Do you have a question about the Stinger FS and is the answer not in the manual?
Questions and answers
Summary of Contents for Lucent Stinger FS
Page 1
Stinger® Administration Guide Part Number: 363-217-010R9.8.1 For software version 9.8.1 November, 2005...
Page 2
Hereby, Lucent Technologies, declares that the equipment documented in this publication is in compliance with the essential require- ments and other relevant provisions of the Radio and Telecommunications Technical Equipment (RTTE) Directive 1999/5/EC. To view the official Declaration of Conformity certificate for this equipment, according to EN 45014, access the Lucent INS online documentation library at http://www.lucentdocs.com/ins.
United States. Alternatively, call 1-866-LUCENT8 (1-866-582-3688) from any location in North America for a menu of Lucent services. Or call +1 510-747-2000 for an operator. If you do not have an active services agreement or contract, you will be charged for time and materials.
Contents Chapter 1 Administering a Stinger System ............1-1 About standalone and hosted Stinger systems............1-1 Logging into a Stinger unit..................1-2 Enabling basic security measures ................1-3 Changing the default Admin password ............... 1-3 Securing the serial port of each control module..........1-3 Specifying a management-only Ethernet interface ...........
Page 6
Contents Specifying group permissions for commands and profile access ....1-24 1-24 Specifying a time-out for user logins ............... 1-29 1-29 Setting the command-line prompt ..............1-29 1-29 Setting log levels for each login ............... 1-29 1-29 Logging in as a different user................1-30 1-30 Displaying the current user ................
Page 7
Contents Configuring the Syslog daemon ..............2-12 2-12 Configuring call logging ..................2-12 2-12 Overview of call logging .................. 2-12 2-12 Enabling call logging..................2-12 2-12 Chapter 3 Working with Stinger Shelves and Modules ........3-1 Understanding physical addressing on Stinger units..........3-1 Viewing system components..................
Page 8
Contents Displaying IMA groups................4-10 4-10 Reinitializing out-of-service IMA groups ..........4-10 4-10 Monitoring remote shelves ..................4-11 4-11 Using the remote-shelf-stat profile ..............4-11 4-11 Displaying information about enabled remote shelves........4-13 4-13 Displaying Gigabit Ethernet OLIM (GE-OLIM) line status ......4-14 4-14 Displaying DSL performance settings..............
Page 9
Contents Maintaining ASIC Integrity ..................5-22 5-22 Checking the defaults for control module self-tests ........5-22 5-22 Enabling centralized integrity checks .............. 5-25 5-25 Chapter 6 Managing System Configuration and Memory ......6-1 Saving system configuration ..................6-1 Saving the configuration to a local file .............. 6-2 Saving the configuration to a network host ............
Page 10
Contents Optional firmware (Centillium-based LIMs)............6-21 6-21 Using optional firmware .................. 6-21 6-21 Verifying firmware version of a LIM ............... 6-22 6-22 Caveats with current implementation ............. 6-22 6-22 Log messages for firmware download events ..........6-23 6-23 Upgrading bootprom on GE-COP, GE-OLIM, and IP RLIMs........6-23 6-23 Command syntax.....................
Page 11
Specifying the dsl-threshold profile ............8-23 8-23 Overview of the dsl-threshold profile settings ........8-24 8-24 Lucent-specific ADSL threshold traps ............8-25 8-25 Enabling the system to generate ADSL threshold traps ......8-26 8-26 Configuring link-state traps for LIM and trunk ports ........8-26 8-26 Changing the setting for the desired-trap-state parameter systemwide..
Page 12
Contents Configuring traps for CDR device failure ............... 8-34 8-34 Configuring alarms for CDR failure ..............8-34 8-34 Configuring traps for events related to CDR failure ........8-35 8-35 Displaying alarms caused by CDR failure ............8-35 8-35 Chapter 9 Working with IP Traffic ..............9-1 Testing IP connectivity .....................
Page 13
Contents Displaying the status of ATM trunk modules and their connections ....11-5 11-5 Checking the status of a VCC interface............11-5 11-5 Checking the status of a terminating PVC ............11-6 11-6 Displaying ATM VCC information and packet statistics ........11-6 11-6 Displaying ATM virtual link information ............
Page 14
Contents Running an external diagnostic test (EDT) feature ........12-23 12-23 Digital loopback..................12-24 12-24 Analog loopback..................12-24 12-24 Running built-in self tests (BISTs) on DSL ports ........... 12-25 12-25 Supported LIMs ..................12-25 12-25 Enabling the built-in self test using the command-line interface ... 12-25 12-25 Relay alarm testing....................
Page 15
Contents Displaying RADIUS accounting session status ..........A-20 A-20 Displaying RADIUS authentication and accounting statistics......A-21 A-21 Interface debugging....................A-22 A-22 Displaying network interface mappings ............A-23 A-23 Using the EOC command on ADSL interfaces..........A-23 A-23 Control module debugging..................A-24 A-24 Displaying the status of redundant control modules ........A-25 A-25 Displaying interface management information ..........A-26 A-26...
Page 17
Tables Table 1-1 Authentication keys generated by the system ........1-6 Table 1-2 Syslog messages reported for secure shell error conditions ....1-9 Table 1-3 Administrative access available on a system ........1-12 1-12 Table 1-4 Permissions and associated commands ........... 1-23 1-23 Table 1-5 Message levels .................
About This Guide This guide explains how to administer a Stinger unit and manage its operations. To use this guide, you must have set up the Stinger system as described in the Getting Started Guide for your Stinger unit and configured it for network connectivity as described in the Stinger ATM Configuration Guide.
Page 20
About This Guide Documentation conventions Following are all the special characters and typographical conventions used in this manual: Convention Meaning Monospace text Represents text that appears on your computer’s screen, or that could appear on your computer’s screen. Boldface Represents characters that you enter exactly as shown (unless monospace text the characters are also in italics—see Italics, below).
Page 21
About This Guide Stinger documentation set The Stinger documentation set consists of the following manuals, which can be found at http://www.lucent.com/support and http://www.lucentdocs.com/ins. Read me first: ■ – Edge Access and Broadband Access Safety and Compliance Guide. Contains important safety instructions and country-specific information that you must read before installing a Stinger unit.
Page 22
About This Guide RADIUS: TAOS RADIUS Guide and Reference. Describes how to set up a unit to use ■ the Remote Authentication Dial-In User Service (RADIUS) server and contains a complete reference to RADIUS attributes. Administration and troubleshooting: Stinger Administration Guide (this guide). ■...
Stinger MRT and not to physical modules. About standalone and hosted Stinger systems In this document, a Stinger FS, Stinger FS+, Stinger LS, Stinger RT, Stinger MS+ or Stinger MRT unit that does not provide host functions to other Stinger units is referred to as a standalone unit.
ID. For more information about the hosted operations of Stinger MRT units, see the Getting Started Guide for your unit. Stinger FS+, Stinger LS, and Stinger RT units with revision 2.0, revision 2.1, and IP control modules also support host functions to Stinger Compact Remote units. The Stinger Compact Remote unit is a small temperature-hardened unit that extends the reach of host Stinger units located in the central office.
Administering a Stinger System Enabling basic security measures Enabling basic security measures The Stinger unit is shipped with certain default parameters set to allow easy access for the initial configuration. After you have initially logged in as administrator, ensure that the following three basic security tasks have been completed: ■...
Administering a Stinger System Enabling basic security measures With this setting, the system automatically logs off the current user profile if the Data Terminal Ready (DTR) signal is lost on the serial port. Write the profile. admin> write -f If your Stinger unit is operating with two control modules, both are working in parallel.
The ssh program can replace Telnet, which is a less secure method of administrative access. Lucent recommends that you use ssh for administrative access to a TAOS unit. For information about how to disable Telnet access, see “Disabling telnet access” on page 1-10.
Administering a Stinger System Managing administrative access to the unit Encryption and MAC key re-exchange The SSHv2 draft recommends that the encryption and MAC keys be changed after each gigabyte of transmitted data or after each hour of connection time, whichever occurs sooner.
Page 30
Administering a Stinger System Managing administrative access to the unit Parameter Specifies Version of the SSH protocol that the system negotiates. Valid ssh-version settings are as follows: ■ any-ssh-version (the default)—SSHv1 and SSHv2 ssh-version-1—Only SSHv1 is negotiated. ■ ssh-version-2—Only SSHv2 is negotiated. ■...
Administering a Stinger System Managing administrative access to the unit -Socket- Local Port InQLen InQMax InQDrops Total Rx Service 1023 Syslog 1022 0 ASyslog 1021 0 ASyslog 0 EchoSer Sntp 5150 Atmp 1020 0 RadAuth Snmp tcp: -Socket- Local Remote Service State 1/c 131073 *.22 LISTEN...
Administering a Stinger System Managing administrative access to the unit Telnet access The secure shell program is more secure method for administering the Stinger system remotely. You can disable Telnet access on a system, but if you must use Telnet, consider the additional security measures described below.
Page 33
Administering a Stinger System Managing administrative access to the unit [in TACL:permit-list[1]] valid-entry = no source-address = 0.0.0.0/0 source-address-mask = 0.0.0.0 Parameter Setting enable-permit Enables or disables control over telnet access to the system on the basis of the permit-list settings in the tacl profile.
Administering a Stinger System Creating user profiles for administrative access Escape character is '^]'. Connection closed by foreign host. Summary of administrative access available Table 1-3 shows the type of access available on the system based on the settings of the ssh-enabled and telnet-enabled parameters.
Administering a Stinger System Creating user profiles for administrative access If you are already logged into the Stinger unit, make sure you are at the highest level by entering the list .. command (possibly more than once), as in the following example: admin>...
Administering a Stinger System Creating user profiles for administrative access Enabling two level authentication You can configure the system to require a second level of authentication for the following types of access to a Stinger unit or for any combination of the following: Telnet access using a system IP address ■...
Page 37
Administering a Stinger System Creating user profiles for administrative access Command-line RADIUS attribute Specifies interface parameter Ascend-User-Login- login-level Login level for this user profile. Specify one of the Level following values: ■ first-level (the default)—This user profile is to be used for first level authentication. second-level—This user profile is to be used for ■...
Administering a Stinger System Creating user profiles for administrative access Settings in the system profile To configure second-level authentication for a Stinger system, in the system profile, set the user-second-level-authentication parameter. The user-second-level- authentication parameter is defined as follows: Parameter Specifies Enables/disables two-level user authentication for the different user-second-...
Administering a Stinger System Creating user profiles for administrative access Sample configuration Suppose you have an existing user profile called admin. To require two levels of authentication for the user admin, create a new user john and configure it as a first- level login.
Administering a Stinger System Creating user profiles for administrative access The system generates a log message whenever a login attempt fails. The log message indicates whether the level of authentication failure is at the first level or second level. For example: LOG critical, Shelf 1, Controller, Time: 16:46:32-- login failure: user 'john', source '135.17.134.39' on first level access LOG critical, Shelf 1, Controller, Time: 16:47:17--...
Administering a Stinger System Creating user profiles for administrative access shelf-router-1/8> When a user has successfully logged in, the host generates a log message, such as the one shown below: LOG info, Shelf 1, Controller, Time: 19:57:03-- login success : user 'admin', source 'control bus'on first level access LOG info, Shelf 1, Controller, Time: 19:57:08-- login success : user 'user1', source 'control bus'on second level access User account and user password expiration...
Administering a Stinger System Creating user profiles for administrative access Setting expiration dates for user accounts and passwords The following parameters in the user profile enable you to view the last login date for a user account and specify an expiration date for a user account and user password. Only user account expiration is supported by RADIUS.
Administering a Stinger System Creating user profiles for administrative access Enforcing a password check To configure the system to validate that any new password created is unique and that it is at least 8 characters in length, with at least two numbers and four alphabetical characters, set the enforce-password-check parameter in user profile to yes.
Administering a Stinger System Creating user profiles for administrative access The following sample session shows a user changing an expired password: bash-2.05$ telnet 135.17.134.28 Trying 135.17.134.28... Connected to 135.17.134.28. Escape character is '^]'. User: user1 Old Password: New Password: ReEnter New Password: SECOND LEVEL ACCESS User: user2 Old II Level Password:...
Administering a Stinger System Creating user profiles for administrative access Table 1-4. Permissions and associated commands (Continued) Permission Command class Allow-Password N/A. The Allow-Password permission enables a user to view passwords. If the permission is set to no, the user sees a row of asterisks instead of the actual configured password.
Page 47
Administering a Stinger System Creating user profiles for administrative access assign a user group to a user by specifying a valid user-group profile for the user- group parameter in the user profile. Creating a user group To define a command user group, set the following parameters in the user-group profile.
Page 48
Administering a Stinger System Creating user profiles for administrative access Parameter Setting Enable/disable permission for the users in the group to exclude-listed-commands use the commands designated by the command parameter. With the default no setting, users have permission to use the designated commands. Specify yes to disable permission to use the designated commands.
Page 49
Administering a Stinger System Creating user profiles for administrative access admin> read user ted admin> set allow-update = yes admin> set allow-system = yes admin> set allow-termserv = yes admin> set allow-diagnostic = yes admin> set allow-password = yes admin> set allow-code = yes admin>...
Page 50
Administering a Stinger System Creating user profiles for administrative access Verifying user group settings The system does not prohibit you from entering a command user group or a user that does not exist, nor from entering an invalid list of commands. Use the usergroupcheck command to verify that your specifications are valid.
Administering a Stinger System Creating user profiles for administrative access contents of the ARP cache, and is protected by the system level in both the user and user-group profiles. In addition, the option to add entries to the table is protected by the diagnostic or update level.
