Page 1
Managing and Troubleshooting the Versalar Switch Router 15000 Carrier Networking Services V15K_1.3.0.0 Part No. 302768-C Rev 00 March 2000 4401 Great America Parkway Santa Clara, CA 95054...
Nortel Networks NA Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
Page 3
Software is provided will be free from defects in materials and workmanship under normal use for a period of 90 days from the date Software is first shipped to Licensee. Nortel Networks will replace defective media at no charge if it is returned to Nortel Networks during the warranty period along with proof of the date of shipment.
Page 4
Licensee will immediately destroy or return to Nortel Networks the Software, user manuals, and all copies. Nortel Networks is not liable to Licensee for damages in any form solely by reason of the termination of this license. 8. Export and Re-export. Licensee agrees not to export, directly or indirectly, the Software or related technical data or information without first obtaining any required export licenses or other governmental approvals.
Text Conventions ...xvi Acronyms ...xvii Hard-Copy Technical Manuals ...xix How to Get Help ... xx Chapter 1 Introduction What Is the Versalar 15000? ...1-1 Management Features ...1-3 BCC ...1-3 Accounting ...1-3 Performance Monitoring and Troubleshooting ...1-4 Fault Management ...1-4 Packet Capture ...1-5...
Page 6
- Save the current software configuration to a file ...2-13 type - Display the Contents of a File ...2-14 Chapter 3 Gathering Traffic Statistics for Customer Billing Introduction to Versalar 15000 Billing ...3-1 Traffic Snapshots ...3-2 Displaying Accounting Data and Traffic Statistics ...3-2 Sample show Command Sessions ...3-3 Retrieving the Accounting Data File ...3-9...
Page 7
Displaying the Software Version ...5-8 Verifying and Upgrading Software ...5-8 Validating an Executable File ...5-9 Upgrading and Verifying a PROM ...5-12 Upgrading PROMs Remotely ...5-12 Determining Current PROM Image Versions ...5-13 Using the prom Command ...5-13 Viewing the Load Address and Size of an Application ...5-15 Resetting the Date and Time ...5-17 Testing a Remote Device for Accessibility ...5-18 Ping Messages ...5-19...
Page 8
Configuring BERT Testing ...6-13 Selecting a BERT Pattern for a Channel ...6-14 Selecting the Type of BERT Error to Insert on a Channel ...6-15 Selecting the Type of Alarm Signal to Be Generated in BERT Mode ...6-15 Starting or Stopping BERT on a Channel ...6-16 Resetting Local BERT Counters for a Channel ...6-16 Viewing BERT Results ...6-16 Specifying the Alarm Logging Delay ...6-17...
Page 9
Configuring the Direction of the Packets to Be Copied ...8-11 Configuring a Termination Trigger ...8-12 Assigning Filters ...8-13 Setting the Filter Response to a Match ...8-14 Specifying the String to Compare with the Packet Data ...8-15 Specifying the Data to Compare with the String ...8-15 Specifying the Reference ...8-15 Specifying the Offset ...8-16 Specifying the Number of Bytes ...8-16...
Page 11
Figure 2-1. Sample dinfo Display ...2-6 Figure 2-2. Sample NVFS Directory Listing ...2-7 Figure 3-1. Data File ...3-10 Figure 3-2. Data File Header Fields ...3-11 Figure 3-3. Table of Contents Format ...3-13 Figure 3-4. Data Record Format ...3-14 Figure 5-1. Sample Response to the readexe Command ...5-10 Figure 5-2.
Page 13
Table 2-1. NVFS Commands ...2-3 Table 3-1. Data File Header Fields ...3-11 Table 4-1. Log Command Options ...4-3 Table 7-1. CAP and ATP Slot Connections ...7-5 Table 8-1. BCC Packet Capture Parameters ...8-26 302768-C Rev 00 Tables xiii...
Before using this guide, you must complete the following procedures. For a new Versalar 15000: • Install the Versalar 15000 and connect it to the network (see Installing and Maintaining the Versalar Switch Router 15000). • Develop a working knowledge of the BCC and Differentiated Services for the Versalar Switch Router 15000 and the Quick Reference for the Versalar Switch Router 15000).
Text Conventions This guide uses the following text conventions: angle brackets (< >) bold text braces ({}) brackets ([ ]) ellipsis points (. . . ) Indicate that you choose the text to enter based on the description inside the brackets. Do not type the brackets when entering the command.
italic text screen text vertical line ( Acronyms This guide uses the following acronyms: ANSI BERT BootP 302768-C Rev 00 Indicates file and directory names, new terms, book titles, and variables in command syntax descriptions. Where a variable is two or more words, the words are connected by an underscore.
