Table Of Contents
lls
logging
ls
mkdir
mkfile
movie-streamer
mtu
no (global configuration)
no (interface configuration)
ntp
ntpdate
ping
ping6
port-channel
primary-interface
pwd
qos
radius-server
rcp
rea
reload
rename
restore
rmdir
rtsp
rule
script
service-router
setup
show access-lists
show acquirer
show alarms
show arp
show authentication
show authsvr
show bandwidth
show banner
show bitrate
show cache
show capability
show cdnfs
show clock
show cms
show content
show debugging
show device-mode
show direct-server-return
show disks
show distribution
show flash
show flash-media-streaming
show ftp
show hardware
show hosts
show http
show icap
show interface
show inventory
show ip access-list
show ip routes
show ldap
show logging
show movie-streamer
show ntp
show processes
show programs
show qos
show radius-server
show rea
show rcp
show rtsp
show rule
show running-config
show service-router
show services
show snmp
show ssh
show standby
show startup-config
show statistics access-lists 300
show statistics acquirer
show statistics authentication
show statistics cdnfs
lls
To view a long list of directory names, use the lls EXEC command.
lls [directory]
Syntax Description
directory
|
(Optional) Name of the directory for which you want a long list of files.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
This command provides detailed information about files and subdirectories stored in the present working directory (including size, date, time of creation, sysfs name, and long name of the file). This information can also be viewed with the dir command.
Examples
The following example shows how to view a long list of directory names:
size time of last change name
-------------- ------------------------- -----------
4096 Mon Jan 10 14:02:26 2005 <DIR> WebsenseEnterprise
4096 Mon Jan 10 14:02:26 2005 <DIR> Websense_config_backup
10203 Mon Feb 28 04:24:53 2005 WsInstallLog
4096 Wed Feb 9 00:59:48 2005 <DIR> core_dir
4096 Mon Jan 10 13:49:27 2005 <DIR> crash
382 Tue Mar 1 03:32:13 2005 crka.log
1604 Tue Feb 22 03:55:04 2005 dbupgrade.log
4096 Mon Jan 10 14:02:31 2005 <DIR> downgrade
4096 Mon Feb 28 04:17:32 2005 <DIR> errorlog
53248 Tue Mar 1 03:01:53 2005 <DIR> logs
16384 Mon Jan 10 13:49:26 2005 <DIR> lost+found
438 Tue Jan 11 05:37:57 2005 new_file.xml
8192 Tue Mar 1 00:00:00 2005 <DIR> preload_dir
4096 Tue Mar 1 03:26:00 2005 <DIR> sa
40960 Tue Mar 1 03:32:15 2005 <DIR> service_logs
4096 Tue Feb 22 03:51:25 2005 <DIR> smartfilter
384802 Mon Feb 28 03:46:00 2005 syslog.txt
16296 Mon Feb 21 04:42:12 2005 test
4096 Mon Jan 10 14:02:24 2005 <DIR> var
4096 Sat Feb 12 07:15:23 2005 <DIR> wmt_vod
Related Commands
dir
ls
logging
To configure system logging, use the logging global configuration command. To disable logging functions, use the no form of this command.
logging {console {enable | priority loglevel} | disk {enable | filename filename | priority
loglevel | recycle size} | facility facility | host {hostname | ip-address} [port port_num |
priority loglevel | rate-limit message_rate]}
no logging {console {enable | priority} | disk [enable | filename | priority | recycle] | facility |
host {hostname | ip-address} [port port_num | priority loglevel | rate-limit message_rate]}
Syntax Description
console
|
Sets system logging to a console.
|
enable
|
Enables system logging to a console.
|
priority
|
Sets which priority level messages to send to a syslog file.
|
loglevel
|
Use one of the following keywords:
|
alert
|
Immediate action needed. Priority 1.
|
critical
|
Immediate action needed. Priority 2.
|
debug
|
Debugging messages. Priority 7.
|
emergency
|
System is unusable. Priority 0.
|
error
|
Error conditions. Priority 3.
|
information
|
Informational messages. Priority 6.
|
notice
|
Normal but significant conditions. Priority 5.
|
warning
|
Warning conditions. Priority 4.
|
disk
|
Sets system logging to a disk file.
|
enable
|
Enables system logging to a disk file.
|
filename
|
Sets the name of the syslog file.
|
filename
|
Specifies the name of the syslog file.
|
recycle
|
Overwrites the syslog.txt when it surpasses the recycle size.
|
size
|
Size of the syslog file in bytes (1000000-50000000).
|
facility
|
Sets the facility parameter for syslog messages.
|
facility
|
Use one of the following keywords:
|
auth
|
Authorization system.
|
daemon
|
System daemons.
|
kernel
|
Kernel.
|
local0
|
Local use.
|
local1
|
Local use.
|
local2
|
Local use.
|
local3
|
Local use.
|
local4
|
Local use.
|
local5
|
Local use.
|
local6
|
Local use.
|
local7
|
Local use.
|
mail
|
Mail system.
|
news
|
USENET news.
|
syslog
|
Syslog itself.
|
user
|
User process.
|
uucp
|
UUCP system.
|
host
|
Sets the system logging to a remote host.
|
hostname
|
Hostname of the remote syslog host. Specifies up to four remote syslog hosts.
Note To specify more than one syslog host, use multiple command lines; specify one host per command.
|
ip-address
|
IP address of the remote syslog host. Specifies up to four remote syslog hosts.
Note To specify more than one syslog host, use multiple command lines; specify one host per command.
|
port
|
(Optional) Specifies the port to be used when logging to a host.
|
port_num
|
Port to be used when logging to a host. The default port is 514.
|
priority
|
(Optional) Sets the priority level for messages when logging messages to a host. The default priority is warning.
|
loglevel
|
Use one of the following keywords:
|
alert
|
Immediate action needed. Priority 1.
|
critical
|
Immediate action needed. Priority 2.
|
debug
|
Debugging messages. Priority 7.
|
emergency
|
System is unusable. Priority 0.
|
error
|
Error conditions. Priority 3.
|
information
|
Informational messages. Priority 6.
|
notice
|
Normal but significant conditions. Priority 5.
|
warning
|
Warning conditions. Priority 4.
|
rate-limit
|
(Optional) Sets the rate limit (in messages per second) for sending messages to a host.
|
message_rate
|
Rate limit (in messages per second) for sending messages to the host. (0-10000). Setting the rate limit to 0 disables rate limiting.
|
Defaults
Logging: on
Priority of message for console: warning
Priority of message for log file: debug
Priority of message for a host: warning
Log file: /local1/syslog.txt
Log file recycle size: 10,000,000 bytes
Command Modes
Global configuration
Usage Guidelines
Use the logging command to set specific parameters of the system log file. System logging is always enabled internally on the SE. The system log file is located on the sysfs partition as /local1/syslog.txt. This file contains the output from many of the CDS components running on the SE, such as authentication entries, privilege levels, administrative details, and diagnostic output during the boot process.
To view information about events that have occurred in all devices in your CDS network, you can use the system message log feature. When a problem occurs in the CDS network, use the system message logs to diagnose and correct such problems.
The syslog.txt file on the CDSM contains information about events that have occurred on the CDSM and not on the registered nodes. The messages written to the syslog.txt file depend on specific parameters of the system log file that you have set using the logging global configuration command. For example, a critical error message logged on a registered node does not appear in the syslog.txt file on the CDSM because the problem never occurred on the CDSM but occurred only on the registered node. However, such an error message will be displayed in the syslog.txt file on the registered node.
A disk failure syslog message is generated every time that a failed sector is accessed. Support for filtering multiple syslog messages for a single failed sector on an IDE disk was added. Support for filtering multiple syslog messages for a single failed section for SCSI disks and SATA disks exists.
To configure the SE to send varying levels of event messages to an external syslog host, use the logging host option. Logging can be configured to send various levels of messages to the console using the logging console priority option.
The no logging disk recycle size command sets the file size to the default value. Whenever the current log file size surpasses the recycle size, the log file is rotated. The log file cycles through at most five rotations, and they are saved as [log file name].[1-5] under the same directory as the original log. The rotated log file is the one configured using the logging disk filename command.
Configuring System Logging to Remote Syslog Hosts
Cisco Internet Streamer Release 2.4 software, supported logging to only a single remote syslog host, and the following two commands is used to configure a single remote syslog host for an SE:
ServiceEngine(config)#
logging host hostname
ServiceEngine(config)#
logging priority priority
You can configure an SE to send varying levels of messages to up to four remote syslog hosts. To accommodate this, logging host priority priority global configuration command (shown above) is deprecated, and the logging host hostname global configuration command is extended as follows:
ServiceEngine(config)#[no]
logging host hostname [priority priority-code | port port
|rate-limit limit]
where the following is true:
•
hostname is the hostname or IP address of the remote syslog host. Specify up to four remote syslog hosts. To specify more than one syslog host, use multiple command lines; specify one host per command.
•
priority-code is the severity level of the message that should be sent to the specified remote syslog host. The default priority-code is "warning" (level 4). Each syslog host can receive a different level of event messages.
Note
You can achieve syslog host redundancy by configuring multiple syslog hosts on the SE and assigning the same priority code to each configured syslog host (for example, assigning a priority code of "critical" level 2 to syslog host 1, syslog host 2, and syslog host 3).
•
port is the destination port of the remote syslog host to which the SE is to send the messages. The default port is port 514. In releases prior to the Internet Streamer CDS Release 2.x software, you could not change the default port. Syslog messages were only sent to port 514 on the specified syslog host.
•
rate-limit specifies the number of messages that are allowed to be sent to the remote syslog host per second. To limit bandwidth and other resource consumption, messages to the remote syslog host can be rate limited. If this limit is exceeded, messages to the specified remote syslog host are dropped. There is no default rate limit, and by default all syslog messages are sent to all of the configured syslog hosts. If the rate limit is exceeded, a message of the day (MOTD) will be printed for any CLI EXEC shell login.
Mapping syslog Priority Levels to RealProxy Error Codes
The RealProxy system generates error messages and writes them to the RealProxy log file. These error messages are captured by the caching application and passed to the system log file. A one-to-one mapping exists between the RealProxy error codes and the syslog priority levels.
Examples
The following example shows that the SE is configured to send messages that have a priority code of "error" (level 3) to the console:
ServiceEngine(config)#logging console priority warnings
The following example shows that the SE is configured to disable sending of messages that have a priority code of "error" (level 3) to the console:
ServiceEngine(config)#no logging console warnings
The following example shows that the SE is configured to send messages that have a priority code of "error" (level 3) to the remote syslog host that has an IP address of 172.31.2.160:
ServiceEngine(config)#
logging host 172.31.2.160 priority error
Related Commands
clear logging
debug
show logging
ls
To view a list of files or subdirectory names within a directory, use the ls EXEC command.
ls [directory]
Syntax Description
directory
|
(Optional) Name of the directory for which you want a list of files.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
To list the filenames and subdirectories within a particular directory, use the ls directory command; to list the filenames and subdirectories of the current working directory, use the ls command. To view the present working directory, use the pwd command.
Examples
The following example displays a list of files within the current working directory:
The following example displays a list of files within the /local1 directory:
Related Commands
dir
lls
pwd
mkdir
To create a directory, use the mkdir EXEC command.
mkdir directory
Syntax Description
directory
|
Name of the directory to create.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command to create a new directory or subdirectory in the SE file system.
Examples
The following example shows how to create a new directory under local1:
ServiceEngine#mkdir /local1/mydir
Related Commands
dir
lls
ls
pwd
rmdir
mkfile
To create a new file, use the mkfile EXEC command.
mkfile filename
Syntax Description
filename
|
Name of the file that you want to create.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command to create a new file in any directory of the SE.
Examples
The following example shows how to create a new file:
ServiceEngine#mkfile traceinfo
Related Commands
lls
ls
mkdir
movie-streamer
To enable and configure the Movie Streamer server, use the movie-streamer global configuration command. To disable the Movie Streamer, use the no form of this command.
movie-streamer accelerate vod enable
movie-streamer advanced {client {idle-timeout num | rtp-timeout} | origin server idle-interval
num}
movie-streamer broadcast port-list num port num
movie-streamer cache {age-multiplier num | enable | max-ttl {days num | hours num | minutes
num | seconds num} | reval-each-request}
movie-streamer enable
movie-streamer max-concurrent-sessions num
movie-streamer proxy outgoing rtsp host ip address port num
movie-streamer transport-src-address ip address
no movie streamer {accelerate vod enable | advanced {client {idle-timeout num | rtp-timeout}
| origin server idle-interval num} | broadcast port-list num port num | cache {age-multiplier
num | enable | max-ttl {days num | hours num | minutes num | seconds num} |
reval-each-request} | enable | max-concurrent-sessions num | proxy outgoing rtsp host ip
address port num | transport-src-address ip address}
Syntax Description
accelerate
|
Configures Movie Streamer kernel streaming acceleration.
|
vod
|
Configures kernel streaming acceleration for VOD.
|
enable
|
Enables kernel streaming acceleration.
|
advanced
|
Configures Movie Streamer Advanced features.
|
client
|
Configures advanced client features.
|
idle-timeout
|
Sets the RTSP timeout.
|
num
|
Client idle timeout in seconds (0-300).
|
rtp-timeout
|
Sets the RTP timeout.
|
origin-server
|
Configures the advanced origin server.
|
idle-interval
|
Sets the origin server idle interval.
|
num
|
Server idle interval in seconds (1-10).
|
broadcast
|
Configures the Movie Streamer live broadcast.
|
port-list
|
Specifies a port list.
|
num
|
Broadcast list number (1-1024).
|
port num
|
Broadcast port number.
|
cache
|
Configures the Movie Streamer cache.
|
age-multiplier
|
Sets the Movie Streamer cache heuristic modifier.
|
num
|
Expiration time as a percentage of their age (0-100).
|
enable
|
Enables the Movie Streamer media cache.
|
max-ttl
|
Sets the maximum time to live for objects in the cache
|
days
|
Specifies the maximum time to live units in days.
|
num
|
Maximum time to live (1-1825).
|
hours
|
Specifies the maximum time to live units in hours.
|
num
|
Maximum time to live (1-43800).
|
minutes
|
Specifies the maximum time to live units in minutes.
|
num
|
Maximum time to live (1-2628000).
|
seconds
|
Specifies the maximum time to live units in seconds.
|
num
|
Maximum time to live (1-157680000).
|
reval-each-request
|
Sets the scope of revalidation for the request.
|
enable
|
Enables the Movie Streamer.
|
max-concurrent-sessions
|
Specifies the Movie Streamer maximum concurrent sessions.
|
num
|
The maximum concurrent sessions (1-16000).
|
proxy
|
Configures the Movie Streamer proxy.
|
outgoing
|
Configures the Outgoing proxy.
|
rtsp
|
Configures the Outgoing RTSP proxy.
|
host
|
Specifies the outgoing proxy server.
|
ip address
|
IP address of outgoing proxy server.
|
port num
|
Port number of outgoing proxy server (1-65535).
|
transport-src-address
|
Specifies the source IP address to be set in transport header (useful if behind NAT).
|
ip address
|
Source IP address in transport header.
|
Defaults
days: 1 day
hours: 72 hours
minutes: 4320 minutes
seconds: 259200 seconds
Command Modes
Global configuration
Usage Guidelines
The movie-streamer accelerate vod enable command enables kernel streaming acceleration for VOD.
The movie-streamer advanced client command sets the RTSP or RTP timeout value.
The movie-streamer advanced origin-server command sets the origin-server idle-interval value, which can determine the origin-server RTP timeout value.
The Idle Timeout field and the movie-streamer advanced client idle-timeout command (as well as the movie-streamer advanced client rtp-timeout command), are only intended for performance testing when using certain testing tools that do not have full support of the RTCP receiver report. Setting these timeouts to high values causes inefficient tear-down of client connections when the streaming sessions have ended.
For typical deployments, it is preferable to leave these parameters set to their defaults. The default is 60.
The movie-streamer advanced client idle-timeout command has a range from 0 to 300, whereas the Idle Timeout field has a range from 30-180. This is by design.
Examples
The following example shows how to set the original server interval:
ServiceEngine(config)#movie-streamer advanced origin-server idle-interval 5
The following example shows how to set the broadcast port list:
ServiceEngine(config)#movie-streamer broadcast port-list 1 5000 5002
The following example shows how to set the expiration time as a percentage of the age:
ServiceEngine(config)#movie-streamer cache age-multiplier 50
The following example shows how to set the content cache maximum TTL:
ServiceEngine(config)#movie-streamer cache max-ttl days 100
The following example shows how to set the maximum concurrent sessions:
ServiceEngine(config)#movie-streamer max-concurrent-sessions 7000
The following example shows how to set the outgoing proxy:
ServiceEngine(config)#movie-streamer proxy outgoing rtsp host 10.74.61.98 554
The following example shows how to set the source IP of the transport header while behind NAT:
ServiceEngine(config)#movie-streamer transport-src-address 10.74.61.99
The following example shows how to set the client timeout:
ServiceEngine(config)#movie-streamer advanced client idle-timeout 150
The following example shows how to set the RPT time out:
ServiceEngine(config)#movie-streamer advanced client rtp-timeout 150
Set original server interval is 5 second
ServiceEngine(config)#movie-streamer advanced origin-server idle-interval 5
SPCDN-QA-35(config)#movie-streamer broadcast port-list 1 5000 5002
Set Expiration time as a percentage of their age's 50%
SPCDN-QA-35(config)#movie-streamer cache age-multiplier 50
Set cache content max ttl is 100 days
SPCDN-QA-35(config)#movie-streamer cache max-ttl days 100
Set max con-current sessions is 7000
SPCDN-QA-35(config)#movie-streamer max-concurrent-sessions 7000
SPCDN-QA-35(config)#movie-streamer proxy outgoing rtsp host 10.74.61.98 554
Set the source Ip of transport header while behind NAT
SPCDN-QA-35(config)#movie-streamer transport-src-address 10.74.61.99
Related Commands
show movie-streamer
show statistics movie-streamer
mtu
To set the interface maximum transmission unit (MTU) packet size, use the mtu interface configuration
command. Use the no form of this command to reset the MTU packet size.
mtu mtusize
no mtu mtusize
Syntax Description
mtusize
|
MTU packet size in bytes (576-1500).
|
Command Default
The default MTU packet size for an Ethernet interface is 1500 bytes.
Command Modes
Interface configuration
Usage Guidelines
The MTU is the largest size of IP datagram that can be transferred using a specific data link connection. Use the mtu command to set the maximum packet size in bytes.
Examples
The following example sets the MTU packet size as 1500 bytes:
ServiceEngine(config-if)#mtu 1500
The following example resets the MTU packet size:
ServiceEngine(config-if)#no mtu 1500
Related Commands
show interface
show running-config
show startup-config
no (global configuration)
To undo a global configuration command or set its defaults, use the no form of a global configuration command.
no command
Note
The commands you can use with a CDS device (including the no form of each command) vary based on whether the device is configured as a CDSM, SE, or SR. See Table 2-1 to identify the commands available for a specific device.
Syntax Description
command
|
Specifies the command type; see the "" section for valid values.
|
Defaults
No default behavior or values.
Command Modes
Global configuration
Usage Guidelines
Valid values for command are as follows:
aaa
|
Configures authentication, authorization, and accounting (AAA).
|
access-lists
|
Configures access control list entries.
|
acquirer
|
Configures acquisition parameters.
|
asset
|
Configures the asset tag name string.
|
authentication
|
Configures the authentication.
|
bandwidth
|
Configures bandwidth controls.
|
bitrate
|
Configures the bit rate.
|
cdsm
|
Configures the CDSM settings.
|
clock
|
Configures the time-of-day clock.
|
cms
|
Configures the Centralized Management System (CMS).
|
device
|
Configures the device mode.
|
dns
|
Configures the SE DNS cache.
|
exec-timeout
|
Configures the EXEC timeout.
|
external-ip
|
Configures up to eight external (NAT) IP addresses.
|
ftp
|
Configures FTP caching-related parameters.
|
help
|
Configures the assistance for the command-line interface.
|
hostname
|
Configures the system's network name.
|
http
|
Configures HTTP-related parameters.
|
icap
|
Configures the ICAP feature for the HTTP protocol.
|
interface
|
Configures a Gigabit Ethernet interface.
|
ip
|
Configures IP parameters.
|
ip access-list
|
Configures IP access lists.
|
kernel
|
Enables access to the kernel debugger.
|
ldap
|
Configures Lightweight Directory Access Protocol (LDAP) parameters.
|
logging
|
Configures the system logging (syslog).
|
network-filesystem
|
Configures the network file system server and client.
|
ntp
|
Configures the Network Time Protocol (NTP).
|
offline-operation
|
Configures the offline service operation.
|
pace
|
Configures the HTTP pacing bandwidth and bit rate.
|
port-channel
|
Configures port-channel global options.
|
primary-interface
|
Configures a primary interface.
|
radius-server
|
Configures RADIUS server authentication.
|
rtsp
|
Configures Real-Time Streaming Protocol (RTSP)-related parameters.
|
rule
|
Configures the Rules Template.
|
snmp-server
|
Configures the SNMP server.
|
sshd
|
Configures the Secure Shell (SSH) service.
|
tcp
|
Configures global TCP parameters.
|
telnet enable
|
Configures Telnet services.
|
transaction-logs
|
Configures the transaction logging.
|
username
|
Establishes username authentication.
|
wmt
|
Configures Windows Media Technologies (WMT) parameters .
|
Use the no command to disable functions or negate a command. If you need to negate a specific command, such as the default gateway IP address, you must include the specific string in your command, such as no ip default-gateway ip-address.
no (interface configuration)
To negate a Gigabit Ethernet or port-channel interface configuration command or set its defaults, use the no interface configuration command.
no interface {GigabitEthernet slot/port | PortChannel {1 | 2} | Standby group num}
Syntax Description
GigabitEthernet
|
Selects a Gigabit Ethernet interface to configure.
|
slot/port
|
Slot and port number for the selected interface. The slot range is 0-2; the port range is 0-3. The slot number and port number are separated with a forward slash character (/).
|
PortChannel
|
Selects the EtherChannel of interfaces to configure.
|
1
|
Sets the port-channel interface number to 1.
|
2
|
Sets the port-channel interface number to 2.
|
Standby
|
Sets the standby group for the interface.
|
group num
|
Group number for the selected interface. The group number range is 1-4.
|
Defaults
No default behavior or values.
