Table Of Contents
show statistics udp
show statistics url-filter
show statistics wccp
show statistics wmt
show sysfs
show tacacs
show tcp
show tech-support
show telnet
show tftp-server
show transaction-logging
show tvout
show url-filter
show user
show users
show version
show wccp
show websense-server
show wmt
shutdown (interface configuration)
shutdown (EXEC)
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server location
snmp-server mib
snmp-server notify inform
snmp-server user
snmp-server view
speed
sshd
ssh-key-generate
standby
tacacs
2
show statistics udp
To display Content Engine User Datagram Protocol ( UDP) statistics, use the show statistics udp EXEC command.
show statistics udp
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Examples
Table 2-155 describes the fields shown in the show statistics udp display.
Table 2-155 show statistics udp Field Descriptions
Field
|
Description
|
UDP Statistics
|
Packets received
|
Total number of UDP packets received.
|
Packets to unknown port received
|
Number of packets to unknwn ports received.
|
Packet receive error
|
Number of packet recieve errors.
|
Packet sent
|
Number of UDP packets sent.
|
show statistics url-filter
To display Content Engine URL filtering statistics, use the show statistics url-filter EXEC command.
show statistics url-filter {http {local-list | N2H2 | websense}| rtsp local-list | wmt local-list}
Syntax Description
http
|
Displays URL filtering statistics for HTTP.
|
local-list
|
Displays URL filtering statistics for the HTTP local list.
|
N2H2
|
Displays URL filtering statistics for HTTP N2H2.
|
websense
|
Displays URL filtering statistics for HTTP Websense.
|
rtsp
|
Displays URL filtering statistics for RTSP.
|
local-list
|
Displays URL filtering statistics for the RTSP local list.
|
wmt
|
Displays URL filtering statistics for WMT.
|
local-list
|
Displays URL filtering statistics for the WMT local list.
|
Defaults
No default behavior or values
Command Modes
EXEC
Examples
Table 2-156 describes the fields shown in the show statistics url-filter http n2h2 display.
Table 2-156 show statistics url-filter http n2h2 Field Descriptions
Field
|
Description
|
Lookup requests transmitted
|
Number of URL filtering requests sent by the Content Engine to the N2H2 server to perform necessary lookups for the URL.
|
Lookup response received
|
Number of URL filtering requests sent by the Content Engine to the N2H2 server for which responses were received after the N2H2 server performed necessary lookups for the URL.
|
Requests timed out
|
Number of URL filtering requests sent by the Content Engine to the N2H2 server that timed out while waiting for the maximum amount of time for a response from the N2H2 server.
|
Number of retransmits
|
Number of URL filtering requests retransmitted by the Content Engine to the N2H2 server to perform necessary lookups for the URL.
|
Requests BLOCKed by N2H2
|
Number of request URLs blocked by the N2H2 server. The Content Engine blocks the HTTP request by redirecting the browser to a page where a blocking message is displayed.
|
Requests OKed by N2H2
|
Number of request URLs served by the N2H2 server.
|
No available connection
|
Number of times that the Content Engine could not establish a connection with the N2H2 server to send an IFP request.
|
Error sending lookup requests
|
Number of times that an error occurred when the Content Engine sent an IFP request to the N2H2 server to perform lookups for the URL from the server database.
|
Error recving lookup responses
|
Number of times that an error occurred when the Content Engine received an IFP response from the N2H2 after necessary lookups for the URL were performed.
|
Server error in responses
|
Number of times that an error occurred in the N2H2 server when it sent an IFP response.
|
Error in Filter Server
|
Number of errors that occurred in the filter server. The N2H2 server consults one among the many filter servers to make a filtering decision.
|
Error in IFP server
|
Number of errors that occurred in the IFP (N2H2) server.
|
Seq number mismatch
|
Number of responses received from the N2H2 server in which the data packets are out of sequence.
|
Multiple responses rcvd
|
Number of URL filtering requests sent by the Content Engine to the N2H2 server for which multiple responses were received after lookups.
|
Bad network endpoint
|
Number of times that the socket is invalid.
|
Network unreachable
|
Number of times that the Content Engine is unable to connect to the external N2H2 server. The server might not be functioning or network connectivity to the server is down.
|
Underlying connection broken
|
Number of times that the connection to the client or N2H2 server is broken.
|
Timeout specified is reached
|
Number of seconds (1-120) that the Content Engine waits for an IFP response from the N2H2 server before timing out the connection.
|
Register read cancelled
|
Number of times that the Content Engine canceled the read operation on the socket.
|
Other errors
|
Number of all other types of errors.
|
Number of xacts in Queue
|
Number of requests queued into a waiting queue after the maximum number of connections that the Content Engine makes with the N2H2 server has been reached. To prevent overloading the server, once the timeout expires, the requests from the waiting queue are blocked or served depending on the allowmode configuration.
|
Avg total process time
|
Average amount of time taken by the Content Engine to process the client requests for URL filtering.
|
Avg response time
|
Average amount of time taken to receive an IFP response from the N2H2 server.
|
Socket update count
|
Number of socket failures.
|
Table 2-157 describes the fields shown in the show statistics url-filter http websense display.
Table 2-157 show statistics url-filter http websense Field Descriptions
Field
|
Description
|
Websense URL Filtering Statistics
|
Status of whether URL filtering statistics is displayed for primary or secondary Websense servers.
|
Transmission statistics
|
Statistics regarding the requests and responses sent by the Content Engine and Websense server.
|
Lookup requests transmitted
|
Number of URL filtering requests sent by the Content Engine to Websense server to perform necessary lookups for the URL.
|
Lookup requests timed-out
|
Number of URL filtering requests sent by the Content Engine to Websense server that timed out while waiting for the maximum amount of time for a response from Websense server.
|
Lookup responses received
|
Number of URL filtering requests sent by the Content Engine to Websense server for which responses were received after Websense server performed necessary lookups for the URL.
|
Lookup responses received with error
|
Number of URL filtering requests sent by the Content Engine to Websense server for which erroneous responses were received.
|
Multiple response received
|
Number of URL filtering requests sent by the Content Engine to Websense server for which multiple responses were received after lookups.
|
Sequence number mismatch
|
Number of responses received from Websense server in which the data packets are out of sequence.
|
TCP errors
|
Statistics for the persistent TCP connection between the Content Engine and Websense server.
|
Connection reset
|
Number of times that the TCP connection between the Content Engine and Websense server was reset.
|
Connection timeout
|
Number of times that the TCP connection between the Content Engine and Websense server exceeded the maximum wait time for a response from Websense server.
|
Other errors
|
Number of times that errors other than reset and timeout occurred on the TCP connection between the Content Engine and Websense server.
|
Filter results
|
Websense URL filtering statistics.
|
Requests BLOCKed by Websense
|
Number of request URLs that are blocked by Websense server. If the Websense process blocks a URL, it sends a redirect URL to the user. The redirect URL is configured to print out the blocked page and policy for the user. The Websense process listens on this port to receive the pages blocked and serviced by a thread in Websense server. This thread sends the blocked page in response to the redirected request.
|
Requests OKed by Websense
|
Number of request URLs that are served by Websense server. By default, Websense server receives requests for the content filtering according to the Websense protocol on port 15868.
|
Sent to Allowmode ok
|
Number of times that client request URLs are served if the Content Engine has problems communicating with Websense server (the allowmode configuration is enabled).
|
Sent to Allowmode block
|
Number of times that client request URLs are blocked if the Content Engine has problems communicating with Websense server (the allowmode configuration is disabled).
|
desc_filtered_and_passed
|
Number of request URLs that are filtered and served by Websense server.
|
desc_category_blocked
|
Number of request URLs for a site that is listed in a blocked category in the Websense master database. If the site is listed in a blocked category, Websense displays a message alerting the user that the requested site is blocked and identifies the category under which it is blocked.
|
desc_category_not_blocked
|
Number of request URLs for a site that is not found in the master database or is listed in a permitted category. If the site is listed in a permitted category, access to the site is allowed.
|
desc_category_blocked_custom_deny
|
Number of requests for a custom URL to which access is denied by Websense server. The Websense custom URLs feature enables you to add sites to Websense that are not in the Websense master database and filter sites differently than their master database categories. Websense considers custom URLs before URLs in the master database and filters the site according to the category assigned to the custom URL.
|
desc_category_not_blocked_ custom_permit
|
Number of requests for a custom URL to which access is allowed by Websense server. Custom URLs/Recategorized are sites you want to filter differently than their master database categories (including sites classified under Miscellaneous/Uncategorized). When editing a custom URL list, you can select any category and add a URL to it. Websense then filters the site according to the filtering option set for that category.
|
Websense log statistics
|
Statistics about the logging of requests by Websense server.
|
Logs sent successfully
|
Number of times that Websense server sends the log information to Log Server.
Log entries contain the following information:
• Date and time a site was requested
• Category/yes list or keyword and protocol under which it was filtered
• User or workstation requesting the site
• URL and IP address of the requested site
• How the requested site was filtered
• Number of bytes contained in the requested site (called bytes transferred)
|
Connection error
|
Number of times that Websense server is unable to connect to Log Server. Log Server is installed with Reporter, a separate program available free with Websense Enterprise. Websense Enterprise Explorer also uses Log Server. With Log Server, Websense can save detailed log entries for all filtered Internet requests. Reporter can analyze the log entries and create reports of Internet activity in graphical or tabular format.
|
Common Statistics
|
Statistics common to primary and secondary Websense servers.
|
Error during log processing
|
Number of errors that occurred during the transmission of logs from Websense server to Log Server.
|
Log not complete
|
Number of entries in the log that are incomplete when transferred to Log Server.
|
Log not sent because Websense disabled
|
Number of times logs could not be sent to Log Server because Websense server was not enabled.
|
No available connection
|
Number of times when a connection could not be established between Websense server and Log Server.
|
Congestion statistics
|
Statistics about network congestion related to Websense URL filtering and logging of requests.
|
Pending requests
|
Number of requests that are pending to be processed by Websense server.
|
Pending log requests
|
Number of log requests that are pending to be transmitted from Websense server to Log Server.
|
Related Commands
clear statistics url-filter
show url-filter
url-filter
show statistics wccp
To display Content Engine WCCP statistics, use the show statistics wccp EXEC command.
show statistics wccp gre
Syntax Description
gre
|
Displays WCCP generic routing encapsulation packet-related statistics.
|
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
GRE is a Layer 3 technique that allows datagrams to be encapsulated into IP packets at the WCCP-enabled router and then redirected to a Content Engine (the transparent proxy server). At this intermediate destination, the datagrams are decapsulated and then routed to an origin server to satisfy the request if a cache miss occurs. In doing so, the trip to the origin server appears to the inner datagrams as one hop. Usually, the redirected traffic using GRE is referred to as GRE tunnel traffic. With GRE, all redirection is handled by the router software.
With WCCP redirection, a Cisco router does not forward the TCP SYN packet to the destination because the router has WCCP enabled on the destination port of the connection. Instead, the WCCP-enabled router encapsulates the packet using GRE tunneling and sends it to the Content Engine that has been configured to accept redirected packets from this WCCP-enabled router.
After receiving the redirected packet, the Content Engine does the following:
1.
Strips the GRE layer from the packet.
2.
Decides whether it should accept this redirected packet and process the request for the content as follows:
a.
If the Content Engine decides to accept the request, it sends a TCP SYN ACK packet to the client. In this response packet, the Content Engine uses the IP address of the original destination (origin server) that was specified as the source address so that the Content Engine can be invisible (transparent) to the client; it pretends to be the destination that the client's TCP SYN packet was trying to reach.
b.
If the Content Engine decides not to accept the request, it reencapsulates the TCP SYN packet in GRE and sends it back to the WCCP-enabled router. The router understands that the Content Engine is not interested in this connection and forwards the packet to its original destination (the origin server).
For example, a Content Engine would decide not to accept the request because it is configured to bypass requests that originate from a certain set of clients or that are destined to a particular set of servers.
Examples
Table 2-158 describes the fields shown in the show statistics wccp gre display.
Table 2-158 show statistics wccp gre Field Descriptions
Field
|
Description
|
Transparent GRE packets received
|
Total number of GRE packets received by the Content Engine, regardless of whether they have been intercepted by WCCP or not. GRE is a Layer 3 technique that allows packets to reach the Content Engine even if there are any number of routers in the path to the Content Engine.
|
Transparent non-GRE packets received
|
Number of non-GRE packets received by the Content Engine either using the traffic interception and redirection functions of WCCP in the router hardware at Layer 2 or Layer 4 switching (a Content Services Switch [CSS] ) that redirects requests transparently to the Content Engine.
|
Transparent non-GRE packets passed through
|
Number of non-GRE packets transparently intercepted by a Layer 4 switch and redirected to the Content Engine.
|
Total packets accepted
|
Total number of packets that are transparently intercepted and redirected to the Content Engine to serve client requests for content.
|
Invalid packets received
|
Number of packets that are dropped either because the redirected packet is a GRE packet and the WCCP GRE header has invalid data or the IP header of the redirected packet is invalid.
|
Packets received with invalid service
|
Number of WCCP version 2 GRE redirected packets that contain an invalid WCCP service number.
|
Packets received on a disabled service
|
Number of WCCP version 2 GRE redirected packets that specify the WCCP service number for a service that is not enabled on the Content Engine. For example, a HTTPS request redirected to the Content Engine when the HTTPS-caching service (service 70) is not enabled.
|
Packets received too small
|
Number of GRE packets redirected to the Content Engine that do not contain the minimum amount of data required for a WCCP GRE header.
|
Packets dropped due to zero TTL
|
Number of GRE packets that are dropped by the Content Engine because the redirected packet's IP header has a zero TTL.
|
Packets dropped due to bad buckets
|
Number of packets that are dropped by the Content Engine because the WCCP flow redirection could not be performed due to a bad mask or hash bucket determination.
Note A bucket is defined as a certain subsection of the allotted hash assigned to each Content Engine in a Content Engine cluster. If only one Content Engine exists in this environment, it has 256 buckets assigned to it.
|
Packets dropped due to no redirect address
|
Number of packets that are dropped because the flow redirection destination IP address could not be determined.
|
Packets dropped due to loopback redirect
|
Number of packets that are dropped by the Content Engine when the destination IP address is the same as the loopback address.
|
Connections bypassed due to load
|
Number of connection flows that are bypassed when the Content Engine is overloaded. When the overload bypass option is enabled, the Content Engine bypasses a bucket and reroutes the overload traffic. If the load remains too high, another bucket is bypassed, and so on, until the Content Engine can handle the load.
|
Packets sent back to router
|
Number of requests that are passed back by the Content Engine to the WCCP-enabled router from which the request was received. The router then sends the flow toward the origin web server directly from the web browser, which bypasses the Content Engine.
|
Packets sent to another CE
|
Number of packets that are redirected to another Content Engine in the WCCP service group. Service groups consist of up to 32 Content Engines and 32 WCCP-enabled routers. In both packet-forwarding methods, the hash parameters specify how redirected traffic should be load balanced among the Content Engines in the various WCCP service groups.
|
GRE fragments redirected
|
Number of GRE packets received by the Content Engine that are fragmented.
|
Packets failed GRE encapsulation
|
Number of GRE packets that are dropped by the Content Engine because they could not be redirected due to problems while encapsulating the packet with a GRE header.
|
Packets dropped due to invalid fwd method
|
Number of GRE packets that are dropped by the Content Engine because it was redirected using GRE but the WCCP service was configured for Layer 2 redirection.
|
Packets dropped due to insufficient memory
|
Number of GRE packets that are dropped by the Content Engine due to the failure to allocate additional memory resources required to handle the GRE packet.
|
Packets bypassed, no conn at all
|
Number of packets that failed to be associated with an existing flow. WCCP can also handle asymmetric packet flows and always maintains a consistent mapping of web servers to caches regardless of the number of switches or routers used in a WCCP service group (up to 32 routers or switches communicating with up to 32 Content Engines in a cluster).
|
Packets bypassed, no pending connection
|
Number of packets that failed to be associated with a pending connection.
|
Packets due to clean wccp shutdown
|
Number of connection flows that are bypassed due to a clean WCCP shutdown. During a proper shutdown of WCCP, the Content Engine continues to service the flows it is handling but starts to bypass new flows. When the number of flows goes down to zero, the Content Engine takes itself out of the cluster by having its buckets reassigned to other Content Engines by the lead Content Engine.
|
Packets bypassed due to bypass-list lookup
|
Number of connection flows that are bypassed due to a bypass list entry. When the Content Engine receives an error response from an origin server, it adds an entry for the server to its bypass list. When it receives subsequent requests for the content residing on the bypassed server, it redirects packets to the bypass gateway. If no bypass gateway is configured, then the packets are returned to the redirecting Layer 4 switch.
|
Packets received with client IP addresses
|
Number of packets that are associated to a connection flow that is being spoofed. By spoofing a client's IP address, the Content Engine can receive packets with the client IP (which is different from the Content Engine's own IP address) and send the packet to the correct application that is waiting for the packet.
