-switchover-enabled = no call-log-serv-change-enabled = yes wan-line-state-change-enabled = yes call-log-dropped-pkt-enabled = yes lim-sparing-enabled = no interface-sparing-enabled = no secondary-controller-state-change-enabled = no pctfi-trunk-status-change-enabled = yes no-resource-available-enabled = yes dsl-thresh-trap-enabled = no atm-pvc-failure-trap-enabled = no
For details about these parameters, see the APX 8000/MAX TNT Reference.
If the host address is zero and a name service such as the Domain Name System (DNS) or Network Information Service (NIS) is supported, you can specify the hostname instead. The system uses the name to look up the host address.
Trap classes
Traps are grouped into classes: alarm events, security events, and port or slot state change events. These classes allow for enabling or disabling sets of traps. When a trap class is enabled, you can enable or disable individual traps within the class. Note: Enabling an individual trap has no effect if the trap class to which it belongs is not enabled.
6-40
SNMP Administration Setting up SNMP traps If the alarm-enabled parameter is set to no, the unit does not send any of the traps listed in Table 6-3. Table 6-3. Traps in the alarm class Trap
ColdStart WarmStart LinkDown LinkUp FRLinkUp FRLinkDown EventOverwrite LanModem PowerSupply ConfigChange SysClockDrifted SuspectAccessResrc WatchdogWarning Controllerswitchover WanLineStateChange CallLogDroppedPkt limSparing interfaceSparing CntrReduAvail NoResourceAvailable dslThreshTrap atmPvcFailureEnabled slotCardReset* sysLastRestartReason* AdslInitFailureTrap*
You cannot disable these traps individually. They are always sent when the corresponding event occurs and alarm class traps are enabled.
6-41
If the security-enabled parameter is set to no, the unit does not send any of the traps listed in Table 6-4. Table 6-4. Traps in the security class Trap
Authentication Console UseExceeded Password RadiusChange CallLogServChange
If the port-enabled parameter is set to no, the unit does not send the trap listed in Table 6-5. Table 6-5. Trap in the port class Trap
Ascend
If the slot-enabled parameter is set to no, the unit does not send the trap listed in Table 6-6.
6-42
6-43
Parameter OSPF-enabled
Specifies Enable/disable generation of OSPF traps. When set to no (the default), no OSPF traps are generated regardless of individual OSPF trap settings in the profile. When set to yes, trap generation depends on whether the specific OSPF trap is enabled. Enable/disable trap generation if a packet has been received on a nonvirtual interface from a router whose configuration conflicts with this router s configuration. The system generates this trap when it detects configuration error types from 1 to 9, as defined in RFC 1850. Generation of the trap typically indicates a failure to form an adjacency, although this is not always the case. Traps for error type 10 (optionsMismatch) are not currently supported. (OSPF Trap 4) Enable/disable trap generation if a packet has been received on a nonvirtual interface from a router whose authentication key or authentication type conflicts with this router s authentication key or authentication type. (OSPF Trap 6) Enable/disable trap generation if the state of a nonvirtual OSPF interface has changed. This trap is generated when the interface state regresses (for example, goes from Dr to Down) or progresses to a terminal state (Point-to-Point, DR Other, Dr, or Backup). (OSPF Trap 16) Enable/disable trap generation if an OSPF packet has been received on a nonvirtual interface that cannot be parsed. (OSPF Trap 8) Enable/disable trap generation if an OSPF packet has been retransmitted on a nonvirtual interface. All packets that are retransmitted are associated with a link-state database (LSDB) entry. The LS type, LS ID, and Router ID are used to identify the LSDB entry. (OSPF Trap 10) Enable/disable trap generation if the state of a nonvirtual OSPF neighbor has changed. This trap is generated when the neighbor state regresses (for example, changes from Attempt or Full to 1-Way or Down) or progresses to a terminal state (for example, 2-Way or Full). When an neighbor transitions from or to Full on nonbroadcast multiaccess (NBMA) and broadcast networks, the trap is generated by the designated router. A designated router transitioning to Down is noted by OSPFIfStateChange. (OSPF Trap 2)
OSPF-if-config-errorenabled
OSPF-if-auth-failureenabled
OSPF-if-state-changeenabled
OSPF-if-rx-bad-packet
OSPF-tx-retransmitenabled
OSPF-nbr-state-changeenabled
6-44
Parameter
Specifies
OSPF-virt-if-config-error Enable/disable trap generation if a packet has been received on a -enabled virtual interface from a router whose configuration parameters conflict with this router s configuration parameters. The system generates this trap when it detects configuration error types from 1 to 9, as defined in RFC 1850. Generation of the trap typically indicates a failure to form an adjacency, although this is not always the case. Traps for error type 10 (optionsMismatch) are not currently supported. (OSPF Trap 5) OSPF-virt-if-auth-failure- Enable/disable trap generation if a packet has been received on a enabled virtual interface from a router whose authentication key or authentication type conflicts with this router s authentication key or authentication type. (OSPF Trap 7) OSPF-virt-if-state-change Enable/disable trap generation if the state of an OSPF virtual -enabled interface has changed. (OSPF Trap 1) OSPF-virt-if-rx-badpacket OSPF-virt-if-txretransmit-enabled Enable/disable trap generation if an OSPF packet has been received on a virtual interface that cannot be parsed. (OSPF Trap 9) Enable/disable trap generation if an OSPF packet has been retransmitted on a virtual interface. All packets that are retransmitted are associated with an LSDB entry. The LS type, LS ID, and Router ID are used to identify the LSDB entry. (OSPF Trap 11) Enable/disable trap generation if the state of an OSPF virtual neighbor has changed. (OSPF Trap 3) Enable/disable trap generation if a new LSA has been originated by this router due to a topology change. (OSPF Trap 12) Enable/disable trap generation if an LSA in the router s link-state database has aged to MaxAge. (OSPF Trap 13) Enable/disable trap generation if the number of LSAs in the router s link-state database has exceeded OSPFExtLsdbLimit. (OSPF Trap 14) Enable/disable trap generation if the number of LSAs in the router s link-state database has exceeded 90 percent of OSPFExtLsdbLimit. (OSPF Trap 15)
6-45
This object defaults initially to the octet string {\0x0, 0x0, 0x0, 0x0} (or the hex value 0x0), which disables all trap events. The value of this object is stored in NVRAM.
6-46
SNMP Administration Setting up SNMP traps Table 6-7. SNMP trap configuration tasks (continued) Task The community string for communicating with the SNMP manager Classes of traps to be sent to the specified host Description The community name field must contain the community name associated with the SNMP PDU. Associated parameters Community-Name
The next three fields specify whether the TAOS unit traps alarm events, security events, and port events and sends a trap-PDU to the SNMP manager. For a description of the events that generate these traps, see the APX 8000/MAX TNT Reference. In addition to enabling whole classes of traps, you can specify individual SNMP traps to forward to an SNMP manager. Individual traps are enabled by default.
Slot-Enabled Coldstart-Enabled Warmstart-Enabled Linkdown-Enabled Linkup-Enabled Ascend-Enabled Console-Enabled Use-Exceeded-Enabled Password-Enabled FR-Linkup-Enabled FR-Linkdown-Enabled Event-Overwrite-Enabled RADIUS-Change-Enabled Mcast-Monitor-Enabled LAN-Modem-Enabled Dirdo-Enabled Slot-Profile-Change-Enabled Power-Supply-Enabled Multishelf-Enabled Authentication-Enabled
6-47
admin> set community-name = Ascend admin> set host-address = 10.2.3.4 admin> set security-enabled = yes admin> set slot-enabled = yes admin> write TRAP/security-traps written
Because security traps and the Password-Enabled and Authentication-Enabled individual traps are enabled, two traps are sent when either of the related conditions occur. The individual trap provides additional information about the specific event that triggered the trap.
6-48
8 9 .. ..
{ 1 1 7 } { 1 1 8 }
1 1
To bring an SNMP interface up or down, use the If-Admin command with the -d option, and specify the interface number. For example: admin> if-admin -d 2 interface 2 state change forced To bring a downed device back up, use the If-Admin command with the -u option, and specify the interface number. For example: admin> if-admin -u 2 interface 2 state change forced
6-49
products (1)
The products group is defined as: products ::= { enterprise ascend1 } with this value: 1.3.6.1.4.1.529.1 It contains the following objects:
multiband (1) max (2) pipeline (3) max-tnt (4)
slots (2)
The slots group is defined as: slots ::= { enterprise ascend 2 } with this value: 1.3.6.1.4.1.529.2 It contains the following objects:
6-50
slotNumber(1) slotTable(2) slotEntry (1) slotIndex (1) slotName (2) slotType (3) slotFixed (4) slotItems (5) slotSpecific (6) slotSerialNumber (7) slotStatus (8) slotLastChange (9) slotItemTable (3) slotItemEntry (1) slotItemSlotIndex (1) slotItemIndex (2) slotItemFirstIf (3) slotItemIfCount (4) slotItemSpecific (5) slotItemStatus (6) slotIfTable (4) slotifEntry (1) slotSlotIfIndex (1)
hostTypes (3)
The hostTypes group is defined as: hostTypes ::= { enterprise ascend 3 } with this value: 1.3.6.1.4.1.529.3 It contains the following objects:
hostTypeAny (1) hostTypeDual (2) hostTypeQuad (3) hostTypeAim2 (4) hostTypeAim6 (5)
advancedAgent (4)
The advancedAgent group is defined as: advancedAgent ::= { enterprise ascend 4 } with this value: 1.3.6.1.4.1.529.1 It contains the following objects:
6-51
wanUseTrunkGroups(20) wanLineTable (21) wanLineEntry (1) wanLineIfIndex (1) wanLineName (2) wanLineType (3) wanLineChannels (4) wanLineState (5) wanLineStateString (6) wanLineActiveChannels (7) wanLineUsage (8) wanLineHuntGrpPhoneNumber1 (9) wanLineHuntGrpPhoneNumber2 (10) wanLineHuntGrpPhoneNumber3 (11) wanLineAvailableChannels (12) wanLineSwitchedChannels (13) wanLineDisabledChannels (14) wanLineNailedChannels (15) wanLineOutOfServiceChannels (16) wanLineChannelTable(22) wanLineChannelEntry (1) wanLineChannelIfIndex (1) wanLineChannelIndex (2) wanLineChannelState (3) wanLineChannelStateString (4) wanLineChannelErrorCount (5) wanLineChannelUsage (6) wanLineChannelTrunkGroup (7) wanLineChannelPhoneNumber (8) wanLineChannelSlot (9) wanLineChannelPort (10) wanLineChannelNailedState (11) wanAvailableChannels (23) wanSwitchedChannels (24)
lanTypes (5)
The lanTypes group is defined as: products ::= { enterprise ascend 5} with this value: 1.3.6.1.4.1.529.5 The Ascend MIB lanTypes group contains the following objects:
lanTypeAny (1) lanTypeEthernet (2) lanTypeEtherData (3)
doGroup (6)
The doGroup is defined as: products ::= { enterprise ascend 6 } with this value: 1.3.6.1.4.1.529.6 The Ascend MIB doGroup contains the following objects:
6-52
doTable (1) doEntry (1) doSlotIndex (1) doItemIndex (2) doDial (3) doHangUp (4) doAnswer (5) doExtendBW (6) doContractBW (7) doBegEndRemoteLB (8)
hostStatus (7)
The hostStatus group is defined as: hostStatus ::= { enterprise ascend 7 } with this value: 1.3.6.1.4.1.529.7 It contains the following objects:
hostStatusTable (1) hostStatusEntry (1) hostStatusSlotIndex (1) hostStatusItemIndex (2) hostStatusLocalName (3) hostStatusDialNum (4) hostStatusCallType (5) hostStatusCallMgm (6) hostStatusDataSvc (7) hostStatusCallState (8) hostStatusRemName (9) hostStatusChannels (10)
console (8)
The console group is defined as: console ::= { enterprise ascend 8 } with this value: 1.3.6.1.4.1.529.8 It contains the following objects:
consoleNumber (1) consoleTable (2) consoleEntry (1) consoleIndex (1) consoleIf (2) consoleType (3) consoleSecurity (4) consoleSpecific (5)
systemStatusGroup (9)
The systemStatusGroup is defined as: systemStatusGroup ::= { enterprise ascend 9 } with this value: 1.3.6.1.4.1.529.9
6-53
eventGroup (10)
The eventGroup is defined as: eventGroup ::= { enterprise ascend 10 } with this value: 1.3.6.1.4.1.529.10
6-54
callStatusGroup (11)
The callStatusGroup is defined as: callStatusGroup ::= { enterprise ascend 11 } with this value: 1.3.6.1.4.1.529.11
6-55
sessionStatusGroup (12)
The sessionStatusGroup is defined as: sessionStatusGroup ::= { enterprise ascend 12 } with this value: 1.3.6.1.4.1.529.12 It contains the following objects:
ssnStatusMaximumSessions (1) sessionStatusTable (2) sessionStatusEntry (1) ssnStatusIndex (1) ssnStatusValidFlag (2) ssnStatusUserName (3) ssnStatusUserIPAddress (4) ssnStatusUserSubnetMask (5) ssnStatusCurrentService (6) ssnStatusCallReferenceNum (7) sessionActiveTable (3) sessionActiveEntry (1) ssnActiveCallReferenceNum (1) ssnActiveIndex (2) ssnActiveValidFlag (3) ssnActiveUserName (4) ssnActiveUserIPAddress (5) ssnActiveUserSubnetMask (6) ssnActiveCurrentService (7) mppActiveStatsTable (4) mppActiveStatsEntry (1) mppStatsMpID (1) mppStatsRemoteName (2) mppStatsQuality (3)
6-56
radiusGroup (13)
The radiusGroup is defined as: radiusGroup ::= { enterprise ascend 13 } with this value: 1.3.6.1.4.1.529.13 It contains the following objects:
radiusNumAuthServers (1) radiusNumAcctServers (2) radiusAuthStatsTable (3) radiusAuthStatsEntry (1) radAuthServerIndex (1) radAuthLoginRqstSent (2) radAuthOtherRqstSent (3) radAuthRqstTimedOut (4) radAuthOtherRqstTimedOut (5) radAuthRspRcvd (6) radAuthOtherRspRcvd (7) radAuthUnexpRspRcvd (8) radAuthBadRspRcvd (9) radAuthAckRspRcvd (10) radAuthHostIPAddress (11) radAuthCurrentServerFlag (12) radiusAcctStatsTable (4) radiusAcctStatsEntry (1) radAcctServerIndex (1) radAcctRqstSent (2) radAcctRqstTimedOut (3) radAcctRspRcvd (4)
mCastGroup (14)
The mCastGroup is defined as: mCastGroup ::= { enterprise ascend 14 } with this value: 1.3.6.1.4.1.529.14 It contains the following objects:
eartBeatMulticastGroupAddress 1) eartBeatSourceAddress (2) eartBeatSlotTimeInterval (3) eartBeatSlotCount (4)
6-57
lanModemGroup (15)
The lanModemGroup is defined as: lanModemGroup ::= { enterprise ascend 15 } with this value: 1.3.6.1.4.1.529.15 It contains the following objects:
