소개
이 문서는 Catalyst 9800과 다양한 종류의 내역 이벤트를 나열하는 빠른 참조 가이드입니다.9800 플랫폼의 Always-On 로깅 기능을 활용하면 특정 로그 라인이 어떻게 표시되는지 알고 있는 경우 특정 유형의 이벤트를 빠르고 쉽게 나열할 수 있습니다.
구조
이 문서는 모든 무선 관련 이진 로그(활성 디버깅의 어떤 형태도 활성화하지 않고 항상 켜져 있음)를 거치는 "show logging profile wireless" 명령의 사용에 대해 다룹니다.
"start last <time period>"는 로그의 특정 기간까지 돌아갈 수 있습니다.
파이프를 사용하여 검색을 제한하지 않을 경우 이 명령은 터미널에 많은 데이터를 출력합니다. 따라서 아래의 모든 예제는 특정 이벤트와 함께 파이프를 사용합니다.
클라이언트
성공적으로 인증된 클라이언트를 나열하는 중:
myc9800-CL#show logging profile wireless start last 10 days | i Authentication Success
2020/09/26 16:41:21.397677 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:04:33.523999 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client d280.eb73.6044
2020/09/26 17:21:59.892585 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:32:09.289109 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:41:58.123180 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 64b5.c66d.13ac
성공적인 IP 주소를 얻은 클라이언트 나열:
myc9800-CL#show logging profile wireless start last 10 days | i IP learn successful
2020/09/26 16:41:30.621520 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: DHCP IP: 192.168.1.13
2020/09/26 17:04:37.622905 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: d280.eb73.6044 Client IP learn successful. Method: IP Snooping IP: 192.168.1.36
2020/09/26 17:22:03.830465 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: IP Snooping IP: 192.168.1.13
2020/09/26 17:32:09.966598 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: IP Snooping IP: 192.168.1.13
2020/09/26 17:33:30.236544 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 3cf7.a4ae.f607 Client IP learn successful. Method: IP Snooping IP: 192.168.1.49
RRM
채널 변경
9800# show logging profile wireless | include history-channel
2020/02/13 10:50:03.297 {wncd_x_R0-0}{2}: [radio-history-channel] [24955]: (note): Channel change for AP5c83.8f6e.4250 Slot:1 Band:802.11a Previous Chan:100 Current Chan:132 chan width: 40 Reason: DCA Algorithm
노이즈 및 간섭 값
로그에 정보를 표시하려면 "플랫폼 소프트웨어 추적 무선 섀시 활성 r0 rrm rrm-client-dca info"를 설정해야 합니다.
9800#show logging profile wireless start last x hours| include rrm-client-dca
2020/06/26 15:44:08.636988 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11a) Channel set request: on cell to channel 40 from 40 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,127) to (-128,-128,127) Reason: 0x1 for slot id: 1
2020/06/26 15:44:08.640828 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11bg) Channel set request: on cell to channel 6 from 1 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-77,-35,-35) to (-66,-58,-57) Reason: 0x4 for slot id: 0
2020/06/26 15:54:18.671638 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11a) Channel set request: on cell to channel 40 from 40 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,127) to (-128,-128,127) Reason: 0x1 for slot id: 1
2020/06/26 15:54:18.673055 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11bg) Channel set request: on cell to channel 6 from 6 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,-58) to (-128,-128,-58) Reason: 0x1 for slot id: 0
실행 중인 DCA 알고리즘
9800-17#show logging profile wireless start last boot | i Running DCA Algo
2020/02/14 16:23:09.177 {rrm_bg_R0-0}{1}: [rrm-mgr-dca] [22117]: (note): (Radio: 802.11a) Running DCA Algorithm