Exec Mode Commands (D-S)

The Exec Mode is the initial entry point into the command line interface system. Exec mode commands are useful in troubleshooting and basic system monitoring.

Mode

This chapter contains the commands in the Exec Mode from debug to system .

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Important

The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).


debug bfd

Enables or disables the debug options for Bidirectional Forwarding Detection BFD) debugging. If logging is enabled, results are sent to the logging system.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug bfd { all | events ipc-error | ipc-events | nsm | packet | session }  

no

Indicates the IP debugging is to be disabled for the IP interfaces/function specified.

bfd | interface name | route

Specifies which IP interfaces/function to debug.

all : enables debug for all BFD items.

events : enables debug for BFD events.

ipc-error : enables debug for BFD Inter-process communication (IPC) errors.

ipc-events : enables debug for BFD Inter-process communication (IPC) events.

nsm : enables debug for BFD Network Service Manager messages.

packet : enables debug for BFD packets.

session : enables debug for BFD sessions.

Usage Guidelines

The debug bfd command is valuable when troubleshooting network problems with BFD-enabled BGP routers. The debugging is stopped by using the no keyword.


Caution

Issuing this command could negatively impact system performance depending on system configuration and/or loading.


Example

The following commands enable/disable debugging for BFD.
debug bfd  
no debug bfd  

debug ip

Enables or disables the debug options for IP debugging. If logging is enabled, results are sent to the logging system.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip { arp | interface | route }  

no

Indicates the IP debugging is to be disabled for the IP interfaces/function specified.

arp | interface name | route

Specifies which IP interfaces/function to debug.

arp : indicates debug is to be enabled for the address resolution protocol.

interface : indicates debug is to be enabled for the IP interfaces.

route : indicates debug is to be enabled for the route selection and updates.

Usage Guidelines

The debug IP command is valuable when troubleshooting network problems between nodes. The debugging is stopped by using the no keyword.


Caution

Issuing this command could negatively impact system performance depending on system configuration and/or loading.


Example

The following commands enable/disable debugging for ARP.
debug ip arp  
no debug ip arp  
The following enables/disables debugging for IP interfaces.
debug ip interface  
no debug ip interface  
The following enables/disables debugging for routing.
debug ip route  
no debug ip route  

debug ip bgp

Enables or disables BGP (Border Gateway Protocol) debug flags. If logging is enabled, results are sent to the logging system.

Product

HA

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip bgp { all | event | filters | fsm | keepalives | updates { inbound | outbound } }  

no

Disables the specified BGP debug flags.

all

Enables all BGP debug flags.

event

Enables debugging of all BGP protocol events.

filters

Enables debugging of all BGP filters.

fsm

Enables debugging of BGP Finite State Machine

keepalives

Enables debugging of all BGP keepalives.

updates {inbound | outbound}

Enables debugging of BGP updates.

inbound : Debug all BGP inbound updates.

outbound : Debug all BGP outbound updates.

Usage Guidelines

Use this command to enable or disable BGP debug flags.

Example

The following command disables all BGP debug flags enabled by any of the debug ip bgp commands:
no debug ip bgp all  
The following command enables all BGP debug flags:
debug ip bgp all  

debug ip ospf all

Enables or disables all OSPF (Open Shortest Path First) debug flags. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf all  

no

Disable all OSPF debug flags.

Usage Guidelines

Use this command to enable or disable all OSPF debug flags.

Example

The following command disables all OPSF debug flags enabled by any of the debug ip ospf commands:
no debug ip ospf all  
The following command enables all OSPF debug flags:
debug ip ospf all  

debug ip ospf event

Enables or disables debugging of OSPF protocol events. If logging is enabled, results are sent to the logging system. If no keywords are specified, all events are enabled for debugging.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf event [ abr | asbr | vl | lsa | os | router ]  

no

Disables debugging the specified OSPF event. If no keywords are specified, all events are disabled.

abr

Enables debugging of Area Border Router (ABR) events.

asbr

Enables debugging of Autonomous System Boundary Router (ASBR) events.

vl

Enables debugging of Virtual Link (VL) events.

lsa

Enables debugging of link state advertisement (LSA) events.

os

Enables debugging of operating system (OS) events.

router

Enables debugging of router events.

Usage Guidelines

Use this command to output debug information for OSPF events.

Example

To enable all event debug information, enter the following command;
debug ip ospf event  
To disable all event debug information, enter the following command;
no debug ip ospf event  

debug ip ospf ism

Enables or disables OSPF Interface State Machine (ISM) troubleshooting, based on ISM information type. If no keywords are specified all ISM information types are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf ism [ events | status | timers ]  

no

Disables debugging the specified ISM information. If no keywords are specified, all information is disabled.

events

Enables debugging ISM event information.

status

Enables debugging ISM status information.

timers

Enables debugging ISM timer information.

Usage Guidelines

Use this command to output ISM debug information.

Example

To enable all ISM debug information, enter the following command;
debug ip ospf ism  
To disable all ISM debug information, enter the following command;
no debug ip ospf ism  

debug ip ospf lsa

Enables or disables troubleshooting on OSPF Link State Advertisements (LSAs), based on the specific LSA option. If no keywords are specified, all options are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf lsa [ flooding | generate | install | refresh | maxage | refresh ]  

no

Disables the specified LSA debug information. If no keyword is specified, all LSA debug information is disabled.

flooding

Enables LSA flooding information.

generate

Enables LSA generation information.

install

Enables LSA install information.

maxage

Enables LSA maximum age information in seconds. The maximum age is 3600 seconds.

refresh

Enables LSA refresh information.

Usage Guidelines

Use this command to output debug information for LSAs.

Example

To enable all LSA debug information, enter the following command;
debug ip ospf lsa  
To disable all LSA debug information, enter the following command;
no debug ip ospf lsa  

debug ip ospf nsm

Enables or disables troubleshooting OSPF Neighbor State Machines (NSMs), based on the specific NSM information type. If no keyword is specified, all NSM information types are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf nsm [ status | events | timers ]  

no

Disables the debugging the specified NSM information type. If no keyword is specified, all information types are disabled.

events

Enables debugging NSM event information.

status

Enables debugging NSM status information.

timers

Enables debugging NSM timer information.

Usage Guidelines

Use this command to output debug information for OSPF NSMs

Example

To enable all NSM debug information, enter the following command;
debug ip ospf nsm  
To disable all NSM debug information, enter the following command;
no debug ip ospf nsm  

debug ip ospf packet

Enables or disables troubleshooting of specific OSPF packet information. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf packet { all | dd | hello | ls-ack | ls-request | ls-update } [ send | recv ] [ detail ]  

no

Disable debugging of the specified packet information.

all

Enables debugging all OSPF packet information.

dd

Enables debugging database descriptions.

hello

Enables debugging hello packets.

ls-ack

Enables debugging link state acknowledgements.

ls-request

Enables debugging link state requests.

ls-update

Enables debugging link state updates.

send

Enables debugging only on sent packets.

recv

Enables debugging only on received packets.

detail

Enables detailed information in the debug output.

Usage Guidelines

Use this command to output specific OSPF packet information.

Example

To enable all packet debug information, enter the following command;
debug ip ospf packet all  
To disable all route debug information, enter the following command;
no debug ip ospf packet all  

debug ip ospf route

Sets the route calculation method to use in debugging OSPF routes. If no route calculation method is specified, all methods are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf route [ ase | ia | install | spf ]  

no

Disables debugging of route information. If no keyword is specified all information types are disabled.

ase

Enables debugging information on autonomous system external (ASE) route calculations.

ia

Enables debugging information on Inter-Area route calculations.

install

Enables debugging information on route installation.

spf

Enables debugging information on Shortest Path First (SPF) route calculations.

Usage Guidelines

Use this command to output debug information for OSPF routes.

Example

To enable all route debug information, enter the following command;
debug ip ospf route  
To disable all route debug information, enter the following command;
no debug ip ospf route  

debug ip ospf router

Sets the debug option for OSPF router information. If no keyword is specified, all router information is enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf router [ interface | redistribute ]  

no

Disables the specified router debug information. If no keyword is specified, all router information is disabled.

interface

Enables router interface information.

redistribute

Enables router redistribute information.

Usage Guidelines

Use this command to output debug information for the OSPF router.

Example

To enable all router debug information, enter the following command;
debug ip ospf router  
To disable all router debug information, enter the following command;
no debug ip ospf router  

debug ipv6 ospf all

Enables or disables all OSPFv3 (Open Shortest Path First Version 3) debug flags. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ipv6 ospf all  

no

Disable all OSPFv3 debug flags.

Usage Guidelines

Use this command to enable or disable all OSPFv3 debug flags.

Example

The following command disables all OPSFv3 debug flags enabled by any of the debug ip ospf commands:
no debug ipv6 ospf all  
The following command enables all OSPFv3 debug flags:
debug ipv6 ospf all  

debug ipv6 ospf event

Enables or disables debugging of OSPFv3 protocol events. If logging is enabled, results are sent to the logging system. If no keywords are specified, all events are enabled for debugging.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ipv6 ospf event [ abr | asbr | os | router ]  

no

Disables debugging the specified OSPFv3 event. If no keywords are specified, all events are disabled.

abr

Enables debugging of Area Border Router (ABR) events.

asbr

Enables debugging of Autonomous System BOundary Router (ASBR) events.

os

Enables debugging of operating system (OS) events.

router

Enables debugging of router events.

Usage Guidelines

Use this command to output debug information for OSPFv3 events.

Example

To enable all event debug information, enter the following command;
debug ipv6 ospf event  
To disable all event debug information, enter the following command;
no debug ipv6 ospf event  

debug ipv6 ospf ifsm

Enables or disables OSPFv3 Interface State Machine (ISM) troubleshooting, based on ISM information type. If no keywords are specified all ISM information types are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ipv6 ospf ism [ events | status | timers ]  

no

Disables debugging the specified ISM information. If no keywords are specified, all information is disabled.

events

Enables debugging ISM event information.

status

Enables debugging ISM status information.

timers

Enables debugging ISM timer information.

Usage Guidelines

Use this command to output ISM debug information.

Example

To enable all ISM debug information, enter the following command;
debug ipv6 ospf ism  
To disable all ISM debug information, enter the following command;
no debug ipv6 ospf ism  

debug ipv6 ospf lsa

Enables or disables troubleshooting on OSPFv3 Link State Advertisements (LSAs), based on the specific LSA option. If no keywords are specified, all options are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ip ospf lsa [ flooding | generate | install | maxage | refresh ]  

no

Disables the specified LSA debug information. If no keyword is specified, all LSA debug information is disabled.

flooding

Enables LSA flooding information.

generate

Enables LSA generation information.

install

Enables LSA install information.

maxage

Enables LSA maximum age information in seconds. The maximum age is 3600 seconds.

refresh

Enables LSA refresh information.

Usage Guidelines

Use this command to output debug information for LSAs.

Example

To enable all LSA debug information, enter the following command;
debug ipv6 ospf lsa  
To disable all LSA debug information, enter the following command;
no debug ipv6 ospf lsa  

debug ipv6 ospf nsm

Enables or disables troubleshooting OSPFv3 Neighbor State Machines (NSMs), based on the specific NSM information type. If no keyword is specified, all NSM information types are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ipv6 ospf nsm [ interface | redistribute ]  

no

Disables the debugging the specified NSM information type. If no keyword is specified, all information types are disabled.

interface

Enables debugging NSM on this interface.

redistribute

Enables debugging NSM redistribution information.

Usage Guidelines

Use this command to output debug information for OSPFv3 NSMs

Example

To enable all NSM debug information, enter the following command;
debug ipv6 ospf nsm  
To disable all NSM debug information, enter the following command;
no debug ipv6 ospf nsm  

debug ipv6 ospf packet

Enables or disables troubleshooting of specific OSPFv3 packet information. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ipv6 ospf packet { dd | hello | ls-ack | ls-request | ls-update } [ recv | send ] [ detail ]  

no

Disable debugging of the specified packet information.

dd

Enables debugging database descriptions.

hello

Enables debugging hello packets.

ls-ack

Enables debugging link state acknowledgements.

ls-request

Enables debugging link state requests.

ls-update

Enables debugging link state updates.

recv

Enables debugging only on received packets.

send

Enables debugging only on sent packets.

detail

Enables detailed information in the debug output.

Usage Guidelines

Use this command to output specific OSPFv3 packet information.

Example

To enable all packet debug information, enter the following command;
debug ipv6 ospf packet all  
To disable all route debug information, enter the following command;
no debug ipv6 ospf packet all  

debug ipv6 ospf route

Sets the route calculation method to use in debugging OSPFv3 routes. If no route calculation method is specified, all methods are enabled. If logging is enabled, results are sent to the logging system.

Product

PDSN

HA

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] debug ipv6 ospf route [ ase | ia | install | spf ]  

no

Disables debugging of route information. If no keyword is specified all information types are disabled.

ase

Enables debugging information on autonomous system external (ASE) route calculations.

ia

Enables debugging information on Inter-Area route calculations.

install

Enables debugging information on route installation.

spf

Enables debugging information on Shortest Path First (SPF) route calculations.

Usage Guidelines

Use this command to output debug information for OSPF routes.

Example

To enable all route debug information, enter the following command;
debug ipv6 ospf route  
To disable all route debug information, enter the following command;
no debug ipv6 ospf route  

default terminal

Restores the system default value for the terminal options.

Product

All

Privilege

Security Administrator, Administrator, Operator, Inspector

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

default terminal { length | width }  

length | width

length : Resets the terminal length to the system default.

width : Resets the system default terminal width.

Usage Guidelines

Restore the default terminal settings when the current paging and display wraps inappropriately or pages to soon.

Example

The following sets the default length then width in two commands.
default terminal length  
default terminal width  

delete

Removes the specified file(s) permanently from the local.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

delete  filepath [ -noconfirm ]  

filepath

Specifies the location of the file to rename. The path must be formatted as follows:

For the ASR 5000:
[ file: ]{ /flash | /pcmcia1 | /hd-raid }[ / directory ]/ file_name 

Important

Use of the ASR 5000 SMC hard drive is not supported in this release.


For the ASR 5500:
[ file: ]{ /flash | /usb1 | /hd-raid }[ / directory ]/ file_name 
For VPC:
[ file: ]{ /flash | /hd-raid / usb1 | usb2 | /cdrom1 }[ / directory ]/ file_name 

Important

The USB ports and CD-ROM must be configured via the hypervisor to be accessible.



Important

Do not use the following characters when entering a string for the field names below: "/" (forward slash), ":" (colon) or "@" (at sign).


directory is the directory name

filename is the actual file of interest

-noconfirm

Executes the command without any additional prompt and confirmation from the user.


Important

Use of the -noconfirm option should be done with extra care to ensure the file is specified accurately as there is no method of recovering a file that has been deleted.


Usage Guidelines

Deleting files is a maintenance activity which may be part of periodic routine procedures to reduce system space utilization.

Example

The following removes files from the local /flash/pub directory.
delete /flash/pub/june03.cfg  

delete support record

Removes a Support Data Record (SDR) with s specified record-id or all SDRs in the specified range of record-ids.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

delete support record  <record-id> [ to  <record-id> ]  

record-id

Specifies a single SDR as an integer from 0 to 65536.

Each SDR is identified by a time index called the record-id. For example, the most recent record is always record-id 0 (filename = sdr.0.gz). The next older record is record-id 1 (filename = sdr.1.gz), and so on.

to record-id

Specifies the endpoint record-id when deleting a range of SDRs.

Usage Guidelines

Use this command to delete one or more SDRs stored on the system. For additional information on the Support Data Collector feature, refer to the System Administration Guide.

Example

The following command deletes the SDR with a record-id of 5 (filename = sdr.5.gz):
delete support record 5  

dhcp force

Tests the lease-renewal for DHCP-assigned IP addresses for a particular subscriber.

