Nortel Versalar 15000 Troubleshooting Manual
Nortel Versalar 15000 Troubleshooting Manual

Nortel Versalar 15000 Troubleshooting Manual

Switch router
Hide thumbs Also See for Versalar 15000:
Table of Contents

Advertisement

Quick Links

Managing and Troubleshooting
the Versalar Switch Router 15000
Carrier Networking Services
V15K_1.3.0.0
Part No. 302768-C Rev 00
March 2000
4401 Great America Parkway
Santa Clara, CA 95054

Advertisement

Table of Contents
loading

Summary of Contents for Nortel Versalar 15000

  • Page 1 Managing and Troubleshooting the Versalar Switch Router 15000 Carrier Networking Services V15K_1.3.0.0 Part No. 302768-C Rev 00 March 2000 4401 Great America Parkway Santa Clara, CA 95054...
  • Page 2: Restricted Rights Legend

    Nortel Networks NA Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
  • Page 3 Software is provided will be free from defects in materials and workmanship under normal use for a period of 90 days from the date Software is first shipped to Licensee. Nortel Networks will replace defective media at no charge if it is returned to Nortel Networks during the warranty period along with proof of the date of shipment.
  • Page 4 Licensee will immediately destroy or return to Nortel Networks the Software, user manuals, and all copies. Nortel Networks is not liable to Licensee for damages in any form solely by reason of the termination of this license. 8. Export and Re-export. Licensee agrees not to export, directly or indirectly, the Software or related technical data or information without first obtaining any required export licenses or other governmental approvals.
  • Page 5: Table Of Contents

    Text Conventions ...xvi Acronyms ...xvii Hard-Copy Technical Manuals ...xix How to Get Help ... xx Chapter 1 Introduction What Is the Versalar 15000? ...1-1 Management Features ...1-3 BCC ...1-3 Accounting ...1-3 Performance Monitoring and Troubleshooting ...1-4 Fault Management ...1-4 Packet Capture ...1-5...
  • Page 6 - Save the current software configuration to a file ...2-13 type - Display the Contents of a File ...2-14 Chapter 3 Gathering Traffic Statistics for Customer Billing Introduction to Versalar 15000 Billing ...3-1 Traffic Snapshots ...3-2 Displaying Accounting Data and Traffic Statistics ...3-2 Sample show Command Sessions ...3-3 Retrieving the Accounting Data File ...3-9...
  • Page 7 Displaying the Software Version ...5-8 Verifying and Upgrading Software ...5-8 Validating an Executable File ...5-9 Upgrading and Verifying a PROM ...5-12 Upgrading PROMs Remotely ...5-12 Determining Current PROM Image Versions ...5-13 Using the prom Command ...5-13 Viewing the Load Address and Size of an Application ...5-15 Resetting the Date and Time ...5-17 Testing a Remote Device for Accessibility ...5-18 Ping Messages ...5-19...
  • Page 8 Configuring BERT Testing ...6-13 Selecting a BERT Pattern for a Channel ...6-14 Selecting the Type of BERT Error to Insert on a Channel ...6-15 Selecting the Type of Alarm Signal to Be Generated in BERT Mode ...6-15 Starting or Stopping BERT on a Channel ...6-16 Resetting Local BERT Counters for a Channel ...6-16 Viewing BERT Results ...6-16 Specifying the Alarm Logging Delay ...6-17...
  • Page 9 Configuring the Direction of the Packets to Be Copied ...8-11 Configuring a Termination Trigger ...8-12 Assigning Filters ...8-13 Setting the Filter Response to a Match ...8-14 Specifying the String to Compare with the Packet Data ...8-15 Specifying the Data to Compare with the String ...8-15 Specifying the Reference ...8-15 Specifying the Offset ...8-16 Specifying the Number of Bytes ...8-16...
  • Page 11 Figure 2-1. Sample dinfo Display ...2-6 Figure 2-2. Sample NVFS Directory Listing ...2-7 Figure 3-1. Data File ...3-10 Figure 3-2. Data File Header Fields ...3-11 Figure 3-3. Table of Contents Format ...3-13 Figure 3-4. Data Record Format ...3-14 Figure 5-1. Sample Response to the readexe Command ...5-10 Figure 5-2.
  • Page 13 Table 2-1. NVFS Commands ...2-3 Table 3-1. Data File Header Fields ...3-11 Table 4-1. Log Command Options ...4-3 Table 7-1. CAP and ATP Slot Connections ...7-5 Table 8-1. BCC Packet Capture Parameters ...8-26 302768-C Rev 00 Tables xiii...
  • Page 15: Preface

    Before using this guide, you must complete the following procedures. For a new Versalar 15000: • Install the Versalar 15000 and connect it to the network (see Installing and Maintaining the Versalar Switch Router 15000). • Develop a working knowledge of the BCC and Differentiated Services for the Versalar Switch Router 15000 and the Quick Reference for the Versalar Switch Router 15000).
  • Page 16: Text Conventions

    Text Conventions This guide uses the following text conventions: angle brackets (< >) bold text braces ({}) brackets ([ ]) ellipsis points (. . . ) Indicate that you choose the text to enter based on the description inside the brackets. Do not type the brackets when entering the command.
  • Page 17: Acronyms

    italic text screen text vertical line ( Acronyms This guide uses the following acronyms: ANSI BERT BootP 302768-C Rev 00 Indicates file and directory names, new terms, book titles, and variables in command syntax descriptions. Where a variable is two or more words, the words are connected by an underscore.
  • Page 18 CSMA/CD DLCMI FEAC FIFO HDLC ICMP ISDN ITU-T MDI-X NBMA xviii customer installation committed information rate customer premise equipment carrier sense multiple access/collision detection discard eligible data link control management interface domain name service data path interconnect digital service level 3 frame check sequence facilities data link far-end alarm and control...
  • Page 19: Hard-Copy Technical Manuals

