A -
B -
C -
D -
E -
F -
G -
H -
I -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
W -
X -
Z
Index
A
absolute sampling 6-17
ACLs
disabling logging globally 4-11
logging activity 4-11
running-config, displaying in 1-10, 1-14
activating
RMON alarm 6-21
RMON event 6-9
RMON history 6-26
active SCM, copying boot configuration record 2-16
ADI
included on Cisco.com A-2
removing 1-24, A-13
unpacking 1-24
administrative password
setting B-19
administrative username
setting B-19
advanced options for Offline Diagnostic Monitor menu B-17
agent
CSS as SNMP agent, defining 5-11
MIB 5-5
overview 5-2
SNMP 5-2
alternate configuration path B-7
Application Program Interface (API), configuring 7-1
archive directory
archiving files to 1-25
clearing 1-27
restoring files from 1-27
archiving
files, viewing 1-4
files to the archive directory 1-15, 1-25
log files 1-26
log files, restoring 1-28
running-config 1-26
scripts 1-27
scripts, restoring 1-29
startup-config 1-26
startup-config, restoring 1-29
ArrowPoint Distribution Image. See ADI
audience xxiv
B
banner
login 3-12
pre-login 3-11
boot configuration
alternate configuration path 2-17
copying configuration record 2-16
displaying B-17
flowchart B-4
menu options B-5
mode configuration 2-3
path, specifying secondary 2-9
showing 2-17
boot file
primary boot configuration, specifying 2-3, 2-4, 2-11, 2-12, B-6
secondary boot configuration, specifying 2-6, 2-7, 2-13, B-11
showing boot information B-17
boot log
boot.bak 4-3
boot.log 1-3, 4-2, 4-3
messages 4-2
bridge, viewing statistics 5-31
C
caution
ADI, removing A-13
clearing the running configuration 1-9
community strings for SNMP 5-14
Ethernet Management port IP address, configuring B-16
symbol overview xxviii
changing
CLI prompt 3-10
chassis information, displaying 1-35
check disk
disabling or enabling on the disk B-25
performing on the disk B-23
clearing
archive directory 1-27
disk files 1-23
RMON statistics 6-31
running-config 1-9
startup-config 1-9
CLI
commands, logging to sys.log 4-18
command scheduler 8-3
content API, configuring 7-2
conventions xxix
conventions in XML code 7-3
CSS configurations, displaying 1-33
hierarchy in XML code 7-3
prompt, changing 3-10
terminal screen output lines, configuring 3-6
command scheduler
configuring 8-3
displaying records 8-5
community
configuring an SNMP community 5-14
overview 5-9
SNMP trap-host, configuring 5-16
configuration quick start
CSS as a SNMP agent 5-11
Denial of Service (DoS) 5-23
initial CSS configuration 2-2, 3-3
logging 4-4
RMON alarm 6-12
RMON event 6-5
configuring
FTP server record A-2
RMON alarm 6-10
RMON event 6-4
RMON history 6-21
content API
creating XML code 7-2
mode hierarchy 7-3
parsing XML code 7-6
special characters 7-2
testing XML code 7-7
Content Services Switch
booting from a network drive 2-16, 2-17
chassis information, displaying 1-35
configurations, displaying 1-33
device information, showing 1-43
HTTP server, controlling access 7-5
idle timeout, configuring 3-8
logging functions 4-4
MIBs 5-38
SNMP, controlling access 5-10
system resources, displaying 1-44
system uptime, displaying 1-46
user terminal parameters, configuring 3-5
copying
boot configuration record 2-16
core dumps to FTP or TFTP server 1-31
core dumps to TFTP server 1-30
files between disks 1-21
log files to FTP or TFTP server 4-23
log files to FTP server 1-32, 4-23
log files to TFTP server 4-24
new software to CSS A-2
user profiles 3-13
core directory 1-3
core dumps
copying to an FTP or TFTP server 1-31
copying to TFTP server 1-33
disabling 1-30
disk destination, configuring (from CLI) 1-19
disk destination, configuring from Offline DM B-26
enabling 1-30
showing 1-31
CSS. See Content Services Switch
CSS 11501 disks
configuring from CLI 1-16
formatting from CLI 1-17
D
default gateway for management port B-16
deleting software from the disk B-18, B-26
delta sampling 6-17
Denial of Service (DoS)
configuring using SNMP 5-22
displaying 5-26
running-config example 5-24
SNMP trap-type, defining 5-24
device information, showing 1-43
disabling
check disk B-25
core dumps 1-30
logging 4-7
logging to disk 4-14
logging to sys.log file on disk 4-14
disk
