Guest

Cisco BTS 10200 Softswitch

CIC Audit Feature

  • Viewing Options

  • PDF (261.8 KB)
  • Feedback
Cisco BTS 10200 Softswitch CIC Audit Feature

Table Of Contents

Cisco BTS 10200 Softswitch CIC Audit Feature

Contents

Audit Types

CLI Command Reference

New Audit Command

Modified Diag Command

New Objects

ACTIVITY Table

ACTIVITY-BASE Table

AUDIT-LONGTHRESHOLD Token

Operations

Traffic Statistics Measurements

Troubleshooting

Events and Alarms

Additional References

Related Documents

Technical Assistance


Cisco BTS 10200 Softswitch CIC Audit Feature


The Cisco BTS 10200 Softswitch system may experience a "hung" SS7 trunk when an idle trunk is incorrectly perceived by the call agent to be busy. When this occurs, the call agent never selects the trunk to service new calls. This condition occurs primarily during a failover when the standby system becomes active. A call is released and the new idle call state is not replicated to the newly active call agent, who continues to perceive the trunk as busy.

The CIC audit feature enables the Cisco BTS 10200 Softswitch to recognize when an SS7 trunk is in the hung state and to restore the trunk to a usable state. A CIC audit can be performed in response to a:

Demand Request

Switchover

Scheduled Audit Request

Long Duration Call

Exception Event

Feature Specifications for the CIC Audit Feature

Feature History
 
Release
Modification

Release 4.0

This feature was introduced.

Supported Platforms

Cisco Broadband Telephony Switch 10200 (BTS 10200)


Contents

This addendum documents the CIC audit feature and includes the following sections:

Audit Types

CLI Command Reference

Operations

Troubleshooting

Additional References

Audit Types

When the Cisco BTS 10200 Softswitch performs an audit, it queries one or both ends of a trunk or circuit to determine its state. The CIC audit feature implements the following new audit types for the active call agent:

.Switchover Audit—Initiated when a standby call agent becomes active. This audit queries both the Gateway and the SS7 side of all SS7 trunks in the system.

SS7 Audit—A scheduled audit that initiates at a particular date and time and repeats at some designated interval. This audit queries the SS7 side of all SS7 trunks in the system.

MGCP Audit—A continuous audit that commences at the completion of system initialization or switchover from standby to active call agent.

Demand Audit—Initiated by a system user using CLI commands. This audit queries both the gateway and SS7 sides of a single SS7 trunk or a contiguous range of trunks.

Exception Audit—Initiated by a system event. The system will perform an immediate recovery from the event but will perform a background audit of the trunk to ensure a consistent view of the trunk over the signaling network.

Long-Duration Audit—A scheduled audit that initiates at a particular date and time and repeats at some designated interval. This audit does not perform any gateway or SS7 endpoint queries but examines SS7 trunks for any that have been busy longer than a specified duration, usually 24 hours.

CLI Command Reference

New Audit Command

Use the following new CLI audit command toinitiate a remove SS7 CIC audit on demand. To execute a remote CIC audit at a scheduled time, use the existing Command Scheduler.

CLI> audit all-ss7-cics

When entered manually, this command initiates a remove SS7 CIC audit of the entire system. This command does not provide per-trunk results. The response begins as soon as the audit has been started, and an INFO event will be logged when this audit starts and completes. Unexpected results from this audit will be written as a WARNing in the alarm log.

The following example illustrates how to schedule an SS7 remote CIC audit using this command:

CLI> add scheduled-command start-time=2002-07-04 16:30:00; recurrence=daily; 
noun=all-ss7-cics; verb=audit;

Modified Diag Command

The existing diag command is enhanced to add a new option for executing an SS7 CIC audit on a trunk or range of trunks. This command will execute both the SS7 CIC remote audit and the gateway termination audit and will report the state of the trunhk termination and whether corrective action was executed.

The following example illustrates the response to the modified diag command:

New Objects

Configuring CIC audits includes provisioning the following new objects:

ACTIVITY Table

ACTIVITY-BASE Table

AUDIT-LONGTHRESHOLD Token

Signaling Gateway, page 6

Signaling Gateway Group, page 8

User Part Variant, page 9

Call Control Route, page 10

Routing Key, page 11

Signaling Gateway Process, page 13

SCTP Association Profile, page 14

SCTP Association, page 15

SS7 Trunk Group Profile, page 18

SS7 CIC, page 22

SCCP Network, page 24

SLHR PROFILE, page 25

SERVICE LOGIC HOST ROUTE (SLHR), page 26


Note An asterisk preceding a token name in the following tables indicates that the token is mandatory.