    NVFS OC-3 OSPF PCAP PRMs QRSS SMDS SNMP TFTP Hard-Copy Technical Manuals You can print selected technical manuals and release notes free, directly from the Internet. Go to support.baynetworks.com/library/tpubs/. Find the product for which you need documentation. Then locate the specific category and model or version for your hardware or software product.
  • Page 20: How To Get Help

    The “Technical Manuals” section lists available printed documentation sets. How to Get Help If you purchased a service contract for your Nortel Networks product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller for assistance.
  • Page 21: Introduction

    The Versalar 15000 is the first Internet aggregation router designed to address the needs of next-generation service provider networks. Its extremely high port density provides access, traffic management, and accounting information for over 1000 simultaneous IP sessions.
  • Page 22 N x 54/64 Kb/s fractional T1, 1.544 Mb/s T1, and 45 Mb/s T3. The Versalar 15000 combines the reliability and service of conventional layer 2 switches with the routing and control of layer 3 devices to provide the following capabilities (per DC-optimized chassis): •...
  • Page 23: Management Features

    Management Features You can configure and manage the Versalar 15000 from any node on the network or, remotely, over a dial-up connection. Configuring Management and Differentiated Services for the Versalar Switch Router 15000 describes how to customize your configuration; this guide describes the system management functions in more detail.
  • Page 24: Performance Monitoring And Troubleshooting

    Simplified Network Management Protocol (SNMP). With its quality of service (QoS) classification and traffic management features, the Versalar 15000 provides complete and accurate accounting for all traffic in and out of the system. Thus, service providers can create usage-based billing records for each customer as well as monitor service level agreements (SLAs).
  • Page 25: Packet Capture

    Introduction Packet Capture You use packet capture to troubleshoot network problems such as protocol interoperability with other equipment, to verify customer premise equipment (CPE) filters, and to diagnose problems with the exterior gateway protocols used with the CPE. For more information about packet capture, see Chapter 8, “Troubleshooting with Packet Capture.”...
  • Page 27: Managing Files

    This chapter explains how to manage the nonvolatile file system (NVFS) files and covers the following topics: Topic File Systems Naming Files: Rules and Conventions File System Commands cd - Change the Active Volume compact - Compact File Space cp - Copy a File dinfo - Display the Status of All Memory Cards dir - Display a Directory format - Format a Memory Card...
  • Page 28: File Systems

    File Systems The Versalar 15000 uses an NVFS consisting of one or more flash memory cards. Each flash memory card is an NVFS volume. The NVFS on the router reads and writes to one or more memory cards. Note: The NVFS automatically mounts and unmounts memory cards.
  • Page 29: File System Commands

    • Use the .cfg file extension for alternative configuration files. The default configuration file is config. • Use the .log file extension for log files. File System Commands Table 2-1 lists the NVFS commands. The Wildcard column indicates whether you can use wildcards ( display multiple file names, and to copy or delete multiple files.
  • Page 30: Cd - Change The Active Volume

    cd - Change the Active Volume To change the active volume, use the cd <vol> : is the slot number of the volume. The system displays the new active volume. If you enter the present working directory, as follows: bcc> Present Working Directory: 9: compact - Compact File Space Data is written sequentially to the memory cards from lower to higher memory...
  • Page 31: Cp - Copy A File

    Managing Files The following message appears: Compacting file system on volume <vol>:... This may take several minutes...Please wait... 100% Complete Compaction completed The space is compacted when the BCC prompt reappears cp - Copy a File To make a copy of a file on the same volume or to another volume on the router, use the command.
  • Page 32: Dinfo - Display The Status Of All Memory Cards

    dinfo - Display the Status of All Memory Cards To display the status of all memory cards currently installed in the router, enter the command. dinfo memory cards installed in slots 9. $ dinfo Figure 2-1. command displays the following data: dinfo Vol: Slot number where the memory card is currently installed.
  • Page 33: Dir - Display A Directory

    dir - Display a Directory To display a list of the files on a volume, use the To list the files stored on the active volume, enter: To list all files stored on a specific volume, enter: dir <vol> : is the slot number containing the volume.
  • Page 34: Format - Format A Memory Card

    - Transfer a File You can transfer (copy) files between Nortel Networks routers and remote workstations using either of two methods: •...
  • Page 35: In-Band File Transfers

    You can use a remote PC or UNIX workstation to transfer files in-band or out-of-band. In-Band File Transfers command invokes the TFTP software to transfer a file between a Nortel tftp Networks router and another router or host. Caution: You cannot use ftp or tftp client to transfer files to or from the router;...
  • Page 36 Enter the following commands to transfer a file from the BCC: tftp get <host_address> <remote_vol> tftp put <host_address> <local_vol> to transfer the file to the local Versalar 15000 and use file to a remote node. host_address remote_vol is the volume number on the remote host.
  • Page 37 The system executes one TFTP request at a time for the duration of the file transfer. The destination system stores the file under the name you specify. If you do not enter a destination name, the system defaults to the source file name. Examples tftp put 192.32.1.62 9:config2.cfg 10:newconf...
  • Page 38: Transferring A File To A Full Memory Card

    Transferring a File to a Full Memory Card If you attempt to transfer a file to a memory card that does not have enough space, the name of the file with a length of 0 bytes appears in the memory card’s directory.
  • Page 39: Save - Save The Current Software Configuration To A File

    save - Save the current software configuration to a file To save either the the current software configuration to a config file or to save events to a log file, use the To save the current software configuration to a config file: save config <vol>...
  • Page 40: Type - Display The Contents Of A File

    type - Display the Contents of a File To display the contents of an ASCII file, use the displaying a file, you can enable the a time. To display a file, enter the following command: type [ -x ] <vol> is an optional argument to display the file in hexadecimal format.
  • Page 41: Gathering Traffic Statistics For Customer Billing