Command Modes
Interface configuration
Related Commands
interface
show interface
show running-config
show startup-config
ntp
To configure the Network Time Protocol (NTP) server and to allow the system clock to be synchronized by a time server, use the ntp global configuration command. To disable this function, use the no form of this command.
ntp server {ip-address | hostname} [ip-addresses | hostnames]
no ntp server {ip-address | hostname} [ip-addresses | hostnames]
Syntax Description
server
|
Sets the NTP server IP address.
|
ip-address
|
NTP server IP address.
|
hostname
|
NTP server hostname.
|
ip-addresses
|
(Optional) IP address of the time server providing the clock synchronization (maximum of four).
|
hostnames
|
(Optional) Hostname of the time server providing the clock synchronization (maximum of four).
|
Defaults
No default behavior or values.
Command Modes
Global configuration
Usage Guidelines
Use this command to synchronize the SE, SR or CDSM clock with the specified NTP server. The ntp server command enables NTP servers for timekeeping purposes and is the only way to synchronize the system clock with a time server.
When you synchronize the CDSM clock with an NTP server, there is a possibility of all devices registered with the CDSM being shown as offline and then reverted to online status. This situation can occur when synchronization with the NTP server sets the CDSM clock forward in time by an interval greater than at least two polling intervals or when the software clock on the CDSM is changed by a similar value using the clock EXEC command. The CDSM determines the status of devices in the CDS network depending on when it was last contacted by the devices for a getUpdate request. If you set the CDSM clock ahead in time, you have added that amount of time to the period since the CDSM received the last getUpdate request. However, it is only a transient effect. Once the devices contact the CDSM for their next getUpdate request after the clock setting change, the CDSM GUI reports the status of all devices correctly.
Examples
The following example configures the IP address of the time server providing the clock synchronization:
ServiceEngine(config)#ntp 172.16.22.44
The following example resets the time server providing the clock synchronization:
ServiceEngine(config)#no ntp 172.16.22.44
Related Commands
clock
show clock
show ntp status
ntpdate
To set the software clock (time and date) using a Network Time Protocol (NTP) server, use the ntpdate EXEC command.
ntpdate {hostname | ip-address}
Syntax Description
hostname
|
NTP hostname.
|
ip-address
|
NTP server IP address.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use NTP to find the current time of day and set the SE current time to match. The ntpdate command synchronizes the software clock with the hardware clock.
Examples
The following example sets the software clock of the SE using an NTP server:
ServiceEngine#ntpdate 10.11.23.40
Related Commands
clock set
show clock
ping
To send echo packets for diagnosing basic network connectivity on networks, use the ping EXEC command.
ping {hostname | ip-address}
Syntax Description
hostname
|
Hostname of system to ping.
|
ip-address
|
IP address of system to ping.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
To use this command with the hostname argument, be sure that DNS functionality is configured on your SE. To force the timeout of a nonresponsive host or to eliminate a loop cycle, press Ctrl-C.
Following are sample results of the ping command:
•
Normal response—The normal response occurs in 1 to 10 seconds, depending on network traffic.
•
Destination does not respond—If the host does not respond, a "no answer from host" appears in 10 seconds.
•
Destination unreachable—The gateway for this destination indicates that the destination is unreachable.
•
Network or host unreachable—The SE found no corresponding entry in the route table.
Examples
The following example shows how to test the basic network connectivity with a host:
ServiceEngine#ping 172.19.131.189
PING 172.19.131.189 (172.19.131.189) from 10.1.1.21 : 56(84) bytes of
64 bytes from 172.19.131.189: icmp_seq=0 ttl=249 time=613 usec
64 bytes from 172.19.131.189: icmp_seq=1 ttl=249 time=485 usec
64 bytes from 172.19.131.189: icmp_seq=2 ttl=249 time=494 usec
64 bytes from 172.19.131.189: icmp_seq=3 ttl=249 time=510 usec
64 bytes from 172.19.131.189: icmp_seq=4 ttl=249 time=493 usec
--- 172.19.131.189 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/mdev = 0.485/0.519/0.613/0.047 ms
ping6
To ping the IPv6 address, use the ping6 EXEC command.
ping6 line ip-address
Syntax Description
line
|
Destination Host or IP Address.
|
ip-address
|
IP address of system to ping.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example shows how to ping the IPv6 address:
ServiceEngine(config)#pingv5 fec0::100/64
Related Commands
ping
port-channel
To configure the port-channel load-balancing options, use the port-channel global configuration command. To disable load-balancing options, use the no form of this command.
port-channel load-balance {dst-ip | dst-mac | round-robin}
no port-channel load-balance
Syntax Description
load-balance
|
Configures the load-balancing method.
|
dst-ip
|
Specifies the load-balancing method using destination IP addresses.
|
dst-mac
|
Specifies the load-balancing method using destination Media Access Control (MAC) addresses.
|
round-robin
|
Specifies the load-balancing method using round-robin sequential, cyclical resource allocation.
|
Defaults
Round-robin is the default load-balancing method.
Command Modes
Global configuration
Usage Guidelines
The port-channel load-balance command configures one of three load-balancing algorithms and provides flexibility in choosing interfaces when an Ethernet frame is sent. The round-robin option allows evenly balanced usage of identical network interfaces in a channel group. Because this command takes effect globally, if two channel groups are configured, they must use the same load-balancing option.
Because the Internet Streamer CDS software normally initiates IP packets or Ethernet frames, it does not support hashing based on the source IP address and source MAC address. Cisco Internet Streamer Release 2.4 software adds the round-robin option, which is the default load-balancing algorithm, to evenly distribute traffic among several identical network interfaces.
Examples
The following example shows how to configure the round-robin load-balancing method on an SE:
ServiceEngine(config)#port-channel load-balance round-robin
Related Commands
interface
primary-interface
To configure the primary interface for the CDS network, use the primary-interface global configuration command. Use the no form of the command to remove the configured primary interface.
primary-interface {GigabitEthernet 1-2/port | PortChannel 1-2 | Standby group_num}
no primary-interface {GigabitEthernet 1-2/port | PortChannel 1-2 | Standby group_num}
Syntax Description
GigabitEthernet
|
Selects a Gigabit Ethernet interface as the CDS network primary interface.
|
1-2/
|
Gigabit Ethernet slot numbers 1 or 2.
|
port
|
Port number of the Gigabit Ethernet interface.
|
PortChannel
|
Selects a port-channel interface as the CDS network primary interface.
|
1-2
|
Port channel number 1 or 2.
|
Standby
|
Selects a standby group as the CDS network primary interface.
|
group_num
|
Standby group number.
|
Defaults
The default primary interface is the first operational interface on which a link beat is detected. Interfaces with lower-number IDs are polled first (for example, GigabitEthernet 0/0 is checked before 1/0). Primary interface configuration is required for the proper functioning of the Centralized Management System (CMS). After devices are registered to the CDSM, the CDSM uses the configured primary interface to communicated with the registered devices.
You cannot enable the CDS network without specifying the primary interface. Also, you must have chosen the primary interface before you enable the CMS. The primary interface can be changed without disabling the CDS network. The primary interface specifies the default route for an interface. To change the primary interface, choose a different interface as the primary interface.
In Cisco Internet Streamer Release 2.4 software and later releases, you can select a standby interface as the primary interface (you can enter the primary-interface Standby group_num command) to specify a standby group as the primary interface on an SE.
Command Modes
Global configuration
Usage Guidelines
The primary-interface global configuration command allows the administrator to specify the primary interface for the CDS network.
The primary interface can be changed without disabling the CDS network. To change the primary interface, re-enter the command string and specify a different interface.
Note
If you use the restore factory-default preserve basic-config command, the configuration for the primary interface is not preserved. On a device in a CDS network, if you want to re-enable the CDS network after using the restore factory-default preserve basic-config command, make sure to reconfigure the primary interface after the factory defaults are restored.
Examples
The following example shows how to specify the GigabitEthernet slot 1 port 0 as the primary interface on an SE:
ServiceEngine(config)#primary-interface GigabitEthernet 1/0
The following example shows how to specify the GigabitEthernet slot 2 port 0 as the primary interface on an SE:
ServiceEngine(config)#primary-interface GigabitEthernet 2/0
pwd
To view the present working directory, use the pwd EXEC command.
pwd
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command to display the present working directory of the SE.
Examples
The following example shows how to view the present working directory:
Related Commands
cd
dir
lls
ls
qos
To globally enable QoS functionality on the switch, use the qos command. To globally disable QoS functionality, use the no form of this command.
qos {device-policy-service {config-file url | enable} | dsvc num name name fqdn icap ip address
num list request-type {all num num name redirect-url {no-redirect list num | url list num}|
http-download num num name{no-redirect list num | url list num} | wmt-streaming num num
name redirect-url {no-redirect list num | url list num}}
no qos {device-policy-service {config-file url | enable} | dsvc num name name fqdn icap ip
address num list request-type {all num num name redirect-url {no-redirect list num | url list
num}| http-download num num name{no-redirect list num | url list num} | wmt-streaming
num num name redirect-url {no-redirect list num | url list num}}
Syntax Description
device-policy-service
|
Configures Camiant qos cdn-am policy service.
|
config-file
|
Specifies the policy service configuration file.
|
url
|
URL or local configuration file.
|
enable
|
Enables Camiant policy service.
|
dsvc
|
Configures PCMM QoS details for the delivery service.
|
num
|
the delivery service ID, which is obtained from the CDSM (1-4294967295).
|
name
|
Delivery Service Name as obtained from the CDSM.
|
name
|
Service Routed Domain for delivery service.
|
fqdn
|
Service FQDN for delivery service
|
icap
|
Specifies that authorization needed using ICAP.
|
ip address
|
IP address of the Policy Server.
|
num
|
Port of the Policy Server for authorization (1-65535).
|
list
|
List of URI extension separated by commas for which Authorization is to be done.
|
request-type
|
Configures the QoS setting needed for Windows Media Streaming or download.
|
all
|
Configures the QoS setting for Windows Media Streaming and download.
|
num
|
Signature details as key ID.
|
num
|
Signature details as key ID.
|
name
|
Signature details as key.
|
redirect-url
|
Specifies the redirect URL string on signature validation failure.
|
no-redirect
|
Always returns forbidden if validation fails.
|
url
|
Redirect URL String on signature validation failure.
|
list
|
List of URI extensions separated by commas for which Signature validation is to be done.
|
num
|
(1) Enable or (0) Disable the setting given.
|
http-download
|
Specifies the QoS setting for download.
|
wmt-streaming
|
Specifies the QoS setting for Windows Media Streaming.
|
Defaults
QoS functionality is disabled.
Command Modes
Global configuration
Usage Guidelines
If QoS functionality is globally enabled, it is enabled on all interfaces, except on the interfaces where QoS has been disabled. If QoS functionality is globally disabled, all traffic is passed in QoS pass-through mode.
Examples
This example shows how to enable QoS functionality globally on the switch:
ServiceEngine(config)#qos device-policy-service enable
Related CommandsPlease ensure you have purchased License for this advanced feature
Related CommandsSwitch(config)#
show qos
show statistics qos
radius-server
To configure RADIUS authentication parameters, use the radius-server global configuration command. To disable RADIUS authentication parameters, use the no form of this command.
radius-server {enable | host {hostname | hostipaddr} [auth-port port] | key keyword | redirect
{enable | message reply location url} | retransmit retries | timeout seconds}
no radius-server {enable | host {hostname | hostipaddr} | key | redirect {enable | message reply
location url} | retransmit | timeout}
Syntax Description
enable
|
Enables HTTP RADIUS authentication.
|
host
|
Specifies a RADIUS server.
|
hostname
|
Hostname of the RADIUS server.
|
hostipaddr
|
IP address of the RADIUS server.
|
auth-port
|
(Optional) Sets the UDP port for the RADIUS authentication server.
|
port
|
UDP port number (1-65535). The default is 1645.
|
key
|
Specifies the encryption key shared with the RADIUS servers.
|
keyword
|
Text of the shared key (15 characters maximum).
|
redirect
|
Redirects the response if an authentication request fails.
|
enable
|
Enables the redirect feature.
|
message
|
Replies with an authentication failure message.
|
reply
|
Reply message text string (24 characters maximum).
|
location
|
Sets the HTML page location, for example, http://www.cisco.com.
|
url
|
URL destination of authentication failure instructions.
|
retransmit
|
Specifies the number of transmission attempts to an active server.
|
retries
|
Number of transmission attempts for a transaction (1-3).
|
timeout
|
Time to wait for a RADIUS server to reply.
|
seconds
|
Wait time in seconds (1-20).
|
Defaults
auth-port port: UDP port 1645
retransmit retries: 2
timeout seconds: 5
Command Modes
Global configuration
Usage Guidelines
RADIUS is a client/server authentication and authorization access protocol used by an CDS network device to authenticate users attempting to connect to a network device. The CDS network device functions as a client, passing user information to one or more RADIUS servers. The CDS network device permits or denies network access to a user based on the response that it receives from one or more RADIUS servers. RADIUS uses the User Datagram Protocol (UDP) for transport between the RADIUS client and server.
You can configure a RADIUS key on the client and server. If you configure a key on the client, it must be the same as the one configured on the RADIUS servers. The RADIUS clients and servers use the key to encrypt all RADIUS packets transmitted. If you do not configure a RADIUS key, packets are not encrypted. The key itself is never transmitted over the network.
Note
For more information about how the RADIUS protocol operates, see RFC 2138, Remote Authentication Dial In User Service (RADIUS).
RADIUS authentication usually occurs in these instances:
•
Administrative login authentication—When an administrator first logs in to the SE to configure the SE for monitoring, configuration, or troubleshooting purposes. For more information, see the "Enabling and Disabling Administrative Login Authentication and Authorization Through RADIUS" section.
•
HTTP request authentication—When an end user sends a service request that requires privileged access to content that is served by the SE. For more information, see the "Configuring RADIUS Authentication of HTTP Requests" section.
RADIUS authentication is disabled by default. You can enable RADIUS authentication and other authentication methods at the same time. You can also specify which method to use first.
To configure RADIUS parameters, use the radius-server command in global configuration mode. To disable RADIUS authentication parameters, use the no form of this command.
The redirect option of the radius-server command redirects an authentication response to a different authentication server if an authentication request using the RADIUS server fails.
Note
The following rule command is relevant to RADIUS authentication only if the redirect option has been configured.
To exclude domains from RADIUS authentication, use the rule no-auth domain command. RADIUS authentication takes place only if the site requested does not match the specified pattern.
Enabling and Disabling Administrative Login Authentication and Authorization Through RADIUS
When configuring an SE to use RADIUS to authenticate and authorize administrative login requests, follow these guidelines:
•
By default, RADIUS authentication and authorization is disabled on an SE.
•
Before enabling RADIUS authentication on the SE, you must specify at least one RADIUS server for the SE to use.
•
You can enable RADIUS authentication and other authentication methods at the same time. You can specify which method to use first using the primary keyword. When local authentication is disabled, if you disable all other authentication methods, local authentication is re-enabled automatically.
•
You can use the SE GUI or the CLI to enable RADIUS authentication and authorization on an SE.
Tip
From the SE GUI, choose Devices > General Settings > Authentication. Use the displayed Authentication Configuration window.
To use the SE CLI to enable RADIUS authentication and authorization on an SE, enable RADIUS authentication for normal login mode by entering the authentication login radius global configuration command as follows:
ServiceEngine(config)#
authentication login radius enable [
primary] [
secondary]
Use the authentication configuration radius global configuration command to enable RADIUS authorization as follows:
ServiceEngine(config)#
authentication configuration radius enable [primary]
[
secondary]
Note
To disable RADIUS authentication and authorization on an SE, use the no radius-server enable command.
Configuring RADIUS Authentication of HTTP Requests
To configure RADIUS authentication for HTTP requests on an SE, configure the RADIUS server settings on the SE and enable RADIUS authentication for HTTP requests on the SE using the radius-server global configuration command.
Examples
The following example enables the RADIUS client, specifies a RADIUS server, specifies the RADIUS key, accepts retransmit defaults, and excludes the domain name, mydomain.net, from RADIUS authentication. You can verify the configuration with the show radius-server and show rule all commands.
ServiceEngine(config)#radius-server enable
ServiceEngine(config)#radius-server host 172.16.90.121
ServiceEngine(config)#radius-server key myradiuskey
ServiceEngine(config)#rule action no-auth pattern-list 2
ServiceEngine(config)#rule pattern-list 2 domain mydomain.net
ServiceEngine#show radius-server
Login Authentication for Console/Telnet/Ftp/SSH Session: enabled
Configuration Authentication for Console/Telnet/Ftp/SSH Session: enabled (secondary)
Radius Authentication is on
There is no URL to authentication failure instructions
IP 172.16.90.121 Port = 1645
ServiceEngine#show rule all
Rules Template Configuration
----------------------------
rule no-auth domain mydomain.net
The following example disables RADIUS authentication on the SE:
ServiceEngine(config)#no radius-server enable
The following example shows how to force the SE to try RADIUS authentication first:
ServiceEngine(config)#
authentication login radius enable primary
Related Commands
debug authentication user
rule
show radius
rcp
To enable the Remote Copy Program (RCP), use the rcp global configuration command. To disable RCP, use the no form of this command.
rcp enable
no rcp enable
Syntax Description
enable
|
Enables RCP services.
|
Defaults
No default behavior or values.
Command Modes
Global configuration
Examples
The following example shows how to enable RCP:
ServiceEngine(config)#
rcp enable
Related Commands
show rcp
rea
To initiate the remote execution agent, use the rea EXEC command.
rea {start | stop}
Syntax Description
start
|
Starts the remote execution agent services.
|
stop
|
Stops the remote execution agent services.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example shows the remote execution agent services being started.
ServiceEngine(config)#
rea start
Related Commands
show rea
reload
To halt and perform a cold restart on the SE, use the reload EXEC command.
reload [force]
Syntax Description
force
|
(Optional) Forces a reboot without further prompting.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
To reboot the SE, use the reload command. If the current running configuration is different from the startup configuration and if the configuration changes are not saved to flash memory, you are prompted to save the current running configuration parameters to the startup configuration.
To save any file system contents to disk from memory before a restart, use the cache synchronize command.
Examples
The following example reloads the SE after you have saved the configuration changes.
System configuration has been modified. Save?[yes]:yes
Proceed with reload?[confirm]yes
Shutting down all services, will timeout in 15 minutes.
The following example forces a reboot on the SE:
ServiceEngine#reload force
Related Commands
cache synchronize
write
write erase
rename
To rename a file on the SE, use the rename EXEC command.
rename oldfilename newfilename
Syntax Description
oldfilename
|
Original filename.
|
newfilename
|
New filename.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command to rename any sysfs file without making a copy of the file.
Examples
The following example renames a file named errlog.txt as old_errlog.txt:
ServiceEngine#rename errlog.txt old_errlog.txt
Related Commands
cpfile
restore
To restore the device to its manufactured default status, removing the user data from the disk and flash memory, use the restore EXEC command. This command erases all existing content on the device.
restore factory-default [preserve basic-config]
Syntax Description
factory-default
|
Resets the device configuration and data to their manufactured default status.
|
preserve
|
(Optional) Preserves certain configurations and data on the device.
|
basic-config
|
Selects basic network configurations.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command to restore data on disk and in flash memory to the factory default, while preserving particular time-stamp evaluation data. You need to enter this command from the root directory, or else the following error message is displayed:
ServiceEngine#restore factory-default
Need to cd to / before issuing this command
Be sure to back up the CDSM database and copy the backup file to a safe location that is separate from that of the CDSM, or change over from the primary to a standby CDSM before you use the restore factory-default command on your primary CDSM. The primary CDSM operation must be halted before proceeding with backup and restore commands.
Caution 
This command erases user-specified configuration information stored in the flash image and removes the data on the disk, the user-defined disk partitions, and the entire CDSM database. User-defined disk partitions that are removed include the sysfs and cdnfs partitions. The configuration being removed includes the starting configuration of the device.
By removing the CDSM database, all configuration records for the entire CDS network are deleted. If you do not have a valid backup file or a standby CDSM, you must use the cms deregister force command and reregister every SE and SR after you have reconfigured the CDSM, because all previously configured data is lost.
If you used your standby CDSM to store the database while you reconfigured the primary, you can simply register the former primary as a new standby CDSM.
If you created a backup file while you configured the primary CDSM, you can copy the backup file to this newly reconfigured CDSM and use the cms database restore command.
Caution 
If you upgraded your software after you received your software recovery CD-ROM, using the CD-ROM software images may downgrade your system.
Cisco Internet Streamer CDS software consists of three basic components:
•
Disk-based software
•
Flash-based software
•
Hardware platform cookie (stored in flash memory)
All of these components must be correctly installed for Cisco Internet Streamer CDS software to work properly.
Examples
The following two examples show the results of using the restore factory-default and restore factory-default preserve basic-config commands. Because configuration parameters and data are lost, prompts are given before initiating the restore operation to ensure that you want to proceed.
Note
If you use the restore factory-default preserve basic-config command, the configuration for the primary interface is not preserved. On a device running the Internet Streamer CDS Release 2.x software, if you want to re-enable the CDS network after using the restore factory-default preserve basic-config command, make sure to reconfigure the primary interface after the factory defaults have been restored.
CDSM# restore factory-default
This command will wipe out all of data on the disks
and wipe out CDS CLI configurations you have ever made.
If the box is in evaluation period of certain product,
the evaluation process will not be affected though.
It is highly recommended that you stop all active services
before this command is run.
Are you sure you want to go ahead?[yes/no]
CDSM# restore factory-default preserve basic-config
This command will wipe out all of data on the disks
and all of CDS CLI configurations except basic network
configurations for keeping the device online.
The to-be-preserved configurations are network interfaces,
default gateway, domain name, name server and hostname.
If the box is in evaluation period of certain product,
the evaluation process will not be affected.
It is highly recommended that you stop all active services
before this command is run.
Are you sure you want to go ahead?[yes/no]
Note
You can enter basic configuration parameters (such as the IP address, hostname, and name server) at this point or later through entries in the command-line interface.
The following example shows that entering the show disk command after the restore command verifies that the restore command has removed data from the partitioned file systems (sysfs and cdnfs):
Because flash memory configurations were removed after the restore command was used, the show startup-config command does not return any flash memory data. The show running-config command returns the default running configurations.
The show wmt commands continue to display the same license evaluation periods as before the restore factory-default command was invoked, because the evaluation period is not affected by this restore command. For example, if there were 21 days remaining in the evaluation period before the restore factory-default command was used, there would continue to be 21 days remaining in the evaluation period.