|
Conditionally Accepted connections
|
Number of connection flows that are accepted by the Content Engine due to the conditional accept feature.
|
Conditionally Bypassed connections
|
Number of connection flows that are bypassed by the Content Engine due to the conditional accept feature.
|
L2 Bypass packets destined for loopback
|
Number of packets that are dropped by the Content Engine due to the destination IP address being the loopback address when the WCCP-enabled router or switch tries to perform Layer 2 redirection.
|
L2 Packets fragmented for bypass
|
Number of GRE packets that do not contain enough data to hold an IP header.
|
Packets dropped due to IP access-list deny
|
Number of packets that are dropped by the Content Engine when an IP access list that the Content Engine applies to WCCP GRE encapsulated packets denies access to WCCP applications (the wccp access-list command).
|
Packets w/WCCP GRE received too small
|
Number of packets transparently intercepted by the WCCP-enabled router at Layer 2 and sent to the Content Engine that need to be fragmented for the packets to be redirected using GRE.
|
Related Commands
wccp
show statistics wmt
To display Content Engine WMT (Windows Media Technologies) statistics, use the show statistics wmt EXEC command.
show statistics wmt {all | bytes [incoming | outgoing] | errors | multicast | requests | rule |
savings | streamstat [incoming | live | outgoing | stream-id 1-999999] | urlfilter | usage}
Syntax Description
all
|
Displays all WMT statistics.
|
bytes
|
Displays unicast byte statistics.
|
incoming
|
(Optional) Displays unicast incoming byte statistics.
|
outgoing
|
(Optional) Displays unicast outgoing byte statistics.
|
errors
|
Displays error statistics.
|
multicast
|
Displays multicast statistics.
|
requests
|
Displays unicast request statistics.
|
rule
|
Displays the Rule Template statistics.
|
savings
|
Displays savings statistics.
|
streamstat
|
Displays Windows Media streaming connections.
|
incoming
|
(Optional) Displays statistics of all incoming WMT streams from the Content Engine.
|
live
|
(Optional) Displays aggregated live stream statistics.
|
outgoing
|
(Optional) Displays statistics of all outgoing WMT streams from the Content Engine.
|
stream-id
|
(Optional) Displays statistics of the WMT streams that have the specified stream ID.
|
1-999999
|
WMT stream ID to display.
|
urlfilter
|
Displays URL filtering statistics.
|
usage
|
Displays current usage statistics.
|
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
In the ACNS 5.3 software, the output of the show statistics wmt EXEC commands was modified to include information about WMT RTSP requests. For example, the output from the show statistics wmt EXEC commands was changed as follows:
•
RTSP-related information was added to the show statistics wmt all command output.
•
Information about RTSPT and RTSPU was added in the transport protocol portion of the show statistics wmt bytes command output.
•
RTSPT and RTSPU errors were added to the show statistics wmt errors command output.
•
The show statistics wmt requests command output includes the RTSPT and RTSPU protocols and Fast Start and Fast Cache data.
In the ACNS 5.3 software, the live option was added to the show statistics wmt streamstat EXEC command to enable you to display aggregated live statistics. Also, the incoming, outgoing, and stream-id options were added to the show statistics wmt streamstat EXEC command to display statistics of all incoming WMT streams, outgoing WMT streams, and streams with the specified ID.
Examples
Table 2-159 describes the fields shown in the show statistics wmt all display.
Table 2-159 show statistics wmt all Field Descriptions
Field
|
Description
|
Unicast Requests Statistics
|
Total unicast requests received
|
Total number of Unicast requests received.
Display shows the number of requests in each category and calculates the percentage of the total for each category.
|
Streaming Requests served
|
Number of streaming requests received.
|
Mcast nsc file Request
|
Number of multicast NSC file requests received.
|
Authenticate Requests
|
Number of authenticated requests received.
|
Requests error
|
Number of request errors received.
|
By Type of Content
|
Live content
|
Number of live content requests received.
|
On-Demand Content
|
Number of on-demand content requests received.
|
By Transport Protocol
|
HTTP
|
Number of HTTP requests received.
|
RTSPT
|
Number of RTSPT requests received.
|
RTSPU
|
Number of RTSPU requests received.
|
Unicast Savings Statistics
|
Total bytes saved
|
Total number of bytes saved.
|
By Source of Content
|
Local
|
Number of local bytes saved.
|
Remote HTTP
|
Number of remote HTTP bytes saved.
|
Remote RTSP
|
Number of remote RTSP bytes saved.
|
Multicast
|
Number of multicast bytes saved.
|
CDN-Related WMT Requests
|
CDN Content Hits
|
Number of CDN content request hits.
|
CDN Content Misses
|
Number of CDN content request misses.
|
CDN Content Live
|
Number of CDN live content requests.
|
CDN Content Errors
|
Number of CDN content request errors.
|
Fast Streaming related WMT Requests
|
Normal Speed
|
Number of normal-speed Fast Streaming-related WMT requests.
|
Fast Start Only
|
Number of Fast Start WMT requests.
|
Fast Cache Only
|
Number of Fast Cache WMT requests.
|
Fast Start and Fast Cache
|
Number of Fast Start and Fast Cache WMT requests.
|
Authenticated Requests
|
By Type of Authentication
|
Negotiate
|
Number of negotiated authentication authenticated requests.
|
NTLM
|
Number of NTLM authentication authenticated requests.
|
Digest
|
Number of Digest authentication authenticated requests.
|
Basic
|
Number of basic authentication authenticated requests.
|
Unicast Bytes Statistics
|
Total unicast incoming bytes
|
Total number of bytes incoming as Unicast streams.
|
By Type of Content
|
Live content
|
Number of bytes incoming as Unicast streams for live content.
|
On-Demand Content
|
Number of bytes incoming as Unicast streams for on-demand content.
|
By Transport Protocol
|
HTTP
|
Number of bytes incoming as Unicast streams using the HTTP transport protocol.
|
RTSPT
|
Number of bytes incoming as Unicast streams using the RTSPT transport protocol.
|
Total unicast outgoing bytes
|
Total number of bytes outgoing as Unicast streams.
|
Unicast Savings Statistics
|
Total bytes saved
|
Total number of bytes saved.
|
By pre-positioned content
|
Number of bytes saved for pre-positioned content.
|
By live-splitting
|
Number of bytes saved for live-splitting content.
|
By cache-hit
|
Number of bytes saved for cached content.
|
Live Splitting
|
Incoming bytes
|
Number of bytes incoming as live-split streams.
|
Outgoing bytes
|
Number of bytes outgoing as live-split streams.
|
Bytes saved
|
Number of bytes saved.
|
Caching
|
Bytes cache incoming
|
Number of bytes incoming for the cache.
|
Bytes cache outgoing
|
Number of bytes outgoing from the cache.
|
Bytes cache total
|
Total number of bytes cached.
|
Bytes cache-bypassed
|
Number of bytes that bypassed the cache.
|
Cacheable requests
|
Number of cacheable requests.
|
Req cache-miss
|
Number of cacheable requests that were cache misses.
|
Req cache-hit
|
Number of cacheable requests that were cache hits.
|
Req cache-partial-hit
|
Number of cacheable requests that were partial cache hits.
|
Req cache-total
|
Total number of requests that were cached.
|
Objects not cached
|
Number of objects that were not cached.
|
Cache bypassed
|
Number of objects that were not cached because they bypassed the cache.
|
Exceed max-size
|
Number of objects that were not cached because they exceeded the maximum cacheable size limit.
|
Usage Summary
|
Concurrent Unicast Client Sessions
|
Total number of concurrent unicast client sessions.
|
Current
|
Number of concurrent unicast client sessions currently running.
|
Max
|
Maximum number of concurrent unicast client sessions recorded.
|
Concurrent Remote Server Sessions
|
Total number of concurrent remote server sessions.
|
Concurrent Active Multicast Sessions
|
Total number of concurrent active multicast sessions.
|
Concurrent Unicast Bandwidth (Kbps)
|
Total amount of bandwidth being used (in kilobits per second) for concurrent unicast sessions.
|
Concurrent Bandwidth to Remote Servers (Kbps)
|
Total amount of bandwidth being used (in kilobits per second) for concurrent remote server sessions.
|
Concurrent Multicast Out Bandwidth (Kbps)
|
Total amount of bandwidth being used (in kilobits per second) for concurrent multicast out sessions.
|
Error Statistics
|
Total request errors
|
Total number of request errors.
|
Errors generated by this box
|
Number of request errors generated by this device.
|
Errors generated by remote servers
|
Number of request errors generated by remote servers.
|
Other Statistics
|
Authentication Retries from Clients
|
Number of authentication retries from clients.
|
WMT Rule Template Statistics
|
URL Rewrite
|
Number of URL rewites.
|
Connection Reset
|
Number of connection resets.
|
URL Block
|
Number of blocked URLs.
|
No-Auth
|
Number of No-Auth matches.
|
No-Cache
|
Number of No-Cache matches.
|
Cache-only
|
Number of Cache-only matches.
|
Allow
|
Number of allow matches.
|
WMT URL Filter Statistics
|
URL Allowed
|
Number of URLs allowed.
|
URL Filtered
|
Number of URLs filtered.
|
Multicast Statistics
|
Total Multicast Outgoing Bytes
|
Total number of bytes outgoing as multicast-out streams.
|
Total Multicast Logging Requests
|
Total number of multicast logging requests.
|
Aggregate Multicast Out Bandwidth (Kbps)
|
Aggregated amount of bandwidth being used (in kilobits per second) for multicast out sessions.
|
Current
|
Number of concurrent multicast out sessions currently running.
|
Max
|
Maximum number of multicast out sessions recorded.
|
Number of Concurrent Active Multicast Sessions
|
Number of concurrent active multicast sessions.
|
List of All Multicast Stations Configured using the CLI
|
Total Number of Configured Multicast Stations
|
Total number of configured multicast stations.
|
Related Commands
clear statistics wmt
show wmt
wmt
show sysfs
To display system file system (sysfs) information, use the show sysfs EXEC command.
show sysfs volumes
Syntax Description
volumes
|
Displays system file system volumes.
|
Defaults
No default behavior or values
Command Modes
EXEC
Examples
The system file system (sysfs) stores log files, including transaction logs, syslogs, and internal debugging logs. It also stores system image files and operating system files. The show sysfs volumes command displays the disk volume number and its size.
Table 2-160 describes the fields shown in the show sysfs volumes display.
Table 2-160 show sysfs volumes Field Descriptions
Field
|
Description
|
sysfs 00-04
|
System file system and disk number.
|
/local/local1-5
|
Mount point of the volume.
|
nnnnnnKB
|
Size of the volume in kilobytes.
|
nn% free
|
Percentage of free space in the SYSFS partition.
|
Related Commands
disk config sysfs
show disks details
sysfs
show tacacs
To display TACACS+ authentication protocol configuration information, use the show tacacs EXEC command.
show tacacs
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Examples
The show tacacs command displays the TACACS configuration for the Content Engine.
Table 2-161 describes the fields shown in the show tacacs display.
Table 2-161 show tacacs Field Descriptions
Field
|
Description
|
Login Authentication for Console/Telnet Session
|
Status of whether TACACS+ server is enabled for login authentication.
|
Configuration Authentication for Console/Telnet Session
|
Status of whether TACACS+ server is enabled for authorization or configuration authentication.
|
Authentication scheme fail-over reason
|
Status of whether Content Engines fail over to the secondary method of administrative login authentication whenever the primary administrative login authentication method is used.
|
TACACS+ Configuration
|
TACACS+ server parameters.
|
TACACS+ Authentication
|
Status of whether TACACS+ authentication is enabled on the Content Engine.
|
Key
|
Secret key that the Content Engine uses to communicate with the TACACS+ server. The maximum number of characters in the TACACS+ key should not exceed 99 printable ASCII characters (except tabs).
|
Timeout
|
Number of seconds that the Content Engine waits for a response from the specified TACACS+ authentication server before declaring a timeout.
|
Retransmit
|
Number of times that the Content Engine is to retransmit its connection to the TACACS+ if the TACACS+ timeout interval is exceeded.
|
Password type
|
Mechanism for password authentication. By default, the Password Authentication Protocol (PAP) is the mechanism for password authentication.
|
Server
|
Hostname or IP address of the TACACS+ server.
|
Status
|
Status of whether server is the primary or secondary host.
|
Related Commands
clear statistics tacacs
show statistics tacacs
tacacs
show tcp
To display Transmission Control Protocol (TCP) configuration information, use the show tcp EXEC command.
show tcp
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Examples
The show tcp command displays TCP configuration details for the Content Engine.
Table 2-162 describes the fields shown in the show tcp display.
Table 2-162 show tcp Field Descriptions
Field
|
Description
|
TCP keepalive timeout
|
Length of time that the Content Engine keeps a connection open before disconnecting.
|
TCP keepalive probe count
|
Number of times that the Content Engine can retry a connection before it is considered unsuccessful.
|
TCP keepalive probe interval
|
Length of time that the Content Engine keeps an idle connection open.
|
TCP server r/w timeout
|
Period after which the Content Engine times out when attempting to read or write to the network.
|
TCP client r/w timeout
|
Period after which the Content Engine times out when attempting to read or write to the network.
|
TCP server send buffer
|
TCP sending buffer size in kilobytes (1-512) for outgoing TCP packets.
|
TCP server receive buffer
|
TCP receiving buffer size in kilobytes (1-512) for incoming TCP packets.
|
TCP client send buffer
|
TCP sending buffers size in kilobytes (1-512) for outgoing TCP packets.
|
TCP client receive buffer
|
TCP receiving buffer size in kilobytes (1-512) for incoming TCP packets.
|
TCP server max segment size
|
Maximum packet size sent to the server.
|
TCP satellite (RFC1323)
|
Status of whether the client and server TCP compliance are set to the RFC 1323 standard.
|
TCP client max segment size
|
Maximum packet size sent to clients.
|
TCP explicit congestion notification
|
Status of whether reduction of delay and packet loss is enabled.
|
TCP type of service
|
Type of Service.
|
TCP cwnd base value
|
Congestion window size in segments.
|
TCP initial slowstart threshold value
|
Threshold for slow start in segments.
|
TCP increase (multiply) retransmit timer
|
Factor used to modify the length of the retransmit timer.
|
Related Commands
clear statistics tcp
show statistics tcp
tcp
show tech-support
To view information necessary for Cisco's Technical Assistance Center (TAC) to assist you, use the show tech-support EXEC command.
show tech-support [page | streaming]
Syntax Description
page
|
(Optional) Specifies the pages through the output.
|
streaming
|
(Optional) Displays technical support information specific to the streaming feature.
|
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
Use this command to view system information necessary for TAC to assist you with your Content Engine. We recommend that you log the output to a disk file. Use the streaming option to view information specific to the streaming feature.
Examples
The following example shows the types of information available about the ACNS software. Because the show tech-support command output is comprehensive and can be extensive, only excerpts are shown in the following example.
ContentEngine# show tech-support
cpu: 0.39% User, 0.42% System, 0.33% User(nice), 98.86% Idle
cpu0: 0.39% User, 0.42% System, 0.33% User(nice), 98.86% Idle
--------------------------------------------------------------------
PID STATE PRI User T SYS T COMMAND
----- ----- --- ------ ------ --------------------
3 S 19 0 0 (ksoftirqd_CPU0)
45 S 0 4733 4114 (nodemgr)
47 R 0 83 65 (dataserver)
1207 S 0 0 0 (parser_server)
1208 S 0 0 0 (eval_timer_mana)
1211 S 0 46 1 (parser_server)
1446 S 0 0 0 (proxy_poll)
1448 S 0 0 0 (http_authmod)
1458 S 0 0 0 (http_authmod)
1465 S 0 0 0 (http_authmod)
1466 S 0 0 0 (http_authmod)
1467 S 0 0 0 (http_authmod)
1538 S 0 0 0 (unified_log)
1629 S 0 18982 4140 (crond)
1936 S 0 1669 611 (bootnet)
1938 S 10 33545 5556 (checkup)
2023 S 0 1 0 (admin-shell)
2024 S 0 0 0 (parser_server)
2153 S 0 1635 1067 (httpsd)
2167 S 0 1667 2105 (libaux)
2185 S -20 0 0 (videosvr)
2188 S 0 9 4 (contentsvr)
2190 S 0 0 1 (dfcontrolsvr)
18173 S 0 0 0 (in.telnetd)
18175 S 0 2 2 (admin-shell)
18176 S 0 0 0 (parser_server)
19516 S 0 6 18 (exec_show_tech-)
19553 R 0 0 0 (exec_show_proce)
------------------ process memory --------------------
Total Used Free Shared Buffers Cached
1050943488 564785152 486158336 0 5222400 475176960
PID State TTY %MEM VM Size RSS (pages) Name
------ ----- ------ ----- ---------- ----------- ----
1 S 0 0.0 1146880 119 (init)
3 S 0 0.0 0 0 (ksoftirqd_CPU0)
7 S 0 0.0 0 0 (scsi_eh_0)
45 S 0 0.0 1208320 143 (nodemgr)
46 S 0 0.0 1630208 194 (syslogd)
47 R 0 0.0 1974272 238 (dataserver)
920 S 1088 0.0 1728512 236 (login)
921 S 0 0.0 1191936 130 (inetd)
1207 S 0 0.3 4980736 847 (parser_server)
1208 S 0 0.0 1933312 151 (eval_timer_mana)
1211 S 0 0.3 4980736 847 (parser_server)
1442 S 0 0.0 2232320 163 (wccp)
1443 S 0 0.0 1548288 154 (overload)
1444 S 0 0.0 1724416 161 (standby)
1445 S 0 5.9 65646592 15266 (cache)
1446 S 0 0.0 1957888 173 (proxy_poll)
1447 S 0 0.1 2097152 290 (snmpced)
1448 S 0 0.0 1757184 205 (http_authmod)
1458 S 0 0.0 1757184 205 (http_authmod)
1465 S 0 0.0 1757184 205 (http_authmod)
1466 S 0 0.0 1757184 205 (http_authmod)
1467 S 0 0.0 1757184 205 (http_authmod)
1537 S 0 5.9 65646592 15266 (cache)
1538 S 0 0.0 1789952 169 (unified_log)
1540 S 0 0.4 10817536 1164 (webserver)
1541 S 0 0.0 2150400 251 (mcm)
1542 S 0 5.9 65646592 15266 (cache)
1543 S 0 5.9 65646592 15266 (cache)
1550 S 0 5.9 65646592 15266 (cache)
1551 S 0 5.9 65646592 15266 (cache)
1556 S 0 5.9 65646592 15266 (cache)
1567 S 0 0.0 2150400 251 (mcm)
1568 S 0 0.0 2150400 251 (mcm)
1629 S 0 0.0 1187840 137 (crond)
1936 S 0 0.6 7532544 1605 (bootnet)
1937 S 0 0.2 3215360 545 (tracknet)
1938 S 0 0.2 3637248 654 (checkup)
1983 S 0 0.3 4374528 838 (srcpd)
2023 S 1088 0.0 2146304 182 (admin-shell)
2024 S 0 0.3 4980736 847 (parser_server)
2150 S 0 0.0 1679360 188 (rsvpd)
2152 S 0 0.3 6217728 881 (rtspd)
2153 S 0 0.1 2527232 329 (httpsd)
2164 S 0 0.3 6533120 990 (librarian)
2167 S 0 0.4 7110656 1144 (libaux)
2170 S 0 0.3 5955584 863 (mapper)
2178 S 0 0.3 6135808 927 (cache)
2179 S 0 0.3 6287360 948 (router)
2180 S 0 0.3 5955584 926 (fill)
2183 S 0 0.3 5832704 852 (remotereq)
2185 S 0 0.3 8269824 873 (videosvr)
2188 S 0 0.4 7651328 1196 (contentsvr)
2189 S 0 0.3 6103040 953 (routeraux)
2190 S 0 0.4 10272768 1075 (dfcontrolsvr)
2226 S 0 0.1 3559424 504 (smbd)
2228 S 0 0.0 2084864 247 (nmbd)
8446 S 0 0.1 2506752 327 (httpsd)
8447 S 0 0.0 1421312 116 (gcache)
18173 S 0 0.0 1220608 132 (in.telnetd)
18174 S 34816 0.0 1736704 238 (login)
18175 S 34816 0.0 2162688 184 (admin-shell)
18176 S 0 0.3 4980736 847 (parser_server)
19426 S 0 0.1 2551808 350 (httpsd)
19427 S 0 0.1 2576384 354 (httpsd)
19456 Z 0 0.0 0 0 (cache)
19503 Z 0 0.0 0 0 (crond)
19515 S 34816 0.0 1163264 109 (more)
19516 S 34816 0.0 1941504 168 (exec_show_tech-)
19554 R 34816 0.1 2277376 266 (exec_show_proce)
------------------ system memory --------------------
Total physical memory : 1026312 KB
Total free memory : 474692 KB
Total memory shared : 0 KB
Total buffer memory : 5100 KB
Total cached memory : 464040 KB
------------------ interfaces --------------------
Interface type: FastEthernet Slot: 0 Port: 0
Ethernet address:00:05:32:02:DD:74
Internet address:172.16.5.234
Broadcast address:172.16.5.255
Maximum Transfer Unit Size:1500
Input Packets Overruns: 0
Output Packets Dropped: 0
Output Packets Overruns: 0
Output Packets Carrier: 0
Flags:UP BROADCAST RUNNING MULTICAST
Mode:autoselect, full-duplex, 100baseTX
The following types of information are available when using the streaming option with the show tech-support command.
General Information
You can access the following general information when you enter the show tech-support command:
•
Version and hardware (show version)
•
show running-config
•
Processes (show processes)
•
Process memory (show processes memory)
•
System memory (show memory)
•
File system information
•
Interface information
•
WCCP information (HTTP and streaming protocols)
•
Media file system statistics
•
Application and kernel core dump information
•
Netstat
Information Common to WMT and RTSP
Information that is common to both WMT and RTSP are as follows:
•
show programs
•
show statistics wmt streamstat
•
show bandwidth
•
show bitrate
•
show acquirer channels
•
Rules (show rule all)
•
Distribution channel details
Information Specific to WMT
Information that is specific to WMT is as follows:
•
show wmt
•
show statistics wmt all
Information Specific to RTSP
Information that is specific to RTSP is as follows:
•
show rtsp all
•
show statistics rtsp server cisco-streaming-engine all
•
show statistics rtsp proxy media-real requests
•
show statistics rtsp proxy media-real savings
show telnet
To display the Telnet services configuration, use the show telnet EXEC command.
show telnet
Syntax Description
This command has no arguments or keywords.
Defaults
Enabled
Command Modes
EXEC
Examples
The following example displays the Telnet service details:
ContentEngine# show telnet
telnet service is enabled
Related Commands
exec-timeout
telnet enable
show tftp-server
To display the Trivial File Transfer Protocol (TFTP) server directory, use the show tftp-server EXEC command.
show tftp-server
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Examples
Table 2-163 describes the fields shown in the show tftp-server display.
Table 2-163 show tftp-server Field Descriptions
Field
|
Description
|
TFTP protocol is disabled
|
Status of whether TFTP service is enabled on the Content Engine.
|
TFTP Server Directory List
|
One or more local directories that the Content Engine should search for requested files when the full pathname is not included in the TFTP request.
|
TFTP Server Gateway Configuration
|
TFTP gateway parameters configured on the Content Engine.
|
No.
|
Serial number of the listed parameters.
|
Proto
|
Protocol used to access the origin server to which the TFTP gateway will forward requests when the file cannot be found in a local directory.
|
Server-IP-Addr
|
Hostname or IP address of the origin server.
|
Pri
|
Priority (1 or 2) of the origin server.
|
Dir-Path
|
Pathname to search for files on the origin server.
|
Usr-Name
|
Username for authentication to the origin server.
|
Password
|
Password for authentication to the origin server.
|
TFTP Access-list configured
|
IP ACL that allows access to the TFTP server and gateway.
|
Related Commands
tftp-server
show transaction-logging
To display the transaction log configuration settings and a list of archived transaction log files, use the show transaction-logging EXEC command.
show transaction-logging
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
To display information about the current configuration of transaction logging on a Content Engine, use the show transaction-log or show transaction-logging EXEC commands. Both of these EXEC commands display the same output. Transaction log file information is displayed for HTTP and WMT caching proxy transactions and TFTP and ICAP transactions.
Note
For security reasons, passwords are never displayed in the output of the show transaction-log EXEC command.
Examples
The following example displays information about the current configuration of transaction logging on a Content Engine:
ContentEngine# show transaction-logging
Transaction log configuration:
---------------------------------------
End user identity is visible.
File markers are disabled.
Archive interval: every-day every 1 hour
Maximum size of archive file: 2000000 KB
Log File format is squid.
Windows domain is not logged with the authenticated username
Exporting files to ftp servers is disabled.
File compression is disabled.
Export interval: every-day every 1 hour
HTTP Caching Proxy logging to remote syslog host is disabled.
Remote syslog host is not configured.
Facility is the default "*" which is "user".
Log HTTP request authentication failures with auth server to remote syslog host.
HTTP Caching Proxy Transaction Log File Info
Working Log file - None existing
WMT MMS Caching Proxy/Server Transaction Log File Info
Working Log file - size : 584
Archive Log file - mms_export_10.1.1.21_20040805_160226 size: 584
Archive Log file - mms_export_10.1.1.21_20040803_155410 size: 584
Translog directory doesn't exist. Maybe because /local1 has no sysfs mounted.
Translog directory doesn't exist. Maybe because /local1 has no sysfs mounted.
A&D Transaction Log File Info
Working Log file - size : 138
Archive Log file - acqdist_10.1.1.21_20040814_080005 size: 425249
Archive Log file - acqdist_10.1.1.21_20040814_090020 size: 248744
Archive Log file - acqdist_10.1.1.21_20040814_100001 size: 402181
Archive Log file - acqdist_10.1.1.21_20040814_110006 size: 494790
Archive Log file - acqdist_10.1.1.21_20040814_120000 size: 402
Archive Log file - acqdist_10.1.1.21_20040814_120001 size: 232137
Archive Log file - acqdist_10.1.1.21_20040814_130001 size: 32752
Archive Log file - acqdist_10.1.1.21_20040814_140020 size: 243
Archive Log file - acqdist_10.1.1.21_20040815_120022 size: 356
Archive Log file - acqdist_10.1.1.21_20040820_110032 size: 248
Archive Log file - acqdist_10.1.1.21_20040820_120015 size: 1946
Archive Log file - acqdist_10.1.1.21_20040902_150040 size: 1306338
Archive Log file - acqdist_10.1.1.21_20040903_180000 size: 388
Archive Log file - acqdist_10.1.1.21_20040903_180001 size: 1352868
Archive Log file - acqdist_10.1.1.21_20040903_190017 size: 466
Archive Log file - acqdist_10.1.1.21_20040913_110048 size: 138
Translog directory doesn't exist. Maybe because /local1 has no sysfs mounted.
Real Proxy Transaction Log File Info
Working Log file - None existing
Cisco Streaming Engine Transaction Log File Info
Working Log file - size : 923
Archive Log file - cseaccess.log size: 923
Archive Log file - cseaccess.040517000.log size: 1785
Archive Log file - cseaccess.040524000.log size: 1153
Archive Log file - cseaccess.040531000.log size: 693
Archive Log file - cseaccess.040607000.log size: 923
Archive Log file - cseaccess.040614000.log size: 865
Archive Log file - cseaccess.040621000.log size: 1325
Archive Log file - cseaccess.040628000.log size: 1324
Archive Log file - cseaccess.040705000.log size: 865
Archive Log file - cseaccess.040712000.log size: 923
Archive Log file - cseaccess.040719000.log size: 981
Archive Log file - cseaccess.040727000.log size: 1268
TV-out Transaction Log File Info
Working Log file - size : 48
Archive Log file - tvout_10.1.1.21_20040805_160227 size: 48
Archive Log file - tvout_10.1.1.21_20040803_155411 size: 48
CIFS (Windows File Sharing) Transaction Log File Info
Working Log file - size : 58
Archive Log file - cifs_server_10.1.1.21_20040803_155411 size: 58
Archive Log file - cifs_server_10.1.1.21_20040805_160227 size: 58
TFTP Transaction Log File Info
Working Log file - size : 88
Archive Log file - tftp_server_10.1.1.21_20040803_155411 size: 88
Archive Log file - tftp_server_10.1.1.21_20040805_160227 size: 88
ICAP Transaction Log File Info
Working Log file - size : 61
Archive Log file - icap_10.1.1.21_20040803_155411 size: 61
Archive Log file - icap_10.1.1.21_20040805_160227 size: 61
Related Commands
clear statistics transaction-logs
clear transaction-logs
show statistics transaction-logs
transaction-log force
transaction-logs
show tvout
To display TV-out information, use the show tvout EXEC command.
show tvout
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
In the ACNS 5.2 software and later releases, the output of the show tvout EXEC command also notifies you if the Content Engine is running a version of the ACNS software that does not support the TV-out hardware contained in the Content Engine. In the following excerpt of the sample output from the show tvout command, this particular information is highlighted in bold:
Content Engine # show tvout
TV-out model: ce565-002 (sigma)
[***Hardware revision level not supported in this version of software***]
TV-out service is not enabled
TV-out service is not running
Examples
The following example shows the output of the show tvout EXEC command:
ContentEngine# show tvout
TV-out model:ce560-AV-001
TV-out service is enabled
Related Commands
show running-config
show statistics tvout
tvout
show url-filter
To display URL filter configuration information, use the show url-filter EXEC command.
show url-filter {http | rtsp | wmt}
Syntax Description
http
|
Displays URL filter configurations for HTTP.
|
rtsp
|
Displays URL filter configurations for RTSP.
|
wmt
|
Displays URL filter configurations for WMT.
|
Defaults
URL filtering is disabled by default.
Command Modes
EXEC
Examples
Table 2-164 describes the fields shown in the show url-filter http display.
Table 2-164 show url-filter http Field Descriptions
Field
|
Description
|
URL filtering is DISABLED
|
Status of whether URL filtering is disabled or enabled to use N2H2 external server, Websense server, SmartFilter plug-in, or local list files.
|
Good-list file name
|
Status of the path to the file of the HTTP good sites' list. This file contains URLs to which access is allowed.
|
Bad-list file name
|
Status of the path to the file of the HTTP good sites' list. This file contains URLs to which access is denied.
|
Custom message directory
|
Pathname for the remote file that contains the custom message directory. This file creates a customized URL blocking message to display to the client. This custom message must be an administrator-created HTML file named block.html.
|
Websense server IP
|
Hostname or IP address of the primary or secondary Websense servers.
|
Websense server port
|
Port number from which the primary or secondary Websense server is accepting requests.
|
Websense server timeout
|
Number of seconds that the Content Engine should wait for a response from the primary or secondary Websense server.
|
Websense server connections
|
Number of persistent connections to the primary or secondary Websense server to fine tune the performance of Websense.
|
Websense allow mode is ENABLED
|
Status of whether the Content Engine can allow the request to be served if there is no response from Websense server.
|
N2H2 server IP
|
Hostname or IP address of N2H2 servers.
|
N2H2 server port
|
Port number from which N2H2 server is accepting requests.
|
N2H2 server timeout
|
Number of seconds that the Content Engine should wait for a response from the N2H2 server.
|
N2H2 allow mode is ENABLED
|
Status of whether the Content Engine will time out all HTTP requests (HTTP, FTP-over-HTTP, or HTTPS-over-HTTP requests) and either block or allow all HTTP traffic when it fails to receive a response from the N2H2 server.
|
Related Commands
clear statistics url-filter
debug url-filter
show statistics url-filter
url-filter
url-filter local-list-reload
show user
To display user identification number and username information for a particular user, use the show user EXEC command.
show user {uid number | username name}
Syntax Description
uid
|
Displays the user's identification number.
|
number
|
Identification number (0-65535).
|
username
|
Displays the name of user.
|
name
|
Name of the user.
|
Defaults
No default behavior or values
Command Modes
EXEC
Examples
Table 2-165 describes the fields shown in the show user display.
Table 2-165 show user Field Descriptions
Field
|
Description
|
Uid
|
User ID number.
|
Username
|
Username.
|
Password
|
Login password. This field does not display the actual password.
|
Privilege
|
Privilege level of the user.
|
Configured in
|
Database in which the login authentication is configured.
|
Related Commands
clear users
show users
user
show users
To display users, use the show users EXEC command.
show users {administrative | request-authenticated}
Syntax Description
administrative
|
Lists users with administrative privileges.
|
request-authenticated
|
Lists users authenticated by an HTTP request.
|
Defaults
No default behavior or values
Command Modes
EXEC
Examples
The following example displays the list of users with administrative privileges:
ContentEngine# show users administrative
The following example displays the list of users authenticated by HTTP requests:
ContentEngine# show users request-authenticated
The following example shows the output if no users are authenticated by HTTP request:
ContentEngine# show users request-authenticated
There are no users authenticated by HTTP request
Related Commands
clear users
show user
user
show version
To display version information about the Content Engine software, use the show version EXEC command.
show version
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Examples
Table 2-166 describes the fields shown in the show version display.
Table 2-166 show version Field Descriptions
Field
|
Description
|
Cisco Application and Content Networking Software (ACNS)
Copyright (c) year by Cisco Systems, Inc.
Application and Content Networking System Software Release XXX (build bXXX month day year)
|
Software application, copyright, release, and build information.
|
Version
|
Version number of the software that is running on the device.
|
Compiled hour:minute:second month day year by cnbuild
|
Comple information for the software build.
|
System was restarted on day of week month day hour:minute:second year
|
Date and time that the system was last restarted.
|
The system has been up for X hours, X minutes, X seconds
|
Length of time the system has been running since the last reboot.
|
show wccp
To display WCCP information, use the show wccp EXEC command.
show wccp content-engines
show wccp flows {custom-web-cache | dns | ftp-native | https-cache | reverse-proxy | rtsp |
service-number service_num | web-cache | wmt | wmt-rtspu} [summary]
show wccp gre
show wccp masks {custom-web-cache | dns | ftp-native | https-cache | reverse-proxy | rtsp |
service-number service_num | web-cache | wmt | wmt-rtspu}
show wccp modules
show wccp port-list
show wccp routers
show wccp services [detail]
show wccp slowstart {custom-web-cache | dns | ftp-native | https-cache | reverse-proxy | rtsp |
service-number service_num | web-cache | wmt | wmt-rtspu}
show wccp status
Syntax Description
content-engines
|
Displays which Content Engines are seen by which routers.
|
flows
|
Displays the WCCP packet flow count by bucket.
|
custom-web-cache
|
Displays custom web caching service packet flows.
|
dns
|
Displays the state of DNS caching services.
|
ftp-native
|
Displays the state of native FTP caching services.
|
https-cache
|
Displays the state of HTTPS caching services.
|
reverse-proxy
|
Displays reverse proxy web caching service packet flows.
|
rtsp
|
Displays RTSP caching service packet flows.
|
service-number
|
Displays the WCCP service number.
|
service_num
|
Service number (90-97).
|
web-cache
|
Displays standard web caching service packet flows.
|
wmt
|
Displays WMT caching service packet flows.
|
wmt-rtspu
|
Displays WMT RTSPU caching service packet flows.
|
summary
|
(Optional) Displays summary information.
|
gre
|
Displays WCCP generic routing encapsulation packet-related information.
|
masks
|
Displays WCCP mask assignments for a given service.
|
modules
|
Displays the running status of WCCP registered modules.
|
port-list
|
Displays the running status of WCCP port lists.
|
routers
|
Displays routers seen and not seen by this Content Engine.
|
services
|
Displays WCCP services configured.
|
detail
|
(Optional) Displays the detail of services.
|
slowstart
|
Displays the WCCP slow-start state for the selected service.
|
status
|
Displays the version of WCCP that is enabled and running.
|
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
Use the show wccp services command to list all the services that are configured on the Content Engine.
Use the show wccp services detail command to display the details for a particular WCCP service.
Examples
Table 2-167 describes the fields shown in the show wccp gre command.
Table 2-167 show statistics wccp gre Field Descriptions
Field
|
Description
|
Transparent GRE packets received
|
Total number of GRE packets received by the Content Engine, regardless of whether they have been intercepted by WCCP or not. GRE is a Layer 3 technique that allows packets to reach the Content Engine even if there are any number of routers in the path to the Content Engine.
|
Transparent non-GRE packets received
|
Number of non-GRE packets received by the Content Engine either using the traffic interception and redirection functions of WCCP in the router hardware at Layer 2 or Layer 4 switching (a Content Services Switch [CSS] ) that redirects requests transparently to the Content Engine.
|
Transparent non-GRE packets passed through
|
Number of non-GRE packets transparently intercepted by a Layer 4 switch and redirected to the Content Engine.
|
Total packets accepted
|
Total number of packets that are transparently intercepted and redirected to the Content Engine to serve client requests for content.
|
Invalid packets received
|
Number of packets that are dropped either because the redirected packet is a GRE packet and the WCCP GRE header has invalid data or the IP header of the redirected packet is invalid.
|
Packets received with invalid service
|
Number of WCCP version 2 GRE redirected packets that contain an invalid WCCP service number.
|
Packets received on a disabled service
|
Number of WCCP version 2 GRE redirected packets that specify the WCCP service number for a service that is not enabled on the Content Engine. For example, a HTTPS request redirected to the Content Engine when the HTTPS-caching service (service 70) is not enabled.
|
Packets received too small
|
Number of GRE packets redirected to the Content Engine that do not contain the minimum amount of data required for a WCCP GRE header.
|
Packets dropped due to zero TTL
|
Number of GRE packets that are dropped by the Content Engine because the redirected packet's IP header has a zero TTL.
|
Packets dropped due to bad buckets
|
Number of packets that are dropped by the Content Engine because the WCCP flow redirection could not be performed due to a bad mask or hash bucket determination.
Note A bucket is defined as a certain subsection of the allotted hash assigned to each Content Engine in a Content Engine cluster. If only one Content Engine exists in this environment, it has 256 buckets assigned to it.
|
Packets dropped due to no redirect address
|
Number of packets that are dropped because the flow redirection destination IP address could not be determined.
|
Packets dropped due to loopback redirect
|
Number of packets that are dropped by the Content Engine when the destination IP address is the same as the loopback address.
|
Connections bypassed due to load
|
Number of connection flows that are bypassed when the Content Engine is overloaded. When the overload bypass option is enabled, the Content Engine bypasses a bucket and reroutes the overload traffic. If the load remains too high, another bucket is bypassed, and so on, until the Content Engine can handle the load.
|
Packets sent back to router
|
Number of requests that are passed back by the Content Engine to the WCCP-enabled router from which the request was received. The router then sends the flow toward the origin web server directly from the web browser, which bypasses the Content Engine.
|
Packets sent to another CE
|
Number of packets that are redirected to another Content Engine in the WCCP service group. Service groups consist of up to 32 Content Engines and 32 WCCP-enabled routers. In both packet-forwarding methods, the hash parameters specify how redirected traffic should be load balanced among the Content Engines in the various WCCP service groups.
|
GRE fragments redirected
|
Number of GRE packets received by the Content Engine that are fragmented.
|
Packets failed GRE encapsulation
|
Number of GRE packets that are dropped by the Content Engine because they could not be redirected due to problems while encapsulating the packet with a GRE header.
|
Packets dropped due to invalid fwd method
|
Number of GRE packets that are dropped by the Content Engine because it was redirected using GRE but the WCCP service was configured for Layer 2 redirection.
|
Packets dropped due to insufficient memory
|
Number of GRE packets that are dropped by the Content Engine due to the failure to allocate additional memory resources required to handle the GRE packet.
|
Packets bypassed, no conn at all
|
Number of packets that failed to be associated with an existing flow. WCCP can also handle asymmetric packet flows and always maintains a consistent mapping of web servers to caches regardless of the number of switches or routers used in a WCCP service group (up to 32 routers or switches communicating with up to 32 Content Engines in a cluster).
|
Packets bypassed, no pending connection
|
Number of packets that failed to be associated with a pending connection.
|
Packets due to clean wccp shutdown
|
Number of connection flows that are bypassed due to a clean WCCP shutdown. During a proper shutdown of WCCP, the Content Engine continues to service the flows it is handling but starts to bypass new flows. When the number of flows goes down to zero, the Content Engine takes itself out of the cluster by having its buckets reassigned to other Content Engines by the lead Content Engine.
|
Packets bypassed due to bypass-list lookup
|
Number of connection flows that are bypassed due to a bypass list entry. When the Content Engine receives an error response from an origin server, it adds an entry for the server to its bypass list. When it receives subsequent requests for the content residing on the bypassed server, it redirects packets to the bypass gateway. If no bypass gateway is configured, then the packets are returned to the redirecting Layer 4 switch.
|
Packets received with client IP addresses
|
Number of packets that are associated to a connection flow that is being spoofed. By spoofing a client's IP address, the Content Engine can receive packets with the client IP (which is different from the Content Engine's own IP address) and send the packet to the correct application that is waiting for the packet.
|
Conditionally Accepted connections
|
Number of connection flows that are accepted by the Content Engine due to the conditional accept feature.
|
Conditionally Bypassed connections
|
Number of connection flows that are bypassed by the Content Engine due to the conditional accept feature.
|
L2 Bypass packets destined for loopback
|
Number of packets that are dropped by the Content Engine due to the destination IP address being the loopback address when the WCCP-enabled router or switch tries to perform Layer 2 redirection.
|
L2 Packets fragmented for bypass
|
Number of GRE packets that do not contain enough data to hold an IP header.
|
Packets dropped due to IP access-list deny
|
Number of packets that are dropped by the Content Engine when an IP access list that the Content Engine applies to WCCP GRE encapsulated packets denies access to WCCP applications (the wccp access-list command).
|
Packets w/WCCP GRE received too small
|
Number of packets transparently intercepted by the WCCP-enabled router at Layer 2 and sent to the Content Engine that need to be fragmented for the packets to be redirected using GRE.
|
Table 2-168 describes the fields shown in the show wccp modules display.
Table 2-168 show wccp modules Field Descriptions
Field
|
Description
|
Modules registered with WCCP on this Content Engine
|
Module
|
Number used by WCCP to identify the module.
|
Socket
|
Socket used by the module to communicate with WCCP.
|
Expire(sec)
|
Number of seconds after which the module is assumed to be inactive if it does not respond to keepalive messages.
|
Name
|
Names of the WCCP registered modules.
|
Supported Services
|
Services supported by a module.
|
Table 2-169 describes the fields in the show wccp routers display.
Table 2-169 show wccp routers Field Descriptions
Field
|
Description
|
Router Information for Service:
|
Name of WCCP service.
|
Routers Configured and Seeing this Content Engine
|
Number of routers configured and that are seeing this CE.
|
Router Id
|
Address obtained from the I_SEE_YOU message sent by the router. This address is used to identify the router to which this Content Engine is connected.
|
Sent To
|
IP address to which the Content Engine sends the HERE_I_AM message.
|
Recv ID
|
Number that is used to synchronize the Content Engine with the router.
|
Routers not Seeing this Content Engine
|
IP addresses of all routers that are not seeing this Content Engine.
|
Routers Notified of but not Configured
|
Addresses obtained from the I_SEE_YOU message sent by the router when the router is not configured in the router-list.
|
Multicast Addresses Configured
|
Multicast addresses, if configured in the router-list. If no multicast addresses are configured, the display will show NONE.
|
Related Commands
wccp
show websense-server
To display URL filtering statistics for the local Websense server, use the show websense-server EXEC command.
show websense-server
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
EXEC
Examples
Table 2-169 describes the fields in the show websense-server display.
Table 2-170 show websense-server Field Descriptions
Field
|
Description
|
Local Websense Server Information
|
Websense Enterprise Version
|
Websense version.
|
Websense Enterprise Build
|
Package version.
|
Websense server components installed
|
Lists components installed on the Content Engine, such as the following:
Policy Server
EIM Server
User Servicess
Network Agent
Radius Agent
eDirectory Agent
|
Status of the components
|
Provides status information about the components. For example,
Websense Filtering Service running...
Websense Policy Server running...
Websense User Service running....
|
Sending SERVER_STATUS_REQUEST...
|
Status Code = 0
|
|
License Count = 0
|
|
Elapsed Time = 1 ms
|
|
AVG TIME PER REQUEST = 1 ms
|
|
Websense Server Port
|
TCP port that receives requests for content filtering according to the Websense protocol.
|
Websense Block Message Port
|
Port that the Websense process listens on to receive blocked pages.
When Websense process blocks a URL, it sends a redirect URL to the user. The redirect URL is configured to print out the blocked page and the policy for the user.
|
Websense Config Server Port
|
Port for the Websense Policy Server to which the Websense GUI Manager connects.
|
Websense Diagnostics Server Port : 15869
|
Websense server port to which the diagnostics utilities connect.
The Websense server has an exhaustive set of diagnostics that users can run remotely to diagnose problems in the Websense process.
|
Radius Agent Configuration...
|
Outgoing Requests:
|
Radius Server
|
IP address of the RADIUS Server that the Radius-Agent contacts and to which the Radius-Agent forwards authentication requests.
|
Authentication Port
|
Port from which authentication requests are sent to the RADIUS server.
|
Accounting Port
|
Port from which accounting requests are sent to the RADIUS server.
|
Incoming Requests:
|
Authentication Port
|
Port from which authentication requests are received from the RADIUS client.
|
Accounting Port
|
Port from which accounting requests are received from the RADIUS client.
|
eDirectory Agent Configuration...
|
Administrative DN
|
Administrative Distinguished name.
|
Administrative Password
|
Administrative password.
|
Root Context
|
Directory service root location.
|
Servers IP
|
eDirectory Server IP addresses that are configured.
The maximum number of IP addresses and ports that can be configured is 8.
|
Port Number
|
Port number.
|
Related Commands
debug url-filter websense
show statistics url-filter http websense
show url-filter http
url-filter http websense
websense-server
show wmt
To display Windows Media Technologies (WMT) bandwidth, broadcast, multicast, and proxy mode configuration and license information, use the show wmt EXEC command. You can access the WMT diagnostic tools using the show wmt diagnostics EXEC command. If the license-agreement option is included in the command string, the full text of the WMT license agreement is displayed.
show wmt [bandwidth [incoming bypass-list] | broadcast | detail | diagnostics {header-info
{stream-file word | nsc-file .nsc-filename} | network-trace word} http allow extension |
license-agreement | multicast | proxy]
Syntax Description
bandwidth
|
(Optional) Displays WMT bandwidth settings.
|
incoming
|
(Optional) Displays WMT incoming bandwidth settings.
|
bypass-list
|
Displays the WMT incoming bandwidth bypass list.
|
broadcast
|
(Optional) Displays the WMT broadcast configuration.
|
detail
|
(Optional) Displays the detailed WMT configuration.
Note In the ACNS 5.3 software, the output of the show wmt and show wmt detail commands is identical.
|
diagnostics
|
(Optional) Displays a set of WMT diagnostics tools.
|
header-info
|
Displays the file header information.
|
stream-file
|
Displays the headers of a Windows Media file.
|
word
|
An .asf, .wma, .wmv URL, or local file.
|
nsc-file
|
Displays the .nsc file headers.
|
.nsc-filename
|
Name of a local or remote WMT multicast station.
|
network-trace
|
Displays WMT diagnostics information.
|
word
|
Name of a local tcpdump file.
|
http
|
(Optional) Displays HTTP configurations.
|
allow
|
Displays the HTTP filename extensions allowed to be served using WMT.
|
extension
|
Displays the list of HTTP filename extensions to be served using WMT.
|
license-agreement
|
(Optional) Displays the WMT end user license agreement.
|
multicast
|
(Optional) Displays the WMT multicast configuration.
|
proxy
|
(Optional) Displays the WMT proxy mode configuration.
|
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
In the ACNS 5.3 software and later releases, you can access the following three WMT diagnostic tools through the Content Engine CLI:
•
asfhead—Examine the headers of a Windows Media file (for example, an .asf, .wmv, or .wma file). To access the asfhead tool, enter the show wmt diagnostics header-info stream-file word EXEC command.
•
nschead—Examine the .nsc file headers. To access the nschead tool, enter the show wmt diagnostics header-info nsc-file .ncs-filename EXEC command.
•
mmsdig—Use this text-based tool to decode the MMS protocol (a binary protocol) that is captured in tcpdump traces (or any standard network trace output). To access this tool, enter the show wmt diagnostics network trace word EXEC command.
The mmsdig tool does not currently support decoding for the RTSP, RTP, and RTCP protocols. In the ACNS 5.3 software, RTSP support for Windows Media 9 clients and servers was added.
Examples
The following example shows sample output of the show wmt diagnostics header-info stream-file EXEC command. In this example, this command is used to display the headers of a .wmv file named 256.wmv. Annotations about this sample command output are highlighted in boldface text and enclosed within parentheses.
ContentEngine# show wmt diagnostics header-info stream-file 256.wmv
VBR info object (2 streams) (VBR: variable bit rate file)
streamid 1 bitrate 34319 (0000860f) (in this file there are 2 bit rates)
streamid 2 bitrate 195798 (0002fcd6)
Global properties object:
GUID = f9 dd df 7e 6c 80 85 46 83 3c c1 23 4b 2f 4f 6b (object ID)
File Size = 8104309 (object size)
Total Packets = 2816 (total number of data packets)
Time_mkin = 0x0000000001c0debc
Time_mkout = 0x00000000a9e1af60
Send duration = 2817510000 (Specifies the time needed to send the file
in 100-nanosecond units)
Minimum Packet Size = 2877 (Specifies the minimum data packet size in bytes)
Max Packet Size = 2877 (Specifies the maximum data packet size in bytes)
Max Bitrate = 230117 (Specifies the maximum instantaneous bit rate in
bits per second for the entire file)
uuid: b5 3 bf 5f 2e a9 cf 11 8e e3 0 c0 c 20 53 65 len: 0x16
00000000: 11 d2 d3 ab ba a9 cf 11 8e e6 00 c0 0c 20 53 65
00000010: 06 00 00 00 00 00
Extended Content Description Object (two entries):
WMFSDKVersion (unicode) 7.00.00.1956
WMFSDKNeeded (unicode) 0.0.0.0000
Codec description object (2 streams) (audio and video codec information)
Description = Windows Media Audio V7
Description = Windows Media Video V7
The following example shows an excerpt of sample output from the show wmt diagnostics header-info nsc-file EXEC command. In this example, this command is used to display the headers of the .nsc file named testmcast.nsc. Annotations about this sample command output are highlighted in boldface text and enclosed within parentheses.
ContentEngine# show wmt diagnostics header-info nsc-file testmcast.nsc
Press Ctrl-C to abort, if no information is shown within 30 secs.
Time To Live=0x00000005 (ttl)
IP Address=233.33.33.33 (Multicast address is configured.)
IP Port=0x00000D10 (Multicast port is configured.)
NSC Format Version=3.0 (version of NSC format)
Description1=http://128.107.192.4:8080 (Source of the media stream,
for example, the WMT server/encoder)
clip: WMT Live testing (title of the stream, configured on the
WMT server/encoder)
author: John Doe (author of the stream, configured on the WMT server/encoder)
VBR info object (2 streams)
streamid 1 bitrate 34995 (000088b3)
streamid 2 bitrate 253711 (0003df0f)
Global properties object:
GUID = 33 36 59 e6 6a 7d 4e 49 99 5e cf 71 39 b9 61 54 (guid:
unique identifier of this stream)
File Size = 2810 (size in bytes)
Total Packets = 4294967295
Time_mkin = 0x0000000001c4de45
Time_mkout = 0x0000000000000000
Minimum Packet Size = 1444
uuid: b5 3 bf 5f 2e a9 cf 11 8e e3 0 c0 c 20 53 65 len: 0x707
00000000: 11 d2 d3 ab ba a9 cf 11 8e e6 00 c0 0c 20 53 65
00000010: 06 00 f1 06 00 00 a9 46 43 7c e0 ef fc 4b b2 29
00000020: 39 3e de 41 5c 85 27 00 00 00 00 00 00 00 01 00
00000030: 0c 65 00 6e 00 2d 00 75 00 73 00 00 00 cb a5 e6
00000040: 14 72 c6 32 43 83 99 a9 69 52 06 5b 5a 58 00 00
00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00000060: 00 00 00 00 00 00 7d 00 00 88 13 00 00 00 00 00
00000070: 00 00 7d 00 00 88 13 00 00 00 00 00 00 00 03 00
00000080: 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00
00000090: 00 00 00 00 00 cb a5 e6 14 72 c6 32 43 83 99 a9
000000a0: 69 52 06 5b 5a 6e 00 00 00 00 00 00 00 00 00 00
000000b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 68 ad 03
000000c0: 00 88 13 00 00 00 00 00 00 68 ad 03 00 88 13 00
000000d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 00
000000e0: 00 63 17 05 00 00 00 00 00 00 00 01 00 50 94 bd
000000f0: c6 7f 86 07 49 83 a3 c7 79 21 b7 33 ad 02 00 00
00000100: 00 00 00 5d 8b f1 26 84 45 ec 47 9f 5f 0e 65 1f
00000120: c5 af 5b 77 48 84 67 aa 8c 44 fa 4c ca e0 00 00
00000130: 00 00 00 00 00 04 00 00 00 01 00 0c 00 02 00 02
00000140: 00 00 00 49 00 73 00 56 00 42 00 52 00 00 00 00
00000150: 00 00 00 01 00 34 00 00 00 06 00 00 00 44 00 65
00000160: 00 76 00 69 00 63 00 65 00 43 00 6f 00 6e 00 66
00000170: 00 6f 00 72 00 6d 00 61 00 6e 00 63 00 65 00 54
00000180: 00 65 00 6d 00 70 00 6c 00 61 00 74 00 65 00 00
00000190: 00 4c 00 32 00 00 00 00 00 02 00 0c 00 02 00 02
000001a0: 00 00 00 49 00 73 00 56 00 42 00 52 00 00 00 00
000001b0: 00 00 00 02 00 34 00 00 00 0c 00 00 00 44 00 65
000001c0: 00 76 00 69 00 63 00 65 00 43 00 6f 00 6e 00 66
000001d0: 00 6f 00 72 00 6d 00 61 00 6e 00 63 00 65 00 54
000001e0: 00 65 00 6d 00 70 00 6c 00 61 00 74 00 65 00 00
000001f0: 00 4d 00 50 00 40 00 4c 00 4c 00 00 00 74 d4 06
00000200: 18 df ca 09 45 a4 ba 9a ab cb 96 aa e8 0a 05 00
00000210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
000006e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
000006f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00000700: 00 00 00 00 00 00 00
Extended Content Description Object (3 entries):
WMFSDKVersion (unicode) 9.00.00.2980
WMFSDKNeeded (unicode) 0.0.0.0000
Codec description object (2 streams)
Description = Windows Media Audio 9
32 kbps, 32 kHz, stereo (A/V) 1-pass CBR
Description = Windows Media Video 9
Multicast object (len 0x18):
00000000: 50 0f 1d 54 4b 5b cf 11 a8 fd 00 80 5f 5c 44 2b
00000010: 04 00 00 00 0a 00 00 00
Some of the fields are common between the command output from the show wmt diagnostics header-info stream-file and show wmt diagnostics header-info nsc-file EXEC commands.
The following example shows the the WMT server configurations, the WMT HTTP configurations, and the WMT proxy configurations for the Content Engine. In the ACNS 5.3 software and later releases, the output of the show wmt and show wmt detail commands is identical.
--------- WMT Server Configurations -----------------
WMT golden license key installed
WMT outgoing bandwidth limit enforced: 250000 Kbits/sec
WMT end user license agreement accepted
WMT disallowed client protocols: none
WMT outgoing bandwidth configured is 250000 Kbits/sec
WMT incoming bandwidth configured is 250000 Kbits/sec
WMT max sessions configured: 3568
WMT max sessions platform limit: 3568
WMT max sessions enforced: 3568 sessions
WMT max outgoing bit rate allowed per stream has no limit
WMT max incoming bit rate allowed per stream has no limit
WMT cache max-obj-size: 1024 MB
WMT L4 switch is not enabled
WMT debug client ip not set
WMT debug server ip not set
WMT/REAL cache space partition: wmt 70%, real 30%
WMT Stripping ? from Live URL is not enabled
WMT accelerate live-split is enabled
WMT accelerate proxy-cache is enabled
WMT accelerate VOD is enabled
WMT fast-start is enabled
WMT fast-start max. bandwidth per player is 3500 (Kbps)
WMT fast-cache is enabled
WMT fast-cache acceleration factor is 5
WMT maximum data packet MTU (TCP) enforced is 1472 bytes
WMT maximum data packet MTU (UDP) is 1500 bytes
WMT client idle timeout is 60 seconds
WMT forward logs is enabled
WMT server inactivity-timeout is 65535
WMT Transaction Log format is Windows Media Services 9.0 logging and CE specific
RTSP Gateway incoming port 554
RTSP Gateway L4-switch not enabled
RTSP Gateway Transparent Interception (WCCP):
--------- WMT HTTP Configurations -------------------
WMT http extensions allowed:
asf none nsc wma wmv nsclog
--------- WMT Proxy Configurations ------------------
MMS-over-HTTP Proxy-Mode:
The following example displays the current WMT proxy configuration for a Content Engine. In the ACNS 5.3 software, the command output was modified to include configuration information about the new WMT RTSP proxy server that can now be enabled on a Content Engine that is acting as a Windows Media 9 server.
ContentEngine# show wmt proxy
MMS-over-HTTP Proxy-Mode:
The following example displays the WMT bandwidth settings configured on a Content Engine:
CE-590# show wmt bandwidth
Outgoing bandwidth limit enforced 168000 kbps
Outgoing bandwidth configured 168000 kbps
Incoming bandwidth configured 50000 kbps
The following example shows an excerpt of sample output from the show wmt license-agreement command:
CE-590# show wmt license-agreement
PLEASE READ THE LICENSE AGREEMENT AND ACCEPT BY ENTERING THE FOLLOWING
CLI CONFIGURATION COMMAND: wmt accept-license-agreement
END USER LICENSE AND SOFTWARE WARRANTY
PLEASE READ THIS SOFTWARE LICENSE CAREFULLY BEFORE DOWNLOADING,
INSTALLING OR USING CISCO OR CISCO-SUPPLIED SOFTWARE.
BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE EQUIPMENT THAT
CONTAINS THIS SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY THIS LICENSE.
IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS LICENSE, THEN (A) DO NOT
DOWNLOAD, INSTALL OR USE THE SOFTWARE, AND (B) YOU MAY RETURN THE
SOFTWARE FOR A FULL REFUND, OR, IF THE SOFTWARE IS SUPPLIED AS PART OF
ANOTHER PRODUCT, YOU MAY RETURN THE ENTIRE PRODUCT FOR A FULL REFUND.
YOUR RIGHT TO RETURN AND REFUND EXPIRES 30 DAYS AFTER PURCHASE FROM
CISCO OR AN AUTHORIZED CISCO RESELLER, AND APPLIES ONLY IF YOU ARE THE
The following terms govern your use of the Software except to the extent
a particular program (a) is the subject of a separate written agreement
with Cisco or (b) includes a separate click-on license agreement as part
of the installation and/or download process. To the extent of a conflict
between the provisions of the foregoing documents, the order of
precedence shall be (1) the written agreement, (2) the click-on
agreement, and (3) this Software License.
Related Commands
clear statistics wmt
show statistics wmt
wmt
shutdown (interface configuration)
To shut down a specific hardware interface, use the shutdown interface configuration command. To restore an interface to operation, use the no form of this command.
shutdown
no shutdown
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values
Command Modes
interface configuration
Usage Guidelines
See the "interface" section for alternative syntax.
Examples
The following example shows how to shut down an interface configured on a Content Engine:
ContentEngine(config-if)# shutdown
Related Commands
interface
show interface
show running-config
show startup-config
shutdown (EXEC)
To shut down the Content Engine, Content Router, Content Distribution Manager, or Cisco IP/TV Program Manager, use the shutdown EXEC command.
shutdown [poweroff]
Syntax Description
poweroff
|
(Optional) Turns off the power after closing all applications and the operating system.
|
Defaults
No default behavior or values
Command Modes
EXEC
Usage Guidelines
A controlled shutdown refers to the process of properly shutting down a Content Engine without turning off the power on the device. With a controlled shutdown, all of the application activities and the operating system are properly stopped on a Content Engine but the power is still on. Controlled shutdowns of a Content Engine can help you minimize the downtime when the Content Engine is being serviced.
The shutdown EXEC command enables you to shut down and optionally power off a Content Engine:
•
Shutdown means that all application activities (applications and operating system) are stopped, but the power is still on. This shutdown is similar to the Linux halt command.
•
Shutdown poweroff means that the Content Engine is powered down by the ACNS software after being shut down. This operation is also referred to as a software poweroff. The implementation of the shutdown poweroff feature uses the Advanced Configuration and Power Interface (ACPI) power management interface.
Caution 
If you do not perform a controlled shutdown, the Content Engine file system can be corrupted. It also takes longer to reboot the Content Engine if the Content Engine is not properly shut down.
Note
You cannot power on Content Engines again through software after a software poweroff operation. You must press the power button once on these Content Engines to bring these Content Engines back online.
The shutdown EXEC command facilitates a proper shutdown for Content Engines, Content Routers, Content Distribution Managers, and Cisco IP/TV Program Managers. Where the shutdown command is supported on all content networking hardware models, the shutdown poweroff command is supported only on those models that support ACPI. The following content networking hardware models support the shutdown poweroff command:
• CE-510
|
• CE-510A
|
• CE-511
|
• CE-511A
|
• CE-565
|
• CE-565A
|
• CE-566
|
• CE-566A
|
• CE-7305
|
• CE-7305A
|
• CE-7320
|
• CE-7325
|
• CE-7326
|
|
The shutdown command closes all applications and stops all system activities but keeps the power on. The fans continue to run and the power LED is on, indicating that the device is still powered on. When you enter the shutdown command, you are prompted to save your configuration changes, if any, and the Content Engine waits for the maximum amount of time before shutdown if WCCP has been enabled on the Content Engine. The device console displays a menu after the shutdown process is completed. You need to log in to the Content Engine using console to display the following menu:
System configuration has been modified. Save?[yes]:yes
Device can not be powered on again through software after shutdown.
Proceed with shutdown?[confirm]yes
Proceed with clean WCCP shutdown?[confirm]yes
Waiting (1 seconds) for WCCP shutdown. Press ^C to skip shutdownn
WCCP clean shutdown wait time exceeded
Shutting down all services, will timeout in 15 minutes.
shutdown in progress ..Halt requested by CLI@ttyS0.
Cisco Content Engine Console
================= SHUTDOWN SHELL =================
System has been shut down.
Power down system by pressing and holding power button
1. Reload system through software
2. Power down system through software
The shutdown poweroff command closes all applications and the operating system, stops all system activities, and turns off the power. The fans stop running and the power LED starts flashing, indicating that the device has been powered off.
Note
If you use the shutdown or shutdown poweroff commands, the device does not perform a file system check when you power on and boot the device the next time.
Table 2-171 describes the shutdown-only operation and the shutdown power-off operation for Content Engines.
Table 2-171 Shutting Down Content Engines Through CLI Commands
Activity
|
All Content Engine Models Supported in the ACNS 5.2 Software and Later Releases
|
Content Engines with Power Management Capability in the ACNS 5.2 Software and Later Releases
|
User performs a shutdown operation on the Content Engine
|
Shutdown only
|
Shutdown poweroff
ContentEngine# shutdown
poweroff
|
User intervention to bring Content Engine back online
|
To bring a Content Engine that has an on/off switch on the back (for example, the CE-507, CE-507AV, CE-560, CE-560AV, or the CE-590) back online after a shutdown operation, turn the on/off switch twice.
To bring a Content Engine that has a power button (instead of an on/off switch on the back) back online after a shutdown operation, first press and hold the power button for several seconds to power off these models, and then press the power button once again.
|
After a shutdown poweroff, you must press the power button once to bring the Content Engine back online.
|
File system check
|
Will not be performed after you turn the power on again and reboot the Content Engine.
|
Will not be performed after you turn the power on again and reboot the Content Engine.
|
You can enter the shutdown EXEC command from a console session or from a remote session (Telnet or SSH version 1 or SSH version 2) to perform a shutdown on a Content Engine.
To perform a shutdown on a Content Engine, enter the shutdown EXEC command as follows:
When you are asked if you want to save the system configuration, enter yes as follows:
System configuration has been modified. Save?[yes]:yes
When you are asked if you want to proceed with the shutdown, press Enter to proceed with the shutdown operation as follows:
Device can not be powered on again through software after shutdown.
Proceed with shutdown?[confirm]
The following message appears, reporting that all services are being shut down on this Content Engine:
Shutting down all services, will timeout in 15 minutes.
shutdown in progress ..System halted.
After the system is shut down (the system has halted), an ACNS software shutdown shell displays the current state of the system (for example, "System has been shut down") on the console. You are asked whether you want to perform a software power off (the Power down system by software option), or if you want to reload the system through the software.
================= SHUTDOWN SHELL =================
System has been shut down.
Power down system by pressing and holding power button
1. Reload system through software
2. Power down system through software
To power down the Content Engine, press and hold the power button on the Content Engine, or use one of the following methods to perform a shutdown poweroff:
•
From the console command line, enter 2 when prompted as follows:
================= SHUTDOWN SHELL =================
System has been shut down.
Power down system by pressing and holding power button
1. Reload system through software
2. Power down system through software
•
From the Content Engine CLI, enter the shutdown poweroff EXEC command as follows:
ContentEngine# shutdown poweroff
When you are asked if you want to save the system configuration, enter yes as follows:
System configuration has been modified. Save?[yes]:yes
When you are asked to confirm your decision, press Enter.
Device can not be powered on again through software after poweroff.
Proceed with poweroff?[confirm]
Shutting down all services, will timeout in 15 minutes.
poweroff in progress ..Power down.
Examples
The following example shows that the shutdown command is used to close all applications and stop all system activities:
System configuration has been modified. Save?[yes]:yes
Device can not be powered on again through software after shutdown.
Proceed with shutdown?[confirm]
Shutting down all services, will timeout in 15 minutes.
shutdown in progress ..System halted.
The following example shows that the shutdown poweroff command is used to close all applications, stop all system activities, and then turn off power to the Content Engine:
ContentEngine2# shutdown poweroff
System configuration has been modified. Save?[yes]:yes
Device can not be powered on again through software after poweroff.
Proceed with poweroff?[confirm]
Shutting down all services, will timeout in 15 minutes.
poweroff in progress ..Power down.
snmp-server access-list
To configure a standard access control list to allow access through an SNMP agent, use the snmp-server access-list global configuration command. To remove a standard access control list, use the no form of this command.
snmp-server access-list {std-acl-num | std-acl-name}
no snmp-server access-list {std-acl-num | std-acl-name}
Syntax Description
std-acl-name
|
Standard access list name. Alphanumeric identifier of up to 30 characters, beginning with a letter that identifies the ACL to apply to the current interface.
|
std-acl-num
|
Standard access list number (1-99). Numeric identifier that identifies the access list to apply to the current interface.
|
Defaults
No default behavior or values
Command Modes
global configuration
Usage Guidelines
The snmp-server access-list std-acl-num global configuration command configures an access control list to allow access to an SNMP agent. The std-acl-num variable is a number in the range 1 to 99, indicating a standard access control list. SNMP checks against the specified access control list before accepting or dropping incoming packets.
You can enable SNMP applications to be attached to a particular interface (such as management services to the private IP address space) so that the Content Engine can have one interface in the customer's IP address space that serves content, and another interface in a private IP address space that the administrator uses for management purposes. This setting ensures that clients can access the Content Engine only in the public IP address space for serving content and not access it for management purposes. A device attempting to access one of these applications associated with an access control list (ACL) must be on the list of trusted devices to be allowed access.
See the Cisco ACNS Software Configuration Guide for Locally Managed Deployments, for a description on how to use standard IP ACLs to control access to the SNMP agent on a Content Engine.
Examples
The following example allows the SNMP agent to check against access control list 12 before accepting or dropping packets:
ContentEngine(config)# snmp-server access-list 12
Note
You must first create access list 12 using the ip access-list standard global configuration command.
Related Commands
ip access-list
show running-configuration
snmp-server community
To enable the SNMP agent and set up the community access string to permit access to the SNMP agent, use the snmp-server community global configuration command. Use the no form of this command to disable the SNMP agent and to remove the previously configured community string.
snmp-server community string [group groupname | rw]
no snmp-server community string [group groupname | rw]
Syntax Description
string
|
Community string that acts like a password and permits access to the SNMP agent. Supports up to a maximum of 64 characters.
|
group
|
(Optional) Specifies the group to which the community string belongs.
|
groupname
|
Name of the group. Supports up to a maximum of 64 characters.
|
rw
|
(Optional) Enables read-write access to this community string.
|
Defaults
The SNMP agent is disabled and a community string is not configured. When configured, an SNMP community string by default permits read-only access to all objects.
Usage Guidelines
The SNMP community string is used as a password for authentication when accessing the SNMP agent on the Content Engine. To be authenticated, the Community Name field of any SNMP message sent to the Content Engine must match the SNMP community string defined on the Content Engine.
The SNMP agent on the Content Engine is enabled when an SNMP community string is defined on the Content Engine. The maximum number of SNMP communities that can be created is 10.
The snmp-server community string global configuration command provides view-based access control for SNMPv1, SNMPv2c, and SNMPv3 but also continues to provide backward compatibility between different versions.
Tip
Any SNMP message sent to the Content Engine must have the Community Name field of the message match the community string defined here in order to be authenticated.
In the ACNS 5.x software prior to the ACNS 5.1 software release, the snmp-server community string global configuration command did not have an option to create a community string that allows SNMP messages to execute a set operation on a MIB object. A rw option has been introduced for this purpose. Also, the previous version of the SNMP agent did not provide selective access control to MIB objects. Access to any MIB object was denied or granted based on authentication of the SNMP community string.
With the introduction of view-based access control, it is now possible to configure a community string that grants access to only part of the MIB subtree. To provide backward compatibility with the previous version of this command, a default read group or default write group (if the rw option is specified on the command line) is associated with the community string if no group name is specified. Both of these default groups are hidden from users, are not displayed in the configuration file or in the show snmp group EXEC command, and are created during initialization of the SNMP agent.
Command Modes
global configuration
Examples
The following example enables the SNMP agent and assigns the community string comaccess to SNMP:
ContentEngine(config)# snmp-server community comaccess
The following example disables the SNMP agent and removes the previously defined community string:
ContentEngine(config)# no snmp-server community
Related Commands
show snmp
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server location
snmp-server mib
snmp-server notify
snmp-server user
snmp-server view
snmp-server contact
To set the system server contact (sysContact) string, use the snmp-server contact global configuration command. To remove the system contact information, use the no form of this command.
snmp-server contact line
no snmp-server contact
Syntax Description
contact
|
Specifies text for MIB-II object sysContact.
|
line
|
Identification of the contact person for this managed node.
|
Command Modes
global configuration
Defaults
No system contact string is set.
Usage Guidelines
The system contact string is the value stored in the MIB-II system group sysContact object.
Examples
The following example shows how to configure a system contact string:
ContentEngine(config)# snmp-server contact Dial System Operator at beeper # 27345
The following example resets the system contact string:
ContentEngine(config)# no snmp-server contact
Related Commands
show snmp
snmp-server community
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server location
snmp-server mib
snmp-server notify
snmp-server user
snmp-server view
snmp-server enable traps
To enable the Content Engine to send SNMP traps, use the snmp-server enable traps global configuration command. To disable all SNMP traps or only SNMP authentication traps, use the no form of this command.
snmp-server enable traps [alarm [clear-critical | clear-major | clear-minor | raise-critical |
raise-major | raise-minor] | config | content-engine [disk-fail | disk-read | disk-write |
overload-bypass | transaction-log] | entity | event | snmp [authentication | cold-start]]
no snmp-server enable traps [alarm [clear-critical | clear-major | clear-minor | raise-critical |
raise-major | raise-minor] | config | content-engine [disk-fail | disk-read | disk-write |
overload-bypass | transaction-log] | entity | event | snmp [authentication | cold-start]]
Syntax Description
alarm
|
(Optional) Enables Content Engine alarm traps.
|
clear-critical
|
(Optional) Enables the clear-critical alarm trap.
|
clear-major
|
(Optional) Enables the clear-major alarm trap.
|
clear-minor
|
(Optional) Enables the clear-minor alarm trap.
|
raise-critical
|
(Optional) Enables the raise-critical alarm trap.
|
raise-major
|
(Optional) Enables the raise-major alarm trap.
|
raise-minor
|
(Optional) Enables the raise-minor alarm trap.
|
config
|
(Optional) Enables CiscoConfigManEvent traps.
|
content-engine
|
(Optional) Enables SNMP Content Engine traps.
|
disk-fail
|
(Optional) Enables the disk failure error trap.
|
disk-read
|
(Optional) Enables the disk read error trap.
|
disk-write
|
(Optional) Enables the disk write error trap.
|
overload-bypass
|
(Optional) Enables the WCCP overload bypass error trap.
|
transaction-log
|
(Optional) Enables the transaction log write error trap.
|
entity
|
(Optional) Enables SNMP entity traps.
|
event
|
(Optional) Enables Event MIB traps.
|
snmp
|
(Optional) Enables SNMP-specific traps.
|
authentication
|
(Optional) Enables the authentication trap.
|
cold-start
|
(Optional) Enables the cold-start trap.
|
Defaults
This command is disabled by default. No traps are enabled.
Command Modes
global configuration
Usage Guidelines
You can configure a Content Engine to generate an SNMP trap for a specific alarm condition. You can configure the generation of SNMP alarm traps on Content Engines based on the following:
•
The severity of the alarm (critical, major, or minor)
•
The action (the alarm is raised or cleared)
The ACNS 5.3 software and later releases support six generic alarm traps. These six general alarm traps provide SNMP and Node Health Manager integration. Each trap can be enabled or disabled through the Content Engine CLI.
Note
For information on generic alarm traps, see Chapter 21 of the Cisco ACNS Software Configuration Guide for Locally Managed Deployments.
SNMP notifications can be sent as traps or inform requests. The snmp-server enable traps command enables both traps and inform requests for the specified notification types.
To configure traps, you must enter the snmp-server enable traps command. If you do not enter the snmp-server enable traps command, no traps are sent.
If you do not enter an snmp-server enable traps command, no notifications controlled by this command are sent. In order to configure the Content Engine to send these SNMP notifications, you must enter at least one snmp-server enable traps command. If you enter the command with no keywords, all notification types are enabled. If you enter the command with a keyword, only the notification type related to that keyword is enabled. In order to enable multiple types of notifications, you must enter a separate snmp-server enable traps command for each notification type and notification option.
The snmp-server enable traps command is used with the snmp-server host command. Use the snmp-server host command to specify which host or hosts receive SNMP traps. To send traps, you must configure at least one host using the snmp-server host command.
For a host to receive a trap, you must enable both the snmp-server enable traps command and the snmp-server host command for that host.
In addition, you must enable SNMP with the snmp-server community command.
To disable the sending of the MIB-II SNMP authentication trap, you must enter the no snmp-server enable traps snmp authentication command.
Examples
The following example enables the Content Engine to send all traps to the host 172.31.2.160 using the community string public:
ContentEngine(config)# snmp-server enable traps
ContentEngine(config)# snmp-server host 172.31.2.160 public
The following example disables all traps:
ContentEngine(config)# no snmp-server enable traps
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server group
snmp-server host
snmp-server location
snmp-server mib
snmp-server notify
snmp-server user
snmp-server view
snmp-server group
To define a user security model group, use the snmp-server group global configuration command. To remove the specified group, use the no form of this command.
snmp-server group name {v1 [notify name] [read name] [write name] | v2c [notify name] [read
name] [write name] | v3 {auth [notify name] [read name] [write name] | noauth [notify name]
[read name] [write name] | priv [notify name] [read name] [write name]}}
no snmp-server group name {v1 [notify name] [read name] [write name] | v2c [notify name]
[read name] [write name] | v3 {auth [notify name] [read name] [write name] | noauth [notify
name] [read name] [write name] | priv [notify name] [read name] [write name]}}
Syntax Description
name
|
Name of the SNMP group. Supports up to a maximum of 64 characters.
|
v1
|
Specifies the group using the Version 1 Security Model.
|
notify
|
(Optional) Specifies a notify view for the group that enables you to specify a notify, inform, or trap.
|
name
|
Notify view name. Supports up to a maximum of 64 characters.
|
read
|
(Optional) Specifies a read view for the group that enables you only to view the contents of the agent.
|
name
|
Read view name. Supports up to a maximum of 64 characters.
|
write
|
(Optional) Specifies a write view for the group that enables you to enter data and configure the contents of the agent.
|
name
|
Write view name. Supports up to a maximum of 64 characters.
|
v2c
|
Specifies the group using the Version 2c Security Model.
|
v3
|
Specifies the group using the User Security Model (SNMPv3).
|
auth
|
Specifies the group using the AuthNoPriv Security Level.
|
noauth
|
Specifies the group using the noAuthNoPriv Security Level.
|
priv
|
Specifies the group using the AuthPriv Security Level.
|
Defaults
The default is that no user security model group is defined.
Command Modes
global configuration
Usage Guidelines
The maximum number of SNMP groups that can be created is 10.
Select one of three SNMP security model groups: Version 1 (v1) Security Model, Version 2c (v2c) Security Model, or the User Security Model (v3 or SNMPv3). Optionally, you then specify a notify, read, or write view for the group for the particular security model chosen. The v3 option allows you to specify the group using one of three security levels: auth (AuthNoPriv Security Level), noauth (noAuthNoPriv Security Level), or priv (AuthPriv Security Level).
The ACNS 5.x software supports the following versions of SNMP:
•
Version 1 (SNMPv1)—This version is the initial implementation of SNMP. See the RFC 1157 for a full description of its functionality.
•
Version 2 (SNMPv2c)—This version is the second release of SNMP, described in RFC 1902. It provides additions to data types, counter size, and protocol operations.
•
Version 3 (SNMPv3)—This version is the most recent SNMP version, defined in RFC 2271 through RFC 2275.
SNMP Security Models and Security Levels
SNMPv1 and SNMPv2c do not have any security (authentication or privacy) mechanisms to keep SNMP packet traffic on the wire confidential. As a result, packets on the wire can be detected and SNMP community strings can be compromised.
To solve the security shortcomings of SNMPv1 and SNMPv2c, SNMPv3 provides secure access to Content Engines by authenticating and encrypting packets over the network. The SNMP agent in the ACNS 5.x software supports SNMPv3, SNMPv1, and SNMPv2c.
Note
For information on security features provided in SNMPv3, SNMP security models, and security levels, see Chapter 21 of the Cisco ACNS Software Configuration Guide for Locally Managed Deployments.
Using SNMPv3, users can securely collect management information from their SNMP agents. Also, confidential information, such as SNMP set packets that change a Content Engine's configuration, can be encrypted to prevent their contents from being exposed on the wire. Also, the group-based administrative model allows different users to access the same SNMP agent with varying access privileges.
Examples
The following example configures the SNMP group name, security model, and notify view on the Content Engine:
ContentEngine(config)# snmp-server group acme v1 notify mymib
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server host
snmp-server location
snmp-server mib
snmp-server notify
snmp-server user
snmp-server view
snmp-server host
To specify the recipient of a host SNMP trap operation, use the snmp-server host global configuration command. To remove the specified host, use the no form of this command.
snmp-server host {hostname | ip-address} communitystring [v2c [retry number] [timeout
seconds] | [v3 {auth [retry number] [timeout seconds] | noauth [retry number] [timeout
seconds] | priv [retry number] [timeout seconds]}]
no snmp-server host {hostname | ip-address} [v2c [retry number] [timeout seconds] | [v3 {auth
[retry number] [timeout seconds] | noauth [retry number] [timeout seconds] | priv [retry
number] [timeout seconds]}| communitystring]
Syntax Description
hostname
|
Hostname of the SNMP trap host that will be sent in the SNMP trap messages from the Content Engine.
|
ip-address
|
IP address of the SNMP trap host that will be sent in the SNMP trap messages from the Content Engine.
|
communitystring
|
Password-like community string sent in the SNMP trap messages from the Content Engine. You can enter a maximum of 64 characters.
|
v2c
|
(Optional) Specifies the Version 2c Security Model.
|
retry
|
(Optional) Sets the count for the number of retries for the inform request. (The default is 2 tries.)
|
number
|
Number of retries for the inform request (1-10).
|
timeout
|
(Optional) Sets the timeout for the inform request (1-1000). (The default is 15 seconds.)
|
seconds
|
Timeout value in seconds.
|
v3
|
(Optional) Specifies the User Security Model (SNMPv3).
|
auth
|
Sends notification using the AuthNoPriv Security Level.
|
noauth
|
Sends notification using the noAuthNoPriv Security Level.
|
priv
|
Sends notification using the AuthPriv Security Level.
|
Defaults
This command is disabled by default. No traps are sent. The version of the SNMP protocol used to send the traps is SNMP Version 1.
retry number: 2 retries.
timeout: 15 seconds.
Command Modes
global configuration
Usage Guidelines
SNMP notifications can be sent as traps or inform requests. Traps are unreliable because the receiver does not send acknowledgments when it receives traps. The sender cannot determine if the traps were received. However, an SNMP entity that receives an inform request acknowledges the message with an SNMP response PDU. If the sender never receives the response, the inform request can be sent again. Informs are more likely to reach their intended destination.
However, informs consume more resources in the agent and in the network. Unlike a trap, which is discarded as soon as it is sent, an inform request must be held in the memory until a response is received or the request times out. Also, traps are sent only once, while an inform may be retried several times. The retries increase traffic and contribute to a higher overhead on the network.
If you do not enter an snmp-server host command, no notifications are sent. To configure the Content Engine to send SNMP notifications, you must enter at least one snmp-server host command. To enable multiple hosts, you must enter a separate snmp-server host command for each host. You can specify multiple notification types in the command for each host.
When multiple snmp-server host commands are given for the same host and kind of security model, each succeeding command overwrites the previous command. Only the last snmp-server host command will be in effect. For example, if you enter an snmp-server host v2c command for a host and then enter another snmp-server host v3 command for the same host, the second command will replace the first.
The maximum number of SNMP hosts that can be created by entering the snmp-server host commands is eight in the ACNS 5.2 software and later releases. However, you can configure only up to four hosts on a Content Engine running the ACNS 5.1.x software and earlier releases.
When multiple snmp-server host commands are given for the same host, the community string in the last command is used.
The snmp-server host command is used with the snmp-server enable command. Use the snmp-server enable command to specify which SNMP notifications are sent globally. For a host to receive most notifications, at least one snmp-server enable command and the snmp-server host command for that host must be enabled.
Note
You must enable SNMP with the snmp-server community command.
Examples
The following example sends the SNMP traps defined in RFC 1157 to the host specified by the IP address 172.16.2.160. The community string is comaccess.
ContentEngine(config)# snmp-server enable traps
ContentEngine(config)# snmp-server host 172.16.2.160 comaccess
The following example removes the host 172.16.2.160 from the SNMP trap recipient list:
ContentEngine(config)# no snmp-server host 172.16.2.160
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server location
snmp-server mib
snmp-server notify
snmp-server user
snmp-server view
snmp-server location
To set the SNMP system location string, use the snmp-server location global configuration command. To remove the location string, use the no form of this command.
snmp-server location line
no snmp-server location
Syntax Description
location
|
Specifies the text for MIB-II object sysLocation.
|
line
|
String that describes the physical location of this node.
|
Defaults
No system location string is set.
Command Modes
global configuration
Usage Guidelines
The system location string is the value stored in the MIB-II system group system location object. You can see the system location string with the show snmp EXEC command.
Examples
The following example shows how to configure a system location string:
ContentEngine(config)# snmp-server location Building 3/Room 214
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server mib
snmp-server notify
snmp-server user
snmp-server view
snmp-server mib
To configure persistence for the SNMP Event MIB, use the snmp-server mib global configuration command. To disable the Event MIB, use the no form of this command.
snmp-server mib persist event
no snmp-server mib persist event
Syntax Description
persist
|
Configures MIB persistence.
|
event
|
Enables MIB persistence for the Event MIB.
|
Defaults
No default behavior or values
Command Modes
global configuration
Usage Guidelines
The Event MIB can set the threshold on any MIB variables supported by the ACNS 5.x software and store the threshold permanently on disk. The MIB persistence features allow the SNMP data of a MIB to be persistent across reloads; MIB information retains the same set object values each time that the Content Engine reboots.
You enable MIB persistence by using the snmp-server mib persist event command. Enter the write mib-data command to write the MIB data of all MIBs that have had persistence enabled using the snmp-server mib persist event command to a persistent partition on a disk storage. Any modified MIB data must be written to a persistent partition on a disk using the write mib-data command.
The ACNS 5.x software implementation of SNMP supports the following MIBs:
•
MIB-II
•
ENTITY-MIB
•
HOST-RESOURCES-MIB
•
CISCO-CONTENT-ENGINE-MIB
•
CISCO-ENTITY-ASSET-MIB
•
CISCO-CONFIG-MAN-MIB
•
CISCO-CDP-MIB
•
EVENT-MIB
The EVENT-MIB can set the threshold on any MIB variables supported by the ACNS 5.x software and store the threshold permanently on disk. The HOST-RESOURCES-MIB provides statistics on system resources.
Note
In the ACNS 5.2 software and later releases, the CISCO-CONTENT-ENGINE-MIB supports streaming WMT, RealProxy, and Cisco Streaming Engine statistics. Content Engines support WMT and RealProxy. (Cisco Streaming Engine is only supported on Content Engines that are registered with a Content Distribution Manager; Cisco Streaming Engine is not supported on Content Engines.)
In the ACNS 5.3 software release, the CISCO-CONTENT-ENGINE-MIB was modified to add support for WMT RTSP streaming for Windows Media 9 clients and servers (Windows Media 9 players and Windows Media 9 servers).
In the ACNS 5.2 software and later releases, there are six generic alarm traps in the CISCO-CONTENT-ENGINE-MIB for SNMP and Node Health Manager integration.
For each 64-bit counter MIB object, a 32-bit counter MIB object is implemented so that SNMP clients using the SNMPv1 protocol can retrieve data associated with 64-bit counter MIB objects. The MIB objects of each of these groups are read-only:
•
The WMT MIB group provides statistics about WMT proxy and server performance. Twenty-eight MIB objects are implemented in this group. Six of these MIB objects are implemented as 64-bit counters.
•
The Cisco Streaming Engine MIB group provides statistics about the RTSP streaming engine performance. Seven MIB objects are implemented in this group. Two of these MIB objects are implemented as 64-bit counters.
•
The RealProxy MIB group provides statistics about RealProxy performance. Fourteen MIB objects are implemented in this group.
In the ACNS 5.1.1 software and later releases, you can use IP access control lists (ACLs) to control SNMP access on a Content Engine.
You can download the MIB files for all of the MIBs that are supported by a Content Engine that is running the ACNS 5.x software from the following Cisco FTP site:
ftp://ftp.cisco.com/pub/mibs/v2
The MIB objects that are defined in each MIB are described in the MIB files at the above FTP site and are self explanatory.
Examples
The following example sets persistence for the Event MIB:
ContentEngine(config)# snmp-server mib persist event
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server location
snmp-server notify
snmp-server user
snmp-server view
snmp-server notify inform
To configure the SNMP notify inform request, use the snmp-server notify inform global configuration command. To return the setting to the default value, use the no form of this command.
snmp-server notify inform
no snmp-server notify inform
Syntax Description
This command has no arguments or keywords.
Defaults
If you do not enter the snmp-server notify inform command, the default is an SNMP trap request.
Command Modes
global configuration
Usage Guidelines
The snmp-server host command specifies which hosts will receive informs. The snmp-server enable traps command globally enables the production mechanism for the specified notifications (traps and informs).
In order for a host to receive an inform, you must enable the inform globally by entering the snmp-server notify inform command.
The SNMP inform requests feature allows Content Engines to send inform requests to SNMP managers. Content Engines can send notifications to SNMP managers when particular events occur. For example, an agent Content Engine might send a message to a manager when the agent Content Engine experiences an error condition.
SNMP notifications can be sent as traps or inform requests. Traps are unreliable because the receiver does not send any acknowledgment when it receives a trap. The sender cannot determine if the trap was received. However, an SNMP manager that receives an inform request acknowledges the message with an SNMP response protocol data unit (PDU). If the manager does not receive an inform request, it does not send a response. If the sender never receives a response, the inform request can be sent again. Informs are more likely to reach their intended destination.
Because they are more reliable, informs consume more resources in the Content Engine and in the network. Unlike a trap, which is discarded as soon as it is sent, an inform request must be held in the memory until a response is received or the request times out. Also, traps are sent only once, while an inform may be retried several times. The retries increase traffic and contribute to a higher overhead on the network. Traps and inform requests provide a trade-off between reliability and resources.
Tip
If it is important that the SNMP manager receives every notification, then you should use inform requests in your network. If you are concerned about traffic on your network or about the memory in the Content Engine and you do not need to receive every notification, then you should use traps in your network.
Examples
The following example configures the SNMP notify inform request on the Content Engine:
ContentEngine(config)# snmp-server notify inform
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server location
snmp-server mib
snmp-server user
snmp-server view
snmp-server user
To define a user who can access the SNMP server, use the snmp-server user global configuration command. To remove access, use the no form of this command.
snmp-server user name group [auth {md5 password [priv password] | sha password [priv
password]} | remote octetstring [auth {md5 password [priv password] | sha password [priv
password]}]]
no snmp-server user name group [auth {md5 password | sha password} [priv password] | remote
octetstring [auth {md5 password | sha password} [priv password]]]
Syntax Description
name
|
Name of the SNMP user. Use letters, numbers, dashes, and underscores, but no blanks. This is the name of the user on the SNMP host who wants to communicate with the SNMP agent on the Content Engine. You can enter a maximum of 64 characters.
|
group
|
Name of the group to which the SNMP user belongs. You can enter a maximum of 64 characters.
|
auth
|
(Optional) Configures user authentication parameters.
|
md5
|
Configures the Hashed-Based Message Authentication Code Message Digest 5 (HMAC MD5) authentication algorithm.
|
password
|
HMAC MD5 user authentication password.
|
priv
|
(Optional) Configures authentication parameters for the packet.
|
password
|
HMAC MD5 user private password. You can enter a maximum of 256 characters.
|
sha
|
Configures the HMAC Secure Hash Algorithm (SHA) authentication algorithm.
|
password
|
HMAC SHA authentication password. You can enter a maximum of 256 characters.
|
remote
|
(Optional) Specifies the engine identity of the remote SNMP entity to which the user belongs.
|
octetstring
|
Globally unique identifier for a remote SNMP entity (for example, the SNMP network management station) for at least one of the SNMP users.
|
Defaults
No default behavior or values
Command Modes
global configuration
Usage Guidelines
The maximum number of SNMP users that can be created is 10. Follow these guidelines when defining SNMP users for Content Engines:
•
If the SNMPv3 protocol is going to be used for SNMP requests, you must define at least one SNMPv3 user account on the Content Engine in order for the Content Engine to be accessed through SNMP.
•
A group defined with the SNMPv1 or SNMPv2c security model should not be associated with SNMP users; they should only be associated with the community strings.
Tip
To send an SNMPv3 inform message, you must configure at least one SNMPv3 user with a remote SNMP ID option on the Content Engine. The SNMP ID is entered in octet string form. For example, if the IP address of a remote SNMP entity is 192.147.142.129, then the octet string would be 00:00:63:00:00:00:a1:c0:93:8e:81.
Examples
The following example shows that an SNMPv3 user account is created on the Content Engine. The SNMPv3 user is named acme and belongs to the group named admin. Because this SNMP user account has been set up with no authentication password, the SNMP agent on the Content Engine does not perform authentication on SNMP requests from this user.
ContentEngine(config)# snmp-server user acme admin
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable
snmp-server group
snmp-server host
snmp-server location
snmp-server mib
snmp-server notify
snmp-server view
snmp-server view
To define a Version 2 SNMP (SNMPv2) MIB view, use the snmp-server view global configuration command. To undefine the MIB view, use the no form of this command.
snmp-server view viewname MIBfamily {excluded | included}
no snmp-server view viewname MIBfamily [excluded | included]
Syntax Description
viewname
|
Name of this family of view subtrees. You can enter a maximum of 64 characters.
|
MIBfamily
|
An object identifier that identifies a subtree of the MIB. You can enter a maximum of 64 characters.
|
excluded
|
Excludes the MIB family from the view.
|
included
|
Includes the MIB family from the view.
|
Defaults
No default behavior or values
Command Modes
global configuration
Usage Guidelines
An SNMP view is a mapping between SNMP objects and the access rights available for those objects. An object can have different access rights in each view. Access rights indicate whether the object is accessible by either a community string or a user. The snmp-server view command is used with the snmp-server group to limit the read-write access of MIB trees based on the group. Because the group can be associated with the SNMP community string or users, using the snmp-server view command extends the limit to users and community strings. If the view is not configured, read-write access to the community string applies to the MIB tree and all users (SNMPv3).
The maximum number of views that can be created is 10. You can configure the SNMP view settings only if you have previously configured the SNMP server settings.
To remove a view record, use the no snmp-server view command.
You can enter the snmp-server view command multiple times for the same view record. Later lines take precedence when an object identifier is included in two or more lines.
Examples
The following example shows how to configure the view name, family name, and view type:
Content Engine(config)# snmp-server view contentview ciscoContentEngineMIB included
The following example creates a view that includes all objects in the MIB-II system group and all objects in the Cisco enterprise MIB:
Content Engine(config)# snmp-server phred system included
Content Engine(config)# snmp-server view phred cisco included
The following example creates a view that includes all objects in the MIB-II system group except for sysServices (System 7) in the MIB-II interfaces group:
ContentEngine(config)# snmp-server view agon system included
ContentEngine(config)# snmp-server view agon system.7 excluded
Related Commands
show snmp
snmp-server access-list
snmp-server community
snmp-server contact
snmp-server enable
snmp-server group
snmp-server host
snmp-server location
snmp-server mib
snmp-server notify
snmp-server user
speed
To set the Fibre Channel interface speed, use the speed interface configuration command. To reset the interface speed, use the no form of this command.
speed {1 | 2 | autosense}
no speed {1 | 2 | autosense}
Syntax Description
1
|
Sets the Fibre Channel interface speed to 1 gigabit per second (Gbps).
|
2
|
Sets the Fibre Channel interface speed to 2 Gbps.
|
autosense
|
Sets the Fibre Channel to automatically sense the interface speed.
|
Defaults
No default behavior or values
Command Modes
interface configuration
Examples
The following example shows how to configure the speed of the Fibre Channel interface to 1 Gbps:
ContentEngine(config)# interface FibreChannel 0/1
ContentEngine(config-if)# speed 1
The following example shows how to configure the speed of the Fibre Channel interface to autosense:
ContentEngine(config)# interface FibreChannel 0/1
ContentEngine(config-if)# speed autosense
Related Commands
interface
show interface
show running-config
show startup-config
sshd
To enable the Secure Shell (SSH) daemon, use the sshd global configuration command. To disable SSH, use the no form of this command.
sshd {enable | password-guesses number | timeout seconds | version {1 | 2}}
no sshd {enable | password-guesses | timeout | version {1 | 2}}
Syntax Description
enable
|
Enables the SSH feature.
|
password-guesses
|
Specifies the number of allowable password guesses per connection.
|
number
|
Maximum number of incorrect password guesses allowed (1-99). (The default is 3.)
|
timeout
|
Configures the number of seconds for which an SSH session will be active during the negotiation (authentication) phase between the client and the server before it times out.
Note If you have established an SSH connection to the Content Engine but have not entered the username when prompted at the login prompt, the connection will be terminated by the Content Engine even after successful login if the grace period expires.
|
seconds
|
SSH login grace time value in seconds (1-99999). (The default is 300.)
|
version
|
Configures the SSH version to be supported on the Content Engine.
|
1
|
Specifies that SSH version 1 is supported on the Content Engine.
|
2
|
Specifies that SSH version 2 is supported on the Content Engine.
|
Defaults
password-guesses number: 3 guesses.
timeout seconds: 300 seconds.
version: Both SSH version 1 and 2 are enabled.
Command Modes
global configuration
Usage Guidelines
SSH enables login access to the Content Engine through a secure and encrypted channel. SSH consists of a server and a client program. Like Telnet, you can use the client program to remotely log on to a machine that is running the SSH server, but unlike Telnet, messages transported between the client and the server are encrypted. The functionality of SSH includes user authentication, message encryption, and message authentication.
In the ACNS software 5.3 and later releases, when you enable the SSH server, the Secure File Transfer Protocol (SFTP) server is also enabled. The SFTP is a file transfer program that provides a secure and authenticated method for transferring files between ACNS devices and other workstations or clients.
Note
SFTP is the standard file transfer protocol introduced in SSH version 2. The SFTP client functionality is provided as part of the SSH component. If you use SSH version 1 on the Content Engine, SFTP support is not available.
Before you enable the sshd command, use the ssh-key-generate command to generate a private and a public host key, which the client programs use to verify the server's identity.
Although the sshd password-guesses command specifies the number of allowable password guesses from the SSH server side, the actual number of password guesses for an SSH login session is determined by the combined number of allowable password guesses of the SSH server and the SSH client. Some SSH clients limit the maximum number of allowable password guesses to three (or to one in some cases), even though the SSH server side allows more than this number of guesses.
When you enter the sshd password-guesses command, specifying n allowable password guesses causes certain SSH clients to interpret this number as n+1. For example, when configuring the number of guesses to two by entering the sshd password-guesses 2 command for a particular device, SSH sessions from some SSH clients will allow three password guesses.
The sshd version global configuration command allows you to enable support for either SSH version 1 or SSH version 2. When you enable SSH using the sshd enable global configuration command, the ACNS software enables support for both SSH version 1 and SSH version 2 on the Content Engine. If you want the Content Engine to support only one version of SSH (for example SSH version 2), you must disable the other version (in this example, SSH version 1) by using the no sshd version 1 command.
When support for both SSH version 1 and SSH version 2 are enabled in the Content Engine, the show running-config EXEC command output does not display any sshd configuration. If you have disabled the support for one version of SSH, the show running-config EXEC command output contains the following line:
no sshd version version_number
Note
You cannot disable both SSH versions in a Content Engine. Use the no sshd enable global configuration command to disable SSH on the Content Engine.
Examples
The following example shows how to enable the SSH daemon and configure the number of allowable password guesses and timeout for the Content Engine:
ContentEngine(config)# sshd enable
ContentEngine(config)# sshd password-guesses 4
ContentEngine(config)# sshd timeout 20
The following example disables the support for SSH version 1 in the Content Engine:
ContentEngine(config)# no sshd version 1
Related Commands
ssh-key-generate
show ssh
ssh-key-generate
To generate the Secure Shell (SSH) host key, use the ssh-key-generate global configuration command. To remove the SSH key, use the no form of this command.
ssh-key-generate [key-length length]
no ssh-key-generate [key-length length]
Syntax Description
key-length
|
(Optional) Configures the length of the SSH key.
|
length
|
Specifies the number of bits to create an SSH key (512-2048).
|
Defaults
key-length length: 1024 bits
Command Modes
global configuration
Usage Guidelines
Before you enable the sshd command, use the ssh-key-generate command to generate a private and a public host key, which the client programs use to verify a server's identity.
When a user runs an SSH client and logs in to the Content Engine, the public key for the SSH daemon running on the Content Engine is recorded in the client machine known_hosts file in the user's home directory. If the Content Engine administrator subsequently regenerates the host key by entering the ssh-key-generate command, the user must delete the old public key entry associated with the Content Engine in the known_hosts file before running the SSH client program to log in to the Content Engine. When the user runs the SSH client program after deleting the old entry, the known_hosts file is updated with the new SSH public key for the Content Engine.
Examples
The following example generates an SSH public key and then enables the SSH daemon:
ContentEngine(config)# ssh-key-generate
Ssh host key generated successfully
Saving the host key to box ...
Host key saved successfully
ContentEngine(config)# sshd enable
Ssh daemon started successfully
Related Commands
sshd
standby
To configure an interface to be a backup for another interface, use the standby interface configuration command. To restore the default configuration of the interface, use the no form of this command.
standby group_number {description text | errors max-errors | ip ip-address netmask | priority
priority_level | shutdown}
no standby group_number {description text | errors max-errors | ip ip-address netmask | priority
priority_level | shutdown}
Syntax Description
group_number
|
Standby group number (1-4).
|
description
|
(Optional) Sets the description for the specified interface.
|
text
|
Description for the specified interface. The maximum length of the description text is 240 characters.
|
errors
|
Sets the maximum number of errors allowed on the active interface before the interface is shut down and the standby interface is brought up. This option is disabled by default.
|
max-errors
|
Maximum number of errors (0-4294967295).
|
ip
|
Sets the IP address for the specified standby group (Standby Group 1, 2, 3, or 4).
|
ip-address
|
IP address of the specified standby group (Standby Group 1, 2, 3, or 4). The group IP address and netmask of a standby group must be configured on all of the member interfaces.
|
netmask
|
Netmask of the specified standby group (Standby Group 1, 2, 3, or 4).
|
priority
|
Sets the priority of the member interface within a standby group. The priority of a member interface can be changed at run time. The member interface that has the highest priority after this change becomes the new active interface (the default action is to preempt the currently active interface if an interface with higher priority exists).
|
priority_level
|
Each member interface is assigned a priority number. The member interface with the highest priority number is the active interface for that standby group. Only the active interface uses the group IP address.
If the priority option is specified without a priority number, the default value of 100 is used.
|
shutdown
|
(Optional) Shuts down the specified standby group (Standby Group 1, 2, 3, or 4). You can shut down a standby group even if you have not configured a group IP address for the standby group.
Note When a standby group is shut down, all of the alarms previously raised by this standby group are cleared.
|
Defaults
There are no standby interfaces by default. The errors option is disabled by default.
Command Modes
interface configuration
Usage Guidelines
In the ACNS 5.2 software and later releases, you can configure one or more interfaces to act as a backup interface (a standby interface) for another interface on a Content Engine. This feature is called standby interface support. Standby groups, which are logical groups of interfaces, are used to implement this feature. When an active network interface fails (because of cable trouble, Layer 2 switch failure, high error count, or other failures) and that interface is part of a standby group, a standby interface can become active and take the load off the failed interface.
A standby group must have at least two interfaces. Interfaces that are part of a standby group are called member interfaces. After you create a standby group, you define which interfaces should be assigned to this logical group. As part of defining the member interfaces, you specify the priority of each member interface in a standby group. The member interface with the highest assigned priority is the active interface for that particular standby group. If the active interface fails, the operational member interface with the next highest priority in the standby group comes up, and so forth. If all member interfaces of a particular standby group are down and then one of the member interfaces comes up, the ACNS software detects this situation and brings up the standby group on the member interface that just came up.
In the ACNS 5.3 software and later releases, the failure or failover of member interfaces within a standby group triggers alarms and traps (if alarms and traps are enabled on the Content Engine). Alarms are sent out when failover occurs between member interfaces in a standby group. Specifically, minor alarms are sent out when member interfaces fail, and these alarms are cleared automatically when the interface failover has been successfully completed. Major alarms are sent out if the standby group goes down (no member interface in a standby group can be brought up.)
Note
A physical interface can belong to more than one standby group, and a single interface can act as a standby interface for more than one standby group.
This standby interface feature can also be used to support a redundant network that uses Layer 4 Cisco Content Services Switch [CSS] switches) to load balance requests to multiple Content Engines. The CSS switch supports active-standby configuration. If the active CSS switch fails, the standby CSS switch takes over all of the load. In such a case, the Content Engine detects this failure and starts serving the same IP address (shared IP address) on the standby network interface card (NIC), which preserves the existing TCP sessions (session-level redundancy). Session-level redundancy is only possible if the CSS switch can preserve sessions in a failure scenario. If the CSS switch loses the sessions, the session will be lost.
To configure standby interfaces, interfaces are logically assigned to standby groups. The following rules define the standby group relationships:
•
Each standby group is assigned a unique standby IP address, shared by all member interfaces of the standby group. The IP address of the standby group is shared among the member interfaces; however, only the active interface of the standby group uses this shared IP address at any one time. This shared IP address is configured as an alias on the active interface.
•
In the ACNS 5.2.x software, a physical interface needed a dummy or valid IP address assigned to it before you could add the physical interface to a standby group. In the ACNS 5.3 software and later releases, this assignment of an IP address to a physical interface is no longer a requirement.
•
The duplex and speed settings of the member interfaces can be configured for better reliability.
•
If all the member interfaces of a standby group fail and then one recovers, the ACNS software brings up the standby group on the operational member interface.
•
If a physical interface is a member of a port-channel group, it cannot join a standby group. If a physical interface is a member of a standby group, it cannot join a port-channel group.
•
A standby group comprises two or more interfaces.
•
The maximum number of standby groups on a Content Engine is four.
Note
Interface IP addresses and standby group IP addresses must be on different subnets to ensure reliable operation. You can use dummy IP addresses in the private address space to serve as interface primary IP addresses, and use the real Content Engine IP address to serve as the standby group IP address in a different subnet to satisfy this requirement. When dummy IP addresses are used, these interface IP addresses serve only as substitutes to bring up the interface. For example, the Content Engine interface requires an IP address on an interface for initialization. Make sure to configure the interface default gateway using the ip default-gateway global configuration command instead of the ip route command.
•
Each interface in a standby group is assigned a priority. The operational interface with the highest priority in a standby group is the active interface. Only the active interface uses the group IP address.
•
If the active interface fails, the operational interface in its standby group that is assigned the next highest priority becomes active. However, when the interface with the higher priority recovers, it does not become active again without manual intervention.
•
The priority of an interface in a standby group can be changed at run time. The member interface that has the highest priority after this change becomes the new active interface (the default action is to preempt the currently active interface if an interface with higher priority exists).
•
The maximum number of errors allowed on the active interface before the interface is shut down and the standby is brought up is configured with the errors option, which is disabled by default.
Tip
If an interface belongs to more than one standby group, you can configure the interface with a different priority in each standby group for better load balancing. For example, interfaces FE 0/0 and FE 0/1 are both in standby group 1 and in standby group 2. If you configure FE 0/0 with the highest priority in standby group 1 and configure FE 0/1 with the highest priority in standby group 2, standby group 1 will use FE 0/0 as the active interface, while standby group 2 will use FE 0/1 as the active interface. This configuration allows each interface to back up the other one, if one of them fails.
Use the interface standby global configuration command to create standby groups on Content Engines. In the ACNS 5.3 software, the CLI syntax for configuring standby groups was changed to make it more similar to the port channel CLI syntax.
Note
Unlike port channels, standby groups do not support IP ACLs at a group level. However, you can configure a member interface of a standby group to support an IP ACL at the interface level. For example, you can individually configure the two member interfaces of Standby Group 1 (the Fast Ethernet slot 0/port 0 interface and the Fast Ethernet slot 0/port 1 interface) to support an IP ACL named ACL1 but you cannot configure the Standby Group 1 to support ACL1.
Examples
The following example configures three Fast Ethernet interfaces to be part of the same standby group, with interface 3/0 as the active interface:
Console(config-if)# interface fastEthernet 3/0 standby 1 ip 172.16.10.10 255.255.254.0
Console(config-if)# interface fastEthernet 3/1 standby 1 ip 172.16.10.10 255.255.254.0
Console(config-if)# interface fastEthernet 3/2 standby 1 ip 172.16.10.10 255.255.254.0
Console(config-if)# interface fastEthernet 3/0 standby 1 priority 300
Console(config-if)# interface fastEthernet 3/1 standby 1 priority 200
Console(config-if)# interface fastEthernet 3/2 standby 1 priority 100
Console(config-if)# interface fastEthernet 3/0 standby 1 errors 10000
Console(config-if)# interface fastEthernet 3/1 standby 1 errors 10000
Console(config-if)# interface fastEthernet 3/2 standby 1 errors 10000
The following example displays information about the standby group configuration by entering the show standby EXEC command. In the following sample command output, one standby group (Standby Group 1) is configured on this Content Engine. The command output also shows which member interface is the active interface. In this case, the active interface is the Fast Ethernet slot 3/port 0 interface.
ContentEngine# show standby
IP address: 172.16.10.10, netmask: 255.255.254.0
Maximum errors allowed on the active interface: 10000
FastEthernet 3/0 priority: 300
FastEthernet 3/1 priority: 200
FastEthernet 3/2 priority: 100
Active interface: FastEthernet 3/0
Note
To display information about a specific standby group configuration, enter the show interface standby group_number EXEC command.
The following example creates a standby group, Standby Group 1:
ContentEngine(config)# interface standby 1
ContentEngine(config-if)#
The following example assigns a group IP address of 10.10.10.10 and a netmask of 255.0.0.0 to Standby Group 1. In the ACNS 5.3 software and later releases, you can configure a group IP address regardless of whether the standby group is shut down or not.
ContentEngine(config-if)# ip address 10.10.10.10 255.0.0.0
ContentEngine(config-if)# errors 500
The following example shows how to add two Fast Ethernet interfaces to Standby Group 1 and then assign each of these member interfaces a priority within the group:
a.
Add a Fast Ethernet interface (slot 0/port 0) to Standby Group 1 and assign a priority of 150:
ContentEngine(config)# interface FastEthernet 0/0
ContentEngine(config-if)# standby 1 priority 150
b.
Add a second Fast Ethernet interface (slot 0/port 1) to Standby Group 1 and assign a priority of 100 (the default value):
ContentEngine(config)# interface FastEthernet 0/1
ContentEngine(config-if)# standby 1
ContentEngine(config-if)# exit
Because Fast Ethernet 0/0 is assigned the highest priority (a priority number of 150) of all the member interfaces in the group, it will be chosen as the active interface for the group if it can be brought up.
The following example removes the Fast Ethernet slot 0/port 1 interface) from Standby Group 1 using the no form of the standby command:
ContentEngine(config)# interface FastEthernet 0/1
ContentEngine(config-if)# no standby 1
ContentEngine(config-if)# exit
The following example shows how to shut down Standby Group 1. When a standby group is shut down, all of the alarms previously raised by this standby group are cleared.
ContentEngine(config)# interface standby 1
ContentEngine(config-if)# exit
ContentEngine(config)# exit
The following example shows how to tear down Standby Group 1:
ContentEngine(config)# interface standby 1
ContentEngine(config-if)# no ip address 10.10.10.10 255.0.0.0
Please remove member interface(s) from this standby group first.
ContentEngine(config)# interface GigabitEthernet 2/0
ContentEngine(config-if)# no standby 1
ContentEngine(config-if)# exit
ContentEngine(config)# interface standby 1
ContentEngine(config-if)# no ip address 10.10.10.10 255.0.0.0
ContentEngine(config-if)# exit
ContentEngine(config)# no interface standby 1
ContentEngine(config)# exit
Related Commands
interface
show interface
show running-config
show standby
show startup-config
tacacs
To configure TACACS+ server parameters, use the tacacs command in global configuration mode. To disable individual options, use the no form of this command.
tacacs {enable | host {hostname | ip-address} [primary] | key keyword | password ascii |
retransmit retries | timeout seconds}
no tacacs {enable | host {hostname | ip-address} [primary] | key | password ascii | retransmit |
timeout}
Syntax Description
enable
|
Enables the TACACS+ authentication.
|
host
|
Sets a server address.
|
hostname
|
Hostname of the TACACS+ server.
|
ip-address
|
IP address of the TACACS+ server.
|
primary
|
(Optional) Sets the server as the primary server.
|
key
|
Sets the security word.
|
keyword
|
Keyword. An empty string is the default.
|
password ascii
|
Specifies ASCII as the TACACS+ password type.
|
retransmit
|
Sets the number of times that requests are retransmitted to a server.
|
retries
|
Number of retry attempts allowed (1-3). The default is 2 retry attempts.
|
timeout
|
Sets the number of seconds to wait before a request to a server is timed out.
|
seconds
|
Timeout in seconds (1-20). The default is 5 seconds.
|
Defaults
keyword: none (empty string).
timeout seconds: 5.
retries: 2.
password: The default password type is PAP.
Command Modes
global configuration
Usage Guidelines
Using the tacacs command, configure the TACACS+ key, the number of retransmits, the server hostname or IP address, and the timeout.
You must execute the following two commands to enable user authentication with a TACACS+ server:
ContentEngine(config)# authentication login tacacs enable
ContentEngine(config)# authentication configuration tacacs enable
You must enable TACACS+ for HTTP request authentication as follows:
ContentEngine(config)# tacacs enable
TACACS+ can be disabled but remain configured for user authentication with a TACACS+ server if you use the no option of the command as follows:
ContentEngine(config)# no tacacs enable
HTTP request authentication is independent of user authentication options and must be disabled with the following separate commands:
ContentEngine(config)# no authentication login tacacs enable
ContentEngine(config)# no authentication configuration tacacs enable
The Users GUI page or the user global configuration commands provide a way to add, delete, or modify usernames, passwords, and access privileges in the local database. The TACACS+ remote database can also be used to maintain login and configuration privileges for administrative users. The tacacs host command or the TACACS+ Content Engine GUI page allows you to configure the network parameters required to access the remote database.
One primary and two backup TACACS+ servers can be configured; authentication is attempted on the primary server first and then on the others in the order in which they were configured. The primary server is the first server configured unless another server is explicitly specified as primary with the tacacs host hostname primary command.
Use the tacacs key command to specify the TACACS+ key that is used to encrypt the packets transmitted to the server. This key must be the same as the one specified on the server daemon. The maximum number of characters in the key should not exceed 99 printable ASCII characters (except tabs). An empty key string is the default. All leading spaces are ignored; spaces within and at the end of the key string are not ignored. Double quotes are not required even if there are spaces in the key, unless the quotes themselves are part of the key.
The tacacs timeout is the number of seconds that the Content Engine waits before declaring a timeout on a request to a particular TACACS+ server. The range is from 1 to 20 seconds with 5 seconds as the default. The number of times that the Content Engine repeats a retry-timeout cycle before trying the next TACACS+ server is specified by the tacacs retransmit command. The default is two retry attempts.
Three unsuccessful login attempts are permitted. TACACS+ logins may appear to take more time than local logins depending on the number of TACACS+ servers and the configured timeout and retry values.
Use the tacacs password ascii command to specify the TACACS+ password type as ASCII. The default password type is Password Authentication Protocol (PAP). In releases prior to the ACNS software 5.x, the password type was not configurable. When users needed to log in to a Content Engine, a TACACS+ client sent the password information in PAP format to a TACACS+ server. However, TACACS+ servers that were configured for router management required the passwords to be in ASCII clear text format instead of PAP format to authenticate users logging in to the Content Engine. The password type to authenticate user information to ASCII was configurable from the CLI.
Note
When the no tacacs password ascii command is used to disable the ASCII password type, the password type is once again reset to PAP.
The TACACS+ client can send different requests to the server for user authentication. The client can send a TACACS+ request with the PAP password type. In this scenario, the authentication packet includes both the username and the user's password. The server must have an appropriately configured user's account.
Alternatively, the client can send a TACACS+ request with the ASCII password type as another option. In this scenario, the authentication packet includes the username only and waits for the server response. Once the server confirms that the user's account exists, the client sends another Continue request with the user's password. The authentication server must have an appropriately configured user's account to support either type of password.
Examples
The following example configures the key used in encrypting packets:
ContentEngine(config)# tacacs key human789
The following example configures the host named spearhead as the primary TACACS+ server:
ContentEngine(config)# tacacs host spearhead primary
The following example sets the timeout interval for the TACACS+ server:
ContentEngine(config)# tacacs timeout 10
The following example sets the number of times that authentication requests are retried (retransmitted) after a timeout:
ContentEngine(config)# tacacs retransmit 5
The following example shows the password type to be PAP by default:
ContentEngine# show tacacs
Login Authentication for Console/Telnet Session: enabled (secondary)
Configuration Authentication for Console/Telnet Session: enabled (secondary)
TACACS+ Authentication is off
---------------------------- ------
However, you can configure the password type to be ASCII using the tacacs password ascii command. You can then verify the changes using the show tacacs command as follows:
ContentEngine(config)# tacacs password ascii
ContentEngine(config)# exit
ContentEngine# show tacacs
Login Authentication for Console/Telnet Session: enabled (secondary)
Configuration Authentication for Console/Telnet Session: enabled (secondary)
TACACS+ Authentication is off
---------------------------- ------
Related Commands
authentication
show authentication
show statistics authentication
show statistics tacacs
show tacacs