Administering a Stinger System Creating user profiles for administrative access going on at the prompt. For example, the following commands cause messages at the critical, alert, and emergency levels to be displayed: admin> read user test admin> set log-display-level = critical admin>...
Administering a Stinger System Basic system settings Basic system settings The following sections describe how to set the system name, time, date and system clock source. Setting the system name The Stinger system name is used only during Point-to-Point Protocol (PPP) negotiations.
Administering a Stinger System Basic system settings admin> set date day = 06 admin> set date year = 2002 admin> write Configuring system clocking The Stinger unit requires a clock source for its timing subsystem. By default, the system uses the a built-in 8kHz clock on the single or primary control module as its timing source.
Administering a Stinger System Displaying basic system information sources of equal priority are present, the system selects the first valid clock source. (A clock source is valid if the clock-source parameter is set to eligible and the OC12, DS3, OC3, or E3 interface is synchronized.) Once it has selected a clock source, the system uses that source until the source becomes unavailable or a higher-priority source becomes available.
Lucent Stinger CRT COP ■ On a redundant system, if you enter the info command from the secondary control module, this field shows Lucent Stinger. System name Name of the system as configured in the system profile. This field reports not configured if no value is specified in the system profile.
Administering a Stinger System Displaying basic system information If you specify a slot and shelf number, the uptime command displays the current time; identifies the module installed in the slot, and the length of time that the module installed in the slot has been operating. The following example shows that an SDSL LIM in slot 3 has been operating for 48 minutes and 38 seconds: admin>...
Administering a Stinger System Displaying basic system information Figure 1-6. Sample contents of a status window Left: Connections Top: General 12 Connections ScootersStngr Status 0008 c9 ATM 04/09/ 0 7616K Serial number: 123456 Version: 9.5.206 0007 c7 ATM 04/07/ 0 7616K 0006 c11 ATM 04/11/ 0 7616K Rx Pkt: 998004...
Administering a Stinger System Displaying basic system information If the status window is not already visible, the connection command opens it with the connection-status information displayed: admin> connection 2 Connections | Status 0003 test1 A 02/01/01/ 0 8000 | Serial number: 11XYZ90A7 Version: 9.7 0002 test2 A 01/17/01/ 1 155M | | Rx Pkt: 184381...
Administering a Stinger System Displaying basic system information admin> line Or, you can use the following command to specify that the line-status information appears in the top of the window, replacing the general status information: admin> line top You can display information about all lines installed in the system if you wish, but the default is to show information only about enabled lines.
Administering a Stinger System Displaying basic system information This message indicates the key sequences you can use for displaying additional information in the Log area: The Down Arrow and Up Arrow keys display the next and previous messages in ■ the buffer, respectively.
Administering a Stinger System Displaying administrative connections Viewing the factory configuration and software licenses The read-only base profile displays software version, enabled features (software licenses), network interfaces, and other system information that is not modified across resets. These values are read from the system ROM, security program array logic (PAL), and the hardware assembly itself.
Administering a Stinger System Displaying administrative connections Field Description Slot:Item Shelf:slot:item/logical-item of the host port to which the call was routed. Tx/Rx Rate Transmit and receive rate. Type of service in use for the session. Following are the possible values: --- The service is being negotiated.
Administering a Stinger System Displaying administrative connections To display only the relevant username, include the -o option as follows: admin> userstat -a 1.1.1.238 -o %u Username net1 <end user list> 1 active user(s) Displaying information related to a known username Use the userstat -u command to display information related to a known username.
Administering a Stinger System Displaying administrative connections Displaying administrative users The who command displays names of administrative users, user profiles, and IP addresses of administrative users from Telnet sessions. An asterisk (*) denotes the current session. For example: admin> who user profile from...
Administering a Stinger System Resetting a Stinger system Resetting a Stinger system When you reset the Stinger system, it restarts and terminates all active connections. All users are logged out, and the default security level is reactivated. In addition, a system reset can cause a WAN line to temporarily shut down due to momentary loss of signaling or framing information.
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services ......2-1 Configuring call logging ......... . . 2-12 2-12 The Stinger unit monitors itself continuously and generates error and event messages related to its operations.
Page 68
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services auxiliary-syslog[1] = { no info 0.0.0.0 514 local0 } auxiliary-syslog[2] = { no info 0.0.0.0 514 local0 } admin> list 1 [in LOG:auxiliary-syslog[1]] syslog-enabled = no syslog-level = info host = 0.0.0.0 port = 514 facility = local0...
Page 69
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services Parameter Setting port Destination port of the syslog host that receives the first data stream. In the auxiliary-syslog [1] subprofile, the port value specifies the destination port of the syslog host that receives the second data stream.
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services Parameter Setting syslog-level Lowest level of log messages that the Stinger unit sends to the syslog server. All levels above the level you indicate are included in syslog messages. For example, if alert is specified, messages at the emergency and alert levels are included.
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services no user commands). To enable command logging, set this parameter to a value greater than zero. For example, the following commands configure the system to save up to 100 commands: admin>...
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services Field Indicates User session ID number. Card Shelf and slot number from which the command was entered. Command Command entered by the user. Viewing the cmd-log profile If command logging is enabled, the system creates a cmd-log profile for every command entered by a user.
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services Saving command logs You can save command log profiles to a file in the flash card or to a remote system using the save command. For example: admin>...
Page 74
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services Enabling the system to save log messages as profiles The following parameters in the log profile enable the saving of a log message as a profile. These parameters are visible only if in the user profile, allow-debug is set to yes.
Page 75
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services If you restore a saved configuration in which log saving enabled, the system will ignore the restored setting and will continue to use the existing setting. Viewing log-entry profiles You can save log-entry profiles to a file in the system flash card or to another device on the network.
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services Parameter Specifies Instance of a particular type of log entry (boot or runtime). This index value is incremented by 1 every time an instance of the type of log occurs.
Configuring logging, Syslog, and call logging services Configuring system logging and Syslog services Enabling the Syslog facility on the Stinger unit The following sample commands enable syslog reporting admin> read log admin> set syslog-enabled = yes admin> write Configuring Syslog streams The stream of records sent by the Stinger unit to a syslog server is called a syslog stream.
NavisAccess™ 5.1 and later releases to monitor, report, and send alarms on various performance and failure information for the Stinger unit. For additional information, go to http://www.lucent.com/products/ and search on NavisAccess. Overview of call logging The main purpose of Stinger call logging is to provide details about physical-layer line statistics to a management station for all active DSL OC3, DS3, and E3 trunk lines in a Stinger unit.
Page 79
Configuring logging, Syslog, and call logging services Configuring call logging admin> set call-log-enable = yes admin> set call-log-host-1 = 10.2.3.4 admin> set call-log-timeout = 10 admin> set call-log-stop-only = yes admin> set call-log-limit-retry = 3 admin> write Stinger® Administration Guide 2-13...
Page 81
Stinger MRT refers to the 19” and 23” versions of the Stinger MRT and Stinger MRT-2 units. The chassis of Stinger FS, Stinger FS+, Stinger LS, Stinger RT, or Compact Remote units have slots that accept plug-in modules with different functions. The smaller...
The show command lists the address of all modules installed in a Stinger system including those installed in remote shelves, their required operating states and current operating states, and the type of module installed. Following is a sample output from a standalone Stinger FS, Stinger FS+, Stinger LS, or Stinger RT, admin> show...
Working with Stinger Shelves and Modules Viewing system components Displaying the status of LPMs, PSMs, and CLT modules The rearslotshow command shows the status of all slots used for LPMs, path selector modules (PSMs), and copper loop test (CLT) modules. It also reports on the status of the midplane sparing bus.
Working with Stinger Shelves and Modules Viewing system components Port connected to - On Master Port connected to - On Slave For an explanation about the output of the toplogy command, see the Stinger MRT Getting Started Guide for your unit or the Stinger Reference. Displaying a picture of the topology For a picture of the topology, use the topology -p command.
Working with Stinger Shelves and Modules Viewing system components Number of Nack Sent Number of Reset Sent : 0 Number of Init Sent Table 3-1 shows details displayed by this command: Table 3-1. Statistics displayed for a remote shelf Output field Description of value discovery restart Number of times autodiscovery has been restarted.
Working with Stinger Shelves and Modules Viewing system components Output field Description of value Request Rcvd with Invalid Autodiscovery received from with invalid shelf ID (a ShelfID shelf ID outside the range from 2 to 7). If you execute this command on the remote shelf, statistics are displayed for that shelf only.
Working with Stinger Shelves and Modules Viewing system components Using the show command with the shelf and slot numbers To use the show command for information about a particular module, add the shelf and slot numbers as arguments. For example: admin>...
1 9 shelf-router-1/9> The following command opens a session to the LIM located in shelf 1, slot 4 of a Stinger FS, Stinger LS, or Stinger RT unit: admin> open 1 4 dmtadsl-atm-1/4> The following command opens a session with virtual slot 1 on a Stinger MRT: admin>...
Working with Stinger Shelves and Modules Changing the state of a module Changing the state of a module You can temporarily start or stop the operation of a module, put it in maintenance mode, or reset it by using the slot command or by setting the reqd-state parameter in the slot-admin profile.
Working with Stinger Shelves and Modules Changing the state of a module’s interface slot-address* = { shelf-1 slot-1 0 } reqd-state = reqd-state-up Parameter Setting slot-address Address of the slot. Required operational state of the slot. The setting, reqd-state nonoperational, temporarily disables a slot and its module. The change in status is complete when the setting of current- state parameter has changed to match the setting of the reqd- state parameter.
Working with Stinger Shelves and Modules Changing the state of a module’s interface To reenable port 24, use the device command with the -u option as follows: admin> device -u {{1 3 24} 0} device { { 1 3 24 } 0 } state change forced Using the device-state profile Every host interface or network interface on a Stinger unit has a device-state profile, which stores the current state of an interface and allows you to change it.
Removing a module and its configuration Removing a module and its configuration Stinger FS, Stinger FS+, Stinger LS, Stinger RT and Compact Remote modules are hot-swappable. When you remove a module, by default, the system retains its configuration. You can reinstall a module or install another of the same type in the same slot without reconfiguring the system or uploading a backup configuration.
Working with Stinger Shelves and Modules Removing a module and its configuration When a new module does not match a slot type When the system detects that a newly installed module does not match existing slot configuration and the slot-type-check parameter is set to yes, the module remains inactive and the condition is reported in the output of the show command, the slot- status profile for the slot, and chassis.mib.
Working with Stinger Shelves and Modules Removing a module and its configuration If the operating state of a LIM or trunk module is MISMATCH, you can activate the newly installed LIM or trunk module or you can install a module type that matches the existing configuration for the slot.
Working with Stinger Shelves and Modules Removing a module and its configuration { shelf-1 slot-5 0 } ep-72-gs-adsl2plus { shelf-1 trunk-module-2 0 } UP e3-atm-trunk-daughter-card Activating a trunk module To activate a trunk module in the mismatched state, set the slot-type-check parameter to no and then reset the trunk using the atmtrunkreset trunknum command.
SPVCs. Recovering from a failed module installation If you installed a new module in a Stinger FS, Stinger FS+, Stinger LS, or Stinger RT unit before upgrading the system software, and the module does not begin operating properly, you can attempt to recover by clearing NVRAM or removing the module.
Working with Stinger Shelves and Modules Recovering from a failed module installation Using the nvram command Before clearing NVRAM, see “Retaining configuration information after clearing NVRAM” on page 6-3. To recover from a failed module installation using the nvram command, proceed as follows: Save the current system configuration.
Working with Stinger Shelves and Modules Enabling LIM self-testing Enabling LIM self-testing You can configure the system to periodically audit Ripper-based LIMs to detect lockups at the DSL or SONET interface. When a lockup occurs, the system resets the Ripper device, which prevents cells from being dropped. This capability is supported on Ripper-based LIMs, listed below: 24-port ADSL LIMs (dadsl-atm-24-card) ■...
Monitoring Interfaces on LIMs and Trunk Modules Monitoring trunk module interfaces Monitoring trunk module interfaces Table 4-2 summarizes the status profiles and commands that you use to monitor the physical interfaces of Stinger trunks modules. Table 4-2. Summary of profiles and commands for monitoring interfaces Device Commands Status profile...
Monitoring Interfaces on LIMs and Trunk Modules Monitoring trunk module interfaces The ds3-atm-stat, e3-atm-stat, and oc3-atm-stat profiles show the physical address of the device, state of the line, redundancy settings, and error and statistic information specific to that trunk module. The following sample commands display the ds3-atm-stat profile for one of the DS3 interfaces of a DS3-ATM trunk module installed in slot 17: admin>...
Monitoring Interfaces on LIMs and Trunk Modules Monitoring trunk module interfaces Displaying trunk port status To display the status of the all trunk ports of a Stinger unit, use the -a option: admin> atmtrunks -a All OC3 ATM trunks: OC3 Lines (dvOp dvUpSt dvRq sAdm...
Monitoring Interfaces on LIMs and Trunk Modules Monitoring DSL interfaces Line 1 18 4 } (Down Idle DOWN DOWN 00854) Line 1 18 5 } (Down Idle DOWN DOWN 00855) Line 1 18 6 } (Down Idle DOWN DOWN 00856) Disabled E3 ATM trunks: E3 Lines (dvOp...
Monitoring Interfaces on LIMs and Trunk Modules Monitoring DSL interfaces sdsllines, shdsllines, and imagroups commands display information about interfaces of a specific type in a Stinger unit. You use these commands with one of the following options: Option Specifies Displays information about all DSL interfaces. Displays all disabled interfaces of a particular type.