Product

GGSN

ASN-GW

P-GW

SAEGW

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

dhcp force lease-renewal { callid  id | imsi  imsi [ nsapi  nsapi  ] | msid  msid }  

callid id

Clears the call ID specified as a 4-byte hexadecimal number.

imsi msid

Disconnects the subscriber with the specified msid. The IMSI (International Mobile Subscriber Identity) ID is a 50-bit field which identifies the subscriber's home country and carrier. Wildcard characters $ and * are allowed. The * wildcard matches multiple characters and the $ wildcard matches a single character. If you do not want the wildcard characters interpreted as a wildcard enclose them in single quotes ( ' ). For example; '$'.

nsapi nsapi

Specifies a Network Service Access Point Identifier (NSAPI) an integer from 5 to 15.

msid id

Disconnects the mobile user identified by ms_id . ms_id must be from 7 to 16 digits specified as an IMSI, MIN, or RMI. Wildcard characters $ and * are allowed. The * wildcard matches multiple characters and the $ wildcard matches a single character. If you do not want the wildcard characters interpreted as a wildcard enclose them in single quotes ( ' ). For example; '$'.

Usage Guidelines

Use this command tests a forced IP address lease renewal for a specific subscriber.

Example

The following command tests DHCP lease renewal for a subscriber with an MSID of 1234567 :
dhcp force lease-renewal msid 1234567  

dhcp test

Tests DHCP (Dynamic Host Configuration Protocol) functions for a particular DHCP service.

Product

GGSN

ASN-GW

P-GW

SAEGW

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

dhcp test dhcp-service  svc_name [ all  | server  ip_address ]  

dhcp-service svc_name

Specifies the name of the DHCP service as an alphanumeric string of 1 through 63 characters that is case sensitive.

all

Tests DHCP functionality for all servers.

server ip_address

Tests DHCP functionality for the server specified by an IP address entered using IPv4 dotted-decimal notation.

Usage Guidelines

Once DHCP functionality is configured on the system, this command can be used to verify that it is configured properly and that it can successfully communicate with the DHCP server.

Executing this command causes the system to request and allocate an IP address and then release it.

If a specific DHCP server is not specified, then each server configured in the service is tested.

Example

The following command tests the systems ability to get an IP address from all servers a DHCP service called DHCP-Gi is configured to communicate with:
dhcp test dhcp-service DHCP-Gi all  

diameter disable endpoint

Disables a Diameter endpoint without removing the peer's configuration.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

diameter disable endpoint  endpoint_name peer  peer_id 

endpoint_name

Specifies the endpoint in which the peer is configured as an alphanumeric string of 1 through 63 characters.

peer peer_id

Specifies the Diameter peer host name to be disabled as an alphanumeric string of 1 through 63 characters.

Usage Guidelines

Use this command to administratively disable a Diameter peer without removing the peer configuration. This command will tear down all connections on the specified peer (by sending a DPR if the configuration demands the same at peer level configuration). The peer will remain in disabled state until it is enabled again. Also see the diameter enable endpoint command.

Example

This command disables the Diameter peer peer12 :
diameter disable endpoint endpoint1 peer peer12  

diameter enable endpoint

Enables a Diameter endpoint that is disabled.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

diameter enable endpoint  endpoint_name peer  peer_id 

endpoint_name

Specifies the endpoint in which the peer is configured as an alphanumeric string of 1 through 63 characters.

peer peer_id

Specifies the Diameter peer host name to be enabled as an alphanumeric string of 1 through 63 characters.

Usage Guidelines

Use this command to administratively enable a Diameter peer. Also see the diameter disable endpoint command.

Example

This command enables the Diameter peer peer12 :
diameter enable endpoint endpoint1 peer peer12  

diameter-proxy conn-audit

This command enables the Diameter proxy Peer Connection Status Audit with Diabase clients.

Product

P-GW

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

diameter-proxy conn-audit interval  1-10
default diameter-proxy conn-audit  

default

Configures the default setting.

By default, Diameter proxy Peer Connection Status Audit with Diabase clients is disabled.

diameter-proxy

Specifies the Diameter proxy related configurations.

conn-audit

Specifies the periodic connection status audit processes. Disabled by default.

interval 1-10

Specifies the connection status audit interval in minutes, in the range of 1 through 10. Recommended value is 2 minutes.

Usage Guidelines

Enabling Diamproxy Peer Connection Status Audit with Diabase clients might affect performance of the services using Diameter interface. Service is impacted only when auto-correction happens (due to mismatch) and the cases are:
  1. When Diabase state is IDLE and Diameter proxy is OPEN.

  2. When Diabase state is OPEN and Diameter proxy is IDLE.

In both these cases, Diabase corrects the connection status based on information received in audit message. Diameter messaging failures is avoided once Diabase corrects the connection status.

Example

The following command specifies that the connection status audit interval is 2 minutes:
diameter-proxy conn-audit interval 2  

diameter reset connection

Resets individual TCP/SCTP connections for a specified Diameter endpoint.

Product

All

Privilege

Security Administrator, Administrator, Operator, Inspector

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

diameter reset connection { endpoint  endpoint_name peer  peer_id }  

endpoint endpoint_name

Resets connection to the endpoint specified as an alphanumeric string of 1 through 63 characters.

peer peer_id

Resets connection to the Diameter peer host name specified as an alphanumeric string of 1 through 63 characters.

Usage Guidelines

Use this command to reset the TCP/SCTP connections for the specified endpoint/peer. With this command, the connection will be closed temporarily after DPR/DPA. If there is any traffic to be sent to the particular peer, then the connection will be re-established.

This command overrides the endpoint configured in any other configuration mode.

This command is applicable only when the specified peer is enabled.

Example

This command resets connection to the endpoint named test123 :
diameter reset connection endpoint test123  

diameter reset route failure

Resets the failed route status of a Diameter destination-host combination via peer to AVAILABLE status.

Product

All

Privilege

Security Administrator, Administrator, Operator, Inspector

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

diameter reset route failure [ endpoint  endpoint_name ] [ host  host_name ] [ peer  peer_id ]  

endpoint endpoint_name

Resets paths to the endpoint specified as an alphanumeric string of 1 through 63 characters.

host host_name

Resets the FAILED status of all Diameter destination-host combination routes via peer for every Diameter client within the chassis having a specific host name to AVAILABLE.

Specifies the Diameter host name as an alphanumeric string of 1 through 63 characters.

peer peer_id

Resets the FAILED status of all Diameter destination-host combination routes via a peer having specific peer-Id for every Diameter client within the chassis to AVAILABLE.

Specifies the Diameter peer host name as an alphanumeric string of 1 through 63 characters.

Usage Guidelines

Use this command to reset the FAILED status of all Diameter destination-host combination routes via peer for every Diameter client within the chassis to AVAILABLE status.

This command also resets the failure counts used to determine the AVAILABLE/FAILED status of a destination-host combination.

When executed from local context, this command matches all contexts. If an optional keyword is not supplied, a wildcard is used for the value.

The status of every matching combination of destination-host via peer for every matching Diameter client within the chassis will be reset to AVAILABLE. The failure counts that are used to determine AVAILABLE/FAILED status will also be reset.

Also see the route-entry and route-failure commands in the Diameter Endpoint Configuration Mode Commands chapter.

Default value: N/A

Example

The following command resets the FAILED status of all Diameter destination-host combination routes via peer for every Diameter client within the chassis for specified endpoint name to AVAILABLE.
diameter reset route failure endpoint endpoint123  

directory

Lists the files in a specified location.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

directory  filepath [ -size ] [ -reverse ] [ -time ]  

filepath

Specifies the directory path to list the contained files using the following format:

For the ASR 5000:
[ file: ]{ /flash | /pcmcia1 | /hd }[ / directory ]/ file_name 

Important

Use of the ASR 5000 SMC hard drive is not supported in this release.


For the ASR 5500:
[ file: ]{ /flash | /usb1 | /hd }[ / directory ]/ file_name 
For VPC:
[ file: ]{ /flash | /hd-raid | /usb1 | /usb2 | cdrom1 }[ / directory ]/ file_name 

Important

The USB ports and CD-ROM must be configured via the hypervisor to be accessible.



Important

Do not use the following characters when entering a string for the field names below: "/" (forward slash), ":" (colon) or "@" (at sign).


directory is the directory name

filename is the actual file of interest

-size

Indicates the size of each file should be displayed in the output.

-reverse

Indicates the order of files listed should be in descending order (z-aZ-A9-0). Default is to sort in ascending order (0-9A-Za-z).

-time

Indicates the last modification timestamp of each file should be displayed in the output.

Usage Guidelines

Lists such things as log and crash files from multiple nodes within the network.

The optional arguments may be specified individually or in any combination.

Example

The following command will list the files in the local /flash/pub directory sorted in reverse order.
directory /flash/pub -reverse  

disable radius

Prevents the system from making requests of a selected RADIUS server.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

disable radius { [ charging ] [ accounting ] server  ipv4/ipv6_address [ group  group_name | port  port_number + ] }  

[ charging ] [ accounting ]

Specifies the type of RADIUS server to disable.

  • accounting : Specifies accounting servers

  • charging : Specifies charging servers

  • charging accounting : Specifies charging accounting servers

server ipv4/ipv6_address

Specifies the RADIUS server by IP address entered using IPv4 dotted-decimal or IPv6 colon-separated-hexadecimal notation.

port port_number

Specifies the port number of the RADIUS server being disabled an integer from 0 through 65535. Default: 1812 (authentication) 1813 (accounting)

group group_name

Specifies the RADIUS group to which the server belongs as an alphanumeric string of 1 through 63 characters. Use this option in the event that the RADIUS server belongs to multiple groups and you only want to disable the server within the specific group. Default: default

Usage Guidelines

Use this command to gracefully stop the system from making requests of a specific RADIUS server.

Example

The following command disables a RADIUS accounting server with an IP address of 10.2.3.4 , the default accounting server port number, and that resides in the Group5 server group:
disable radius accounting server 10.2.3.4 group Group5  

dns-client

Performs DNS (Domain Name System) query on the basis of specified DNS client name, DNS query domain name, and type of query criteria.

Product

All

Privilege

Security Administrator, Administrator, Operator, Inspector

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

dns-client  dns_client_name [ query-type { A | AAAA | NAPTR | SRV } ] query-name  query_domain_name 

dns-client dns_client_name

Specifies the name of the DNS client whose cache and/or statistics are to be queried. It must be an existing DNS client expressed as an alphanumeric string of 1 through 64 characters.

query-type { A | NAPTR | SRV } ]

Specifies that the type of query to perform for the defined DNS client is to be displayed.
  • A : Filters DNS results based on domain IPv4 address records (A records). This is the default query type.

  • AAAA : Filters DNS results based on domain IPv6 address records (AAAA records).

  • NAPTR : Filters DNS results based on Naming Authority Pointer records (NAPTR).

  • SRV : Filters DNS results based on service host records (SRV records).

query-name query_domain_name

Filters the DNS results based on the query domain name expressed as an alphanumeric string of 1 trough 255 characters.

query_domain_name is the domain name used to perform the DNS query and is different from the actual domain name which is resolved. For example, to resolve the SIP server for service.com , the query name is _sip._udp.service.com and the query type is SRV .

Usage Guidelines

Use this command to perform DNS query on the basis of DNS Client name and filters the query results based on query type and query name. This command also populates the result into DNS Cache. This command used the current context to DNS request.

Example

The following command displays statistics for a DNS client named test_dns with query type for IP address as A and query name as domain1.com :
dns-client test_dns query-type A query-name domain1.com  

egtpc test echo

Tests the ability of a GGSN/P-GW service to exchange GTP-C echo request messages with specified peer(s).

Product

GGSN

P-GW

SAEGW

Privilege

Operator, Config-Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

egtpc test echo gtp-version  version src-address  ip_address { all | peer-address  ip_address }  

gtp-version version

Specifies version number for sending Echo request message.

version must be an integer from 0 through 2.


Important

If peer is not a new peer for service bind to src-address , then echo request is sent with the last known highest version of the peer.


src-address ip_address

Specifies the IP address of a Gn interface configured on the system.

ip_address must be entered using IPv4 dotted-decimal notation or IPV6 colon-separated-hexadecimal notation.


Important

The IP address of the system's Gn interface must be bound to a configured GGSN/P-GW service prior to executing this command.


all

Sends GTP-C echo requests to first 100 peers that currently have sessions with the GGSN/P-GW service.


Important

If this keyword is selected, additional confirmation is required after the following message, "Warning: Due to possibility of huge number of connected peers, considering system performance impacts, issue echo request to only 100 peers".


peer-address ip_address

Specifies that GTP-C echo requests will be sent to a specific peer.

ip_address must be entered using IPv4 dotted-decimal notation or IPV6 colon-separated-hexadecimal notation.

Usage Guidelines

This command tests the GGSN's or P-GW's ability to exchange GPRS Tunneling Protocol control plane (GTP-C) packets with the specified peer. This command is useful for troubleshooting and/or monitoring.

This command must be executed from within the context in which the GGSN/P-GW service is configured.


Important

In StarOS v14.0 and later, this command replaces the gtpv0 test echo and gtpc test echo commands.


Example

The following command issues GTP-C echo packets from a GGSN service bound to address 192.168.157.43 to an SGSN with an address of 192.168.1.52 :
egtpc test echo gtp-version 1 src-address 192.168.157.43 peer-address 192.168.1.52  

enable radius

Enables the system to start making requests of a specific RADIUS server.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

enable radius { [ charging ] [ accounting ] server  ipv4/ipv6_address [ group  group_name | port  port_number + ] }  

[ charging ] [ accounting ]

Specifies the type of RADIUS server to enable.

  • accounting : Specifies accounting servers

  • charging : Specifies charging servers

  • charging accounting : Specifies charging accounting servers

server ipv4/ipv6_address

Specifies the RADIUS server by an IP address entered using IPv4 dotted-decimal or IPv6 colon-separated-hexadecimal notation.

port port_number

Specifies the port number of the RADIUS server being enabled as an integer from 0 through 65535. Default: 1812 (authentication) 1813 (accounting)

group group_name

Specifies the RADIUS group to which the server belongs as an alphanumeric string of 1 through 63 characters. Use this option in the event that the RADIUS server belongs to multiple groups and you only want to disable the server within the specific group. Default: default

Usage Guidelines

Use this command to allow the system to start making requests of a specific RADIUS server.

Example

The following command enables a RADIUS accounting server with the IP address 10.2.3.4 , the default accounting server port number, and in the Group5 server group:
enable radius accounting server 10.2.3.4 group Group5  

exit

Terminates the current CLI session.

Product

All

Privilege

Any

Syntax

exit  

Usage Guidelines

Use this command to terminate the current CLI session.

filesystem

Use this command to check, format or repair the filesystem on internal and external storage devices.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

For the ASR 5000:

filesystem { check | format | repair | synchronize }  { /flash | /pcmcia1 | /hd-raid }  [ card  slot_num ]  

For the ASR 5500:

filesystem { check | format | repair | synchronize } { /flash | /usb1 | /hd-raid } [ card  slot_num ]  

For VPC:

filesystem { check | format | repair | synchronize | update } { /flash | /hd-raid | /usb1 | /usb2 | cdrom1 }   
The following devices are supported based on platform type:
  • /flash – ASR 5x00, VPC
  • /hd-raid – ASR 5x00, VPC
  • /pcmcia1 – ASR 5000 only
  • /usb1 – ASR 5500, VPC (if configured via hypervisor)
  • /usb2 – VPC (if configured via hypervisor)
  • /cdrom1 – VPC (if configured via hypervisor)

Important

For VPC, the USB ports and CD-ROM must be configured via the hypervisor to be accessible by the Control Function (CF) virtual machine.


check

Checks for filesystem corruption.

format

Reformats file system.


Caution

This keyword erases all data on the device.


Formatting /flash will remove all boot configurations and the ASR 5x00 chassis-ID. Before running format, be sure to review or save the output of the show boot command. After running format, be sure to restore boot entries as needed, generate a new chassis-ID, and execute save configuration to save the running configuration.

repair

Repairs file system corruption.

synchronize

See the description of the filesystem synchronize command for detailed information. Not supported on VPC-SI.

update

Updates the boot code on the file system. Supported on VPC-SI only.

Usage Guidelines

Check, format, or repair all directories and files from on an internal or external storage device and re-establish the file system.

Example

The following command formats the PCMCIA card located in slot 1 on the SMC (ASR 5000):
filesystem format /pcmcia1  

filesystem synchronize

Use this command to synchronize the file systems of active and standby storage devices on MIO card or VPC-DI Control Function (CF) virtual machines.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

For the ASR 5500:

filesystem synchronize [ /flash | /usb1 | all ]  [ checkonly ] [ from  card_num | to  card_num ] [-noconfirm]  

For VPC:

filesystem synchronize [ /flash | /usb1 | /usb2 | cdrom1 | all ]  [ checkonly ] [ from  card_num | to  card_num ] [-noconfirm]  

The following devices are supported based on platform type:

  • /flash – ASR 5x00, VPC
  • /hd-raid – ASR 5x00, VPC
  • /usb1 – ASR 5500, VPC (if configured via hypervisor)
  • /usb2 – VPC (if configured via hypervisor)
  • /cdrom1 – VPC (if configured via hypervisor)
  • all – Selects all file systems

checkonly

Checks for file system corruption; does not modify file systems.