Page 18
CSMA/CD DLCMI FEAC FIFO HDLC ICMP ISDN ITU-T MDI-X NBMA xviii customer installation committed information rate customer premise equipment carrier sense multiple access/collision detection discard eligible data link control management interface domain name service data path interconnect digital service level 3 frame check sequence facilities data link far-end alarm and control...
NVFS OC-3 OSPF PCAP PRMs QRSS SMDS SNMP TFTP Hard-Copy Technical Manuals You can print selected technical manuals and release notes free, directly from the Internet. Go to support.baynetworks.com/library/tpubs/. Find the product for which you need documentation. Then locate the specific category and model or version for your hardware or software product.
The “Technical Manuals” section lists available printed documentation sets. How to Get Help If you purchased a service contract for your Nortel Networks product from a distributor or authorized reseller, contact the technical support staff for that distributor or reseller for assistance.
The Versalar 15000 is the first Internet aggregation router designed to address the needs of next-generation service provider networks. Its extremely high port density provides access, traffic management, and accounting information for over 1000 simultaneous IP sessions.
Page 22
N x 54/64 Kb/s fractional T1, 1.544 Mb/s T1, and 45 Mb/s T3. The Versalar 15000 combines the reliability and service of conventional layer 2 switches with the routing and control of layer 3 devices to provide the following capabilities (per DC-optimized chassis): •...
Management Features You can configure and manage the Versalar 15000 from any node on the network or, remotely, over a dial-up connection. Configuring Management and Differentiated Services for the Versalar Switch Router 15000 describes how to customize your configuration; this guide describes the system management functions in more detail.
Simplified Network Management Protocol (SNMP). With its quality of service (QoS) classification and traffic management features, the Versalar 15000 provides complete and accurate accounting for all traffic in and out of the system. Thus, service providers can create usage-based billing records for each customer as well as monitor service level agreements (SLAs).
Introduction Packet Capture You use packet capture to troubleshoot network problems such as protocol interoperability with other equipment, to verify customer premise equipment (CPE) filters, and to diagnose problems with the exterior gateway protocols used with the CPE. For more information about packet capture, see Chapter 8, “Troubleshooting with Packet Capture.”...
This chapter explains how to manage the nonvolatile file system (NVFS) files and covers the following topics: Topic File Systems Naming Files: Rules and Conventions File System Commands cd - Change the Active Volume compact - Compact File Space cp - Copy a File dinfo - Display the Status of All Memory Cards dir - Display a Directory format - Format a Memory Card...
File Systems The Versalar 15000 uses an NVFS consisting of one or more flash memory cards. Each flash memory card is an NVFS volume. The NVFS on the router reads and writes to one or more memory cards. Note: The NVFS automatically mounts and unmounts memory cards.
• Use the .cfg file extension for alternative configuration files. The default configuration file is config. • Use the .log file extension for log files. File System Commands Table 2-1 lists the NVFS commands. The Wildcard column indicates whether you can use wildcards ( display multiple file names, and to copy or delete multiple files.
cd - Change the Active Volume To change the active volume, use the cd <vol> : is the slot number of the volume. The system displays the new active volume. If you enter the present working directory, as follows: bcc> Present Working Directory: 9: compact - Compact File Space Data is written sequentially to the memory cards from lower to higher memory...
Managing Files The following message appears: Compacting file system on volume <vol>:... This may take several minutes...Please wait... 100% Complete Compaction completed The space is compacted when the BCC prompt reappears cp - Copy a File To make a copy of a file on the same volume or to another volume on the router, use the command.
dinfo - Display the Status of All Memory Cards To display the status of all memory cards currently installed in the router, enter the command. dinfo memory cards installed in slots 9. $ dinfo Figure 2-1. command displays the following data: dinfo Vol: Slot number where the memory card is currently installed.
dir - Display a Directory To display a list of the files on a volume, use the To list the files stored on the active volume, enter: To list all files stored on a specific volume, enter: dir <vol> : is the slot number containing the volume.
You can use a remote PC or UNIX workstation to transfer files in-band or out-of-band. In-Band File Transfers command invokes the TFTP software to transfer a file between a Nortel tftp Networks router and another router or host. Caution: You cannot use ftp or tftp client to transfer files to or from the router;...