    This chapter describes how the Versalar 15000 gathers traffic statistics for use in billing customers. The following topics are included: Topic Introduction to Versalar 15000 Billing Displaying Accounting Data and Traffic Statistics Retrieving the Accounting Data File Interpreting Billing Data...
  • Page 42: Traffic Snapshots

    The data consists of various packet and octet counts. For each service class, the Versalar 15000 stores counters for inbound traffic; below CIR, above CIR, and above BR packets and octets. For outgoing traffic, only total octet and packet counts per service class are kept.
  • Page 43: Sample Show Command Sessions

    To show summary information about configured interfaces and queues, enter: show accounting interface summary [-package <name> ] [-queue <name> ] OR - (assuming show accounting interface summary [ <interface_name> ] To show statistics gathered for configured interfaces and queues, enter: show accounting interface stats [-package <name>...
  • Page 44 3-9 and Configuring Management and Differentiated Services for the Versalar Switch Router 15000 for more information. Example 2 In the following example, you use the configured for this Versalar 15000. show accounting rules bcc> Accounting Data Collection Rules Name...
  • Page 45 Example 4 In this example, you display information about all configured interfaces and queues used for accounting. This command option provides information about which rules relate to each interface and queue. show accounting interface summary bcc> Accounting Interface Summary Interface int1 int1 int2...
  • Page 46 Example 7 In this example, you display summary information for show accounting interface summary -queue queue1 bcc> Accounting Interface Summary Interface int1 int2 Example 8 To display all packet and octet statistics collected for configured interfaces and queues, use the following command: show accounting interface stats bcc>...
  • Page 47 Note that if the interface is not working when you request statistics, the word down appears in the output to indicate that no statistics are available. int1 pkg1 If the interface was not working during the current interval, but is now back up when you request statistics, the word partial appears.
  • Page 48 Example 10 To filter on the service package name for statistics, use the following command: show accounting interface stats -package pkg4 bcc> Accounting Interface Statistics Service Queue Package int2 pkg4 queue int2 pkg4 queue Example 11 To filter on a particular queue name for statistics, use the following command: show accounting interface stats -queue queue2 bcc>...
  • Page 49: Retrieving The Accounting Data File

    Gathering Traffic Statistics for Customer Billing Retrieving the Accounting Data File The accounting data file can be retrieved directly from local memory using FTP or TFTP, the command, and the special file name BAYACCTG. The accounting data appears as a file, so you can retrieve it without first saving it to the file system.
  • Page 50: Interpreting Billing Data

    Interpreting Billing Data In the accounting data file, billing data records are organized into a binary data file. The file format consists of a file header and a sequence of accounting data records, which contain resource usage statistics for each access interface. Figure 3-1 shows the composition of the data file.
  • Page 51: Data File Header

    A 4-byte platform ID that identifies the type of router as a Versalar 15000 The 4-byte mid-plane serial number of the Versalar 15000 that created the data file A 1-byte field that is incremented each time the data file format is...
  • Page 52: Table Of Contents

    Table 3-1. Field Software version A 1-byte field followed by a string field with the following format: Timestamp (High) Timestamp (Low) File size Authentication type Authentication info * The platform ID and system ID can be used to uniquely identify which router generated the data in a network.
  • Page 53: Data Records

    Number of records String length Interface name Offset . . . String length Interface name Offset Figure 3-3. Note: The entries in the table of contents, and therefore the data records themselves, are organized by circuit number. Data Records The list of data records containing resource usage statistics per access interface (for queues applied through service packages) appears after the table of contents.
  • Page 54: Figure 3-4. Data Record Format

    Record header Data associated with first queue Data associated with next queue Figure 3-4. 3-14 Record length Number of queues Service package name length Service package name Queue Queue name length header Queue name Snapshots Timestamp High/Timestamp Low Bitmask Octets received below CIR Octets received above CIR Octets received above BR Snapshot 1...
  • Page 55 Each individual snapshot contains the following fields: • Timestamp (High): The high 32 bits of a 64-bit timestamp that describes when the data snapshot was taken in the number of seconds since Jan. 1, 1970, 00:00 (GMT) • Timestamp (Low): The low 32 bits of a 64-bit timestamp that describes when the data snapshot was taken in the number of seconds since Jan.
  • Page 57: Managing Events

    When you hot-swap an SSP card, the events clear from that card only. Note: It is crucial to save the event log in case you need to provide it to Nortel Networks personnel for troubleshooting. See the section Log”...
  • Page 58: Introduction To Event Logging

    Introduction to Event Logging Each card in the router (for example the forwarding processor cards) can generate event messages that are entered into an event log. The SSP cards process and store event log messages. The primary, active SSP stores all log messages generated by the cards.
  • Page 59: Applying Write Filters To The Event Log

    Applying Write Filters to the Event Log During normal operation, the event log captures all event messages generated internally by the router. However, for troubleshooting purposes only, you can use command to: • Include specific event messages in the event log. •...
  • Page 60: Displaying Active Write Filters

    W for warning • d or D for debug (Debug events are for use and interpretation by Nortel Networks Technical Solutions Center personnel only.) You can specify in the same more severity codes. Specifies the number of the slots for which the <slot_number>...
  • Page 61: Applying Read Filters To The Event Log