[ from card_num | to card_num ]

Copies files from a source card to a destination card specified by slot numbers.

-noconfirm

Executes the command without displaying "are you sure" prompts.

Usage Guidelines

Synchronize the file systems between active and standby storage devices.

Example

The following command all file systems on the management card:
filesystem synchronize al1  
The following command sequence appears when filesystem synchronize /flash is run after save configuration /flash/filename -redundant is executed and a change has been made to the configuration:
filesystem synchronize /flash  
2 to be updated on card 2  
   /flash/oam.cfg  
   /flash/service.cfg  
0 to be updated (but are newer) on card 2  
0 to be deleted on card 2  
Are you sure? [Yes|No]:   

You must confirm the synchronization before it will be initiated.

If "No files to update" appears, you are returned to the CLI prompt.

gtpc test echo

Tests the ability of a GGSN service to exchange GTP-C echo request messages with the specified SGSN(s).

Product

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

gtpc test echo src-address  gn_address { all | sgsn-address  ip_address }  

src-address gn_address

Specifies the IP address of a Gn interface configured on the system in IPv4 dotted-decimal notation.


Important

The IP address of the system's Gn interface must be bound to a configured GGSN service prior to executing this command.


all

Specifies that GTP-C echo requests will be sent to all SGSNs that currently have sessions with the GGSN service.

sgsn-address ip_address

Specifies that GTP-C echo requests will be sent to a SGSN specified by an IP address in IPv4 dotted-decimal notation.

Usage Guidelines

This command tests the GGSN's ability to exchange GPRS Tunneling Protocol control plane (GTP-C) packets with the specified SGSNs. This command is useful for troubleshooting and/or monitoring.

This command must be executed from within the context in which the GGSN service is configured.

Refer also to the gtpu test command.


Important

In StarOS v14.0 and later, this command has been replaced by the egtpc test echo command.


Example

The following command issues GTP-C echo packets from a GGSN service bound to address 192.168.157.32 to an SGSN with an address of 192.168.157.2 :
gtpc test echo src-address 192.168.157.32 sgsn-address 192.168.157.2  

gtpp interim now

Check points current GTPP accounting messages and identifies which types of interim CDRs are to be generated and sent to the external charging/storage servers (for example, a CFG or a GSS). The impact of this command is immediate.

Product

GGSN

SGSN

SGW

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

gtpp interim now [ active-charging egcdr | apn  apn_name | callid  call_id | cdr-types { gcdr | mcdr | scdr } | dhcp-server  ip_address | gprs-service  svc_name | ggsn-address  ggsn_ip_addr | ggsn-service  svc_name | imsi  imsi [ ip-address  sub_address [ username  name ] ] | ip-address sub-address | nsapi  nsapi [ ip-address  sub-address [ username  name ] ]  | ip-pool  pool_name | mcc  mcc_number mnc  mnc_number | msisdn  msisdn_num | sgsn-address  ip_address | sgsn-service  svc_name | username  name ] +  

active-charging

This feature is specific to the GGSN and is documented separately. .

apn apn_name

Initiates GTPP interim accounting for all PDP contexts accessing the APN specified as an alphanumeric string of 1 through 62 characters that is case sensitive.

callid call_id

Identifies a specific call id as an 8-digit hexadecimal number.

cdr-types { mcdr | scdr }

Specifies the CDR types to be generated by the SGSN:

gcdr - Instructs the GGSN to only generate G-CDRs.

mcdr - Instructs the SGSN to only generate M-CDRs

scdr - Instructs the SGSN to only generate S-CDRs.

This keyword is specific to the SGSN.

dhcp-server ip_address

Identifies the DHCP server where the IP address (defined with the ip address keyword) was allocated by the IP address of the DHCP server entered using IPv4 dotted-decimal notation.

ggsn-address ggsn_ip_addr

Specifies the IP address of the interface to the GGSN using IPv4 dotted-decimal notation. This keyword is specific to the GGSN.

ggsn-service svc_name

Initiates GTPP interim accounting for all PDP contexts currently being facilitated by the GGSN service specified as an alphanumeric string of 1 through 63 characters that is case sensitive. This keyword is specific to the GGSN.

gprs-service svc_name

Initiates GTPP interim accounting for all PDP contexts currently being facilitated by an existing GPRS service specified as an alphanumeric string of 1 through 63 characters that is case sensitive. This keyword is specific to the SGSN.

imsi imsi [ ip-address sub_address [ username name ] | nsapi nsapi [ ip-address sub-address [ username name ] | username name ] ]

Initiates GTPP interim accounting for a specific International Mobile Subscriber Identity (IMSI) number. The request could be further filtered using any of the following keywords:
  • ip-address : Interim accounting will be performed for the IP address specified by sub_address . The command can be further filtered by specifying a specific username with that address.

  • nsapi : Interim accounting will be performed for a Network Service Access Point Identifier (NSAPI) specified as an integer from 5 to 15. The command can be further filtered by specifying a specific ip address and/or a username with that address, or just a specific username.

ip-address sub_address [ username name ]

Initiates GTPP interim accounting for the IP address of the subscriber specified in IPv4 dotted-decimal notation.

The command can be further filtered by specifying a username with that address. The name is the subscriber's name and can be a sequence of characters and/or wildcard characters ('$' and '*') from 1 to 127 characters. The * wildcard matches multiple characters and the $ wildcard matches a single character. If you do not want the wildcard characters interpreted as wildcard enclose them in single quotes ( '). For example; '$'.

ip-pool pool_name

Initiates GTPP interim accounting for all PDP contexts that were allocated IP addresses from an existing pool specified as an alphanumeric string of 1 through 31 characters that is case sensitive. This keyword is applicable to the GGSN only.

mcc mcc_number mnc mnc_number

mcc_number : Specifies the mobile country code (MCC) portion of the PLMN identifier and can be configured to any 3-digit integer value between 100 and 999.

mnc_number : Specifies the mobile network code (MNC) portion of the PLMN identifier and can be configured to any 2- or 3-digit integer between 00 and 999.

msisdn msisdn_num

Configures the SGSN to include the Mobile Subscribers Integrated Services Digital Network identifier in generated CDRs (M-CDRs and/or the S-CDRs). This keyword is applicable for SGSN only.

msisdn_number must be followed by a valid MSISDN number, consisting of 1 to 15 digits.

sgsn-address ip_address

Initiates GTPP interim accounting for all PDP contexts currently being facilitated by the SGSN specified by an IP address in IPv4 dotted-decimal notation. This keyword is specific to the GGSN.

sgsn-service svc_name

Initiates GTPP interim accounting for all PDP contexts currently being facilitated by an existing SGSN service specified an alphanumeric string of 1 through 63 characters that is case sensitive. This keyword is specific to the SGSN.

username name

Initiates GTPP interim accounting for all PDP contexts for the subscriber name specified as an alphanumeric string of 1 through 127 characters that is case sensitive.

+

More than one of the above keywords can be entered within a single command.

Usage Guidelines

This command causes GTPP accounting CDRs to immediately be generated for all active sessions that are in the current context. If executed within the local context, CDRs will be generated for all active sessions regardless of context. This command generates only certain types of CDRs including GCDRs, SGWCDRs, and SCDRs.

The sending of the CDRs is paced so as not to overload the accounting server.

Example

The following command causes CDRs to immediately be generated:
gtpp interim now  

gtpp interim now active-charging egcdr

Check points current GTPP accounting messages for active charging immediately.

Product

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

gtpp interim now active-charging egcdr  [ callid  call_id | imsi  imsi | msid  msid  | rulebase  rbase_name | session-id  sess_id | username  name ]  

callid call_id

Initiates GTPP interim accounting for a session for the call ID specified as an 8-digit hexadecimal number.

imsi imsi

Initiates GTPP interim accounting for a International Mobile Subscriber Identity (IMSI) number. specified as a sequence of hexadecimal digits and wildcard characters - $ matches a single character and * matches multiple characters

msid msid

Initiates GTPP interim accounting for a Mobile Station Identifier (MSID) number specified as a sequence of up to 24 digits and wildcard characters - $ matches a single character and * matches multiple characters

rulebase rbase_name

Initiates GTPP interim accounting for sessions that use the named active charging rulebase specified as an alphanumeric string of 1 through 24 characters.

session-id sess_id

Initiates GTPP interim accounting for a current active charging session.

Usage Guidelines

This command causes GTPP accounting eG-CDRs to immediately be generated for active charging sessions that meet the specified criteria.

The sending of the CDRs is paced so as not to overload the accounting server.

username name

Initiates GTPP interim accounting for all PDP contexts for the subscriber name specified as an alphanumeric string of 1 through 127 characters that is case sensitive.

Example

The following command causes eG-CDRs to immediately be generated for active charging sessions using the rulebase named rulbase1:
gtpp interim now active-charging egcdr rulebase rulebase1  

gtpp storage-server commit

Causes the GTPP storage server to archive all buffered packets.

Product

GGSN

P-GW

SAEGW

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

gtpp storage-server commit now [ group name  group_name ]  

group name group_name

Commits Storage Server for an existing group name expressed as an alphanumeric string of 1 through 63 characters.

Usage Guidelines

This command sends a request to the GTPP Storage Server to archive all buffered packets. It also deletes all CDRs that have been acknowledged by the charging gateway function (CGF). The deleted CDRs are saved in a separate file.

Note that this command must be executed from within the context in which the GTPP Storage Server is configured.

Refer to the gtpp storage-server command in the Context Configuration Mode Commands chapter for more information.

gtpp storage-server streaming start

This command enables to start streaming of the copied CDR files from active chassis when the ICSR switchover occurs.

Product


Important

This command is obsolete in release 16.0. In 16.0 and later releases, use the "gtpp push-to-active url " CLI command in global configuration mode to enable the automatic transfer of stranded CDRs to active chassis.


GGSN

P-GW

S-GW

SGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

gtpp storage-server streaming start [ group name  group_name ]  

group name group_name

Specifies the name of a GTPP group configured in the current context as an alphanumeric string of 1 through 63 characters.

Note that, if the group name is not specified, then all the GTPP groups in the current context will be considered. If the group name is specified, then only the group provided in this CLI command will be considered.

Usage Guidelines

This command is used to resynchronize the CDRs left on local HDD with the active GTPP' streaming feed to transfer the CDRs from active chassis to IT mediation device during ICSR switchover.

Note that this CLI command must be executed from within the context in which the GTPP Storage Server is configured.

In the event of ICSR switchover, to transfer the copied CDRs from active chassis to IT mediation device, follows these steps:

  1. Manually copy files from old active chassis to new active chassis.
  2. Issue this CLI command "gtpp storage-server streaming start " to start streaming of the copied files from active chassis.
  3. If the streaming is in progress, then wait till the current file is fully streamed out. After the current file is fully streamed out, then rebuild the file list (to get the copied CDR files) and start streaming based on the timestamp.
  4. If the streaming is not in progress then rebuild the file list (to get the copied CDR files) and start streaming.

gtpp test

Tests communication with configured Charging Gateway Function (CGF) servers or a GTPP Storage-Server.

Product

ePDG

GGSN

P-GW

SAEGW

SGSN

Privilege

Operator, Config-Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

gtpp test { accounting { all | cgf-server  ipv4/ipv6_address [ port  port_num ]  | group name  group_name } | storage-server [ address  ipv4/ipv6_address port  udp-port | group name  group_name ] }  

all

Tests all CGFs configured within the given context.

cgf-server ipv4/ipv6_address [ port port_num ]

Tests a CGF configured within the given context and specified by the IP address of the CGF entered using IPv4 dotted-decimal notation or IPv6 colon-separated-hexadecimal notation.

port port_num : Specifies the port number of CGF server. The port number must be an integer ranging from 1 to 65535.

This optional keyword is introduced to ease the identification of product specific CDRs. This configuration provides the flexibility to send ePDG, SaMOG and P-GW LBO CDRs to the same CGF server on different ports.

When the port is specified, this command displays the status of CGF server with the specified IP address and port. If port is not provided then it will show the status of all CGF servers with the specified IP address.

group name group_name

Tests the storage server for an existing group name specified as an alphanumeric string of 1 through 63 characters.

storage-server [ address ipv4/ipv6_address port udp-port ]

Tests the connectivity and provides round trip time for the echo request sent to the GTPP Storage-Server configured in the requested context. The IP address of the GSS is entered using IPv4 dotted-decimal or IPv6 colon-separated-hexadecimal notation and the UDP port is the one defined for the GTPP Storage Server.

Usage Guidelines

This command is used to verify the configuration of and test the system's ability to communicate with one or all configured GSS/CGFs for monitoring or troubleshooting purposes.

When executed, this command causes the system to send GTPP echo packets to the specified GSS/CGF(s). The command's response will display whether the GSS/CGF is active or unreachable.

Example

The following command tests communication with a CGF server having an IP address of 192.168.1.5 :
gtpp test accounting cgf-server 192.168.1.5  
The following command tests communication with a GSS configured in requested context:
gtpp test storage-server   
The following command verifies the communication with a GSS having an IP address of 192.156.12.10 and port 50000 , without configuring it in a context:
gtpp test storage-server address 192.156.12.10 port 50000  

gtpu test echo

Tests the ability of a GGSN/P-GW/SAEGW/SGSN/S-GW service to exchange GTP-U echo request messages with specified peer(s).

Product

GGSN

P-GW

SAEGW

SGSN

S-GW

Privilege

Operator, Config-Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

StarOS v12.x and earlier:

gtpu test echo src-address  gn_address { all | sgsn-address  ip_address }  

StarOS v14.0 and later:

gtpu test echo gtpu-service  service_name { all | peer-address  ip_address }  [ gtpu-version { 0 | 1 } ]  

src-address gn_address

Specifies the IP address of a Gn interface configured on the system using IPv4 dotted-decimal notation.


Important

The IP address of the system's Gn interface must be bound to a configured GGSN service prior to executing this command.


all

Sends GTP-U echo requests to all SGSNs that currently have sessions with the GGSN service.

sgsn-address ip_address

Sends GTP-U echo requests to an SGSN specified by its IP address in IPv4 dotted-decimal notation.

gtpu-service service_name

Specifies an existing GTP-U service.

service_name is an alphanumeric string of 1 through 63 characters.

all

Sends GTP-U echo requests to first 100 peers that currently have sessions with the GTP-U service.


Important

If this keyword is selected, additional confirmation is required after the following message, "Warning: Due to possibility of huge number of connected peers, considering system performance impacts, issue echo request to only 100 peers".


peer-address ip_address

Specifies that GTP-U echo requests will be sent to a specific peer.

ip_address must be entered using IPv4 dotted-decimal notation or IPV6 colon-separated-hexadecimal notation.

gtpu-version { 0 | 1 }

Optional. Specifies the GTP-U version in which the test echo will be sent. 0 Specifies GTP-U version 0, and 1 specifies GTP-U version 1.

  • If the GTP-U version of the peer is unknown, the GGSN/P-GW/SAEGW/SGSN/S-GW will use the user-configured GTP-U version.
  • If the GTPU version of peer node is already known, the test echo is sent in the known GTP-U version.
  • If the GTP-U version is not configured, and the peer version is unknown, the test echo is sent in GTP-U version 0.

Usage Guidelines

This command tests the GGSN/P-GW/SAEGW/SGSN/S-GW's ability to exchange GPRS Tunneling Protocol user plane (GTP-U) packets with the specified SGSNs/peer(s). This command is useful for troubleshooting and/or monitoring.


Important

This command returns statistics on the number of packets transmitted and received; however, statistics are displayed right after transmitting the "echo" packet, but before receiving the response. Therefore, received statistics are always off by one. For more information, the same command should be run twice.