availLanModem (1) availLanModemTable (2) availLanModemEntry (1) availLanModemSlotIndex (1) availLanModemPortIndex (2) availLanModemUsedCount (3) availLanModemBadCount (4) availLanModemLast32 (5) suspectLanModem (3) suspectLanModemTable (4) suspectLanModemEntry (1) suspectLanModemSlotIndex (1) suspectLanModemPortIndex (2) suspectLanModemUsedCount (3) suspectLanModemBadCount (4) suspectLanModemLast32 (5) disabledLanModem (5) disabledLanModemTable (6) disabledLanModemEntry (1) disabledLanModemSlotIndex (1) disabledLanModemPortIndex deadLanModem (7) deadLanModemTable (8) deadLanModemEntry (1) deadLanModemSlotIndex (1) deadLanModemPortIndex (2) deadLanModemState (3) busyLanModem (9) busyLanModemTable (10) busyLanModemEntry (1) busyLanModemSlotIndex (1) busyLanModemPortIndex (2) busyLanModemUsedCount (3) busyLanModemBadCount (4) busyLanModemLast32 (5) busyDirection (6) suspectTrapState (11)
firewallGroup (16)
The firewallGroup is defined as: firewallGroup ::= { enterprise ascend 16 } with this value: 1.3.6.1.4.1.529.16 It contains the following objects:
firewallStatus (1) firewallControl (2) fwallCtrlRuleName ( 1) fwallCtrlExecute ( 2) fwallCtrlTimeOut ( 3) fwallCtrlExtAddr ( 4) fwallCtrlExtAddrMask ( 5) fwallCtrlExtPort ( 6) fwallCtrlExtPortMax ( 7) fwallCtrlIntAddr ( 8) fwallCtrlIntAddrMask ( 9) fwallCtrlIntPort ( 10) fwallCtrlIntPortMax ( 11) fwallCtrlRoutAddr ( 12)
6-58
wanDialoutPkt (17)
The wanDialoutPkt group is defined as: wanDialoutPkt ::= { enterprise ascend 17 } with this value: 1.3.6.1.4.1.529.17 It contains the following objects:
wanDialoutPktTableSize (1) wanDialoutPktMaxSize (2) wanDialoutPktCount (3) wanDialoutPktTable (4) wanDialoutPktEntry (1) wanDialoutPktIndex (1) wanDialoutPktTime (2) wanDialoutPktPhoneNumber (3)
powerSupply (18)
The powerSupply group is defined as: powerSupply ::= { enterprise ascend 18 } with this value: 1.3.6.1.4.1.529.18 It contains the following objects:
powerSupplyCount (1) powerSupplyTable (2) powerSupplyEntry (1) powerSupplyIndex (1) powerSupplyState (2) powerSupplyOperationalState (3) powerSupplyStateTrapState (3)
multiShelf (19)
The multiShelf group is defined as: multiShelf ::= { enterprise ascend 19 } with this value: 1.3.6.1.4.1.529.19 It contains the following objects:
6-59
myShelfNumber (1) myShelfOperation (2) masterShelfNumber (3) multiShelfTableSize (4) multiShelfTable (5) multiShelfTable (1) multiShelfIndex (1) multiShelfState (2) multiShelfResentFrames (3) multiShelfNLinkUp (4) multiShelfTxQs (5) multiShelfTxSeq (6) multiShelfRxSeq (7) multiShelfTimerValue (8)
miscGroup (20)
The miscGroup is defined as: miscGroup ::= { enterprise ascend 20 } with this value: 1.3.6.1.4.1.529.20 It contains the following objects:
iscGroupFRTable (1) iscGroupFREntry (1) MiscGroupFRLMIIndex (1) MiscGroupFRLMIDlci (2)
flashGroup (22)
The flashGroup is defined as: flashGroup ::= { enterprise ascend 22 } with this value: 1.3.6.1.4.1.529.22 It contains the following objects:
6-60
flashDevice (1) flashDevices (1) flashDeviceTable (2) flashDeviceEntry (1) flashDeviceIndex (1) flashDeviceController (2) flashDeviceSlot (3) flashDeviceSize (4) flashDeviceUsed (5) flashDeviceState (6) flashDeviceMaster (7) flashDeviceFormatStatus (8) flashDeviceDescription (9) flashFileTable (2) flashFileEntry (1) flashFileIndex (1) flashFileController (2) flashFileCard (3) flashFileSize (4) flashFileStatus (5) flashFileName (6) flashFileChecksum (7) flashFileVersion (8) flashFileAccess (9) flashFileDateTimeStamp (10) flashOperation (3) flashOperationStatus (1) flashOperationCommand (2) flashOperationHost (3) flashOperationDestFileName (4) flashOperationSrcFileName (5)
configuration (23)
The configuration group is defined as: configuration ::= { enterprise ascend 23 } with this value: 1.3.6.1.4.1.529.23 It contains the following objects:
mibinternetProfile (1) mibframeRelayProfile (2) mibanswerProfile (3) mibud3NetworkProfile (4) mibuds3NetworkProfile (5) mibcadslNetworkProfile (6) mibdadslNetworkProfile (7) mibsdslNetworkProfile (8)
6-61
mibinternetProfile (1)
The mibInternetProfile has the value: 1.3.6.1.4.1.529.23.1 The mibInternetProfile in the configuration group contains the following objects:
MibinternetProfileTable (1) internetProfile__session_options__call_filter(65) MibinternetProfileEntry (1) internetProfile__session_options__data_filter(66) internetProfile__station (1) internetProfile__session_options__filter_persistence(67) internetProfile__active (2) internetProfile__session_options__idle_timer(68) internetProfile__encapsulation_protocol(3) internetProfile__session_options__ts_idle_mode(69) internetProfile__called_number_type(4) internetProfile__session_options__ts_idle_timer(70) internetProfile__dial_number(5) internetProfile__session_options__backup(71) internetProfile__clid(6) internetProfile__session_options__secondary(72) internetProfile__ip_options__ip_routing_enabled(7) internetProfile__session_options__atmp_gateway(73) internetProfile__ip_options__vj_header_prediction(8) internetProfile__session_options__max_call_duration(74) internetProfile__ip_options__remote_address(9) internetProfile__session_options__vtp_gateway(75) internetProfile__ip_options__local_address(10) internetProfile__session_options__blockcountlimit(76) internetProfile__ip_options__routing_metric(11) internetProfile__session_options__blockduration(77) internetProfile__ip_options__preference(12) internetProfile__session_options__max_atmp_tunnels(78) internetProfile__ip_options__down_preference(13) internetProfile__session_options__max_vtp_tunnels(79) internetProfile__ip_options__private_route(14) internetProfile__session_options__redial_delay_limit(80) internetProfile__ip_options__multicast_allowed(15) internetProfile__session_options__ses_rate_type(81) internetProfile__ip_options__address_pool(16) internetProfile__session_options__ses_rate_mode(82) internetProfile__ip_options__ip_direct(17) internetProfile__session_options__ses_adsl_cap_up_rate(83) internetProfile__ip_options__rip(18) internetProfile__session_options__ses_adsl_cap_down_rate(84) internetProfile__ip_options__route_filter(19) internetProfile__session_options__ses_adsl_dmt_up_rate(85) internetProfile__ip_options__source_ip_check(20) internetProfile__session_options__ses_adsl_dmt_down_rate(86) internetProfile__ip_options__ospf_options__active(21) internetProfile__session_options__rx_data_rate_limit(87) internetProfile__ip_options__ospf_options__area(22) internetProfile__session_options__tx_data_rate_limit(88) internetProfile__ip_options__ospf_options__area_type(23) internetProfile__telco_options__answer_originate(89) internetProfile__ip_options__ospf_options__hello_interval(24) internetProfile__telco_options__callback(90) internetProfile__ip_options__ospf_options__dead_interval(25) internetProfile__telco_options__call_type(91) internetProfile__ip_options__ospf_options__priority(26) internetProfile__telco_options__nailed_groups(92) internetProfile__ip_options__ospf_options__authen_type(27) internetProfile__telco_options__ft1_caller(93) internetProfile__ip_options__ospf_options__auth_key(28) internetProfile__telco_options__force_56kbps(94) internetProfile__ip_options__ospf_options__key_id(29) internetProfile__telco_options__data_service(95) internetProfile__ip_options__ospf_options__cost(30) internetProfile__telco_options__call_by_call(96) internetProfile__ip_options__ospf_options__down_cost(31) internetProfile__telco_options__billing_number(97) internetProfile__ip_options__ospf_options__ase_type(32) internetProfile__telco_options__transit_number(98) internetProfile__ip_options__ospf_options__ase_tag(33) internetProfile__telco_options__expect_callback(99) internetProfile__ip_options__ospf_options__transit_delay(34) internetProfile__telco_options__dialout_allowed(100) internetProfile__ip_options__ospf_options__retransmit_interval(35)internetProfile__telco_options__delay_callback(101) internetProfile__ip_options__ospf_options__non_multicast(36) internetProfile__ppp_options__send_auth_mode(102) internetProfile__ip_options__multicast_rate_limit(37) internetProfile__ppp_options__send_password(103) internetProfile__ip_options__multicast_group_leave_delay(38) internetProfile__ppp_options__substitute_send_name(104) internetProfile__ip_options__client_dns_primary_addr(39) internetProfile__ppp_options__recv_password(105) internetProfile__ip_options__client_dns_secondary_addr(40) internetProfile__ppp_options__link_compression(106) internetProfile__ip_options__client_dns_addr_assign(41) internetProfile__ppp_options__mru(107) internetProfile__ip_options__client_default_gateway(42) internetProfile__ppp_options__lqm(108) internetProfile__ip_options__tos_options__active(43) internetProfile__ppp_options__lqm_minimum_period(109) internetProfile__ip_options__tos_options__precedence(44) internetProfile__ppp_options__lqm_maximum_period(110) internetProfile__ip_options__tos_options__type_of_service(45) internetProfile__ppp_options__cbcp_enabled(111) internetProfile__ip_options__tos_options__apply_to(46) internetProfile__ppp_options__mode_callback_control(112) internetProfile__ip_options__tos_filter(47) internetProfile__ppp_options__delay_callback_control(113) internetProfile__ipx_options__ipx_routing_enabled(48) internetProfile__ppp_options__trunk_group_callback_control(114) internetProfile__ipx_options__peer_mode(49) internetProfile__ppp_options__split_code_dot_user_enabled(115) internetProfile__ipx_options__rip(50) internetProfile__ppp_options__ppp_interface_type(116) internetProfile__ipx_options__sap(51) internetProfile__mp_options__base_channel_count(117) internetProfile__ipx_options__dial_query(52) internetProfile__mp_options__minimum_channels(118) internetProfile__ipx_options__net_number(53) internetProfile__mp_options__maximum_channels(119) internetProfile__ipx_options__net_alias(54) internetProfile__mp_options__bacp_enable(120) internetProfile__ipx_options__sap_filter(55) internetProfile__mpp_options__aux_send_password(121) internetProfile__ipx_options__ipx_spoofing(56) internetProfile__mpp_options__dynamic_algorithm(122) internetProfile__ipx_options__spoofing_timeout(57) internetProfile__mpp_options__bandwidth_monitor_direction(123) internetProfile__ipx_options__ipx_sap_hs_proxy(58) internetProfile__mpp_options__increment_channel_count(124) internetProfile__ipx_options__ipx_header_compression(59) internetProfile__mpp_options__decrement_channel_count(125) internetProfile__bridging_options__bridging_group(60) internetProfile__mpp_options__seconds_history(126) internetProfile__bridging_options__dial_on_broadcast(61) internetProfile__mpp_options__add_persistence(127) internetProfile__bridging_options__ipx_spoofing(62) internetProfile__mpp_options__sub_persistence(128) internetProfile__bridging_options__spoofing_timeout(63) internetProfile__mpp_options__target_utilization(129) internetProfile__bridging_options__bridge_type(64)
6-62
internetProfile__calledNumber(189) internetProfile__fr_options__frame_relay_profile(130) internetProfile__dhcp_options__reply_enabled(190) internetProfile__fr_options__dlci(131) internetProfile__dhcp_options__pool_number(191) internetProfile__fr_options__circuit_name(132) internetProfile__dhcp_options__maximum_leases(192) internetProfile__fr_options__fr_direct_enabled(133) internetProfile__sharedprof_options(193) internetProfile__fr_options__fr_direct_profile(134) internetProfile__t3pos_options__x25_profile(194) internetProfile__fr_options__fr_direct_dlci(135) internetProfile__tcp_clear_options__detect_end_of_packet(136) internetProfile__t3pos_options__max_calls(195) internetProfile__tcp_clear_options__end_of_packet_pattern(137) internetProfile__t3pos_options__auto_call_x121_address(196) internetProfile__t3pos_options__reverse_charge(197) internetProfile__tcp_clear_options__flush_length(138) internetProfile__t3pos_options__answer(198) internetProfile__tcp_clear_options__flush_time(139) internetProfile__t3pos_options__t3PosHostInitMode(199) internetProfile__ara_options__recv_password(140) internetProfile__t3pos_options__t3PosDteInitMode(200) internetProfile__ara_options__maximum_connect_time(141) internetProfile__t3pos_options__t3PosEnqHandling(201) internetProfile__comb_options__password_required(142) internetProfile__t3pos_options__t3PosMaxBlockSize(202) internetProfile__comb_options__interval(143) internetProfile__t3pos_options__t3PosT1(203) internetProfile__comb_options__base_channel_count(144) internetProfile__t3pos_options__t3PosT2(204) internetProfile__comb_options__compression(145) internetProfile__t3pos_options__t3PosT3(205) internetProfile__x25_options__x25_profile(146) internetProfile__t3pos_options__t3PosT4(206) internetProfile__x25_options__lcn(147) internetProfile__t3pos_options__t3PosT5(207) internetProfile__x25_options__x3_profile(148) internetProfile__t3pos_options__t3PosT6(208) internetProfile__x25_options__max_calls(149) internetProfile__t3pos_options__t3PosMethodOfHostNotif(209) internetProfile__x25_options__vc_timer_enable(150) internetProfile__t3pos_options__t3PosPidSelection(210) internetProfile__x25_options__x25EncapsType(151) internetProfile__t3pos_options__t3PosAckSuppression(211) internetProfile__x25_options__auto_call_x121_address(152) internetProfile__t3pos_options__x25_rpoa(212) internetProfile__x25_options__reverse_charge(153) internetProfile__t3pos_options__x25_cug_index(213) internetProfile__x25_options__call_mode(154) internetProfile__t3pos_options__x25_nui(214) internetProfile__x25_options__answer(155) internetProfile__t3pos_options__data_format(215) internetProfile__x25_options__inactivity_timer(156) internetProfile__t3pos_options__link_access_type(216) internetProfile__x25_options__if_mtu(157) internetProfile__framed_only(217) internetProfile__x25_options__x25_rpoa(158) internetProfile__altdial_number1(218) internetProfile__x25_options__x25_cug_index(159) internetProfile__altdial_number2(219) internetProfile__x25_options__x25_nui(160) internetProfile__altdial_number3(220) internetProfile__x25_options__pad_banner(161) internetProfile__x32_options__x32_profile(221) internetProfile__x25_options__pad_prompt(162) internetProfile__x32_options__call_mode(222) internetProfile__x25_options__pad_nui_prompt(163) internetProfile__tunnel_options__profile_type(223) internetProfile__x25_options__pad_nui_pw_prompt(164) internetProfile__tunnel_options__tunneling_protocol(224) internetProfile__x25_options__pad_alias1(165) internetProfile__tunnel_options__max_tunnels(225) internetProfile__x25_options__pad_alias2(166) internetProfile__tunnel_options__atmp_ha_rip(226) internetProfile__x25_options__pad_alias3(167) internetProfile__tunnel_options__primary_tunnel_server(227) internetProfile__x25_options__pad_diag_disp(168) internetProfile__tunnel_options__secondary_tunnel_server(228) internetProfile__x25_options__pad_default_listen(169) internetProfile__tunnel_options__udp_port(229) internetProfile__x25_options__pad_default_pw(170) internetProfile__tunnel_options__password(230) internetProfile__eu_options__dce_addr(171) internetProfile__tunnel_options__home_network_name(231) internetProfile__eu_options__dte_addr(172) internetProfile__tunnel_options__unused(232) internetProfile__eu_options__mru(173) internetProfile__pri_numbering_plan_id(233) internetProfile__x75_options__k_frames_outstanding(174) internetProfile__vrouter(234) internetProfile__x75_options__n2_retransmissions(175) internetProfile__atm_options__atm1483type(235) internetProfile__x75_options__t1_retran_timer(176) internetProfile__atm_options__vpi(236) internetProfile__x75_options__frame_length(177) internetProfile__appletalk_options__atalk_routing_enabled(178) internetProfile__atm_options__vci(237) internetProfile__appletalk_options__atalk_static_ZoneName(179) internetProfile__action__(238) internetProfile__appletalk_options__atalk_static_NetStart(180) mibinternetProfile__tcp_clear_options__portTable (2) internetProfile__tcp_clear_options__port__station (1) internetProfile__appletalk_options__atalk_static_NetEnd(181) internetProfile__tcp_clear_options__port__index__ (2) internetProfile__appletalk_options__atalk_Peer_Mode(182) internetProfile__tcp_clear_options__port (3) internetProfile__usrRad_options__acct_type(183) mibinternetProfile__tcp_clear_options__hostTable (3) internetProfile__usrRad_options__acct_host(184) internetProfile__tcp_clear_options__host__station (1) internetProfile__usrRad_options__acct_port(185) internetProfile__tcp_clear_options__host__index__ (2) internetProfile__usrRad_options__acct_key(186) internetProfile__tcp_clear_options__host (3) internetProfile__usrRad_options__acct_timeout(187) mibinternetProfile__ipx_options__ipx_sap_hs_proxy_netTable (4) internetProfile__usrRad_options__acct_id_base(188) internetProfile__ipx_options__ipx_sap_hs_proxy_net__station (1) internetProfile__ipx_options__ipx_sap_hs_proxy_net__index__ (2 internetProfile__ipx_options__ipx_sap_hs_proxy_net (3)
6-63
mibframeRelayProfile (2)
The mibframeRelayProfile has the value: 1.3.6.1.4.1.529.23.2 The mibframeRelayProfile in the configuration group contains the following objects:
mibframeRelayProfileTable (1) mibframeRelayProfileEntry (1) frameRelayProfile__fr_name (1) frameRelayProfile__active (2) frameRelayProfile__nailed_up_group (3) frameRelayProfile__nailed_mode (4) frameRelayProfile__called_number_type (5) frameRelayProfile__switched_call_type (6) frameRelayProfile__phone_number (7) frameRelayProfile__billing_number (8) frameRelayProfile__transit_number (9) frameRelayProfile__link_mgmt (10) frameRelayProfile__call_by_call_id (11) frameRelayProfile__link_type (12) frameRelayProfile__n391_val (13) frameRelayProfile__n392_val (14) frameRelayProfile__n393_val (15) frameRelayProfile__t391_val (16) frameRelayProfile__t392_val (17) frameRelayProfile__MRU (18) frameRelayProfile__dceN392_val (19) frameRelayProfile__dceN393_val (20)
mibanswerProfile (3)
The mibAnswerProfile has the value: 1.3.6.1.4.1.529.23.3
6-64
SNMP Administration Ascend MIB hierarchy The mibanswerProfile in the configuration group contains the following objects:
mibanswerProfileTable (1) mibanswerProfileEntry (1) answerProfile__index (1) answerProfile__use_answer_for_all_defaults (2) answerProfile__force_56kbps (3) answerProfile__profiles_required (4) answerProfile__clid_auth_mode (5) answerProfile__ppp_answer__enabled (6) answerProfile__ppp_answer__receive_auth_mode (7) answerProfile__ppp_answer__disconnect_on_auth_timeout (8) answerProfile__ppp_answer__bridging_group (9) answerProfile__ppp_answer__link_compression (10) answerProfile__ppp_answer__mru (11) answerProfile__ppp_answer__lqm (12) answerProfile__ppp_answer__lqm_minimum_period (13) answerProfile__ppp_answer__lqm_maximum_period (14) answerProfile__mp_answer__enabled (15) answerProfile__mp_answer__minimum_channels (16) answerProfile__mp_answer__maximum_channels (17) answerProfile__mp_answer__bacp_enable (18) answerProfile__mpp_answer__enabled (19) answerProfile__mpp_answer__dynamic_algorithm (20) answerProfile__mpp_answer__bandwidth_monitor_direction (21) answerProfile__mpp_answer__increment_channel_count (22) answerProfile__mpp_answer__decrement_channel_count (23) answerProfile__mpp_answer__seconds_history (24) answerProfile__mpp_answer__add_persistence (25) answerProfile__mpp_answer__sub_persistence (26) answerProfile__mpp_answer__target_utilization (27) answerProfile__fr_answer__enabled (28) answerProfile__tcp_clear_answer__enabled (29) answerProfile__ara_answer__enabled (30) answerProfile__v120_answer__enabled (31) answerProfile__v120_answer__frame_length (32) answerProfile__x25_answer__enabled (33) answerProfile__x25_answer__x25_profile (34) answerProfile__x25_answer__x3_profile (35) answerProfile__x25_answer__max_calls (36) answerProfile__x25_answer__vc_timer_enable (37) answerProfile__x25_answer__auto_call_x121_address (38) answerProfile__x25_answer__reverse_charge (39) answerProfile__x25_answer__x3_custom_prof (40) answerProfile__comb_answer__enabled (41) answerProfile__comb_answer__password_required (42) answerProfile__comb_answer__interval (43) answerProfile__comb_answer__compression (44) answerProfile__eu_answer__euraw_enabled (45) answerProfile__eu_answer__euui_enabled (46) answerProfile__eu_answer__dce_addr (47) answerProfile__eu_answer__dte_addr (48) answerProfile__eu_answer__mru (49) answerProfile__ip_answer__enabled (50) answerProfile__ip_answer__vj_header_prediction (51) answerProfile__ip_answer__assign_address (52) answerProfile__ip_answer__routing_metric (53) answerProfile__ipx_answer__enabled (54) answerProfile__ipx_answer__peer_mode (55) answerProfile__session_info__call_filter (56) answerProfile__session_info__data_filter (57) answerProfile__session_info__filter_persistence (58) answerProfile__session_info__idle_timer (59) answerProfile__session_info__ts_idle_mode (60) answerProfile__session_info__ts_idle_timer (61) answerProfile__session_info__max_call_duration (62) answerProfile__x75_answer__enabled (63) answerProfile__x75_answer__k_frames_outstanding (64) answerProfile__x75_answer__n2_retransmissions (65) answerProfile__x75_answer__t1_retran_timer (66) answerProfile__x75_answer__frame_length (67) answerProfile__framed_only (68) answerProfile__action (69)
mibuds3NetworkProfile (5)
The mibuds3Profile has the value: 1.3.6.1.4.1.529.23.5 The mibuds3NetworkProfile in the configuration group contains the following objects:
mibuds3NetworkProfileTable (1) mibuds3NetworkProfileEntry (1) uds3NetworkProfile__shelf (1) uds3NetworkProfile__slot (2) uds3NetworkProfile__item (3) uds3NetworkProfile__name (4) uds3NetworkProfile__physical_address__shelf (5) uds3NetworkProfile__physical_address__slot (6) uds3NetworkProfile__physical_address__item_number (7) uds3NetworkProfile__enabled (8) uds3NetworkProfile__profile_number (9) uds3NetworkProfile__line_config__trunk_group (10) uds3NetworkProfile__line_config__nailed_group (11) uds3NetworkProfile__line_config__route_port__slot_number__slot_number (12) uds3NetworkProfile__line_config__route_port__slot_number__shelf_number (13) uds3NetworkProfile__line_config__route_port__relative_port_number__relative_port_nu mber (14) uds3NetworkProfile__line_config__activation (15) uds3NetworkProfile__line_config__call_route_info__shelf (16) uds3NetworkProfile__line_config__call_route_info__slot (17) uds3NetworkProfile__line_config__call_route_info__item_number (18)
6-65
atmpGroup (24)
The atmpGroup group is defined as: atmpGroup ::= { enterprise ascend 24 } with this value: 1.3.6.1.4.1.529.24 It contains the following objects:
atmpAgentMode (1) atmpAgentType (2) atmpAgentUDPPort (3) atmpAgentGreMtu (4) atmpAgentForceFragmentation (5) atmpAgentHAIdleLimit (6) atmpLastErrorGenerated (7) atmpAgentSentErrorTo (8) atmpLastErrorRecv (9) atmpAgentRecvErrorFrom (10) atmpEnableAtmpTraps (11) atmpAgentNumberFATunnels (12) atmpAgentNumberHATunnels (13) atmpAgentNumberLocalTunnels (14) atmpAgentTunnelHighWater (15) atmpTunnelTable (16) atmpTunnelEntry (1) atmpTunnelIndex (1) atmpTunnelId (2) atmpHAIpAddress (3) atmpFAIpAddress (4) atmpTunneledProtocol (5) atmpTunnelType (6) atmpTunnelState (7) atmpMnIpAddress (8) atmpMnNetmask (9) atmpMnIpxNetAddress (10) atmpMnIpxNodeAddress (11) atmpHNProfileName (12) atmpHNMaxTunnels (13) atmpFAPrimaryHAAddress (14) atmpFASecondaryHAAddress (15) atmpFASsnStatusIndex (16) atmpFAUserName (17) atmpInPkts (18) atmpInOctets (19) atmpInErrPkts (20) atmpOutPkts (21)
6-66
How the TAOS unit creates administrative profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2 Using the Telnet Access Control List (TACL) profile . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 Using the Admin-State-Perm-If profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-4 Using the Admin-State-Phys-If profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5 Using the Device-State profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6 Using the Device-Summary profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7 Using the Slot-Info profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8 Using Slot-State profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8 Using DS3-ATM-Stat profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-9 Using T1-Stat profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10 Using UDS3-Stat profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11 The TAOS unit provides a number of profiles that either monitor administration information or enable the administrator to change the state of a slot, line, or device. (For discussion of profiles not directly related to system administration, for example, profiles related to configuring lines, connections, or calls, see the APX 8000/MAX TNT WAN, Routing, and Tunneling Configuration Guide or the hardware installation guide for your unit.) Following are the TAOS units administrative profiles: Profile Admin-State-Perm-If Admin-State-Phys-If Base Call-Info Device-State DS3-ATM-Stat Error LAN-Modem Log Description SNMP Permanent Interface Admin State SNMP Physical Interface Admin State System version and enabled features Active call information Device Operational State DS3-ATM status Fatal Error Log LAN modem disable state System event logging configuration
7-1
Using Administrative Profiles How the TAOS unit creates administrative profiles
Profile Slot-Info Slot-State Slot-Type SNMP System T1-Stat T3-Stat Timedate Trap User
Description Slot information Slot Operational State Slot Type profile SNMP profiles System-level parameters T1 and E1 line status T3 line status Current system time and date SNMP trap destinations Administrative user accounts
For information about the parameters contained within each of these profiles, see the APX 8000/MAX TNT Reference. An administrative profile uses the same set of commands as does any configuration profile in the TAOS unit. For example: admin> read t1-stat { 1 5 1} T1-STAT/{ shelf-1 slot-5 1 } read admin> list physical-address* = { shelf-1 slot-5 1 } line-state = active channel-state = [ nailed-up nailed-up nailed-up nailed-up nailed-up nailed-up n+ error-count=[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ] loss-of-carrier = False loss-of-sync = False ais-receive = False yellow-receive = False ber-receive = False carrier-established = True network-loopback = False
7-2
Using Administrative Profiles Using the Telnet Access Control List (TACL) profile associated Admin-State-Perm-If profile. These profiles store the objects desired state and SNMP interface number. At system startup, the TAOS unit reads the Admin-State profiles. If the addressed device is not present in the system and has been replaced by a device of another type, the TAOS unit deletes that profile and creates a new one, with a new SNMP interface number. The next time the system is reset or power cycles, the old devices SNMP interface number becomes available for reassignment. This means that pulling a slot card does not free up interface numbers. When you reinstall the slot card, the same interface number is assigned. Also, pulling a slot card and replacing it with a slot card of another type does not free up the old interface numbers until the next power cycle or system reset. For example, each T1 line has an Admin-State-Phys-If profile, and each of the 48 modems on a modem card has a profile. To read the Admin-State-Phys-If profile for the first T1 line in Slot 2, use the Read and List commands, as in the following example: admin>read admin-state-phys-if {1 2 1} ADMIN-STATE-PHYS-IF/{ shelf-1 slot-2 1 } read admin>list [in ADMIN-STATE-PHYS-IF/{ shelf-1 slot-2 1 }] device-address* = { shelf-1 slot-2 1 } slot-type = 8t1-card snmp-interface = 34 modem-table-index = 0 desired-state = admin-state-up desired-trap-state = trap-state-enabled
7-3
Parameter Enable-Permit
Specifies Enable/disable control over Telnet access to the unit on the basis of the Permit-List settings in the TACL profile. If set to no (the default), the Permit-List settings have no effect. If set to yes, only the IP addresses specified in the Permit-Lists are allowed to telnet into the TAOS command-line interface. Setting Enable-Permit to yes has no effect if no Permit-Lists have been specified. Enable/disable the Permit-List entry. Source IP address of a host or subnet to be allowed Telnet access to the TAOS unit. The specified subnet mask determines whether the entry is valid for a single host or a subnet. If you specify the subnet mask as part of the Source-Address value, the Source-Address-Mask value is set automatically to the corresponding dotted decimal value. The subnet mask to be applied to the Source-Address value before enabling a host Telnet access to the unit. You can set the value directly in dotted decimal format or by including a subnet as part of the Source-Address value.