ACTIVITY Table

The ACTIVITY table is used to configure periodic or scheduled audits for the Cisco BTS10200 Softswitch, including audits enabled during switchover or at initialization. The ACTIVITY table is used to configure the frequency and start / end times for these audits.

Table Name: ACTIVITY

Table Containment Area: Call Agent, FSPTC, FSAIN, EMS

show ACTIVITY ID=SS7-CIC;

add ACTIVITY ID=MEDIA-ALIVE-EM; FREQ=6H; START-TIME=02:00;

change ACTIVITY ID=MEDIA-ALIVE-EM; FREQ=8H;

Command History

Release
Modification

Cisco BTS 10200 Softswitch Release 4.0

This command was introduced.


Syntax Description

ACTIVITY Table
Configures periodic or scheduled audits on the BTS 10200 Softswitch

*ID

Primary key. Unique identifier for the audit. VARCHAR(16)—1-16 ASCII characters. Valid values include the following strings:

SS7-CIC—Controls the SS7-side CIC audit.

MGCP-TERM—Controls the trunking gateway, MGCP-side CIC audit.

MEDIA-ALIVE-EM—Event generation for long duration calls.

FREQ

Specifies the frequency at which to schedule the audit. VARCHAR(16); valid values are one of the following strings:

5M—RUN PERIODIC TASK EVERY 5 MIN

10M—RUN PERIODIC TASK EVERY 10 MIN

15M—RUN PERIODIC TASK EVERY 15 MIN

30M—RUN PERIODIC TASK EVERY 30 MIN

1H—RUN PERIODIC TASK EVERY 1 HOUR

2H—RUN PERIODIC TASK EVERY 2 HOURS

3H—RUN PERIODIC TASK EVERY 3 HOURS

4H—RUN PERIODIC TASK EVERY 4 HOURS

6H—RUN PERIODIC TASK EVERY 6 HOURS

8H—RUN PERIODIC TASK EVERY 8 HOURS

12H—RUN PERIODIC TASK EVERY 12 HOURS

DAILY—RUN PERIODIC TASK EVERY 24 HOURS

WEEKLY—RUN PERIODIC TASK ONCE EVERY WEEK ON THE SPECIFIED DAY OF WEEK

BIWEEKLY—RUN PERIODIC TASK ONCE EVERY TWO WEEKS ON THE SPECIFIED DAY OF WEEK

MONTHLY—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DAY OR DATE

DAY-OF-MONTH

The day of the month on which to run the audit. This token is required if FREQ = MONTHLY. VARCHAR(16); valid values are one of the following strings:

FIRST—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DAY-OF-WEEK

SECOND—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DAY-OF-WEEK

THIRD—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DAY-OF-WEEK

FOURTH—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DAY-OF-WEEK

LAST—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DAY-OF-WEEK

FIRSTDAY—RUN PERIODIC TASK ONCE EVERY MONTH ON THE FIRST DAY OF MONTH

LASTDAY—RUN PERIODIC TASK ONCE EVERY MONTH ON THE LAST DAY OF MONTH

DATE—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DATE

DAY-OF-WEEK

Day of week on which to run the audit. This token is required if FREQ = WEEKLY | BIWEEKLY OR FREQ = MONTHLY and DAY-OF-MONTH = FIRST | SECOND | THIRD | FOURTH | LAST. CHAR(3); valid values are one of the following strings:

MON—Monday

TUE—Tuesday

WED—Wednesday

THU—Thursday

FRI—Friday

SAT—Saturday

SUN—Sunday

DATE-OF-MONTH

Date on which to run the audit each month. This token is required if DAY-OF-MONTH = DATE. SMALLINT(1-28)

Note Since dates 29th - 31st do not occur every month, they are not specified.

START-TIME

Specifies the start-time for a scheduled or a periodic audit. For a periodic audit, only the start time is used. CHAR(5); Time of Day (HH:MM); DEFAULT=00:00.