For example:

[ingress]asr5000# gtpu test echo gtpu-service sgw_ingress_gtpu peer-address 192.45.1.6 gtpu-version 1
GTPU test echo 
-------------- 
PEER: 192.45.1.6 Tx/Rx: 1/0 RTT(ms): 0 Recovery 

[ingress]asr5000# 
[ingress]asr5000# gtpu test echo gtpu-service sgw_ingress_gtpu peer-address 192.45.1.6 gtpu-version 1
GTPU test echo 
-------------- 
PEER: 192.45.1.6 Tx/Rx: 2/1 RTT(ms): 4285432 (COMPLETE) 

Refer also to the gtpc test command.

Example

The following command issues GTP-U echo packets from a GGSN service bound to address 192.168.157.43 to an SGSN with an address of 192.168.1.52 :
gtpu test echo src-address 192.168.157.43 sgsn-address 192.168.1.52  
The following command issues GTP-U echo packets from a GTP-U service named gtpu_1 to the first 100 connected peers:
gtpu test echo gtpu-service gtpu_1 all  

gtpv0 test echo

Tests the ability of a GGSN service to exchange GTPv0 echo request messages with the specified SGSN(s).

Product

GGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

gtpv0 test echo src-address  gn_address { all | sgsn-address  ip_address }  

src-address gn_address

Specifies the IP address of a Gn interface configured on the system using IPv4 dotted-decimal notation.


Important

The IP address of the system's Gn interface must be bound to a configured GGSN service prior to executing this command.


all

Sends GTPv0 echo requests to all SGSNs that currently have sessions with the GGSN service.

sgsn-address ip_address

Sends GTPv0 echo requests to an SGSN specified by its IP address in IPv4 dotted-decimal notation.

Usage Guidelines

This command tests the GGSN's ability to exchange GPRS Tunneling Protocol version 0 (GTPv0) packets with the specified SGSNs which can be useful troubleshooting and/or monitoring.

This command must be executed from within the context in which the GGSN service is configured.

Refer also to the gtpc test and gtpu test commands.


Important

In StarOS v14.0 and later, this command has been replaced by the egtpc test echo command.


Example

The following command issues GTPv0 echo packets from a GGSN service bound to address 192.168.1.33 to an SGSN with an address of 192.168.1.42 :
gtpv0 test echo src-address 192.168.1.33 sgsn-address 192.168.1.42  

hd raid

Performs RAID management operations on the platform's hard disk drives.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

For the ASR 5000:
hd raid { check | create { local1 | remote1 } | insert { local1 | remote1 } | overwrite { local1 | remote1 } | directory  pathname | limit  number_files | mtime  minutes } | remove { local1 | remote1 } | select { local1 | remote1 } }   [ -force ] [ -noconfirm ]  
For the ASR 5500:
hd raid { check | create { hd13 | hd14 | hd15 | hd16 | hd17 | hd18 } | insert { hd13 | hd14 | hd15 | hd16 | hd17 | hd18} | overwrite { hd13 | hd14 | hd15 | hd16 | hd17 | hd18 } | quarantine { directory  pathname | limit  number_file | mtime  minutes } | remove { hd13 | hd14 | hd15 | hd16 | hd17 | hd18 } }   [ -force ] [ -noconfirm ]  
For VPC:
hd raid { check | create | insert | overwrite | quarantine { directory  pathname | limit  number_files | mtime  minutes } | remove | select }  { local1 | local2 }  [ -force ] [ -noconfirm ]  

check

Starts a background check on RAID disks unless the RAID is running in degraded mode.

create { local1 | remote1 }

On the ASR 5000, creates a new RAID that could run in degraded mode on the specified drive:

  • local1 specifies the RAID is to be established on the primary SMC.

  • remote1 specifies the RAID is to be established on the backup SMC.

create hd_num

On the ASR 5500, creates a new RAID that could run in degraded mode on the hard drive array of a specific FSC.

hd_num specifies the RAID is to be established. hd_num corresponds to the FSC in slot numbers as shown below:

  • hd13 = disk in slot 13

  • hd14 = disk in slot 14

  • hd15 = disk in slot 15

  • hd16 = disk in slot 16

  • hd17 = disk in slot 17

  • hd18 = disk in slot 18

create { local1 | local2 }

On VPC, creates a new virtual RAID as vHD Local1 or vHD Local2.

insert { local1 | remote1 }

On the ASR 5000, inserts the specified disk to the running RAID causing it to recover from degraded mode.

  • local1 specifies the primary SMC is to be inserted into the RAID.

  • remote1 specifies the backup SMC is to be inserted into the RAID.

insert hd_num

On the ASR 5500, inserts the specified FSC disk array into the running RAID causing it to recover from degraded mode.

hd_num specifies the RAID is to be established. hd_num corresponds to the FSC in slot numbers as shown below:

  • hd13 = disk in slot 13

  • hd14 = disk in slot 14

  • hd15 = disk in slot 15

  • hd16 = disk in slot 16

  • hd17 = disk in slot 17

  • hd18 = disk in slot 18

insert { local1 | local2 }

On VPC, inserts the specified vHD into the running RAID causing it to recover from degraded mode.

overwrite { local1 | remote1 }

On the ASR 5000, overwrites the specified disk and adds it to the current running RAID to construct a fully mirrored array.

  • local1 specifies the primary SMC is to be inserted into the RAID.

  • remote1 specifies the backup SMC is to be inserted into the RAID.

overwrite hd_num

On the ASR 5500, overwrites the specified FSC disk array and adds it to the current running RAID to reconstruct the RAID 5 array.

hd_num specifies the RAID is to be established. hd_num corresponds to the FSC in slot numbers as shown below:

  • hd13 = disk in slot 13

  • hd14 = disk in slot 14

  • hd15 = disk in slot 15

  • hd16 = disk in slot 16

  • hd17 = disk in slot 17

  • hd18 = disk in slot 18

overwrite { local1 | local2 }

On VPC, overwrites the specified vHD and adds it to the current running RAID to construct a fully mirrored array.

quarantine [ directory pathname | limit number_files | mtime minutes

Recovers and quarantines dirty-degraded RAID files.

  • directory specifies the directory to which files are to be moved. pathname is expressed as an alphanumeric string of 1 through 29 characters. Default = "lost+found"

  • limit sets the maximum number of files to quarantine. number_files is an integer from 0 to 1000000; 0 is unlimited. Default = 3000 (10 files per second within 5 minutes).

  • mtime specifies within how many minutes the file is modified to be considered suspects for quarantine. minutes is an integer from 0 through 1440; 0 means no files would be quarantined. Default = 5

remove { local1 | remote1 }

On the ASR 5000, removes the specified disk from the running RAID causing it to run in degraded mode or to fail.

  • local1 specifies the primary SMC is to be inserted into the RAID.

  • remote1 specifies the backup SMC is to be inserted into the RAID.

remove hd_num

On the ASR 5500, removes the specified FSC disk array from the running RAID causing it to run in degraded mode or to fail.

hd_num specifies the RAID is to be established. hd_num corresponds to the FSC in slot numbers as shown below:

  • hd13 = disk in slot 13

  • hd14 = disk in slot 14

  • hd15 = disk in slot 15

  • hd16 = disk in slot 16

  • hd17 = disk in slot 17

  • hd18 = disk in slot 18

remove { local1 | local2 }

On the VPC-SI, removes the specified vHD from the running RAID causing it to run in degraded mode or to fail.

  • local1 specifies the primary vHD to be removed from the RAID.

  • local2 specifies the backup vHD to be removed from the RAID.

remove { local1 | remote1 }

On the VPC-DI, removes the specified vHD from the running RAID causing it to run in degraded mode or to fail.

  • local1 specifies the disk on the active Control Function (CF) to be removed from the RAID.

  • remote1 specifies the disk on the backup CF to be removed from the RAID.

select { local1 | remote1 }

On the ASR 5000, selects the specified disk to assemble a RAID when two unrelated RAID disks are present in the system. The resulting RAID runs in degraded mode.

  • local1 specifies the primary SMC is to be inserted into the RAID.

  • remote1 specifies the backup SMC is to be inserted into the RAID.

select { | local1 | local2 }

On VPC-SI, selects the specified vHD to assemble a RAID when two or more unrelated RAID disks are present in the system. The resulting RAID runs in degraded mode.

  • local1 specifies the primary vHD to be inserted into the RAID.

  • local2 specifies the backup vHD to be inserted into the RAID.

select { | local1 | remote1 }

On VPC-DI, selects the specified vHD to assemble a RAID when two or more unrelated RAID disks are present in the system. The resulting RAID runs in degraded mode.

  • local1 specifies the disk on the active Control Function (CF) to be inserted into the RAID.

  • remote1 specifies the disk on the backup CF to be inserted into the RAID.

-noconfirm

Executes the command without displaying "Are you sure" prompt.

-force

Executes the command and overrides warnings.

Usage Guidelines

All commands need confirmation unless the -noconfirm is included in the command. If the result will bring down a running RAID, you have to force the command using -force .

RAID commands are needed to intervene in the following situations:

  • The hard disk controller task can not determine the correct operation.

  • Administrative action is required by policy.

  • The administrator wants to wipe out an unused disk.

In an automated system, the policies created with this CLI address the possibility of a manually partitioned disk, a disk resulting from a different version of software, a partially constructed disk, or the case of two unrelated disks in the system.

To reduce administrator intervention, a set of policies can be configured to set the default action using the commands in the HD RAID configuration mode. These commands are described in the HD Storage Policy Configuration Mode Commands chapter of this guide.


Caution

Use of the hd raid commands and keywords has the potential for deleting the contents of hard disk drives without the possibility of recovery. You should only use these commands under guidance from the Cisco Technical Assistance Center (TAC).



Important

For release 19.2 and higher on the ASR 5500, only those hd<slot> arrays having an FSC in the slot number with available disks can be specified.


Example

The following instructs the system to setup a RAID on the primary ASR 5000 SMC hard drive.
hd raid create local1 -force  

host

Used to resolve the IP address or logical host name information via a DNS query.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

host {  host_name |  host_ip_address }  

host_name | host_ip_address

Specifies the host for which IP information is to be displayed.

host_name : Specifies the logical host name for which the IP address is to be displayed (via DNS lookup). This is an alphanumeric string of 1 through 127 characters.

host_ip_address : Specifies the IP address for which the associated logical host name(s) are to be displayed (via reverse DNS lookup) using IPv4 dotted-decimal notation.

Usage Guidelines

Verify DNS information which affects connections and packet routing.

Example

The following commands will resolve the host information for remoteABC and 10.2.3.4 respectively.
host remoteABC  
host 10.2.3.4  

install plugin

Unpacks the contents of a patch kit for a specific plugin module. This function is associated with the patch process for accommodating dynamic software upgrades.

Product

ADC

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

install plugin  plugin_name patch_file_name  

plugin_name

Specifies the name of a plugin that has been already copied onto the system as an alphanumeric string of 1 through 16 characters.

patch_file_name

Specifies the file name of the patch (.tgz extension) that was copied onto the system. Ensure that the full file path is copied.

Usage Guidelines

Unpacks the contents of a patch kit intended for a specific plugin module. After unpacking the patch you must configure the plugin using the plugin command in the Global Configuration mode.

For additional information, refer to the Plugin Configuration Mode Commands chapter.

Example

To unpack the plugin module named p2p with the patch file name libp2p-1.2.0.tgz onto the system enter the following command:
install plugin p2p libp2p-1.2.0.tgz  

interface

Configures the system to generate gratuitous ARP (G-ARP) requests in case of a failure during an inter-node online upgrade. If the chassis is not active, an error message displays.

Product

All

Privilege

Security Administrator, Administrator, Operator, or Inspector with li-administrator permissions

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

interface  name send gratuitous-arp  ip-address 

Usage Guidelines

This command generates a G-ARP for the IP address specified and sends it over the interface.

Example

The following generate a G-ARP for IP address 192.168.100.10.
interface interface_1 send gratuitous-arp 192.168.100.10  

lawful-intercept

Refer to the Lawful Intercept Configuration Guide for a description of this command.

lawful-intercept packet-cable

Refer to the Lawful Intercept Configuration Guide for a description of this command.

lawful-intercept ssdf

Refer to the Lawful Intercept Guide for a description of this command.

license

Registers and deregisters the system with Cisco as part of the Cisco Smart Licensing functionality. This command also can be used to manually refresh the Smart Licensing registration information and license information.

Privilege

Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

license smart { deregister | register idtoken  id | renew { auth | id } }  

deregister

This command contacts the Cisco Smart Software Manager (CSSM) to revoke any previous registration. All Smart Licensing entitlements and certificates on the platform will be removed. All certificates and registration information will be removed from the trusted store. This is true even if the agent is unable to communicate with Cisco to deregister.

If the customer wishes to use Smart Licensing again they will need to run the license smart register idtoken command again.

register idtoken id

Using the specified ID token the customer received from Cisco Smart Software Manager (CSSM), this command registers this product with Cisco and receives back an identity certificate. This certificate is saved and automatically used for all future communications with Cisco. After registration it will send the current license usage information to Cisco. Every 180 days the agent will automatically renew the registration information with Cisco. The ID token is not saved on the device. By default, the system/product is not registered with the the Cisco Smart Software Manager (CSSM).

id is a string from 1 to 512 characters.

renew { auth | id }

  • auth: Manually renews authorization of Smart Licenses in use. Since the license authorization is renewed automatically by the system every 6 months, you do not typically need to issue this command.

  • id: Manually renews the id certificate and registration with CSSM. Since the registration renewal is automatically performed by the system every 6 months, you do not typically need to issue this command.

Usage Guidelines

Before issuing these commands, you must enable Smart Licensing using the license smart enable Global Config Mode command.

For additional information, refer to the Licensing chapter in the System Administration Guide.

Example

To register the system with Cisco Smart Software Manager (CSSM) for Smart Licensing, enter the following command:
license smart register  

link-aggregation port switch to

When a link aggregation group (LAG) contains two sets of ports with each connecting to a different Ethernet switch, this command allows you to change the status of the active distributing ports. (ASR 5x00 only)

Default: none.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

link-aggregation port switch to  slot# /  port# 

slot#

Identifies the physical chassis slot where the line card or MIO card is installed.

port#

Identifies the physical port on the line card or MIO card to automatically switch to.

Usage Guidelines

This command is subject to the following restrictions:
  • slot#/port# must support LAG.

  • slot#/port# must be configured with LAG.

  • slot#/port# must not be actively distributing.

  • slot#/port# must have negotiated a partner while in standard mode.

  • slot#/port# 's partner must have a priority equal to or greater than itself.

  • slot#/port# 's partner bundle must have bandwidth in standard mode equal to or greater than itself.

  • Switching to slot#/port# must not violate preference within hold-time in standard mode.

Example

link-aggregation port switch to 17/2  
link-aggregation port switch to 5/12  

logging active

Enables or disables logging for active internal log files.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

logging active [ copy runtime filters ] [ event-verbosity  event_level ] [ pdu-data  format ] [ pdu-verbosity  pdu_level ]  
no logging active  

no

Indicates the internal logging is to be disabled.

copy runtime filters

Copies the runtime filters and uses that copy to filter the current logging session.

event-verbosity event_level

Specifies the level of verboseness to use in logging of events as one of:
  • min : Displays minimal information about the event. Information includes event name, facility, event ID, severity level, date, and time.

  • concise : Displays detailed information about the event, but does not provide the event source within the system.

  • full : Displays detailed information about event, including source information, identifying where within the system the event was generated.

pdu-data format

Specifies output format for packet data units when logged as one of:
  • none : raw format (unformatted).

  • hex : hexadecimal format.

  • hex-ascii : hexadecimal and ASCII similar to a main-frame dump.

pdu-verbosity pdu_level

Specifies the level of verboseness to use in logging of packet data units as an integer from 1 through 5, where 5 is the most detailed.

Usage Guidelines

Adjust the active logging levels when excessive log file sizes are being generated or, conversely, not enough information is being sent to the active log files for adequate troubleshooting support. The no keyword is used to disable internal logging.


Important

A maximum of 50,000 events may be stored in each log. Enabling more events for logging may cause the log to be filled in a much shorter time period. This may reduce the effectiveness of the log data as a shorter time period of event data may make troubleshooting more difficult.



Important

Once a log has reached the 50,000 event limit the oldest events will be discarded as new log entries are created.