Page 36
Enter the following commands to transfer a file from the BCC: tftp get <host_address> <remote_vol> tftp put <host_address> <local_vol> to transfer the file to the local Versalar 15000 and use file to a remote node. host_address remote_vol is the volume number on the remote host.
Page 37
The system executes one TFTP request at a time for the duration of the file transfer. The destination system stores the file under the name you specify. If you do not enter a destination name, the system defaults to the source file name. Examples tftp put 192.32.1.62 9:config2.cfg 10:newconf...
Transferring a File to a Full Memory Card If you attempt to transfer a file to a memory card that does not have enough space, the name of the file with a length of 0 bytes appears in the memory card’s directory.
save - Save the current software configuration to a file To save either the the current software configuration to a config file or to save events to a log file, use the To save the current software configuration to a config file: save config <vol>...
type - Display the Contents of a File To display the contents of an ASCII file, use the displaying a file, you can enable the a time. To display a file, enter the following command: type [ -x ] <vol> is an optional argument to display the file in hexadecimal format.
This chapter describes how the Versalar 15000 gathers traffic statistics for use in billing customers. The following topics are included: Topic Introduction to Versalar 15000 Billing Displaying Accounting Data and Traffic Statistics Retrieving the Accounting Data File Interpreting Billing Data...
The data consists of various packet and octet counts. For each service class, the Versalar 15000 stores counters for inbound traffic; below CIR, above CIR, and above BR packets and octets. For outgoing traffic, only total octet and packet counts per service class are kept.
To show summary information about configured interfaces and queues, enter: show accounting interface summary [-package <name> ] [-queue <name> ] OR - (assuming show accounting interface summary [ <interface_name> ] To show statistics gathered for configured interfaces and queues, enter: show accounting interface stats [-package <name>...
Page 44
3-9 and Configuring Management and Differentiated Services for the Versalar Switch Router 15000 for more information. Example 2 In the following example, you use the configured for this Versalar 15000. show accounting rules bcc> Accounting Data Collection Rules Name...
Page 45
Example 4 In this example, you display information about all configured interfaces and queues used for accounting. This command option provides information about which rules relate to each interface and queue. show accounting interface summary bcc> Accounting Interface Summary Interface int1 int1 int2...
Page 46
Example 7 In this example, you display summary information for show accounting interface summary -queue queue1 bcc> Accounting Interface Summary Interface int1 int2 Example 8 To display all packet and octet statistics collected for configured interfaces and queues, use the following command: show accounting interface stats bcc>...
Page 47
Note that if the interface is not working when you request statistics, the word down appears in the output to indicate that no statistics are available. int1 pkg1 If the interface was not working during the current interval, but is now back up when you request statistics, the word partial appears.
Page 48
Example 10 To filter on the service package name for statistics, use the following command: show accounting interface stats -package pkg4 bcc> Accounting Interface Statistics Service Queue Package int2 pkg4 queue int2 pkg4 queue Example 11 To filter on a particular queue name for statistics, use the following command: show accounting interface stats -queue queue2 bcc>...
Gathering Traffic Statistics for Customer Billing Retrieving the Accounting Data File The accounting data file can be retrieved directly from local memory using FTP or TFTP, the command, and the special file name BAYACCTG. The accounting data appears as a file, so you can retrieve it without first saving it to the file system.
Interpreting Billing Data In the accounting data file, billing data records are organized into a binary data file. The file format consists of a file header and a sequence of accounting data records, which contain resource usage statistics for each access interface. Figure 3-1 shows the composition of the data file.
A 4-byte platform ID that identifies the type of router as a Versalar 15000 The 4-byte mid-plane serial number of the Versalar 15000 that created the data file A 1-byte field that is incremented each time the data file format is...
Table 3-1. Field Software version A 1-byte field followed by a string field with the following format: Timestamp (High) Timestamp (Low) File size Authentication type Authentication info * The platform ID and system ID can be used to uniquely identify which router generated the data in a network.
Number of records String length Interface name Offset . . . String length Interface name Offset Figure 3-3. Note: The entries in the table of contents, and therefore the data records themselves, are organized by circuit number. Data Records The list of data records containing resource usage statistics per access interface (for queues applied through service packages) appears after the table of contents.