FIXED-TIME-INTERVAL

If the activity has to be run only during fixed time interval, then END-TIME is required.CHAR(1); Y / N. This token is provisioned from the ACTIVITY-BASE table.

END-TIME

Specifies end-time if the audit has to be suspended at a particular time. At the next scheduled time, the suspended activity picks up from where it was terminated. CHAR(5); Time of Day (HH:MM).

ENABLED

Specifies if the audit is enabled or disabled. CHAR(1); Y/N (DEFAULT=N)

Y = The specified activity is performed at the specified FREQ

N = Not a periodic activity

SO-ENABLED

Specifies if the audit is run post-switchover on the newly active side. CHAR(1); Y/N.

RESTART-ENABLED

Specifies if the audit is to be run post-initialization if the process is restarted. CHAR(1); Y/N.

LAST-CHANGED

Specifies the time at which the audit record was modified. DATE; this token is not provisionable and uses the system time when it was last modified or provisioned.


Primary Key Token(s): id

Unique Index Token(s):

Add Rules: None.

Change Rules: None.

Delete Rules: None.

ACTIVITY-BASE Table

The ACTIVITY-BASE table is used to define valid audit activity IDs and the frequency at which they are run. This table is populated during installation. Only the show command is valid.

Table Name: ACTIVITY-BASE

Table Containment Area: EMS

show ACTIVITY ID=MGCP-TERM;

Command History

Release
Modification

Cisco BTS 10200 Softswitch Release 4.0

This command was introduced.


Syntax Description

ACTIVITY-BASE Table
Defines valid audit activity IDs and the frequency at which they are run.

* ID

Activity type.Primary key. VARCHAR(16)—1-16 ASCII characters. Valid values include the following strings:

SS7-CIC—Controls the SS7-side CIC audit.

MGCP-TERM—Controls the trunking gateway, MGCP-side CIC audit.

MEDIA-ALIVE-EM—Event generation for long duration calls.

VALID-FREQ

Defines a list of intervals that are allowable for the defined activity. If null, any valid frequence is allowed to be provisioned. VARCHAR(32); valid values include one of the following strings:

5M—RUN PERIODIC TASK EVERY 5 MIN

10M—RUN PERIODIC TASK EVERY 10 MIN

15M—RUN PERIODIC TASK EVERY 15 MIN

30M—RUN PERIODIC TASK EVERY 30 MIN

1H—RUN PERIODIC TASK EVERY 1 HOUR

2H—RUN PERIODIC TASK EVERY 2 HOURS

3H—RUN PERIODIC TASK EVERY 3 HOURS

4H—RUN PERIODIC TASK EVERY 4 HOURS

6H—RUN PERIODIC TASK EVERY 6 HOURS

8H—RUN PERIODIC TASK EVERY 8 HOURS

12H—RUN PERIODIC TASK EVERY 12 HOURS

DAILY—RUN PERIODIC TASK EVERY 24 HOURS

WEEKLY—RUN PERIODIC TASK ONCE EVERY WEEK ON THE SPECIFIED DAY OF WEEK

BIWEEKLY—RUN PERIODIC TASK ONCE EVERY TWO WEEKS ON THE SPECIFIED DAY OF WEEK

MONTHLY—RUN PERIODIC TASK ONCE EVERY MONTH ON THE SPECIFIED DAY OR DATE

FIXED-TIME-INTERVAL

This token is set if the activity is to be run during a fixed time interval.CHAR(1) Y / N (DEFAULT = N)

SO-ENABLED

Specifies if the activity has to be run post switchover on the newly active side. CHAR(1) Y / N (DEFAULT = Y)

RESTART-ENABLED

Specifies if the activity is to be run post initialization if the process is restarted. CHAR(1) Y / N (DEFAULT = Y)


Usage Guidelines

Primary Key Token(s): id

Unique Index Token(s):

Add Rules: None

Change Rules: None

Delete Rules: None

AUDIT-LONGTHRESHOLD Token

The AUDIT-LONGTHRESHOLD token is added to the CA-CONFIG table and specifies the minimum number of hours a trunk must be busy before it will be flagged for a long duration audit.

Table Name: CA-CONFIG

Table Containment Area: Call Agent

show ca-config type=AUDIT-LONGTHRESHOLD;

change ca-config type=AUDIT-LONGTHRESHOLD; datatype=integer;value=50;

Syntax Description

SG Table
Identifies all signaling gateways managed by the call agent.