boot, primary boot record 2-3, B-10
boot, secondary boot record 2-6, B-15
buffer size, specifying for logging 4-6
clearing files 1-23
configuring from CLI 1-16
copying between disks 1-21
CSS drive failure (network boot) B-7
disabling logging to 4-14
disabling or enabling check disk B-25
files, displaying 1-23
formatting from CLI 1-17
general information, showing 1-47
mapping, displaying 1-22
module, restoring files from archive directory 1-27
options, Offline Diagnostic Monitor menu B-21
performing a check disk B-23
reformatting the disk (Disk Option menu) B-21
reformatting the disk (from CLI) 1-17
running check disk on the disk (Disk Options menu) B-21
software version, deleting B-18
specifying for log file destination 4-14
displaying
CSS configurations 1-33
hardware information 1-35
history buffer 3-11
log files 4-18
SNMP configuration 5-29
documentation
audience xxiv
chapter contents xxiv
related xxv
set xxv
symbols and conventions xxviii
DoS. See Denial of Service
E
email address, sending log messages to 4-12
enterprise MIBs 5-7
Ethernet management port
statistical data 6-21
viewing statistics 5-31, 6-27
expert mode 3-9
F
falling threshold for an RMON alarm 6-19
file destination, specifying for logging 4-13
flash disk 1-16
directory structure 1-2
installed software versions A-6
logging to 4-3
reformatting 1-17
formatting the disk 1-17, B-21
FTP
boot, primary boot record B-9
boot, secondary boot record 2-5, 2-8, B-14
copying log files to server 1-32, 4-23
record, configuring 1-4
FTP server
copying core dumps to 1-32
copying files from 1-6
copying log files to 4-23
record, configuring A-2
G
gateway, default for Management port B-16
GZIP-compressed software A-2
H
hard disk
configuring 1-16
directory structure 1-2
installed software versions A-6
logging to 4-3
reformatting 1-17
hardware, displaying chassis information 1-35
history buffer
displaying 3-11
modifying 3-10
host, specifying as log file destination 4-16
host name, configuring 3-8
HTTP server, configuring on CSS 7-5
I
idle timeout, configuring 3-8
install new software A-1, B-9, B-14
internal disk module directory structure 1-2
interpreting
sys.log messages 4-25
undeliverable log messages 4-26
IP address
configuring using Offline Diagnostic Monitor menu B-16
finding 1-15
K
keepalive script examples 8-45
L
log files
archiving 1-26
boot 1-3
boot and subsystem 4-2
copying to an FTP or TFTP server 4-23
copying to FTP server 1-32, 4-23
copying to TFTP server 4-24
destination, configuring from CLI 1-20
destination, configuring from Offline DM B-26
destination, specifying disk 4-14
destination, specifying line 4-17
host destination, specifying 4-16
log activity 4-18
log state 4-21
restoring archived files 1-28
showing 4-18
sys.log 1-3
logging
ACL activity 4-11
boot.bak 4-3
boot.log 4-3
CLI commands 4-18
commands 4-2
configuring from config mode 4-4
CSS line destination, specifying 4-17
disabling 4-17
disabling to sys.log file 4-14
enabling for a subsystem 4-7
enabling to sys.log file 4-14
file destination 4-13
host destination, specifying 4-16
interpreting sys.log messages 4-25
interpreting undeliverable messages 4-26
levels 4-9, 4-16
log state 4-21
overview 4-2
quick start table 4-4, 4-5
running-config example 4-6
send messages to an email address 4-12
showing log files 4-18, 4-21
specifying disk buffer size 4-6
subsystem, disabling for 4-7
subsystem, enabling on 4-7
sys.log 4-3
to a specific file on disk 4-14
to host, disabling 4-17
to sys.log file, enabling 4-14
turning off from disk 4-14
turning off from host 4-17
login banner, configuring 3-12
log messages
boot 4-2
interpreting sys.log messages 4-25
interpreting undeliverable messages 4-26
message fields (Debug-7 logging) 4-29
on the CSS 4-2
sending to an email address 4-12
subsystem 4-2
subsystem, configuring for 4-10
M
manager
MIB objects 5-5
overview 5-2
planning SNMP configuration 5-10
SNMP 5-2
SNMP manager access to CSS, enabling 5-29
MIBs
CSS 5-38
defining object as a sample variable 6-16
directory 1-3
enterprise 5-7
looking up objects 5-30, 6-16
object identifiers 5-7
objects 5-5
upgrading A-16
useful statistics 5-31
variables 5-7
N
