簡介
本文檔是使用Catalyst 9800列出各種歷史事件的快速參考指南。利用9800平台永遠線上的日誌記錄功能,只要您知道特定的日誌行看起來如何,您就可以快速輕鬆地列出特定型別的事件。
結構
本文圍繞使用「show logging profile wireless」命令進行展開,該命令主要通過所有與無線相關的二進位制日誌(始終開啟,即使沒有啟用任何形式的活動調試)來完成。
「start last <time period>」允許返回到日誌中的某個時間段。
如果不使用管道限制搜尋,該命令將在終端上輸出大量資料,這就是下列所有示例將管道用於特定事件的原因。
使用者端
列出已成功進行身份驗證的客戶端:
myc9800-CL#show logging profile wireless start last 10 days | i Authentication Success
2020/09/26 16:41:21.397677 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:04:33.523999 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client d280.eb73.6044
2020/09/26 17:21:59.892585 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:32:09.289109 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:41:58.123180 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 64b5.c66d.13ac
列出獲得成功IP地址的客戶端:
myc9800-CL#show logging profile wireless start last 10 days | i IP learn successful
2020/09/26 16:41:30.621520 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: DHCP IP: 192.168.1.13
2020/09/26 17:04:37.622905 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: d280.eb73.6044 Client IP learn successful. Method: IP Snooping IP: 192.168.1.36
2020/09/26 17:22:03.830465 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: IP Snooping IP: 192.168.1.13
2020/09/26 17:32:09.966598 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: IP Snooping IP: 192.168.1.13
2020/09/26 17:33:30.236544 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 3cf7.a4ae.f607 Client IP learn successful. Method: IP Snooping IP: 192.168.1.49
RRM
管道更改
9800# show logging profile wireless | include history-channel
2020/02/13 10:50:03.297 {wncd_x_R0-0}{2}: [radio-history-channel] [24955]: (note): Channel change for AP5c83.8f6e.4250 Slot:1 Band:802.11a Previous Chan:100 Current Chan:132 chan width: 40 Reason: DCA Algorithm
雜訊和干擾值
以下內容需要設定「set platform software trace wireless chassis active r0 rrm rrm-client-dca info」以在日誌中顯示該資訊:
9800#show logging profile wireless start last x hours| include rrm-client-dca
2020/06/26 15:44:08.636988 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11a) Channel set request: on cell to channel 40 from 40 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,127) to (-128,-128,127) Reason: 0x1 for slot id: 1
2020/06/26 15:44:08.640828 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11bg) Channel set request: on cell to channel 6 from 1 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-77,-35,-35) to (-66,-58,-57) Reason: 0x4 for slot id: 0
2020/06/26 15:54:18.671638 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11a) Channel set request: on cell to channel 40 from 40 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,127) to (-128,-128,127) Reason: 0x1 for slot id: 1
2020/06/26 15:54:18.673055 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11bg) Channel set request: on cell to channel 6 from 6 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,-58) to (-128,-128,-58) Reason: 0x1 for slot id: 0
DCA演算法正在運行
9800-17#show logging profile wireless start last boot | i Running DCA Algo
2020/02/14 16:23:09.177 {rrm_bg_R0-0}{1}: [rrm-mgr-dca] [22117]: (note): (Radio: 802.11a) Running DCA Algorithm