Sign In
Upload
Manuals
Brands
Cisco Manuals
Network Router
ASR 9000 Serie
Cisco ASR 9000 Serie Manuals
Manuals and User Guides for Cisco ASR 9000 Serie. We have
1
Cisco ASR 9000 Serie manual available for free PDF download: Configuration Manuals
Cisco ASR 9000 Serie Configuration Manuals (378 pages)
Aggregation Services Router System
Brand:
Cisco
| Category:
Network Router
| Size: 4.92 MB
Table of Contents
Table of Contents
3
Obtaining Documentation and Submitting a Service Request
15
Prerequisites for Implementing and Monitoring Alarms and Alarm Log Correlation
18
CHAPTER 1 Implementingandmonitoringalarmsandalarmlogcorrelation
19
Correlator
19
System Logging Process
20
Types of Correlation
21
Alarm Severity Level and Filtering
22
Capacity Threshold Setting for Alarms
23
Duration Timeout Flags
24
Configuring Logging Correlation Rules
25
Internal Rules
25
Configuring Logging Correlation Rule Sets
26
Configuring Root-Cause and Non-Root-Cause Alarms
27
Configuring Hierarchical Correlation Rule Flags
29
Applying Logging Correlation Rules
30
Applying Logging Correlation Rule Sets
32
Modifying Logging Events Buffer Settings
33
Modifying Logging Correlator Buffer Settings
35
Displaying Alarms by Severity and Severity Range
36
Displaying Alarms According to a Time Stamp Range
38
Displaying Alarms According to Message Group and Message Code
39
Displaying Alarms According to a First and Last Range
40
Displaying Alarms by Location
41
Displaying Alarms by Event Record ID
42
Displaying the Logging Correlation Buffer Size, Messages, and Rules
43
Clearing Alarm Event Records and Resetting Bistate Alarms
44
Defining SNMP Correlation Buffer Size
46
Defining SNMP Rulesets
47
Configuring SNMP Correlation Rules
47
Applying SNMP Correlation Rules
48
Applying SNMP Correlation Ruleset
49
Configuration Examples for Alarm Management and Logging Correlation
50
The Alarm Buffer Size and Capacity Threshold: Example
50
Configuring a Nonstateful Correlation Rule to Permanently Suppress Node Status Messages
50
Example
52
Additional References
53
CHAPTER 2 Configuring and Managing Embedded Event Manager Policies
57
Prerequisites for Configuring and Managing Embedded Event Manager Policies
58
Information about Configuring and Managing Embedded Event Manager Policies
58
Event Management
58
System Event Detection
58
Policy-Based Event Response
59
Reliability Metrics
59
System Event Processing
59
Embedded Event Manager Management Policies
59
Embedded Event Manager Scripts and the Scripting Interface (Tcl)
60
Script Language
61
Regular Embedded Event Manager Scripts
61
Embedded Event Manager Callback Scripts
62
Embedded Event Manager Policy Tcl Command Extension Categories
62
Cisco File Naming Convention for Embedded Event Manager
63
Embedded Event Manager Built-In Actions
64
Application-Specific Embedded Event Management
65
Event Detection and Recovery
65
General Flow of EEM Event Detection and Recovery
65
System Manager Event Detector
66
Timer Services Event Detector
67
Syslog Event Detector
67
None Event Detector
67
Watchdog System Monitor Event Detector
68
Distributed Event Detectors
69
Embedded Event Manager Event Scheduling and Notification
69
Reliability Statistics
69
Hardware Card Reliability Metric Data
69
Process Reliability Metric Data
70
How to Configure and Manage Embedded Event Manager Policies
71
Configuring Environmental Variables
71
Environment Variables
71
Registering Embedded Event Manager Policies
72
Embedded Event Manager Policies
72
How to Write Embedded Event Manager Policies Using Tcl
75
Registering and Defining an EEM Tcl Script
75
Displaying EEM Registered Policies
77
Unregistering EEM Policies
77
Suspending EEM Policy Execution
78
Managing EEM Policies
79
Displaying Software Modularity Process Reliability Metrics Using EEM