netmask format, configuring for user 3-7
network boot
configuration, showing 2-20
primary boot record B-7
restrictions B-7, B-12
secondary boot record B-12
specifying primary config path 2-6
network drive, booting CSS from 2-17
O
Offline Diagnostic Monitor menu
advanced options B-17
configuring default gateway for management port B-16
disabling or enabling check disk B-25
disk options B-21
performing a check disk B-23
reformatting the disk B-21
setting password protection B-18
using to configure IP address B-16
using to configure subnet mask B-16
P
passive SCM
boot record, configuring 2-10
copying boot-config from active SCM 2-16
IP address, configuring 2-11
passive sync command 2-16
primary boot file, configuring 2-11
primary configuration path 2-12
primary configuration path, configuring 2-13
SCM secondary boot file, configuring 2-13
secondary boot type, configuring 2-14
secondary configuration path, configuring 2-15
subnet mask, configuring 2-15
password
administrative password, setting B-19
Offline DM Main menu protection B-18
protection, setting on Offline Diagnostic Monitor menu B-18, B-21
prefix notation, configuring for subnet mask display 3-7
pre-login banner, configuring 3-11
primary boot
configuration 2-3, 2-4, 2-11, 2-12, B-6
file, specifying 1-17, 1-18, 1-19, 1-20, 2-3
type, configuring 2-4
primary boot record
destination, configuring from CLI 1-18
destination, configuring from Offline DM B-26
disk boot 2-3, B-10
FTP boot B-9
network boot B-7
secondary boot B-10
primary config path, specifying for network boot 2-6
Q
quick start
CSS as a SNMP agent 5-11
Denial of Service (DoS 5-23
logging 4-4, 4-5
RMON alarm 6-12
RMON event 6-5
R
reformatting the disk 1-17, B-21
restoring
archived files 1-28
archived log file 1-28
archived script file 1-29
archived startup-config 1-29
files from archive directory 1-27
log files 1-28
script 1-29
startup-config 1-29
RMON
alarm index, creating 6-14
clearing statistics 6-31
configuration considerations 6-3
event configuration identifier, creating 6-6
history configuration identifier, creating 6-23
overview 5-10, 6-2
RMON-1 groups 6-2
statistics group 6-2
viewing statistics 5-31, 6-27
RMON alarm
activating 6-21
configuring 6-10
falling threshold, defining 6-19
group 6-2
index, creating 6-14
index, deleting 6-15
owner, defining 6-15
rising threshold, defining 6-18
running-config example 6-13
sample interval, defining 6-20
sample variable, defining 6-16
sampling example 6-10
sampling type, defining 6-17
setting attributes 6-15
startup alarm, defining 6-20
RMON event
activating 6-9
community, defining 6-7
configuring 6-4
describing 6-8
group 6-2
index, deleting 6-6
notification type, defining 6-8
owner, defining 6-8
quick configuration 6-5
running-config example 6-5
setting attributes 6-7
suspending 6-10
viewing 6-33
viewing a traplog file 6-34
viewing disk log file 6-34
RMON history
activating 6-26
bucket count, defining 6-26
bucket interval, defining 6-26
configuring 6-21
data object, defining 6-25
deleting configuration identifier 6-24
group 6-2
owner, defining 6-25
running-config example 6-23
setting attributes 6-25
viewing information for 6-31
running check disk on the disk B-21
running-config
archiving 1-27
clearing 1-9
copying 1-7
creating using text editor 1-14
displaying 1-10
example 1-12
ordering information within 1-14
using 1-7
running-config example
DoS 5-24
logging 4-6
RMON alarm 6-13
RMON event 6-5
RMON history 6-23
SNMP agent 5-13
running-profile
copying to an FTP server 3-14
copying to an TFTP server 3-15
copying to a user profile 3-14
copying to the default profile 3-14
S
sample variable, finding and defining 6-16
sampling
absolute 6-17
defining 6-17
delta 6-17
interval for an RMON alarm 6-20
RMON alarm example 6-10
SCM
boot record for passive SCM, configuring 2-10
configuring network boot for primary 2-18
disks, configuring from CLI 1-16
disks, formatting from CLI 1-17
IP address for passive SCM, configuring 2-11
network boot for passive, configuring 2-19
scripting language
!no echo command 8-7
arithmetic operators 8-11
arrays 8-22
bitwise logical operators 8-30
Boolean logic operators 8-13
branch commands 8-13