    The system displays the events by type. The severity codes are for trace, only for Nortel Networks Technical Solutions Center personnel.) slot_ID is the number of the slot containing an SSP. The system displays the events associated with the processor.
  • Page 62 enables continuous polling of the system’s event log to display new event rate messages. The value by entering a rate in seconds. The system displays the events that occur between polling intervals. code_no. is an event code number or a range of event code numbers. The system displays the events associated with the specified event code.
  • Page 63: Saving The Event Log

    : command) to determine the file names dir <vol> already in use. Note: It is crucial to save the event log in case you need to provide it to Nortel Networks personnel for troubleshooting. To save events to a file, enter the following command: save log <vol>...
  • Page 64: Displaying An Event Log File

    Examples save log 9:events_10_12.log save log 9:events_10_12.log -d10/12/98 save log 9:temp.log -t09:02:00 save log 10:tftp.log -eTFTP save log 10:snmp.log -eSNMP -ftf save log 9:slot10.log -s10 Displaying an Event Log File You can use the display a log file, enter the following command: <vol>...
  • Page 65: Clearing Events From Memory

    For a description of the optional arguments, see Messages” on Examples log 9:events_10_12.log log 9:events_10_12.log -eTFTP log 9:events_10_12.log -eSNMP -ftf log 9:events_10_12.log -s10 Clearing Events from Memory The log, if it were to fill, wraps to the beginning and overwrites entries from beginning to end.
  • Page 66 Examples clearlog clearlog 9 clearlog 9-10 clearlog 9,10 4-10 Clears all events from memory Clears all events from the slot 9 event buffer Clears all events from the event buffers on slots 9 and 10 Clears all events from the event buffers on slot 9 and then slot 10 302768-C Rev 00...
  • Page 67: Managing The Versalar 15000

    You use the BCC to perform the following Versalar 15000 system administration tasks: Topic Booting the Router Restarting a Slot Resetting a System or Slot Displaying the Software Version Verifying and Upgrading Software Validating an Executable File Upgrading and Verifying a PROM...
  • Page 68: Booting The Router

    Booting the Router The BCC provides the following commands for booting: • boot on the front panel of the router initiates the same procedure. You can override the default router software image and configuration by specifying an alternative router software image and an alternative configuration file when entering the •...
  • Page 69 If the LED turns amber, it means that diagnostics have failed, while a solid green light means that diagnostics have passed. See Installing and Maintaining the Versalar Switch Router 15000 for more details on SSP card and IFP card LEDs.
  • Page 70: Using The Boot Command

    Using the boot Command Use the boot software image and configuration file when entering the system boots from the default image (for example, v15k.exe) and configuration file (config). Caution: You should have only one version of the config file on the router. To ensure this, assign new names to alternative versions of the configuration file.
  • Page 71 When the source of the default image or configuration file is a network, enter only a dash ( ) to indicate no volume for the router software image or configuration file. If you enter anything else, the BCC displays an error message. The software image and configuration file revert to their default file name after every boot.
  • Page 72: Restarting A Slot

    Examples restart restart 1 restart 1-5 restart 4,6 command allows you to restart the Versalar 15000 image currently in Restarts the entire system Restarts slot 1 Restarts slots 1, 2, 3, 4, and 5 Restarts slots 4 and 6 restart...
  • Page 73: Resetting A System Or Slot

    Resetting a System or Slot command allows you to reset one or more slots and use the currently reset active software image. To reset one or more slots, enter the slot number or numbers after the arguments, the router will reboot, using the default router software image and configuration;...
  • Page 74: Displaying The Software Version

    Displaying the Software Version Enter stamp was created. Verifying and Upgrading Software The BCC provides the following commands for verifying and upgrading executable software: • readexe executable files on the file system, verifies that the checksums match those within the files, and displays the results and all file header information. Use this command to validate executable files before upgrading.
  • Page 75: Validating An Executable File

    For information on how the router boots and uses images, see the section the Router Boots” on To upgrade with a new image, transfer the image to the file system and reset the system; do not use the software image. Note: You cannot edit image files.
  • Page 76: Figure 5-1. Sample Response To The Readexe Command

    readexe 9:v15k.exe Processing contents of ‘9:v15k.exe’... - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- Module name: krnl_v15k.exe - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Validating header checksum...
  • Page 77 -- Revision: Indicates the software release. -- Last Modified: Indicates the day, date, and time of the software release. -- File type: Indicates that the file is executable. -- Tool name: For Nortel Networks use only. Examples readexe sspdiag.ppc readexe 9:sspboot.ppc...
  • Page 78: Upgrading And Verifying A Prom

    Upgrading and Verifying a PROM To upgrade or verify the software on a diagnostic or bootstrap PROM, use the command. You must be logged in as “Manager” to run the prom If a software release includes a PROM software upgrade, see the upgrade documentation shipped with the software for instructions on upgrading the PROMs on your router.
  • Page 79: Determining Current Prom Image Versions

    Determining Current PROM Image Versions To decide whether or not you need to upgrade the PROMs in a router, you need to determine the versions of boot and diagnostics PROM images currently running in that router. To determine the version number of the PROM images, start a Telnet session with the router, and enter the following command at the BCC prompt: show hardware prom Each line of response to the command specifies:...
  • Page 80 Update the boot PROM by entering: prom -w <volume_no.> volume_no. verify or update the PROM defined by Boot_PROM_source_file verify or update the PROM defined by is the slot that contains the boot PROM that is being verified or slot ID updated.
  • Page 81: Viewing The Load Address And Size Of An Application