80
Sample EEM Policies
80
Programming EEM Policies with Tcl
82
Tcl Policy Structure and Requirements
82
EEM Entry Status
84
EEM Exit Status
84
Cerrno: 32-Bit Error Return Values
85
EEM Policies and Cisco Error Number
85
Error Class Encodings for XY
86
Creating an EEM User Tcl Library Index
90
Creating an EEM User Tcl Package Index
93
Configuration Examples for Event Management Policies
96
Environmental Variables Configuration: Example
96
User-Defined Embedded Event Manager Policy Registration: Example
96
Display Available Policies: Example
97
Display Embedded Event Manager Process: Example
97
Configuration Examples for Writing Embedded Event Manager Policies Using Tcl
98
EEM Event Detector Demo: Example
98
EEM Sample Policy Descriptions
98
Event Manager Environment Variables for the Sample Policies
98
Registration of some EEM Policies
100
Basic Configuration Details for All Sample Policies
101
Running the Sl_Intf_Down.tcl Sample Policy
101
Using the Sample Policies
101
Running the Tm_Cli_Cmd.tcl Sample Policy
102
Running the Tm_Crash_Reporter.tcl Sample Policy
102
Running the Tm_Fsys_Usage.tcl Sample Policy
103
Programming Policies with Tcl: Sample Scripts Example
103
Tm_Cli_Cmd.tcl Sample Policy
103
Sl_Intf_Down.tcl Sample Policy
106
Tracing Tcl Set Command Operations: Example
108
Additional References
108
Embedded Event Manager Policy Tcl Command Extension Reference
109
Embedded Event Manager Event Registration Tcl Command Extensions
110
Event_Register_Appl
110
Event_Register_Cli
111
Event_Register_Config
113
Event_Register_Counter
114
Event_Register_Hardware
115
Event_Register_None
117
Event_Register_Oir
118
Event_Register_Process
119
Event_Register_Snmp
121
Event_Register_Snmp_Notification
124
Event_Register_Stat
125
Event_Register_Syslog
128
Event_Register_Timer
130
Event_Register_Timer_Subscriber
135
Embedded Event Manager Event Information Tcl Command Extension
145
Event_Reqinfo
145
Event_Reqinfo_Multi
161
Embedded Event Manager Event Publish Tcl Command Extension
161
Event_Publish Appl
161
Embedded Event Manager Multiple Event Support Tcl Command Extensions
164
Attribute
164
Correlate
164
Trigger
165
Embedded Event Manager Action Tcl Command Extensions
166
Action_Process
166
Action_Program
168
Action_Script
169
Action_Setver_Prior
169
Action_Setnode
170
Action_Syslog
170
Action_Track_Read
171
Embedded Event Manager Utility Tcl Command Extensions
172
Appl_Read
172
Appl_Reqinfo
173
Appl_Setinfo
173
Fts_Get_Stamp
175
Register_Counter
176
Timer_Arm
178
Unregister_Counter
182
Embedded Event Manager System Information Tcl Command Extensions
183
Sys_Reqinfo_Cpu_All
183
Sys_Reqinfo_Crash_History
184
Sys_Reqinfo_Mem_All
186
Sys_Reqinfo_Proc
187
Sys_Reqinfo_Proc_All
189
Sys_Reqinfo_Proc_Version
189
Sys_Reqinfo_Routername
190
Sys_Reqinfo_Syslog_Freq
190
Sys_Reqinfo_Syslog_History
191
Sys_Reqinfo_Stat
192
SMTP Library Command Extensions
194
Smtp_Send_Email
195
Smtp_Subst
196
CLI Library Command Extensions
197
Cli_Exec
198
Cli_Get_Ttyname
198
Cli_Open
199
Cli_Read
199
Cli_Read_Drain
200
Cli_Read_Line
201
Context_Retrieve
205
Tcl Context Library Command Extensions
205
Context_Save
208
CHAPTER 3 Implementing IP Service Level Agreements
211
Prerequisites for Implementing IP Service Level Agreements
212
Restrictions for Implementing IP Service Level Agreements
212
Information about Implementing IP Service Level Agreements
214
About IP Service Level Agreements Technology
214
Service Level Agreements
214
Benefits of IP Service Level Agreements
216
Measuring Network Performance with IP Service Level Agreements
216
Operation Types for IP Service Level Agreements
218
IP SLA Responder and IP SLA Control Protocol
219
Response Time Computation for IP SLA
220
IP SLA VRF Support
220