capturing user input 8-26
command line arguments 8-27
comments 8-6
echo command 8-6
functions 8-28
grep command 8-34
increment and decrement operators 8-12
overview 8-1
relational operators 8-13
set and no set commands 8-10
socket commands 8-36
special variables 8-16
syntax errors 8-31
terminating a script 8-31
variables 8-8
scripts
archiving 1-27
disk directory 1-3
keepalive examples 8-45
playing 8-2
restoring archived file 1-29
showtech 8-43
upgrade considerations 8-43
secondary boot
configuration 2-6, 2-7, 2-13
configuration path, specifying 2-9
configuration setting B-11
type, specifying 2-7
secondary boot record
destination, configuring from CLI 1-19
destination, configuring from Offline DM B-26
disk boot 2-6, B-15
FTP boot 2-5, 2-8, B-14
network boot B-12
secondary config path, specifying 2-9
security options
Offline Diagnostic Monitor menu B-18
setting password protection on Offline Diagnostic Monitor menu B-18
session, specifying as log file destination 4-17
showing
boot information B-17
core dumps 1-31
disk files 1-23
disk mapping 1-22
DoS attacks 5-26
general disk information 1-47
log files 4-18
SNMP configuration 5-29
software versions 1-2, 1-34
system resources 1-44
system uptime 1-46
user information 1-45, 1-48
showing device information 1-43
showtech script 8-43
SNMP
agents 5-2, 5-3
community, RMON event 6-7
community, using 5-29
configuration, displaying 5-29
configuring 5-10
get 5-3
get-next 5-3
managers 5-2, 5-3
managing 5-29
MIBs 5-5
running-config example 5-13
set 5-3
trap hosts 5-12
traps 5-3
socket commands 8-36
software
copying new software to CSS A-2
deleting a version from the disk B-18
directory 7-7, 8-3
GZIP-compressed software A-2
overview 1-2
upgrade (manual process) A-13
upgrade script A-5
version format 1-2
versions, displaying 1-2, 1-34
startup alarm for RMON 6-20
startup-config
archiving 1-27
clearing 1-9
copying 1-7
creating using text editor 1-14
displaying 1-13
ordering information within 1-14
overview 1-3
restoring archived file 1-29
saving offline 1-8
using 1-7
statistics
clearing RMON 6-31
DoS 5-22
RMON 6-2, 6-27
viewing an Ethernet port 6-27
subnet mask
configuring using Offline Diagnostic Monitor menu B-16
prefix notation, configuring for user 3-7
subsystem
disabling logging 4-7
enabling for logging 4-7
log messages 4-2
log messages, defining 4-10
sys.log 1-3, 4-2, 4-3, 4-14, 4-18
sys.log.prev 4-4
syslogd, logging to 4-3, 4-4
system configuration information script 8-43
system resources, showing 1-44
T
terminal parameters
terminal idle, configuring 3-5
terminal length, configuring 3-6
terminal more, configuring 3-6
terminal netmask format, configuring 3-7
terminal timeout, configuring 3-7
user-specific, configuring 3-5
text editor
running-config, creating 1-14
startup-config, creating 1-14
TFTP server
copying core dumps to 1-33
copying log files to 4-23
copying log files to server 4-24
threshold
falling RMON alarm 6-19
rising RMON alarm 6-18
traplog file 6-34
traps
background 5-3
log file 6-34
specifying hosts 5-12
trap host 5-4
traplogs, reading 5-32
U
UDI 1-43
undeliverable log messages, interpreting 4-26
Unique Device Identifier (UDI) 1-43
upgrading software
configuring FTP record A-2
copying new software to CSS A-2
manually A-13
MIBs A-16
procedure A-1
script A-5
user
information, showing 1-48
user profiles
configuring 3-2
copying and saving 3-13
user terminal parameters
configuring 7-1
terminal domain lookup, configuring 3-5
terminal idle, configuring 3-5
terminal length, configuring 3-6
terminal more, configuring 3-6
terminal timeout, configuring 3-7
V
VTY log files 4-3, 4-4
W
warning
level warning 4-3, 4-5, 4-10, 4-11
symbol overview xxviii
X
XML
enabling access to the CSS 5-10
enabling secure access to the CSS 7-6
enabling unsecure access to the CSS 7-5
restricting access to the CSS 5-10, 7-6
restricting secure access to the CSS 7-6
restricting unsecure access to the CSS 7-5
XML code
CLI command conventions 7-3
creating 7-2
mode hierarchy 7-3
parsing 7-6
publishing 7-6
special characters 7-2
testing 7-7
using on the CSS 7-1
XML document example 7-4
Z
zip file
included on Cisco.com A-2
using for network boot 2-17