    If the operation fails, the console displays a message describing the cause of the failure. Examples prom -v 9:sspdiag.ppc 10 prom -w 9:bacboot.exe 10 Any one of the following: prom -w 9:sspdiag.ppc 9, 10 prom -w 9:sspdiag.ppc 9 10 prom -w 9:sspdiag.ppc 9-10 Viewing the Load Address and Size of an Application loadmap dynamically loadable application.
  • Page 82 If you enter the writes the addresses and sizes of all applications on all slots to the specified file. If you do not specify a destination file name, the system displays the addresses and sizes of the applications on the screen. Examples loadmap loadmap 9...
  • Page 83: Resetting The Date And Time

    Managing the Versalar 15000 Resetting the Date and Time command allows you to display or change the system date, time, or time date zone offset. The time is based on the 24-hour clock. The offset is the time difference between the current time and Greenwich mean time (GMT).
  • Page 84: Testing A Remote Device For Accessibility

    Examples date date 03/10/00 16:02 date 03/10/00 16:02 -5 Testing a Remote Device for Accessibility command allows you to test whether or not a remote device running IP ping is reachable. When you issue the Internet Control Message Protocol (ICMP) echo request to the remote IP address that you specify.
  • Page 85: Ping Messages

    • An “ICMP host unreachable from y.y.y.y” message: This message appears if the Versalar 15000 or the remote router whose address is y.y.y.y cannot forward the ping request any further along the path to the target device. A sample message follows, where 192.32.243.1 is the address of the ICMP host: ping: ICMP host unreachable from 192.32.243.1...
  • Page 86 Examples ping 192.32.1.151 ping 192.32.13.200 -p ping 192.32.1.151 -t3 -r8 -s62 ping 192.32.1.151 -v 5-20 Pings the device at IP address 192.32.1.151 and waits up to 5 seconds (default) for a response. The console displays one of the following messages: ping: 192.32.1.151 is alive (size = 16 bytes) ping: 193.32.1.151 does not respond ping: ICMP host unreachable from 192.32.243.1...
  • Page 87: Monitoring Ip Routes

    Monitoring IP Routes show ip sources: • Main routing table for any slot • Internal cache for any slot • Routing cache for a specific logical interface • Multicast routes cache You choose the source by specifying a subcommand in the command line. You can also selectively filter the data by specifying one or more options in the command line.
  • Page 88: Bgp Route Tables

    Example (IP Routes) To display the table of IP routes, enter the following command: show ip routes bcc> show ip routes Destination/Mask 1.1.1.0/24 192.32.0.0/16 192.32.6.0/24 Total Networks on Slot 10= 3 Data from the exist in the complete table of IP routes. To view the complete table, including inactive and unused routes, use the BGP Route Tables show bgp routes...
  • Page 89 To learn more about any question mark ( show bgp routes ? bcc> Usage: show bgp routes [options] Where options is any of : <ip_address> <ip_address/ prefix> Example To display BGP routes for all BGP peers, use the follows: show bgp routes bcc>...
  • Page 90 9.2.0.0/16 As Path: <762 1326 1673 1675> 9.20.0.0/17 As Path: <762 1326 1673 2685 2686> 10.0.0.0/8 As Path: <762> 12.0.0.0/8 As Path: <762 1326 1673 1 7018> 12.2.97.0/24 As Path: <762 1326 1673 701 7260 10656> 12.3.63.0/24 As Path: <762 1326 1673 1 7018 11383> 12.3.123.0/24 As Path: <762 1326 1673 6461 4969 2033>...
  • Page 91: Monitoring And Troubleshooting

    The Versalar 15000’s comprehensive monitoring and troubleshooting capabilities allow you to identify potential system problems. Discussed here are the facilities data link (FDL), Operations and Management (OAM), loopback detection and testing, and BERT. Topic Configuring the T1 FDL Channel Changing ATM PVC OAM Parameters...
  • Page 92: Configuring The T1 Fdl Channel

    Configuring the T1 FDL Channel On the Versalar 15000, the FDL feature provides a mechanism that lets you monitor T1 performance data. Note that if you use the default setting esf as the Framing parameter value, the associated T1 or FT1 channel uses FDL to receive performance data from either the subscriber or carrier.
  • Page 93: Specifying Fdl Performance Messages Sent To Another Device

    Specifying FDL Performance Messages Sent to Another Device You can specify the source of send performance messages (either subscriber or carrier) for the Versalar 15000. To do so, go to the T1 or FT1 prompt (for example, t1/2/1/4 ft1/2/1/5 send-prm-cr-address-bit prm-{ci (the default setting) specifies the customer installation (CI) as the source of PRMs.
  • Page 94: Specifying The Fdl Target Address Mode

    Specifying the FDL Target Address Mode The Versalar 15000 uses the fdl-target-hdlc-address parameter to address the CI terminal equipment (TE) when sending maintenance messages. You set this parameter to match the TE target unit address. To do so, go to the T1 or FT1 prompt (for example,...
  • Page 95: Enabling Or Disabling Loop Retention Detection And Interframe Fill

    Enabling or Disabling Loop Retention Detection and Interframe Fill By default, the Versalar 15000 neither detects nor transmits loop retention signals. To enable (or again disable) loop retention signals, go to the T1 or FT1 prompt (for example,...
  • Page 96: Clearing Local Fdl Statistics For A Channel

    Changing ATM PVC OAM Parameters On the Versalar 15000, Operations and Management (OAM) provides a mechanism by which ATM devices can receive prompt notification of permanent virtual circuit (PVC) failures. OAM uses special loopback cells or alarms to detect PVC failures.
  • Page 97: Specifying The Oam Loopback Cell Interval

    To enable OAM loopback for a PVC, navigate to the PVC prompt (for example, box; atm/11/1; pvc-service/boston; pvc/11/1/0/32 pvc-service/boston; pvc-group/boston/group1; pvc/11/1/0/32 oam-loopback enabled For example, the following command enables OAM loopback on PVC 11/1/0/32: pvc/11/1/0/32# pvc/11/1/0/32# Specifying the OAM Loopback Cell Interval The OAM loopback cell interval specifies how often the ATM PVC sends OAM loopback cells in the data stream.
  • Page 98: Disabling Oam Loopback

    To set the OAM down threshold for a PVC, navigate to the PVC prompt (for example, box; atm/11/1; pvc-service/boston; pvc/11/1/0/32 pvc-service/boston; pvc-group/boston/group1; pvc/11/1/0/32 oam-down-threshold <integer> integer is the minimum number of OAM cells for which a PVC does not receive an OAM loopback response before the ATM service record declares the PVC not operational.
  • Page 99: Enabling Or Disabling Oam Alarm Notification

    Fractional loopback is the transmission of ANSI-standard 127-octet loop code through a fractional T1 (FT1) link to a device that returns the code to the sender. The Versalar 15000 detects and generates FT1 loopback codes as specified in ANSI T1.403 Annex B.
  • Page 100: Enabling Or Disabling Loopback Detection

    FT1 loopback detection allows remote test equipment to conduct loopback testing on an FT1 channel or logical line without affecting other logical lines. By default, loopback detection is enabled. We recommend that you perform loopback testing in the following order: Test the DS3 interface.
  • Page 101: Specifying The Loopback Mode

    Monitoring and Troubleshooting Example - FT1 To prevent slot 2, connector 1, FT1 channel 5 from accepting remote loop-up and loop-down requests, enter: accept-loopback-request disabled ft1/2/1/5# ft1/2/1/5# Specifying the Loopback Mode When the loopback-mode is set, an MCT3 port or a T1 or FT1 interface is automatically placed in loopback mode, without any request from the remote test equipment.
  • Page 102: Selecting A Loopback Code To Send To A Remote Device

    Selecting a Loopback Code to Send to a Remote Device To select a far-end alarm and control channel code (FEAC) for the remote end of the test connection, go to the t3-test prompt (for example, the following command: send-feac-loop-code < action > is one of the following: action •...
  • Page 103: Clearing The Loopback State Of An Ft1 Channel

    The following example shows how to send loop-up and loop-down signals over slot 2, connector 1, FT1 channel 5, logical line 6, time slot 7: ft1/2/1/5# ft1/2/1/5# ft1/2/1/5# Clearing the Loopback State of an FT1 Channel A logical-line-test object that accepts a remote loop-up signal stays in a loopback state until it receives a loop-down signal.
  • Page 104: Selecting A Bert Pattern For A Channel

    • Starting or Stopping BERT on a Channel • Resetting Local BERT Counters for a Channel • Viewing BERT Results Selecting a BERT Pattern for a Channel When a T1 test or logical line test is in BERT mode, the DS1 compares a particular error pattern to the one introduced into the transmitted bit stream.
  • Page 105: Selecting The Type Of Bert Error To Insert On A Channel

    Selecting the Type of BERT Error to Insert on a Channel By default, a BERT stream does not include deliberate errors. To be able to deliberately insert errors into the bit stream or to disable their insertion, go to the logical line test or T1 test prompt (for example, t1-test/t1-2/1/4 bert-error-insert <...
  • Page 106: Starting Or Stopping Bert On A Channel

    Starting or Stopping BERT on a Channel If you enable the generation of bit errors at a consistent rate, you can compare the number of errors transmitted to the number received in a loopback test. Conducting a BERT allows you to validate or troubleshoot connections. You must enable BERT mode to conduct this test.
  • Page 107: Specifying The Alarm Logging Delay

    Specifying the Alarm Logging Delay By default, each T3, T1, or FT1 access interface waits 2 seconds before logging a performance defect or anomaly as an event message. To change the alarm delay value, go to the MCT3, T1, or FT1 prompt (for example, mct3/2/1 setup-alarm-threshold <...
  • Page 109: Fault Management

    The hardware and software components on the Versalar 15000 work together to provide comprehensive fault management and recovery services. Key to these services is the SSP. The SSP acts as the primary route server and central management component for the Versalar 15000. As the central management...
  • Page 110: Role Of The Ssp In Fault Management

    When two SSP cards are present, as shown in participates in the actual routing and control of the Versalar 15000 APs, IFPs, and TPs. The SSP on which the image flash is present acts as the primary SSP. The secondary SSP monitors the primary SSP.
  • Page 111: Ssp Redundancy

    SSP Redundancy The Versalar 15000 can contain two SSPs, a primary SSP and a secondary SSP. If the primary SSP fails, control fails over to the secondary SSP. When this occurs, it appears like a reset; all activity that was present on the primary SSP terminates.
  • Page 112: Monitoring Aps, Tps, And Ifps

    SSP to IFP DPI Verification Each SSP has a point-to-point primary and secondary connection to an IFP, called the data path interconnect (DPI). The Versalar 15000 requires a working DPI connection to allow transmission of data from the SSP to any network connection other than the management Ethernet interface.
  • Page 113: Primary And Secondary Ifp Dpi Connections

    You must install an access redundancy module (ARM) in interface card slot 5 of the Versalar 15000 chassis to enable redundant operation of the access cards. When coupled with an ARM, the AP in processor card slot 5 then serves as a redundant backup for any AP in slots 1 to 4 with similar capabilities.
  • Page 114 The example that follows illustrates a failure from a clear channel DS3 CAP in slot 2 to a dual-identity CAP in slot 5. Note that after failover, the module description for slot 2 is the identical to that of slot 5. show hardware slots bcc>...
  • Page 115: Power Supply Redundancy