Related Commands
cms database backup
cms database restore
show disks
show rtsp server real-subscriber
show running-config
show startup-config
show wmt
rmdir
To delete a directory, use the rmdir EXEC command.
rmdir directory
Syntax Description
directory
|
Name of the directory that you want to delete.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command to remove any directory from the SE file system. The rmdir command removes only empty directories.
Examples
The following example removes the oldfiles directory under /local1:
ServiceEngine#rmdir /local1/oldfiles
Related Commands
lls
ls
mkdir
rtsp
To configure the Real-Time Streaming Protocol (RTSP)-related parameters, use the rtsp global configuration command. To disable individual options, use the no form of this command.
rtsp {advanced ip address {bypass-gateway movie-streamer | max-initial-setup-delay
time_delay | max-request-rate num}| ip-address ip address}
no rtsp {advanced ip address {bypass-gateway movie-streamer | max-initial-setup-delay
time_delay | max-request-rate num}| ip-address ip address}
Syntax Description
advanced
|
Performs advanced configuration of the RTSP gateway.
|
ip address
|
The IP address of RTSP gateway.
|
bypass-gateway
|
Allows bypassing the RTSP gateway for RTSP requests.
|
movie-streamer
|
Allows bypassing the RTSP gateway for Movie Streamer RTSP requests.
|
max-initial-setup-delay
|
Specifies the maximum delay in seconds between the TCP accept and first RTSP message from the client. The default is 10 seconds.
|
time_delay
|
The RTSP advanced maximum initial setup delay in seconds (0-2147483647).
|
max-request-rate
|
Specifies the maximum incoming requests allowed by the RTSP Gateway per second.
|
num
|
The maximum requests per second (1-2147483647).
|
ip-address
|
Configures the IP address for the RTSP gateway.
|
ip-address
|
The IP address of the RTSP gateway.
|
Defaults
max-initial-setup-delay time_delay: 10 seconds
max-request-rate num: 40 requests
Command Modes
Global configuration
Usage Guidelines
RTSP is a standard Internet streaming control protocol (RFC 2326). It is an application-level protocol that controls the delivery of data with real-time properties, such as video and audio. Apple QuickTime, Real Networks, and the Cisco Streaming Engine use RTSP as the streaming control protocol.
Live Streaming with the Cisco Streaming Engine
The Internet Streamer CDS software supports live streaming content with many kinds of network topologies and deployment scenarios. This feature allows the integration of streaming content from Cisco IP/TV Servers and QuickTime live broadcast servers with the CDS network. Support for broadcast of playlists is included (except for SEs at the network edge), allowing you to convert one or more disk files into a playlist and to send them out through simulated live streaming.
An RTSP source is a fully qualified RTSP URL that references an external streaming server, such as a parent SE, which provides the corresponding RTSP request point.
RTSP Gateway
The RTSP gateway is a process that runs on the SE. The RTSP gateway accepts an RTSP request and performs the initial RTSP handshake with RTSP-based clients (for example, Windows Media 9 players) on behalf of the back-end RTSP servers (for example, the WMT RTSP server) that are running on the SE.
For every RTSP request, the RTSP gateway examines the following properties of the request:
•
The URL and its position in the Unified Name Space (UNS)
•
The user agent
•
The IP address of the final destination
•
The media type
After the successful completion of uniformity checks, the RTSP gateway tunnels the request to the appropriate back-end RTSP server that is running on the SE. The RTSP gateway can tunnel the request to RealProxy, RealSubscriber, or the Cisco Streaming Engine on the SE, depending on the requested media type, the back-end RTSP servers that are currently enabled on the SE, and the media player that is requesting the content.
After the RTSP gateway tunnels the request to a particular back-end RTSP server that is running on the SE and the back-end server and the client negotiate the UDP ports, the RTSP gateway continues with RTSP message passing (SETUP). When the RTSP client issues a PLAY request, the streaming server starts streaming the data to the client over UDP.
Based on the properties of the incoming request, including user agent, final destination, and media file type, the RTSP gateway performs the following tasks with SEs:
•
Forwards the incoming request to the appropriate back-end RTSP server that is running on the SE. The incoming request goes to the WMT RTSP server if the client is a Windows Media 9 player. The SE uses the IETF standard RTSP protocol and proprietary Microsoft extensions to serve the content to Windows Media 9 players.
•
Redirects the incoming request.
•
Rejects the incoming request.
If the SE is registered with a CDSM, the RTSP gateway also redirects the incoming requests to other content distributors (for example, RealSubscriber or Cisco Streaming Engine) that are configured on the SE.
Network Address Translation (NAT) is designed for IP address simplification and conservation because it enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private addresses in the internal network into legal addresses before packets are forwarded onto another network. As part of this functionality, NAT can be configured to advertise only one external address for the entire network. This configuration provides additional security, effectively hiding the entire internal network from the world behind that address. NAT has the dual functionality of security and address conservation and is typically implemented in remote access environments.
Note
If the SE is behind a NAT-enabled router, you must specify the IP address of the RTSP gateway that is running on the SE. By default, no IP address is specified.
Default RTSP Gateway Settings
The RTSP gateway is automatically enabled on the SE and cannot be disabled with a command. Table 2-12 lists the default settings for the RTSP gateway.
Table 2-12 Default Settings for the RTSP Gateway
RTSP Gateway Setting
|
Default Setting
|
IP address of RTSP gateway
|
Not specified
|
Incoming RTSP port
|
Port 554
|
Incoming RTSP request rate
|
40 requests per second
|
Layer 4 switching
|
Not enabled
|
Maximum initial setup delay
|
10 seconds
|
Maximum request rate
|
40 requests per second
|
By default, the RTSP gateway is always enabled on an SE and cannot be disabled by entering a CLI command. As Table 2-12 shows, the RTSP gateway has a set of default settings. You only need to change these default settings under the following conditions:
•
You want to configure the RTSP gateway to listen for incoming RTSP requests on a port other than the default port (port 554).
•
The SE is behind a NAT-enabled router. In this case, you must specify the IP address of the RTSP gateway. By default, an IP address for the RTSP gateway is not specified.
Note
A description of the Real-Time Streaming Protocol (RTSP) is available as IETF RFC 2326.
Examples
The following example shows how to set up the Movie Streamer RTSP bypass gateway:
ServiceEngine(config)#rtsp advanced bypass-gateway movie-streamer
The following example shows how to establish the maximum initial setup delay:
ServiceEngine(config)#rtsp advanced max-initial-setup-delay 15
The following example shows how to establish the maximum request rate:
ServiceEngine(config)#rtsp advanced max-request-rate 50
The following example shows how to assign the RTSP IP address:
ServiceEngine(config)#rtsp ip-address 10.74.61.1
Related Commands
show rtsp
rule
To set the rules by which the SE filters HTTP, HTTPS, and RTSP traffic, use the rule global configuration command. To disable individual options, use the no form of this command.
The general rule command is as follows:
rule {action action-type pattern-list list_num [protocol {all | protocol-type}] | enable |
pattern-list list_num pattern-type}
The specific rule commands are as follows:
rule action allow pattern-list list_num [protocol {all | http | rtmp | rtsp}]
rule action block pattern-list list_num [protocol {all | http | rtmp | rtsp}]
rule action generate-url-signature {include-client-src-ip | key-id-owner 1-32 {key-id-number
1-16} {pattern-list 1-512} [protocol {all | http}]}
rule action no-cache pattern-list list_num [protocol {all | http | rtmp | rtsp}]
rule action redirect url pattern-list list_num [protocol {all | http | rtmp | rtsp}]
rule action refresh pattern-list list_num [protocol {all | http }]
rule action replace pattern-list list_num [protocol {all | http | rtmp | rtsp}]
rule action rewrite pattern-list list_num [protocol {all | http | rtmp | rtsp}]
rule action use-icap-service service-name pattern-list list_num [protocol {all | http}]
rule action validate-url-signature {error-redirect-url url | exclude {all error-redirect-url url
pattern-list num [protocol {all | http | rtmp | rtsp}] | client-ip error-redirect-url url
pattern-list num [protocol {all | http | rtmp | rtsp}] | expiry-time error-redirect-url url
pattern-list num [protocol {all | http | rtmp | rtsp}]}}
rule enable
rule pattern-list list-num domain dn_regexp
rule pattern-list list-num group-type {and | or}
rule pattern-list list-num header-field {referer ref_regexp | request-line req_regexp | user-agent
ua_regexp}
rule pattern-list list-num src-ip s_ipaddress s_subnet
rule pattern-list list-num url-regex url_regexp
rule pattern-list list-num url-regsub url_regexp url_sub
no rule action {allow pattern-list list_num [protocol {all | http | https | rtsp}] | block pattern-list
list_num [protocol {all | http | https | rtsp}] | generate-url-signature {include-client-src-ip
| key-id-owner 1-32 {key-id-number 1-16} {pattern-list 1-512} [protocol {all | http}]} |
no-cache pattern-list list_num [protocol {all | http | https}] | redirect url pattern-list
list_num [protocol {all | http | https | rtsp}] | refresh pattern-list list_num [protocol {all |
http | https}] | replace pattern-list list_num [protocol {all | http | https | rtsp}] | rewrite
pattern-list list_num [protocol {all | http | https | rtsp}] | use-icap-service service-name
pattern-list list_num [protocol {all | http | https}] | validate-url-signature pattern-list
error-redirect-url url | exclude {all error-redirect-url url pattern-list num [protocol {all |
http | rtmp | rtsp}] | client-ip error-redirect-url url pattern-list num [protocol {all | http |
rtmp | rtsp}] | expiry-time error-redirect-url url pattern-list num [protocol {all | http | rtmp
| rtsp}]}
no rule enable
no rule pattern-list list-num {domain dn_regexp | group-type {and | or} | header-field {referer
ref_regexp | src-ip s_ipaddress s_subnet | url-regex url_regexp | url-regsub url_regexp
url_sub}}
Syntax Description
action
|
Describes the action that the rule is to take.
|
action-type
|
Types of actions that you can associate with a defined pattern list.
|
pattern-list
|
Configures the pattern list.
|
list_num
|
Pattern list number (1-512).
|
protocol
|
Specifies the protocol for which this rule is to be matched.
|
all
|
Matches this rule with all applicable protocols for this action.
|
protocol-type
|
Protocol types that support rule actions, namely, http, https, and rtsp.
Note The term http traffic is used to refer to requests over HTTP including HTTP, FTP over HTTP, and HTTPS over HTTP. The Rules Template is not supported for FTP native requests.
|
enable
|
Enables rules processing on the SE.
|
pattern-type
|
Types of rule patterns that you can add to a pattern list.
|
allow
|
Allows the incoming request that matches the pattern list. This can be used in combination with block actions to allow selective types of requests. Allow does not carry any meaning as a standalone action.
|
http
|
Matches this rule with HTTP.
|
rtmp
|
Matches this rule with RTMP.
|
rtsp
|
Matches this rule with RTSP.
|
block
|
Blocks this request and allows all others.
|
generate-url-signature
|
Specifies that the SE generates a signed URL that is included in the autogenerated ASX file when content routing is in use and the pattern matches.
|
include-client-src-ip
|
Specifies the client IP to be included in the signed URL.
|
key-id-owner
|
Specifies the owner of the key (1-32). The key is a shared secret string.
|
1-32
|
Specifies the owner of the key.
|
key-id-number
|
Specifies the identification number of the key (1-16).
|
1-16
|
Specifies the indentification number of the key.
|
pattern-list
|
Specifies the number of the pattern list (1-512). Valid patterns are domain, url-regex, or dst-ip.
|
1-512
|
Specifies the number of the pattern list.
|
no-cache
|
Does not cache the object.
|
redirect
|
Redirects the request to the rewritten URL.
|
url
|
Redirect URL.
|
refresh
|
Revalidates the object with the web server.
|
replace
|
Replaces the text string in the object.
|
rewrite
|
Rewrites the original request as a specified URL and fetches the rewritten URL on a cache miss.
|
use-icap-service
|
Uses a specific ICAP server.
|
service-name
|
Service name used for handling a request through an ICAP server.
|
validate-url-signature
|
Validates a signed URL.
|
error-redirect-url
|
Specifies the error URL.
|
exclude
|
Specifies what field in the URL signature must be validated.
|
all
|
Specifies both client-ip and expiry time fields will be excluded in validation.
|
client-ip
|
Specifies that the client-ip field will be excluded in validation.
|
expiry-time
|
Specifies that the expire-time field will be excluded in validation.
|
domain
|
Specifies the regular expression to match the domain name.
|
dn_regexp
|
Regular expression to be matched with the domain name.
|
group-type
|
Specifies whether the pattern list is an AND or OR type.
|
and
|
Specifies an AND pattern to the pattern list.
|
or
|
Specifies an OR pattern to the pattern list.
|
header-field
|
Pattern type—Specifies the header field pattern of the request and substitute replacement pattern.
|
referer
|
Specifies the referer request header.
|
ref_regexp
|
Regular expression to be matched with the referer request header.
|
request-line
|
Specifies the request method line.
|
req_regexp
|
Regular expression to be matched with the request method line.
|
user-agent
|
Specifies the user agent request header.
|
ua_regexp
|
Regular expression to be matched with the User Agent request header.
|
src-ip
|
Specifies the source IP address of the request.
|
s_ipaddress
|
Source IP address of the request.
|
s_subnet
|
Source IP subnet mask.
|
url-regex
|
Specifies the regular expression to match a substring of the URL.
|
url_regexp
|
Regular expression to be matched with the URL string.
|
url-regsub
|
Sets the regular expression to match the URL and replacement pattern.
|
url_sub
|
URL string replacement pattern.
|
Defaults
The default is rule processing disabled.
The group-type pattern is OR by default.
Command Modes
Global configuration
Usage Guidelines
The Rules Template allows you to specify a set of rules, each clearly identified by an action and a pattern. The Rules Template allows you to configure an SE to use specific rules to filter HTTP, HTTPS, and RTSP traffic. A common use of this feature is to configure an SE to block the spread of Internet worms and viruses within an organization by checking whether a requested web page matches the pattern of a known Internet worm and if so then automatically blocking the request.
If you have enabled rules processing on an SE (enabled the Rules Template feature on the SE and configured rules for the SE), the SE checks each incoming client request to determine if a rule pattern matches the requested content. If a rule pattern matches the given request, the SE uses the specified action (policy) to handle this incoming traffic.
The SE can match incoming requests against the following:
•
Patterns in the IP address of the client requesting the content (source IP address), including the IP address, the network mask, and the port list
•
Patterns in the IP address of the origin web or media server (destination IP addresses), including the IP address, the network mask, and the port list
•
Regular expression of the URL
•
Regular expression of the domain portion of the URL
•
MIME types of the web object that the client is requesting
•
Regular expressions symbolizing domain names
•
Headers that are sent in the request, including the following:
–
User-agent of the request, which indicates which client software is issuing the request
–
Referer, which indicates the web page from which the browser jumped to this link
–
Request line, which indicates the request line itself
You can apply the policies defined in the Rules Template to HTTP (including FTP over HTTP) and HTTPS and to RTSP for streaming media objects. Policies that can be applied include the following:
•
Allowing a request to be completed
•
Blocking the request
•
Overriding the HTTP response header and caching the object
•
Caching the object depending on the HTTP response header
•
Bypassing authentication for the request
•
Replacing the text string
•
Not caching an object
•
Bypassing an upstream proxy for the request
•
Redirecting the request to a different URL
•
Revalidating the object with the origin server
•
Rewriting the URL
•
No URL filtering for the specified HTTP and HTTPS requests
•
Using a specific ICAP server
•
Using a specific upstream proxy
•
Using a specific server for the request
Note
To enter a question mark (?) in a rule regular expression from the command-line interface, use the escape character followed by a question mark (?). Use of the escape sequence prevents the command-line interface from displaying context-sensitive help.
Supported Rule Actions per Protocol
For RTSP, the redirect and the redirect_url_for_cdn rule actions are supported for RTSP requests from RealMedia players. These two rule actions are not supported for RTSP requests from Windows Media Players. For example, Windows Media Services 9 (WMS 9) supports theblock, rewrite, and allow rule actions for RTSP requests, but does not support the redirect and redirect_url_for cdn rule actions for RTSP requests.
Supported Action and Pattern Combinations
Not all actions support all patterns for request matching because some patterns do not make sense for some actions.
Understanding Actions and Patterns
A rule is specified by an action and a pattern list. An action is performed on a request if this request matches the pattern list specified in the rule pattern-list command.
An action is something that the SE performs when processing a request; for instance, an action could be blocking the request, using an alternative proxy, and so forth.
A pattern list defines the limits of a request; for instance, a pattern list may specify that the source IP address falls in the subnet range 172.16.*.*.
Rules can be dynamically added, displayed, or deleted from the SE. The rules are preserved across reboots because they are written into persistent storage, such as NVRAM, using the appropriate CLI commands, the SE GUI, or the CDSM GUI. Only the system resources limit the number of rules that the SE can support. Because rules consume resources, the more rules that you define can greatly impact how the SE performs.
Note
The number of actions is limited only by available resources. The maximum number of pattern lists is 512. The maximum number of patterns per action is 128. A single pattern list can contain up to 128 patterns of a particular pattern type.
Actions
The Rules Template supports the following types of actions:
•
Allow—Allows incoming requests that match the pattern list.
This rule action can be used in combination with block actions to allow selective types of requests. Allow does not carry any meaning as a standalone action.
•
Block—Blocks this request and allows all others.
•
No-cache—Does not cache this object.
•
Redirect—Redirects the original request to a specified URL. Redirect is relevant to the RADIUS server only if the RADIUS server has been configured for redirect.
•
Refresh—For a cache hit, forces an object freshness check with the server.
•
Replace— Replaces the text string in the object.
•
Rewrite—Rewrites the original request as a specified URL. The SE searches for the rewritten URL in the cache, and then on a cache miss, fetches the rewritten URL and returns the object transparently to the client. You should use a redirect rule instead of a rewrite rule because of possible performance impacts. The reason for the performance impact is that, for a redirect rule, the SE sends a 302 (Found) message to the client with the new redirect URL. The client issues a separate request to the redirected URL. However, for a rewrite action, the original request URL is rewritten as the specified URL. The URL rewrite could change the domain name of the URL, which necessitates a Domain Name Server (DNS) lookup to find the destination IP address of the new rewritten server to which the request must be sent.
•
Use-icap-service—Uses a specified ICAP server.
•
Validate-url-signature—Validates a signed URL.
Actions can be applied to specific protocols or to a set of protocols. If no protocol is configured, then the specified action will be taken for all the traffic that goes through the SE.
Patterns
The Rules Template supports the following pattern types:
•
Domain—Matches the domain name in the URL or the Host header against a regular expression. For example, .*ibm.* matches any domain name that contains the ibm substring. The \.foo\.com$ domain name matches any domain name that ends with the .foo.com substring.
Note
In regular expression syntax, the dollar sign ($) metacharacter directs that a match is made only when the pattern is found at the end of a line.
•
Group-type—Specifies whether the pattern list is an AND or OR type. The default is OR.
•
Src-ip—Matches the request's source IP address and netmask. Specify an IP address and a netmask.
•
URL-regex—Matches the URL against a regular expression. The match is case insensitive. Specify a regular expression.
•
Header-field—Matches the header field pattern of the request.
Request header field patterns referer, request-line, and user-agent are supported for the actions block, redirect, and rewrite. The referer pattern is matched against the Referer header in the request, the request-line pattern is matched against the first line of the request, and the user-agent pattern is matched against the User-Agent header in the request.
•
URL-regsub—Matches the URL against a regular expression to form a new URL per pattern substitution specification for the rewrite and redirect actions. The match is case insensitive. The valid substitution index range is from 1 to 9.
If an empty string is given as a replacement pattern, the Referer header is stripped. Stripping of the Referer header occurs in the user-agent pattern.
Multiple patterns can be entered on the same pattern list. If any of them matches the incoming request, the corresponding action is taken.
Multiple patterns for the same pattern list must be entered on different lines.
Rules Template Processing Considerations
Actions and patterns have a predefined order of execution. A group of rules with the same action is always executed either before or after another group of rules with a different action. The block, rewrite, and redirect rule actions support the following additional patterns: request-line, referer, and user-agent regular expressions. The request-line regular expression matches the first line of the request. The user-agent regular expression matches the User-Agent header value of the request. The referer regular expression matches the Referer header value of the request. The order is not affected by the order in which the rules are entered using CLI commands.
Allow and block carry the same precedence. The order of execution depends on the order of configuration between allow and block actions. Other actions always take precedence over allow.
Among rules of the same action, a predefined execution order exists among the rule patterns, which means that within a group of rules of the same action, one group of rules with the same pattern is always executed either before or after another group of rules with a different pattern.
Among all rules of the same action and of the same rules pattern, the rules are evaluated in a Last-Entered-First-Examined fashion (the reverse of the order in which the rules were entered). This order is not affected by the order in which the rules are entered using CLI commands.
Most actions do not have any parameters.
Service Rules for URLs
There are three cases for service rules:
1.
If allow rules are configured, then it is an implicit deny.
2.
If deny rules are configured then it is implicit allow.
3.
If both allow and deny are configured, then it is an implicit allow.
For example, if all URL requests that match HTML are blocked, implicitly, all requests that match other URL requests are allowed.
If all URL requests that match WMV are allowed, implicitly, all request that match other URL requests are blocked.
If both of the above rules are configured, then HTML URL requests are blocked, and all other URL requests are allowed.
Examples
The following example shows that the SE is configured to replace the internal.domain.com string in a request to the server named dummy:
ServiceEngine(config)#
rule action rewrite header-field referer internal.domain.com dummy
The following example shows that if an empty string is given as a replacement pattern, then the referer header is stripped. This rule states that all requests, which have a referer header that indicates a corporate internal server in ABCBigCorp, strip the referer field so that the outside web server does not see the name of the corporate internal server.
ServiceEngine(config)#
rule action rewrite header-field referer internal.abcbigcorp.com ""
The following example shows that the rule pattern-list command is configured to add a pattern to an existing pattern list to perform an action to be defined on destination IP address 172.16.25.25 using the dst-ip pattern:
ServiceEngine#show rule pattern-list 10 all
Rules Template Configuration
----------------------------
rule pattern-list 11 dst-ip 172.16.25.25 255.255.255.0
rule pattern-list 11 domain foo.com
The following example shows that the rule action block command is configured and associated with an existing pattern list:
ServiceEngine(config)#rule action block pattern-list 10 protocol all
ServiceEngine#show rule action block
Rules Template Configuration
----------------------------
rule action block pattern-list 10 protocol all
The following example shows that the rule action block command is configured and associated with an existing pattern list, which lists as its pattern the domain yahoo.com:
ServiceEngine(config)#rule pattern-list 10 domain yahoo.com
ServiceEngine#show rule pattern-list 10 all
Rules Template Configuration
----------------------------
rule pattern-list 10 domain yahoo.com
ServiceEngine(config)#rule action block pattern-list 10 protocol all
In this example, the request (using HTTP) to yahoo.com was denied three times.