IP SLA Operation Scheduling
221
IP SLA-Proactive Threshold Monitoring
221
IP SLA Reaction Configuration
221
IP SLA Threshold Monitoring and Notifications
221
MPLS LSP Monitoring
221
BGP Next-Hop Neighbor Discovery
222
How MPLS LSP Monitoring Works
222
IP SLA LSP Ping and LSP Traceroute Operations
223
Multi-Operation Scheduling for the LSP Health Monitor
224
Proactive Threshold Monitoring for MPLS LSP Monitoring
224
LSP Path Discovery
224
How to Implement IP Service Level Agreements
225
Configuring IP Service Levels Using the UDP Jitter Operation
225
Enabling the IP SLA Responder on the Destination Device
225
Configuring and Scheduling a UDP Jitter Operation on the Source Device
226
Configuring and Scheduling a Basic UDP Jitter Operation on the Source Device
228
Prerequisites for Configuring a UDP Jitter Operation on the Source Device
228
Configuring and Scheduling a UDP Jitter Operation with Additional Characteristics
230
Configuring the IP SLA for a UDP Echo Operation
235
Prerequisites for Configuring a UDP Echo Operation on the Source Device
235
Configuring and Scheduling a UDP Echo Operation on the Source Device
235
Configuring and Scheduling a UDP Echo Operation with Optional Parameters on the Source Device
238
Configuring an ICMP Echo Operation
242
Configuring and Scheduling a Basic ICMP Echo Operation on the Source Device
242
The Source Device
245
Configuring the ICMP Path-Echo Operation
248
On the Source Device
251
Configuring the ICMP Path-Jitter Operation
254
Configuring and Scheduling a Basic ICMP Path-Jitter Operation
255
Configuring and Scheduling an ICMP Path-Jitter Operation with Additional Parameters
258
Parameters
258
Configuring IP SLA MPLS LSP Ping and Trace Operations
262
Configuring and Scheduling an MPLS LSP Ping Operation
262
Configuring and Scheduling an MPLS LSP Trace Operation
266
Configuring IP SLA Reactions and Threshold Monitoring
270
Configuring Monitored Elements for IP SLA Reactions
270
Configuring Triggers for Connection-Loss Violations
270
Configuring Triggers for Jitter Violations
271
Configuring Triggers for Packet Loss Violations
271
Configuring Triggers for Round-Trip Violations
272
Configuring Triggers for Timeout Violations
273
Configuring Triggers for Verify Error Violations
274
Configuring Threshold Violation Types for IP SLA Reactions
275
Generating Events for Consecutive Violations
276
Generating Events for each Violation
276
Generating Events for X of y Violations
277
Generating Events for Averaged Violations
278
Specifying Reaction Events
279
Configuring the MPLS LSP Monitoring Instance on a Source PE Router
281
Configuring an MPLS LSP Monitoring Ping Instance
281
Configuring an MPLS LSP Monitoring Trace Instance
285
Router
289
Scheduling an MPLS LSP Monitoring Instance on a Source PE Router
291
LSP Path Discovery
292
Configuring Tracking Type (Rtr)
295
Configuration Examples for Implementing IP Service Level Agreements
296
Configuring IP Service Level Agreements: Example
296
Configuring IP SLA Reactions and Threshold Monitoring: Example
297
Configuring IP SLA MPLS LSP Monitoring: Example
298
Configuring LSP Path Discovery: Example
298
Additional References
298
CHAPTER 4 Implementing Logging Services
301
Prerequisites for Implementing Logging Services
301
Information about Implementing Logging Services
302
System Logging Process
302
Format of System Logging Messages
302
Duplicate Message Suppression
303
Interruption of Message Suppression
303
Syslog Message Destinations
304
Guidelines for Sending Syslog Messages to Destinations Other than the Console
305
Logging for the Current Terminal Session
305
Syslog Messages Sent to Syslog Servers
305
UNIX System Logging Facilities
305
Hostname Prefix Logging
306
Syslog Source Address Logging
307