* TYPE=AUDIT-LONGTHRESHOLD

The minimum number of hours a trunk must be busy before it will be flagged by the long duration CIC audit. Primary key. INTEGER; 0-99999 (Default=24). A value of 0 disables this audit.


Operations

This section documents operations processes and procedures that are introduced to the Cisco BTS 10200 Softswitch by the CIC audit feature. Refer to the Cisco BTS 10200 Softswitch Operations Manual for Release 3.1 for general information about operations processes for the Cisco BTS 10200 Softswitch.

Traffic Statistics Measurements

Table 1 identifies and describes the signaling gateway based ISUP protocol Call Agent counters implemented by the CIC audit feature.

Table 1 New ISUP Measurements

Measurement
Description

SGA_AUDIT_TRUNK_STATE_SYNCED

The number of times that a BTS, SS7, or gateway view of a trunk is changed due to corrective action by the SS7 CIC or gateway audit.

SGA_AUDIT_LONG_DUR_EXCEEDED

The number of times that the long duration threshold is exceeded, as detected by the long duration trunk audit.


Troubleshooting

This section describes troubleshooting problems introduced by the CIC audit feature. For information about troubleshooting problems with the Cisco BTS 10200 Softswitch, refer to theCisco BTS 10200 Softswitch Operations Manual, Release 3.1.

Events and Alarms

The CIC audit feature implements the following new alarms:

SIGNALING #139      SS7 Trunk Was Found To Be In Erroneous State

Possible loss of customer capabilities.

Level

INFO

Threshold/Throttle

100 / 0

Data Reported

CIC - TWO_BYTES, TGN-ID - FOUR_BYTES, DPC - STRING [20], OPC - STRING [20], Near-End State - STRING [64], Far-End State - STRING [64], Resolution Action - STRING [64]

Probable Cause

Issued when there is a discrepancy between local and remote trunk states.

Corrective Action

Automatic corrective action enforced when using ANSI ISUP.


AUDIT#4      Call exceeds a long-duration threshold

Call exceeds current system long-duration threshold.

Level: WARN

Threshold/Throttle:100 / 0

Data Reported: Trunk group number - TWO_BYTES
Trunk member number - TWO_BYTES
Current long-duration threshold - TWO_BYTES

Probable Cause:

Call exceeds current system long-duration threshold.

Corrective Action:

If there is reason to believe the call is no longer valid, release the associated trunk facility.


AUDIT#3      SS7 CIC audit terminated before successful completion

Level: Warning

Threshold/Throttle:100 / 0

Data Reported: type of audit - STRING [64]

Probable Cause:

A higher priority SS7 CIC audit interrupted and terminated a lower priority SS7 CIC audit.

Corrective Action:

Do not schedule an SS7 remote termination audit to occur while a periodic SS7 local termination audit is executing.


AUDIT #2      Start or Stop of SS7-CIC audit

Level: Info

Threshold/Throttle: 100/0

Data Reported: type of audit - STRING [64]

Probable Cause:

SS7 CIC audit has started or stopped.

Corrective Action:

No action required - normal operation.

Additional References

For additional information related to the Cisco BTS 10200 Softswitch, refer to http://www.cisco.com/univercd/cc/td/doc/product/voice/bts10200/index.htm and to the following documents:

Related Documents

Related Topic
Document Title

Cisco BTS 10200 Softswitch

Cisco BTS 10200 Softswitch System Description for Release

Cisco BTS 10200 Softswitch objects, tokens, and CLI commands

Cisco BTS 10200 Softswitch Release Command Reference Guide

Cisco BTS 10200 Softswitch operations, maintenance, and troubleshooting

Cisco BTS 10200 Softswitch Operations Manual for Release

Cisco BTS 10200 Softswitch events and alarms

Cisco BTS 10200 Softswitch Error Messages and Alarms Reference Guide


Technical Assistance

Description
Link

Technical Assistance Center (TAC) home page, containing 30,000 pages of searchable technical content, including links to products, technologies, solutions, technical tips, tools, and lots more. Registered Cisco.com users can log in from this page to access even more content.

http://www.cisco.com/public/support/tac/home.shtml