Example

The following sets the active logging for events to the maximum.
logging active event-verbosity full  
The following command sets the active logging for packet data units to level 3 and sets the output format to the main-frame style hex-ascii .
logging active pdu-data hex-ascii pdu-verbosity 3  
The following disables internal logging.
no logging active  

logging filter

Sets the logging filtering options for all or individual facilities.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

logging filter  active  facility  facility level  severity_level [ critical-info | no-critical-info ]  
logging filter  { disable | enable }  facility  facility { all | instance  instance_number }  

active

Indicates only active processes are to have logging options set.

disable

Disables logging for a specific instance or all instances. This keyword is only supported for aaamgr, hamgr and sessmgr facilities.

enable

Enables logging for a specific instance or all instances. This keyword is only supported for aaamgr, hamgr and sessmgr facilities.


Important

By default logging is enabled for all instances of aaamgr, hamgr and sessmgr.


facility facility

Specifies the facility to modify the filtering of logged information. Valid facilities for this command are:

  • a10: A10 interface facility

  • a11: A11 interface facility

  • a11mgr: A11 Manager facility

  • aaa-client: Authentication, Authorization and Accounting (AAA) client facility

  • aaamgr: AAA manager logging facility

  • aaaproxy: AAA Proxy facility

  • aal2: ATM Adaptation Layer 2 (AAL2) protocol logging facility

  • acl-log: Access Control List (ACL) logging facility

  • acsctrl: Active Charging Service (ACS) Controller facility

  • acsmgr: ACS Manager facility

  • afctrl: Fabric Controller facility [ASR 5500 only]

  • afmgr: Fabric Manager logging facility [ASR 5500 only]

  • alarmctrl: Alarm Controller facility

  • alcap: Access Link Control Application Part (ALCAP) protocol logging facility

  • alcapmgr: ALCAP manager logging facility

  • all: All facilities

  • bfd: Bidirectional Forwarding Detection (BFD) protocol logging facility

  • bgp: Border Gateway Protocol (BGP) facility

  • bindmux: IPCF BindMux-Demux Manager logging facility

  • bngmgr: Broadband Network Gateway (BNG) Demux Manager logging facility

  • bssap+: Base Station Sub-system Application Part+ protocol facility for the login interface between the SGSN and the MSC/VLR (2.5G and 3G)

  • bssgp: Base Station Sub-system GPRS Protocol logging facility handles exchange information between the SGSN and the BSS (2.5G only)

  • bulkstat: Statistics logging facility

  • callhome: Call Home application logging facility

  • cap: CAMEL Application Part (CAP) logging facility for protocol used in prepaid applications (2.5G and 3G)

  • cbsmgr: Cell Broadcasting Service (CBS) logging facility [HNBGW]

  • cdf: Charging Data Function (CDF) logging facility

  • cgw: Converged Access Gateway (CGW) logging facility

  • cli: Command Line Interface (CLI) logging facility

  • cmp: Certificate Management Protocol (IPSec) logging facility

  • confdmgr: ConfD Manager proclet (NETCONF) logging facility

  • connectedapps: SecGW ASR 9000 oneP communication procotol

  • connproxy: Controller Proxy logging facility

  • credit-control: Credit Control (CC) facility

  • csp: Card/Slot/Port controller facility

  • css: Content Service Selection (CSS) facility

  • css-sig: CSS RADIUS Signaling facility

  • cx-diameter: Cx Diameter Messages facility [CSCF <--> HSS]

  • data-mgr: Data Manager Framework logging facility

  • dcardctrl: IPSec Daughter Card Controller logging facility

  • dcardmgr: IPSec Daughter Card Manager logging facility

  • demuxmgr: Demux Manager API facility

  • dgmbmgr: Diameter Gmb Application Manager logging facility

  • dhcp: Dynamic Host Configuration Protocol (DHCP) logging facility

  • dhcpv6: DHCPv6

  • dhost: Distributed Host logging facility

  • diabase: Diabase messages facility

  • diactrl: Diameter Controller proclet logging facility

  • diameter: Diameter endpoint logging facility

  • diameter-acct: Diameter Accounting

  • diameter-auth: Diameter Authentication

  • diameter-dns: Diameter DNS subsystem

  • diameter-ecs: ACS Diameter signaling facility

  • diameter-engine: Diameter version2 engine logging facility

  • diameter-hdd: Diameter Horizontal Directional Drilling (HDD) Interface facility

  • diameter-svc: Diameter Service

  • diamproxy: DiamProxy logging facility

  • dpath: IPSec Data Path facility

  • drvctrl: Driver Controller facility

  • dpath: IPSec Data Path logging facility

  • drvctrl: Driver Controller logging facility

  • doulosuemgr: Doulos (IMS-IPSec-Tool) user equipment manager

  • eap-diameter: Extensible Authentication Protocol (EAP) IP Sec urity facility

  • eap-ipsec: Extensible Authentication Protocol (EAP) IPSec facility

  • eap-sta-s6a-s13-s6b-diameter: EAP/STA/S6A/S13/S6B Diameter messages facility

  • ecs-css: ACSMGR <-> Session Manager Signalling Interface facility

  • egtpc: eGTP-C logging facility

  • egtpmgr: enhanced GPRS Tunneling Protocol (eGTP) manager logging facility

  • egtpu: eGTP-U logging facility

  • embms: evolved Multimedia Broadcast Multicast Services Gateway facility

  • embms: eMBMS Gateway Demux facility

  • epdg: evolved Packet Data (ePDG) gateway logging facility

  • event-notif: Event Notification Interface logging facility

  • evlog: Event log facility

  • famgr: Foreign Agent manager logging facility

  • firewall: Firewall logging facility

  • fng: Femto Network Gateway (FNG) logging facility

  • gbmgr: SGSN Gb Interface Manager facility

  • gmm:
    • For 2.5G: Logs the GPRS Mobility Management (GMM) layer (above LLC layer)

    • For 3G: Logs the access application layer (above the RANAP layer)

  • gprs-app: GPRS Application logging facility

  • gprs-ns: GPRS Network Service Protocol (layer between SGSN and the BSS) logging facility

  • gq-rx-tx-diameter: Gq/Rx/Tx Diameter messages facility

  • gss-gcdr: GTPP Storage Server GCDR facility

  • gtpc: GTP-C protocol logging facility

  • gtpcmgr: GTP-C protocol manager logging facility

  • gtpp: GTP-prime protocol logging facility

  • gtpu: GTP-U protocol logging facility

  • gtpumgr: GTP-U Demux manager

  • gx-ty-diameter: Gx/Ty Diameter messages facility

  • gy-diameter: Gy Diameter messages facility

  • h248prt: H.248 port manager facility
  • hamgr: Home Agent manager logging facility

  • hat: High Availability Task (HAT) process facility

  • hdctrl: HD Controller logging facility

  • henbapp: Home Evolved NodeB (HENB) App facility (Do not use this keyword for HeNB-GW in Release 20, 21.0 and 21.1.)

  • henbgw: HENB-GW facility (Do not use this keyword for HeNB-GW in Release 20, 21.0 and 21.1.)

  • henbgw-pws: HENB-GW Public Warning System logging facility (Do not use this keyword for HeNB-GW in Release 20, 21.0 and 21.1.)

  • henbgw-sctp-acs: HENB-GW access Stream Control Transmission Protocol (SCTP) facility(Do not use this keyword for HeNB-GW in Release 20, 21.0 and 21.1.)

  • henbgw-sctp-nw: HENBGW network SCTP facility (Do not use this keyword for HNB-GW in Release 20 and later.)

  • henbgwdemux: HENB-GW Demux facility (Do not use this keyword for HeNB-GW in Release 20, 21.0 and 21.1.)

  • henbgwmgr: HENB-GW Manager facility (Do not use this keyword for HeNB-GW in Release 20, 21.0 and 21.1.)

  • hnb-gw: HNB-GW (3G Femto GW) logging facility (Do not use this keyword for HNB-GW in Release 20 and later)

  • hnbmgr: HNB-GW Demux Manager logging facility (Do not use this keyword for HNB-GW in Release 20 and later)

  • hss-peer-service: Home Subscriber Server (HSS) Peer Service facility

  • igmp: Internet Group Management Protocol (IGMP)

  • ikev2: Internet Key Exchange version 2 (IKEv2)

  • ims-authorizatn: IP Multimedia Subsystem (IMS) Authorization Service facility

  • ims-sh: HSS Diameter Sh Interface Service facility

  • imsimgr: SGSN IMSI Manager facility

  • imsue: IMS User Equipment (IMSUE) facility

  • ip-arp: IP Address Resolution Protocol facility

  • ip-interface: IP interface facility

  • ip-route: IP route facility

  • ipms: Intelligent Packet Monitoring System (IPMS) logging facility

  • ipne: IP Network Enabler (IPNE) facility

  • ipsec: IP Security logging facility

  • ipsecdemux: IPSec demux logging facility

  • ipsg: IP Service Gateway interface logging facility

  • ipsgmgr: IP Services Gateway facility

  • ipsp: IP Pool Sharing Protocol logging facility

  • kvstore: Key/Value Store (KVSTORE) Store facility

  • l2tp-control: Layer 2 Tunneling Protocol (L2TP) control logging facility

  • l2tp-data: L2TP data logging facility

  • l2tpdemux: L2TP Demux Manager logging facility

  • l2tpmgr: L2TP Manager logging facility

  • lagmgr: Link Aggregation Group (LAG) manager logging facility

  • lcs: Location Services (LCS) logging facility

  • ldap: Lightweight Directory Access Protocol (LDAP) messages logging facility

  • li: Refer to the Lawful Intercept Configuration Guide for a description of this command.

  • linkmgr: SGSN/BSS SS7 Link Manager logging facility (2.5G only)

  • llc: Logical Link Control (LLC) Protocol logging facility; for SGSN: logs the LLC layer between the GMM and the BSSGP layers for logical links between the MS and the SGSN

  • local-policy: Local Policy Service facility

  • location-service: Location Services facility

  • m3ap: M3 Application Protocol facility

  • m3ua: M3UA Protocol logging facility

  • magmgr: Mobile Access Gateway manager logging facility

  • map: Mobile Application Part (MAP) protocol logging facility

  • megadiammgr: MegaDiameter Manager (SLF Service) logging facility

  • mme-app: Mobility Management Entity (MME) Application logging facility

  • mme-embms: MME evolved Multimedia Broadcast Multicast Service facility

  • mme-misc: MME miscellaneous logging facility

  • mmedemux: MME Demux Manager logging facility

  • mmemgr: MME Manager facility

  • mmgr: Master Manager logging facility

  • mobile-ip: Mobile IP processes

  • mobile-ip-data: Mobile IP data facility

  • mobile-ipv6: Mobile IPv6 logging facility

  • mpls: Multiprotocol Label Switching (MPLS) protocol logging facility

  • mrme: Multi Radio Mobility Entity (MRME) logging facility

  • mseg-app: Mobile Services Edge Gateway (MSEG) application logging facility (This option is not supported in this release.)

  • mseg-gtpc: MSEG GTP-C application logging facility (This option is not supported in this release.)

  • mseg-gtpu: MSEG GTP-U application logging facility (This option is not supported in this release.)

  • msegmgr: MSEG Demux Manager logging facility (This option is not supported in this release.)

  • mtp2: Message Transfer Part 2 (MTP2) Service logging facility

  • mtp3: Message Transfer Part 3 (MTP3) Protocol logging facility

  • multicast-proxy: Multicast Proxy logging facility

  • nas: Non-Access Stratum (NAS) protocol logging facility [MME 4G]

  • netwstrg: Network Storage facility
  • npuctrl: Network Processor Unit Control facility

  • npudrv: Network Processor Unit Driver facility [ASR 5500 only]

  • npumgr: Network Processor Unit Manager facility

  • npumgr-acl: NPUMGR ACL logging facility

  • npumgr-drv: NPUMGR DRV logging facility

  • npumgr-flow: NPUMGR FLOW logging facility

  • npumgr-fwd: NPUMGR FWD logging facility

  • npumgr-init: NPUMGR INIT logging facility

  • npumgr-lc: NPUMGR LC logging facility

  • npumgr-port: NPUMGR PORT logging facility

  • npumgr-recovery: NPUMGR RECOVERY logging facility

  • npumgr-rri: NPUMGR RRI (Reverse Route Injection) logging facility
  • npumgr-vpn: NPUMGR VPN logging facility

  • npusim: NPUSIM logging facility [ASR 5500 only]

  • ntfy-intf: Notification Interface logging facility [Release 12.0 and earlier versions only]

  • ocsp: Online Certificate Status Protocol logging facility.
  • orbs: Object Request Broker System logging facility

  • ospf: OSPF protocol logging facility

  • ospfv3: OSPFv3 protocol logging facility

  • p2p: Peer-to-Peer Detection logging facility

  • pagingmgr: PAGINGMGR logging facility

  • pccmgr: Intelligent Policy Control Function (IPCF) Policy Charging and Control (PCC) Manager library

  • pdg: Packet Data Gateway (PDG) logging facility

  • pdgdmgr: PDG Demux Manager logging facility

  • pdif: Packet Data Interworking Function (PDIF) logging facility

  • pgw: Packet Data Network Gateway (PGW) logging facility

  • pmm-app: Packet Mobility Management (PMM) application logging facility

  • ppp: Point-To-Point Protocol (PPP) link and packet facilities

  • pppoe: PPP over Ethernet logging facility

  • proclet-map-frwk: Proclet mapping framework logging facility

  • push: VPNMGR CDR push logging facility

  • radius-acct: RADIUS accounting logging facility

  • radius-auth: RADIUS authentication logging facility

  • radius-coa: RADIUS change of authorization and radius disconnect

  • ranap: Radio Access Network Application Part (RANAP) Protocol facility logging info flow between SGSN and RNS (3G)

  • rct: Recovery Control Task logging facility

  • rdt: Redirect Task logging facility

  • resmgr: Resource Manager logging facility

  • rf-diameter: Diameter Rf interface messages facility

  • rip: Routing Information Protocol (RIP) logging facility [RIP is not supported at this time.]

  • rlf: Rate Limiting Function (RLF) logging facility

  • rohc: Robust Header Compression (RoHC) facility

  • rsvp: Reservation Protocol logging facility

  • rua: RANAP User Adaptation (RUA) [3G Femto GW - RUA messages] logging facility

  • s102: S102 protocol logging facility

  • s102mgr: S102Mgr logging facility

  • s1ap: S1 Application Protocol (S1AP) Protocol logging facility

  • sabp: Service Area Broadcast Protocol (SABP) logging facility

  • saegw: System Architecture Evolution (SAE) Gateway facility

  • sbc: SBc protocol logging facility

  • sccp: Signalling Connection Control Part (SCCP) Protocol logging (connection-oriented messages between RANAP and TCAP layers).

  • sct: Shared Configuration Task logging facility

  • sctp: Stream Control Transmission Protocol (SCTP) Protocol logging facility

  • sef_ecs: Severely Errored Frames (SEF) APIs printing facility

  • sess-gr: SM GR facility

  • sessctrl: Session Controller logging facility

  • sessmgr: Session Manager logging facility

  • sesstrc: session trace logging facility

  • sft: Switch Fabric Task logging facility

  • sgs: SGs interface protocol logging facility

  • sgsn-app: SGSN-APP logging various SGSN "glue" interfaces (for example, between PMM, MAP, GPRS-FSM, SMS).

  • sgsn-failures: SGSN call failures (attach/activate rejects) logging facility (2.5G)

  • sgsn-gtpc: SGSN GTP-C Protocol logging control messages between the SGSN and the GGSN

  • sgsn-gtpu: SGSN GTP-U Protocol logging user data messages between the SGSN and GGSN

  • sgsn-mbms-bearer: SGSN Multimedia Broadcast/Multicast Service (MBMS) Bearer app (SMGR) logging facility

  • sgsn-misc: Used by stack manager to log binding and removing between layers

  • sgsn-system: SGSN System Components logging facility (used infrequently)

  • sgsn-test: SGSN Tests logging facility; used infrequently

  • sgtpcmgr: SGSN GTP-C Manager logging information exchange through SGTPC and the GGSN

  • sgw: Serving Gateway facility

  • sh-diameter: Sh Diameter messages facility

  • sitmain: System Initialization Task main logging facility

  • sls: Service Level Specification (SLS) protocol logging facility

  • sm-app: SM Protocol logging facility

  • sms: Short Message Service (SMS) logging messages between the MS and the SMSC

  • sndcp: Sub Network Dependent Convergence Protocol (SNDCP) logging facility

  • snmp: SNMP logging facility

  • sprmgr: IPCF Subscriber Policy Register (SPR) manager logging facility

  • srdb: Static Rating Database

  • srp: Service Redundancy Protocol (SRP) logging facility

  • sscfnni: Service-Specific Coordination Function for Signaling at the Network Node Interface (SSCF-NNI) logging facility

  • sscop: Service-Specific Connection-Oriented Protocol (SSCOP) logging facility

  • ssh-ipsec: Secure Shell (SSH) IP Security logging facility

  • ssl: Secure Socket Layer (SSL) message logging facility

  • stat: Statistics logging facility


    Important

    The keyword bulkstat was added in StarOS release 21.1 to provide consistency with other CLI commands. Both keywords are supported for statistics logging facility.


  • supserv: Supplementary Services logging facility [H.323]

  • system: System logging facility

  • tacacsplus: TACACS+ Protocol logging facility

  • tcap: TCAP Protocol logging facility

  • testctrl: Test Controller logging facility

  • testmgr: Test Manager logging facility

  • threshold: threshold logging facility

  • ttg: Tunnel Termination Gateway (TTG) logging facility

  • tucl: TCP/UDP Convergence Layer (TUCL) logging facility

  • udr: User Data Record (UDR) facility (used with the Charging Service)

  • user-data: User data logging facility

  • user-l3tunnel: User Layer 3 tunnel logging facility

  • usertcp-stack: User TCP Stack

  • vim: Voice Instant Messaging (VIM) logging facility
  • vinfo: VINFO logging facility
  • vmgctrl: Virtual Media Gateway (VMG) controller facility
  • vmgctrl: VMG Content Manager facility
  • vpn: Virtual Private Network logging facility

  • wimax-data: WiMAX DATA

  • wimax-r6: WiMAX R6

  • wsg: Wireless Security Gateway (ASR 9000 Security Gateway)
  • x2gw-app: X2GW (X2 proxy Gateway, eNodeB) application logging facility

  • x2gw-demux: X2GW demux task logging facility

all | instance instance_number

Specifies whether logging will be disabled or enabled for all instances or a specific instance of aaamgr, hamgr or sessmgr. See additional information in the Usage Guidelines section.

These keywords are only supported for the disable and enable keywords.

level severity_level

This keyword is only supported in conjunction with the active keyword.

Specifies the level of information to be logged from the following list which is ordered from highest to lowest:
  • critical - display critical events

  • error - display error events and all events with a higher severity level

  • warning - display warning events and all events with a higher severity level

  • unusual - display unusual events and all events with a higher severity level

  • info - display info events and all events with a higher severity level

  • trace - display trace events and all events with a higher severity level

  • debug - display all events

critical-info | no-critical-info

These keywords are only supported in conjunction with the active keyword.

critical-info : Specifies that events with a category attribute of critical information are to be displayed. Examples of these types of events can be seen at bootup when system processes and tasks are being initiated. This is the default setting.

no-critical-info : Specifies that events with a category attribute of critical information are not to be displayed.

Usage Guidelines

Apply filters for logged data to collect only that data which is of interest.

To enable logging of a single instance of a facility, you must first disable all instances of the facility (logging filter disable facility facility all) and then enable logging of the specific instance (logging filter enable facility facility instance instance_number. To restore default behavior you must re-enable logging of all instances (logging filter enable facility facility all).


Important

A maximum of 50,000 events may be stored in each log. Enabling more events for logging may cause the log to be filled in a much shorter time period. This may reduce the effectiveness of the log data as a shorter time period of event data may make troubleshooting more difficult.



Important

Once a log has reached the 50,000 event limit the oldest events will be discarded as new log entries are created.



Caution

Issuing this command could negatively impact system performance depending on the amount of system activity at the time of execution and/or the type of facility(ies) being logged.


Example

The following are selected examples used to illustrate the various options. Not all facilities will be explicitly shown as each follows the same syntax for options.

The following sets the level to log only warning information for all facilities.
logging filter active facility all level warning  
The following enables the logging of critical information for the SNMP facility while setting the level to error .
logging filter active facility snmp level error critical-info  
The following command disables logging of all aaamgr instances.
logging filter disable facility aaamgr all  

logging trace

Enables or disables the logging of trace information for specific calls, mobiles, or network addresses.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

[ no ] logging trace { callid  call_id | ipaddr  ip_address | msid  ms_id | username  user_name }  

no

Indicates the logging of trace information is to be disabled.

callid call_id | ipaddr ip_address | msid ms_id | username user_name

callid call_id : Specifies the exact call instance ID which is to have trace data logged.as a 4-byte hexadecimal number.

ipaddr ip_address : Specifies the IP address in IPv4 dotted-decimal notation for which trace information is to be logged.

msid ms_id : Specifies the mobile subscriber ID for which trace information is to be logged as 7 to 16 digits of an IMSI, MIN, or RMI.

username user_name : Specifies a previously configured user who is to have trace information logged.

Usage Guidelines

A trace log is useful in troubleshooting subscriber problems as well as for system verification by using a test subscriber. The no keyword is used to stop the logging of trace information.


Important

A maximum of 50,000 events may be stored in each log. Enabling more events for logging may cause the log to be filled in a much shorter time period. This may reduce the effectiveness of the log data as a shorter time period of event data may make troubleshooting more difficult.



Important

Once a log has reached the 50,000 event limit the oldest events will be discarded as new log entries are created.



Caution

Issuing this command could negatively impact system performance depending on the number of subscribers connected and the amount of data being passed.


Example

The following commands enables/disables trace information for user user1 .
logging trace username user1   
no logging trace username user1   
The following commands will enable/disable trace information logging for the user assigned IP address 10.2.3.4 .
logging trace ipaddr 10.2.3.4   
no logging trace ipaddr 10.2.3.4   
The following enables/disables logging of trace information for call ID fe80AA12 .
logging trace callid fe80AA12   
no logging trace callid fe80AA12   

logs checkpoint

Performs checkpointing operations on log data. Checkpointing identifies logged data as previously viewed or marked. Checkpointing results in only the log information since the last checkpoint being displayed; checkpointed log data is not available for viewing.

Individual logs may have up to 50,000 events in the active log. Checkpointing the logs results in at most 50,000 events being in the inactive log files. This gives a maximum of 100,000 events in total which are available for each facility logged.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

logs checkpoint  

Usage Guidelines

Check point log data to set the log contents to a well-known point prior to special activities taking place. This command may also be a part of periodic regular maintenance to manage log data.

Checkpointing logs moves the current log data to the inactive logs. Only the most recently check pointed data is retained in the inactive logs. A subsequent check pointing of the logs results in the prior check pointed inactive log data being cleared and replaced with the newly check pointed data.

Checkpointing log data marks the active log data to be retained as the inactive log data. This results in the active log data, if displayed, having no data earlier than the point in time when the checkpointing occurred.


Important

Checkpointing logs should be done periodically to prevent the log files becoming full. Logs which have 50,000 events logged will discard the oldest events first as new events are logged.



Important

An Inspector-level administrative user cannot execute this command.


Example

The following command immediately sets a checkpoint for event logs and moves the current log data to inactive logs:

logs checkpoint  

lsp-ping

Checks Multi Protocol Label Switching (MPLS) label switch path (LSP) connectivity for the specified IPv4 forwarding equivalence class (FEC). It must be followed by an IPv4 FEC prefix.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

lsp-ping  ip_prefix_FEC [ count  ping_packets ] [ | verbose ] [ | grep  grep_options ]  

ip_prefix_FEC

Specifies an IP prefix FEC with or without subnet mask entered using IPv4 dotted-decimal CIDR notation.

count ping_packets

Sets the number of ping packets to be sent as an integer from 1 through 16. Default: 4.


Important

The timeout interval for the packets is 5 seconds by default.


verbose

Sets the verbose (detailed) output mode.

grep grep_options

Pipes (sends) the output of this command to the grep command.

Usage Guidelines

This command is used to verify the MPLS LSP connectivity for the specified FEC.

Example

Following are the examples for using this command with all possible options for IPv4 address 13.13.13.1 and mask 32 (CIDR notation):
lsp-ping 13.13.13.1/32  
lsp-ping 13.13.13.1/32 count 15   
lsp-ping 13.13.13.1/32 verbose   

lsp-traceroute

Discovers MPLS LSP routes that packets actually take when traveling to their destinations. It must be followed by an IPv4 or IPv6 FEC prefix.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

lsp-traceroute  ip_prefix_FEC [ maxttl  time_to_live ] [ | verbose ] [ | grep  grep_options ]  

ip_prefix_FEC

Specifies the destination IP address in IPv4 dotted-decimal or IPv6 colon-separated-hexadecimal with or without mask (CIDR notation).

maxttl time_to_live

Sets the maximum time to live in hops. TTL is an integer from 1 through 255. Default: 30.

verbose

Sets the verbose (detailed) output mode.

grep grep_options

Pipes (sends) the output of this command to the grep command.

Usage Guidelines

This command is used or the router to discover the MPLS LSP routes through which the packets will travel to their IPv4 or IPv6 destinations.

Example

The following command specifies the destination IP address 13.13.13.13 for which the MPLS routes will be discovered for packets to traverse:
lsp-traceroute 13.13.13.13/32   

mkdir

Creates a new directory in the local file system or in remote locations as specified.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

mkdir  filepath 

filepath

Specifies the directory path to create. The path must be formatted as follows:

For the ASR 5000:
[ file: ]{ /flash | /pcmcia1 | /hd-raid }[ / directory ]/ file_name 

Important

Use of the ASR 5000 SMC hard drive is not supported in this release.


For the ASR 5500:
[ file: ]{ /flash | /usb1 | /hd-raid }[ / directory ]/ file_name 
For VPC:
[ file: ]{ /flash | /hd-raid | /usb1 | /usb2 | /cdrom1 }[ / directory ]/ file_name 

Important

The USB ports and CDROM must be configured via the hypervisor to be accessible.



Important

Do not use the following characters when entering a string for the field names below: "/" (forward slash), ":" (colon) or "@" (at sign).


directory is the directory name

filename is the actual file of interest

Usage Guidelines

Create new directories as part of periodic maintenance activities to better organize stored files.

Example

The following creates the directory /flash/pub in the local flash storage.
mkdir /flash/pub  

mme-mmedemux

Configures the MME Manager related commands.

Product

MME

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

mme mmedemux { audit-with  | s1ap-sync } mmemgr { all | instance  value }   

mme

Configures the MME exec commands.

mmedemux

Configures the MME Manager related commands.

audit-with

Performs audit with MME Manager.

s1ap-sync

Synchronizes with s1ap association count with MME Manager-Archive with all instances of MME Manager.

mmemgr

Synchronizes up with MME Manager on eNodeB list.

all

Synchronizes up with MME Manager on eNodeB list with all instances.

instance value

Synchronizes with MME Manager on eNodeB list with specific instance. value Must be an integer from 1 to 48.

mme disconnect

Performs a graceful/ungraceful disconnection of an SCTP peer.

Product

MME

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

mme disconnect s1-peer  peer_ID  [ graceful ] [ -noconfirm ]  

s1-peer peer-ID

Specifies the eNodeB peer ID which has to be disconnected. peer-ID is an integer from 1 through 4294967295.

graceful

Specifies that the SCTP connection to the S1 peer will be terminated with a complete handshake. By default (without this keyword), SCTP connections are aborted.

-noconfirm

Executes the command without any additional prompts or confirmation from the user.

Usage Guidelines

Use this command to disconnect the SCTP connection to the specified peer eNodeB. This command can be used to remove stale eNodeB connections from the MME, even when no active SCTP connection exists.

Example

The following gracefully disconnects the SCTP connection with the eNodeB with a peer ID of 22315734:

mme disconnect s1-peer 22315734 graceful -noconfirm  

mme imsimgr

Triggers an MME IMSIMgr audit for IMSI, IMEI, MSISDN information for a specific SessMgr instance associated with a specific IMSIMgr instance.

Product

MME

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

mme imsimgr instance   instance_id audit-with sessmgr { all | instance  instance_id }  

imsimgr instance instance_id

Specifies the IMSI manager instance for which the audit is initiated. The audit is initiated for only one specified instance of IMSI manager at a time.

instance_id : Enter an integer from 1 through 4.

audit-with sessmgr { all | instance instance_id }

Initiates an IMSIMgr for either all associated session managers or for a specific session manager (SessMgr) instance.

all | instance instance_id : Select all to initiate the audit for all SessMgr instances or select instance and for instance_id enter an integer from 1 to 1152 to identify a specific SessMgr for the audit.

Usage Guidelines

Use this command to manage the IMSIMgr's IMSI table, and to initiate an audit of one or more SessMgrs associated with the specific IMSIMgr. This is useful when the MME has been configured to support more than one MME IMSIMgr. The audit assists you to ensure that the IMSI table has the correct IMSI-SessMgr association.triggers as the audit checks for IMSI, IMEI, MSISDN information for a specific SessMgr instance.

Example

Use a command similar to the following to trigger an audit of SessMgr 243 associated with IMSIMgr 2:
mme imsimgr instance 2 audit-with sessmgr instance 243  

mme offload

Initiates or stops the offload of UEs associated with a specified MME service.

Product

MME

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

The following command syntax is available in Release 12.2 and earlier.

mme offload mme-service  mme_svc_name { start mme-init-release-timeout  seconds paging-init-timeout  seconds | stop }  

The following command syntax is available in Release 14.0 and higher.

mme offload mme-service  mme_svc_name { time-duration  minutes offload-percentage  percent [ disable-implicit-detach  | preserve-volte-subscribers   ]  ] | stop } [- noconfirm ]  

mme-service name

Specifies the name of an existing MME service from which UEs will be offloaded as an alphanumeric string of 1 trough 63 characters.

start mme-init-release-timeout seconds paging-init-timeout seconds

These keywords are available in Release 12.2 and earlier.

Sets the timeout for the initial release procedure and the paging procedure.

start mme-init-release-timeout seconds : Configures the timeout (in seconds) for triggering the IDLE MODE ENTRY procedure for UEs that are in the ECM_CONNECTED state as an integer from 1 to 120. The cause of the IDLE MODE ENTRY will be "Load balancing TAU required".

paging-init-timeout seconds : Configures the timeout (in seconds) for triggering the PAGING procedure for UEs in the ECM_IDLE state as an integer from 1 to 120. After returning the UEs to the ECM_CONNECTED state, the IDLE MODE ENTRY procedure is triggered with the "Load balancing TAU required" cause.

time-duration minutes offload-percentage percent

time-duration specifies the maximum allowed time for the UE offload procedure to complete.

minutes can be any value 1 through 1000 minutes.

offload-percentage specifies the percentage of total subscribers on this mme-service to offload.

percent can be any value 0 through 100.

disable-implicit-detach

By default, if the UE context is not transferred to another MME within 5 minutes, the UE will be implicitly detached. This option disables this implicit detach timer.

stop

Ends the offload process.

-noconfirm

Executes the command without any additional prompts or confirmation from the user.

preserve-volte-subscribers

This keyword is used to configure preservation of VoLTE subscribers from offloading during active calls (QCI=1). By default, the subscribers with voice bearer with QCI = 1 will not be preserved during MME offloading. Configuring the keyword preserve-volte-subscribers enables preservation of subscribers with voice bearer.

Usage Guidelines

Use this command to initiate or stop the offloading of UEs associated with a specified MME service.

Prior to initiating this command, you can set the relative-capacity command in the MME Service Configuration Mode to zero (0). This prevents this MME from accepting any new calls, and redirects them to other MMEs in the pool while existing UEs on this MME are removed.


Important

Emergency attached UEs in Connected or Idle mode are not considered for offloading.

Example

This example applies to Release 12.2 and earlier.

The following command sets the trigger to start off-loading UEs from a service named mme3 at 60 seconds and the paging trigger at 90 seconds:
mme offload mme-service mme3 start mme-init-release-timeout 60 paging-init-timeout 90  

Example

This example applies to Release 14.0 and higher.

The following example command rebalances (offloads) 30 percent of all UEs from the specified mme-service (to other mme-services in the MME pool) over the course of 10 minutes.
mme offload mme-service mme_svc time-duration 10 offload-percentage 30 -noconfirm  

Example

The following example command re-balances(offloads) 30 percent of Non-VoLTE subscribers from the specified mme-service (to other mme-services in the MME pool) over the course of 30 minutes with VoLTE preservation.

mme offload mme-service  mmesvc  time-duration  30 offload-percentage  30 preserve-volte-subscribers  

mme paging cache clear

Enables the operator to clear the paging cache for either a specific SessMgr instance or for all SessMgrs.