Page 109
Monitoring Interfaces on LIMs and Trunk Modules Monitoring DSL interfaces admin> dmtaldsllines -a (dvOp dvUpSt dvRq sAdm nailg) Line 1 3 1 } (Down Idle DOWN DOWN 00101) Line 1 3 2 } (Down Idle DOWN DOWN 00102) Line 1 3 3 } (Down Idle DOWN...
Monitoring Interfaces on LIMs and Trunk Modules Monitoring DSL interfaces Displaying T1 and E1 interfaces The following sample command displays information about the T1 modules installed in slot 4 and slot 6: admin> imalines -a All IMA lines: (dvOp dvUpSt dvRq sAdm lMode Nailg) Line { 1 4 1 }...
Monitoring Interfaces on LIMs and Trunk Modules Monitoring remote shelves You can enable this feature for an IMA group by setting the ima-auto-restart parameter in the imagroup profile to yes. For example: [in IMAGROUP/ima1] admin> ima-auto-restart = yes Monitoring remote shelves Table 4-5 summarizes the profile and command that you can use to display information about Compact Remote shelves and its components.
Page 112
Monitoring Interfaces on LIMs and Trunk Modules Monitoring remote shelves Parameter Specifies remote-shelf-id Shelf ID of the remote shelf represented in this profile. host-port Gigabit uplink to the host, in the format {{shelf ID, slot number, interface} logical item Number}. The second Gigabit Ethernet uplink to the host, if host-port-2 applicable.
Monitoring Interfaces on LIMs and Trunk Modules Monitoring remote shelves Parameter Specifies topology:port-2-shelf Shelf ID of the remote shelf directly connected to the second cascade port on the host. Not meaningful for Stinger CR units. validation-status:id- Indicates whether the validation-id setting in the valid remote-shelf-config profile matches the validation ID specified by the remote shelf’s DIP-switch setting.
Monitoring Interfaces on LIMs and Trunk Modules Displaying DSL performance settings Field Indicates Shelf number Shelf Name Shelf name Shelf Name Shelf Location Location of the remote shelf Shelf Type Stinger MRT or Compact Remote Host Port Link to the host. Shelf Enabled Administrative state of the remote shelf Oper State...
Monitoring Interfaces on LIMs and Trunk Modules Displaying DSL performance settings Displaying the current time The adslmib t port command displays the current time retrieved from the active control module. For example: gs-72-1/3> adslmib t 1 Date: 06/04/2004 Time: 21:06:56 Displaying ADSL physical entries The adslmib a port command displays basic ATU-C and ATU-R information.
Monitoring Interfaces on LIMs and Trunk Modules Displaying DSL performance settings Displaying interval statistics for disruption of service events The adslmibmgr c port command displays interval statistics for disruption of service events. For example: gs-72-1/3> adslmib c 1 Lofs: 0 Loss: 0 Lols: 0 Lprs: 0...
Monitoring Interfaces on LIMs and Trunk Modules Displaying DSL performance settings The following sample command shows ADSL block statistics for the second to last completed 15-minute interval: gs-72-1/3> adslmib j 1 2 <<< ATU-C Interval Channel Performance Data Entry >>> Number: 13 recvBlks: 50445 txBlks: 52155...
Monitoring Interfaces on LIMs and Trunk Modules Redundancy support for Stinger services Redundancy support for Stinger services Table 4-6 describes the type of redundancy support provided for Stinger services, based on the type of control module installed in the system. Table 4-6.
Monitoring Interfaces on LIMs and Trunk Modules Monitoring LIM and LIM port redundancy To determine the duration of service interruption (in seconds), use the following formula: 120 seconds + (number_of_connections divided by 6) For best case scenarios, the following formula applies: 120 seconds + number_of_connections divided by 8 Monitoring LIM and LIM port redundancy You can configure a redundant line interface module (LIM) that you can manually...
It also reports on the status of the midplane sparing bus. For example, suppose that a Stinger FS is equipped with ADSL LIMs and SDSL LIMs. The 24-port ADSL LIM in slot 1 has failed and is being replaced by the 24-port ADSL LIM in slot 14.
Monitoring Interfaces on LIMs and Trunk Modules Monitoring redundant trunk groups 1-7-4 ADSL 1-7-5 ADSL 1-7-6 ADSL 1-7-9 ADSL 1-7-14 ADSL 1-16-21 HDSL2 1-16-22 HDSL2 1-16-23 HDSL2 The following sample command displays all ports that are configured for automatic or manual redundancy: admin>...
Page 128
Monitoring Network Processor operations Monitoring network processor operations Parameter Setting Fixed-rate bandwidth that has been allocated for the interface. allocated-fixed- bandwidth bandwidth- Indicates whether the system was able to fully allocate the allocation- status requested fixed-rate bandwidth. bandwidth-serviced The requested fixed-rate bandwidth is fully allocated.
Monitoring Network Processor operations Monitoring network processor operations Enabling and disabling statistics collection The stats enable/disable command is applicable only for IP QoS statistics. For all other network processor operations, statistics monitoring is always enabled. Monitoring IP QoS To collect IP QoS statistics, determine the WAN interface number for the connection for which you would like to monitor IP QoS.
Page 132
Monitoring Network Processor operations Monitoring network processor operations PRIORITIES Number of priority Lowest priority Mapping priority/COS :P[0]=6 P[1]=x P[2]=x P[3]=5 P[4]=4 P[5]=3 P[6]=x P[7]=2 SCHEDULING Line Rate :150015 Data queue Id :8276 Scheduler ID PDU type :cell Number of COS queues ATM service category :VBR non real time PCR (cell per sec)
Page 133
Monitoring Network Processor operations Monitoring network processor operations Number of priority Lowest priority Mapping priority/COS :P[0]=3 P[1]=2 P[2]=x P[3]=x P[4]=x P[5]=x P[6]=x P[7]=x SCHEDULING Line Rate :1000000 Data queue Id :8286 Scheduler ID PDU type :packet Number of COS queues Scheduling priority Peak Rate (Kbps) :49997...
Monitoring Network Processor operations Monitoring network processor operations Disabling IP QoS monitoring To disable IP QoS monitoring, enter the stats disable np ipqos command. For example: admin> stats disable np ipqos 15 IP QOS monitoring. display counter for IF 15 QoS monitoring direction: downstream Counter COS 2 :917 Counter COS 3 :0...
Monitoring Network Processor operations Monitoring network processor operations ---------------- Discard for Queue 291 :0x0000 Discard for Queue 293 :0x0000 Discard for Queue 294 :0x0000 Discard for Queue 295 :0x0000 Clearing statistics for a connection To clear statistics for a connection, enter the stats clear np conn slot ifnum command.
Monitoring Network Processor operations Monitoring network processor operations IP TTL expiry count: 0 IP Header version error count: 0 GE IP Header checksum error count: 0 Unrecognized Tag error count: 0 P2 Framer error count: 0 P2 VLAN error count: 0 IN Filter Discard: 0 OUT Filter Discard: 0 Ethernet Filter Discard: 0...
Page 137
Monitoring Network Processor operations Monitoring network processor operations to monitor logical port traffic and error statistics.Logical port statistics. lportNum is the logical port number, a value from 1 through 16. count specifies the number of entries to display. Valid values are from 1 through 16. If you specify 3 for lport and 4 for count, the output shows entries for logical ports 3, 4, 5, and 6.
Monitoring Network Processor operations Monitoring network processor operations Scheduler traffic and error statistics You can use the stats traffic|error np sch sid [count|count rspslot] command to report scheduler traffic and error information. The traffic and error options report the same output. sid is the scheduler ID.
Monitoring Network Processor operations Monitoring network processor operations Enabling, disabling, and clearing statistics collection To enable statistics collection on Ethernet ports, use the stats enable ether command, and then specify if you would like statistics on all ports or for a specific Ethernet port.
Monitoring Network Processor operations Monitoring network processor operations Displaying Ethernet traffic and error statistics and traffic rates You can display Ethernet traffic and error statistics and traffic rates for all Ethernet ports or for a specific port. When you display statistics for all ports, the output is summarized.
Page 141
Monitoring Network Processor operations Monitoring network processor operations Rx error overrun Tx underrun Rx Error code Tx defer Rx false carrier Tx excess defer Rx error max SDU Rx IW overrun Rx error MRU Displaying Ethernet traffic rates You can display Ethernet rates for all Ethernet ports by entering the stats rate ether command and specifying a port number(s).
Monitoring Network Processor operations Monitoring network processor operations 5760 6052 5696 6120 5760 6120 5696 6052 Displaying ATM statistics—Fast Ethernet Trunk module You can use the stats traffic|error|rate atm command to display ATM statistics for the interface of the Fast Ethernet Trunk module. In this release, the system is always enabled to collect ATM statistics.
Monitoring Network Processor operations Monitoring network processor operations Clearing ATM statistics You can clear ATM statistics for all ports by using the stats clear atm all command or for a specific port by using appending the port number to the stats clear atm command.
Page 144
Monitoring Network Processor operations Monitoring network processor operations Statistics collection enabled : connection 22 With the following command, the system collects AAL5 statistics only for a specific connection, in this example, channel 22: fet-1/17> stats enable aal5 22 Statistics collection enabled : connection 22 Similarly, if you disable the system from collecting AAL5 statistics on all connections, statistics collection will also be disabled for any newly created channel.
Monitoring Network Processor operations Optimizing system performance To display AAL5 error statistics only for a specific connection, append the connection ID to the stats error aal5 command. For example: fet-1/17> stats error aal5 22 ConnID CRC SIZE-ERR UNDERFLOW MAXSDU IWUNDRUN IW MAXMRU Clearing AAL5 statistics The stats clear aal5 command clears AAL5 statistics.
Monitoring Network Processor operations Optimizing system performance overall performance of the system (system performance) and to control the rate at which connections or service is restored to end-users (call performance). If only ATM PVC or SPVC connections are configured on the system, or if the system does not support an IP control module, the batch processing parameters are of no consequence.
Monitoring Network Processor operations Optimizing system performance performance are noticeably impacted when many updates must be communicated to the underlying hardware, as would occur, for example, after a system reset. A setting between 10-20 seconds allows a greater number of configuration changes to be batched together, which results in improved overall system and call performance.
LIM ASICs. The default system-integrity profile configuration for control modules enables continuous background testing of the control module ASIC. Lucent Technologies recommends that you do not disable this default. The default system-integrity configuration for LIM testing is a periodic integrity test for those LIMs that support it, and a periodic reset for earlier LIMs that are not equipped for integrity testing (STGR-LIM-AD-12 and STGR-LIM-SH-48).
Page 149
Monitoring Network Processor operations Maintaining ASIC Integrity [in SYSTEM-INTEGRITY:integrity-config[8]] enable-continuous-detection = yes detection-interval = 100 only-one-correction = yes correction-factor = 5 auto-correction-enable = yes interval-auto-correction = 600000 Parameter Setting enable-continuous- Enable/disable detection and correction in continuous detection mode. The default of yes is recommended for the control modules.
Page 150
Monitoring Network Processor operations Maintaining ASIC Integrity auto-correction-enable = yes interval-auto-correction = 600000 Parameter Setting Enable/disable detection and correction in continuous enable-continuous- mode. The default value is no for LIM slots, which detection allows sufficient correction for most LIMs while conserving system resources.
Monitoring Network Processor operations Maintaining ASIC Integrity Enabling centralized integrity checks In addition to the periodic automatic correction performed by the LIMs, you can enable centralized detection, which causes the control module to perform integrity tests on every LIM in the unit that is equipped for ASIC testing. If a LIM requires correction, the control module sends a message causing the LIM to reset its ASIC.
Page 153
Managing System Configuration and Memory Saving system configuration ........6-1 Displaying NVRAM usage statistics .
Managing System Configuration and Memory Saving system configuration configuration on the secondary control module. For syntax information, see the Stinger Reference. Note To save passwords, you must have sufficient permissions to view password fields. (For a discussion of permissions, see “Understanding command permissions” on page 1-22.) Without this permission, passwords are not properly saved.
Managing System Configuration and Memory Displaying NVRAM usage statistics The sleep command specifies the number of seconds the system pauses before it executes the next command. You can specify a value between 0 and 60 seconds. The default setting is 5 seconds. NavisAccess™ management software users can introduce this command in a configuration file sent to a Stinger unit to time the saving of configuration profiles.
Managing System Configuration and Memory Retaining configuration information after clearing NVRAM How it works You save the system IP address and other basic configuration that you would like to be restored for your system to the default.cfg file. You must save the default.cfg file to root directory or to root directory/current in flash memory.
Page 157
Managing System Configuration and Memory Retaining configuration information after clearing NVRAM Reqd Oper Slot Type { second-control-module } ( PRIMARY ) Slot state information is not available for secondary controller admin> ls ls Flash card 1: current/ 0 Tue Sep 24 22:27:14 2002 /current: stngrima.ffs 872522 Wed Jun 30 9:39:18 2004 Version 9.7.1...
Managing System Configuration and Memory Restoring or updating system configuration Enter the ls command from the secondary control module to verify that the default.cfg file has been saved to the desired directories on the secondary module. Issuing the nvram command on a system with a default.cfg file On a system configured with a default.cfg file, after you issue the nvram command, the system undergoes two reboot cycles.