Record header Data associated with first queue Data associated with next queue Figure 3-4. 3-14 Record length Number of queues Service package name length Service package name Queue Queue name length header Queue name Snapshots Timestamp High/Timestamp Low Bitmask Octets received below CIR Octets received above CIR Octets received above BR Snapshot 1...
Page 55
Each individual snapshot contains the following fields: • Timestamp (High): The high 32 bits of a 64-bit timestamp that describes when the data snapshot was taken in the number of seconds since Jan. 1, 1970, 00:00 (GMT) • Timestamp (Low): The low 32 bits of a 64-bit timestamp that describes when the data snapshot was taken in the number of seconds since Jan.
When you hot-swap an SSP card, the events clear from that card only. Note: It is crucial to save the event log in case you need to provide it to Nortel Networks personnel for troubleshooting. See the section Log”...
Introduction to Event Logging Each card in the router (for example the forwarding processor cards) can generate event messages that are entered into an event log. The SSP cards process and store event log messages. The primary, active SSP stores all log messages generated by the cards.
Applying Write Filters to the Event Log During normal operation, the event log captures all event messages generated internally by the router. However, for troubleshooting purposes only, you can use command to: • Include specific event messages in the event log. •...
W for warning • d or D for debug (Debug events are for use and interpretation by Nortel Networks Technical Solutions Center personnel only.) You can specify in the same more severity codes. Specifies the number of the slots for which the <slot_number>...
The system displays the events by type. The severity codes are for trace, only for Nortel Networks Technical Solutions Center personnel.) slot_ID is the number of the slot containing an SSP. The system displays the events associated with the processor.
Page 62
enables continuous polling of the system’s event log to display new event rate messages. The value by entering a rate in seconds. The system displays the events that occur between polling intervals. code_no. is an event code number or a range of event code numbers. The system displays the events associated with the specified event code.
: command) to determine the file names dir <vol> already in use. Note: It is crucial to save the event log in case you need to provide it to Nortel Networks personnel for troubleshooting. To save events to a file, enter the following command: save log <vol>...
Examples save log 9:events_10_12.log save log 9:events_10_12.log -d10/12/98 save log 9:temp.log -t09:02:00 save log 10:tftp.log -eTFTP save log 10:snmp.log -eSNMP -ftf save log 9:slot10.log -s10 Displaying an Event Log File You can use the display a log file, enter the following command: <vol>...
For a description of the optional arguments, see Messages” on Examples log 9:events_10_12.log log 9:events_10_12.log -eTFTP log 9:events_10_12.log -eSNMP -ftf log 9:events_10_12.log -s10 Clearing Events from Memory The log, if it were to fill, wraps to the beginning and overwrites entries from beginning to end.
Page 66
Examples clearlog clearlog 9 clearlog 9-10 clearlog 9,10 4-10 Clears all events from memory Clears all events from the slot 9 event buffer Clears all events from the event buffers on slots 9 and 10 Clears all events from the event buffers on slot 9 and then slot 10 302768-C Rev 00...
You use the BCC to perform the following Versalar 15000 system administration tasks: Topic Booting the Router Restarting a Slot Resetting a System or Slot Displaying the Software Version Verifying and Upgrading Software Validating an Executable File Upgrading and Verifying a PROM...
Booting the Router The BCC provides the following commands for booting: • boot on the front panel of the router initiates the same procedure. You can override the default router software image and configuration by specifying an alternative router software image and an alternative configuration file when entering the •...
Page 69
If the LED turns amber, it means that diagnostics have failed, while a solid green light means that diagnostics have passed. See Installing and Maintaining the Versalar Switch Router 15000 for more details on SSP card and IFP card LEDs.
Using the boot Command Use the boot software image and configuration file when entering the system boots from the default image (for example, v15k.exe) and configuration file (config). Caution: You should have only one version of the config file on the router. To ensure this, assign new names to alternative versions of the configuration file.
Page 71
When the source of the default image or configuration file is a network, enter only a dash ( ) to indicate no volume for the router software image or configuration file. If you enter anything else, the BCC displays an error message. The software image and configuration file revert to their default file name after every boot.
Examples restart restart 1 restart 1-5 restart 4,6 command allows you to restart the Versalar 15000 image currently in Restarts the entire system Restarts slot 1 Restarts slots 1, 2, 3, 4, and 5 Restarts slots 4 and 6 restart...
Resetting a System or Slot command allows you to reset one or more slots and use the currently reset active software image. To reset one or more slots, enter the slot number or numbers after the arguments, the router will reboot, using the default router software image and configuration;...