Product

MME.

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

mme paging cache clear { all | instance   sessmgr_instance }  

all

Instructs the MME to clear the paging cache for all Session Managers.

instance sessmgr_instance

Enter an integer from 0 to 4294967295 to specify a single Session Manager.

Usage Guidelines

This command clears the cache. It is important to clear the cache after the mme paging cache size is set to zero (0) to stop caching. This clear command needs to be used to reset the cache after caching is stopped.

Example

Use the following command to clear the paging cache for all SessMgrs:
mme paging cache clear  all  

mme relocate-ue imsi

This command enables the operator to detach a UE from the current MME and cause it to reattach to another MME in the pool.

Product

MME

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

mme relocate-ue imsi  imsi new-guti mme-group-id  grp_id mme-code  mme_code m-tmsi  mtmsi 

imsi imsi

Specifies the Mobile Station Identifier of the UE to be relocated. This UE must be registered or connected to this MME.

new-guti mme-group-id group_id

The group to which the target MME belongs.

grp_id :
  • Beginning with Releases 16.5, 17.4, and 18.2 and forward, the valid range for mme group id is an integer from 0 through 65536.
  • Previous releases, the valid range for mme group id is an integer from 32768 through 65536.

mme-code mme_code

The target MME to which this UE should be attached.

mme_code : The unique identifier for the target MME; must be an integer from 0 through 255.

m-tmsi mtmsi

The new GUTI MME-TMSI for this UE.

mtmsi : An integer from 0 through 4294967295.

Usage Guidelines

MME uses this configuration to relocate UEs to a different MME using IMSI, mme-group-id, mme-code and m-tmsi.

mme reset

Sends an S1 RESET message to a designated eNodeB to reset all UE-associated S1 connections.

Product

MME

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

mme reset s1-peer  peer_ID  

s1-peer peer-ID

Specifies an existing eNodeB peer ID to which the REST message is to be sent as an integer from 1 through 4294967295.

Usage Guidelines

Use this command to send an S1 RESET message to a designated eNodeB to reset all UE-associated S1 connections.

The S1 peer ID for an eNodeB can be identified by executing the show mme-service enodeb-association command available in this mode. The peer ID is presented in the "Peerid" field.

Example

The following command initiates the sending of an S1-peer reset message to an eNodeB with a peer ID of 22315734 :
mme reset s1-peer 22315734  

monitor interface

Enables monitoring of traffic on a particular interface.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

monitor interface  if_name 

if_name

Specifies the name of the interface to be monitored as an alphanumeric string of 1 through 79 characters.

Usage Guidelines

Use this command to monitor the traffic on a specified interface.

Example

This command monitors the traffic on the interface named if1001 :
monitor interface if1001  

monitor protocol

Enters the system's protocol monitoring utility.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

monitor protocol  

Usage Guidelines

Useful for troubleshooting, this command provides a tool for monitoring protocol transactions between the system and other network nodes including the mobile station(s).

The following protocols can be monitored:
  • SNMP

  • RADIUS Authentication

  • RADIUS Accounting

  • A11 (R-P Interface) (PDSN only)

  • Mobile IPv4

  • A11MGR

  • PPP

  • A10

  • User L3 (User Layer 3 protocols)

  • USERTCP STACK

  • L2TP

  • L2TPMGR

  • L2TP Data

  • GTPC

  • GTPCMGR

  • GTPU

  • GTPP


    Important

    If the hard disk drive (HDD) is used for CDR storage, the CDR option must be used and not the GTPP option (27).


  • DHCP (GGSN only)

  • CDR

  • DHCPV6

  • RADIUS COA

  • MIP Tunnel

  • L3 Tunnel (Layer 3 Tunnel Protocols)

  • CSS Data

  • CSS Signaling


    Important

    In StarOS 9.0 and later releases the CSS Data Signaling option is not supported.


  • EC Diameter (Diameter Enhanced Charging)

  • SIP (IMS)

  • IPSec IKE Inter-Node

  • IPSec IKE Subscriber

  • IPSG RADIUS Signal

  • ROHC (Robust Header Compression)

  • WiMAX R6

  • WiMAX Data

  • SRP

  • BCMCS SERV AUTH

  • RSVP

  • Mobile IPv6

  • ASNGWMGR

  • STUN

  • SCTP: Enabling this option will display the SCTP protocol message packets on HNB-GW node.


    Important

    In Release 20 and later, HNBGW is not supported. For more information, contact your Cisco account representative.
  • M3UA

  • SCCP

  • TCAP

  • MAP

  • RANAP

  • GMM

  • GPRS-NS

  • BSSGP

  • CAP

  • SSCOP

  • SSCFNNI

  • MTP3

  • LLC

  • SNDCP

  • BSSAP+

  • SMS

  • PHS-Control (Payload Header Compression)

  • PHS-Data

  • DNS Client

  • MTP2

  • HNBAP: Enabling this option will display the HNB Application Part (HNBAP) protocol packets.


    Important

    In Release 20 and later, HNBGW is not supported. For more information, contact your Cisco account representative.
  • RUA: Enabling this option will display the RANAP User Adaptation (RUA) protocol packets.

  • EGTPC

  • App Specific Diameter: Enabling this option will display the following sub-options —

    • 1 - DIABASE (OFF )

    • 2 - DIAMETER Gy (OFF )

    • 3 - DIAMETER Gx/Ty/Gxx (OFF )

    • 4 - DIAMETER Gq/Rx/Tx (OFF )

    • 5 - DIAMETER Cx (OFF )

    • 6 - DIAMETER Sh (OFF )

    • 7 - DIAMETER Rf (OFF )

    • 8 - DIAMETER EAP/STa/S6a/S6d/S6b/S13/SWm (OFF )

    • 9 - DIAMETER HDD (OFF )

  • PHS-EAPOL

  • ICAP

  • Micro-Tunnel

  • ALCAP: Enabling this option will display the Access Link Control Application Part (ALCAP) protocol message packets on HNB-GW node.


    Important

    In Release 20 and later, HNBGW is not supported. For more information, contact your Cisco account representative.
  • SSL

  • S1-AP

  • NAS

  • LDAP

  • SGS

  • AAL2: Enabling this option will display the ATM Adaptation Layer 2 (AAL2) protocol message packets on HNB-GW node.


    Important

    In Release 20 and later, HNBGW is not supported. For more information, contact your Cisco account representative.
  • PHS (Payload Header Suppression)

  • PPPOE

  • RTP (IMS)

  • RTCP (IMS)

  • LMI

  • NPDB (IMS)

  • SABP (Femto-UMTS)

  • OCSP (X.509)

Once the protocol has been selected by entering its associated number, the utility monitors and displays every relative protocol message transaction.

Protocol monitoring is performed on a context-by-context-basis. Therefore, the messages displayed are only those that are transmitted/received within the system context from which the utility was executed.

For additional information on using the monitor utility, refer to the System Administration Guide.


Caution

Protocol monitoring can be intrusive to subscriber sessions and could impact system performance. Therefore, it should only be used as a troubleshooting tool.


Example

The following command opens the protocol monitoring utility for SIP (IMS) = 37 :
monitor protocol 37  

monitor subscriber

Enables the system's subscriber monitoring utility. Available keywords vary based on the licenses installed on the system.

Product

All

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

monitor subscriber [  asn-peer-address  bs_peer_address  |  callid  call_id  fng-peer-address  ipv4_address |  global-enb-id   global-enb-id  | imei  imei_value | imsi  imsi_value | ipaddr  ip_address | ipv6addr  ipv6_address | ipsg-peer-address  ipsg_peer_address| msid  ms_id  | msisdn  msisdn | next-call  | pcf   pcf_address | pdif-peer-address  pdif_peer_address | peer-fa  peer_fa_address | peer-lac  lac_peer_address | sgsn-address  sgsn_address | type { 1xrtt |  asngw | asnpc |  closedrp | evdorev0 | evdoreva |  interrogating-cscf |  ggsn [ Next-Call By APN ] |  ha | ipsg | lns |  mme |  pdif  | proxy-cscf | rfc3261-proxy | serving-cscf  } next-call |  type bcmcs { next-call | next-service-request } | username  user_name  | Next-Call By APN ]  

asn-peer-address bs_peer_address

Specifies the peer ASN Base Station IP address in IPv4 address in dotted-decimal notation.

callid call_id

Specifies the call identification number assigned to the subscriber session by the system to be monitored as a 4-byte hexadecimal number.

fng-peer-address ipv4_address

Specifies the specific FNG WLAN IP address in IPv4 dotted-decimal notation.

global-enb-id global-enb-id

Specifies the Global eNodeB ID. This must be followed by MCC-MNC-eNBType-eNBID.

MCC consists of 3 digits.

MNC consists of 2 or 3 digits.

eNBType is 0 for Macro and 1 for Home.

eNBID has max 1048575 for MACRO eNB and max 268435456 for Home eNB.

imei imei_value

International Mobile Equipment Identification (IMEI). Must be followed by 8 digits of TAC (Type Allocation Code) and 6 digits of SNR (Serial Number). Only the first 14 digit of IMEI/IMEISV is used to find the equipment ID.

imsi imsi_value

Specifies the International Mobile Subscriber Identity (IMSI) of the subscriber session to be monitored an integer from 1 though 15 characters.

ipaddr ip_address

Specifies the IP address of the subscriber session to be monitored in IPv4 dotted-decimal notation.

ipv6addr ipv6_address

Specifies the IPv6 address of the subscriber session to be monitored in IPv6 colon-separated-hexadecimal notation.

ipsg-peer-address ipsg_peer_address

Specifies the peer IPSG IP address. Must be followed by an IPv4 address in dotted -decimal notation.

msid ms_id

Specifies the mobile subscriber identification number to be monitored as 7 to 16 digits of an IMSI, MIN, or RMI.

msisdn msisdn

Specifies the Mobile Subscriber ISDN number to be monitored as 7 to 16 digits of an IMSI, MIN, or RMI.

next-call

Specifies that the system will monitor the next incoming subscriber session.

Entering this keyword will display the available options of protocols to select. For a list of supported protocols with this keyword, refer to the monitor protocol command.

pcf pcf_address

Specifies the PCF IP address in IPv4 dotted-decimal notation.

pdif-peer-address pdif_peer_address

Specifies the peer PDIF IP address in IPV4 dotted-decimal notation.

peer-fa peer_fa_address

Specifies the peer FA IP address in IPv4 dotted-decimal notation.

peer-lac lac_peer_address

Specifies the peer LAC IP address in IPv4 dotted-decimal notation.

sgsn-address sgsn_address

Specifies the SGSN IP address in IPv4 dotted-decimal notation.

type { 1xrtt | asngw | asnpc | bcmcs { next-call | next-service-request } closedrp | evdorev0 | evdoreva | | fng | interrogating-cscf | ggsn [ Next-Call By APN ] | ha | ipsg | lns | mme | openrp | pdif | pgw | proxy-cscf | rfc3261-proxy | saegw | serving-cscf } next-call [ apn apn ]

Allows monitoring for specific subscriber types established in the system when next call occurs.
  • 1xrtt: Displays logs for cdma2000 1xRTT call session subscriber

  • asngw: Displays logs for ASN-GW call session subscriber

  • asnpc: Displays logs for ASN PC/LR call session subscriber

  • bcmcs: Displays logs for Broadcast and Multicast Service

  • closedrp: Displays logs for cdma2000 Closed-RP call session subscriber

  • evdorev0: Displays logs for cdma2000 EVDO Rev0 call session subscriber

  • evdoreva: Displays logs for cdma2000 EVDO RevA call session subscriber

  • fng: Displays logs for the FNG session subscriber

  • interrogating-cscf: Displays logs for Interrogating CSCF subscriber

  • ggsn: Displays logs for UMTS GGSN call session subscriber

  • Next-Call By APN: Display logs for next call on APN basis, where APN name can be any Gi or Gn APN.

  • ha: Displays logs for Home Agent call session subscriber

  • ipsg: Displays logs for IPSG call session subscriber

  • lns: Displays logs for LNS call session subscriber

  • mme: Displays logs for MME session subscribers.

  • openrp: Displays logs for OpenRP subscriber

  • pgw: Displays logs for P-GW call session subscriber

  • pdif: Displays logs for PDIF call session subscriber

  • proxy-cscf: Displays logs for Proxy CSCF subscriber

  • rfc3261-proxy-cscf: Displays logs for non-ims-proxy (RFC-3261 proxy) subscriber

  • saegw: Displays logs for SAEGW call session subscriber

  • serving-cscf: Displays logs for Serving CSCF subscriber

username user_name

Specifies the username of an existing subscriber to be monitored.

Usage Guidelines

The monitor subscriber utility provides a useful tool for monitoring information about and the activity of either a single subscriber or all subscribers with active sessions within a given context.


Caution

The monitor subscriber command is intended for system debugging only. This command is complementary to external tracing systems and not meant as a replacement for ongoing external system monitoring.


The following items can be monitored:
  • Control events

  • Data events

  • Event ID information

  • Inbound events

  • Outbound events

  • Protocols (identical to those monitored by command)

Once the criteria has been selected, the utility will monitor and display every relative piece of information on the subscriber(s).

For additional information on using the monitor utility, refer to the System Administration Guide.


Important

Option Y for performing multi-call traces is only supported for use with the GGSN. This option is available when monitoring is performed using the "Next-Call" option. It allows you monitor up to 11 primary PDP contexts for a single subscriber.


Subscriber monitoring is performed on a context-by-context-basis. Therefore, the information displayed will be only that which is collected within the system context from which the utility was executed.


Caution

Subscriber monitoring can be intrusive to subscriber sessions and could impact system performance; therefore, it should only be used as a troubleshooting tool.


Example

The following command enables monitoring for user user1 .
monitor subscriber username user1  
The following command will enable monitoring for the user assigned IP address 10.2.3.4 .
monitor subscriber ip-address 10.2.3.4  
The following enables monitoring for call ID FE80AA12 .
monitor subscriber callid fe80aa12  

newcall policy

Configures new call policies for busy-out conditions.

Product

ASN-GW

ASN PC/LR

ePDG

GGSN

HA

HNB-GW

IPCF

LNS

MME

PDSN

P-GW

S-GW

SAEGW

SaMOG

SGSN

Privilege

Security Administrator, Administrator, Operator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

newcall policy { asngw-service | asnpc-service | ePDG-service | sgsn-service } { all | name   service_name } reject  

newcall policy { fa-service | lma-service | lns-service | mipv6ha-service } { all | name  service_name } reject  
newcall policy ggsn-service { apn name  apn_name | all | name  service_name } reject  [ release-existing-session ]  
newcall policy { ha-service | pdsn-service   | pdsnclosedrp-service  } { all | name  service_name } { redirect  target_ip_address [ weight  weight_num ] [  target_ipaddress2 [ weight  weight_num ] ...  target_ip_address16 [ weight  weight_num ] | reject }  
newcall policy hnbgw-service { all | name  service_name } reject  
newcall policy mme-service { all | name  service_name } reject  
newcall policy { pcc-af-service | pcc-policy-service  } { all | name  service_name } reject  
newcall policy pgw-service { all  | apn name  apn_name | name  service_name } reject  [ release-existing-session ]  
newcall policy saegw-service { all | name  service_name } reject  [ release-existing-session ]  
newcall policy sgw-service { all | name  service_name } reject  [ release-existing-session ]  
newcall policy samog-service { all | name  service_name } drop  

no newcall policy { asngw-service | asnpc-service | epDG-Service } { all | name  service_name  }  
no newcall policy { fa-service | ggsn-service | ha-service | lma-service | lns-service | mipv6ha-service | pdsn-service| pdsnclosedrp-service } { all | name  service_name }  
no newcall policy ggsn-service { apn  apn_name | all | name  service_name }  
no newcall policy { ha-service | pdsn-service } { all | name  service_name } redirect  target_ip_address [ weight weight_num ] [  target_ip_address2 [ weight   weight_num ] ...  target_ip_address16 [ weight weight_num ]  
no newcall policy hnbgw-service { all | name  service_name }  
no newcall policy mme-service { all | name  service_name }  
no newcall policy { pcc-af-service | pcc-policy-service  } { all | name  service_name }  
no newcall policy pgw-service { all  | apn name  apn_name | name  service_name }  
no newcall policy saegw-service { all | name  service_name }  
no newcall policy sgw-service { all | name  service_name }  
no newcall policy samog-service { all | name  service_name }  

no

Disables the new call policy for all or specified service of a service type.

no newcall policy { ha-service | pdsn-service } { all | name service_name } redirect target_ip_address [ weight weight_num ] [ target_ip_address2 [ weight weight_num ] ... target_ip_address16 [ weight weight_num ]

Deletes up to 16 IP addresses from the redirect policy. The IP addresses must be expressed in IPv4 dotted-decimal notation

newcall policy { asngw-service | asnpc-service | epDG-service } { all | name service_name } reject

Creates a new call policy to reject the calls based on the specified ASN-GW or ASN PC/LR service name or all services of this type.

asngw-service : Specifies the type of service as ASN GW for which new call policy is configured.

asnpc-service : Specifies the type of service as ASN PC/LR for which new call policy is configured.

epDG-service : Specifies the type of service as ePDG for which new call policy is configured.

name service_name : Specifies the name of the service for which new call policy is configured. service_name is name of a configured ASN GW or ASN PC/LR service.

reject : Specifies that the policy rejects new incoming calls. Depending on the type of service that the policy is applied to, the reason codes are reported as part of the reply to indicate the rejection. For ASN-GW and ASN PC/LR service rejection code is 81H (Registration Denied - administratively prohibited).

newcall policy { fa-service | lma-service | lns-service | mipv6ha-service } { all | name service_name } reject

Creates a new call policy that rejects calls based on the specified access point name.

fa-service | ha-service | lma-service | lns-service | mipv6ha-service | mme-service | pdsn-service | pdsnclosedrp-service

Specifies the type of service for which to configure a new call policy. The following services are supported:
  • fa-service : A Foreign Agent service

  • ha-service : A Home Agent service

  • lma-service : A Local Mobility Anchor (LMA) service

  • lns-service : An L2TP Network Server service

  • mipv6ha-service : A Mobile IPv6 Home Agent service

  • pdsn-service : A Packet Data Serving Node service

  • pdsnclosedrp-service : A Closed R-P service

{ all | name service_name }

Specifies a filter for the new call policy. Whether the new call policy will be applied to all configured services or a specific one.
  • all : Specifies that the new call policy will be applied to all instances of the selected service type.

  • name : service_name : Specifies the name of a specific instance of the selected service type as an alphanumeric string of 1 through 63 characters that is case sensitive.

redirect target_ip_address [ weight weight_num ] [ target_ip_address2 [ weight weight_num ] ... target_ip_address16 [ weight weight_num ]

Configures the busy-out action. When a redirect policy is invoked, the service rejects new sessions and provides the IP address of an alternate destination. This command can be issued multiple times.

target_ip_address# is the IP address of an alternate destination expressed in IPv4 dotted-decimal notation. Up to 16 IP addresses can be specified either in one command or by issuing the redirect command multiple times. If you try to add more than 16 IP addresses to the redirect policy the CLI issues an error message. If you specify an IP address and weight that already exists in the redirect policy the new values override the existing values.

weight weight_num : When multiple addresses are specified, they are selected in a weighted round-robin scheme. Entries with higher weights are more likely to be chosen. If a weight is not specified the entry is automatically assigned a weight of 1. weight_num must be an integer from 1 through 10.

Depending on the type of service that the policy is applied to, the following reason codes are reported as part of the reply:
  • ha service: 88H (Registration Denied - unknown home agent address)

  • pdsn service: 88H (Registration Denied - unknown PDSN address)


Important

The redirect option is not supported for use with FA and GGSN services.


reject

Specifies that the policy rejects new incoming calls. Depending on the type of service that the policy is applied to, the following reason codes are reported as part of the reply to indicate the rejection:
  • asngw service: 81H (Registration Denied - administratively prohibited)

  • fa service: 41H (administratively prohibited)


Important

When newcall policy is set to reject for the FA service, the Busy Bit is set in the Agent Advertisement. Any further RRQs will be rejected with this code value.


  • ggsn service: C7H (Rejected - no resources available)

  • ha service: 81H (Registration Denied - administratively prohibited)

  • mipv6ha-service: 81H (Registration Denied - administratively prohibited)

  • mme service: 81H (Registration Denied - administratively prohibited)

  • pdsn service: 81H (Registration Denied - administratively prohibited)

  • pdsnclosedrp-service : 81H (Registration Denied - administratively prohibited)

newcall policy hnbgw-service { all | name service_name } reject


Important

In Release 20 and later, HNBGW is not supported. This command must not be used for HNBGW in Release 20 and later. For more information, contact your Cisco account representative.


Creates a new call policy to reject the calls in a specified HNB-GW service name instance or all HNB-GW services on the system.

name service_name : Specifies the name of the HNB-GW service for which new call policy is configured.

reject : Specifies that the policy rejects all new incoming calls. Depending on the type of service that the policy is applied to, the reason codes are reported as part of the reply to indicate the rejection. For HNB-GW service rejection code is 81H (Registration Denied - administratively prohibited).

newcall policy mme-service { all | name service_name } reject

Creates a new call policy to reject the calls based on the specified MME service name or all MME services on the system.

name service_name : Specifies the name of the MME service for which new call policy is configured.

reject : Specifies that the policy rejects new incoming calls. Depending on the type of service that the policy is applied to, the reason codes are reported as part of the reply to indicate the rejection. For MME service rejection code is 0x16 (Registration Denied - administratively prohibited).

newcall policy { pcc-af-service | pcc-policy-service | pcc-quota-service} { all | name service_name } reject

Creates a new call policy to reject the calls for PCC services on the system for any of the following PCC services:

  • pcc-af-service name service_name : Specifies the Policy and Charging Control-Application Function (PCC-AF) service for which new call policy is to be configured on the system.

    name service_name : Specifies the name of an existing PCC-AF service for which new call policy is configured.

  • pcc-policy-service name service_name : Specifies the Policy and Charging Control-Policy (PCC-Policy) service for which new call policy is to be configure on the system.

    name service_name : Specifies the name of an existing PCC-Policy service for which new call policy is configured.

reject : Specifies that the policy rejects new incoming calls. Depending on the type of service that the policy is applied to, the reason codes are reported as part of the reply to indicate the rejection. For PCC services rejection code is 81H (Registration Denied - administratively prohibited).

newcall policy pgw-service { all | apn name apn_name | name service_name } reject [ release-existing-session ]

Creates a new call policy to reject the calls based on the specified P-GW service name, APN name, or all P-GW services (and any SAEGW service associated with the P-GW service) in this context .

all : Rejects all P-GW services on the system. Specifies that the new call policy will be applied to all instances of the P-GW service, and any associated SAEGW service, in this context.

apn apn_name : Specifies the name of the APN, and any associated P-GW/SAEGW service, for which new call policy is configured.

name service_name : Specifies the name of the P-GW service, and any SAEGW service associated with this P-GW service, for which new call policy is configured.

reject : Specifies that the policy rejects new incoming calls. Depending on the type of service that the policy is applied to, the reason codes are reported as part of the reply to indicate the rejection.

release-existing-session : All the pre-existing sessions across all eGTP/GTP services for that IMSI/IMEI will be released gracefully. Without this keyword, the receiving node rejects the CSReq without considering the existing sessions for that IMSI/IMEI, which may lead to junk sessions. Disabled by default.

newcall policy saegw-service { all | name service_name } reject [ release-existing-session ]

Creates a new call policy to reject the calls based on the specified SAEGW service name or all SAEGW services on the system.

name service_name : Specifies the name of the SAEGW service for which new call policy is configured.

reject : Specifies that the policy rejects new incoming calls. Depending on the type of service that the policy is applied to, the reason codes are reported as part of the reply to indicate the rejection.

release-existing-session : All the pre-existing sessions across all eGTP/GTP services for that IMSI/IMEI will be released gracefully. Without this keyword, the receiving node rejects the CSReq without considering the existing sessions for that IMSI/IMEI, which may lead to junk sessions. Disabled by default.

newcall policy sgw-service { all | name service_name } reject [ release-existing-session ]

Creates a new call policy to reject the calls based on the specified S-GW service name or all S-GW services on the system.

name service_name : Specifies the name of the S-GW service for which new call policy is configured.

reject : Specifies that the policy rejects new incoming calls. Depending on the type of service that the policy is applied to, the reason codes are reported as part of the reply to indicate the rejection.

release-existing-session : All the pre-existing sessions across all eGTP/GTP services for that IMSI/IMEI will be released gracefully. Without this keyword, the receiving node rejects the CSReq without considering the existing sessions for that IMSI/IMEI, which may lead to junk sessions. Disabled by default.

newcall policy samog-service { all | name service_name } drop

Creates a new call policy to drop calls based on the specified SaMOG service name or all SaMOG services on the system. By default, this configuration is disabled.

name service_name : Specifies the name of the SaMOG service for which new call policy is configured. service_name must be an alphanumeric string of 1 through 63 characters.

drop : Specifies the policy to drop new incoming calls. When the retries are exhausted, the AP/WLC attempt session creation on alternate SaMOG services connected to the AP/WLC.

Usage Guidelines

This command is used to busy-out specific system services prior to planned maintenance or for troubleshooting. This is required when operator find out that the system is somehow overloaded, or needs some kind of maintenances or so.

Example

The following command creates a new call policy to re-direct all new calls for all PDSN services to a device having an IP address of 192.168.1.23 :
newcall policy pdsn-service all redirect 192.168.1.23  
The following command creates a new call policy to reject all new calls for a GGSN service called ggsn1 :
newcall policy ggsn-service name ggsn1 reject  
The following command creates a new call policy to reject all new calls for an MME service called MME1 :
newcall policy mme-service name MME1 reject  
The following command creates a new call policy to reject all new calls for an HNB-GW service called hnbgw1 :
newcall policy hnbgw-service name hnbgw1 reject  
The following command creates a new call policy to reject all new calls for a PCC Policy service called pcrf1 :
newcall policy pcc-policy-service name pcrf1 reject  

The following command creates a new call policy to drop all new calls for the SaMOG service:

newcall policy samog-service all drop  

password change

Provides a mechanism for local-user administrative users to change their passwords.

Product

All

Privilege

All local-user administrative levels except as noted below

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

password change [ local-user  name ]  

local-user name

Specifies the name of an existing local-user administrative user for which to change the password as an alphanumeric string of 3 through 144 characters that is case sensitive.


Important

This keyword is only available to local-users with an authorization level of security-administrator.


Usage Guidelines

This command provides a mechanism for local-user administrative users to change their passwords. In addition, it also provides a mechanism for security-administrator local-users to change the password for other local-user accounts.

If the local-user keyword is not entered, the system prompts the user for their current password and for the new password. New passwords take effect at the next login. Users that have had their password changed by a security-administrator are prompted to change their passwords at their next login.

New passwords must meet the criteria dictated by the local-user password command options in the Global Configuration Mode.


Important

The system does not allow the changing of passwords unless the time limit specified by the local-user password min-change-interval has been reached.


Example

The following command, executed by a security-administrator, resets the password for a local-user name operator12 :
password change local-user operator12  

patch plugin

Copies a patch intended for a specific plugin module onto the system. This function is associated with the patch process for accommodating dynamic software upgrades.

Product

ADC

Privilege

Security Administrator, Administrator

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

patch plugin  plugin_name filepath certificate  filepath 

plugin_name

Specifies the name of an existing plugin that will be copied onto the system as an alphanumeric string of 1 through 16 characters.

certificate

Specifies the name of a certificate associated with the plugin that will be copied onto the system as an alphanumeric string of 1 through 16 characters.

filepath

Specifies the location of the file to copy. The path must be formatted as follows:

For the ASR 5000:
[ file: ]{ /flash | /pcmcia1 | /hd }[ / directory ]/ file_name 

Important

Use of the ASR 5000 SMC hard drive is not supported in this release.


For the ASR 5500:
[ file: ]{ /flash | /usb1 | /hd }[ / directory ]/ file_name 
For VPC:
[ file: ]{ /flash | /hd-raid | /usb1 | usb2 | /cdrom1 }[ / directory ]/ file_name 

Important

The USB ports and CDROM must be configured via the hypervisor to be accessible.



Important

Do not use the following characters when entering a string for the field names below: "/" (forward slash), ":" (colon) or "@" (at sign).


directory is the directory name.

filename is the actual file of interest.

Usage Guidelines

Use this command to verify and copy a patch onto the system. After the patch has been copied onto the system, you must run the install plugin command to unpack the kit and validate its contents.

Example

To copy the plugin module named p2p onto the system enter the following command:
patch plugin p2p http://192.168.1.2/tmp/libp2p-1.2.0.tgz certificate http://192.168.1.2/tmp/1.2.0.cert  
When the patch has been successfully copied the following message appears:
New patch for plugin p2p available for installation 

ping

Verifies ability to communicate with a remote node in the network by passing data packets between and measuring the response. This is accomplished by sending IPv4 Internet Control Message Protocol (ICMP) echo request packets to the target node (pinging) and waiting for an ICMP response.

Product

All

Privilege

Security Administrator, Administrator, Operator, Inspector

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Important

Inspector privileges are granted for all variables except count. To initiate a ping count, you must have a minimum privilege level of Operator.


Syntax

ping (  hostname |  ip_address } [ broadcast ] [ count  num_packets ] [ df-bit { off | on }  ] [ dscp  dscp_value ] [ flood  ] [ pattern  packet_pattern ] [ size  octet_count ] [ src {  src_host_name |  src_host_ip_address } ]  [ vrf  vrf_name    

hostname

Sends ICMP echo request packets to the remote node specified the node's name (up to 127 alphanumeric characters) or assigned IPv4 address in dotted-decimal notation.

ip_address

IPv4 address of host to be pinged in dotted-decimal notation.

broadcast

Sends ping packets to broadcast addresses.

count num_packets

Specifies the number of packets to send to the remote host for verification as an integer from 1 through 10000. Default: 5

df-bit { off | on }

Specifies whether or not the do-not-fragment bit will be included in the IP header.

dscp dscp_value

Specifies the 6-bit DSCP value as an integer from 0 through 63. Default: 0. The DSCP value must be previously mapped to an internal-class-of-service value using the Global Configuration mode qos ip-dscp-iphb-mapping command.

flood

Sends ping packets as rapidly as possible or 100 per second, whichever is faster.


Important

Use with caution. Flood ping terminates after receiving (count) responses. If flood ping is used against an interface that is not responding, it will run indefinitely


pattern packet_pattern

Specifies a pattern to use to fill the internet control message protocol packets in hexadecimal format with a value in the range of 0x0000 through 0xFFFF. By default each octet of the packet is encoded with the octet number of the packet.

size octet_count

Specifies the number of bytes in each IP datagram as an integer from 40 through 18432. Default: 56

src host_ip_address

Specifies the source IP address in IPv4 dotted-decimal notation.Default: originating system's IP address

vrf vrf_name

Specifies the VRF name for which routing information will be displayed. vrf_name is an alphanumeric string of 1 through 63 characters.

Usage Guidelines

This command is useful in verifying network routing and if a remote node is able to respond at the IPv4 layer.

Example

The following command is the most basic and will report the results of trying to communication with remote node remoteABC .
ping remoteABC  
The following command verifies communication with the remote node 10.2.3.4 using 1000 packets.
ping 10.2.3.4 count 1000  
The following command verifies communication with remote node remoteABC while making it appears as though the source is remote node with IP address 10.2.3.4 .
ping remoteABC src 10.2.3.4  

Important

The responses from the remote host to the ping packets will be rerouted to the host specified as the source.


ping6

Verifies ability to communicate with a remote node in the network by passing data packets between and measuring the response. This is accomplished by sending IPv6 Internet Control Message Protocol (ICMP) echo request packets to the target node (pinging) and waiting for an ICMP response.

Product

All

Privilege

Security Administrator, Administrator, Operator, Inspector

Mode

Exec

The following prompt is displayed in the Exec mode:

[local]host_name# 

Syntax

ping6 {  hostname |  ipv6_address } [ count  num ] [ dscp  dscp_value ] [ flood  ] [ interface  interface_name ] [ pattern  val ] [ size  val ] [ src  ip_address ] [ vrf  vrf_name 

host_name

Name of the host to be pinged.

ipv6_address

IPv6 address of host to be pinged in colon-separated-hexadecimal notation.

count num

Sets the number of ping packets to be sent as an integer from 1 through 10000. </