Managing System Configuration and Memory Extended profiling on control modules v2 or higher For example, to load a configuration file named unit.cfg from network host 10.8.7.2 to the PCMCIA flash card in slot 1, proceed as follows: admin> load config network 10.8.7.2 /unit.cfg To load the unitrel.tar file from a network host named host1, proceed as follows: admin>...
Managing System Configuration and Memory Extended profiling on control modules v2 or higher versions v2 or higher. You can use the version command to display a control module’s version number. When to enable extended profiling Extended profiling is required on hosted Stinger systems with 4000 or more connections (PVCs).
Page 161
Managing System Configuration and Memory Extended profiling on control modules v2 or higher Enter the nvram -e command from the primary control module. For example: admin> nvram -e The system displays the following messages and a prompt: Warning 1, Note this command will RESET THE SYSTEM. Warning 2, if your boot load does not support extended profiles, you WILL Lose your configuration! Warning 3, once you switch to extended segments...
Restore the saved configuration. Transferring code images between control modules On a Stinger FS, Stinger FS+, Stinger LS, or Stinger RT unit with dual control modules, you can transfer code images from one control module to the other using the loadmate command. Both control modules must be running TAOS 7.11.2 or later releases.
Managing System Configuration and Memory Troubleshooting the restore process admin> loadmate 1 2 You cannot run a load and loadmate operation or two loadmate operations simultaneously. Troubleshooting the restore process If the system terminates the process of loading a tar file, one of the following messages might appear: load aborted: not a tar image load aborted: a tar image, inconsistent with the specified load-type.
Managing System Configuration and Memory Using FTP to transfer files To use the FTP client capability, your unit must have a file allocation table (FAT)- formatted flash memory card in its PCMCIA slot. The FTP client supports active connections only. In addition, you cannot cancel an FTP download or upload that is already in progress.
Managing System Configuration and Memory Using FTP to transfer files (149.52.26.125,7018) (2258239 bytes). 2258239 bytes recieved in 30 seconds 226 Binary Transfer complete. ftp> quit 221 Goodbye. The following command shows how to connect to an FTP server and specify a source IP address of 1.1.1.1: admin>...
Managing System Configuration and Memory Using FTP to transfer files Username and password details If a username or password includes any of the following characters, you must encode them using the hex values listed in the table that follows. Character Hex value Slash (/) At sign (@)
Managing System Configuration and Memory Using FTP to transfer files Changes the directory on the Stinger unit to current in the first PCMCIA slot with a FAT-formatted flash card Opens an FTP session with host 135.254.196.191 Logs in with username foo and password bar Changes the remote system’s directory to /home/test/ Switches to ASCII mode Downloads file ftptest.txt to current...
Managing System Configuration and Memory Using a script to configure a Stinger unit Using a script to configure a Stinger unit The TAOS command-line interface allows you to create configuration scripts with a simple text editor and a Telnet client program with a Text Upload feature. This section briefly describes how you can use a script to make changes to the Stinger configuration.
If the Stinger FS, Stinger FS+, Stinger LS, or Stinger RT unit contains two control modules, you must always load the same version of software to both control modules.
Managing System Configuration and Memory Loading specific module images can cause an overflow in the PCMCIA flash card or built-in flash memory. To prevent a flash overflow, use the following procedure: Set the unknown-cards parameter in the load-select profile to skip. admin>...
Managing PCMCIA flash cards Managing PCMCIA flash cards Each control module on a Stinger FS, Stinger FS+, Stinger LS, and Stinger RT unit supports up to two PCMCIA flash memory cards. The Stinger MRT chassis contains built-in flash memory. Currently, the flash cards contain code for the modules and the control module.
If necessary, download the code file again from the Lucent Technologies FTP server. To check the file system on the flash card in PCMCIA slot 1, or built-in flash memory, use the fsck command as shown in the following example: admin>...
Managing System Configuration and Memory Optional firmware (Centillium-based LIMs) Block Size: 512 (typical: 512) Blocks Per Cluster: 4 (typical: 1, may be powers of 2 up to 16) Reserved Blocks: 1 (typical: 1, but may be 0 - hundreds) Number of FATs: 2 (must be 2) Number of Root Directory Entries: 128 (typically betwn 32 and 224) Total Blocks: 13824 Media Descriptor: f0 (ignored)
Managing System Configuration and Memory Optional firmware (Centillium-based LIMs) Reset the LIM to force the system to load optional firmware onto the LIM. For example: admin> reset After resetting the LIM, as the LIM initializes, the system checks the flash device first for any firmware binary.
Managing System Configuration and Memory Upgrading bootprom on GE-COP, GE-OLIM, and IP RLIMs Log messages for firmware download events The following log messages report events related to the download of optional firmware: Event Log message LOG notice, Shelf 1, Slot 2, Time: 12:40:18-- Optional firmware was Firmware 0278 loaded successfully successfully loaded onto...
Managing System Configuration and Memory Upgrading bootprom on GE-COP, GE-OLIM, and IP RLIMs Updating bootprom on a GE-COP Once you have downloaded the GE-COP bootprom image onto the local file system, use the following instructions to update the GE-COP bootprom. Note the checksum of the bootprom before the update.
Managing System Configuration and Memory Upgrading bootprom on GE-COP, GE-OLIM, and IP RLIMs Do not power off or bounce this card while the programming is in progress or the pack will have to be sent back to the factory for repairs!!! !! WARNING !! !! WARNING !! existing Checksum CF73...
Managing System Configuration and Memory Upgrading bootprom on GE-COP, GE-OLIM, and IP RLIMs Verifying vendor information The romupdate -v command displays bootprom vendor information. For example: golim-1/4> romupdate -v Flash Vendor 20 Flash ID E3 6-26 Stinger® Administration Guide...
For an SNMP manager to access the Stinger SNMP agent, you must configure the Stinger unit with an IP address in the ip-global profile. For Stinger FS, Stinger FS+, Stinger LS, and Stinger RT units with redundant control modules, if you are using NavisAccess™...
Page 181
Administering the SNMP Agent Overview of the snmp profile Table 7-1. SNMP parameters and associated tasks (Continued) Parameter Task snmp-message-type Specifying the version of SNMP used by the Stinger SNMP agent. Specify one of the following values: ■ (the default)—The SNMP agent uses v1-and-v3 both SNMPv1 and SNMPv3 protocols.
Enabling read-write access and setting community strings Caution For security reasons, Lucent Technologies recommends that when you enable read-write access, you change the read-write community string from the well- known write value. By default, read-write access is disabled.
Administering the SNMP Agent Securing the SNMP agent admin> set read-write-enabled = yes admin> set read-write-community = @456test! admin> write Configuring host address security You can also enforce host address authentication before the agent accepts SNMP requests. Address security is optional but recommended. By enabling the enforce- address-security parameter in the SNMP profile, you exclude SNMP access from host SNMP manager addresses other than those you have specified.
Administering the SNMP Agent Securing the SNMP agent Parameter Setting Whether the unit accepts SNMPv1 messages only, SNMPv3 snmp-message- type messages only, or both SNMPv1 and SNMPv3 messages. This parameter applies only if the active parameter is set to yes in the same snmp-manager profile.
If the network-management license is not enabled, the Stinger unit silently discards incoming queries if the SNMP message is version 3. For information about software licenses, contact your Lucent Technologies sales representative. SNMPv3 USM features SNMPv3 security management provides Stinger units with the following features: Authentication—Provides data integrity and data origin authentication.
Page 186
Administering the SNMP Agent Securing the SNMP agent active-enabled = no read-write-access = no auth-protocol = md5-auth priv-protocol = no-priv auth-key = priv-key = Parameter Setting name Username of an SNMP management station. Messages sent to or from the SNMP station on behalf of this name use the security parameters specified in this profile.
Administering the SNMP Agent Securing the SNMP agent Parameter Setting priv-protocol Enable/disable encryption of messages sent on behalf of the user to or from the SNMP engine, and if enabled, the type of privacy protocol to be used. Specify one of the following values: no-priv (the default)—No encryption is required and ■...
Administering the SNMP Agent Securing the SNMP agent Generating privacy keys The snmpprivpass command automatically generates a privacy key for an SNMPv3 USM user. The command uses the following syntax: snmpprivpass username password Replace username with the SNMPv3 USM user for whom a privacy key is being generated, and password with the password used for generating the privacy key.
Administering the SNMP Agent Securing the SNMP agent admin> set security-level = auth-nopriv admin> write SNMPv3 notifications The Stinger unit authenticates and encrypts protocol data units (PDUs) as required by SNMPv3, and generates traps in SNMP version 2 (SNMPv2) Trap2 format. Depending on your configuration, a Stinger unit can send PDUs in SNMPv2 format or formats supported by TAOS 9.0-126 and earlier releases.
Page 190
Administering the SNMP Agent Securing the SNMP agent Configuring an snmpv3-notification profile Following are the snmpv3-notification parameters and their default settings: [in SNMPV3-NOTIFICATION/"" (new)] name* = "" active-enabled = no tag = "" type = Parameter Setting name Unique name for the profile, up to 16 characters. active-enabled Enable/disable generation of notifications.
Administering the SNMP Agent Securing the SNMP agent Parameter Setting security-model Security model to use when generating SNMP messages. Specify one of the following values: v1 (the default)—SNMPv1 security model. This setting is ■ valid only if msg-proc-model is set to v1. v3-usm—SNMPv3 USM.
Administering the SNMP Agent Securing the SNMP agent Enabling VACM To enable VACM, set the enable-vacm parameter to yes in the snmp profile. With this setting, each object in each incoming request (GET/SET/GETNEXT/GETBULK) and each object in the sysTrapOID of each outgoing trap (TRAP2) is verified for VACM access.
Administering the SNMP Agent Securing the SNMP agent Specifying view names for different types of access To map a group name, context prefix, context name, security model, and security level to a view name, set parameters in the vacm-access profile. Following is a listing of the profile’s default values: [in VACM-ACCESS/{""...
Administering the SNMP Agent Managing SNMP interfaces Parameter Setting OID in dotted decimal format. The default is null. tree- properties: view-tree-oid For example, to define a view called view1 with an OID of 1.3.6.1.4.1.529, enter the following commands: admin> new vacm-view-tree admin>...
Administering the SNMP Agent Managing SNMP interfaces Using the admin-state-perm-if profile The admin-state-perm-if profile holds information about Stinger unit nailed interfaces. The system creates a profile for an active nailed interface and assigns it an interface index. For example: admin> dir admin-state-perm 20 06/10/1999 14:25:32 con4-1 20 06/10/1999 14:25:32 con4-2 20 06/10/1999 14:25:32 con4-3...
Administering the SNMP Agent Managing SNMP interfaces Parameter Setting modem-table-index Modem table index assigned to the device whose state is stored in this profile. The system assigns a numeric value. Because the Stinger unit does not support modems, the value is always 0. desired-state Desired administrative state of the addressed device.
Administering the SNMP Agent Naming convention for SNMP-configured profiles { 1 18 3 } active { 1 18 4 } active { 1 18 5 } active Initiating interface state changes To enable or disable an SNMP interface, use the if-admin command with the -d option, and specify the interface number.
Administering the SNMP Agent Naming convention for SNMP-configured profiles atmVcCrossConnectRowStatus = createAndGo Default naming convention For each cross-connect entry you create via SNMP, the system creates a connection profile and assigns the profile a name that specifies the slot and port with the low ifIndex value first, followed by the slot and port with the higher ifIndex value.
Enabling a watchdog to monitor fan failure Stinger systems create watchdog-config profiles for each fantray assembly. On standalone Stinger FS, Stinger FS+, Stinger LS, or Stinger RT units the system creates three. On Stinger MRT units, a single watchdog-config profile is created.
Watchdogs, Alarms, and Traps Defining alarms admin> set watchdog-name = fan1 Watchdog routines for input relays Stinger units installed with revision 2 control modules A, B, A-J, or C can monitor the status of up to seven devices. A Stinger MRT unit can monitor up to four remote devices.
Page 205
Watchdogs, Alarms, and Traps Defining alarms physical-address = { any-shelf any-slot 0 } action = { off off off 0 off 0 } [in ALARM/"":action (new)] alarm-led-minor = off alarm-led-major = off alarm-relay-minor = off alarm-relay-minor-duration = 0 alarm-relay-major = off alarm-relay-major-duration = 0 Parameter Setting...
Watchdogs, Alarms, and Traps Defining alarms Parameter Setting physical-address Physical address of the entity that is being monitored by this alarm, as defined by its shelf, slot number, or item- number. The physical-address parameter applies only to line-state-change or slot-state-change events. Subprofile that specifies the actions that the Stinger unit action performs when it detects the event specified by the event...
Watchdogs, Alarms, and Traps Defining alarms admin> set action alarm-relay-major = on admin> set action alarm-relay-major-duration = 600 admin> set action alarm-relay-minor = off admin> set action alarm-relay-minor-duration = 0 admin> write -f By setting the physical-address parameter in an alarm profile to 0 0 0 (any shelf, any slot, any item), you can apply an alarm profile to the entire Stinger unit.
Watchdogs, Alarms, and Traps Defining alarms To display only the alarms for a particular line, specify the shelf, slot, and item number, as shown in the following example: admin> alarm -s 1 17 1 Type Address State Line Down { 1 17 1 } Active Monitoring and changing the status of alarms (alarm-stat profile) The alarm-stat profile enables you to monitor and change the status of alarms.
Watchdogs, Alarms, and Traps Defining alarms Line Down { 1 17 1 } Acknowledged Line Down { 1 17 2 } Active Line Down { 1 18 1 } Active Line Down { 1 18 2 } Active Clearing alarms You can use the alarm command or the alarm-state parameter to clear an alarm.