Displaying the Software Version Enter stamp was created. Verifying and Upgrading Software The BCC provides the following commands for verifying and upgrading executable software: • readexe executable files on the file system, verifies that the checksums match those within the files, and displays the results and all file header information. Use this command to validate executable files before upgrading.
For information on how the router boots and uses images, see the section the Router Boots” on To upgrade with a new image, transfer the image to the file system and reset the system; do not use the software image. Note: You cannot edit image files.
Page 77
-- Revision: Indicates the software release. -- Last Modified: Indicates the day, date, and time of the software release. -- File type: Indicates that the file is executable. -- Tool name: For Nortel Networks use only. Examples readexe sspdiag.ppc readexe 9:sspboot.ppc...
Upgrading and Verifying a PROM To upgrade or verify the software on a diagnostic or bootstrap PROM, use the command. You must be logged in as “Manager” to run the prom If a software release includes a PROM software upgrade, see the upgrade documentation shipped with the software for instructions on upgrading the PROMs on your router.
Determining Current PROM Image Versions To decide whether or not you need to upgrade the PROMs in a router, you need to determine the versions of boot and diagnostics PROM images currently running in that router. To determine the version number of the PROM images, start a Telnet session with the router, and enter the following command at the BCC prompt: show hardware prom Each line of response to the command specifies:...
Page 80
Update the boot PROM by entering: prom -w <volume_no.> volume_no. verify or update the PROM defined by Boot_PROM_source_file verify or update the PROM defined by is the slot that contains the boot PROM that is being verified or slot ID updated.
If the operation fails, the console displays a message describing the cause of the failure. Examples prom -v 9:sspdiag.ppc 10 prom -w 9:bacboot.exe 10 Any one of the following: prom -w 9:sspdiag.ppc 9, 10 prom -w 9:sspdiag.ppc 9 10 prom -w 9:sspdiag.ppc 9-10 Viewing the Load Address and Size of an Application loadmap dynamically loadable application.
Page 82
If you enter the writes the addresses and sizes of all applications on all slots to the specified file. If you do not specify a destination file name, the system displays the addresses and sizes of the applications on the screen. Examples loadmap loadmap 9...
Managing the Versalar 15000 Resetting the Date and Time command allows you to display or change the system date, time, or time date zone offset. The time is based on the 24-hour clock. The offset is the time difference between the current time and Greenwich mean time (GMT).
Examples date date 03/10/00 16:02 date 03/10/00 16:02 -5 Testing a Remote Device for Accessibility command allows you to test whether or not a remote device running IP ping is reachable. When you issue the Internet Control Message Protocol (ICMP) echo request to the remote IP address that you specify.
• An “ICMP host unreachable from y.y.y.y” message: This message appears if the Versalar 15000 or the remote router whose address is y.y.y.y cannot forward the ping request any further along the path to the target device. A sample message follows, where 192.32.243.1 is the address of the ICMP host: ping: ICMP host unreachable from 192.32.243.1...
Page 86
Examples ping 192.32.1.151 ping 192.32.13.200 -p ping 192.32.1.151 -t3 -r8 -s62 ping 192.32.1.151 -v 5-20 Pings the device at IP address 192.32.1.151 and waits up to 5 seconds (default) for a response. The console displays one of the following messages: ping: 192.32.1.151 is alive (size = 16 bytes) ping: 193.32.1.151 does not respond ping: ICMP host unreachable from 192.32.243.1...
Monitoring IP Routes show ip sources: • Main routing table for any slot • Internal cache for any slot • Routing cache for a specific logical interface • Multicast routes cache You choose the source by specifying a subcommand in the command line. You can also selectively filter the data by specifying one or more options in the command line.
Example (IP Routes) To display the table of IP routes, enter the following command: show ip routes bcc> show ip routes Destination/Mask 1.1.1.0/24 192.32.0.0/16 192.32.6.0/24 Total Networks on Slot 10= 3 Data from the exist in the complete table of IP routes. To view the complete table, including inactive and unused routes, use the BGP Route Tables show bgp routes...
Page 89
To learn more about any question mark ( show bgp routes ? bcc> Usage: show bgp routes [options] Where options is any of : <ip_address> <ip_address/ prefix> Example To display BGP routes for all BGP peers, use the follows: show bgp routes bcc>...
Page 90
9.2.0.0/16 As Path: <762 1326 1673 1675> 9.20.0.0/17 As Path: <762 1326 1673 2685 2686> 10.0.0.0/8 As Path: <762> 12.0.0.0/8 As Path: <762 1326 1673 1 7018> 12.2.97.0/24 As Path: <762 1326 1673 701 7260 10656> 12.3.63.0/24 As Path: <762 1326 1673 1 7018 11383> 12.3.123.0/24 As Path: <762 1326 1673 6461 4969 2033>...
The Versalar 15000’s comprehensive monitoring and troubleshooting capabilities allow you to identify potential system problems. Discussed here are the facilities data link (FDL), Operations and Management (OAM), loopback detection and testing, and BERT. Topic Configuring the T1 FDL Channel Changing ATM PVC OAM Parameters...
Configuring the T1 FDL Channel On the Versalar 15000, the FDL feature provides a mechanism that lets you monitor T1 performance data. Note that if you use the default setting esf as the Framing parameter value, the associated T1 or FT1 channel uses FDL to receive performance data from either the subscriber or carrier.
Specifying FDL Performance Messages Sent to Another Device You can specify the source of send performance messages (either subscriber or carrier) for the Versalar 15000. To do so, go to the T1 or FT1 prompt (for example, t1/2/1/4 ft1/2/1/5 send-prm-cr-address-bit prm-{ci (the default setting) specifies the customer installation (CI) as the source of PRMs.
Specifying the FDL Target Address Mode The Versalar 15000 uses the fdl-target-hdlc-address parameter to address the CI terminal equipment (TE) when sending maintenance messages. You set this parameter to match the TE target unit address. To do so, go to the T1 or FT1 prompt (for example,...
Enabling or Disabling Loop Retention Detection and Interframe Fill By default, the Versalar 15000 neither detects nor transmits loop retention signals. To enable (or again disable) loop retention signals, go to the T1 or FT1 prompt (for example,...
Changing ATM PVC OAM Parameters On the Versalar 15000, Operations and Management (OAM) provides a mechanism by which ATM devices can receive prompt notification of permanent virtual circuit (PVC) failures. OAM uses special loopback cells or alarms to detect PVC failures.
To enable OAM loopback for a PVC, navigate to the PVC prompt (for example, box; atm/11/1; pvc-service/boston; pvc/11/1/0/32 pvc-service/boston; pvc-group/boston/group1; pvc/11/1/0/32 oam-loopback enabled For example, the following command enables OAM loopback on PVC 11/1/0/32: pvc/11/1/0/32# pvc/11/1/0/32# Specifying the OAM Loopback Cell Interval The OAM loopback cell interval specifies how often the ATM PVC sends OAM loopback cells in the data stream.
To set the OAM down threshold for a PVC, navigate to the PVC prompt (for example, box; atm/11/1; pvc-service/boston; pvc/11/1/0/32 pvc-service/boston; pvc-group/boston/group1; pvc/11/1/0/32 oam-down-threshold <integer> integer is the minimum number of OAM cells for which a PVC does not receive an OAM loopback response before the ATM service record declares the PVC not operational.
Fractional loopback is the transmission of ANSI-standard 127-octet loop code through a fractional T1 (FT1) link to a device that returns the code to the sender. The Versalar 15000 detects and generates FT1 loopback codes as specified in ANSI T1.403 Annex B.
FT1 loopback detection allows remote test equipment to conduct loopback testing on an FT1 channel or logical line without affecting other logical lines. By default, loopback detection is enabled. We recommend that you perform loopback testing in the following order: Test the DS3 interface.
Monitoring and Troubleshooting Example - FT1 To prevent slot 2, connector 1, FT1 channel 5 from accepting remote loop-up and loop-down requests, enter: accept-loopback-request disabled ft1/2/1/5# ft1/2/1/5# Specifying the Loopback Mode When the loopback-mode is set, an MCT3 port or a T1 or FT1 interface is automatically placed in loopback mode, without any request from the remote test equipment.
Selecting a Loopback Code to Send to a Remote Device To select a far-end alarm and control channel code (FEAC) for the remote end of the test connection, go to the t3-test prompt (for example, the following command: send-feac-loop-code < action > is one of the following: action •...
The following example shows how to send loop-up and loop-down signals over slot 2, connector 1, FT1 channel 5, logical line 6, time slot 7: ft1/2/1/5# ft1/2/1/5# ft1/2/1/5# Clearing the Loopback State of an FT1 Channel A logical-line-test object that accepts a remote loop-up signal stays in a loopback state until it receives a loop-down signal.
• Starting or Stopping BERT on a Channel • Resetting Local BERT Counters for a Channel • Viewing BERT Results Selecting a BERT Pattern for a Channel When a T1 test or logical line test is in BERT mode, the DS1 compares a particular error pattern to the one introduced into the transmitted bit stream.
Selecting the Type of BERT Error to Insert on a Channel By default, a BERT stream does not include deliberate errors. To be able to deliberately insert errors into the bit stream or to disable their insertion, go to the logical line test or T1 test prompt (for example, t1-test/t1-2/1/4 bert-error-insert <...
Starting or Stopping BERT on a Channel If you enable the generation of bit errors at a consistent rate, you can compare the number of errors transmitted to the number received in a loopback test. Conducting a BERT allows you to validate or troubleshoot connections. You must enable BERT mode to conduct this test.
Specifying the Alarm Logging Delay By default, each T3, T1, or FT1 access interface waits 2 seconds before logging a performance defect or anomaly as an event message. To change the alarm delay value, go to the MCT3, T1, or FT1 prompt (for example, mct3/2/1 setup-alarm-threshold <...
The hardware and software components on the Versalar 15000 work together to provide comprehensive fault management and recovery services. Key to these services is the SSP. The SSP acts as the primary route server and central management component for the Versalar 15000. As the central management...
When two SSP cards are present, as shown in participates in the actual routing and control of the Versalar 15000 APs, IFPs, and TPs. The SSP on which the image flash is present acts as the primary SSP. The secondary SSP monitors the primary SSP.
SSP Redundancy The Versalar 15000 can contain two SSPs, a primary SSP and a secondary SSP. If the primary SSP fails, control fails over to the secondary SSP. When this occurs, it appears like a reset; all activity that was present on the primary SSP terminates.
SSP to IFP DPI Verification Each SSP has a point-to-point primary and secondary connection to an IFP, called the data path interconnect (DPI). The Versalar 15000 requires a working DPI connection to allow transmission of data from the SSP to any network connection other than the management Ethernet interface.
You must install an access redundancy module (ARM) in interface card slot 5 of the Versalar 15000 chassis to enable redundant operation of the access cards. When coupled with an ARM, the AP in processor card slot 5 then serves as a redundant backup for any AP in slots 1 to 4 with similar capabilities.
Page 114
The example that follows illustrates a failure from a clear channel DS3 CAP in slot 2 to a dual-identity CAP in slot 5. Note that after failover, the module description for slot 2 is the identical to that of slot 5. show hardware slots bcc>...
Power Supply Redundancy The Versalar 15000 ships with a single DC power module installed in the right power module slot. You can install a second power module for redundancy and high-availability operation. 302768-C Rev 00 capCombo v0.00...
CPE. Packet capture (PCAP) allows you to examine packets passing through selected circuits on the Versalar 15000. It copies the packets from the circuits to a file in router memory. You can then open the file and view the packets to troubleshoot a problem.
Packet capture does not display frame check sequence (FCS) fields. Using Packet Capture Note: The following physical media services support packet capture on the Versalar 15000: CSMA/CD, MCT3, Clear Channel T3, and ATM. You can use packet capture to do the following: •...
• mcoc3; foc3; t1 • mcoc3; foc3; t3 The services and options are identical in each of these contexts. To get to the PCAP object using the BCC, you must get to the appropriate BCC prompt from which you can enter the and then enter the pcap/11/1#.
• Establish an FTP or TFTP connection to the router from a PC or Sun workstation to transfer a copy of the file. Then, use the packet dump utility to display the packets in hexadecimal format and/or Network Tap to decode the hexidecimal format.
Preparing Packet Capture to Run The following sections provide the minimum number of instructions required to prepare packet capture to run: Section Creating a Packet Capture Instance Allocating Memory for the Packet Capture File Specifying the Number of Bytes in Each Packet to Copy Creating a Packet Capture Instance To create a packet capture record (or instance) associated with a circuit or channel from which you want to copy packets, you enter the commands that follow .
32, 64, 128, 256, and 512. These values correspond to the Versalar 15000 router settings 32, 64, 128, 256, and 512. To specify the number of bytes in each packet to copy to the packet capture file, enter: pcap/11/1# capture-packet-size <value>...
Enabling and Disabling Packet Capture To enable the packet capture utility, enter the following command: atm/11/1# enable By default, when you create PCAP, packet capture is enabled. Use the command to enable and disable packet capture. Note that if you disable disable packet capture, capture buffer memory is freed up.