UNIX Syslog Daemon Configuration
307
Archiving Logging Messages on a Local Storage Device
307
Setting Archive Attributes
307
Archive Storage Directories
308
Severity Levels
308
Logging History Table
309
Syslog Message Severity Level Definitions
310
Syslog Severity Level Command Defaults
310
How to Implement Logging Services
311
Setting up Destinations for System Logging Messages
311
Configuring Logging to a Remote Server
312
Configuring the Settings for the Logging History Table
313
Modifying Logging to the Console Terminal and the Logging Buffer
314
Modifying the Format of Time Stamps
315
Disabling Time Stamps
317
Suppressing Duplicate Syslog Messages
318
Disabling the Logging of Link-Status Syslog Messages
318
Displaying System Logging Messages
319
Archiving System Logging Messages to a Local Storage Device
320
Alerts
321
Critical
321
Configuration Examples for Implementing Logging Services
322
Configuring Logging to the Console Terminal and the Logging Buffer: Example
322
Errors
322
Warnings
322
Notifications
322
Informational
322
Debugging
322
Setting up Destinations for Syslog Messages: Example
323
Configuring the Settings for the Logging History Table: Example
323
Modifying Time Stamps: Example
323
Configuring a Logging Archive: Example
323
Where to Go Next
324
Additional References
324
Chapter 5 Onboard Failure Logging
324
Prerequisites
328
Information about Implementing OBFL
328
Data Collection Types
328
Baseline Data Collection
328
Event-Driven Data Collection
329
Supported Cards and Platforms
330
How to Implement OBFL
330
Enabling or Disabling OBFL
331
Configuring Message Severity Levels
332
Monitoring and Maintaining OBFL
332
Clearing OBFL Data
333
Configuration Examples for OBFL
334
Enabling and Disabling OBFL: Example
334
Configuring Message Severity Levels: Example
334
Clearing OBFL Messages: Example
335
Displaying OBFL Data: Example
335
Where to Go Next
335
Additional References
335
Chapter 6 Implementing Performance Management
339
Prerequisites for Implementing Performance Management
340
Information about Implementing Performance Management
340
PM Functional Overview
340
PM Statistics Collector
340
PM Statistics Server
340
PM Benefits
341
PM Statistics Collection Overview
342
PM Statistics Collection Templates
342
Guidelines for Creating PM Statistics Collection Templates
343
Guidelines for Enabling and Disabling PM Statistics Collection Templates
343
Binary File Format
344
Exporting Statistics Data
344
Binary File ID Assignments for Entity, Subentity, and Statscounter Names
345
Filenaming Convention Applied to Binary Files
349
PM Entity Instance Monitoring Overview
349
PM Threshold Monitoring Overview
353
Guidelines for Creating PM Threshold Monitoring Templates
353
Guidelines for Enabling and Disabling PM Threshold Monitoring Templates
366
How to Implement Performance Management
367
Configuring an External TFTP Server for PM Statistic Collections
367
Configuring Local Disk Dump for PM Statistics Collections
367
Configuring Instance Filtering by Regular-Expression
368
Creating PM Statistics Collection Templates
369
Enabling and Disabling PM Statistics Collection Templates
370
Enabling PM Entity Instance Monitoring
372
Creating PM Threshold Monitoring Templates
372
Enabling and Disabling PM Threshold Monitoring Templates
373
Configuration Examples for Implementing Performance Management
375
Creating and Enabling PM Threshold Monitoring Templates: Example
376
Advertisement
Advertisement
Related Products
Cisco ASR 9000 Series
Cisco ASR 900 Series
Cisco ASR 9001-S
Cisco ASR 9001
Cisco ASR 9006
Cisco ASR 9000
Cisco ASR 9000v
Cisco ASR 902
Cisco ASR 903U
Cisco ASR 901
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Conference System
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL