Network Analysis Module Command Reference Guide, 4.0
Index
Downloads: This chapterpdf (PDF - 683.0KB) The complete bookPDF (PDF - 3.66MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - L - M - N - O - P - R - S - T - U - V - W -

Index

A

access log

clearing 2-14, 2-15

account management privilege 7-40

acronyms, list of A-1

address

map collection

displaying configuration 6-10

monitoring 3-13

map statistics, protocol monitoring 4-9

trap destination 7-30

type

custom-filter capture 2-23

aggregate

displaying 5-38

aggregation

differentiated services 2-29

alarm

MIB 2-5

falling event threshold 2-5

owner string 2-5

rising event index 2-5

rising event threshold 2-5

sample type 2-5

privilege for web user 7-40

system 7-24

alarm event 2-3

community string 2-3

description 2-3

index 2-3

alarm index, alarm MIB 2-5

alarms

email notification 2-32

web publishing 7-39

alerts, clearing 2-14, 2-15

application

layer

maximum entries for host layer host monitoring 3-32

maximum entries for host layer matrix monitoring 3-34

ART

collection configuration, displaying 6-11

MIB collection 3-15, 3-17

audience ii-xi

audit trail

displaying information 5-23

GUI and CLI audit 2-9

autostart collection

enable and disable 2-10

available memory

displaying 6-8

B

bars

displayed graph 4-46

base object identifier

custom-filter capture 2-21

See also OID 2-23

BIOS information

displaying 5-25

BOOT environment variable

displaying information 7-12, 7-17

broadcast address

setting 2-40

bucket size

history monitoring 3-30

buffer

capture slice size for RMON 5-7

channel index for RMON 5-7

download

offset for RMON 5-7

slice size for RMON 5-7

full action type for RMON 5-7

owner for RMON buffer collection 5-7

size

RMON buffer 5-7

C

call table rows

voice 4-33

capture

filters 5-32

slice size, for RMON buffer 5-7

capturing data

remote storage 5-5

Catalyst 6500 series switch

displaying information 7-17

CDP

Cisco Discovery Protocol 2-11

messages hold time 2-12

messages interval 2-13

certificate signing requests

displaying 5-28

channel index

RMON buffer 5-7

Cisco Discovery Protocol (CDP) 2-11

collection

owner 2-3

privilege for web user 7-40

profile index for differentiated service profile 2-30

RMON buffer 1-4

collections

URL 4-22

command

help 1-2

modes 1-3

command-line interface 1-1

community string

alarm event 2-3

trap destination 7-30

configuration 2-17, 2-18, 2-19

importing to the NAM 2-17

console session 1-1

control index

differentiated services 3-19

aggregate 2-29

matrix 3-21

protocol distribution 3-23

statistics 3-25

Ethernet statistics 3-27

history monitoring 3-30

host layer

host monitoring 3-32, 3-36, 4-24

matrix monitoring 3-34, 4-3

monitor

address map 3-13, 7-30

art 3-15

priority statistics monitoring 4-8

protocol distribution monitoring 4-6

VLAN statistics monitoring 4-26

conversations statistics

protocol monitoring 4-9

core dump

retrieving 2-20

creating

trap destinations 7-30

creation mode 1-4

crypto

certificate signing requests 5-28

installed certificates 5-27

custom-filter capture 2-23

D

data

custom-filter capture 2-23

mask, custom-filter capture 2-21

not mask 2-21

stream source address, custom filter capture 2-23

data source 6-36

differentiated services

matrix 3-21

protocol distribution 3-23

statistics 3-25

Ethernet statistics 3-27

host layer

host monitoring 3-32, 3-36, 4-24

matrix monitoring 3-34, 4-3

monitor

address map 3-13

art 3-15

priority statistics monitoring 4-8

protocol distribution monitoring 4-6

VLAN statistics monitoring 4-26

date and time 5-34

decode

filter 5-33

privilege for web user 7-40

default

data source for NetFlow devices 4-40, 4-41

gateway

address setting 2-41

password 1-1

deleting 2-44

description

alarm event 2-3

custom-filter capture 2-23

differentiated services aggregate 2-29

differentiated services profile 2-30

DES encrypted string

TACACS+ server 3-4

destination

trap index 7-30

trap owner 7-30

trap UDP port 7-30

destination address

custom-filter capture 2-23

differentiated services

aggregate 2-29

configurations 5-38

control index for statistics 3-25

data source for statistics 3-25

host control index 3-19

IP version 4 prefix length 3-19

IP version 6 prefix length 3-19

matrix collection 3-21

maximum entries 3-19

owner 3-19

for protocol distribution 3-23

for statistics 3-25

profile 2-30, 5-39

index 3-19, 3-23

protocol distribution 3-23

data source 3-23

maximum entries 3-23

statistics collection 3-25

direction

custom-filter capture 2-23

display

graph bars 4-46

help 2-38

specifying screen line number 7-26

displaying 7-10

address map collection configuration 6-10

art collection configuration 6-11

autostart collections 5-24

available memory 6-8

BIOS information 5-25

capture filters 5-32

certificate signing requests 5-28

date and time 5-34

decode filters 5-33

differentiated services

configurations 5-38

profiles 5-39

entity values 5-41

Ethernet

statistics collection configuration 6-16

history collection configuration 6-18

host

layer host collection configuration 6-19

layer matrix collection 6-20

hosts entries 5-43

import log entries 6-5

installed

certificate 5-27

memory 6-8

patches 6-37

maintenance

image 6-5, 6-6

log 6-7

matrix collection configuration 6-23

patch log entries 6-6

priority statistics collection configuration 6-26

protocol

configuration 6-27, 6-28, 6-29

distribution 6-25

RMON

buffers 6-41, 7-3, 7-4

channel 6-41, 7-3, 7-4

filters 6-41, 7-3, 7-4

RX data counters 7-5

SNMP 7-6

system log settings 7-7

system memory 6-8

technical support information 7-9

upgrade log entries 6-7

URL collection configuration 6-30

URL collection information 6-30

VLAN statistics collection configuration 6-32, 6-33

voice

configuration 6-34

web

access log 5-16

user information 7-16, 7-17

documentation

conventions ii-xiii

organization ii-xii

download

offset

RMON buffer 5-7

downloading

maintenance image 7-32

patch software 4-44

download slice size

RMON buffer 5-7

E

editing

trap destinations 7-30

edit mode 1-4

emial 2-32, 5-40, 5-42

entity

alias 2-33

asset ID 2-34

displaying values 5-41

MIB 2-34

string 2-34

ESP-NULL protocol heuristic parsing

enabling and disabling 5-3

Ethernet

monitoring control index 3-27

statistics 3-27, 3-29, 6-17

statistics collection configuration 6-16

statistics owner 3-27

Ethernet statistics 3-29

event

alarm 2-3

alarm index 2-3

alarms 5-17, 5-18, 5-19

collection owner 2-3

log, none, or trap 2-3

logging for voice 7-25

MIB

alarm falling event threshold 2-5

rising, alarm MIB 2-5

exit 2-35

entries 3-8, 7-18

leaving a subcommand mode 2-35

log out 2-35

external port

IP interface 3-6

F

failures

alerts 7-8

falling event

threshold, alarm MIB 2-5

filter

description, custom-filter capture 2-21

expression, custom-filter capture 2-23

name

custom-filter capture 2-23

full

action type RMON buffer 5-7

read-write access, root 1-1

G

gateway

address

setting 2-41

getting help 1-2, 2-38

graph

setting number of bars 4-46

guest

access 1-1

account 1-1

H

H.323

maximum calls for monitoring 4-29, 4-31, 4-35

maximum phones for monitoring 4-29, 4-31, 4-35

top jitter rows for monitoring 4-29, 4-31, 4-35

top loss rows for monitoring 4-29, 4-31, 4-35

voice monitoring 4-29, 4-31

help

commands 1-2

entry 2-38

history

bucket size for monitoring 3-30

collection configuration

displaying 6-18

control index for monitoring 3-30

interval for monitoring 3-30

monitoring 3-30

owner for monitoring 3-30

host

collection

configuration 6-12, 6-13, 6-14, 6-15, 6-21

monitoring 3-36

control index for monitoring 3-36

data source for monitoring 3-36

layer host 3-32, 4-24

collection configuration 6-19

layer host collection configuration 6-21

layer matrix

collection configuration 6-20

monitoring 3-34

owner for monitoring 3-34

name setting 2-42

owner for monitoring 3-36

statistics

protocol monitoring 4-9

host layer matrix

control index 3-34

data source 3-34

hostname resolution

enabling and disabling 4-46

hosts

entries 2-44, 5-43

web publishing 7-39

HTTP

enabling the server 3-3

port setting 2-45

setting the secure server 2-46, 2-47, 2-48, 3-2

I

image upgrading 7-32

importing configurations 2-17

import log entries

displaying 6-5

index

alarm

MIB 2-5

alarm event 2-3

specifying 1-4

trap destination 7-30

installed

certificate 5-27

memory 6-8

patches 6-37

installing

patch software 4-44

internal port 3-6

interval

history monitoring 3-30

IP

adding hosts 2-43

address, setting for system 2-39

broadcast address for system 2-40

deleting hosts 2-44

displaying NAM parameters 6-4

gateway

for system 2-41

gateway address setting 2-41