The following example shows that the rule action block command (action) blocks all patterns specified with the rule pattern-list 12 command:
ServiceEngine(config)#rule pattern-list 12 domain \.foo.com
ServiceEngine(config)#rule action block pattern-list 12
The following example prevents caching of requests that match a URL request that contains the *cgi-bin* string:
ServiceEngine(config)#rule pattern-list 13 url-regex \.*cgi-bin.*
ServiceEngine(config)#rule action no-cache pattern-list 13
The actions that are to be taken by the rules are configured through the rule action commands. Patterns that are to be matched to a particular pattern that you specify are configured through rule pattern-list commands.
The following example shows how patterns use AND by configuring patterns with the same pattern list number and applying that pattern list to an action:
ServiceEngine(config)#rule action block pattern-list 1
ServiceEngine(config)#rule pattern-list 1 url-regex yahoo
ServiceEngine(config)#rule pattern-list 1 dst-port 80
Other options of the rule command work similarly to the preceding examples.
The following example redirects a request for old-domain-name that has been changed to new-domain-name:
Cache(config)#rule action redirect http://old-domain-name/ pattern-list 1 protocol http
Cache(config)#rule pattern-list 1 url-regsub http://old-domain-name/
http://new-domain-name/
The following example redirects requests from an IETF site to a site that is locally mirrored:
Cache(config)#rule action redirect http://www.ietf.org/rfc/(.*) pattern-list 2 protocol
http
The following example shows that if the request URL is http://www.ietf.org/rfc/rfc1111.txt, the SE rewrites the URL as http://wwwin-eng.cisco.com/RFC/RFC/rfc1111.txt and sends a 302 Temporary Redirect response with the rewritten URL in the Location header to the client. The browser automatically initiates a request to the rewritten URL.
Cache(config)#rule pattern-list 2 url-regsub http://www.ietf.org/rfc/(.*)
http://wwwin-eng.cisco.com/RFC/RFC/\1
The following example redirects all requests for linux.org to a local server in India that is closer to where the SE is located:
Cache(config)#rule action redirect http://linux.org/(.*) pattern-list 3 protocol http
The following example shows that two URLs are to be matched if the pattern is url-regsub. If the URLs that are given in the action configuration are invalid, a warning is displayed during the configuration of this rule. The action URL is taken when the header field patterns are configured.
Cache(config)#rule pattern-list 3 url-regsub http://linux.org/(.*) http://linux.org.in/\1
The following example bypasses requests with cisco.com as the domain from URL filtering:
ServiceEngine(config)#rule action no-url-filtering pattern-list 6 protocol all
ServiceEngine(config)#rule pattern-list 6 domain cisco.com
Related Commands
clear
show rule
script
To execute a script provided by Cisco or check the script for errors, use the script EXEC command.
script {check | execute} file_name
Syntax Description
check
|
Checks the validity of the script.
|
execute
|
Executes the script. The script file must be a sysfs file in the current directory.
|
file_name
|
Name of the script file.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The script EXEC command opens the script utility, which allows you to execute Cisco-supplied scripts or check errors in those scripts. The script utility can read standard terminal input from the user if the script you run requires inputs from the user.
Note
The script utility is designed to run only Cisco-supplied scripts. You cannot execute script files that lack Cisco signatures or that have been corrupted or modified.
Examples
The following example checks for errors in the script file foo.script:
ServiceEngine#script check foo.script
Script file foo.script is valid.
service-router
To configure service routing, use the service-router global configuration command. To disable last-resort routing, use the no form of this command.
On the SE:
service-router {keepalive-interval num | service-monitor {number-of-samples {all num | cpu
num | disk num | fms num | kmemory num | memory num | wmt num | nic num} | sample-period
{all num | cpu num | disk num | fms num | kmemory num | memory num | movie-streamer num
| nic num | wmt num} | threshold {all num | cpu num | disk num | failcntdisk num | fms num |
kmemory num | memory num | nic num | wmt num} | type {all | cpu | disk | failcntdisk | fms
| kmemory | memory | nic | wmt}}}
no service-router
On the SR:
service-router {access-policy enable | content-based-routing {enable | redundant} | dns-ttl num
| lastresort {domain name {allow all | alternate name} | error-domain name error-file} |
location-based-routing { enable | geo-location-server {primary ip address num | secondary
ip address num}} | proximity-based-routing {enable | proximity-cache timeout num |
proximity-server ip address num} | redirect-mode { ip-redirect} | service-monitor
{number-of-samples {all num | cpu num | disk num | kmemory num | memory num}} |
sample-period {cpu num | disk num | failcntdisk num| kmemory num | memory num} |
threshold {all num | cpu num | disk num | kmemory num | memory num} | type {all | cpu |
disk | kmemory | memory}}
no service-router
Syntax Description
keepalive-interval
|
Specifies the SR keepalive interval in seconds.
|
num
|
Number of seconds (1-120).
|
service-monitor
|
Configures Service Monitor related parameters.
|
number-of-samples
|
Counts the latest sampled values to be used when calculating average.
|
all
|
Sets to all monitor types.
|
num
|
Count of latest sampled values to be used when calculating average (1-120).
|
cpu
|
Enables the monitor CPU load.
|
disk
|
Sets the disk monitor type.
|
fms
|
Sets the Flash Media Server (FMS) monitor type.
|
kmemory
|
Sets the monitor kernel memory type.
|
memory
|
Sets the monitor memory type.
|
wmt
|
Sets the Windows Media Technology (WMT) monitor type.
|
nic
|
Sets the Network Interface Card monitor type.
|
sample-period
|
Configures the time interval between two consecutive samples.
|
num
|
Time interval between two consecutive samples in seconds (1-160).
|
threshold
|
Configures threshold values.
|
failcntdisk
|
Sets the disk failure monitor type.
|
num
|
The disk FailureCnt threshold value.
|
movie-streamer
|
Sets the Movie Streamer monitor type.
|
type
|
Configures the type to be monitored.
|
access-policy
|
Configures the service-router access-policy.
|
enable
|
Enables access-policy.
|
content-based-routing
|
Configures content based routing.
|
enable
|
Enables content based routing.
|
redundant
|
Specifies the number of redundant copies of the content.
|
num
|
Number of redundant copies of the content (1-4).
|
dns-ttl
|
Configures Time to Live (TTL) of Domain Name Server (DNS) records issued by SR.
|
num
|
Number of seconds (1-60).
|
lastresort
|
Configures the lastresort domain.
|
domain
|
Configures the domain.
|
name
|
Domain name.
|
allow
|
Allows the client to be routed through an alternate domain or origin server.
|
all
|
Allows all requests.
|
alternate
|
Configures an alternate domain.
|
name
|
Alternate domain name.
|
error-domain
|
Configures error domain.
|
name
|
Error domain name.
|
error-file
|
Configures error file name.
|
name
|
Error file name.
|
location-based-routing
|
Configures location-based routing.
|
enable
|
Enables location-based routing.
|
geo-location-server
|
Configures geo location server IP address and port.
|
primary
|
Configures the primary geographical (geo) location server IP address and port.
|
ip address
|
IP address of primary geo location server.
|
num
|
Port number of primary geo location server.
|
secondary
|
Configures the secondary geo location server IP address and port.
|
ip address
|
IP address of secondary geo location server.
|
num
|
Port number of secondary geo location server.
|
proximity-based-routing
|
Configures proximity-based routing.
|
enable
|
Enables proximity-based routing.
|
proximity-cache
|
Configures proximity cache.
|
timeout
|
Configures proximity cache timeout.
|
num
|
Proximity cache timeout in seconds (1-86400).
|
proximity-server
|
Configures proximity server IP address and port.
|
ip address
|
IP address of proximity server.
|
num
|
Port number of proximity server (1-65535).
|
redirect-mode
|
Configures the service router redirect mode.
|
ip-redirect
|
Enables IP redirection.
|
service-monitor
|
Configures service monitor parameters.
|
number-of-samples
|
Counts the latest sampled values to be used when calculating average.
|
all
|
Allows all monitor types.
|
num
|
Count of latest sampled values to be used when calculating average (1-120).
|
cpu
|
Sets the CPU monitor type.
|
disk
|
Sets the disk monitor type.
|
kmemory
|
Sets the monitor kernel memory.
|
memory
|
Sets the monitor memory.
|
failcntdisk
|
Sets the disk failure monitor type.
|
sample-period
|
Configures the time interval between two consecutive samples.
|
threshold
|
Configures threshold values.
|
type
|
Configures the type to be monitored.
|
Defaults
keepalive-interval: 2 seconds
redundant copies: 1 copy
dns-ttl: 60 seconds
proximity cache timeout: 1800 seconds
sample-period: 1 second
nic sample-period: 3 seconds
number of samples: 2 samples
Command Modes
Global configuration
Usage Guidelines
To configure last-resort routing, use the service-router global configuration command, where domain is the service routing domain name, and alternate is where to route requests.
Last-resort routing is applicable when load-based routing is enabled and all SEs have exceeded their thresholds or all SEs in the domain are offline. The SR can redirect requests to a configurable alternate domain when all SEs serving a client network region are overloaded.
Note
If the last-resort domain is not configured and the SE thresholds are exceeded, requests are redirected to the origin server.
Crossdomain Support
When a client requests the content from a portal and the content then makes a request to a different remote domain (or origin server), the request cannot be served unless the origin server or the remote domain has a crossdomain.xml that grants access to the original portal to continue with the streaming.
For example, a client request for abc.com/streaming.html (which has the content), makes a request for cds-origin.com/vod/sample.flv (which is a different domain), then the client must request a crossdomain.xml. The crossdomain.xml allows access to abc.com and can then stream sample.flv. If the cds-origin.com does not have crossdomain.xml, then the request is denied.
Note
In the case of Flash, the request is made for crossdomain.xml. In the case of Silverlight the request is made for clientaccesspolicy.xml.
Instead of directly going to cds-origin.com, the request first comes to the service router. So when the request for crossdomain.xml comes to the service router, it is served to the client. This xml grants access to the portal for the file requested. So the client then sends the request for the file which is served.
Note
For Silverlight the client access policy is requested only when web service calls are made. Depending on the client player, for both Silverlight and Flash applications, the clientaccesspolicy.xml and crossdomain.xml need to be provisioned on the origin server.
FLVPlaybackComponent does not currently crossdomain requests for video files. The crossdomain request is issued only when a query string is present. In such cases, the video gets downloaded but does not play.
The number of the HTTP Requests (normal) in Request Received ("show statistics service-router summary") should increase.
Examples
The following example shows how to configure the keepalive interval:
ServiceRouter(config)#service-router keepalive-interval 2
The following example shows how to configure the service monitor type:
ServiceRouter(config)#service-router service-monitor type all
Crossdomain Support
The following example shows how to enable crossdomain support:
ServiceEngine(config)#service-router access-policy enable
The following example shows how to disable crossdomain support:
ServiceEngine(config)#no service-router access-policy enable
Related Commands
show service-router
setup
To configure basic configuration settings (general settings, device network settings, and disk configuration) on the SE and a set of commonly used caching services, use the setup EXEC command. You can also use the setup EXEC command to complete basic configuration after upgrading.
setup
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example shows the part of the output when you enter the setup EXEC command on an SE running the Internet Streamer CDS software:
Here is the current profile of this device
Do you want to change this (y/n) [n]:
Press the ESC key at any time to quit this session
show access-lists
To display the access control list (ACL) configuration, use the show access-lists 300 EXEC command.
show access-lists 300
Syntax Description
None
Command Default
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-13 describes the fields shown in the show access-lists 300 display.
Table 2-13 show access-lists Field Descriptions
Field
|
Description
|
Access Control List Configuration
|
Access Control List is enabled
|
Configuration status of the access control list option.
|
Groupname and username-based List
|
Lists the group name-based access control lists.
|
Related Commands
access-lists
show acquirer
To display the acquirer information and progress of content acquisition for a specified channel number or name, use the show acquirer EXEC command.
show acquirer [delivery-service {delivery-service-id delivery-service-id | delivery-service-name
delivery-service-name} | progress {delivery-service-id delivery-service-id |
delivery-service-name delivery-service-name} | proxy authentication]
Syntax Description
delivery-service
|
Displays acquirer information for the delivery service.
|
delivery-service-id
|
(Optional) Displays the ID for the delivery service.
|
delivery-service-id
|
Delivery service ID.
|
delivery-service-name
|
(Optional) Displays the name for the delivery service.
|
delivery-service-name
|
Delivery service name.
|
progress
|
(Optional) Displays the acquisition progress for the specified channel.
|
proxy
|
(Optional) Displays the proxy information for the acquirer.
|
authentication
|
Displays the proxy authentication details for the acquirer.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The show acquirer progress command displays information for all channels for which the SE is the root SE. It displays the number of acquired objects in relation to the total number of objects for both a single item or crawler jobs. When an acquisition is in progress, it displays the number of data bytes currently being downloaded in relation to the total size of the object and its URL. The show acquirer progress command also displays information about the authentication that allows the acquirer to access content through a transparent or nontransparent proxy server.
The show acquirer proxy authentication command displays the proxy authentication configuration for the acquirer if you have enabled content acquisition through a proxy server and proxy authentication is configured. Use the acquirer proxy authentication outgoing global configuration command to configure authentication when you enable content acquisition through a proxy server. You must first configure the proxy host and the port using the http proxy outgoing host global configuration command.
When you enable content acquisition through a proxy server, you can provide the proxy configuration and proxy authentication information in the manifest file. If the proxy and proxy authentication are configured in the manifest file, the show acquirer proxy authentication command does not display any proxy details.
Examples
The show acquirer progress EXEC command displays the progress of the acquirer for a specified channel. If a specific channel is not mentioned, the display shows the progress for all the channels for which the SE is the root.
Table 2-14 describes the fields shown in the show acquirer progress display.
Table 2-14 show acquirer progress Field Descriptions
Field
|
Description
|
Channel-id
|
Numerical identifier for the channel.
|
Channel-Name
|
Name for the channel.
|
Acquired Single Items
|
Total number of single items completed out of all of the single items specified in the manifest. For example, 200/301 shows that all 200 items out of a total of 301 items have been acquired.
|
Acquired Crawl Items
|
Total number of links with crawling completed out of the total crawlable items for each crawling task specified in the manifest, along with the starting URL.
|
Download Size (Bytes)
|
Current URL fetched by the acquirer for the channel, if applicable, along with the file size details.
|
The following example shows the output from the show acquirer proxy authentication command when there are no proxies configured using the acquirer proxy authentication global configuration command:
ServiceEngine#show acquirer proxy authentication
No proxy authentication information configured
The following example shows the output from the show acquirer proxy authentication command after configuring the proxy using the acquirer proxy authentication global configuration command:
ServiceEngine#show acquirer proxy authentication
acquirer proxy authentication outgoing 172.28.225.29 8080 admin password **** My-Domain
basic-auth-disable
acquirer proxy authentication transparent admin password **** My-Domain basic-auth-disable
Related Commands
acquirer (global configuration)
http
show statistics acquirer
show alarms
To display information on various types of alarms, their status, and history, use the show alarms EXEC command.
show alarms [critical [detail [support]] | detail [support] | history [[start_num [end_num [detail
[support]] | detail [support]]] | critical [start_num [end_num [detail [support]] | detail
[support]]] | detail [support] | major [start_num [end_num [detail [support]] | detail
[support]]] | minor [start_num [end_num [detail [support]]] | detail [support]]] | major
[detail [support]] | minor [detail [support]] | status]
Syntax Description
critical
|
(Optional) Displays critical alarm information.
|
detail
|
(Optional) Displays detailed information for each alarm.
|
support
|
(Optional) Displays additional information about each alarm.
|
history
|
(Optional) Displays information about the history of various alarms.
|
start_num
|
(Optional) Alarm number that appears first in the alarm history.
|
end_num
|
(Optional) Alarm number that appears last in the alarm history.
|
major
|
(Optional) Displays information about major alarms.
|
minor
|
(Optional) Displays information about minor alarms.
|
status
|
(Optional) Displays the status of various alarms and alarm overload settings.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The Node Health Manager enables CDS applications to raise alarms to draw attention to error or significant conditions. The Node Health Manager, which is the data repository for such alarms, aggregates the health and alarm information for the applications, services (for example, the cache service), and resources (for example, disk drives) that are being monitored on the SE. For example, the Node Health Manager gives you a mechanism to determine if a monitored application (for example, the HTTP proxy caching service) is alive on the SE. These alarms are referred to as Internet Streamer CDS software alarms.
The Internet Streamer CDS software uses SNMP to report error conditions by generating SNMP traps. In the Internet Streamer CDS software, the following SE applications can generate an Internet Streamer CDS software alarm:
•
Node Health Manager (alarm overload condition and Node Manager aliveness)
•
Node Manager for service failures (aliveness of monitored applications)
•
System Monitor (sysmon) for disk failures
The three levels of alarms in the Internet Streamer CDS software are as follows:
•
Critical—Alarms that affect the existing traffic through the SE and are considered fatal (the SE cannot recover and continue to process traffic).
•
Major—Alarms that indicate a major service (for example, the cache service) has been damaged or lost. Urgent action is necessary to restore this service. However, other node components are fully functional and the existing service should be minimally impacted.
•
Minor—Alarms that indicate that a condition that will not affect a service has occurred but corrective action is required in order to prevent a serious fault from occurring.
You can configure alarms using the snmp-server enable traps alarm global configuration command.
Use the show alarms critical EXEC command to display the current critical alarms being generated by the Internet Streamer CDS software applications. Use the show alarms critical detail EXEC command to display additional details for each of the critical alarms being generated. Use the show alarms critical detail support EXEC command to display an explanation about the condition that triggered the alarm and how you can find out the cause of the problem. Similarly, you can use the show alarms major and show alarms minor EXEC commands to display the details of major and minor alarms.
Use the show alarms history EXEC command to display a history of alarms that have been raised and cleared by the Internet Streamer CDS software on the SE. The Internet Streamer CDS software retains the last 100 alarm raise and clear events only.
Use the show alarm status EXEC command to display the status of current alarms and the SE's alarm overload status and alarm overload configuration.
Examples
Table 2-15 describes the fields shown in the show alarms history display.
Table 2-15 show alarms history Field Descriptions
Field
|
Description
|
Op
|
Operation status of the alarm. Values are R-Raised or C-Cleared.
|
Sev
|
Severity of the alarm. Values are Cr-Critical, Ma-Major, or Mi-Minor.
|
Alarm ID
|
Type of event that caused the alarm.
|
Module/Submodule
|
Software module affected.
|
Instance
|
Object that this alarm event is associated with. For example, for an alarm event with the Alarm ID disk_failed, the instance would be the name of the disk that failed. The Instance field does not have pre-defined values and is application specific.
|
Table 2-16 describes the fields shown in the show alarms status display.
Table 2-16 show alarms status Field Descriptions
Field
|
Description
|
Critical Alarms
|
Number of critical alarms.
|
Major Alarms
|
Number of major alarms.
|
Minor Alarms
|
Number of minor alarms.
|
Overall Alarm Status
|
Aggregate status of alarms.
|
Device is NOT in alarm overload state.
|
Status of the device alarm overload state.
|
Device enters alarm overload state @ 999 alarms/sec.
|
Threshold number of alarms per second at which the device enters the alarm overload state.
|
Device exits alarm overload state @ 99 alarms/sec.
|
Threshold number of alarms per second at which the device exits the alarm overload state.
|
Overload detection is enabled.
|
Status of whether overload detection is enabled on the device.
|
Related Commands
alarm overload-detect
snmp-server enable traps
show arp
To display the Address Resolution Protocol (ARP) table, use the show arp EXEC command.
show arp
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The show arp command displays the Internet-to-Ethernet address translation tables of the Address Resolution Protocol. Without flags, the current ARP entry for the hostname is displayed.
Table 2-17 describes the fields shown in the show arp display.
Table 2-17 show arp Field Descriptions
Field
|
Description
|
Protocol
|
Type of protocol.
|
Address
|
Ethernet address of the hostname.
|
Flags
|
Current ARP flag status.
|
Hardware Addr
|
Hardware Ethernet address given as six hexadecimal bytes separated by colons.
|
Type
|
Type of wide-area network.
|
Interface
|
Type of Ethernet interface.
|
show authentication
To display the authentication configuration, use the show authentication EXEC command.
show authentication user
Syntax Description
user
|
Displays the authentication configuration for the user login to the system.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Related Commands
authentication
authentication
clear
show statistics authentication
show authsvr
To display the status of the Authorization server, use the show authsvr EXEC command.
show authsvr [unknown-server]
Syntax Description
unknown-server
|
(Optional) Shows the allow and deny rule for unknown configured servers or domains.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example shows the status of the Authorization server:
ServiceEngine#show authsvr
Related Commands
authsvr
show bandwidth
To display the bandwidth allocated to a particular device, use the show bandwidth EXEC command.
show bandwidth [flash-media-streaming | movie-streamer | wmt]
Syntax Description
flash-media-streaming
|
(Optional) Displays the Flash media streaming bandwidth settings.
|
movie-streamer
|
(Optional) Displays the Movie Streamer bandwidth settings.
|
wmt
|
(Optional) Displays Windows Media Technology (WMT) bandwidth settings.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-18 describes the fields shown in the show bandwidth display.
Table 2-18 show bandwidth Field Descriptions
Field
|
Description
|
Module
|
Types of application servers for which bandwidth allocation is displayed:
• wmt incoming is for incoming WMT streaming content requests from end users.
• wmt outgoing is for outgoing WMT media from SEs.
• movie-streamer incoming is for incoming Movie Streamer content requests from end users.
• movie-streamer outgoing is for outgoing Movie Streamer media from SEs.
• flash-media-streaming is for Flash Media Streaming.
|
Bandwidth Kbps
|
Maximum amount of bandwidth that you want allowed in kilobits per second (kbps) for a particular period of time. Incoming and outgoing bandwidth enforced is 8000000 kbps.
|
Start Time
|
Time of the day for the bandwidth rate setting to begin, using a 24-hour clock in local time on the SE (hh:mm).
|
End Time
|
Time of the day for the bandwidth rate setting to end, using a 24-hour clock in local time on the SE (hh:mm).
|
Default Bandwidth Kbps
|
Amount of default bandwidth (in kbps). The default bandwidth is the amount of bandwidth associated with each content service type when there is no scheduled bandwidth.
|
Max Bandwidth Kbps
|
Maximum bandwidth (in kbps) permitted by the system license. This bandwidth specifies the upper limit of allowable bandwidth.
|
Related Commands
bandwidth (global configuration)
show banner
To display information on various types of banners, use the show banner EXEC command.
show banner
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-19 describes the fields shown in the show banner display.
Table 2-19 show banner Field Descriptions
Field
|
Description
|
Banner is enabled.
|
Configuration status of the banner feature.
|
MOTD banner is: abc
|
Displays the configured message of the day.
|
Login banner is: acb
|
Displays the configured login banner.
|
Exec banner is: abc
|
Displays the configured EXEC banner.
|
Related Commands
banner
show bitrate
To display the bit rate allocated to a particular device, use the show bitrate EXEC command.
show bitrate [movie-streamer | wmt]
Syntax Description
movie-streamer
|
(Optional) Displays the Movie Streamer bit rate settings.
|
wmt
|
(Optional) Displays Windows Media Technology (WMT) bit rate settings.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-20 describes the fields shown in the show bitrate display.
Table 2-20 show bitrate Field Descriptions
Field
|
Description
|
Module
|
Types of application servers for which the bit rate is displayed:
• wmt outgoing is the maximum bit rate per WMT stream that can be served by the SE.
• wmt incoming is the maximum bit rate per WMT stream that can be received by the SE.
• movie-streamer outgoing is the maximum bit rate per streamer that can be served by the SE.
• movie-streamer incoming is the maximum bit rate per streamer that can be received by the SE.
|
Default Bitrate Kbps
|
Bit rate associated with the application servers when the bit rate has not been configured on the SE.
|
Configured Bitrate Kbps
|
Bit rate configured on the SE in kilobits per second.
|
Related Commands
bitrate
show cache
To display a list of cached contents, use the show cache EXEC command.
show cache [content num]
Syntax Description
content
|
Displays a list of cached contents in order of decreasing priority.
|
num
|
Specifies number of cached contents to be displayed (1-1000).
|
Defaults
Number of cached contents is 100.
Command Modes
EXEC
Usage Guidelines
The show cache command allows users to check the cached content in an SE. Users can also view the priority, size, and URL information through this command.
Examples
The following example shows the cached contents:
ServiceEngine#show cache content 1000
Max-cached-entries is set as 1000
Number of cal cached assets: 12
------------------------------------------------
------------------------------------------------
1.09887e+00 16 rtsp://72.163.255.118/c.wmv
1.04340e+00 416 rtsp://72.163.255.118/c.wmv.Ui4HeLMPgB5lLH_+bo2d.03.bmp
6.71782e-01 957 rtsp://72.163.255.118/c.wmv.hdr
5.74964e-01 16 rtsp://72.163.255.118/4.wmv
5.60340e-01 664997 rtsp://72.163.255.118/c.wmv.Ui4HeLMPgB5lLH_+bo2d.03
3.15230e-01 665107 http://72.163.255.118/c.wmv
2.39938e-01 5409 rtsp://72.163.255.118/4.wmv.hdr
2.02040e-01 35256 rtsp://72.163.255.118/4.wmv.rPgfTr1Lo0dT6FJWaxDs.03.bmp
1.59027e-01 873664 http://72.163.255.118/4.flv
1.45368e-01 3603032 http://72.163.255.118/b.wmv
1.23161e-01 70517409 rtsp://72.163.255.118/4.wmv.rPgfTr1Lo0dT6FJWaxDs.03
7.88076e-02 29180088 http://72.163.255.118/4.wmv
Related Commands
cache
show capability
To display the capabilities of the Cap-X profile ID, use the show capability EXEC command.
show capability profile ID profile ID
Syntax Description
profile ID
|
Displays information for the Cap-X profile.
|
profile ID
|
Profile ID number. The range is 1-65535.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Related Commands
capability
show cdnfs
To display CDS network file system (cdnfs) information, use the show cdnfs EXEC command.
show {cdnfs volumes | usage}
Syntax Description
volumes
|
Displays CDS network file system volumes.
|
usage
|
Displays Content Delivery Network (CDN) current usage.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-21 describes the fields shown in the show cdnfs volumes display.
Table 2-21 show cdnfs volumes Field Descriptions
Field
|
Description
|
cdnfs 00-04
|
CDS network file system and disk number.
|
nnnnnnKB
|
Size of the volume in kilobytes.
|
Related Commands
cdnfs
disk (EXEC)
show disks
show statistics cdnfs
show clock
To display the system clock, use the show clock EXEC command.
show clock [detail | standard-timezones {all | details timezone | regions | zones region-name}]
Syntax Description
detail
|
(Optional) Displays detailed information; indicates the Network Timing Protocol (NTP) clock source and the current summer time setting (if any).
|
standard-timezones
|
(Optional) Displays information about the standard time zones.
|
all
|
Displays all of the standard time zones (approximately 1500 time zones). Each time zone is listed on a separate line.
|
details
|
Displays detailed information for the specified time zone.
|
timezone
|
Name of the time zone.
|
regions
|
Displays the region name of all the standard time zones. All 1500 time zones are organized into directories by region.
|
zones
|
Displays the name of every time zone that is within the specified region.
|
region-name
|
Name of the region.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The CDS has several predefined standard time zones. Some of these time zones have built-in summertime information while others do not. For example, if you are in an eastern region of the United States (US), you must use the US/Eastern time zone that includes summertime information and will adjust the clock automatically every April and October. There are about 1500 standard time zone names.
The clock summertime command is disabled when a standard time zone is configured. You can only configure summertime if the time zone is not a standard time zone (if the time zone is a customized zone).
In addition, CLI commands exist to enable you to display a list of all the standard time zones. The show clock standard-timezones all EXEC command enables you to browse through all standard time zones and choose from these predefined time zones. You can choose a customized name that does not conflict with the predefined names of the standard time zones. Most predefined names of the standard time zones have two components, a region name and a zone name. You can list time zones by several criteria, such as regions and zones.
Examples
Table 2-22 describes the field in the show clock display.
Table 2-22 show clock Field Description
Field
|
Description
|
Local time
|
Day of the week, month, date, time (hh:mm:ss), and year in local time relative to the UTC offset.
|
Table 2-23 describes the fields shown in the show clock detail display.
Table 2-23 show clock detail Field Descriptions
Field
|
Description
|
Local time
|
Local time relative to UTC.
|
UTC time
|
Coordinated Universal Time (UTC) date and time.
|
Epoch
|
Number of seconds since Jan. 1, 1970.
|
UTC offset
|
UTC offset in seconds, hours, and minutes.
|
The following example shows an excerpt of the output from the show clock standard-timezones all EXEC command. As the following example shows, all of the standard time zones (approximately 1500 time zones) are listed. Each time zone is listed on a separate line.
ServiceEngine #
show clock standard-timezones all
ServiceEngine(config)#
The following example shows an excerpt of the output from the show clock standard-timezones region EXEC command. As the example shows, all first level time zone names or directories are listed. All 1500 time zones are organized into directories by region.
ServiceEngine #
show clock standard-timezones regions
The following example shows an excerpt of the output from the show clock standard-timezones zones EXEC command. As the following example shows, this command lists the name of every time zone that is within the specified region (for example, the US region).
ServiceEngine #
show clock standard-timezones zones US
The following example shows an excerpt of the output from the show clock standard-timezones details EXEC command. This command shows details about the specified time zone (for example, the US/Eastern time zone). The command output also includes the standard offset from the Greenwich mean time (GMT).
ServiceEngine #
show clock standard-timezones details US/Eastern
US/Eastern is standard timezone.
Getting offset information (may take a while) ...
Standard offset from GMT is -300 minutes (-5 hour(s)).
It has built-in summertime.
Summer offset from GMT is -240 minutes. (-4 hour(s)).
Related Commands
clock (EXEC)
clock (global configuration
show cms
To display the Centralized Management System (CMS) embedded database content and maintenance status and other information, use the show cms EXEC command.
show cms {database {content {dump filename | text | xml} | maintenance [detail]} | info |
processes}
Syntax Description
database
|
Displays embedded database maintenance information.
|
content
|
Writes the database content to a file.
|
dump
|
Dumps all database content to a text file.
|
filename
|
Name of the file to be saved under local1 directory.
|
text
|
Writes the database content to a file in text format.
|
xml
|
Writes the database content to a file in XML format.
|
maintenance
|
Shows the current database maintenance status.
|
detail
|
(Optional) Displays database maintenance details and errors.
|
info
|
Displays CMS application information.
|
processes
|
Displays CMS application processes.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-24 describes the fields shown in the CDSM show cms info display.
Table 2-24 show cms Field Descriptions for the CDSM
Field
|
Description
|
CDN information
|
Model
|
Model name of the device.
|
Node Id
|
Unique identifier given to the device by the CDSM at registration, which is used to manage the device.
|
Device Mode
|
Configured mode of device used during registration.
|
Current CDSM role
|
Role of the current CDSM: Primary or Standby.
|
CMS services information
|
Service cms_httpd is running
|
Status of the cms_httpd management service (running or not running). This field is specific to the CDSM only.
|
Service cms_cdsm is running
|
Status of the cms_cdsm management service (running or not running). This field is specific to the CDSM only.
|
Table 2-25 describes the fields shown in the SE show cms info display.
Table 2-25 show cms Field Descriptions for the SE
Field
|
Description
|
CDN information
|
Model
|
Model name of the device.
|
Node Id
|
Unique identifier given to the device by the CDSM at registration, which is used to manage the device.
|
Device Mode
|
Configured mode of device used during registration.
|
Current CDSM address
|
Address of the CDSM as currently configured in the cdsm ip global configuration command. This address may differ from the registered address if a standby CDSM is managing the device instead of the primary CDSM with which the device is registered.
|
Registered with CDSM
|
Address of the CDSM with which the device is registered.
|
Status
|
Connection status of the device to the CDSM. This field may contain one of three values: Online, Offline, or Pending.
|
Time of last config-sync
|
Time when the device management service last contacted the CDSM for updates.
|
The following example writes the database content to a file in text format:
CDSM# show cms database content text
Database content can be found in /local1/cms-db-12-12-2002-17:06:08:070.txt.
The following example writes the database content to a file in XML format:
CDSM# show cms database content xml
Database content can be found in /local1/cms-db-12-12-2002-17:07:11:629.xml.
The following example shows the output of the show cms database maintenance detail on an SE:
ServiceEngine#show cms database maintenance detail
Database maintenance is not running.
Regular database maintenance is enabled.
Regular database maintenance schedule is set on Sun, Mon, Tue, Wed, Thu, Fri, Sat at 02:00
Full database maintenance is enabled.
Full database maintenance schedule is set on Sun, Mon, Tue, Wed, Thu, Fri, Sat at 04:00
Disk usage for STATE partition: Total: 1523564K, Available: 1443940K, Use: 6%
DATABASE VACUUMING DETAILS AND ERRORS
-------------------------------------
Database Vacuuming never performed or it did not complete due to error.
Latest Vacuuming status :No Error
Last Vacuum Error : No Error
Last Reindex Time : Thu Jul 15 02:02:49 2004
Latest Reindexing status :No Error
Last Reindex Error: No Error
Related Commands
cms (EXC)
cms (global configuration)
show content
To display all content entries in the CDS, use the show content EXEC command.
show content {all [background | brief] | url url [brief]}
Syntax Description
all
|
Displays all cached content into a file.
|
name
|
The output file to log cache content query results.
|
background
|
(Optional) Run this command in background.
|
brief
|
(Optional) Using brief display mode.
|
url
|
Displays the cached content object with original URL.
|
url
|
The original URL for cache content object query.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
This command allows users to check the cached or pre-positioned content in an SE. Through this command, users can view content attributes such as status and file size.
Examples
The following example displays the RTSP URL in the CDS:
ServiceEngine#show content url rtsp://www.cht.com/CHT_2M.wmv
CAL content object attributes:
URL: rtsp://www.cht.com/CHT_2M.wmv
Authorization is Not Required
Content is CACHED with priority 0.574964
The following example displays all content entries in the CDS:
ServiceEngine#show content all name background
Command running in background...
ServiceEngine#USER INFO: Your 'show content all' command finished
show debugging
To display the state of each debugging option, use the show debugging EXEC command.
show debugging
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
This command displays only the type of debugging enabled, not the specific subset of the command.
Examples
In the following example, the debug icp client command coupled with the show debugging command shows that Internet Cache Protocol (ICP) debugging is enabled:
ServiceEngine#debug icp client
ServiceEngine#show debugging
Related Commands
debug
undebug
show device-mode
To display the configured or current mode of a device, use the show device-mode EXEC command.
show device-mode {configured | current}
Syntax Description
configured
|
Displays the configured device mode.
|
current
|
Displays the current device mode.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
If the configured and current device modes differ, a reload is required for the configured device mode to take effect.
Examples
The configured device mode field in the show device-mode configured display shows the device mode that has been configured, but has not yet taken effect. The current device mode field in the the show device-mode current display shows the current mode in which the CDS device is operating.
The following example shows how to use the show device-mode command to show the device mode when you change the device from an SE to an SR using the device mode command:
Acmehost# show device-mode current
Current device mode: service-engine
Acmehost# show device-mode configured
Configured device mode: service-engine
Acmehost(config)#device mode service-router
The new configuration will take effect after a reload
Acmehost# show device-mode current
Current device mode: service-engine
Note: The configured and current device modes differ,
a reload is required for the configured device mode to
Acmehost# show device-mode configured
Configured device mode: service-router
Note: The configured and current device modes differ,
a reload is required for the configured device mode to
Acmehost# show running-config
device mode service-router
Acmehost# show device-mode configured
Configured device mode: service-router
Acmehost# show device-mode current
Current device mode: service-router
Related Commands
device
show direct-server-return
To display the Direct Server return information, use the show direct-server-return EXEC command.
show direct-server-return
Syntax Description
This command has no keywords or arguments.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example displays the Direct Server return information:
ServiceEngine#show direct-server-return
direct-server-return vip 11.11.11.11
Related Commands
direct-server-return
show disks
To view information about your disks, use the show disks EXEC command.
show disks [current | details | raid-state | SMART-info [details]]
Syntax Description
current
|
(Optional) Displays currently effective configurations.
|
details
|
(Optional) Displays currently effective configurations with more details.
|
raid-state
|
(Optional) Shows the volume and progress information for the RAID disks.
|
SMART-info
|
(Optional) Displays hard drive diagnostic information and information about impending disk failures.
|
details
|
(Optional) Displays more detailed SMART disk-monitoring information.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The show disks command displays the names of the disks currently attached to the SE.
Proactively Monitoring Disk Health with SMART
The ability to proactively monitor the health of disks with Self Monitoring, Analysis, and Reporting Technology (SMART) was added. SMART provides you with hard drive diagnostic information and information about impending disk failures.
SMART is supported by most disk vendors and is a standard method used to determine the health of a disk. SMART has several read-only attributes (for example, the power-on hours attribute, the load and unload count attribute) that provide the CDS software with information regarding the operating and environmental conditions that may indicate an impending disk failure.
To display more detailed information, enter the show disks SMART-info details EXEC command. The output from the show disks SMART-info and the show disks SMART-info details commands will differ based on the disk vendor and the type of drive technology (Integrated Drive Electronics [IDE], Small Computer Systems Interface [SCSI], and Serial Advanced Technology Attachment [SATA] disk drives).
Even though SMART attributes are vendor dependent, there is a common way of interpreting most SMART attributes. Each SMART attribute has a normalized current value and a threshold value. When the current value exceeds the threshold value, the disk is considered as failed. The CDS software monitors the SMART attributes and reports any impending failure through syslog messages, SNMP traps, and alarms.
The output from the show tech-support EXEC command also includes SMART information.
Filter Out Multiple Syslog Messages for a Single Failed Sector on SCSI, IDE, and SATA Disk Drives
Many disk failure messages were generated when a single disk sector failed, which caused an unnecessary alarm. Changes for suppressing multiple syslog messages on a single sector failure have been implemented for IDE disk drives. This fix has also been extended to SCSI and SATA disk drives.
Examples
Table 2-26 describes the fields shown in the show disks details display.
Table 2-26 show disks details Field Descriptions
Field
|
Description
|
disk00
|
Availability of the disk: Present, Not present or Not responding, Not used, or (*).
Note Disk drives that are currently marked as bad are shown as "Not used" in the output. Future bad disk drives (drives that will not be used after the next time that the SE is reloaded) are shown with an asterisk (*).
Disk identification number and type.
Disk size in megabytes and gigabytes.
|
disk01
|
Same type of information is shown for each disk.
|
System use
|
Amount of disk space being used for system use.
|
Free
|
Amount of unused disk space available.
|
SMART support is vendor dependent; each disk vendor has a different set of supported SMART attributes. The following example shows the output from the show disks SMART-info EXEC command that was entered on two different SEs (Service Engine A and Service Engine B). These two SEs contain hard disks that were manufactured by different vendors.
ServiceEngine#show disks SMART-info
smartctl version 5.38 [i686-spcdn-linux-gnu] Copyright (C) 2002-8 Bruce Allen
Home page is http://smartmontools.sourceforge.net/
=== START OF INFORMATION SECTION ===
Device Model: ST3500320NS
User Capacity: 500,107,862,016 bytes
Device is: Not in smartctl database [for details use: -P showall]
ATA Standard is: ATA/ATAPI-6 T13 1410D revision 2
Local Time is: Thu May 21 14:09:19 2009 UTC
SMART support is: Available - device has SMART capability.
SMART support is: Enabled
=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED
RUNNING: /usr/sbin/smartctl /dev/sda -H -i
smartctl version 5.38 [i686-spcdn-linux-gnu] Copyright (C) 2002-8 Bruce Allen
Home page is http://smartmontools.sourceforge.net/
=== START OF INFORMATION SECTION ===
Device Model: ST3500320NS
User Capacity: 500,107,862,016 bytes
Device is: Not in smartctl database [for details use: -P showall]
ATA Standard is: ATA/ATAPI-6 T13 1410D revision 2
Local Time is: Thu May 21 14:09:19 2009 UTC
SMART support is: Available - device has SMART capability.
SMART support is: Enabled
=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED
RUNNING: /usr/sbin/smartctl /dev/sdb -H -i
smartctl version 5.38 [i686-spcdn-linux-gnu] Copyright (C) 2002-8 Bruce Allen
Home page is http://smartmontools.sourceforge.net/
=== START OF INFORMATION SECTION ===
Device Model: ST3500320NS
User Capacity: 500,107,862,016 bytes
Device is: Not in smartctl database [for details use: -P showall]
ATA Standard is: ATA/ATAPI-6 T13 1410D revision 2
Local Time is: Thu May 21 14:09:19 2009 UTC
SMART support is: Available - device has SMART capability.
SMART support is: Enabled
=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED
RUNNING: /usr/sbin/smartctl /dev/sdc -H -i
Table 2-27 describes some typical fields in the show disks SMART-info display.
Table 2-27 show disks SMART-info Field Descriptions
Field
|
Description
|
disk00—disk05
|
Shows information for disk drives.
|
Device Model
|
Vendor number and version number of the disk.
|
Serial Number
|
Serial number for the disk.
|
Device type
|
Type of device.
|
Transport protocol
|
Physical layer connector information, for example: Parallel SCSI (SPI-4).
|
Local time is
|
Day of the week, month, date, time (hh:mm:ss), year, clock standard.
|
Device supports SMART and SMART is Enabled
|
Status of SMART support: Enabled or Disabled.
|
Temperature Warning Enabled
|
Temperature warning status: Enabled or Disabled.
|
SMART Health Status:
|
Health status of the disk: OK or Failed.
|
Related Commands
disk (EXEC)
show distribution
To display the distribution information for a specified delivery service and to probe a remote SE for the liveness of its associated delivery service, use the show distribution EXEC command.
show distribution [delivery-services {delivery-service-id delivery-service-num |
delivery-service-name delivery-service-name}]
show distribution [forwarder-list {delivery-service-id delivery-service-num |
delivery-service-name delivery-service-name} | detail]
show distribution [location {forwarder-load-weight | live-load-weight |
location-leader-preference} {delivery-service-id delivery-service-num |
delivery-service-name delivery-service-name}]
show distribution [object-status object-url]
show distribution [processes]
show distribution [remote ip-address {metadata-sender delivery-service-id
delivery-service-num [start-generation-id gen-id end-generation-id gen-id] | unicast-sender
delivery-service-id delivery-service-num {cdn-url cdn_url | probe | relative-cdn-url
cdn_url}}]
show distribution [remote traceroute {forwarder-next-hop delivery-service-id
delivery-service-num {max-hop maxhop_num | trace-till-good | trace-till-root} |
unicast-sender delivery-service-id delivery-service-num {cdn-url cdn-url | probe |
relative-cdn-url cdn-url} {max-hop maxhop_num | trace-till-good | trace-till-root}}]
Syntax Description
delivery-services
|
(Optional) Displays information about the specified delivery service.
|
delivery-service-id
|
(Optional) Specifies the delivery service ID.
|
delivery-service-num
|
Delivery service number (64-bit number).
|
delivery-service-name
|
(Optional) Specifies the delivery service name.
|
delivery-service-name
|
Delivery service name.
|
forwarder-list
|
(Optional) Displays the forwarder lists for all delivery services subscribed to by the SE.
|
detail
|
(Optional) Displays detailed forwarder lists for all delivery services subscribed to by the SE.
|
location
|
(Optional) Displays delivery service routing-related parameters for the SEs in the location (specified by the delivery service ID).
|
forwarder-load- weight
|
Displays the forwarder load weight value of the SEs in the location (specified by the delivery service ID). For more information, see the "Forwarder Probability" section.
|
live-load-weight
|
Displays the live load weight value of the SEs in the location (specified by the delivery service ID). For more information, see the "Live Splitting Probability" section.
|
location-leader- preference
|
Displays the location leader preference value of the SEs in the location (specified by the delivery service ID). For more information, see the "Location Leader Preference" section.
|
object-status
|
(Optional) Displays information on the status of a pre-positioned object.
|
object-url
|
URL of the pre-positioned object.
|
processes
|
(Optional) Displays information on distribution processes.
|
remote
|
(Optional) Displays delivery service information about a remote SE.
|
ip-address
|
IP address of the remote SE.
|
metadata-sender
|
Displays the metadata from a remote SE.
|
start-generation-id
|
(Optional) Specifies the beginning database value of the current version of the multicast cloud.
|
gen_id
|
Beginning database value.
|
end-generation-id
|
Specifies the ending database value of the current version of the multicast cloud.
|
gen_id
|
Ending database value.
|
unicast-sender
|
Displays the unicast data from a remote SE.
|
cdn-url
|
Checks the object on a remote SE using the specified URL.
|
cdn_url
|
CDS network URL used to check the object on a remote SE.
|
probe
|
Probes the remote unicast sender.
|
relative-cdn-url
|
Checks the object on a remote SE using the specified URL.
|
traceroute
|
Displays the traceroute for the delivery service routing status.
|
forwarder-next-hop
|
Displays the next forwarder in the path for the SE.
Note This keyword lets you display the forwarding SEs to the root SE in a manner similar to the traceroute command.
|
delivery-service-id
|
Specifies the delivery service ID with which the unicast sender is associated.
|
delivery-service-num
|
Delivery service number of the delivery service with which the unicast sender is associated.
|
max-hop
|
Displays the maximum number of hops needed to reach the unicast sender.
|
maxhop_num
|
Maximum number of hops (1-1024).
|
trace-till-good
|
Allows the device to trace the route of an object until the object is found.
|
trace-till-root
|
Allows the device to trace the route of an object until the device reaches the root SE.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use the show distribution remote ip-address metadata-sender delivery-service-id delivery-service-num [start-generation-id gen_id end-generation-id gen_id] command option to retrieve the metadata from a remote SE assigned to a specified delivery service ID. The start and end generation IDs specify the beginning and ending database values representing the current version of the multicast cloud stored in the local database.
Note
Generation IDs must be greater than zero. Also, you must specify both the start and the end generation IDs, or neither ID.
The show distribution remote ip-address unicast-sender delivery-service-id delivery-service-num relative-cdn-url cdn-url command shows the status of the relative CDS network URL of an object at a remote SE assigned to a specified delivery service ID. A relative CDS network URL is one that lacks the prefix of the protocol and hostname. For example, the relative CDS network URL for http://www.mycompany.com/abc.def.html is abc.def.html.
Use the show distribution remote ip-address unicast-sender delivery-service-id delivery-service-num probe command to probe a remote SE for the liveness of the delivery service to which it is assigned.
The show distribution object-status object-url command can be used to display the properties of a pre-positioned object.
You can view the location leader preference and forwarder weight for the SE using the show distribution command. However, you can configure the location leader preference and forwarder weight only using the CDSM GUI for each SE. Default values are assumed if you do not manually configure them.
The show distribution location forwarder-load-weight command displays the probability of SEs assigned to the delivery service within the location being selected as a forwarder. The show distribution location location-leader-preference command displays the location leader preference value of SEs that are assigned to the delivery service within the location.
Use the show distribution delivery-services command to view the forwarder for the SEs. If a receiver SE is unable to find its forwarder SE, one of the following reasons is displayed in the Status/Reason column of the output of the show distribution delivery-services command:
•
LLMT—The home SE cannot find the forwarder because the home SE has a limit on the forwarder lookup level.
•
FAIL—The home SE cannot find the forwarder because there is a failed SE along the path within the specified forwarder lookup level.
•
NGWT—The home SE cannot find the forwarder because there is an SE with a negative forwarder-load-weight along the path within the specified forwarder lookup level.
Forwarder Probability
When an SE (location leader) selects its forwarder from an upstream location, it uses the forwarderLoad-weight value configured for each SE in its upstream location. The weight value of each SE corresponds to the probability of the SE being selected as the forwarder.
Each SE generates a unique random number. When an SE needs to select an inter-location forwarder, it views all the SEs in one remote location as a collection, with the size corresponding to their weight. It uses the generated random number to select an SE as a forwarder. SEs with a higher weight are more likely to be selected as forwarders.
Note
The forwarderLoad-weight value represents a probabilistic value. When a large number of children SEs select a forwarder from a location, the load on the forwarder represents the weight.
The load on the forwarder is the replication load per delivery service on the SE because all SEs subscribed to the delivery service will select a forwarder to balance the load. However, as the number of SEs assigned to different delivery services might differ, a forwarder might receive requests for content from SEs in other delivery services, which increases the load. Therefore, it is possible that the total load (of replicating content) on the forwarder does not reflect the weight but depends on the number of SEs assigned to a delivery service.
For each SE, you can specify the probability of each SE acting as a forwarder to SEs from downstream locations using the CDSM GUI. You can also specify whether certain SEs should never serve as a forwarder to downstream SEs. The specification is delivery service independent.
If you choose not to configure settings using the Location Leader and Forwarder Settings for SE window, the delivery service routing algorithm uses the random number method to generate one permutation of the SE ID ordered list.
Location Leader Preference
For intra-location (list of SEs in an SE's own location) forwarder selection, the delivery service routing algorithm first creates an ordered list of the SEs based on their location leader-preference in a descending order. Next, the delivery service routing algorithm will select the first SE in the ordered list as the location leader.
When multiple SEs have the same location leader-preference, the delivery service routing algorithm guarantees that all the SEs assigned to each delivery service in the location still generate the same ordered list, which avoids routing loops. A routing loop is a deadlock situation in which the forwarder selection among multiple SEs within the loop prevents the SEs from receiving the content from upstream locations. For example, SE1 uses SE2 as the forwarder and SE2 uses SE1 as the forwarder for the same delivery service.
However, for two different delivery services, the ordered list could be different (when multiple SEs have the same location leader probability value) even if the subscribed SEs are the same. When multiple SEs have the highest location leader-preference, although each SE has an equal chance of acting as the location leader (for different delivery services), only one SE always acts as the location leader for one particular delivery service. If you configure all the SEs in your network to have the same location leader-preference value, then each SE has an equal chance of acting as a location leader. When each SE has an equal probability of being selected as the location leader for any particular delivery service, only one particular SE is always selected as the location leader.

Note
If there are two SEs in the same location (SE1, SE2) and both of them are assigned to two delivery services (CH1, CH2), and if you want SE1 to be the location leader for CH1 and SE2 to be the location leader for CH2, you cannot configure them using location leader-preference and forwarderLoad-weight.
In a location, you can specify the probability for each SE acting as the location leader. The specification is delivery service independent.
The following limitations are associated with specifying a location leader preference:
•
When multiple SEs are configured with the same location leader-preference value and assigned to a delivery service, they have an equal probability of being selected as the location leader. In such a case, you do not have a control mechanism to decide which SE should be selected as the location leader.
•
Only the order among the SEs with the highest preference is randomized to determine the location leader preference and not other SEs with the same preference value. It is possible that if the SE(s) with the highest preference failed and there are several other SEs with the second highest preference value, they will not be balanced across the different delivery services. The same SE will be the location leader for all delivery services.
•
If an SE with a high location leader-preference is assigned to many delivery services, it is possible that the SE can be selected as the location leader for all these delivery services.
Live Splitting Probability
Similar to the delivery service routing application used for content replication that assigns weight and priority to SEs to tune location leader and forwarder selections, you can specify a configuration parameter liveSplit-load-weight for each SE. This parameter represents the relative probability that an SE is likely to receive live stream splitting traffic as compared to other SEs. The specification is delivery service independent. If you do not configure liveSplit-load-weight, the algorithm should work as it currently does.
A weighted load balancing scheme splits the live stream load on the SEs according to the liveSplit-load-weight value because SEs of different types have an equal probability of being selected as the splitting SE on the location path.
The liveSplit-load-weight is used when the delivery service routing generates the ordered list of SEs for each location. The SEs are ordered in a way that the higher the weight, the greater probability that the SEs are being ordered at the beginning of the list.
The weight represents a relative value. The liveSplit-load-weight assigned to one SE is compared against the weights of other SEs in the same location.
The weight is a probabilistic value. For one particular URL, all SEs generate the same ordered list for a location.
It is possible that an SE with a lower weight is being ordered at the beginning while an SE with a higher weight is being ordered at the end of the list. The weighted load balancing is useful only when there are multiple live stream URLs.
The liveSplit-load-weight parameter applies both within the home location and upstream locations. This setting is different from the distribution settings where locationLeader-priority controls how you choose SEs from the home location, while forwarderLoad-weight controls how you choose SEs from upstream locations.
Examples
The following examples show various ways of using the show distribution remote commands.
The following example shows the status of the object at a remote SE with the IP address 172.16.2.160 and delivery service ID 631. The URL of the content object specified in the command must not be the complete source URL. Instead, it must be the relative CDS network URL of the object.
ServiceEngine#show distribution remote 172.16.2.160 unicast-sender delivery-service-id 631
relative-cdn-url 101files/100.txt
Forwarder IP : 2.43.10.70
Forwarder Location : default-location
Relative CDN URL : 101files/100.txt
Resource-ID : roVe2aMzp+YhmbhGUfMPpQ
Content-ID : 7LC5xOlMp4YvkBJlHaQucQ
Last Modified Time : 10:52:38 Jan 04 2005
The following example retrieves the metadata from a remote SE with the IP address 172.16.2.160 assigned to delivery service ID 4999:
ServiceEngine#show distribution remote 172.16.2.160 metadata-sender delivery-service-id
4999
Getting meta data for delivery service(4999) from genid -1 to 2
Connecting to 2.43.10.101
Remote SE replied with the following headers:
Action : Processing metadata records
Have more records to process : No
Is metadata still in full reload: No
add #1: UBsSUMwbTdJzzpqDvxSdYg.., basic_auth/public.html
add #2: NJyVL9CZwpnyCfw+Is26yw.., index.txt
The following example probes the remote SE with the IP address 172.16.2.160 for the liveness of its assigned delivery service ID 153:
ServiceEngine#show distribution remote 172.16.2.160 unicast-sender delivery-service-id 153
probe
The following example shows the beginning database value of the current version of the multicast cloud at a remote SE with the IP address 10.43.10.101 and delivery service ID 4999:
ServiceEngine# show distribution remote 10.43.10.101 metadata-sender delivery-service-id
4999 start-generation-id 0 end-generation-id 5
Getting meta data for delivery service(4999) from genid -1 to 5
Connecting to 10.43.10.101
Remote SE replied with the following headers:
Action : Processing metadata records
Have more records to process : No
Is metadata still in full reload: No
add #1: UBsSUMwbTdJzzpqDvxSdYg.., basic_auth/public.html
add #2: NJyVL9CZwpnyCfw+Is26yw.., index.txt
Note
When start and end generation IDs are not specified in the show distribution remote command, the current maximum generation ID of -100 will be the start generation ID. The end generation ID is equal to the sum of the start generation ID and 100.
The following example shows the list of forwarders in the path toward the root SE:
ServiceEngine#show distribution remote traceroute forwarder-next-hop delivery-service-id
4999 trace-till-root
Hop NextHop_SEId NextHop_SEName NextHop_SEIp GenID Status/Reason
--- ------------ -------------- ------------ ----- -------------
1 5884 AD-SE07 192.168.1.69 1 REGULAR
2 6035 AD-SE13 2.43.10.101 1 LOC-LEAD
3 5683 AD-SE12 2.43.10.100 1 LOC-LEAD
4 6026 gnadaraj-507 2.43.27.2 1 LOC-LEAD
5 5638 devi-507 2.43.27.36 1 LOC-LEAD (Reached RootSE)
The following example shows output from the show distribution object-status command:
ServiceEngine#show distribution object-status http://www.cisco.com/index.txt
========== Website Information ==========
Origin Server FQDN : www.cisco.com
Request Routed FQDN : N/A
Content UNS Reference # : 1
========== delivery services Information ==========
*** delivery service 4999 (name = headercheck) ***
File State : Ready for distribution
Multicast for delivery service : Not Enabled
Replication Lock : Received by Unicast-Receiver/Acquirer
Transfered Size : 2208640
MD5 of MD5 : zwhJagyCmRAE4UmTwc0EtA..
Source Url : http://liqq-linux.cisco.com/index.txt
Source Last Modified Time : Sun Jul 11 03:23:33 2004
Requires Authentation : No
Play servers : HTTP HTTPS
Content uns_id : yhzR3VZ96MDz5FVHwmGD+A..
Content gen-id : 5638:1108022220:1
========== CDNFS Information ==========
Internal File Name :
/disk00-04/d/http-liqq-linux.cisco.com-azk2lrqzsytweswexham5w/32/326cf0278da48aac82d796cb1
19b1caa.0.data.txt
Actual File Size : 2208640 bytes
MD5 of MD5 (Re-calculated): zwhJagyCmRAE4UmTwc0EtA..
Metadata match with : delivery service 4999
Number of Source-urls : 1
Source-url to CDN-object mapping:
Source-url : http://liqq-linux.cisco.com/index.txt
Used by CDN object : ---- Yes ----
Internal File Name :
/disk00-04/d/http-liqq-linux.cisco.com-azk2lrqzsytweswexham5w/32/326cf0278da48aac82d796cb1
19b1caa.0.data.txt
Actual File Size : 2208640 bytes
========== CDNFS lookup output ==========
Allowed Playback via HTTP HTTPS
Last-modified Time Sun Jul 11 03:23:33 2004
cdn_uns_id yhzR3VZ96MDz5FVHwmGD+A..
last-modified Sun, 11 Jul 2004 03:23:33 GMT
Internal path to data file:
/disk00-04/d/http-liqq-linux.cisco.com-azk2lrqzsytweswexham5w/32/326cf0278da48aac82d796cb1
19b1caa.0.data.txt
The show distribution delivery-services output and the show distribution forwarder-list output display additional delivery service routing information. The newly added Status/Reason field displays whether the SE is a location leader and the reason for not having a forwarder SE.
The following example shows the delivery service distribution information:
ServiceEngine#show distribution delivery-services
Delivery Service Name ID Priority Root Forwarder Status/Reason
------------ -- -------- ---- --------- ------------- ----------
00-AD 527 500 No Rack89-SE-11 REGULAR N/A
01-AD 586 500 Yes N/A N/A N/A
00-Live 588 500 Yes N/A LIVE N/A
LOC-LEAD: This SE is the location leader for this delivery service
REGULAR: This SE is not the location leader for this delivery service
LLMT: This SE cannot find forwarder because this SE has limit on
the forwarder lookup level
FAIL: This SE cannot find forwarder because there is failed SE along
the path within specified forwarder lookup level
NGWT: This SE cannot find forwarder because there is SE with negative
forwarder-load-weight along the path within the specified
LIVE: The specified delivery service is live delivery service, forwarder not
applicable
*: MetaData forwarder and Unicast forwarder are different
The following example provides delivery service distribution information for delivery service ID 527:
ServiceEngine#show distribution delivery-services delivery-service-id 527
Delivery service Configuration
Delivery service ID : 527
Delivery service Name : 00-AD
Website Origin FQDN : www.test.com
Delivery service Priority : 500
Configured Distribution Type : Multicast only
ID of Configured Root SE : 462
Name of Configured Root SE : Rack89-SE-11
IP of Configured Root SE : 2.43.27.38
ID of Effective Root SE : 462
Current root-ce-uid : 1110247321
This SE's Role : Not a Root SE
This SE in Full Reload : No
Root SE Failover/Fallback Information
---------------------------------------
Root SE Failover/Fallback Interval : 120 Mins
Metadata-Forwarder ID : 462
Metadata-Forwarder Name : Rack89-SE-11
Metadata-Forwarder Primary IP : 2.43.27.38
Metadata-Forwarder NAT IP/Port : N/A
Address to Poll Metadata-Forwarder : Primary IP
Metadata-Forwarder Status : REGULAR
Last gen-id Switch : Never
Current low-water-marker : 1
Current max-del-gen-id : 0
Next poll : 107 Secs from now
Idle poll interval : 120 Secs
Poll interval multiplier : 1
Ucast-Forwarder Name : Rack89-SE-11
Ucast-Forwarder Primary IP : 2.43.27.38
Ucast-Forwarder NAT IP/Port : N/A
Address to Poll Ucast-Forwarder : Primary IP
Ucast-Forwarder Status : REGULAR
MetaData QoS (system config) : 16 (Effective)
Number of jobs completed : 0
LOC-LEAD: This SE is the location leader for this delivery service
REGULAR: This SE is not the location leader for this delivery service
LLMT: This SE cannot find forwarder because this SE has limit on
the forwarder lookup level
FAIL: This SE cannot find forwarder because there is failed SE along
the path within specified forwarder lookup level
NGWT: This SE cannot find forwarder because there is SE with negative
forwarder-load-weight along the path within the specified
LIVE: The specified delivery service is live delivery service, forwarder not
applicable
*: MetaData forwarder and Unicast forwarder are different
Note
The Has Unfinished Job line is only available if the SE is not a root SE. It is only available on a receiver SE.
Related Commands
show statistics distribution
show flash
To display the flash memory version and usage information, use the show flash EXEC command.
show flash
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
If a new software image has been installed and is waiting to be run after a reboot, the show flash command displays this information and the version of Internet Streamer CDS software that will run on the device after reload.
Examples
The following example displays the flash information:
CDS software version (disk-based code): CDS-2.4.0-b328
System image: 274 sectors
Bootloader, rescue image, and other reserved areas: 59 sectors
512 sectors total, 179 sectors free.
Table 2-28 describes the fields shown in the show flash display.
Table 2-28 show flash Field Descriptions
Field
|
Description
|
Internet Streamer CDS software version (disk-based code)
|
Internet Streamer CDS software version and build number that is running on the device.
|
System image on flash:
|
Version
|
Version and build number of the software that is stored in flash memory.
|
System flash directory:
|
System image
|
Number of sectors used by the system image.
|
Bootloader, rescue image, and other reserved areas
|
Number of sectors used by the bootloader, rescue image, and other reserved areas.
|
XX sectors total, XX sectors free
|
Total number of sectors. Number of free sectors.
|
show flash-media-streaming
To display the Flash Media Streaming information, use the show flash-media-streaming EXEC command.
On the SE:
show flash-media-streaming [license | logging name | mtrack | stream-status {dvrcast [all name]
| live [all name]}]
On the SR:
show flash-media-streaming
Syntax Description
license
|
Shows the Flash Media Streaming licenses.
|
logging
|
Sets the Tar Flash Media Streaming transaction logs to /local/local1/filename.tar.gz.
|
name
|
Filename.
|
mtrack
|
Displays the Flash Media Streaming memory usage.
|
stream-status
|
Displays the Flash Media Streaming stream status.
|
dvrcast
|
Displays dvrcast stream status.
|
all
|
(Optional) Dumps detail statistics into /local/local1/filename.
|
live
|
Displays the live stream status.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
When you execute the show flash-media-streaming stream-status live command and the Forwarder is a Content Origin server running Linux, the show command does not show statistics for the Content Origin server.
Examples
The following example displays the Flash media streaming information:
ServiceEngine#show flash-media-streaming
Flash Media Streaming is disabled.
Max. Allowed concurrent sessions are 200.
Flash Media Streaming Monitoring is enabled.
Admin list allow: 1.1.1.1
Total number of wholesale licenses is 0.
Non wholesale bandwidth (Perpetual) is 200000 kbps.
Configured max bandwidth is 10000 kbps.
Total wholesale bandwidth (Term Based) is 0 kbps.
Allowed bandwidth is 10000 kbps.
Related Commands
flash-media-streaming
show statistics flash-media-streaming
show ftp
To display the caching configuration of the File Transfer Protocol (FTP), use the show ftp EXEC command.
show ftp
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
This example lists the caching configuration of FTP:
FTP heuristic age-multipliers: directory-listing 30% file 60%
Maximum Time To Live in days : directory-listing 3 file 7
Minimum Time To Live in minutes: 60
No objects are revalidated on every request.
Serve-IMS without revalidation if...
Directory listing object is less than 50% of max age
File object is less than 80% of max age
Servicing Proxy mode FTP connections on ports: 22 23 88 66 48 488 449 90
Not using outgoing proxy mode.
Maximum size of a cacheable object is unlimited.
show hardware
To display the system hardware status, use the show hardware EXEC command.
show hardware
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC configuration mode.
Usage Guidelines
In Internet Streamer CDS Release 2.4, the output of the show hardware EXEC command displays the version of the TV-out hardware that the SE is equipped with. In the following excerpt of the sample output from the show hardware command, this particular information is highlighted in bold. Rev 3 in the command output indicates that the TV-out hardware uses the newer Revision 3 MPEG decoder PCI part. The Vela II Revision D and Revision E cards use the Revision 3 part.
ServiceEngine#
show hardware
1024 Mbytes of Physical memory.
2 GigabitEthernet interfaces
2 USB interfaces [Not supported in this version of software]
The following PCI cards were found:
PCI-Slot-1 MPEG-Decoder-AV [1105:8476 (Sigma Designs, Inc.) (rev 3)]
Manufactured As: Pre-FCS 565 [867383Z]
The output of the show hardware EXEC command notifies you if the SE is running a version of the CDS software that does not support the TV-out hardware contained in the SE. In the following example, you are notified that the SE has a Vela II audio-video (AV) card that is not supported by the version of the CDS software that is running on the SE. In the following excerpt of the sample output from the show hardware command, this particular information is highlighted in bold:
ServiceEngine #
show hardware
CPU 0 is GenuineIntel Intel(R) Celeron(R) CPU 1.70GHz (rev 1) running at 1699MHz
1024 Mbytes of Physical memory.
1 AV card (Vela II)
[***Revision not supported in this version of software***]
2 GigabitEthernet interfaces
2 USB interfaces [Not supported in this version of software]
The following PCI cards were found:
Examples
Table 2-29 describes the fields shown in the show hardware display.
Table 2-29 show hardware Field Descriptions
Field
|
Description
|
Compiled hour:minute:second month day year by cnbuild
|
Compile information for the software build.
|
System was restarted on day of week month day hour:minute:second year
|
Date and time that the system was last restarted.
|
The system has been up for X hours, X minutes, X seconds
|
Length of time the system has been running since the last reboot.
|
CPU 0 is
|
CPU manufacturer information.
|
Total X CPU
|
Number of CPUs on the device.
|
XXXX Mbytes of Physical memory
|
Number of megabytes of physical memory on the device.
|
X CD ROM drive
|
Number of CD-ROM drives on the device.
|
X Console interface
|
Number of console interfaces on the device.
|
Cookie info
|
SerialNumber
|
Serial number of the device.
|
SerialNumber (raw)
|
Serial number of the device as an ASCII value.
|
TestDate
|
Date that the device was tested.
|
ModelNum (text)
|
Hardware model of the device.
|
ModelNum (raw)
|
Internal model number (ASCII value) that corresponds to the ExtModel number.
|
HWVersion
|
Number of the current hardware version.
|
PartNumber
|
Not implemented.
|
BoardRevision
|
Number of revisions for the current system board.
|
ChipRev
|
Number of revisions for the current chipset.
|
VendID
|
Vendor ID of the cookie.
|
CookieVer
|
Version number of the cookie.
|
Chksum
|
Checksum of the cookie showing whether the cookie is valid.
|
List of all disk drives
|
Physical disk information
|
Lists the disks by number.
|
disk00
|
Availability of the disk: Present, Not present or Not responding, or Not used (*).
Disk identification number and type.
Disk size in megabytes and gigabytes.
|
disk01
|
Same type of information is shown for each disk.
|
Mounted filesystems
|
Device
|
Path to the partition on the disk.
|
Type
|
Type of the file system. Values include PHYS-FS, SYSFS, or cdnfs.
|
Size
|
Total size of the file system in megabytes and gigabytes.
|
Mount point
|
Mount point for the file system. For example, the mount point for SYSFS is /local/local1.
|
System use
|
Amount of disk space being used for system use.
|
Free
|
Amount of unused disk space available.
|
Related Commands
show version
show hosts
To view the hosts on your SE, use the show hosts EXEC command.
show hosts
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The show hosts command lists the name servers and their corresponding IP addresses. It also lists the hostnames, their corresponding IP addresses, and their corresponding aliases (if applicable) in a host table summary.
Table 2-30 describes the fields shown in the show hosts display.
Table 2-30 show hosts Field Descriptions
Field
|
Description
|
Domain names
|
Domain names used by the device to resolve the IP address.
|
Name Server(s)
|
IP address of the Domain Name Server (DNS) name server or servers.
|
Host Table
|
hostname
|
Fully Qualitifed Domain Name (FQDN) (that is, hostname and domain) of the current device.
|
inet address
|
IP address of the current host device.
|
aliases
|
Name configured for the current device based on the host global configuration command.
|
show http
To display HTTP caching parameters, use the show http EXEC command.
show http {age-mult | all | cache-cookie | cache-fill-range | cache-on-abort | object | proxy |
reval-each-request | ttl}
Syntax Description
age-mult
|
Displays HTTP/1.0 caching heuristic modifiers.
|
all
|
Displays all HTTP-related caching configurations.
|
cache-cookie
|
Displays the configuration for caching of web objects with associated cookies.
|
cache-fill-range
|
Displays the configuration for cache-fill, for a range request starting from 0.
|
cache-on-abort
|
Displays the cache-on-abort configuration.
|
object
|
Displays the configuration of HTTP objects.
|
proxy
|
Displays the proxy mode configuration.
|
reval-each-request
|
Displays the revalidation configuration for every request.
|
ttl
|
Displays the Time To Live for objects in the cache.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example lists the configuration and status of HTTP:
ServiceEngine#show http all
Basic authenticated objects are not cached.
HTTP heuristic age-multipliers: text 30% binary 60%
Serve-IMS without revalidation if...
Text object is less than 50% of max age
Binary object is less than 80% of max age
Objects with associated cookies are not cached
Client no-cache requests are retrieved from the origin server
Cache on abort feature is disabled
Objects will always continue to be cached on a client abort
Maximum threshold is disabled
Minimum threshold is disabled
Percent threshold is disabled
Maximum time to live in days: text 3 binary 7
Minimum time to live for all objects in minutes: 5
Objects are not revalidated on each request
Not servicing incoming proxy mode connections.
Not using outgoing proxy mode.
Monitor Interval for Outgoing Proxy Servers is 60 seconds
Timeout period for probing Outgoing Proxy Servers is 300000 microseconds
Use of Origin Server upon Proxy Failures is disabled.
Persistent connection is enabled and set to all
Persistent connection timeout is 600 seconds
WWW-Authenticate headers containing
No host configured to receive Proxy-Authorization header
No host configured to receive WWW-Authorization header
Maximum size of a cacheable object is unlimited
Requested Object URL validation is enabled
Healing client is disabled
Timeout for responses = 0 seconds
Max number of misses allowed before stop healing mode = 0
Port number for healing request/response = 14333
Http-port to forward http request to healing server = 80
The following example shows the IP address and port numbers of the HTTP incoming and outgoing proxy modes:
ServiceEngine#show http proxy
Servicing Proxy mode HTTP connections on port: 8080
Directing request to proxy server at 10.1.1.1 port 7777
Related Commands
http
show statistics http
show icap
To display Internet Content Adaptation Protocol (ICAP) configuration details, use the show icap EXEC command.
show icap [service service_name]
Syntax Description
service
|
(Optional) Displays the configurations for the specified service.
|
service_name
|
Name of the service.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use the show icap EXEC command to display the current ICAP configuration for the SE. The command output shows the status of the enabled ICAP features, the service definitions, a list of vectoring points, and an ordered list of ICAP services.
To display the definition and status of a specific ICAP service that is configured on the SE, use the show icap service service_name EXEC command.
Examples
The following example displays the ICAP configuration for the SE:
ICAP global configurations
==========================
ICAP bypass Streaming content: ENABLED
ICAP rescan cached objects on service update: ENABLED
ICAP service configurations
===========================
----------------------------------------------
Configurations for service test
----------------------------------------------
Load Balancing Scheme: Weighted-load
Error handling scheme: Send client error
Vectoring points registered:
reqmod-precachereqmod-postcacherespmod-precache
server URL: icap://10.1.1.1:1344/test-icap
----------------------------------------------
Configurations for service service
----------------------------------------------
Load Balancing Scheme: round-robin
Error handling scheme: Bypass
Vectoring points registered:
----------------------------------------------
Configurations for service servforicap
----------------------------------------------
Load Balancing Scheme: round-robin
Error handling scheme: Bypass
Vectoring points registered:
server URL: icap://1.2.3.4/servforicap
Related Commands
icap service
show interface
To display the hardware interface information, use the show interface EXEC command.
show interface {GigabitEthernet slot/port | PortChannel {1 | 2} | standby group num}
Syntax Description
GigabitEthernet
|
Selects a Gigabit Ethernet interface to configure.
|
slot/port
|
Slot and port number for the selected interface. The slot range is 0 to 2; the port range is 0 to 3. The slot number and port number are separated with a forward slash character (/).
|
PortChannel
|
Selects the EtherChannel of interfaces to configure.
|
1
|
Sets the port channel interface number to 1.
|
2
|
Sets the port channel interface number to 2.
|
standby
|
Sets the standby group for the interface.
|
group num
|
Group number for the selected interface. The group number range is 1 to 4.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-31 describes the fields shown in the show interface GigabitEthernet display.
Table 2-31 show interface GigabitEthernet Field Descriptions
Field
|
Description
|
Type
|
Type of interface. Always Ethernet.
|
Ethernet address
|
Layer 2 MAC address.
|
Maximum Transfer Unit Size
|
Current configured MTU value.
|
Metric
|
Metric setting for the interface. The default is 1. The routing metric is used by the routing protocol to determine the most favorable route. Metrics are counted as additional hops to the destination network or host; the higher the metric value, the less favorable the route.
|
Packets Received
|
Total number of packets received by this interface.
|
Input Errors
|
Number of incoming errors on this interface.
|
Input Packets Dropped
|
Number of incoming packets that were dropped on this interface.
|
Input Packets Overruns
|
Number of incoming packet overrun errors.
|
Input Packets Frames
|
Number of incoming packet frame errors.
|
Packet Sent
|
Total number of packets sent from this interface.
|
Output Errors
|
Number of outgoing packet errors.
|
Output Packets Dropped
|
Number of outgoing packets that were dropped by this interface.
|
Output Packets Overruns
|
Number of outgoing packet overrun errors.
|
Output Packets Carrier
|
Number of outgoing packet carrier errors.
|
Output Queue Length
|
Output queue length in bytes.
|
Collisions
|
Number of packet collisions at this interface.
|
Flags
|
Interface status indicators. Values include Up, Broadcast, Running, and Multicast.
|
Mode
|
Setting, transmission mode, and transmission for this interface.
|
Table 2-32 describes the fields shown in the show interface PortChannel display.
Table 2-32 show interface PortChannel Field Descriptions
Field
|
Description
|
Description
|
Description of the device, as configured by using the description option of the interface global configuration command.
|
Type
|
Type of interface. Always Ethernet.
|
Ethernet address
|
Layer 2 MAc address.
|
Internet Address
|
Internet IP address configured for this interface.
|
Broadcast Address
|
Broadcast address configured for this interface.
|
Netmask
|
Netmask configured for this interface.
|
Maximum Transfer Unit Size
|
Current configured MTU value.
|
Metric
|
Metric setting for the interface. The default is 1. The routing metric is used by the routing protocol. Higher metrics have the effect of making a route less favorable; metrics are counted as addition hops to the destination network or host.
|
Packets Received
|
Total number of packets received by this interface.
|
Input Errors
|
Number of incoming errors on this interface.
|
Input Packets Dropped
|
Number of incoming packets that were dropped on this interface.
|
Input Packets Overruns
|
Number of incoming packet overrun errors.
|
Input Packets Frames
|
Number of incoming packet frame errors.
|
Packet Sent
|
Total number of packets sent from this interface.
|
Output Errors
|
Number of outgoing packet errors.
|
Output Packets Dropped
|
Number of outgoing packets that were dropped by this interface.
|
Output Packets Overruns
|
Number of outgoing packet overrun errors.
|
Output Packets Carrier
|
Number of outgoing packet carrier errors.
|
Output Queue Length
|
Output queue length in bytes.
|
Collisions
|
Number of packet collisions at this interface.
|
Flags
|
Interface status indicators. Values include Up, Broadcast, Running, and Multicast.
|
Table 2-33 describes the fields shown in the show interface standby display.
Table 2-33 show interface standby Field Descriptions
Field
|
Description
|
Standby Group
|
Number that identifies the standby group.
|
Description
|
Description of the device, as configured by using the description option of the interface global configuration command.
|
IP address, netmask
|
IP address and netmask of the standby group.
|
Member interfaces
|
Member interfaces of the standby group. Shows which physical interfaces are part of the standby group. Shows the interface definition, such as GigabitEthernet 1/0.
|
Active interface
|
Interfaces that are currently active in the standby group.
|
Related Commands
interface
show running-config
show startup-config
show inventory
To display the system inventory information, use the show inventory EXEC command.
show inventory
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The show inventory command allows you to view the unique device identifier information (UDI) for an SE. Typically, Cisco SEs contain the following three identification items, which make up the UDI:
•
Product ID (PID)
•
Version ID (VID)
•
Serial number (SN)
This identity information is stored in the SE nonvolatile memory. Each SE has a unique device identifier (UDI). The UDI shows PID, VID and SN.
The UDI is electronically accessed by the product operating system or network management application to enable identification of unique hardware devices. The data integrity of the UDI is vital to customers. The UDI that is programmed into the SE's nonvolatile memory is equivalent to the UDI that is printed on the product label and on the carton label. This UDI is also equivalent to the UDI that can be viewed through any electronic means and in all customer-facing systems and tools. Currently, there is only CLI access to the UDI; there is no SNMP access to the UDI information.
On newer SE models, you can use the show inventory EXEC command to display the SE's UDI. On older SE models, use the show tech-support EXEC command to display the SE's UDI.
Examples
The following example shows the inventory information for one of the newer SE models (SE-565):
ServiceEngine#show inventory
PID: SE-565-K9 VID: 0 SN: serial_number
In the preceding example, serial number is the serial number of the SE. The version ID is displayed as "0" because the version number is not available.
Table 2-34 describes the fields shown in the show inventory display.
Table 2-34 show inventory Field Descriptions
Field
|
Description
|
PID
|
Product identification (ID) number of the device.
|
VID
|
Version ID number of the device. Displays as 0 if the version number is not available.
|
SN
|
Serial number of the device.
|
The following example shows that you must use the show tech-support EXEC command to display the inventory information on an older SE model:
ServiceEngine# show inventory
Please look at 'sh tech-support' for information!
ServiceEngine# show tech-support
Related Commands
show tech-support
show ip access-list
To display the access lists that are defined and applied to specific interfaces or applications, use the show ip access-list EXEC command.
show ip access-list [acl-name | acl-num]
Syntax Description
acl-name
|
(Optional) Information for a specific access list, using an alphanumeric identifier up to 30 characters, beginning with a letter.
|
acl-num
|
(Optional) Information for a specific access list, using a numeric identifier (0 to 99 for standard access lists and 100 to199 for extended access lists).
|
Defaults
Displays information about all defined access lists.
Command Modes
EXEC configuration mode.
Usage Guidelines
Use the show ip access-list EXEC command to display the access lists that have been defined on the current system. Unless you identify a specific access list by name or number, the system displays information about all the defined access lists, including the following sections:
•
Available space for new lists and conditions
•
Defined access lists
•
References by interface and application
Examples
The following example shows sample output from the show ip access-list command:
ServiceEngine#show ip access-list
492 access list conditions
Standard IP access list 1
1 permit 10.1.1.2
(implicit deny any: 2 matches)
Extended IP access list 100
1 permit tcp host 10.1.1.1 any
2 permit tcp host 10.1.1.2 any
3 permit tcp host 10.1.1.3 any
(implicit fragment permit: 0 matches)
(implicit deny ip any any: 0 matches)
Standard IP access list test
1 permit 1.1.1.1 (10 matches)
(implicit deny: 2 matches)
Interface access list references:
GigabitEthernet 0/0 inbound 100
Application access list references:
The following example shows sample output from the show ip access-list command for the access list named test:
ServiceEngine#show ip access-list test
Standard IP access list test
1 permit 1.1.1.1 (10 matches)
(implicit deny: 2 matches)
Note
The system displays the number of packets that have matched a condition statement only if the number is greater than zero.
Related Commands
clear
ip access-list
show ip routes
To display the IP routing table, use the show ip routes EXEC command.
show ip routes
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC configuration mode.
Examples
The show ip routes command displays the IP routing table.
Table 2-35 describes the fields shown in the show ip routes display.
Table 2-35 show ip routes Field Descriptions
Field
|
Description
|
Destination
|
Destination address IP route mask.
|
Gateway
|
IP address or IP alias of the gateway router.
|
Netmask
|
Subnet mask of the gateway router.
|
.
Related Commands
ip
show ldap
To display the Lightweight Directory Access Protocol (LDAP) parameters, use the show ldap EXEC command.
show ldap
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-36 describes the fields shown in the show ldap display.
Table 2-36 show ldap Field Descriptions
Field
|
Description
|
LDAP Authentication
|
State of LDAP authentication (enabled or disabled).
|
Allow mode
|
Access to users when the LDAP server is unavailable.
|
Base DN
|
Base distinguished name.
|
Filter
|
LDAP filter for authentication group.
|
Retransmits
|
Number of retransmissions.
|
Timeout
|
Wait time in seconds for an LDAP server to reply.
|
UID Attribute
|
User ID attribute on the LDAP server.
|
Group Attribute
|
Authentication group attribute:
• distinguished name (dn),
• unique name (un),
• organizational unit (ou) for native LDAP groups, and
• member of (memberOf) Active Directory group.
|
organizationUnit
|
Group name obtained from the ou attribute of the user account.
|
Custom Attribute
|
Group name obtained from the custom attribute of the user account.
|
Active Directory
|
Group name obtained from the memberOf attribute of the user account.
Note An Active Directory database is a user database that resides on a Windows 2000 server that is running the Microsoft Active Directory program.
|
Static Groups
|
Status of whether the static group query for user membership has been enabled. A static group defines each member individually using the object class attribute of groupOfNames or groupOfUniqueNames.
|
Group Attribute
|
Group attribute that the LDAP server uses to search the direct or nested static group configurations.
|
Group Member
|
Group member attribute that the LDAP server uses to search the direct or nested static group configurations.
|
Nested Groups
|
Any static groups that are nested under the parent group, which the LDAP server searches for user account information.
|
Nested Level
|
Number of levels down the LDAP directory from the starting point of the search that the LDAP server searches.
|
Administrative DN
|
Administrator distinguished name for the LDAP database search. There is no default value for this field and none is specified if it is not configured.
|
Administrative Password
|
Password of administrator for the LDAP database search. There is no default value for this field and none is specified if it is not configured.
|
LDAP version
|
LDAP software release version.
|
LDAP port
|
TCP port for the LDAP authentication server.
|
Policy redirect feature
|
Status of whether the support for acceptable use policy redirection has been configured.
|
Policy redirect append request URL
|
Status of whether the SE is enabled to append the request URL (original destination URL) to the LDAP (Acceptable Use Policy) AUP redirect URL.
|
Policy redirection URL
|
URL to redirect to if the user still has accepted the usage policy.
|
Policy redirection LDAP attribute name
|
Name of the LDAP attribute that is to be queried for the version that the user has accepted.
|
Policy redirection LDAP attribute value
|
Value of the LDAP attribute that is to be queried for the version that the user has accepted.
|
Password Expiry feature
|
Status of whether support for expiry of authorization passwords has been configured.
|
Password Expiry redirection URL
|
URL to redirect to if the user password has expired.
|
Server
|
LDAP server IP address.
|
Status
|
Status of whether the server is the primary or secondary host.
|
Primary
|
Primary host.
|
Secondary
|
Secondary host.
|
show logging
To display the system message log configuration, use the show logging EXEC command.
show logging
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The following is an example of a syslog message for proxy-mode native FTP support:
SE-FTP_PROXY-3-252009: Failed to configure FTP Proxy-mode listener on port
Explanation: Could not start proxy-mode listener for FTP control
connection for the specified port. The port is temporarily
in an un-bindable state, or is in use by some other
Action: Check whether the port has been configured for use by a
different application. If not, retry the
incoming proxy command after 2 minutes. If this error
repeats frequently, contact Cisco TAC.
To view information about events that have occurred in all devices in your CDS network, you can use the system message log in the CDSM GUI. The CDSM logs only severity level critical or higher messages from registered nodes. Also, the CDSM logs certain other status messages that are considered important to the Centralized Management System (CMS). The messages displayed in the system message log for device, SE, are not related to the messages logged in the system log file on the sysfs partition on the CDSM as /local1/syslog.txt.
The syslog.txt file on the CDSM contains information about events that have occurred on the CDSM and not on the registered nodes. The messages that are written to the syslog.txt file depend on specific parameters of the system log file that you have set by using the logging global configuration command. For example, a critical error message logged on a registered node does not appear in the syslog.txt file on the CDSM because the problem never occurred on the CDSM but only on the registered node. However, this error message is displayed in the system message log for device, SE
Examples
The following example displays the syslog host configuration on an SE:
ServiceEngine#show logging
Syslog to host is disabled
Priority for host logging is set to: warning
Syslog to console is disabled
Priority for console logging is set to: warning
Syslog to disk is enabled
Priority for disk logging is set to: notice
Filename for disk logging is set to: /local1/syslog.txt
Syslog facility is set to *
Syslog disk file recycle size is set to 500000
Related Commands
clear
logging
show movie-streamer
To display the Movie Streamer configuration, use the show movie-streamer EXEC command.
show movie-streamer [bandwidth | cache | proxy]
Syntax Description
bandwidth
|
(Optional) Displays Movie Streamer bandwidth configuration.
|
cache
|
(Optional) Displays Movie Streamer cache configuration.
|
proxy
|
(Optional) Displays Movie Streamer proxy configuration.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example shows the Movie Streamer configuration:
ServiceEngine#show movie-streamer
Movie Streamer version cde200-5.0.3
Movie Streamer is not enabled
------ Movie Streamer General Configurations ------
Movie Streamer max sessions configured: 8000
Movie Streamer transport source ip address is not configured
Movie Streamer accelerate for VOD is enabled
Movie Streamer client idle timeout is 300 seconds
Movie Streamer origin-server idle interval is 10 seconds
Movie Streamer client rtp timeout is 180 seconds
Movie Streamer outgoing bitrate per streamer has no limit
Movie Streamer incoming bitrate per streamer has no limit
------ Movie Streamer Bandwidth Configurations ----
Movie Streamer Outgoing bandwidth enforced is 2000000 kbps
Movie Streamer Incoming bandwidth enforced is 2000000 kbps
------ Movie Streamer Cache Configurations --------
Movie Streamer cache is enabled
Movie Streamer cache age-multiplier: 30%
Movie Streamer cache max-ttl: 1 (days)
Movie Streamer cache revalidate for each request is enabled
------ Movie Streamer Proxy Configurations --------
Movie Streamer proxy has not been configured.
------ Movie Streamer Broadcast List --------------
Related Commands
movie-streamer
show statistics movie-streamer
show ntp
To display the Network Time Protocol (NTP) parameters, use the show ntp EXEC command.
show ntp status
Syntax Description
status
|
Displays the NTP status.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-37 describes the fields shown in the show ntp status display.
Table 2-37 show ntp status Field Descriptions
Field
|
Description
|
NTP
|
Status of whether NTP is enabled or disabled.
|
server list
|
NTP server IP and subnet addresses.
|
remote
|
Name (first 15 characters) of remote NTP server.
|
*
|
In the remote column, identifies the system peer to which the clock is synchronized.
|
+
|
In the remote column, identifies a valid or eligible peer for NTP synchronization.
|
space
|
In the remote column, indicates that the peer was rejected. (The peer could not be reached or excessive delay occurred in reaching the NTP server.)
|
x
|
In the remote column, indicates a false tick and is ignored by the NTP server.
|
-
|
In the remote column, indicates a reading outside the clock tolerance limits and is ignored by the NTP server.
|
refid
|
Clock reference ID to which the remote NTP server is synchronized.
|
st
|
Clock server stratum or layer.
|
t
|
Type of peer (local, unicast, multicast, or broadcast).
|
when
|
Status of when the last packet was received from the server in seconds.
|
poll
|
Time check or correlation polling interval in seconds.
|
reach
|
8-bit reachability register. If the server was reachable during the last polling interval, a 1 is recorded; otherwise, a 0 is recorded. Octal values 377 and above indicate that every polling attempt reached the server.
|
delay
|
Estimated delay (in milliseconds) between the requester and the server.
|
offset
|
Clock offset relative to the server.
|
jitter
|
Clock jitter.
|
Related Commands
clock
ntp
show processes
To display CPU or memory processes, use the show processes EXEC command.
show processes [cpu | debug pid | memory | system [delay 1-60 | count 1-100]]
Syntax Description
cpu
|
(Optional) Displays the CPU utilization.
|
debug
|
(Optional) Displays the system call and signal traces for a specified process identifier (PID) to display system progress.
|
pid
|
Process identifier.
|
memory
|
(Optional) Displays memory allocation processes.
|
system
|
(Optional) Displays system load information in terms of updates.
|
delay
|
(Optional) Specifies the delay between updates, in seconds (1-60).
|
1-60
|
Displays delays between updates, in seconds.
|
count
|
(Optional) Specifies the number of updates that are displayed (1-100).
|
1-100
|
Displays the number of updates displayed.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use the commands shown in this section to track and analyze system CPU utilization.