    Power Supply Redundancy The Versalar 15000 ships with a single DC power module installed in the right power module slot. You can install a second power module for redundancy and high-availability operation. 302768-C Rev 00 capCombo v0.00...
  • Page 117: Troubleshooting With Packet Capture

    CPE. Packet capture (PCAP) allows you to examine packets passing through selected circuits on the Versalar 15000. It copies the packets from the circuits to a file in router memory. You can then open the file and view the packets to troubleshoot a problem.
  • Page 118: Before Running Packet Capture

    Packet capture does not display frame check sequence (FCS) fields. Using Packet Capture Note: The following physical media services support packet capture on the Versalar 15000: CSMA/CD, MCT3, Clear Channel T3, and ATM. You can use packet capture to do the following: •...
  • Page 119: Examining A Packet Capture File

    • mcoc3; foc3; t1 • mcoc3; foc3; t3 The services and options are identical in each of these contexts. To get to the PCAP object using the BCC, you must get to the appropriate BCC prompt from which you can enter the and then enter the pcap/11/1#.
  • Page 120: Displaying Packet Information Using The Bcc

    • Establish an FTP or TFTP connection to the router from a PC or Sun workstation to transfer a copy of the file. Then, use the packet dump utility to display the packets in hexadecimal format and/or Network Tap to decode the hexidecimal format.
  • Page 121: Preparing Packet Capture To Run

    Preparing Packet Capture to Run The following sections provide the minimum number of instructions required to prepare packet capture to run: Section Creating a Packet Capture Instance Allocating Memory for the Packet Capture File Specifying the Number of Bytes in Each Packet to Copy Creating a Packet Capture Instance To create a packet capture record (or instance) associated with a circuit or channel from which you want to copy packets, you enter the commands that follow .
  • Page 122: Specifying The Number Of Bytes In Each Packet To Copy

    32, 64, 128, 256, and 512. These values correspond to the Versalar 15000 router settings 32, 64, 128, 256, and 512. To specify the number of bytes in each packet to copy to the packet capture file, enter: pcap/11/1# capture-packet-size <value>...
  • Page 123: Enabling And Disabling Packet Capture

    Enabling and Disabling Packet Capture To enable the packet capture utility, enter the following command: atm/11/1# enable By default, when you create PCAP, packet capture is enabled. Use the command to enable and disable packet capture. Note that if you disable disable packet capture, capture buffer memory is freed up.
  • Page 124: Displaying The Current Packet Capture State

    Displaying the Current Packet Capture State To show the current packet capture state, enter: atm/11/1# show pcap state Example show pcap state bcc> show state PCAP State Circuit VPI/VCI ---- ----- E111 A111 0/32 LL-4/3/1/1 - A111 0/33 A111 0/34 LL-3/1/1/1 - Displaying a Packet Capture File in the BCC To display a packet capture file stored in memory, enter the following command:...
  • Page 125 If the packet capture file does not contain packets, the following message appears: No packets captured for linenumber <line_no.> If the packet capture file contains packets, the contents of each packet appear as follows: • The first line shows the following information that packet capture recorded about the packet: -- The sequential number of the packet in the file -- The date and time that packet capture copied the packet...
  • Page 126 00000010: 01 01 01 01 01 01 01 02 00 00 87 4b 40 53 00 21 00000020: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Pkt# 6 03/08/00 22:24:12.382 00000000: ff 03 00 21 45 00 00 2c 80 76 00 00 1e 01 18 57 00000010: 01 01 01 01 01 01 01 02 00 00 87 4b 40 53 00 21 00000020: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Pkt#...
  • Page 127: Deleting A Packet Capture Instance

    Example 3 Enter the following command to display only the first packet in the packet capture file: pktdump 10904101 -c1 bcc> Pkt# 1 03/08/00 22:23:57.117 00000000: ff 03 00 21 45 00 00 2c 80 71 00 00 1e 01 18 5c 00000010: 01 01 01 01 01 01 01 02 00 00 87 4b 40 53 00 21 00000020: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f Example 4...
  • Page 128: Configuring A Termination Trigger

    Example To configure packet capture to copy both incoming and outgoing packets, enter: capture-direction both Configuring a Termination Trigger By default, packet capture terminates only when you issue the command to terminate it. You can specify that packet capture terminate when either of the following events occurs: •...
  • Page 129: Assigning Filters

    • match1 parameter for the packet direction queried. • match2 parameter for the packet direction queried. • notused Example Enter the following command if you configured the packet capture instance to copy only incoming packets, and you want it to terminate when it matches packet data to the filter 2 match set parameters: rx-trigger match2 Assigning Filters...
  • Page 130: Setting The Filter Response To A Match

    • Reference, Offset, and Size Specifies the data in the packet to compare with the string. Reference identifies the field of the packet. Offset determines the number of bytes after the reference with which to begin the comparison. Size determines the number of bytes to compare to the string.
  • Page 131: Specifying The String To Compare With The Packet Data

    Specifying the String to Compare with the Packet Data Enter the following commands to create a string of characters to compare with the packet: rx-filter-match <value> rx-filter2-match <value> tx-filter-match <value> tx-filter2-match <value> value is any hexadecimal number or character string up to 16 characters. Specifying the Data to Compare with the String The following sections describe how to specify the data in the packet to compare with the string:...
  • Page 132: Specifying The Offset