Watchdogs, Alarms, and Traps Defining alarms HOST> set physical-address shelf = shelf-2 An alarm profile specific to a remote shelf is deleted if the remote-shelf-config profile for that shelf is deleted, and the corresponding alarms are cleared. Table 8-1 lists alarm events related to MRT shelves: Table 8-1.
Page 211
Watchdogs, Alarms, and Traps Defining alarms Table 8-2. Compact Remote alarm events Alarm event definition Event on remote shelf that triggers alarm over-temperature-relay A temperature sensor on the remote shelf indicates an over-temperature condition. The status is shown in the over-temperature setting of the remote-shelf- stat profile.
Watchdogs, Alarms, and Traps Defining alarms HOST> set enabled = yes HOST> set event = input-relay-open HOST> write -f If one of the alarms is triggered, the alarm action takes effect, and the remote-shelf- stat profile is updated. In addition, the status is accessible in the output of the alarm -s command.
Watchdogs, Alarms, and Traps Configuring SNMP traps Clearing alarms from alarmActiveTable and alarmClearedTable To clear the alarms in alarmActiveTable and alarmClearTable of the alarm MIB, disable the associated trap profile by setting the active-enabled parameter in the trap profile to no. If the trap profile is disabled, the alarm model table reports RowStatus as NOT_IN_SERVICE.
Watchdogs, Alarms, and Traps Configuring SNMP traps Configuring the trap profile You must also activate a trap and specify a destination host and host port. The following parameters in the trap profile configure these settings: Parameter Setting active-enabled Enable/disable the system to send traps to the host specified by this profile: yes—The system sends traps defined by this profile.
Watchdogs, Alarms, and Traps Configuring SNMP traps The following parameters in the trap profile represent the trap classes, shown with their default settings: [in TRAP/""] alarm-enabled = yes security-enabled = no port-enabled = no slot-enabled = no ospf-enabled Parameter Setting alarm-enabled Enable/disable an alarm class events.
Page 216
Watchdogs, Alarms, and Traps Configuring SNMP traps Table 8-3. Parameters that enable or disable traps in the alarm class (Continued) Event Parameter Trap Failure in a communication link between linkdown-enabled LinkDown the unit and the SNMP manager. Communication link between the unit and linkup-enabled LinkUp the SNMP manager came back up.
Page 217
Watchdogs, Alarms, and Traps Configuring SNMP traps Table 8-3. Parameters that enable or disable traps in the alarm class (Continued) Event Parameter Trap The value of the call-log-dropped- CallLogDroppedPkt callLoggingDroppedPacketCount variable pkt-enabled changed from 0 to 1 (which indicates that packets are being dropped) or from 1 to 0 (which indicates that packets are no longer being dropped) in the call-logging MIB.
Watchdogs, Alarms, and Traps Configuring SNMP traps Table 8-3. Parameters that enable or disable traps in the alarm class (Continued) Event Parameter Trap ascend-multicast- multicastLinkDownTrap A multicast group leave activity has link-trap-enabled occurred. ascend-cac-fail- cacfail Connection admission control (CAC) trap-enabled failure for an ATM connection has occurred.
Watchdogs, Alarms, and Traps Configuring SNMP traps Table 8-4. Parameters that enable or disable traps in the security class (Continued) Event Parameter Trap Specific port has exceeded the number of use-exceeded- useexceeded DS0 minutes allocated to it. enabled Maximum number of login attempts for a password-enabled password Telnet session has been exceeded.
Watchdogs, Alarms, and Traps Configuring SNMP traps If the slot-enabled parameter is set to no, the unit does not send the trap listed in Table 8-6. Table 8-6. Parameter that enables or disables traps in the slot class Event Parameter Trap slot-profile-change- Change of state in a host interface.
Page 221
Watchdogs, Alarms, and Traps Configuring SNMP traps Table 8-7. Parameters that enable or disable traps in the OSPF class (Continued) Event Parameter Trap ospf-if-rx-bad-packet OSPF packet has been received on a nonvirtual OSPF Trap 8 interface that cannot be parsed ospf-tx-retransmit-enabled OSPF packet has been retransmitted on a OSPF Trap 10...
Watchdogs, Alarms, and Traps Configuring SNMP traps Table 8-7. Parameters that enable or disable traps in the OSPF class (Continued) Event Parameter Trap ospf-maxagelsa-enabled An LSA in the Stinger unit’s link-state database OSPF Trap 13 has reached its maximum age. ospf-lsdb-overflow-enabled The number of LSAs in the Stinger unit’s link- OSPF Trap 14...
Watchdogs, Alarms, and Traps Configuring SNMP traps In the following example, the host-name value is used only as a profile index, not to locate the actual host on the network. A community name is specified, security-class traps are added to the default alarm-class traps, and this host receives a trap if the link fails.
Watchdogs, Alarms, and Traps Configuring SNMP traps Overview of the dsl-threshold profile settings Following are the parameters for the dsl-threshold profile: Parameter Setting name Name of the dsl-threshold profile. To set the threshold times for an ADSL line, specify the name of a dsl-threshold profile in the thresh-profile parameter of the al-dmt profile.
Enable/disable InitFailureTrap. trap Lucent-specific ADSL threshold traps Lucent-specific versions of the ADSL threshold traps are listed below. If enabled, the system sends these traps in addition to the generic ADSL traps defined in RFC 2662. Trap Event Loss of Framing 15-minute interval...
Lucent-specific traps for the events listed in “Lucent-specific ADSL threshold traps” on page 8-25 (the ascend-adsl-threshold-traps-enabled parameter is set to no). You cannot configure the system to send only Lucent-specific ADSL traps. The following sample commands enable the system to generate generic ADSL threshold traps and Lucent-specific traps: admin>...
Watchdogs, Alarms, and Traps Configuring SNMP traps The system creates the following profiles for each LIM or trunk port present on the system: admin-state-phys-if—contains information about a port’s physical layer. ■ admin-state-perm-if—contains information about a port’s ATM layer--that is, ■ the dedicated (nailed) interfaces.
Watchdogs, Alarms, and Traps Configuring SNMP traps [in system] link-phys-trap-state = trap-state-enabled Configuring trap sequencing and heartbeat traps Traps, like any other SNMP protocol data unit (PDU), use User Datagram Protocol (UDP) for transport. UDP by its nature does not guarantee delivery. In certain situations of network congestion and link failures, traps sent from a Stinger unit might be lost in transit and never reach the target element management system (EMS).
Watchdogs, Alarms, and Traps Configuring SNMP traps heart-beat-trap-enabled = no Parameter Specifies notification-log- Whether SNMP traps (notifications) for this profile are logged. enable Specify yes to enable logging or no (the default) to disable it. notification-log- Maximum number of notification entries that can be held in limit the SNMP notification log.
Watchdogs, Alarms, and Traps Configuring SNMP traps Remote shelf watchdog profiles are created and deleted on the host depending on the operational state of the remote-shelf-stat profile for that shelf. HOST> dir watchdog 68 11/06/2003 11:59:46 { thermal shelf-controller 1 } 41 11/06/2003 11:59:53 { relay cm-input-relay 1 } 41 11/06/2003 11:59:53 { relay cm-input-relay 2 } 41 11/06/2003 11:59:53 { relay cm-input-relay 3 }...
Watchdogs, Alarms, and Traps Configuring SNMP traps Optimizing the number of traps generated by the system To configure a Stinger system to optimize the number of traps generated for slot status change, set the trap-optimization-enabled parameter in the trap profile to yes.
Watchdogs, Alarms, and Traps Configuring SNMP traps The following trap optimizations are made: ■ LinkUp and LinkDown traps are not generated unless ascend-link-down-trap- enabled and ascend-link-up-trap-enabled are set to no. AscendLinkUp traps are not generated when slots are initializing or during a ■...
Page 233
Watchdogs, Alarms, and Traps Configuring SNMP traps Table 8-9. Description of fields for the output of the nlmstat command (Continued) Field Specifies Replay Status of the replay function. Indicates whether replay is active (active) or not (idle). To display information about traps logged for a specific trap profile, enter the nlmstat command with the name of that trap profile.
Watchdogs, Alarms, and Traps Configuring traps for CDR device failure Table 8-10. Additional fields reported with the Ipaddress argument (Continued) Field Specifies Spec-trap Specific trap type. Version Trap version. Reported values can be v1 (SNMPv1) or v3 (SNMPv3). Configuring traps for CDR device failure In certain LIMs, data path failure sometimes occurs because of Clock and Data Recovery (CDR) device failure.
Watchdogs, Alarms, and Traps Configuring traps for CDR device failure Configuring traps for events related to CDR failure To generate a trap for CDR failure, set the cdr-failure-trap-enabled parameter in the trap profile. By default, the sending of traps for CDR failure is disabled. For example: admin>...
Working with IP Traffic Displaying the IP interface table 64 bytes from 10.65.212.19: icmp_seq=0 ttl=255 time=0 ms 64 bytes from 10.65.212.19: icmp_seq=3 ttl=255 time=0 ms --- techpubs ping statistics --- 2 packets transmitted, 2 packets received, 0% packet loss round-trip min/avg/max = 0/0/0 ms To terminate the ping exchange at any time, press Ctrl-C.
Working with IP Traffic Displaying and modifying IP routes 127.0.0.0/8 669778 127.0.0.1/32 local 669778 127.0.0.2/32 669778 134.112.26.0/24 52758 669778 134.112.26.201/32 - local 18312 669778 222.222.222.1/32 local 507191 222.222.222.2/32 222.222.222.2 wan26 507191 224.0.0.0/4 mcast 2837 669778 224.0.0.1/32 local 669778 224.0.0.2/32 local 669778 224.0.0.9/32 local...
Working with IP Traffic Tracing IP routes to the unit. RIP updates can add back any route that you remove using the iproute delete command. Also, the Stinger unit restores all routes listed in the ip-route profile after you reset the unit. For syntax information, see the Stinger Reference.
Working with IP Traffic Displaying IP protocol statistics The TTL value reaches the maximum value. (By default, the maximum TTL is set ■ to 30.) You can use the -m option to specify a different TTL. For example: admin> traceroute -m 60 techpubs traceroute to techpubs (10.65.212.19), 60 hops max, 0 byte packets 1 techpubs.abc.com (10.65.212.19) 0 ms 0 ms 0 ms The traceroute command sends three probes at each TTL setting.
Working with IP Traffic Displaying IP protocol statistics tcp: -Socket- Local Remote State 0 192.168.7.135.79 LISTEN 1 192.168.7.135.1723 LISTEN 2 192.168.7.135.23 LISTEN 4 192.168.7.135.23 172.20.32.137.42863 ESTABLISHED 9 192.168.7.135.23 206.65.212.10.1991 ESTABLISHED The output shows the queue depth of various UDP ports, as well as the total packets received and total packets dropped on each port.
Working with IP Traffic Displaying IP route cache information 0 packets received forwarded 0 packets received with unknown protocols 0 inbound packets discarded 17310 packets delivered to upper layers 2084 transmit requests 0 discarded transmit packets 49 outbound packets with no route 0 reassemblies timeout 268 reassemblies required 12 reassemblies succeeded...
Working with IP Traffic Verifying name service settings The following example shows command output on the control module: admin> ipcache cache Address Gateway Ifname Sh/Sl/T 50.0.0.20 10.168.26.74 wan392 1/14/D 1524 20.0.0.40 20.0.0.40 ie1-3-1 1/3 /S 1500 Cache Limit 0 Cache Count 2 Cache over limit 0 No.packets 9 Mem Usage: Allocated 1k bytes Free block count 22 The following sample commands display output on a module:...
Working with IP Traffic Displaying the Ethernet information 2: "rafael" 200.65.212.23 Feb 10 9:30:00 01 3: "donatello" 200.65.212.67 Feb 11 11:41:33 01 4: "wheelers" 200.65.212.9 Feb 12 8:35:22 01 The output of this commands contains the following fields: Field Indicates Local DNS Table Whether enabled is set to yes in the ip-global:dns- local-table subprofile.
Working with IP Traffic Displaying the Ethernet information {k.. ETHER XMIT: 12 of 161 octets 107E1350: 00 c0 80 89 03 d7 00 c0 7b 6b 9f d6 ..{k.. ETHER RECV: 12 of 60 octets To stop displaying the Ethernet statistics, specify 0 (zero) octets or use the debug off command, as shown in the following examples: admin>...
Working with IP Traffic Displaying information about IGMP Displaying information about IGMP The igmp command displays multicast information about Internet Group Membership Protocol (IGMP) groups and clients, if the Stinger unit is enabled for IP multicast forwarding. For syntax information, see the Stinger Reference. To display information about active multicast client group addresses and interfaces, use the -group option.
Page 250
Working with IP Traffic Displaying information about IGMP Field Indicates Counts Number of packets forwarded to the client, the number of packets dropped due to lack of resources, and the state of the membership. The state is displayed for debugging purposes. To list all active multicast clients, use the client argument.
Working with IP Traffic Displaying WAN IP interface information Displaying WAN IP interface information The following commands provide information about WAN IP interfaces. Displaying packets on WAN IP interfaces The wandisplay command displays all packets received from, or sent to any of the IP WAN interfaces.
Working with IP Traffic Displaying WAN IP interface information You must first open a session with a LIM. The following sample commands open session with the module in slot 7 and activate the display of 7 octets of data per packet for the user tim: admin>...
Monitoring OSPF routing Displaying general information about OSPF routing Option Displays internal OSPF internal routes. See “Displaying OSPF internal advertisements” on page 10-7. lsdb [area] OSPF link-state database summary for an area. If you do not specify the area option, the summary for the first configured area (or for the only defined area) is displayed.
Page 255
Monitoring OSPF routing Displaying general information about OSPF routing OSPF version: OSPF Router ID: 10.103.0.254 AS boundary capability: Attached areas: Estimated # ext. (5) routes: 65536 OSPF packets rcvd: 71788 OSPF packets rcvd w/errs: Transit nodes allocated: 812 Transit nodes freed: LS adv.
Monitoring OSPF routing Displaying the OSPF database Field Indicates Queue headers avail Available memory for queue headers. To prevent memory fragmentation, the Stinger unit allocates memory in blocks. The Stinger unit allocates queue headers from the memory blocks. When the Stinger unit frees all queue headers from a specific memory block, the unit returns the block to the pool of available memory blocks.
Monitoring OSPF routing Displaying the OSPF database The fields in the output contain the following information: Field Indicates Type Type of link as defined in RFC 2328, OSPF Version 2: Type 1 (RTR) are router LSAs that describe the collected ■...
Monitoring OSPF routing Displaying the OSPF link-state database The output of this command is the same as for the ospf database command, with the exception of the type. The ospf ext command shows only type 5 LSAs. Displaying OSPF internal advertisements To display OSPF internal LSAs, include the internal option with the ospf command.
Monitoring OSPF routing Displaying OSPF LSAs Displaying OSPF LSAs To view detailed information about a link state advertisement (LSA), use the following syntax for the ospf command: ospf lsa area ls-type ls-id ls-orig The command requires that you include the first four fields of the LSA as listed in the database.
Monitoring OSPF routing Displaying the OSPF routing table LS checksum: 0x8f32 LS length: Network mask: 255.255.0.0 Attached Router: 10.103.0.204 Attached Router: 10.103.0.254 Attached Router: 10.123.0.254 For information about the fields in the output of these commands, see RFC 2328. Displaying the OSPF routing table To display the OSPF routing table, include the rtab option with the ospf command.
Monitoring OSPF routing Displaying information about OSPF areas Displaying information about OSPF areas To display information about OSPF areas, include the areas option with the OSPF command. For example: admin> ospf areas Area ID Authentication Area Type #ifcs #nets #rtrs #brdrs #intnr 0.0.0.0 Simple-passwd Normal The fields in the output contain the following information:...
Monitoring OSPF routing Displaying OSPF interfaces The fields in the output contain the following information: Field Specifies Internal route type. DType displays one of the following values: DType RTE (generic route), ASBR (AS border route), or BR (area border route). RType Internal router type.
Monitoring OSPF routing Displaying OSPF interfaces Field Setting #adjs Number of adjacencies on the interface. DInt Number of seconds that the Stinger unit waits for a router update before removing the router’s entry from its table. The interval is called the dead interval. Displaying information about a specific interface To display detailed information for a specific interface, enter the ospf command with the intf option along with the interface IP address in dotted decimal notation.
Monitoring OSPF routing Displaying OSPF neighbors Field Setting Remote Address IP address of the remote end of a point-to-point (WAN) link. DR Priority Priority of the designated router. Hello interval Interval in seconds that the Stinger unit sends Hello packets (as defined in RFC 2328). Rxmt interval Retransmission interval (as described in RFC 2328).
Page 267
Monitoring OSPF routing Displaying OSPF neighbors 10.103.0.204 100.103.100.204 Full/DR ie1-7-4 10.123.0.254 100.103.100.123 Full/BDR ie1-7-4 10.102.0.2 10.102.0.2 Init/- 10.101.0.2 10.101.0.2 Full/- The fields in the output contain the following information: Field Setting Neighbor ID Address assigned to the interface. In the Stinger unit, the IP address is always the address assigned to the Ethernet interface.
Monitoring ATM and PNNI Monitoring ATM networks Table 11-1. Profiles and commands for monitoring ATM networks (Continued) For information about See the profile or command Displaying ATM virtual link information atmvcl command atmvpl command on page 11-7 Displaying ATM virtual link cross-connect atmvcx command information atmvpx command on page 11-11...
Monitoring ATM and PNNI Monitoring ATM networks Displaying the status of ATM internal lines The atminternallines command displays the status of ATM lines. For command options, see the Stinger Reference. To display statistics for all ATM lines, use the atminternallines -a command. For example: admin>...
Monitoring ATM and PNNI Monitoring ATM networks Displaying the status of ATM trunk modules and their connections The atmtrunkmgr -g connection-profile-name nailed-group display status of dedicated (nailed) groups. If the code is 1, there is an active nailed group to connect to. If the interface is not operational, the return code is 0 (zero).
Monitoring ATM and PNNI Monitoring ATM networks current-state = pvc-data-transfer vcc-members = [ { shelf-1 slot-10 47 0 35 } { shelf-1 slot-2 1 0 77 } ] Parameter Setting circuit-name Name of the PVC, which is the value of the station parameter in a local profile or the User-Name attribute in a RADIUS profile.
Monitoring ATM and PNNI Monitoring ATM networks debug privileges. For information on enabling debug privileges see “Enabling debug permissions” on page A-1. Note You cannot enter the atmvccmgr command from the secondary control module. To display status information for all ATM connections, use the -a option: admin>...
Page 276
Monitoring ATM and PNNI Monitoring ATM networks With the -a option, both commands display information about all configured ATM VCLs or VPLs and their status. The -s and -p options display the same information as the -a option, but restrict the output to links on a specific slot or slot-port combination.
Page 277
Monitoring ATM and PNNI Monitoring ATM networks Conn Kind = pvc Cast Type = p2p AAL Type = aal5 AAL5 Rx SDU Size = 9188 AAL5 Tx SDU Size = 9188 AAL5 Encap Type = llcEncapsulation The following sample command shows information about a VPL on slot 18, port 1 that is cross-connected to another VPL in the system: admin>...
Monitoring ATM and PNNI Monitoring ATM networks Field Indicates AAL5 Encap Type Type of encapsulation used for the AAL5 terminating link. This field is not displayed for a cross-connected link. The following sample command shows VCL information for the Stinger unit. The output shows the number of terminating PVCs, PVC segments without cross- connections (created by SNMP), and PVC segments with cross-connections.
Monitoring ATM and PNNI Monitoring ATM networks termqwertyuiopa down termzxcvbnmlkj Totals: Down PVC Terminate The following command displays information about a terminating VPL on port 9 of slot 3: admin> atmvpl -t 1 3 9 Intf Shelf Slot Port Vpi Kind OStatus CircuitName down termvp...
Monitoring ATM and PNNI Monitoring ATM networks The following examples show the output of the atmvcx -a and atmvpx -a commands if the shelf-controller-type parameter in the system profile is set to standalone: admin> atmvcx -a High Profile Kind Intf|Slot|Port|VPI|VCI|Oper Intf|Slot|Port|VPI|VCI|Oper Permanent VC X-Connects: 13456789-123 pvc 19...
Page 281
Monitoring ATM and PNNI Monitoring ATM networks With no options on the command line, the commands display the usage statement. With the -a option, they display information about all configured virtual-channel- switching or virtual-path-switching SPVCs and their status. The -s and -p options enable you to display the same information as the -a option, but to restrict the output to links on a specific slot or slot-port combination.
Displaying SPVC target ATM addresses Each trunk port and LIM port that supports ATM has an associated ATM interface. On a Stinger unit enabled with the Lucent Technologies, Inc. Private Network-to- Network Interface (PNNI) license, the system assigns each ATM interface with a unique soft PVC (SPVC) target address.
Monitoring ATM and PNNI Monitoring ATM networks With the -a option, the system shows all target SPVC addresses of all ATM interfaces. For example: admin> spvcshow -a Slot/Port Stat SPVC ATM address 2 / 1 up 39:84:0f:80:01:bc:72:00:01:09:7c:9e:00:ff:7c:92:b7:3d:01:00 2 / 2 down 39:84:0f:80:01:bc:72:00:01:09:7c:9e:00:ff:7c:92:b7:3d:02:00 2 / 3 down 39:84:0f:80:01:bc:72:00:01:09:7c:9e:00:ff:7c:92:b7:3d:03:00 2 / 4 down 39:84:0f:80:01:bc:72:00:01:09:7c:9e:00:ff:7c:92:b7:3d:04:00 2 / 5 down 39:84:0f:80:01:bc:72:00:01:09:7c:9e:00:ff:7c:92:b7:3d:05:00...
Monitoring ATM and PNNI Monitoring ATM networks The following sample command displays ATM statistics for interface 11: admin> atmsig -i 11 Physical Address = { 1 17 1 } Interface = 11 SSCOP Connections Events = 0 SSCOP Errored PDUs = 0 Received Call Setup Attempts = 0 Transmitted Call Setup Attempts = 7 Received Unavailable Routes = 0...
Page 285
Monitoring ATM and PNNI Monitoring ATM networks Available Guaranteed B/W : 4000 DN STREAM Total B/W Kbits/sec : 155520 Guaranteed B/W Kbits/sec : 155520 Allocated Guaranteed B/W : 40000 Available Guaranteed B/W : 115520 BANDWIDTH INFORMATION FOR SLOT 2 UP STREAM Total B/W Kbits/sec : 70000 Guaranteed B/W Kbits/sec...
Page 286
Monitoring ATM and PNNI Monitoring ATM networks spvc-1-1-1-1.2 lim-1-1-ckt-5 lim-1-1-ckt-5 spvc-1-1-1-1.3 spvc-1-1-1-1.3 lim-1-1-ckt-6 lim-1-1-ckt-6 spvc-1-1-1-1.4 spvc-1-1-1-1.4 lim-1-1-ckt-7 lim-1-1-ckt-7 lim-1-1-ckt-8 lim-1-1-ckt-8 To display bandwidth allocation for a specific service category, use the -c option with one of the following values for service category: 0 for constant bit rate (CBR), 1 for real-time variable bit rate (RT-VBR), 2 for Nonreal-time variable bit rate (NRT-VBR), or 3 for unspecified bit rate (UBR).
Monitoring ATM and PNNI Monitoring PNNI nodes ATMQOS416 RT_VBR 1000 1000 For details about the output of this command, see the Stinger Reference. To display all connections that use a specified QoS name, use the -c option. For example: admin> atmqos -c atmqos416 vc-11-1-0-35 Total Number Of Connections : 1 To display QoS statistics for a specific QoS name, use the -d option.
Monitoring ATM and PNNI Monitoring PNNI nodes Table 11-3. Commands and profiles for monitoring PNNI operations (Continued) Command or profile Used for pnniptsestatus command “Displaying the PNNI routing table” on page 11-35 pnnirouteBase command “Displaying PNNI interface information” on pnnireachableaddr command page 11-23 pnnirouteBase command “Displaying PNNI interface information”...
Page 290
Monitoring ATM and PNNI Monitoring PNNI nodes LowestVersion = Version1point0 DtlCountOriginator DtlCountBorder CrankbackCountOriginator = 0 CrankbackCountBorder AltRteCountOriginator AltRteCountBorder RteFailCountOriginator = 148 RteFailCountBorder RteFailUnreachOrg = 148 RteFailUnreachBrdr Field Indicates HighestVersion Highest version of the PNNI protocols supported in the unit. LowestVersion Lowest version of the PNNI protocols supported in the unit.
Monitoring ATM and PNNI Monitoring PNNI nodes Field Indicates RteFailUnreachBrdr Number of times the unit failed to compute a viable partial DTL stack as entry border node because the target of the path calculation was unreachable. This value indicates those calls that were cleared or cranked back with cause 2 (specified transit network unreachable) or cause 3 (destination unreachable) in the cause information element.
Monitoring ATM and PNNI Monitoring PNNI nodes Displaying information about PNNI logical links A PNNI logical link is a logical representation of the connectivity between two logical nodes, including the physical link and virtual path connection. The pnnilinkdisplay command displays information about the operation of logical links attached to the local PNNI node and the relationship to nodes on the other end of the links.
Page 293
Monitoring ATM and PNNI Monitoring PNNI nodes Field Indicates IntIndex Entry number in the interface table for the interface to which the logical link corresponds. The value is valid only for LinkType values of Unknown, Lowest Level Horizontal Link, and Lowest Level Outside Link. All other link types display a zero value.
Page 294
Monitoring ATM and PNNI Monitoring PNNI nodes Field Indicates CommonPeerGroupId Peer group ID of the lowest-level common peer group in the hierarchy of the neighboring node and the local node. For horizontal links, or when the link type or common peer group is not yet known, the field displays zero.
Monitoring ATM and PNNI Monitoring PNNI nodes Field Indicates VPCap A value of 1 indicates that virtual path connections (VPCs) can be established across the PNNI entity. A value of zero indicates that VPCs cannot be established. PtseId PNNI state topology element (PTSE) ID for the PTSE that contains the information group(s) describing the PNNI entity.
Monitoring ATM and PNNI Monitoring PNNI nodes Full PeerNodeId 60:a0:39:84:0f:80:01:bc:72:00:01:31:a3:99:38:ff:b6:ca:99:00:00:00 PeerSvcRccIdx PeerRcvDbSums PeerXmtDbSums PeerRcvPtsps PeerXmtPtsps PeerRcvPtseReq PeerXmtPtseReq PeerRcvPtseAck PeerXmtPtseAck Field Indicates Node PNNI node index. Only node index 1 is currently supported. PeerState State of the local node’s neighboring peer state machine associated with PeerNodeId field.
Page 298
Monitoring ATM and PNNI Monitoring PNNI nodes With no options on the command line, the command identifies the node and displays some state information. Following is some sample output: admin> pnninodedisplay Node NodeId 60:a0:39:84:0f:80:01:bc:72:00:01:31:a3:99:30:ff:18:dd:98:00:00:00 OperStat DBOverload Ptses With the -d option, the command displays many additional fields about the configuration and current state of the logical node.
Monitoring ATM and PNNI Monitoring PNNI nodes Field Indicates AdminStatus Administrative status of the node. Up indicates that the node is allowed to become active. Down means the node is inactive and is not allowed to become active. DomainName Name of the node’s PNNI routing domain. All lowest-level nodes with the same domain name are presumed to be connected.
Monitoring ATM and PNNI Monitoring PNNI nodes ParentPglNodeId 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 Field Indicates Node PNNI node index. Only node index 1 is currently supported. MapNodeId PNNI node ID of the node being represented. PeerGroupId PNNI peer group ID of the node being represented. NodeAtmAddress ATM address of the node being represented.
Monitoring ATM and PNNI Monitoring PNNI nodes Field Indicates PtseId Hexadecimal value of the PTSE identifier assigned to the PTSE by the originating node. SeqNum Sequence of the entry in the local topology database. LifeTime Remaining lifetime in seconds, for the given PTSE as stated in the topology database.
Page 304
Monitoring ATM and PNNI Monitoring PNNI nodes ReachableAddr 39:84:0f:80:01:bc:72:00:01:18:dd:98:00:ff:18:dd:98:00:f2 AdvertisedNodeId 60:a0:39:84:0f:80:01:bc:72:00:01:31:a3:99:30:ff:18:dd:98:00:00:00 PortId Index PrefixLength (bits) 36610 ReachableAddr 39:84:0f:80:01:bc:72:00:01:18:dd:98:00:ff:f7:48:cf:3b:01 You can use a command option to display reachable addresses from a specified node or ATM address. For example, the following output shows addresses that are reachable from the specified ATM prefix: admin>...
Diagnostic Testing OAM testing control module forwards the F4 response to the incoming port on the trunk module or line interface module (LIM). Note The Stinger unit does not support F4 OAM end-point tests for virtual path connections (VPCs) because the connection does not terminate on the Stinger unit. OAM F5 cells operate at the virtual circuit level and use the payload type indicator (PTI) field to distinguish between data and OAM cells.
Diagnostic Testing OAM testing Overview of the oam command You can use the oam command to run F4 and F5 OAM loopback and continuity check tests and to display OAM entries. You use the command as follows: To run loopback tests, use the following command syntax: ■...
Diagnostic Testing OAM testing Option Description Displays OAM entries generating CC cells. cc generating Displays OAM entries monitoring CC cells. cc monitoring Displays OAM entries in activating state. cc activating Displays OAM entries in deactivating state. deactivating Overview of the atm-oam profile Running an OAM test using the atm-oam profile has the following capabilities and limitations: ■...
Page 309
Diagnostic Testing OAM testing This combination causes the unit to test all the VPI-VCI pairs configured on the specified slot. If vci is set to 32769, the test is an F4 loopback. Otherwise, the test is an F5 loopback. shelf=number, slot=number, port=number, vpi=32768, vci=32769 or vci=32768 ■...
Page 310
Diagnostic Testing OAM testing Parameter Setting error-threshold Threshold for the number of loopback cells that can be lost. If the number of cells lost becomes equal to or greater than this value, a trap is generated. Specify a number from 0 through 10. The default, 0 (zero), disables this trap.
Diagnostic Testing OAM testing Following is the parameter description for vc-oamf4-support: Parameter Description Enables/disables specific F4 segment and end-to-end OAM vc-oamf4- processing on a Stinger VC-switching VPI. With the default yes support N setting, F4 segment and end-to-end processing for the specified VC-switching VPI is enabled.
Page 312
Diagnostic Testing OAM testing If the lim-vc-f4oam-support parameter is set to yes, F4 OAM entries are created on the LIM port for the VP-switching VPI. The Total Active Oam Channels field in the output of the oam -e shows the F4 OAM entries. admin>...
Diagnostic Testing OAM testing Total Active Oam Channels=1 Continuity check and monitoring F4 and F5 OAM continuity tests can be initiated as follows: Locally, using the command-line interface (CLI). ■ Remotely, a network peer can send activation/deactivation requests to initiate a ■...
Diagnostic Testing OAM testing Table 12-1 lists the possible directions that the remote peer can specify and the resulting action that the Stinger takes. Table 12-1. Direction specified by the remote peer and the results Remote request Result direction A-to-B From the Stinger perspective, the B-to-A direction.
Diagnostic Testing OAM testing OAM: CC was activated or is being stopped by another application use oam -e 18 2 0 4 for more information F4-E2E(83b99ba0:3505.0.4) loop(Tx=0, Rx=0) 83b99ba0:F=NORMAL CC(R=NONE:G=ACTIVE M=STOP A=DEACTG D=MON) In the preceding example, the activation/deactivation status reported by the A field shows that the status is deactivating.
Diagnostic Testing OAM testing The following command stops the preceding test: admin> oam -C 17 2 0 35 e - To instruct the Stinger unit to perform an F5 segment continuity test from a T1000 module in slot 3, over VCI 36, proceed as follows: admin>...
Page 317
Diagnostic Testing OAM testing The following sample commands run an F5 OAM segment loopback test from a Stinger MRT unit to the CPE connected to it on port 12. admin> open 1 1 mrtdmt-1/1> oam -e OAM Entry list Entry=3f0ca0, Linear Port=12 vpi=8, vci=3 state=Up loopTx=0 loopRx=0 Segment Continuity=READY End2End Continuity=READY isVpc=No Entry=3f0de0, Linear Port=12 vpi=8, vci=4 state=Up loopTx=0 loopRx=0 Segment Continuity=READY End2End Continuity=READY isVpc=No...
Diagnostic Testing OAM testing Entry=478d60, Linear Port=28 vpi=0, vci=35 state=Up loopTx=0 loopRx=0 Segment Continuity=READY End2End Continuity=READY isVpc=No hdsl2-1/4> oam -l 25 0 35 s 1 hdsl2-1/4> Sending F5 OAM segment loopback cell, Id=0 Received our F5 OAM segment loopback cell, Id=0 OAM: received our F5 OAM segment loopback #0 Running F4 and F5 loopback tests using the atm-oam profile To run an F4 or F5 loopback test, you set the parameters in the loopback-config...
Note Running several prolonged concurrent OAM test sessions using the oamloop command sometimes causes inaccurate test results. To prevent this situation, Lucent Technologies strongly recommends that you conduct only one OAM test session at a time using this software version. If you must conduct simultaneous OAM test sessions, limit them to no more than eight.
Diagnostic Testing OAM testing cells. You can optionally specify the number of cells and the transmission interval. For details about oamloop syntax, see the Stinger Reference. For example, the following command sends 10 end-to-end loopback cells to a trunk module in slot 2 on VPI 1, VCI 32: admin>...
Diagnostic Testing OAM testing Displaying OAM entries You can use the oam -e and oam -q commands enable you to display OAM entries in a Stinger system. The oam -e command displays details about OAM entries that exist in the system. You can display OAM entries, for a specific slot, port, VPI, or VCI.
Page 322
Diagnostic Testing OAM testing Element Indicates Continuity check monitoring state. Possible states are stopped, normal, and LOC. Continuity check activation/deactivation state. Possible states are ready, active, activating (ACTG), and deactivating (DEACTG). Provisioned direction. Using the oam -e command The syntax of the oam -e command is as follows: oam -e [slot] [port] [vpi] [vci]|-p Following is an example of an F4 segment flow.
Page 323
Diagnostic Testing OAM testing Displaying entries with no defects To display entries with no defects, use the oam -q fault normal command. For example: admin> oam -q fault normal OAM Entry list F: fault state CC: continuity information R: Continuity requester G: CC generation state M: CC monitoring state A: CC Activation/Deactivation state...
Page 324
Diagnostic Testing OAM testing R: Continuity requester G: CC generation state M: CC monitoring state A: CC Activation/Deactivation state D: Direction. P: provisioned direction. C: current direction F4-E2E(836999e0:3505.0.4) loop(Tx=0, Rx=0) 836999e0:F=RDI CC(R=NONE:G=STOP M=STOP A=READY D(P=DEF C=DEF)) Total matching Oam Channels=1 Displaying LOC defects To display entries with LOC defects, use the oam -q fault loc command.
Diagnostic Testing OAM testing F: fault state CC: continuity information R: Continuity requester G: CC generation state M: CC monitoring state A: CC Activation/Deactivation state D: Direction. P: provisioned direction. C: current direction F5(82048320:3505.0.100) E2E=FALSE loop(Tx=0, Rx=0) SEG:82048320:F=LOC CC(R=NONE:G=ACTIVE M=LOC A=ACTIVE:D(P=DEF C=2WAY)) Total matching Oam Channels=1 Fault reporting and alarms Stinger systems use SNMP traps to report OAM changes for an OAM end point.
Diagnostic Testing Internal and external diagnostic tests Internal and external diagnostic tests You can use an internal diagnostic test (IDT) to identify problems that might occur during data transfer between the control module and LIMs. If you activate an IDT for a line, the control module generates a data stream internally and sends it to that line.
Diagnostic Testing Internal and external diagnostic tests Parameter Setting Status of an internal diagnostic test on the line. (This idt-operation- parameter is read-only.) By default, this parameter shows state stopped (the test is inactive). When the line is undergoing internal diagnostic testing, this parameter shows active. Number of messages sent from the LIM to the control module.
Diagnostic Testing Internal and external diagnostic tests [in HDSL2/{ shelf-1 slot-2 1 }:line-config] loop-back = none Parameter Setting loop-back Whether the line passes normal data or is in loopback mode. Specify one of the following values: none (default)—The line is not used for loopback testing and ■...
Diagnostic Testing Internal and external diagnostic tests The following sample commands put a line into analog loopback mode: admin> read hdsl2 {1 1 1} HDSL2/{ shelf-1 slot-1 1 } read admin> set loop-back = analog admin> write Running built-in self tests (BISTs) on DSL ports This test verifies proper operation of a specific DSL port.
Diagnostic Testing Relay alarm testing Relay alarm testing You can use the debug-level inputrelaytest command to simulate the status of relays to generate relay alarm and trap conditions for testing. When you use the inputrelaytest command, actual alarms on the system associated with relays are overwritten by this command and are not restored until you reset the system.
Page 331
Diagnostic Testing Relay alarm testing admin> write The following commands create the trap profile for the specified events: admin> new trap relay admin> community-name = public admin> host-address = 135.17.134.31 admin> host-port = 2345 The following commands enable the test mode. During the test, the system generates a warning log message every minute.
Diagnostic Testing Testing DSL copper loops If the CPE and Stinger unit are connected and both are enabled for bit-error rate testing, the test runs between the two systems. If the test is enabled, the Stinger unit initiates the test by sending an embedded operations channel (EOC) message to the CPE to place its port into loopback mode.
Diagnostic Testing Testing DSL copper loops generation feature, you can send a trace tone to up to 48 ports simultaneously. The tone is obtained from an external generator connected to the external test terminal on a path selector module (PSM) or copper loop test (CLT) module. You can use the line-tests profile or the isolate and gen-tone commands to perform these tests.
Diagnostic Testing Testing DSL copper loops Parameter Heading test-terminal CLT module or PSM terminal where the test tone is applied. Specify external-tester-terminal or aux- tester-terminal. activate-test Enable/disable a test. A value of yes disconnects any existing calls and begins the test. A value of no reconnects any disconnected calls and stops the test.
Diagnostic Testing Testing DSL copper loops Using the isolate command You use the isolate command to isolate either a range of ports or a list of individual ports. Its syntax is as follows: For a range of ports: ■ isolate shelf slot start-port - end-port For individual ports: ■...
Diagnostic Testing Testing DSL copper loops admin> write Using the gen-tone command You can use the gen-tone command to apply test tones on either a range of ports or a list of individual ports. Its syntax is as follows: ■ For a range of ports: gen-tone shelf slot ext|aux startport - endport For individual ports:...
Lucent Technologies development engineers. For this reason, Lucent does not guarantee the completeness of the list of debug commands published for a given release, or descriptions of their functionality.
When you are logged into a Stinger unit with debug privileges, the interface might display normally unavailable parameters and commands, some of which are not configurable in certain situations. Therefore, Lucent Technologies recommends that you create a special profile for debugging purposes, and use that profile only when you are debugging the Stinger unit.
Using Debug Commands Summary of common debug commands ifmgr [up|down] [ifNum|ifName] Summary of common debug commands Debug commands allow you to monitor and diagnose different areas of Stinger functionality. Table A-1 lists common debug commands. To use any of these commands, you must have debug permissions and the debug facility enabled.
Using Debug Commands System and devices debugging Displaying IP control module network processor information The syntax for the info np command is as follows: info np option Setting for option Kind of information to display addr Payload and address information. [vrtr-name] ARP entries.
Using Debug Commands System and devices debugging Setting for option Kind of information to display Scheduler information. rspslot is the RSP slot number—1 sid sid [rspslot] or 2. If you do not specify a value for rspslot, the system uses the default RSP slot number.
Using Debug Commands System and devices debugging 065665 0x0206 0/125 3072 000130 0x0206 0/124 3072 VLAN Configuration : Vlan is not enabled Packet Flow configuration: No Packet Flow is attached Multicast Configuration : Multicast is not enabled Bridge Configuration : Bridging is not enabled Filter Configuration : No Filters applied QOS Configuration...
Using Debug Commands System and devices debugging Total 20 routes <end> To display detailed information for a specific router, append the router name to the info np route command. For example: admin> info np route main Local If Routes for vrouter:main Destination Gateway needArp...
Using Debug Commands System and devices debugging Did 43514 is not initialized Displaying ARP entries The info np arp command displays all ARP entries on the network processor. For example: admin> info np arp ARP Table for vrouter: destIp 1.1.1.3 00:00:07:b0:01:00 wan-16 40956 To display ARP entries only for a specific VRouter, append the VRouter name to the info np arp command.
Using Debug Commands System and devices debugging Type 43516 ucast 43518 ucast 43520 ucast Displaying bridge group information The info np brige group command displays information about a bridge group or bridge table information for a bridge group. Its syntax is as follows: info np brige group grp|table grp [ifnum] Replace grp with a bridge group number and ifnum with an interface number.
Using Debug Commands System and devices debugging Table has 5 entries. Displaying scheduler IDs associated with a logical port The info np psl lport [count] [rspslot] command displays scheduler IDs associated with a logical port. For example: admin> info np psl 0 16 LPortId SchedId SchedId SchedId SchedId In the following example, entry 16 shows information for the Gigabit Ethernet interface:...
Using Debug Commands System and devices debugging TM parameters: --------------- : 0x064b Queue Threshold : 0x00c8 Scheduler Threshold : 0x01f4 Bridge Port : 0x0000 TS parameters: --------------- PCR configured : 0x0000 SCR configured : 0x0000 PCR/SCR limit : 0x00000000 Last Schedule Time : 00:00:00:00 Displaying details for a specific scheduler The info np sid sid [rspslot] command displays information about a specific...
Using Debug Commands System and devices debugging Without any arguments, the info conn command reports information on all connections on the Fast Ethernet trunk module. For example: fet-1/18> info conn slot if type vpi/vci IW -------------------------- ATM 0/131 CTL 0/123 CTL 0/124 65534 ETH 0/0 65535 ETH 0/0...
Using Debug Commands System and devices debugging Port UPIMode EXT STATS RxAddr TxAddr RxPHY MD TxPHY MD Rx M/S Tx M/S UTOPIA ENABLED Multi PHY Multi PHY SLAVE SLAVE To display detailed information about a specific ATM port, append the port number to the info atm command.
Using Debug Commands System and devices debugging To display detailed information about a specific ATM port, append the port number to the info aal5 command. For example: fet-1/17> info aal5 22 ConnectionID : 22 Magic : 2152507936 : 131 Interrupts : Enable Channel Mode : Enable...
Page 353
Using Debug Commands System and devices debugging Rx Flow Control : Enabled Tx Flow Control : Enabled Tx Queue Mode : FAST Iw Back ground : UNUSED Tx Statistics : ENABLED Tx Max SDU : 1500 Rx Statistics : ENABLED Rx Addr Mode : PROMISCUOS MAC Look up mode...
Using Debug Commands NEBs testing and loopback (sar command) NEBs testing and loopback (sar command) You can use the sar command to verify the data path between the control module and Ripper-based LIMs when connections are established on the LIM. In this software version, this capability is not supported on IP2100 control modules.
Using Debug Commands NEBs testing and loopback (sar command) 4: Loopback entered. 5: Loopback entered. 6: Loopback entered. 7: Loopback entered. 8: Loopback entered. The following command executes NEBs testing: admin> sar -t d 2 NEBS-1/1: received 10 of 10 with 0 errors @1c6ed504 NEBS-1/2: Loopback test count:10 size:100 NEBS-1/2: received 10 of 10 with 0 errors @1c6ed505 NEBS-1/3: Loopback test count:10 size:100...
The update debug command modifies optional functionality of the Stinger unit. To enable some options, you must obtain one or more software licenses (supplied by a Lucent representative) that enable the functionality in your Stinger. After each string is entered, the word complete appears, indicating that the Stinger accepted the license.
Using Debug Commands RADIUS debugging If you enter update without a text string modifier, the Stinger unit displays a list of current configuration information, as shown in the following example: admin> update Host interfaces: 4 Net interfaces: 0 Field features 1: 0 Field features 2: 32 Field features 3: 0 Field features 4: 28...
Using Debug Commands RADIUS debugging HashTable @ 10542160, bucketCount: 192, callCount: 23, hashName <afs-1:8> Slot 2/5: HashTable @ 10585730, bucketCount: 48, callCount: 7, hashName <afs-2:5> The following sample command displays the same information for a single module in shelf 1, slot 8: admin>...
Using Debug Commands Interface debugging Of connections attempts, 602 were authenticated successfully, and 18 were not: timout[A,O]=[0,6], unexp=0, bad=18, authOK=602 In the next sample message, the IP address of the RADIUS server is 1.1.1.1, and the curServerFlag indicates whether or not this RADIUS server is the current authentication server.
Using Debug Commands Interface debugging Displaying network interface mappings The netif debug command displays the Stinger network interface mappings. This command has the following syntax: netif -m | -q | -v |? Syntax element Description Displays mappings for the specified map type. Displays the queue for a map.
Using Debug Commands Control module debugging You must first open a session with the LIM, or with logical slot 1 on a Stinger MRT to use this command. The eoc command has the following syntax: eoc -p [-r|-w reg slot port [data]] Syntax Element Description Enable/disable module debug.
Using Debug Commands Control module debugging Displaying the status of redundant control modules The controller-redundancy debug command displays the status of the primary and secondary control modules in a Stinger unit with redundant control modules. To enable controller-redundancy debugging, proceed as shown in the following example: admin>...
Using Debug Commands Control module debugging Field Indicates My function Function of the primary control module. Following are valid functions: No_Function Primary Secondary State of the secondary control module. See My state for Remote’s state valid values. Remotes’s function Function of the secondary control module. See My function for valid values.
Page 365
Using Debug Commands Control module debugging To display the interface table entries, use the -d option. (The netstat command also displays a hyphen to indicate a disabled Ethernet interface.) For example: admin> ifmgr -d bif slot sif u m p ifname host-name remote-addr local-addr ---------------------------------------------------------------------------...
Page 366
Using Debug Commands Control module debugging Field Indicates Whether the interface is permanent. A P indicates a permanent interface. A hyphen (-) or a blank indicates that the interface is not permanent. A permanent interface is an interface that is configured in the command-line interface and stored in Stinger NVRAM.
Page 367
Using Debug Commands Control module debugging nexthop: 0.0.0.0 proxy_arp_mode: 0 proxy_arp_head: 0 No associated connection profile SNMP ifType: The icmp-reply-directed-bcast parameter in the ip-global profile specifies whether the Stinger unit responds to directed-broadcast ICMP echo requests. If this parameter is set to no, the system does not respond to any directed-broadcast ICMP requests.
Definitions of fatal errors Following are definitions, by index number, of the fatal errors that the Stinger unit can report. If you experience a fatal error, contact Lucent OnLine Customer Support at http://www.lucent.com/support. Index...
Page 371
Stinger Log Messages Definitions of fatal errors Index Definition No mail descriptor (EXEC) This reset occurs if the Stinger tries to allocate a mail message when there are none left. The cause is usually a memory leak. No mail buffer memory (EXEC) No task to run (EXEC) No timer memory (EXEC) No timer pool (EXEC)
Stinger unit can report. Warning messages, by themselves, are not necessarily cause for concern. They are used by development engineers to determine the cause of fatal errors. Contact Lucent OnLine Customer Support at http://www.lucent.com/support if warning messages are accompanied by fatal errors. Index...
Page 373
Stinger Log Messages Definitions of warning messages Index Definition Buffer belongs to wrong pool Buffer belongs to wrong heap Buffer not previously allocated This warning can be logged under different conditions. For example, double freeing of memory and low-memory conditions can both generate a warning 104.
Page 374
Stinger Log Messages Definitions of warning messages Index Definition Error no timers LCD memory allocation failure Indicates that a memory-copy routine was called, but the source buffer was much larger than expected. Invalid state Error memory copy too large Error memory copy magic missing Error memory copy wrong magic Error memory copy bad start address WAN buffer leak...
Stinger Log Messages Fatal crash information on the console Index Definition TCP sequence gap TCP too much data TCP write attempt too large TCP options bad Modem message parsing failed TACACS+ pointer inconsistency TACACS+ index inconsistency TACACS+ TCP inconsistency TACACS+ TCP out-of-range socket TACACS+ socket mismatch TACACS+ unexpected authentication state Error in filter list...
RADIUS clients file or the TACACS+ configuration file. ■ You are using a Lucent RADIUS server instead of an Ascend RADIUS server. PCMCIA flash card error messages When a load, format, or dircode command fails, the Stinger unit logs the messages described in this section.
Stinger Log Messages PCMCIA flash card error messages load command messages Table B-1 lists the error messages that might appear if the system terminates while in the process of loading a tar file. Table B-1. Load command error messages (loading a tar file) Error message Description load aborted: not a tar image...
Stinger Log Messages PCMCIA flash card error messages Table B-2. Load command error messages (uploading to PCMCIA flash cards) (Continued) Error message Description load: error: specified flash card is The flash card’s write-protect write-protected switch is set. load: error: specified flash image is A control module in the LOAD currently in use state is currently accessing the...
Page 379
Stinger Log Messages PCMCIA flash card error messages Table B-4. Dircode command error messages (Continued) Error message Description Card N is temporarily unavailable The flash card is currently coming up or is being formatted. Card N is unavailable The flash card experienced an error and is inaccessible.
Page 381
Index table, viewing 9-9 arptable command, using 9-9 accounting cross-connects, displaying 11-11 RADIUS session, displaying status of session statistics A-21 failures, displaying 11-19 See also RADIUS how affected by LIM removal 3-16 line status, determining 11-3 acct-failsafe command A-19 packet statistics, displaying 11-6 Admin user QoS statistics, displaying 11-19 changing password 1-3...
Page 382
binaries, loading specific for modules 6-17 logging 2-4 netif A-23 bit-error rate test (BERT) 12-28 netstat 9-2 built-in self tests (BISTs) 12-25 new 1-13 nslookup 9-9 nvram 6-3 oamloop 12-15 open 3-9 ospf 10-1 displaying for Gigabit Ethernet OLIMs 5-3 permissions for 1-22 ping 9-1 CAC bandwidth allocation statistics, displaying...
Page 383
connections displaying 11-3 status, displaying 1-36 E1 interfaces, displaying status 4-10 terminating user session 1-43 errors console, fatal crash information on B-7 fatal, displaying B-2 logged by Syslog B-8 continuity tests OAM F4 tests 12-11 Ethernet interface 4-1 OAM F5 tests 12-11 12-12 interface, specifying for management only 1-4 control modules...
Page 384
gunzip command 6-20 displaying with netstat command 9-2 Ethernet A-28 gzip command 6-20 Ethernet, enabling and disabling A-26 gzip compressed format, saving in 6-2 how the system creates 9-2 interface table (ifmgr) A-26 IP 4-1 IP interface table 9-2 line and trunk status 4-7 hash codes, using update command with A-18 network mappings, displaying A-23 PNNI, displaying 11-23...
Page 385
line command 1-37 memory, NVRAM 6-1 line protection modules. See LPMs messages fatal and warning B-1 line-tests profile 12-30 12-31 12-32 fatal error definitions B-2 link state advertisements. See LSAs levels of debug, specifying A-2 link-state database, displaying 10-7 log messages in status window 1-38 load command 6-18 Syslog B-8 loadmate command 6-10...
Page 386
LSAs, displaying 10-9 neighbor nodes (PNNI), displaying details about 11-28 neighbors, displaying 10-14 routers, displaying 10-11 netif command, using A-23 routing table, displaying 10-10 netstat command routing, displaying information about 10-2 displaying interface table with 9-2 summarized information, displaying 10-12 displaying routing table with 9-3 traps 8-22 network processor, monitoring 5-1...
Page 387
ports displaying information about A-17 running built-in self tests on 12-25 RADIUS specifying for Syslog, 2-11 radservdump command A-20 TCP and UDP, information about 9-6 radsessdump command A-20 See also interfaces radstats command A-21 power failures, setting an alarm for 8-5 refreshing configuration 6-16 refreshing nailed profiles from 6-16 reloading profiles 6-16...
Page 388
SDSL interfaces, displaying 4-9 profiles created by 7-22 read-write access, enabling 7-4 security state changes, initiating 7-21 serial port, securing 1-3 state, verifying 7-17 SNMP host address, configuring 7-5 Stinger support, overview 7-1 self-testing, enabling on LIMs 3-19 table, resetting 7-21 SELT 12-29 trap classes, enabling 8-22 serial number, viewing A-18...
Page 389
connection status 1-36 TCP/IP 9-1 contents, defining 1-35 system profile default size 1-39 session ID base, setting 2-11 described 1-36 system name, setting 1-31 displaying 1-35 system-integrity profile 5-22 general 1-37 information for user profile 1-39 length 1-39 line status 1-37 log 1-38 navigating 1-35 line clock source, displaying 1-32...
Page 390
clearing statistics for 4-5 view-based access control (VACM) 7-13 displaying port status 4-4 virtual channel connection. See VCC displaying status of 3-2 virtual link information, displaying 11-7 interfaces, monitoring 4-2 VP-switching VPI, enabling OAM 12-6 numbering for Stinger MRT 3-1 required status, displaying 3-2 displaying status 1-37 packets during connection setup, displaying...
Need help?
Do you have a question about the Stinger FS and is the answer not in the manual?
Questions and answers