Valid-Entry Source-Address
Source-Address-Mask
For example, the following commands create a TACL profile that enables Telnet access from 30 host addresses from 10.27.34.1 to 10.27.34.31:
admin> new tacl TACL read admin> set enable-permit = yes admin> set permit-list 1 valid-entry = yes admin> set permit-list 1 source-address-mask = 10.27.34.1/27 admin> list permit-list 1 [in TACL:permit-list[1] (changed)] valid-entry = yes source-address = 10.27.34.1/27 source-address-mask = 255.255.255.224 admin> write TACL written
7-4
Using Administrative Profiles Using the Admin-State-Phys-If profile The Admin-State-Perm-If profile contains the following parameters (shown here with sample values): [in ADMIN-STATE-PERM-IF/frswan1] station* = frswan1 snmp-interface = 19 desired-state = admin-state-up desired-trap-state = trap-state-enabled inet-profile-type = 1 Parameter Station SNMP-Interface Desired-State Specifies Name of a nailed profile (PPP or Frame Relay), which may be a local Connection profile or a RADIUS profile. Interface table index assigned to the nailed interface whose state is stored in this profile.The system assigns a numeric value. Desired administrative state of the addressed device. The system sets it to Admin-State-Down if an operator downs the device, or to Admin-State-Up if an operator attempts to bring up the device in normal operations mode. An operator can change the admin state by using SNMP SET commands, or the Slot or If-Admin commands. Desired link up/down enable state of the interface.The system sets it to Trap-State-Enabled if an operator specifies that linkUp/linkDown traps should be generated for the interface, or to Trap-State-Disabled if an operator specifies that linkUp/linkDown traps should not be generated for the interface. If the nailed profile is a local profile (0) or a RADIUS profile (1).
Desired-Trap-Sate
Inet-Profile-Type
7-5
Using Administrative Profiles Using the Device-State profile The system creates a profile for each of its physical interfaces. The Admin-State-Phys-If profile contains the following parameters (shown here with sample values):
[in ADMIN-STATE-PHYS-IF/{ shelf-1 slot-13 1 }] device-address* = { shelf-1 slot-13 1 } slot-type = hdlc2-card snmp-interface = 0 modem-table-index = 0 desired-state = admin-state-up desired-trap-state = trap-state-enabled
Specifies Physical slot address within the system. Type of card at that address. Interface table index assigned to the device whose state is stored in this profile.The system assigns a numeric value, which does not change as long as the interface is present in the system. If the card is removed and its profiles deleted (for example, by using a Slot r command), the index number is freed for future use. Modem table index assigned to the device whose state is stored in this profile. The system assigns a numeric value. The value is 0 for devices that are not modems. Desired administrative state of the addressed device. The system sets it to Admin-State-Down if an operator downs the device, or to Admin-State-Up if an operator attempts to bring up the device in normal operations mode. An operator can change the admin state by using SNMP SET commands, or the Slot or If-Admin commands. Desired link up/down enable state of the interface.The system sets it to Trap-State-Enabled if an operator specifies that linkUp/linkDown traps should be generated for the interface, or to Trap-State-Disabled if an operator specifies that linkUp/linkDown traps should not be generated for the interface.
Modem-Table-Index
Desired-State
Desired-Trap-Sate
7-6
up-status = idle-up-status reqd-state = up-reqd-state In the output, the Device-State parameter shows the current operational state of the device, which can be down, up, or none. (None indicates that the device does not exist.) The Up-Status parameter is ignored unless the device is up (Device-State=Up-Dev-State). If the device is up, Up-Status shows the status of the device, which can be idle, reserved (will not be used until all idle devices of the same type are in use), or assigned (in use). The Reqd-State parameter indicates the required operational state of the device, which can be up or down. Changing this value initiates a state change for the device. The change is complete when Device-State changes to match Reqd-State. This setting is not persistent across system resets or power cycles. At system startup, the TAOS unit reinitializes the required state to match the actual state of the card.
The parameters in the Device-Summary profiles are described below: Parameter Device-Class Description The type of device. Values can be any of the following: Total-Count Operational-Count Disabed-Count Modem Unknown Total number of devices in the specified class. Total number of devices in the specified class that are in the Up operational and Up administrative states. Total number of devices in the specified class that are in the Down operational or Down administrative state.
7-7
7-8
State Oper-State-Pend
Description The slot is no longer down, but is not yet ready for normal operation. This value denotes a transitional state in which additional shelf-to-slot communications are required to make the slot fully operational. The slot is running a self-test. The slot is empty.
Oper-State-Post Oper-State-None
The Reqd-State parameter indicates the required operational state of the slot, which can be up or down. Changing this value initiates a state change for the device. To use the Slot-State profile to change slot states, proceed as in the following example. To bring a slot down: admin> read slot-state {1 3 6} SLOT-STATE/{ shelf-1 slot-3 6 } read admin> set reqd-state = reqd-state-down admin> write SLOT-STATE/{shelf-1 slot-3 6} written To bring the slot back up: admin> set reqd-state = reqd-state-up admin> write SLOT-STATE/{ shelf-1 slot-3 6} written
7-9
Using Administrative Profiles Using T1-Stat profiles The Line-State parameter shows the overall state of the line which can be any of the following: State Does-Not-Exist Disabled Loss-of-Signal Loss-of-Frame Yellow-Alarm AIS-Receive Active Description Link is not physically on board. Line disabled. Near end has lost signal. Near end has lost frame. Receiving yellow-alarm from far end. Receiving alarm indication signal Multipoint established.
The remaining parameters indicate the errors on the DS3 line. (Refer to RFC 1407 for complete description of these errors.) Parameter F-Bit-Error-Count P-Bit-Error-Count Description Framing bit errors received since the last TAOS unit reset. P-bit errors indicate that TAOS unit received a P-bit code on the DS3 M-frame that differs from the locally calculated code. For C-Bit-Parity lines indicates that number of parity errors since the last TAOS unit reset. Far end block errors received since the last TAOS unit reset. Bipolar Violation (BPV) errors may indicate that the line sent consecutive one bits with the same polarity. It could also mean that three or more consecutive zeroes were sent or an incorrect polarity. True indicates a loss of signal. False indicates that the carrier is maintaining a connection. True indicates a loss of framing. False indicates that the line is up and in frame. True indicates that the local device has received a Yellow Alarm indication. False specifies that the local device has not received a Yellow Alarm indication. True indicates that the local device has received alarm indication signal. False indicates local device has not received and alarm indication signal.
AIS-Receive
7-10
Using Administrative Profiles Using UDS3-Stat profiles To display the status of the T1 line, read and list the T1-Stat profile, as in the following example:
admin> read t1-stat {1 8 1} T1-STAT/{ shelf-1 slot-8 1 } read admin> list physical-address* = { shelf-1 slot-10 7 } line-state = disabled channel-state = [ disabled disabled disabled disabled disabled + error-count = [ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ] loss-of-carrier = False loss-of-sync = False ais-receive = False yellow-receive = False ber-receive = False carrier-established = False network-loopback = False
The Line-State parameter shows the overall state of the line which can be any of the following: State Does-Not-Exist Disabled Loss-of-Sync Yellow-Alarm AIS-Receive No-D-Channel Active Description Link is not physically on board. Line disabled. Red-alarm state, plus or minus. Yellow-alarm state. Receiving keep-alive signal D-Channel failure. Multipoint established.
The channel-state parameter shows the state of each channel. Possible states are:. State Unavailable Unused Out-of-service Nailed-up Description Not available. Not in use. Out of service. Nailed.
The Error-Count parameter shows an error count for each channel. For complete descriptions of the parameters in the T1-Stat profile, see to the APX 8000/MAX TNT Reference.
7-11
admin> read uds3-stat {1 13 1} UDS3-STAT/{ shelf-1 slot-13 1 } read admin> list line-state = active f-bit-error-count = 0 p-bit-error-count = 0 cp-bit-error-count = 0 feb-error-count = 0 bpv-error-count = 0 loss-of-signal = False loss-of-frame = False yellow-receive = False ais-receive = False
The Line-State parameter shows the overall state of the line which can be any of the following: State Does-Not-Exist Disabled Loss-of-Signal Loss-of-Frame Yellow-Alarm AIS-Receive Active Description Link is not physically on board. Line disabled. Near end has lost signal. Near end has lost frame (also known as a red alarm). Receiving yellow-alarm from far end. Receiving alarm indication signal Multipoint established.
The remaining parameters indicate the errors on the DS3 line. (Refer to RFC 1407 for complete description of these errors.) Parameter F-Bit-Error-Count P-Bit-Error-Count Description Framing bit errors received since the last TAOS unit reset. P-bit errors indicate that TAOS unit received a P-bit code on the DS3 M-frame that differs from the locally calculated code. For C-Bit-Parity lines indicates that number of parity errors since the last TAOS unit reset. Far end block errors received since the last TAOS unit reset. Bipolar Violation (BPV) errors may indicate that the line sent consecutive one bits with the same polarity. It could also mean that three or more consecutive zeroes were sent or an incorrect polarity. True indicates a loss of signal. False indicates that the carrier is maintaining a connection. True indicates a loss of framing (also known as a red alarm). False indicates that the line is up and in frame.
Loss-of-Signal Loss-of-Frame
7-12
Parameter Yellow-Receive
Description True indicates that the local device has received a Yellow Alarm indication. False specifies that the local device has not received a Yellow Alarm indication. True indicates that the local device has received alarm indication signal. False indicates local device has not received and alarm indication signal.
AIS-Receive
Parameter Call-Log-Server-Index
Description Which of the configured call-log-host-N settings are used as the active call-logging server. Valid values are host-1 (the default), host-2, and host-3. If the TAOS unit cannot authenticate the specified server, it attempts to use the next configured server.
To enable you to make this choice from an SNMP management station, the callLoggingCurrentServerFlag in the callLoggingServerEntry, which is in the Ascend call-logging MIB, is a read-write variable. The variable can be set to 1 (active) or 2 (standby). Following is the new definition:
callLoggingCurrentServerFlag OBJECT-TYPE SYNTAX INTEGER { active(1), standby(2) } ACCESS read-write STATUS mandatory DESCRIPTION "Value indicates whether this entry is the current Call Logging server or not. The standby(2) is not set-able it is a value to report the standby status of the Call Logging server." ::= { callLoggingServerEntry 2 }
7-13
What is a core dump?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1 Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2 The Ascendump daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2 Coredump command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-4 Troubleshooting core dumps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6
Caution: Do not use core dumps unless specifically requested to by a Lucent representative.
-s slot
-u -n email-recipient
-d directory host
Coredump command
The Coredump commands syntax provides the following valid entries:
coredump coredump enable | local | remote [server ] coredump disable coredump now coredump trace
Description
Enables Coredump. If you do not specify a server, the core-dump server remains unchanged. The most commonly used mode. In Local mode the Ascendump daemon listens for packets from the TAOS unit. The Ascendump daemon operates in server mode, and the TAOS unit core dump facility operates in client mode. Enables the Ascendump daemon to pull a core dump from the TAOS unit. Remotely initiated core dumps can be a security risk, so they are disabled by default. If you enable remote core dumps, they remain enabled only until the TAOS unit resets. That is, a reset restores the default setting. The host that has the Ascendump daemon installed. Disables Coredump. Forces an immediate core dump to the machine running the Ascendump daemon. This is useful for testing the core dump process. Toggles serial debug traces which can be useful to a Lucent representative if a customer is having difficulties.
remote
Getting TAOS Unit Core Dumps Examples For example: tnt10.abc.com-1,3-tntmdm56k-1.3Ap22-980101-13:42.gz When transferring the core-dump files via FTP, use binary mode.
Trigger events
The events that normally trigger a core dump are system or slot-card resets. These usually show up in the fatal error log either as Fatal Errors or Operator Resets. You cannot specify the types of events that trigger core dumps.
Examples
This section uses examples to show how to get core dumps from the TAOS unit.
Enabling Ascendump
To start the Ascendump daemon, proceed as in the following example: % ./ascendump -v -u -d /usr/ascendumps This example runs the daemon in verbose mode and will write the core dumps in uncompressed format to /usr/ascendumps.
Performing initial tests in this manner saves time by making failures immediately diagnosable. 3 4 On the TAOS , enable core dumps to the server machine that is running Ascendump. Look for old debug profiles by entering, dir debug from the shelf controller. The only reason to have a debug profile on a card other than the shelf controller is to override the settings for the shelf controller. Unless you want to do that, you should define a single debug profile for the shelf controller and delete all other debug profiles. 5 Test slot-card dumps by opening a session with a slot card. You should perform a test dump first on the T1 or E1 card, if present, because these cards have smaller memories, and are quick to reboot. From the session on the card, enter coredump to check the status of core dump. The resulting output should report that core dump is enabled and that dumps will be directed to the server you specified in step 3. Force a core dump with the following command: coredump now Ascendump should print something like this:
$ ascendump -p -v -d ascendump: Dumping compressed DRAM image to ./tnt10.abc.com-1,11tnt8t1-1.3Ae0-971022-11:17.gz Section .data: dumping 2048 pages from address 0x80000000 .......1 Mb.......2 Mb
Occasionally, core dump fails because gzip is not installed or not in the user s path. If this is the case, you should download gzip-1.2.4.tar.gz from any GNU FTP mirror site, then compile and install it, or use the -u (uncompressed) option in the Ascendump command line. If you still have unexplained failures, run tcpdump or snoop or a packet sniffer on the Ethernet segment attached to the TAOS that is in the route to the dump server. Do the same on the Ethernet segment attached to the dump server in the route to the TAOS . Coredump uses UDP, so filter UDP packets. If theres too much UDP traffic, you might want to filter on port-number ranges as well. For information about the UDP port core dump uses, see UDP port numbers on page A-4.
Getting TAOS Unit Core Dumps Troubleshooting core dumps Proceed to testing more cards by opening CLI channels to them and using the coredump now command. Finish by testing Coredump from the shelf controller. Once you have established that core dump works, reinstate your inetd.conf entry, if present, or add one if necessary. Be sure that the entry points to the same Ascendump binary that you just tested. Here is a sample inetd.conf entry:
ascendump dgram udp nowait root /usr/local/bin/ascendump ascendump -n dump-notify
The -n dump-notify argument tells Ascendump to send email to the email alias dumpnotify whenever a core dump is captured.
Fatal and warning error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1 Definitions of fatal errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2 Definitions of warning messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3 Fatal crash information on console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-6 Syslog messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-6 Flash card error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-10 The TAOS unit logs fatal and warning error messages to the fatal error log. If the system crashes before creating a log entry, it prints a stack trace to the console serial port. System-status messages, however, go to the Syslog host (if enabled) and the Status log.
The first line indicates the type of error (fatal or warning), the index number of the error, the software revision number, the shelf and slot on which the error occurred, The second line shows the date and time of the error. The third line displays the top six program counter addresses from the execution stack active at the time of the crash.
B-1
B-2
Index 27 28 29
Definition Memory allocation of zero length Memory allocation of negative length Task infinite loop The reset was the result of a software loop.
30 31 32 33 34 35 36 37
Too large memory copy Magic sequence missing (MEMCPY) Wrong magic sequence (MEMCPY) Bad start address (MEMCPY) IDEC timeout EXEC restricted Stack overflow DRAM card error Indicates that a DRAM card of unknown size is inserted in the DRAM slot or that the DRAM card failed POST. Applies to the Pipeline 220 only.
40 99
Protection fault Operator reset This reset is logged immediately before the TAOS unit goes down. Instead of a standard stack backtrace, the message includes the active security-profile index. 0 (zero) indicates an unknown security profile. On the TAOS unit, the Default profile is number 1, and the Full Access profile is number 9.
100
System up As a complement to entry 99, this entry is logged as the TAOS unit is coming up. For a normal, manual reset, you should see a fatal error 99 followed by a fatal error 100.
B-3
Index 104
Definition Buffer not previously allocated This warning can be logged under different conditions. For example, double freeing of memory and low-memory conditions can both generate a warning 104.
Buffer bad memory allocation Buffer belongs to bogus pool Buffer belongs to bogus heap Memory management code (or other modules) detected that the buffer header of what should have been a free buffer was corrupted by the previous overwrite.
108
Buffer negative length memory allocation A negative length request was made to the memory allocation code.
109
Buffer zero length memory allocation This warning is similar to Warning 108, except that a zero length request is made to the memory allocation code.
110 111
Error in buffer boundary Error buffer too big Indicates that a software routine has tried to allocate a block of memory greater than 64Kbytes.
112 113 114 115 116 117 118 119 120 121 130
Error buffer null Error buffer segment count zero Error buffer trailer magic Error in buffer trailer Error in buffer trailer length Error in buffer trailer user magic Error buffer write after free Error buffer not in use Error buffer magic in memory copy Error next buffer magic in memory copy PPP async buffer in use Indicates a PPP error.
140 145
Error no timers LCD memory allocation failure Indicates that a memory-copy routine was called, but the source buffer was much larger than expected.
150 151
Error memory copy too large Error memory copy magic missing
B-4
Definition Error memory copy wrong magic Error memory copy bad start address WAN buffer leak Indicates an error in the WAN drivers.
160
Error in terminal server semaphore Error in telnet free driver STAC timeout Indicates a hardware error in the STAC compression chip.
171
175
EXEC failure Indicates that there is insufficient memory to start a new task.
EXEC restricted EXEC no mailbox EXEC no resources Unexpected error Channel map stuck Caused by a missing channel on a T1/PRI line.
181 182
Channel display stuck New call without disconnect request Indicates that a Disconnect message to the Central Office (CO) was not sent. The problem can be caused by conditions on the TAOS unit or at the CO. When the TAOS unit encounters the condition, it assumes the CO is correct, and answers the call.
New call without disconnect response Disconnect request dropped Spyder buffer error Spyder descriptor error TCP send buffer too big TCP sequence gap TCP too much data TCP write attempt too large TCP options bad
B-5
Index 195 301 302 303 304 305 306 381 382 383 550 1001 1002 1003 1006 1010 1011
Definition Modem message parsing failed TACACS Plus pointer inconsistency TACACS Plus index inconsistency TACACS Plus TCP inconsistency TACACS Plus TCP out-of-range socket TACACS Plus socket mismatch TACACS Plus unexpected authentication state Error in filter list Error no count in filter list Error mismatch count filter list No Ethernet transmit buffer Waiting for Ethernet controller Ethernet ACK command failed Ethernet reset invoked Ethernet controller unavailable (wait fail) Bad Ethernet transmit interrupt Ethernet transmit not completed
The first line indicates the number of the error and the software revision number. The second line displays the top six program counter addresses from the execution stack active at the time of the crash.
Syslog messages
Syslog offloads to a host computer, known as the Syslog host. The Host parameter in the Log profile specifies the Syslog host, which saves the system status messages in a log file. See the UNIX man pages about logger(1), syslog(3), syslog.conf(5), and syslogd(8) for details of the syslog daemon. The Syslog function requires UDP port 514.
B-6
Log Messages on the TAOS Unit Syslog messages The TAOS unit can report the following session data about various errors logged via Syslog: Data Description Session identifier. The authenticated name. The calling number or the called number, or both. A TAOS unit-specific code indicating the progress of the call. (For a list of progress codes, see the APX 8000/MAX TNT Reference.) A TAOS unit-specific code indicating the reason the call was disconnected. (For a list of disconnect codes, see the APX 8000/MAX TNT Reference.)
[shelf/slot/line/channel] Physical channel identifier. [MBID xxx] [name] [ calling -> called ] Progress code
Disconnect code
For a given session identifier, multiple physical channel identifiers are possible. For example, one identifier might be for a T1 lineThis is shown in the sample log below, in which messages include the MBID, DNIS, and CLID in brackets. In this example, slot 1/2 is an 8T1 card, and slot 1/3 is a 48-modem card.
...: [1/2/1/2] [MBID 1; 9995551212 ...: [1/3/1/0] [MBID 1; 9995551212 ...: [1/2/1/2] [MBID 1; 9995551212 ...: [1/3/1/0] [MBID 1] [johnc-pc] ...: [1/3/1/0] [MBID 1] [johnc-pc] ...: [1/3/1/0] [MBID 1; 9995551212 ...: [1/3/1/0] [MBID 1] [johnc-pc] progress 60.; host 10.1.26.2 -> 7898] Incoming Call -> 7898] Assigned to port -> 7898] Call Connected LAN session up: <johnc-pc> LAN session down: <johnc-pc> -> 7898] Call Terminated : STOP: johnc-pc; cause 45.;
B-7
Log Messages on the TAOS Unit Syslog messages The following example of a Syslog message shows the information it provides about the terminated call:
"Conn=("cjones-p50" 5106785291->? PPP 56000 60/185) \ Auth=(3 347/12 332/13) \ Sess=(1 643/18 644/19), Terminated"
The information also appears in the connection-status window, and is logged as a message at level Info. If some of the information is not available, that field displays either a question mark (for strings) or a zero (for numerals).
date is the date the message was logged by syslog. time is the time the message was logged by syslog. router is the router this message was sent from. interface is the name of the interface (ie0, wan0, and so on), unless a call filter logs
the packet as it brings up the link, in which case the word call appears. The message format has a number of fields, one or more of which may be present.
For more information on syslog message fields for Secure Access Firewalls, refer to Table B-1 on page B-9. The message fields appear in the following order:
B-8
Table B-1. Syslog message fields for Secure Access Firewalls Field protocol Description Can be the four hexadecimal character Ether Type or one of the following network protocol names: ARP, RARP, IPX, Appletalk. For IP protocols, the field contains either the IP protocol number (up to 3 decimal digits) or one of the following names: IP-in-IP, TCP, ICMP, UDP, ESP, AH. In the special case of ICMP, the field also includes the ICMP Code and Type ([Code]/[Type]/icmp). For non-IP packets, local is the source Ethernet MAC address of transmitted packets and the destination Ethernet MAC address of received packets. For a nonbridged WAN connection, the two MAC addresses are zeros. For IP protocols, local is the IP source address of transmitted packets and the IP destination address of received packets. In the case of TCP or UDP, it also includes the TCP or UDP port number ([IP-address];[port]). An arrow (<- or ->) indicating the direction in which the packet was traveling (receive and send, respectively). For non-IP protocols, remote has the same format that local has non-IP packets, but remote shows the destination Ethernet MAC address of transmitted packets and the source Ethernet MAC address of received packets. For IP protocols, remote has the same format as local but shows the IP destination address of transmitted packets and the IP source address of received packets. The length of the packet in octets (8-bit bytes). Indicates that the packet has a nonzero IP offset or that the IP More-Fragments bit is set in the IP header. Reports one or more messages based upon the packet status or packet header flags. The packet status messages include: corruptthe packet is internally inconsistent unreachthe packet was generated by an unreach= rule in the firewall !passthe packet was blocked by the data firewall bringupthe packet matches the call firewall !bringupthe packet did not match the call firewall TCP flag bits that will be displayed include syn, fin, rst. syn is will only be displayed for the initial packet which has the SYN flag and not the ACK flag set.
local
direction
remote
length frag
log
tag
contains any user defined tags specified in the filter template used by SAM.
B-9
This error generally occurs for one of the following reasons: You enabled RADIUS accounting on the TAOS unit, but not on the RADIUS server. The Acct-Port or Acct-Key are incorrect. The Acct-Key must match the value assigned in the RADIUS clients file or the TACACS+ configuration file. You are using a PortMaster server rather than a TAOS unit server.
B-10
Card N is unavailable
B-11
Breaking down the raw data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1 Annotated traces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2 Example of MP+ call negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-5 Many of the diagnostic commands display raw data. This Primer is designed to assist you in decoding PPP, MP, MP+ and BACP negotiations. The negotiations can be logged with the diagnostic commands PPPDump, WANDisplay, WANDSess, WANNext or WANOpen. For more detailed information than this guide provides, refer to the specific RFCs. A partial list of pertinent RFCs appears at the end of this guide.
A two-byte Protocol Identifier. A one-byte Packet Format ID number A one-byte ID number. A two-byte length. Options for the protocol.
Below is a table of the most common protocols youll see in Lucent diagnostic traces: Identifier:
C0 21 C0 23 C2 23 80 21 80 29 80 2B 80 31
Description: Link Control Protocol (LCP) Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Internet Protocol (IP) Appletalk Protocol Novells Internetwork Packet Exchange (IPX) Bridging PDU
C-1
Identifier:
80 FD
Description Configure Request Configure Acknowledgment Configure Non-Acknowledgment Configure Reject Terminate Request Terminate Acknowledgment Code Reject Protocol Reject Echo Request Echo Reply Discard Request
Note: If a packet received from the wan fails the Cyclic Redundancy Check (CRC) the display is similar to the following, where RBAD denotes Received BAD: RBAD-27:: 8712 octets @ 26CFE8 [0000]: fe dd dd dd dd dd dd dd [0010]: dd dd dd dd dd dd dd dd [0020]: dd dd dd dd dd dd dd dd [0030]: dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd
Annotated traces
Use the following traces as guides to help you decode other traces. LCP Configure Request - MP+, MRU of 1524, MRRU of 1524 and End Point Discriminator using the devices MAC address: XMIT-3:: 29 octets @ 2C2E94 [0000]: ff 03 c0 21 01 01 00 19 00 04 00 00 01 04 05 f4 [0010]: 11 04 05 f4 13 09 03 00 c0 7b 4c e0 4c This is a second LCP Configure Request from the same device. Everything in the packet is identical to the previous packet, except the ID number has incremented from 01 to 02: XMIT-3:: 29 octets @ 2C2E94 [0000]: ff 03 c0 21 01 02 00 19 00 04 00 00 01 04 05 f4 [0010]: 11 04 05 f4 13 09 03 00 c0 7b 4c e0 4c
C-2
PPP Decoding Primer Annotated traces LCP Configure Request - CHAP authentication, Magic number RECV-3:: 19 octets @ 2BEB8C [0000]: ff 03 c0 21 01 60 00 0f 03 05 c2 23 05 05 06 4e [0010]: 36 c9 05 LCP Configure Acknowledgment - This device will authenticate using CHAP. The Magic number is also acknowledged: XMIT-3:: 19 octets @ 2C2E94 [0000]: ff 03 c0 21 02 60 00 0f 03 05 c2 23 05 05 06 4e [0010]: 36 c9 05 LCP Configure Reject - MP+, MRU of 1524, MRRU of 1524 and End Point Discriminator. This rejection shows two things. It shows that the remote side does not support MP+ or MP, since MP+ and the MRRU were rejected. This will have to be a PPP connection. Also, since the MRU of 1524 was rejected, the default of 1500 is assumed. There needs to be an MRU, so a rejection of a given value only means to use the default value. At this point, this device will need to retransmit another LCP Configure Request, removing all the rejected options. RECV-3:: 29 octets @ 2BF1A4 [0000]: ff 03 c0 21 04 02 00 19 00 04 00 00 01 04 05 f4 [0010]: 11 04 05 f4 13 09 03 00 c0 7b 4c e0 4c LCP Configure Request - Note all values that were previously rejected are no longer in the packet: XMIT-3:: 8 octets @ 2C2E94 [0000]: ff 03 c0 21 01 04 00 04 LCP Configure Acknowledgment RECV-3:: 8 octets @ 2BF7BC [0000]: ff 03 c0 21 02 04 00 04 At this point, since both sides have transmitted LCP Configure Acknowledgments, LCP is up and the negotiation moves to the authentication phase. This device receives a CHAP challenge from the remote end: RECV-3:: 21 octets @ 2BFDD4 [0000]: ff 03 c2 23 01 01 00 11 04 4e 36 c9 5e 63 6c 63 [0010]: 72 34 30 30 30 This device transmits its encrypted user name and password: XMIT-3:: 36 octets @ 2C2E94 [0000]: ff 03 c2 23 02 01 00 20 10 49 b8 e8 54 76 3c 4a [0010]: 6f 30 16 4e c0 6b 38 ed b9 4c 26 48 5f 53 65 61 [0020]: 74 74 6c 65 The remote device sends a CHAP Acknowledgment: RECV-3:: 8 octets @ 2C03EC [0000]: ff 03 c2 23 03 01 00 04
C-3
PPP Decoding Primer Annotated traces At this point, the negotiation moves from authentication to negotiation of Network Control Protocols (NCPs). The TAOS unit supports Bridging Control Protocol (BCP), IPCP, IPXCP and ATCP. IPCP Configure Request - Van Jacobsen Header Compression, IP address of 1.1.1.1 RECV-3:: 20 octets @ 2C0A04 [0000]: ff 03 80 21 01 e3 00 10 02 06 00 2d 0f 00 03 06 [0010]: 01 01 01 01 BCP Configure Request RECV-3:: 8 octets @ 2C101C [0000]: ff 03 80 31 01 55 00 04 IPCP Configure Request - IP address of 2.2.2.2 XMIT-3:: 14 octets @ 2C2E94 [0000]: ff 03 80 21 01 01 00 0a 03 06 02 02 02 02 IPCP Configure Reject - Van Jacobsen Header Compression. The remote device should send another IPCP Configure Request and remove the request to do VJ Header Compression: XMIT-3:: 14 octets @ 2C2E94 [0000]: ff 03 80 21 04 e3 00 0a 02 06 00 2d 0f 00 BCP - Protocol Reject. This local device is not configured to support bridging. XMIT-3:: 8 octets @ 2C2E94 [0000]: ff 03 80 31 08 55 00 04 IPCP Configure Acknowledgment RECV-3:: 14 octets @ 2C1634 [0000]: ff 03 80 21 02 01 00 0a 03 06 01 01 01 01 IPCP Configure Request - Note VJ Header Compression is not requested this time. RECV-3:: 14 octets @ 2C1C4C [0000]: ff 03 80 21 01 e4 00 0a 03 06 02 02 02 02 IPCP Configure Acknowledgment XMIT-3:: 14 octets @ 2C2E94 [0000]: ff 03 80 21 02 e4 00 0a 03 06 01 01 01 01 At this point, a PPP connection has been successfully negotiated. The caller was successfully authenticated by means of CHAP and IPCP was the only successfully configured NCP. IPX, Appletalk and bridging will not be supported during this session. Below are two packets used in determining link quality: LCP Echo request packet RECV-3:: 16 octets @ 2BEB8C [0000]: ff 03 c0 21 09 01 00 0c 4e 36 c9 05 00 00 00 00 LCP Echo Response XMIT-3:: 16 octets @ 2C2E94 [0000]: ff 03 c0 21 0a 01 00 0c 00 00 00 00 00 00 00 00
C-4
C-5
PPP Decoding Primer Example of MP+ call negotiation Next, the 80 31 01 designates this as a BCP Configure Request: RECV-31:: 20 octets @ D61EC [0000]: ff 03 00 3d c0 00 00 00 80 31 01 01 00 0a 03 03 [0010]: 01 07 03 00 BCP Configure Request: XMIT-31:: 20 octets @ D803C [0000]: ff 03 00 3d c0 00 00 00 80 31 01 01 00 0a 03 03 [0010]: 01 07 03 00 BCP Configure Acknowledgment: XMIT-31:: 20 octets @ D864C [0000]: ff 03 00 3d c0 00 00 01 80 31 02 01 00 0a 03 03 [0010]: 01 07 03 00 BCP Configure Acknowledgment: RECV-31:: 20 octets @ D67FC [0000]: ff 03 00 3d c0 00 00 01 80 31 02 01 00 0a 03 03 [0010]: 01 07 03 00 BCP is up and the session begins sending bridged traffic. No routed protocols were negotiated. The following packets are sent as part of the MP+ protocol. They are sent at one-second intervals. These packets are used by each unit to validate the existence of the link. It gives the devices a secure way to determine whether the link is still up, even if there is no data traffic passing between the devices. RECV-31:: 8 octets @ D5BDC [0000]: ff 03 00 3d c0 00 00 XMIT-31:: 8 octets @ D803C [0000]: ff 03 00 3d c0 00 00 RECV-31:: 8 octets @ D61EC [0000]: ff 03 00 3d c0 00 00 XMIT-31:: 8 octets @ D803C [0000]: ff 03 00 3d c0 00 00 05 04 06 05
The following RFCs provide more detail about the subjects listed in their titles: Identifier
RFC1378
Title PPP AppleTalk Control Protocol (ATCP) PPP Internetwork Packet Exchange Control Protocol (IPXCP) PPP Bridging Control Protocol (BCP) Point-to-Point Protocol (PPP) Multilink Protocol Plus (MP+) PPP Compression Control Protocol (CCP) PPP Stac LZS Compression Protocol PPP Link Quality Monitoring
C-6
Title PPP Multilink Protocol (MP) PPP Challenge Handshake Authentication Protocol
C-7
Index
A
accounting displaying messages, 4-34 displaying state of RADIUS session session statistics, 4-37 See Also. RADIUS Active-Enabled parameter SNMP-Notification profile, 6-17 SNMP-USM-User profile, 6-8 SNMPv3-Target-Parameter profile, 6-17 address pools, displaying information about, 4-8 Addrpool command, using, 4-8 adjacencies, displaying OSPF, 3-30 Admin User profile default password for, 2-2 logging in with, 2-2 privileges with, 5-1 Admin, logging in as, 2-2 administrative profiles how created, 7-2 Admin-State profiles, how created, 7-3 Admin-State-Perm-If profile described, 7-2 using, 7-4 Admin-State-Phys-If profile described, 7-3 using, 7-5 Advanced Agent MIB, TAOS unit support, 6-22 alarms, displaying T3, 1-25 Answer Profile MIB, TAOS unit support for, 6-23 areas, displaying OSPF, 3-26 ARP adding a table entry, 3-10 cache described, 3-9 clearing the ARP table, 3-10 deleting a table entry, 3-10 inverse for Frame Relay, 4-13 viewing the ARP table, 3-9 ARPtable command, using, 3-9 AS advertisements displaying external, 3-21 displaying internal, 3-22 AS border routers, information about, 3-27 Ascend MIB advancedAgent group, 6-51 atmpGroup, 6-66 callStatusGroup, 6-55 configuration group, 6-61 console group, 6-53 described, 6-22 doGroup, 6-52 eventGroup, 6-54 firewallGroup, 6-58 flashGroup, 6-60 hostStatus group, 6-53 hostTypes group, 6-51 lanModemgroup, 6-58 lanTypes group, 6-52 mCastGroup, 6-57 mibanswerProfile, 6-64 mibframeRelayProfile, 6-64 mibinternetProfile, 6-62 mibuds3NetworkProfile, 6-65 miscGroup, 6-60 multiShelf group, 6-59 powerSupply group, 6-59 products group, 6-50 radiusGroup, 6-57 sessionStatusGroup, 6-56 slots group, 6-50 systemStatusGroup, 6-53 wanDialoutPkt group, 6-59 Ascendump described, A-2 example of enabling, A-4 in local mode, A-3 obtaining, A-2 preliminary steps for, A-2 remote mode, A-3 specifying host installed on, A-3 AT command strings, modifying, 4-21 ATM diagnostics with Framer command, 1-12 displaying call blocks, 1-14 displaying lines, 1-11 looping back lines, 1-14 status of lines, 7-9 ATM, looping back, 1-14 ATMDumpCall command, using, 1-14 ATMP
Index-1
Index B using ATMPdebug command, 4-9 using DTunnel command to get information about, 4-11 ATMP MIB, APX 8000 support, 6-23 ATMPdebug command, using, 4-9 Auth command logging in using, 5-8 using, 2-2 AuthenDebug command, using, 4-9 authentication Auth command, 2-2 debugging, 4-20 displaying LCP messages, 4-9 logging in as different user, 2-2 session statistics, 4-37 SNMP, 6-32 User profiles, 2-2 using RADservdump to verify setup, 4-36 See Also. RADIUS Auth-Key parameter, 6-9 Auth-Protocol parameter, 6-8 removing from service, 1-19 CIDR displaying messages about, 4-10 CLID, information in Syslog, B-8 clients, displaying IGMP, 3-17 clock source preferred, 1-5 viewing, 2-13 viewing for slot card, 1-5 clocking viewing source, 2-13 viewing source for slot card, 1-5 Code permission level, explained, 2-4 Code-level command, permissions needed to use, 5-4 commands Addrpool, 4-8 ARPtable, 3-9 ATMDumpCall, 1-14 ATMPdebug, 4-9 AuthenDebug, 4-9 BrouterDebug, 4-10 BrouterLoad, 4-10 Ctdebug, 4-10 Debug overview, 4-1 Device, 1-4, 1-31 DS3ATMlines, 1-11 DS3Link, 1-25 DTunnel, 4-11 E1-Stats, 1-27 Ether-Display, 3-35 Ether-Stats, 4-11 Finger, 2-33 for status window, 2-21 Framer, 1-12 FRDLstate, 4-12 FRdump, 4-13 FRinARP, 4-13 FRLinkState, 4-14 FRLMI, 4-14 FRMgrDump, 4-14 FRPriorityErrors, 4-15 FRScert, 4-15 FRstate, 4-16 GRE, 4-16 If-Admin, 6-48 IFMgr, 4-16 IGMP, 3-16 IProute, 3-6, 3-7 IPXRIPdebug, 4-20 Lanval, 4-20 LifDebug, 4-21 Line, 1-7 list of debug, 4-5 MdbStr, 4-21 MDialout, 4-22
B
backing up, APX 8000 configuration, 2-19 Backoff Q full message, explained, B-10 Base profile described, 2-9 information stored across resets, 2-10 BrouterDebug command, using, 4-10 BrouterLoad command, using, 4-10
C
call blocks, ATM, displaying, 1-14 Call MIB, APX 8000 support, 6-23 calls dialout timer, 2-37 displaying state of, 4-51 end of call information reported by Syslog, B-7 example of incoming modem, 4-24 example of MPP negotiation, C-5 forwarding info to Syslog when terminates, 2-27 information about incoming call routing, 4-39 cards. See slot cards channels bringing modem up or down, 1-31 checking status of T1, 1-20 displaying status of, 1-9 overall state of, 7-11 quiescing a channel, 1-20
Index-2
Index C MDialSess, 4-23 Modem, 1-31 ModemD1Stats, ModemD2Stats, ModemD3Stats, 4-23 ModemDrvDump , 4-24 ModemDrvState, 4-24 MPCMtoggle, 4-25 MPentry, 4-26 MPPCM, 4-26 MPtoggle, 4-27 NetIF, 4-27 Netstat, 3-2 NSlookup, 3-9 OAMLoop, 1-14 Open, 1-3, 1-21 OSPF, 3-18 overview of, 2-3 overview of shelf controller, 2-4 permission levels, 2-3 permissions described, 5-3 Ping, 3-1 Pool, 4-28 PortInfo, 4-30 PPPdump, 4-31 PPPFSM, 4-31 PPPinfo, 4-32 PPPstate, 4-33 PRIdisplay, 4-34 Quiesce, 1-19 RADacct, 4-34 RADif, 4-35 RADservdump, 4-36 RADsessdump, 4-37 RADstats, 4-37 Reset, 4-38 Revision, 4-39 Rlogin, 3-13 RoutMgr, 4-39 Show, 1-1 Show Netware Networks, 3-32 Show Netware Servers, 3-31 Slot, 1-4 SNTP, 4-40 StackLimit, 4-40 T1Channels, 1-20 T1-Stats, 1-21, 1-22 TDM , 4-41 TDMtst, 4-42 Telnet, 3-13 TelnetDebug, 4-43 TNTMP, 4-44 TraceRoute, 3-8 TSshow, 4-45 TunnelDebug, 4-45 TunnelSlot, 4-46 UDS3Dump, 1-29 UDS3Lines, 1-28 Update, 4-46 Userstat, 2-30 using combinations of debug, 4-4 WANdisplay, 4-47 WANdsess, 4-47, 4-48 WanEventsStats, 4-48 WANopening, 4-50 WANtoggle, 4-51 configuration backing up profiles, 2-19 clearing, 2-12 displaying system options, 4-46 Log profile, 2-27 refreshing from RADIUS, 2-36 removing slot card, 1-5 restoring, 2-20 restoring from a local file, 2-20 restoring from a network, 2-20 saving to a local file, 2-19 saving to a network host, 2-20 scripts, using, 2-28 SNMP profile, 6-32 SNMP traps, 6-47 User profile, 5-5 via SNMP, 6-22 Connection profile Frame Relay Direct, 5-10 Connection status, 2-22 connections displaying information about MP, 4-25 displaying information about MP and MPP, 4-26 displaying information about MPP, 4-26 displaying information about MPP and MP, 4-27 displaying information about setup, 4-50 information about, 2-22 terminating user, 2-31 console, fatal crash information on, B-6 core dump disabling, A-3 enabling, A-3 enabling on MAX TNT, A-4 examples of, A-4 initiating immediate, A-3 MAX TNT in local mode, A-3 naming conventions for files, A-3 overview of, A-1 preliminary steps for, A-2 pulling from TNT, A-5 remote mode, A-3 specifying server, A-3 trigger events, A-4 troubleshooting, A-6 UDP port numbers for, A-4 Coredump command, described, A-1, A-3 core-dump server, restrictions on, A-1
Index-3
Index D Ctdebug command, using, 4-10 displaying which applied to Frame Relay link, 4-13 displaying with the FRMgrDump command, 4-14 DNIS, information in Syslog, B-8 DNS, performing a DNS lookup, 3-9 DS1 MIB, described, 6-2 DS1s getting diagnostics for, 1-21, 1-27 status codes, 1-8 DS2 lines displaying state of, 1-26 status codes, 1-8 DS3 ATM card administering, 1-11 using the ATMDumpCall command, 1-14 using the Framer command, 1-12 DS3 lines checking status of unchannelized, 7-11 DS3 MIB, described, 6-2 DS3 Profile MIB, APX 8000 support, 6-24 DS3. See also T3 DS3-ATM profile, using, 7-9 DS3ATMlines command, using, 1-11 DS3Link command, using, 1-25 DTPT, cannot terminate sessions with Userstat, 2-31 DTunnel command, using, 4-11
D
D channel, displaying signaling, 4-34 D4 framing, cannot be used with FDL, 1-20 data link, information for Frame Relay, 4-12 date, setting system, 2-12 debug commands getting online help for, 4-4 list of, 4-5 overview of , 4-1 using combinations of, 4-4 debug levels, described, 4-3 debug output, enabling, 4-3 debug permissions enabling, 4-1 levels explained, 2-4 debug profiles, deleting, A-6 Debug-level commands TNTMP, 4-44 default administrative password, 2-2 Default User profile, privileges with, 5-1 defaults, restoring system to, 2-12 Device command, using, 1-4, 1-31 devices changing state of, 1-4 changing state of with Admin-State-Perm-If profile, 7-4 changing state of with Admin-State-Phys-If profile, 7-5 managing, 7-7, 7-8 quiescing, 1-19 Device-State profile, using, 7-6 Device-Summary profile, using, 7-7 Diagnostic permission level, explained, 2-4 Diagnostic-level commands, permission needed to use, 5-4 diagnostics ATM with Framer command, 1-12 getting DS1, 1-21, 1-27 getting T3, 1-21, 1-25 dialout MDialout command, 4-22 timer for, 2-37 digital modems. See modems Dircode command, using, 2-16 directed broadcasts, setting displayed in IFmgr command output, 4-20 disabling modem, explained, 1-32 DLCI
E
E1 lines displaying clock source information, 2-13 getting diagnostics for, 1-27 monitoring, 1-27 E1-Stats command, using, 1-27 error information, B-9 error messages did not negotiate MPP, 2-36 cannot establish connection for, 2-35 cannot find profile for, 2-35 far end does not support remote management, 2-36 far end rejected session, 2-36 management session failed, 2-36 not authorized, 2-35 profile for does not specify MPP, 2-35 errors definition of fatal, B-2 logged by Syslog, B-7 on T1 channels, 7-11 status window, displayed, 2-23 Ether-Display command, using, 3-35 Ethernet APX 8000 monitors interface state, 1-16 displaying information about a particular interface,
Index-4
Index F 4-19 displaying interfaces, 4-16 displaying statistics about, 4-11 enabling or disabling interfaces, 1-16 how link state affects routing table, 1-17 multiple IP interfaces on port, 1-18 viewing link state, 1-18 viewing packet contents, 3-35 Ethernet card, administering, 1-16 Ethernet interface marking as up or down, 4-18 specifying management only, 2-3 Ether-Stats command, using, 4-11 Event MIB, APX 8000 support, 6-24 events types of, B-9 WAN, 4-49 External-Auth profile, verifying configuration in, 4-36 Format command, using to format flash cards, 2-16 Frame Relay data link information on, 4-12 FRDLstate command, 4-12 FRdump command, 4-13 FRinARP command, 4-13 FRLinkState command, 4-14 FRLMI command, 4-14 FRMgrDump command, 4-14 FRPriorityErrors command, 4-15 FRScert command, 4-15 FRstate command, 4-16 state changes, 4-16 Userstat command and, 2-31 Frame Relay MIB, described, 6-2 Frame Relay Profile MIB, APX 8000 support, 6-26 Framer command, using, 1-12 FRDLstate command, using, 4-12 FRdump command, using, 4-13 FRinARP command, using, 4-13 FRLinkState command, using, 4-14 FRLMI command, using, 4-14 FRMgrDump command, using, 4-14 FRPriorityErrors command, using, 4-15 FRScert command, using, 4-15 FRstate command, using, 4-16 Fsck command, using to check flash card format, 2-17
F
factory configuration, displaying, 2-9 fatal error log core dumps and, A-5 described, B-1 logging message to when stack reaches limit, 4-40 reading, 2-24 fatal error messages described, B-1 format of, B-1 fatal errors crash information on console, B-6 definition of, B-2 description of, 2-24 FDL D4 framed lines and, 1-20 specifying, 1-20 features, displaying enabled, 2-9 Finger forwarding service not supported, 2-34 using command, 2-33 Firewall MIB, APX 8000 support, 6-25 flash card described, 2-16 displaying contents of, 2-16 displaying directory information, 2-16 file-system checking a card, 2-17 formatting, 2-16 overflow from loading unknown cards, 2-19 performing a file system check, 2-17 flash card slots, on APX 8000 shelf controller, 2-16 Flash MIB, APX 8000 support, 6-25
G
GRE command, using, 4-16 groups displaying IGMP, 3-16 finding channels associated with nailed, 1-20
H
hash codes, using Update commands with, 4-46 HDLC card testing communication between, 4-42 help, getting for debug commands, 4-4 hidden routes, IPX , 3-32 host card, displaying WAN events for, 4-48 hosts DNS lookups, 3-9 logging into network, 3-13
Index-5
Index I
I
Idle logout, 5-2 Idle parameter, 2-35 If-Admin command administering SNMP interfaces with, 6-48 examples, 6-48 IFMgr command using, 4-16 viewing multiple IP interfaces on Ethernet port with, 1-18 IGMP client information, 3-17 diagnostic tools for, 3-16 group information, 3-16 IGMP command displaying client information, 3-17 using, 3-16 inband signaling, 1-9 installation, recovering from failed slot card, 1-6 interfaces active IGMP, 3-16 description of table, 3-4 diagnostic tools for IGMP multicast, 3-16 displaying network mappings, 4-27 enabling and disabling Ethernet, 4-16 enabling or disabling Ethernet, 1-16 Frame Relay, 4-13 information about a particular Ethernet, 4-19 initiating changes in SNMP, 6-49 managing SNMP, 6-48 multicast forwarding, 3-16 multiple IP on Ethernet port, 1-18 OSPF, 3-28 OSPF, displaying, 3-29 permanent defined, 4-17 resetting SNMP table, 6-49 SNMP, 7-2 SNMP described, 6-49 specifying management only, 2-3 table of Ethernet, 4-16 transient defined, 4-17 viewing Ethernet link state, 1-18 Internet Profile MIB, APX 8000 support, 6-27 IP displaying and modifying routes, 3-5 interfaces displayed with Netstat command, 3-2 multiple interfaces on Ethernet port, 1-18 system administration for, 3-1 IP addresses, displaying, 3-5 IP routing table, displaying, 3-5 IProute command described, 3-7
using to temporarily modify routing table, 3-6 IP-Route profile, routes restored after reset, 3-7 IPX diagnostic tools for, 3-31 IPXRIPdebug command, 4-20 IPXRIPdebug command, using, 4-20 ISDN LifDebug command, 4-21 PRIdisplay command, 4-34 quiescing PRI line, 1-19
L
Lan Modem MIB, APX 8000 support, 6-27 LAN-Modem profile, 1-32 Lanval command, using, 4-20 LCP authentication, displaying messages related to, 4-9 LifDebug command, using, 4-21 Line command, using, 1-7 Line status window channel status codes in, 1-9 link status codes in, 1-8 lines, 1-11, 1-14 displaying DS2 state, 1-26 displaying T3 statistics, 1-26 DS1 status, 1-8 DS2 status, 1-8 overall state of, 7-10, 7-11, 7-12 removing PRI from service, 1-19 status of, 1-8 link state Frame Relay, 4-14 OSPF advertisements, 3-24 OSPF database, 3-22 viewing link state, 1-18 link-state database, displaying, 3-20 LMI displaying information about, 4-14 displaying Sprint or Frame Relay forum checks, 4-15 Load command, loading code for specific card, 2-19 Load-Select profile, how to use, 2-18 log messages in status window, 2-23 level displayed on a per-user basis, 5-2 status window, displayed, 2-23 Log profile displaying contents, 2-25 example configuration, 2-27 how many messages to save, 2-26 message level, 2-26 number of messages, 2-26 syslog daemon, 2-27
Index-6
Index M logging as different user, 2-2 configuring Syslog, 2-27, 2-28 levels for User profiles, 5-8 setting up Syslog, 2-25 specifying remote port for Syslog, 2-27 specifying session ID base, 2-26 logging in as a different user, 5-8 described, 2-2 login and User profiles, 5-2 determining current user profile, 5-9 displaying status windows, 5-2 to network host using Rlogin, 3-13 to network host using Telnet, 3-13 to network hosts from APX 8000, 3-13 logout, for idle sessions, 5-8 loopback enabling external for T3, 1-26 enabling for T3, 1-26 enabling internal for T3, 1-26 Modem MIB, described, 6-2 modem strings, revert to default values after reset, 4-21 ModemD1Stats, command, using, 4-23 ModemD2Stats command, using, 4-23 ModemD3Stats command, using, 4-23 ModemDrvDump command, using, 4-24 ModemDrvState command, using, 4-24 modems bringing channel up or down, 1-31 disabling, 1-32 displaying status, 1-31 MdbStr command, 4-21 MDialSess command, 4-23 ModemD1Stats, ModemD2Stats, ModemD3Stats commands, 4-23 ModemDrvDump, 4-24 ModemDrvState command, 4-24 monitoring, 1-31 quiescing, 1-32 monitoring E1 lines, 1-27 UDS3 card, 1-28 MP displaying information about, 4-25, 4-27 ID number, 4-26 MPCMtoggle command, using, 4-25 MPentry command, using, 4-26 MPP displaying information about, 4-26, 4-27 displaying information about connections, 4-26 example of call negotiation, C-5 MPPCM command, using, 4-26 MPtoggle command, using, 4-27 multicast diagnostic tools for interfaces, 3-16 IGMP client information, 3-17 IGMP group information, 3-16 multicast forwarding, administration, 3-16 Multicast MIB, APX 8000 support, 6-27 multichannel connections, debugging, 4-25, 4-26 multishelf TDM command, 4-41
M
Maintenance-State command. using, 1-19 management, specifying Ethernet interface for, 2-3 MdbStr command, using, 4-21 MDialout command, using, 4-22 MDialSess command, using, 4-23 memory displaying NVRAM used, 2-13 displaying pools, 4-28 NVRAM, 2-12 messages Backoff Q full, B-10 definition of warning, B-3 fatal and warning error described, B-1 fatal error definitions, B-2 format of fatal and warning, B-1 log for User profiles, 5-8 log messages in status window, 2-23 specifying levels of debug, 4-3 Syslog, B-6 MIBs Ascend, 6-22 Ascend MIB hierarchy, 6-50 Frame Relay, 6-2 Modem, 6-2 support on APX 8000, 6-1 Modem card, administering, 1-31 Modem command, using, 1-31 modem dialout, active sessions, 4-23
N
nailed connections, refreshing from RADIUS, 2-36 nailed group finding channel associated with, 1-20 Name parameter SNMP-USM-User profile, 6-8 SNMPv3-Notification profile, 6-16 name, specifying for APX 8000, 2-11
Index-7
Index O negotiation modifying modem, 4-21 user session messages, 4-50 neighbors, displaying OSPF, 3-30 NetIF command, using, 4-27 Netstat command displaying routing table, 3-5 using, 3-2 network administration IPX , 3-31 logging into network hosts, 3-13 multicast interfaces, 3-16 OSPF tools for, 3-17 performing a DNS lookup, 3-9 pinging hosts, 3-1 Rlogin sessions, 3-13 TCP/IP networks, 3-1 Telnet sessions, 3-13 tracing routes, 3-8 viewing the ARP table, 3-9 network connectivity, testing with Ping, 3-1 network management software, 6-6 NFAS signaling, 1-9 Nslookup command, using, 3-9 NVRAM displaying amount used, 2-13 managing, 2-12 not cleared when you remove slot card, 1-5 using to recover from slot card upgrade, 1-6
P
packets displaying for particular user, 4-47 displaying packets received from or sent to WAN, 4-47 formats in PPP sessions, C-2 viewing Ethernet, 3-35 parameters Idle, 2-35 passwords assigning to Admin login, 2-2 default Admin, 2-2 permissions needed to view, 5-5 required for logging into system, 5-2 requiring for serial port, 2-2 PCMCIA flash cards see flash cards permanent interface, defined, 4-17 permission levels Code explained, 2-4 Debug explained, 2-4 Diagnostic explained, 2-4 System explained, 2-4 Term-Serv explained, 2-4 Update explained, 2-4 User explained, 2-4 permissions Allow-Code, 5-4 Allow-Diagnostic, 5-4 Allow-Password, 5-5 Allow-System, 5-4 Allow-Termserv, 5-4 Allow-Update, 5-4 described, 5-3 enabling debug, 4-1 levels, 2-3 logging in as Admin, 2-2 Ping command, using, 3-1 Pools command, using, 4-28 PortInfo command, using, 4-30 ports displaying port info, 4-30 information about TCP and UDP, 3-10 specifying remote for Syslog, 2-27 UDP for core dump, A-4 Port-State events, not supported on APX 8000, 6-34 Power command, using, 2-28 power supplies, checking status of, 2-28 Power Supply MIB, APX 8000 support, 6-27 PPP annotated traces in sessions, C-2 APX 8000 name used for session, 2-11 displaying session info, 4-31, 4-32
O
OAMLoop command, using, 1-14 Open command using, 1-3, 1-21 OSPF diagnostic tools for, 3-17 displaying the routing table, 3-25 external AS advertisements, displaying, 3-21 general information about, 3-18 information about areas, 3-26 information about AS border routers, 3-27 information about link-state database, 3-20 interfaces, 3-28 interfaces, displaying information about, 3-29 internal AS advertisements, displaying, 3-22 link-state advertisements, 3-24 link-state database, 3-22 neighbors, 3-25, 3-30 routing table, 3-25 OSPF command, 3-18 outbound modem calls displaying information about, 4-22
Index-8
Index Q frame formats in negotiation, C-1 most common protocols in negotiations, C-1 packet formats in sessions, C-2 state information, 4-33 using WANdisplay to resolve PPP negotiation problems, 4-47 PPPdump commands, using, 4-31 PPPFSM command, using, 4-31 PPPinfo commands, using, 4-32 PPPstate command, using, 4-33 PRI displaying D-channel signaling, 4-34 quiescing, 1-19 PRIdisplay command, using, 4-34 Priv-Key parameter, 6-10 Priv-Protocol parameter, 6-9 profiles administrative, 7-1 administrative, how created, 7-2 Admin-State-Perm-If, 7-2, 7-4 Admin-State-Phys-If, 7-3, 7-5 Base information stored across resets, 2-10 Connection Frame Relay Direct, 5-10 Device-State, 7-6 Device-Summary, 7-7 DS3-ATM, 7-9 refreshing nailed, 2-36 sample SNMP, 6-32 sample User, 5-5 Slot-Info, 7-8 Slot-State, 7-8 SNMP overview, 6-31 T1-Stat, 7-10 UDS3-Stat, 7-11 User pre-defined, 5-1 prompts, specifying for User profile, 5-6 protocols ARP, 3-9 IGMP, 3-16, 3-17 most common, C-1 OSPF, 3-17 SNTP, 2-12 statistics, 3-10 Telnet, 3-13 UDP, probe, 3-8 quiescing T1 lines (in T3 card) or channels, 1-19 quiescing T1 lines or channels, 1-19, 1-20
R
RADacct command, using, 4-34 RADif command, using, 4-35 RADIUS RADacct command, 4-34 RADif command, 4-35 RADservdump command, 4-36 RADsessdump, 4-37 RADstats command, 4-37 refreshing configuration, 2-36 refreshing nailed profiles from, 2-36 running in debug mode, 4-35 RADIUS MIB, APX 8000 support, 6-29 RADservdump command, using, 4-36 RADsessdump command, using, 4-37 RADstats commands, using, 4-37 Read-Write-Access parameter, 6-8 remote management session, timing out, 2-35 Reset command, using, 4-38 resetting single shelf system, 2-13 restoring saved configurations, 2-20 Revision command, using, 4-39 revision, displaying system, 4-45 RFC 1213, APX 8000 support, 6-1 RFC 1253, APX 8000 support, 6-1 RFC 1315,APX 8000 support, 6-2 RFC 1317, APX 8000 support, 6-2 RFC 1398, APX 8000 support, 6-2 RFC 1406, APX 8000 support, 6-2 RFC 1695, APX 8000 support, 6-2, 6-4, 6-5 RFC 1695, described, 6-2 RFC 1696, APX 8000 support, 6-2 RFC 2233, APX 8000 support, 6-3 RIP, displaying IPX RIP traffic, 4-20 Rlogin command, using, 3-13 routes adding static to routing table, 3-7 changing, 3-6 displaying and modifying IP, 3-5 hidden and static IPX, 3-32 routing displaying router backlog time, 4-10 IPX diagnostic tools, 3-31 IPX RIP traffic, 4-20 OSPF areas, 3-26
Q
queue depth, displaying, 3-11 Quiesce command and switch types, 1-19 example use, 1-19
Index-9
Index S OSPF AS border routers, 3-27 OSPF external AS advertisements, 3-21 OSPF information, 3-18 OSPF internal AS advertisements, 3-22 OSPF link-state advertisements, 3-24 OSPF link-state database, 3-20, 3-22 OSPF neighbors, 3-30 OSPF routing table, 3-25 tracing routes, 3-8 using BrouterDebug command to get information about, 4-10 See Also. OSPF routing table adding static route to, 3-7 displaying and modifying, 3-5 displaying with Netstat command , 3-5 fields explained, 3-5 how affected by link state, 1-17 modifying temporarily, 3-6 RoutMgr command, using, 4-39 Syslog information about, B-7 terminating, 2-31 shelf controller, commands available on, 2-4 Show command types of slot cards reported, 1-3 viewing slot cards with , 1-1 Show Netware Networks command, 3-32 Show Netware Servers command, 3-31 slot cards administering UDS3, 1-28 changing state of , 1-4 changing state of in Slot-State profile, 7-8 commands on , 2-3 displaying uptime for, 2-8 DS3 ATM, administering, 1-11 Ethernet, administering, 1-16 getting core dump from, A-5 installed reported by Slot-Info profile, 7-8 loading software for, 2-18 loading software for new cards, 2-19 loading software for specific cards, 2-18 managing, 7-7, 7-8 modem, administering, 1-31 opening session with, 1-3 recovering from failed installation, 1-6 removing card and configuration, 1-5 removing from system, 1-6 Slot command to temporarily down, 1-4 software images stored on flash card, 2-16 T1, T3 administering, 1-18 type reported by Show command, 1-3 viewing clock source for, 1-5 viewing information about particular card, 1-3 viewing installed, 1-1 viewing status of, 1-2 Slot command to temporarily down a slot card, 1-4 using, 1-4 Slot-Info profile, using, 7-8 Slot-State profile, using, 7-8 SNMP See also SNMPv3 access and security overview address security, 6-32 Ascend MIB, 6-22 Ascend MIB hierarchy, 6-50 Ascend MIB support, 6-22 classes of traps generated, 6-47 community string for SNMP PDU, 6-47 community strings, 6-31 configuration, 6-31 DS1 MIB, 6-2 DS3 MIB, 6-2 enabling access to the unit, 6-31 engine groups, 6-13, 6-14
S
Screen command, status window length and, 2-24 scripts, configuring APX 8000 with, 2-28 Secure Access Firewall, Syslog messages initiated by, B-8 security changing Admin password, 2-2 overview of SNMP Read-Access-Hosts, 6-33 securing the serial port, 2-2 Write-Access-Hosts, 6-33 Security-Level parameter, 6-17 serial number, viewing, 4-39 serial port, securing, 2-2 serial WAN card displaying information, 1-7 Service Management MIB, APX 8000 support, 6-30 session IDs, specifying base for, 2-26 Session MIB, APX 8000 support, 6-30 sessions annotated PPP traces, C-2 debugging Telnet, 4-43 displaying information about using Finger, 2-33 displaying packets for particular session, 4-47 displaying setup messages, 4-50 displaying user information, 2-30 example of MPP negotiation, C-5 logging out idle, 5-8 opening with slot card, 1-3 PPP info, 4-32 PPP state information, 4-33
Index-10
Index S Frame Relay MIB, 6-2 host to receive traps, 6-46 If-Admin command, 6-48 individual trap support on APX 8000, 6-34 initiating interface changes, 6-49 interacting with manager utilities, 6-1 interface numbers, 7-2 interfaces allocated at startup, 7-2 managing interfaces, 6-48 managing SNMP interfaces, 7-2 Modem MIB, 6-2 Read-Access-Hosts, 6-33 resetting interface table, 6-49 sample profile, 6-32 setting up traps, 6-33 TAOS unit support, 6-1 trap configuration, 6-46 trap example, 6-47 trap support on APX 8000, 6-34 traps, defined, 6-33 Write-Access-Hosts, 6-33 SNMP AuthPass command, 6-11 SNMP interface table, how built, 6-49 SNMP PrivPass command, 6-11 SNMP profile configuration overview, 6-31 displaying contents, 6-31 example configuration, 6-32 SNMP security configuration profiles Security-Level, 6-7 SNMP-Message-Type, 6-7 SNMP-Message-Type parameter, 6-7 SNMPv3 notifications, 6-17 SNMPv3-Notifications profile, 6-18 User-based Security Model, 6-14, 6-17 SNMPv3-USM-User configurable parameters Active-Enabled, 6-16 Auth-key, 6-16 Auth-Protocol, 6-16 Name, 6-16 Priv-key, 6-16 Priv-Protocol, 6-16 Read-Write-Access, 6-16 SNTP command, using, 4-40 software loading for new cards, 2-19 loading for specific card, 2-18 slot card stored on flash card, 2-16 upgrading system, 2-18 StackLimit command, using, 4-40 state changing device, 1-4 changing slot card, 1-4 static routes adding to routing table, 3-7 IPX, 3-32 statistics getting DS1, 1-21, 1-22 status, 7-10 channel status codes, 1-9 checking T1, 7-10 checking T1 channels, 1-20 checking UDS3, 7-11 connections, 2-22 displaying modem, 1-31 displaying serial WAN, 1-7 displaying T3, 1-7 displaying UDS3, 1-28 displaying WAN, 1-7 general information, 2-23 line status, 1-7 log messages, 2-23 T1 card, 1-8 T3 card, 1-8 User profiles, and, 5-6, 5-7 WAN lines, 1-8 status window commands for, 2-21 connection information, 2-22 connections, 2-22 default contents of, 5-7 default size, 5-7 defining contents, 2-21 described, 2-22 displaying, 2-21 displaying upon login, 5-2 general, 2-23 information displayed in for User profile, 5-6 length, 2-24 line status, 1-7 log, 2-23 navigating, 2-21 opening and closing, 2-22 vt100 requirement, 2-21, 5-6 WAN line information in, 2-24 Syslog configuring, 2-25 configuring APX 8000 to interact with, 2-27 configuring daemon, 2-28 DNIS and CLID information in, B-8 end of call information for, B-7 forwarding call info to when call terminates, 2-27 messages, B-6 messages initiated by Secure Access Firewall, B-8 specifying remote port, 2-27 Syslog host, see Log profile system checking power supplies, 2-28 configuration stored in NVRAM, 2-12 configuring with a script, 2-28
Index-11
Index T displaying revision, 4-45 displaying uptime, 2-8, 4-45 removing slot card, 1-6 removing slot card from, 1-5 resetting, 2-13, 4-38 restoring configuration from a local file, 2-20 restoring configuration from a network host, 2-20 saving configuration to a local file, 2-19 saving configuration to a network host, 2-20 setting date and time, 2-12 updating with hash codes, 4-46 version, 2-9 viewing installed slot card, 1-1 system administration allowing remote management, 2-21 core dumps, A-1 device state changes, 1-31 devices, managing, 7-7, 7-8 displaying the contents of flash, 2-16 displaying the system version, 2-9 file system checking a flash card, 2-17 log messages, 2-25 logging in as Admin, 2-2 logging in with Admin User profile, 2-2 network overview, 3-1 overview, 2-1 quiescing modems, 1-32 quiescing T1 lines (in T3 card) or channels, 1-19 quiescing T1 lines or channels, 1-19 session IDs, 2-26 setting a system name, 2-11 slot cards, managing, 7-7, 7-8 SNMP interfaces, 6-48, 7-2 system-level commands, 2-4 TCP/IP, 3-1 system options, displaying, 2-9 System permission level, explained, 2-4 System profile allowing remote management, 2-21 setting a system name, 2-11 setting session ID base, 2-26 system software, after upgrade if slot card does not come up, 1-6 system software, upgrading, 2-18 system status, 2-23 System-level commands described, 2-4 permissions needed to use, 5-4 checking status of, 1-20 monitoring on T1 card, 1-20 quiescing, 1-19, 1-20 T1 lines checking status of, 7-10 configuring via SNMP, 6-2 displaying clock source information, 2-13 displaying status of on T3 card, 7-10 getting diagnostics for, 1-21 monitoring performance (FDL), 1-20 quiescing, 1-19 quiescing and switch types, 1-19 quiescing ISDN PRI, 1-19 T1Channels command using, 1-20 using on T3 card, 1-20 T1-Stat profile T3 card and,, 7-10 using, 7-10 T1-Stats command, using, 1-21, 1-22 T3 alarms, displaying, 1-25 T3 card displaying status of T1 lines, 7-10 displaying status of unchannelized lines, 7-11 getting DS1 diagnostics for, 1-21 opening session with, 1-25 using the DS3Link command, 1-25 using theT1Channels command, 1-20 T3 lines C-bit parity and, 1-25 configuring via SNMP, 6-2 displaying status of, 1-7 enabling external loopback, 1-26 enabling internal loopback, 1-26 enabling loopback , 1-26 getting diagnostics for, 1-25 tables, routing and interface, 3-5 Tag parameter, 6-16 TAOS unit displaying enabled features, 2-9 logging in, 2-2 resetting, 4-38 serial number of, 4-39 SNMP support, 6-1 system administration overview, 2-1 upgrading system software, 2-18 TCP, displaying information about, 3-10 TCP/IP, system administration for, 3-1 TDM bus setting up and querying, 4-41 test, 4-42 testing, 4-41 TDM command using, 4-41
T
T1 card opening session to, 1-21 T1 channels
Index-12
Index U TDMtst command using, 4-42 Telnet command, using, 3-13 Telnet, debugging, 4-43 TelnetDebug command, using, 4-43 Terminal-Server, permissions needed to use, 5-4 Term-Serv permission level, explained, 2-4 time, setting system, 2-12 timeouts, specifying idle, 5-8 timer, for dialout calls, 2-37 TNTMP command, 4-44 TraceRoute command, using, 3-8 traces, annotated, C-2 transient interface, defined, 4-17 Trap profile displaying contents, 6-33 example configuration, 6-47 traps Ascend enterprise, 6-31 configuration overview, 6-46 example of, 6-47 setting up, 6-33 support for individual on APX 8000, 6-34 support on APX 8000, 6-34 See Also. SNMP trigger events, for core dumps, A-4 TSshow command, using, 4-45 TunnelDebug command, using, 4-45 tunneling ATMPdebug command, 4-9 displaying setup messages, 4-45 DTunnel command, 4-11 TunnelDebug command, 4-45 TunnelSlot command, 4-46 TunnelSlot command, using, 4-46 Type parameter, 6-16 UDS3Dump command, using, 1-29 UDS3Lines command, using , 1-28 UDS3-Stat profile, using, 7-11 Update command, using, 4-46 Update commands, permissions needed to use, 5-4 Update permission level, explained, 2-4 Update-level commands, Reset, 4-39 upgrade, if slot card does not come up after, 1-6 uptime displaying, 2-8 displaying system, 4-45 User permission level, explained, 2-4 User profiles customizing environment of, 5-6 default password for Admin, 2-2 determining current, 5-9 example configuration, 5-5 information displayed in status window for, 5-6 log levels for, 5-8 logging in as different user, 2-2 logging in using, 5-6 logging in using different, 5-8 name and password, 5-2 parameters described, 5-2 permission levels, 2-3 permission levels for, 5-3 pre-defined, 5-1 restoring default due to inactivity, 5-8 samples, 5-5 specifying system prompt for, 5-6 status information settings, 5-6 status window settings, 5-7 status windows and log messages, 5-2 user name as prompt, 5-2 user session information, displaying, 2-30 username and password, requiring for serial port, 2-2 users displaying active, 2-30 displaying information about using Finger, 2-33 displaying packets for session, 4-47 terminating sessions, 2-31 Userstat command configuring format of output, 2-31 using, 2-30 using to display active users, 2-30
U
UDP ports for core dump, A-4 information about, 3-10 UDS3 displaying status, 1-28 lines, displaying, 1-28 statistics, displaying, 1-29 UDS3 card administering, 1-28 monitoring, 1-28 UDS3 lines, displaying status of on UDS3 card, 7-11 UDS3 Profile MIB, APX 8000 support, 6-30
V
validation Lanval command, 4-20 requests for, 4-20 Version command, using, 2-9
Index-13
Index W
W
WAN displaying counters of events, 4-49 displaying events for, 4-48 displaying packets, 4-47 displaying packets during connection setup, 4-50 WANtoggle command, 4-51 WAN Dialout MIB, APX 8000 support, 6-30 WAN lines displaying status of, 1-7 information about, 2-24 status codes, 1-8 WANdisplay command stopping output, 4-47 using, 4-47 WANdsess command, using, 4-47 WanEventsStats command, 4-48 WANopening command, using, 4-50 WANtoggle command, using, 4-51 warning messages definition of , B-3 format of, B-1 Write command, -f forces change, 2-29
Index-14