Displaying the Current Packet Capture State To show the current packet capture state, enter: atm/11/1# show pcap state Example show pcap state bcc> show state PCAP State Circuit VPI/VCI ---- ----- E111 A111 0/32 LL-4/3/1/1 - A111 0/33 A111 0/34 LL-3/1/1/1 - Displaying a Packet Capture File in the BCC To display a packet capture file stored in memory, enter the following command:...
Page 125
If the packet capture file does not contain packets, the following message appears: No packets captured for linenumber <line_no.> If the packet capture file contains packets, the contents of each packet appear as follows: • The first line shows the following information that packet capture recorded about the packet: -- The sequential number of the packet in the file -- The date and time that packet capture copied the packet...
Example To configure packet capture to copy both incoming and outgoing packets, enter: capture-direction both Configuring a Termination Trigger By default, packet capture terminates only when you issue the command to terminate it. You can specify that packet capture terminate when either of the following events occurs: •...
• match1 parameter for the packet direction queried. • match2 parameter for the packet direction queried. • notused Example Enter the following command if you configured the packet capture instance to copy only incoming packets, and you want it to terminate when it matches packet data to the filter 2 match set parameters: rx-trigger match2 Assigning Filters...
• Reference, Offset, and Size Specifies the data in the packet to compare with the string. Reference identifies the field of the packet. Offset determines the number of bytes after the reference with which to begin the comparison. Size determines the number of bytes to compare to the string.
Specifying the String to Compare with the Packet Data Enter the following commands to create a string of characters to compare with the packet: rx-filter-match <value> rx-filter2-match <value> tx-filter-match <value> tx-filter2-match <value> value is any hexadecimal number or character string up to 16 characters. Specifying the Data to Compare with the String The following sections describe how to specify the data in the packet to compare with the string:...
Specifying the Offset To specify the number of bytes after the reference with which to begin the comparison, enter the following commands: rx-filter-offset <value> rx-filter2-offset <value> tx-filter-offset <value> tx-filter2-offset <value> value is any number up to the number of bytes in the packet. For more information, see Specifying the Number of Bytes To specify the number of bytes to compare with the string, enter the following...
is one of the following: value • -- Copies a packet if it matches either filter 1 or filter 2. • -- Copies a packet only if it matches both filter 1 and filter 2. Note: Packet capture uses this parameter only if you configure both capture filters associated with a single direction.
Page 134
Managing and Troubleshooting the Versalar Switch Router 15000 Example 3 To capture rx PPP packets whose IP source address matches 1.1.1.1, enter the following commands: rx-filter-type capture rx-filter-offset 16 rx-filter-reference mac rx-filter-size 4 rx-filter-match 0x01010101 Example 4 To capture tx PPP packets whose IP destination address matches 1.1.1.2, enter the...
Example 6 To capture rx and tx PPP packets whose PPP control field matches 0x03, which means it is a datagram, and whose IP protocol matches ICMP, you enter the following commands. (Note that this example assumes that you have already specified the type field as shown in Example 5).
Displaying Event Messages Issued by Packet Capture To display the packet capture event messages, enter the following command: log -fftwid -ePCAP For information about the events, see the events database on the Versalar 15000 online library CD, or on the Internet at support.baynetworks.com/library/tpubs/ events-p.
The procedure for using FTP to transfer a copy of a file to a Sun workstation or PC depends on the implementation of FTP on that system. The following instructions apply to Sun workstations. If you are using a PC and need instructions for using FTP, refer to the documentation for the TCP/IP stack installed on the PC.
If you are using a PC and need instructions for using TFTP, refer to the documentation for the TCP/IP stack installed on the PC. To retrieve a packet capture file, enter the following commands at the command-line interface of the Sun workstation: Enter the following command to start TFTP: tftp Enter the following command to establish a TFTP connection with the...
pktdump <file_name> file_name is the name of the packet capture file that you retrieved from the router. Packet Dump shows the same information about each packet as the BCC, but it does not provide options for specifying the packet by number or quantity. See “Displaying a Packet Capture File in the the fields and a sample display.
Page 141
Make sure that the file name does not have an extension and does not exceed eight characters. Access the directory containing the packet convert utility. Enter the following command to convert the file: pktconv <file_name> Packet capture creates a new file that you can copy to diskette and insert in the Network Associates Sniffer.