hostname

setting 2-42

host name for system 2-42

setting

HTTP port 2-45

HTTP secure server 2-46, 2-47, 2-48, 3-2

name server 3-7

trap destination address 7-30

version 4 prefix length

differentiated services 3-19

version 6 prefix length

differentiated services 3-19

IP interface

ports 3-6

IP parameters 6-4

iSCSI

remote storage 5-6

L

leaving a subcommand mode 2-11, 2-12, 2-13, 2-35

levels of access 1-1

local web user 7-40

logging

NAM MIB alarms 7-22

out 3-8

voice system events 7-25

M

main menu, returning to 2-11, 2-12, 2-13

maintenance

image 6-5, 6-6, 6-7

image upgrade 7-32

mask

status for custom-filter capture 2-21

matrix

collection configuration

displaying 6-23

collection for differentiated services 3-21

control index

for differentiated services 3-21

for monitoring 4-3

data source

for differentiated services 3-21

for monitoring 4-3

maximum entries for differentiated services 3-21

monitoring 4-3

owner

for differentiated services 3-21

for monitoring 4-3

profile index for differentiated services 3-21

maximum

entries, monitor art 3-15

maximum calls

H.323 monitoring 4-29, 4-31, 4-35

maximum entries

application layer for host layer host monitoring 3-32

application layer for host layer matrix monitoring 3-34

differentiated services 3-19

matrix 3-21

protocol distribution 3-23

network layer

for host layer host monitoring 3-32, 4-24

for host layer matrix monitoring 3-34

maximum phones

H.323 monitoring 4-29, 4-31, 4-35

messages

hold time, CDP 2-12

interval, CDP 2-13

MIB alarms 2-5, 7-22

mini-RMON

statistics 3-29

mode

command 1-3

creation 1-4

edit 1-4

leave and return to main menu 2-11, 2-12, 2-13

subcommand 1-3

modes, command 1-3

monitor

address

map collection configuration 3-13

art 3-15, 3-17

data source for Ethernet statistics 3-27

Ethernet statistics 3-27, 3-29, 6-17

history collections 3-30

N

name

protocol monitoring 4-9

server queries 4-42

name server entries 3-7

NetFlow devices 4-40, 4-41

network device

connectivity checking 4-45

route tracing 7-29

network layer

maximum entries for host layer host monitoring 3-32, 4-24

maximum entries for host layer matrix monitoring 3-34

NFS

remote storage

remote storage, NFS 5-5

remote storage, iSCSI 5-6

O

object identifier 2-5

custom-filter capture 2-21

offset

custom-filter capture 2-23

outside login

enable and disable 2-36

owner

alarm event collection 2-3

differentiated services 3-19

aggregate 2-29

matrix 3-21

protocol distribution 3-23

statistics 3-25

Ethernet statistics collection 3-27

history monitoring 3-30

host

layer host monitoring 3-32, 4-24

layer matrix monitoring 3-34

monitoring 3-36

matrix monitoring 4-3

monitor

address map 3-13

art 3-15

priority statistics monitoring 4-8

protocol

distribution monitoring 4-6

monitoring 4-9

RMON buffer 5-7

string, alarm MIB 2-5

trap destination 7-30

VLAN statistics monitoring 4-26

P

packet

capture for web user 7-40

parameters

displaying for NAM 6-4

password

default 1-1

setting 4-43

patch

downloading software 4-44

strong crypto 2-36

patch log entries

displaying 6-6

phone table rows

SCCP monitoring 4-33

polling interval 2-5

ports

IP interface 3-6

preferences

screen display 4-46

priority statistics

collection configuration 6-26

control index

for monitoring 4-8

data source

for monitoring 4-8

monitoring 4-8

owner for monitoring 4-8

problems

alerts 7-8

profile

differentiated services 2-30, 5-39

index 2-30, 3-19

profile index

differentiated services

matrix 3-21

protocol distribution 3-23

statistics 3-25

prompt

guest account 1-1

root account 1-1

protocol

address map statistics for monitoring 4-9

configuration 6-27, 6-28, 6-29

conversations statistics for monitoring 4-9

custom-filter capture 2-23

directory entries

monitoring 4-9, 4-11, 4-12, 4-13, 4-14, 4-15, 4-16, 4-17

distribution

collection configuration, displaying 6-25

control index 3-23

control index for monitoring 4-6

data source for monitoring 4-6

differentiated services 3-23

monitoring 4-6

owner for monitoring 4-6

host statistics for monitoring 4-9

name for monitoring 4-9

owner for monitoring 4-9

specifier

protocol monitoring 4-9

specifier for monitoring 4-9

protocol object identifier

custom-filter capture

See also OID 2-21

publishing GUI displays for hosts 7-39

R

read-only access

guest and root access 1-1

reboot

restart 5-4

shutdown 5-4

related documentation ii-xii

remote

configuring NetFlow devices configuring 4-40, 4-41

server alarms 7-23

remote storage

capturing data 5-5

iSCSI 5-6

removing

alarms 2-3

web users 7-40

report data

sending through emai. 2-32

reports

web publishing 7-39

resetting the NAM 2-17

resolution

hostname enabling and disabling 4-46

response time

monitor art 3-15, 3-17

timeout, monitor art 3-16, 3-17

restart

reboot 5-4

retrieving a core dump 2-20

returning to the main menu 2-11, 2-12, 2-13

rising event

index, alarm MIB 2-5

threshold, alarm MIB 2-5

RMON

buffer 6-41, 7-3, 7-4

collection 1-4, 5-7

size 5-7

channel 6-41, 7-3, 7-4

collection 5-9

filters 6-41, 7-3, 7-4

owner for buffer collection 5-7

statistics polling 3-29

root account 1-1

route

tracing 7-29

rows

preferences for screen display 4-46

running configuration 5-30

RX data counters

displaying 7-5

S

sample type

alarm MIB, absolute or delta 2-5

SCCP

enabling and disabling monitoring 4-33

maximum calls for monitoring 4-33

maximum phones for monitoring 4-33

phone table rows for monitoring 4-33

top jitter rows for monitoring 4-33

top loss rows for monitoring 4-33

voice statistics 4-33

scheduled report data 5-40, 5-42

scheduled report data and alarms 2-32

screen display

preferences 4-46

screen refresh interval

preferences 4-46

secure server

setup 2-46, 2-47, 2-48, 3-2

session

specifying terminal display configuration 7-26

Session Initiation Protocol (SIP)

voice statistics 4-35

shut down 7-18

reboot 5-4

shutting down 7-18

Signaling Collection Control Part (SCCP) 4-33

Simple Network Management Protocol

See SNMP 7-6

SNMP

devices, configuring 7-19

parameters, displaying 7-6

software patch 4-44

startup alarm

rising and falling 2-5

statistics

control index

differentiated services 3-25

VLAN monitoring 4-26

data source

for differentiated services 3-25

for monitoring 4-26

differentiated services 3-25

Ethernet 3-29

Ethernet monitoring

data source 3-27

monitoring Ethernet 3-27, 3-29, 6-17

monitoring for VLANs 4-26

owner

differentiated services 3-25

Ethernet 3-27

VLAN monitoring 4-26

profile index for differentiated services 3-25

voice monitoring 4-33, 4-35

statistics polling

mini-RMON 3-29

status

mask, custom-filter capture 2-21

not mask, custom-filter capture 2-21

strong crypto patch 2-36

subcommand mode 1-3

synchronizing system time 7-27

system

alarms 7-24

broadcast address setting 2-40

clearing alerts 2-14, 2-15

configuration privilege

web user 7-40

default gateway address setting 2-41

host name setting 2-42

IP address

setting 2-39

log

configuring 7-21

NAM MIB alarms 7-22

remote server alarms 7-23

settings 7-7

voice events 7-25

log settings 7-7

name server

entries setting 3-7

system memory 6-8

T

tabular screens

row display 4-46

TACACS+

DES encrypted string 3-4

enabling the secret-key 3-4

enabling the server 3-4

technical support information

displaying 7-9

terminal setting

specifying screen lines 7-26

threshold

falling event, MIB alarm 2-5

rising event 2-5

time

configuration

setting 7-27

remaining monitor art 3-16

synchronization settings 7-10

displaying 7-10

zone settings 7-10

top jitter rows

H.323 monitoring 4-29, 4-31, 4-35

SCCP monitoring 4-33

top loss rows

H.323 monitoring 4-29, 4-31, 4-35

SCCP monitoring 4-33

tracing

route to a network device 7-29

trap 7-30

community string 7-30

destinations 7-11

index 7-30

IP address 7-30

owner 7-30

UDP port 7-30

U

UDP port

trap destination 7-30

upgrade

log entries 6-7

maintenance image 7-32

URL

collections 4-22

user name 7-40

V

version information 7-12

virtual LAN

See VLAN 6-32, 6-33

VLAN 6-32, 6-33

control index for monitoring statistics 4-26

owner for monitoring 4-26

statistics

collection configuration 6-32, 6-33

monitoring 4-26

voice

configuration

displaying 6-34

H.323 monitoring 4-29, 4-31

monitoring 4-33, 4-35

threshold events

logging 7-25

voice displays

web publishing 7-39

W

web access log

displaying 5-16

web publising alarms 7-39

web publising reports 7-39

web publising voice displays 7-39

web user 7-40

account management privilege 7-40

alarm privilege 7-40

collection privilege 7-40

configuring 7-40

decode privilege 7-40

information 7-16, 7-17

packet capture 7-40

system configuration privilege 7-40