    Specifying the Offset To specify the number of bytes after the reference with which to begin the comparison, enter the following commands: rx-filter-offset <value> rx-filter2-offset <value> tx-filter-offset <value> tx-filter2-offset <value> value is any number up to the number of bytes in the packet. For more information, see Specifying the Number of Bytes To specify the number of bytes to compare with the string, enter the following...
  • Page 133: Configuration Examples

    is one of the following: value • -- Copies a packet if it matches either filter 1 or filter 2. • -- Copies a packet only if it matches both filter 1 and filter 2. Note: Packet capture uses this parameter only if you configure both capture filters associated with a single direction.
  • Page 134 Managing and Troubleshooting the Versalar Switch Router 15000 Example 3 To capture rx PPP packets whose IP source address matches 1.1.1.1, enter the following commands: rx-filter-type capture rx-filter-offset 16 rx-filter-reference mac rx-filter-size 4 rx-filter-match 0x01010101 Example 4 To capture tx PPP packets whose IP destination address matches 1.1.1.2, enter the...
  • Page 135: Displaying The Current Packet Capture Configuration

    Example 6 To capture rx and tx PPP packets whose PPP control field matches 0x03, which means it is a datagram, and whose IP protocol matches ICMP, you enter the following commands. (Note that this example assumes that you have already specified the type field as shown in Example 5).
  • Page 136: Using The Show Pcap Config Command

    rx-filter-type notused rx-filter-offset 0 rx-filter-reference mac rx-filter-size 0 rx-filter-match 0x tx-filter-type notused tx-filter-offset 0 tx-filter-reference mac tx-filter-size 0 tx-filter-match 0x rx-filter2-type notused rx-filter2-offset 0 rx-filter2-reference mac rx-filter2-size 0 rx-filter2-match 0x rx-filter2-group or tx-filter2-type notused tx-filter2-offset 0 tx-filter2-reference mac tx-filter2-size 0 tx-filter2-match 0x tx-filter2-group or Using the show pcap config Command...
  • Page 137: Displaying Event Messages Issued By Packet Capture

    Displaying Event Messages Issued by Packet Capture To display the packet capture event messages, enter the following command: log -fftwid -ePCAP For information about the events, see the events database on the Versalar 15000 online library CD, or on the Internet at support.baynetworks.com/library/tpubs/ events-p.
  • Page 138: Using Tftp To Transfer The File

    The procedure for using FTP to transfer a copy of a file to a Sun workstation or PC depends on the implementation of FTP on that system. The following instructions apply to Sun workstations. If you are using a PC and need instructions for using FTP, refer to the documentation for the TCP/IP stack installed on the PC.
  • Page 139: Displaying The File With Packet Dump

    If you are using a PC and need instructions for using TFTP, refer to the documentation for the TCP/IP stack installed on the PC. To retrieve a packet capture file, enter the following commands at the command-line interface of the Sun workstation: Enter the following command to start TFTP: tftp Enter the following command to establish a TFTP connection with the...
  • Page 140: Converting A Packet Capture File To Network Associates Sniffer Format

    pktdump <file_name> file_name is the name of the packet capture file that you retrieved from the router. Packet Dump shows the same information about each packet as the BCC, but it does not provide options for specifying the packet by number or quantity. See “Displaying a Packet Capture File in the the fields and a sample display.
  • Page 141 Make sure that the file name does not have an extension and does not exceed eight characters. Access the directory containing the packet convert utility. Enter the following command to convert the file: pktconv <file_name> Packet capture creates a new file that you can copy to diskette and insert in the Network Associates Sniffer.
  • Page 142: Packet Capture Parameters

    Packet Capture Parameters Table 8-1 lists each packet capture parameter, along with its valid and default values. Table 8-1. BCC Attribute Name Values capture-state capture-buf-size capture-packet-size capture-direction rx-trigger tx-trigger rx-filter-type rx-filter-offset rx-filter-reference rx-filter-size rx-filter-match tx-filter-type tx-filter-offset tx-filter-reference tx-filter-size tx-filter-match rx-filter2-type rx-filter2-offset rx-filter2-reference 8-26...
  • Page 143 Table 8-1. BCC Attribute Name Values rx-filter2-size rx-filter2-match rx-filter2-group tx-filter2-type tx-filter2-offset tx-filter2-reference tx-filter2-size tx-filter2-match tx-filter2-group 302768-C Rev 00 BCC Packet Capture Parameters integer octet string or, and capture, trigger, notused integer mac, dl, mcast integer octet string or, and (continued) Default Value notused 8-27...
  • Page 145 accept-loopback-request parameter, 6-10 accept-prm-cr-address-bit parameter, 6-3 accounting data file, 3-4, 3-9 acronyms, xvii alarm AIS, 6-15 bit error rate test (BERT) mode, 6-15 yellow, 6-15 alarm notification, OAM, enabling and disabling, 6-9 ANSI T1.403, 6-2 applications, viewing addresses and sizes of, 5-15 ATT-54016, 6-2 Bay Command Console (BCC), 1-3 billing, 3-1...
  • Page 146 conventions, text, xvi converting packet capture files, 8-24 copy command, 2-5 customer support, xx date command, 5-17 differentiated service level agreements (SLAs), 3-1 dinfo command, 2-6 dir command, 2-7 directed boot, 5-4 direction, packet capture, 8-11 display filters, event log, 4-5 displaying accounting data and traffic statistics, 3-2 down threshold, OAM, setting, 6-7 events...
  • Page 147 5-11 Point-to-Point Protocol (PPP), 8-17 power supply redundancy, 7-7 primary and secondary SSP, 7-2, 7-3 PRM, 6-3 product support, xx prom command, 5-8, 5-12 PROM, verifying and upgrading software on, 5-12 publications, Nortel Networks, xix PVCs, OAM, customizing, 6-6 Index-3...
  • Page 148 5-6 software displaying version, 5-8 upgrading, 5-8 verifying, 5-8 stamp command, 5-8 support, Nortel Networks, xx T1 testing, 6-9 technical publications, xix technical support, xx termination trigger, packet capture, 8-12 testing access lines and channels, 6-9 testing, loopback, 6-9...

Table of Contents