The show processes debug command displays the extensive internal system call information and a detailed account of each system call (and arguments) made by each process and the signals that it has received.
Use the show processes system command to display system updates. The delay option specifies the delay between updates, in seconds. The count option specifies the number of updates that are displayed. This command displays these items:
•
A list of all processes in wide format.
•
Two tables listing the processes that utilize CPU resources. The first table displays the list of processes in descending order of utilization of CPU resources based on a snapshot taken after the processes system (ps) output is displayed. The second table displays the same processes based on a snapshot taken 5 seconds after the first snapshot.
•
Virtual memory used by the corresponding processes in a series of five snapshots, each separated by 1 second.
Note
CPU utilization and system performance may be affected when you use the show process command. We recommend that you avoid using the show process command with keywords system and especially debug, unless it is absolutely necessary.
Examples
Table 2-38 describes the fields shown in the show processes displays.
Table 2-38 show processes Field Descriptions
Field
|
Description
|
CPU Usage
|
CPU utilization as a percentage for user, system overhead, and idle.
|
PID
|
Process identifier.
|
STATE
|
Current state of corresponding processes.
R = Running S = Sleeping in an interruptible wait D = Sleeping in an uninterruptible wait or swapping Z = Zombie T = Traced or stopped on a signal
|
PRI
|
Priority of processes.
|
User T
|
User time utilization in seconds.
|
Sys T
|
System time utilization in seconds.
|
COMMAND
|
Process command.
|
Total
|
Total available memory in bytes.
|
Used
|
Memory currently used in bytes.
|
Free
|
Free memory available in bytes.
|
Shared
|
Shared memory currently used in bytes.
|
Buffers
|
Buffer memory currently used in bytes.
|
Cached
|
Cache memory currently used in bytes.
|
TTY
|
TTY to which the process is attached. For example, TTY may indicate which processes belong to network Telnet sessions.
|
%MEM
|
Percentage of memory used by corresponding processes.
|
VM Size
|
Virtual memory size (in bytes) allocated to the corresponding process.
|
RSS (pages)
|
Resident set size, which indicates the number of pages that the process has in real memory minus three (-3) for administrative purposes. These pages count toward text, data, and stack space but do not count demand-loaded or swapped-out pages.
|
Name
|
Filename of the executable in parentheses.
|
show programs
To display a list of programs on the SE, use the show programs EXEC command.
show programs [ movie-streamer [cli | live | rebroadcast] | program-id id | program-name
name]
Syntax Description
movie-streamer
|
(Optional) Displays the list of programs served by the Movie Streamer.
|
cli
|
(Optional) Displays the list of CLI programs served by the Movie Streamer.
|
live
|
(Optional) Displays the list of live programs served by the Movie Streamer.
|
rebroadcast
|
(Optional) Displays the list of rebroadcast programs served by the Movie Streamer.
|
program-id
|
(Optional) Displays detailed program information for the specified program ID.
|
id
|
Unique number identifying the program.
|
program-name
|
(Optional) Displays detailed program information for the specified program name.
|
name
|
Name of the program.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Typically, users create programs using the CDSM by defining programs in the manifest file or by using the Program API. The show programs command output displays the program type, the channel with which the program is associated, the current status of the program, and the next time that the program will start and end.
A program in the Internet Streamer CDS software is defined as a scheduled event in which the content is presented to the end user. Attributes of the program include the start and end time of the program, whether the content is pre-positioned or live, the set of SEs assigned to the program, and the streaming server to be used for content delivery.
Program types determine the hardware or software component involved in delivering content to the user. Different program types that are shown in the output of the show programs command are as follows:
•
Movie streamer live
•
Movie streamer rebroadcast
The CDSM GUI allows you to create a program, schedule it, and deliver it over your multicast-enabled CDS network. Programs can consist of prerecorded video or live events. In the case of live events, the Internet Streamer CDS software interoperates with third-party encoders and IP/TV Broadcast Servers to transmit the live stream across the CDS network.
When creating a program in the CDSM GUI, the administrator specifies the following information:
•
Streaming server—How the program will be streamed or delivered to the end user.
–
Movie streamer—The event is played from a PC using the Apple QuickTime application or using the IP/TV Viewer application.
–
Exported—The program is exported over HTTP to a set-top box.
•
Media source
–
Live stream transmitted from a third-party encoder or an IP/TV Broadcast Server
–
Pre-positioned content stored on SEs
•
Destination
–
A set of SEs or device groups
–
A channel (live or export)
•
Delivery method
–
Unicast or multicast live events
–
Multicast scheduled rebroadcasts
–
TV-out or export playlists
•
Schedule
–
Start time and duration
–
Looping forever (enabled or disabled)
–
Multiple playback times
–
Repeating playback times
•
Publishing URL—The URL used to view the program
Live Events
Live events are streamed from third-party encoders (such as the Windows Media encoder Version 9 and the QuickTime encoder) or from streaming servers (such as Windows Media Server). The live stream is acquired by the root SE and transmitted to edge SEs using unicast. From the edge SEs, the live stream is transmitted to end users using either multicast or multicast and unicast live splitting. The live program is available to viewers only during its scheduled times.
Before setting up a live event in the CDSM GUI, the administrator must complete the following tasks:
1.
Set up the live event on the encoder or streaming server. This task is done externally to the CDSM GUI.
2.
In the CDSM GUI, accept the streaming server's license agreement on the SEs designated to acquire and distribute the stream.
3.
Create a live channel (or designate an existing channel as a live channel), assign SEs to the live channel, and designate a root SE to acquire the stream.
After you have completed the preceding tasks, you are ready to define the program and configure the program settings in the CDSM GUI. The CDSM allows you to define two types of live events based on the streaming server being used:
•
WMT live
•
Cisco Streaming Engine live
Configuration Requirements for Managed Live Events
If you have channels for live programs configured in your Internet Streamer CDS Release 2.4 network, make sure that there are no external proxy servers physically located between your Internet Streamer SEs and your root SE that require proxy authentication. Also, make sure that proxy authentication is not enabled on any receiver SEs that might be in the logical, hierarchical path between the root SE and the receiver SE that is going to serve the live stream to the requesting clients. If a live stream encounters any device that requires proxy authentication, the stream will be dropped before it reaches its destination.
If your network is set up with intermediary devices that require proxy authentication, you can work around the problem by configuring rules to bypass authentication on these devices.
For example, to enable the formation of the unicast splitting tree and, in turn, enable live broadcasting from all receiver SEs, you can specify the following rule on all of the parent SEs in the channel:
ServiceEngine(config)# rule pattern-list 1 downstream-SE-ipaddress
ServiceEngine(config)# rule no-auth pattern-list 1
Live Stream Interruptions
During a WMT live broadcast, any interruption of the live stream that lasts 5 minutes or longer causes the multicast broadcast to stop for the duration of the currently scheduled period. If the live stream is interrupted for less than five minutes, the broadcast resumes.
Live stream interruptions can be caused by unexpected encoder failures or by an operational restart. If you have early trials scheduled prior to the live event, we recommend that you configure multiple schedules, one for each trial. We also recommend that you start the encoder prior to the scheduled time.
If the live stream stops for more than 5 minutes and resumes later while the program is still scheduled, you can modify the schedule or any other attribute of the program (such as the description) to trigger a restart of the multicast broadcast. Restarting might take up to 5 minutes under these circumstances. This setting does not apply to Movie Streamer live programs.
Scheduled Rebroadcasts
In a scheduled rebroadcast, the pre-positioned content is scheduled to be streamed from edge SEs using multicast. To define a program for a rebroadcast event, the administrator must complete the following tasks:
1.
Create a content acquisition channel and pre-position the content.
2.
Assign media files to the program.
3.
Specify the multicast address and port or define a program address pool.
4.
Specify the days and times for the rebroadcast.
Note
For rebroadcast programs, the media can only be selected from one channel. The SEs and device groups assigned to the channel are selected automatically when you choose the media files for the program.
The CDSM allows you to define a program as a Movie Streamer rebroadcast.
Fast Encoder Failover
In Internet Streamer CDS, release 2.4, the show programs command was enhanced to support encoder failover. Issues with the previous release were as follows:
•
In the forwarder list item, only the primary origin server's IP address showed. If the device failed over to the backup origin server, the forwarder list presented the primary origin server's IP address and did not reflect the real origin server that was connected by the root SE.
•
In the source item, it presented every track's server IP address and port in the source, and there were no other explanations and tips. If the source included two tracks in the same server, the output was confusing.
•
In the non-root SE, users could not obtain the information about the serving origin server.
With this release, the output of the command looks like the following:
ServiceEngine#show programs program-name live2
Current Time : May 18 2009 @ 10:10:33 IST (1242621633)
Delivery Service ID : 1340
Delivery Service Name : live2
Type : WMT Managed Scheduled Live
Forwarder List : 3.1.2.11 <- 172.22.28.104
Start Time (loc) : May 18 2009 @ 10:11:00 IST (1242621660)
End Time (loc) : May 18 2009 @ 10:12:00 IST (1242621720)
Server : http://172.22.28.104:1881
Unicast Access URL: rtsp://kinswmt.spcdn.net/live2
Multicast URL : http://kinswmt.spcdn.net/live2.nsc.asx
Multicast Address : 224.2.2.58:94
Start Time (loc) : May 18 2009 @ 10:11:00 IST (1242621660)
Start Time : May 18 2009 @ 04:41:00 GMT (1242601860)
End Time (loc) : May 18 2009 @ 10:12:00 IST (1242621720)
End Time : May 18 2009 @ 04:42:00 GMT (1242601920)
Current Status : Scheduled
Local time: Mon May 18 10:10:47 IST 2009
RT-612-2#sh programs program-name live2
Current Time : May 18 2009 @ 10:11:05 IST (1242621665)
Delivery Service ID : 1340
Delivery Service Name : live2
Type : WMT Managed Scheduled Live
Forwarder List : 3.1.2.11 <- 172.22.28.104
Start Time (loc) : May 18 2009 @ 10:11:00 IST (1242621660)
End Time (loc) : May 18 2009 @ 10:12:00 IST (1242621720)
Server : http://172.22.28.104:1881
Unicast Access URL: rtsp://kinswmt.spcdn.net/live2
Multicast URL : http://kinswmt.spcdn.net/live2.nsc.asx
Multicast Address : 224.2.2.58:94
Start Time (loc) : May 18 2009 @ 10:11:00 IST (1242621660)
Start Time : May 18 2009 @ 04:41:00 GMT (1242601860)
End Time (loc) : May 18 2009 @ 10:12:00 IST (1242621720)
End Time : May 18 2009 @ 04:42:00 GMT (1242601920)
Local time: Mon May 18 10:11:10 IST 2009
RT-612-2#sh programs program-name live2
Current Time : May 18 2009 @ 10:12:10 IST (1242621730)
Delivery Service ID : 1340
Delivery Service Name : live2
Type : WMT Managed Scheduled Live
Forwarder List : 3.1.2.11 <- 172.22.28.104
Start Time (loc) : May 18 2009 @ 10:11:00 IST (1242621660)
End Time (loc) : May 18 2009 @ 10:12:00 IST (1242621720)
Server : http://172.22.28.104:1881
Unicast Access URL: rtsp://kinswmt.spcdn.net/live2
Multicast URL : http://kinswmt.spcdn.net/live2.nsc.asx
Multicast Address : 224.2.2.58:94
Start Time (loc) : End of Program Reached
Start Time : End of Program Reached
End Time (loc) : End of Program Reached
End Time : End of Program Reached
Local time: Mon May 18 10:12:14 IST 2009
Now the show programs command output contains the forwarder list with the backup source, and the root SE and non-root SE output is consistent. Also, if the user executes the show statistics wmt streamstat command from the root SE, the output shows which server is currently serving.
The source URL displays in the source section and the CLI and CDSM are consistent. Because the non-content acquirer cannot get the information on which source is serving, the output contains tips, such as "Please check which source is serving in content acquirer."
The CDSM parses the backup SDP file and puts the results into the database. The item video_file_back_up saves the backup source server's IP address and port in the play_media table.
Examples
Table 2-39 describes the fields shown in the show programs program-name and program-id display.
Table 2-39 show programs Field Descriptions
Field
|
Description
|
Current Time
|
Date and time of the output.
|
Program ID
|
Unique number identifying the program.
|
Program Name
|
Name of the program.
|
Delivery Service ID
|
Unique number identifying the delivery service.
|
Delivery Service Name
|
Unique name identifying the delivery service.
|
Type
|
Program type. Program types are as follows:
• Movie streamer live
• Movie streamer rebroadcast
• Windows Media live
• Windows Media rebroadcast
|
Forwarder List
|
List with primary and backup origin server's IP address.
|
Schedules
|
Schedule list. Information is as follows:
• Start Time (loc)
• End Time (loc)
• Duration
• Repeat
• Repeatdays
• Time spec
|
Source (for Content Acquirer)
|
Primary and backup source URLs.
|
Source (for Non-content Acquirer)
|
Primary and backup source URLs and tips.
|
Destination
|
Unicast URLs.
|
show qos
To display Quality of Service (QoS) information, use the show qos EXEC command.
show qos
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
This example shows the output that might be displayed if you do not enter any keywords:
Camiant policy service config file is not configured
Camiant policy service is running
Related Commands
qos
show statistics qos
show radius-server
To display RADIUS information, use the show radius-server EXEC command.
show radius-server
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-40 describes the fields shown in the show radius-server display.
Table 2-40 show radius-server Field Descriptions
Field
|
Description
|
Login Authentication for Console/Telnet Session
|
Status of whether RADIUS server is enabled for login authentication.
|
Configuration Authentication for Console/Telnet Session
|
Status of whether RADIUS server is enabled for authorization or configuration authentication.
|
Authentication scheme fail-over reason
|
Status of whether SEs fail over to the secondary method of administrative login authentication whenever the primary administrative login authentication method fails.
|
RADIUS Configuration
|
RADIUS authentication settings.
|
RADIUS Authentication
|
Status of whether RADIUS authentication is enabled on the SE.
|
Key
|
Key used to encrypt and authenticate all communication between the RADIUS client (the SE) and the RADIUS server.
|
Timeout
|
Number of seconds that the SE waits for a response from the specified RADIUS authentication server before declaring a timeout.
|
Retransmit
|
Number of times that the SE is to retransmit its connection to the RADIUS if the RADIUS timeout interval is exceeded.
|
Radius Redirect
|
Status of whether the RADIUS server redirects the response if an authentication request fails.
|
Reply-Message
|
Message sent to the user if redirection occurs.
|
URL(s) to authentication failure instructions expired
|
HTML page location or URL where the redirect message should be sent.
|
Servers
|
RADIUS servers that the SE is to use for RADIUS authentication.
|
IP
|
Hostname or IP address of the RADIUS server.
|
Port
|
Port number on which the RADIUS server is listening.
|
Related Commands
radius-server
show rea
To display the remote execution agent (REA) information use the show rea EXEC command.
show rea info
Syntax Description
info
|
(Optional)Displays the agent information.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example displays the REA information:
ServiceEngine#show rea info
Related Commands
rea
show rcp
To display Remote Copy Program (RCP) information, use the show rcp EXEC command.
show rcp
Syntax Description
This command has no keywords or arguments.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
This example shows how to display RCP information:
rcp service configurations:
Related Commands
rcp
show rtsp
To display the Real-Time Streaming Protocol (RTSP) configurations, use the show rtsp EXEC command.
show rtsp [gateway]
Syntax Description
gateway
|
(Optional) Displays the RTSP gateway configuration.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example display the output of the show rtsp gateway EXEC command.
ServiceEngine#show rtsp gateway
RTSP Gateway ip-address 10.107.193.30
RTSP Gateway incoming port 67
RTSP Gateway L4-switch not enabled
RTSP Gateway Transparent Interception:
Related Commands
rtsp
show rule
To display rules configuration information, use the show rule EXEC command.
show rule action all [protocol {http | rtmp | rtsp}]
show rule action allow [protocol {http | rtmp | rtsp}]
show rule action block [protocol {http | rtmp | rtsp}]
show rule action generate-url-signature [protocol {http | rtmp | rtsp}]
show rule action no-cache [protocol {http | rtmp | rtsp}]
show rule action [protocol {http | rtmp | rtsp}]
show rule action redirect [protocol {http | rtmp | rtsp}]
show rule action refresh [protocol {http | rtmp | rtsp}]
show rule action rewrite [protocol {http | rtmp | rtsp}]
show rule action use-icap-service [protocol {http | rtmp | rtsp}]
show rule action validate-url-signature [protocol {http | rtmp | rtsp}]
show rule all
show rule pattern-list {1-512 pattern-type | all}
Syntax Description
all
|
Displays rules with all action types.
|
http
|
Displays HTTP-related requests for this action.
|
rtmp
|
Displays RTMP-related requests for this action.
|
rtsp
|
Displays RTSP-related requests for this action.
|
protocol
|
(Optional) Specifies the protocol to which actions apply.
|
allow
|
Allows the request.
|
block
|
Blocks the request.
|
generate-url-signature
|
Generates a signed URL.
|
no-cache
|
Does not cache the object.
|
redirect
|
Redirects the request to the rewritten URL.
|
refresh
|
Revalidates the object with the web server.
|
rewrite
|
Rewrites the URL and fetch.
|
use-icap-service
|
Sets ICAP service.
|
validate-url-signature
|
Validates a signed URL.
|
all
|
Displays all the configured actions and pattern lists.
|
pattern-list
|
Displays the rules with the specified patterns.
|
1-512
|
Specifies the pattern number (1-512).
|
pattern-type
|
Pattern type (see Table 2-41).
|
all
|
Displays rules with all pattern lists.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
You can use the show rule pattern-list pattern-type command to display rules using a specific pattern type. For a more complete explanation of specific rules, see the "rule" section.Table 2-41 shows the permitted pattern types and describes each pattern type.
Table 2-41 Pattern Types
Pattern Type
|
Description
|
all
|
Displays configured patterns for all pattern types.
|
domain
|
Regular expression to match the domain name.
|
dst-ip
|
Destination IP address of the request.
|
header-field
|
Request header field pattern.
|
src-ip
|
Source IP address of the request.
|
url-regex
|
Regular expression to be matched against the URL.
|
url-regsub
|
Regular expression to match URL and replacement pattern.
|
Examples
The following example displays all rules with the configured action types and pattern lists:
ServiceEngine#show rule all
Rules Template Configuration
----------------------------
rule block domain bar.com
rule block domain \.foo.com
rule rewrite url-regsub http://www.ietf.org/rfc/.* http://wwwin-eng.cisco.com/RFC/$1
rule no-cache dst-ip 172.31.120.0 255.255.192.0
rule no-cache url-regex \.*cgi-bin*
Related Commands
clear
rule
show running-config
To display the current running configuration information on the terminal, use the show running-config EXEC command.
show running-config
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command with the show startup-config command to compare the information in running memory to the startup configuration used during bootup.
Note
This command replaces the write terminal command.
Examples
The following example displays the current running configuration information:
ServiceEngine#show running-config
V2-CDE200-3#show running-config
device mode service-engine
primary-interface PortChannel 1
ip address 3.1.14.72 255.255.255.0
ip address 4.0.8.13 255.255.255.0
interface GigabitEthernet 1/0
interface GigabitEthernet 2/0
interface GigabitEthernet 3/0
interface GigabitEthernet 4/0
interface GigabitEthernet 5/0
interface GigabitEthernet 6/0
ip default-gateway 3.1.14.1
rule action block pattern-list 3
rule action redirect http://www.baidu.com pattern-list 2
rule pattern-list 1 url-regex http://chunliu.com/b.wmv
rule pattern-list 2 header-field request-line b.wmv
rule pattern-list 3 header-field request-line c.wmv
server icap://trythis/servername
transaction-logs archive interval 120
username admin password 1 bVmDmMMmZAPjY
username admin privilege 15
authentication login local enable primary
authentication configuration local enable primary
access-lists 300 deny groupname Disney
access-lists 300 permit groupname any
service-router service-monitor threshold wmt 50
service-router service-monitor number-of-samples wmt 5
service-router service-monitor sample-period wmt 15
qos device-policy-service enable
cache content max-cached-entries 1000
! End of CDS configuration
Related Commands
configure
copy
show service-router
To display the service router configuration, use the show service-router EXEC command.
On the SE or on the CDSM:
show service-router {keepalive-interval | service-monitor}
On the SR:
show service-router {access-policy | content-based-routing | dns-ttl | forwarding
[content-origin content-origin] | lastresort [domain name] | load {all | sename sename} |
location-based-routing | proximity-based-routing | routes [content-origin content-origin] |
service-monitor | services {all | sename sename} | summary [content-origin content-origin]}
Syntax Description
access-policy
|
Configures the service-router access-policy.
|
content-based-routing
|
Displays the content-based routing configuration.
|
dns-ttl
|
Displays the time to live (TTL) of domain name server (DNS) record.
|
forwarding
|
Displays the content origin forwarding tables.
|
content-origin
|
(Optional) Displays information for one content origin.
|
content-origin
|
Content origin fully qualified domain name (FQDN).
|
lastresort
|
Displays the domain and alternate domain configured.
|
domain
|
(Optional) Displays information for one domain.
|
name
|
Domain name.
|
load
|
Displays the load and threshold reached status.
|
all
|
Displays for all SEs.
|
sename
|
Displays for one SE.
|
sename
|
SE name.
|
location-based- routing
|
Displays the location-based routing configurations.
|
proximity-based- routing
|
Displays the proximity-based routing configurations.
|
routes
|
Displays the content origin routing tables.
|
service-monitor
|
Displays the service monitor configuration.
|
services
|
Displays the services status.
|
summary
|
Displays the content origin routing table summary statistics.
|
keepalive-interval
|
Displays the keepalive interval.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
This command allows users to check the service router-releated configuration. Through this command, users can view the configured features of an SR, such as location-based routing and content-based routing.
Examples
The following example displays the service router information on the SE:
ServiceEngine#show service-router service-monitor
Monitor types configured:
-------------------------
CPU,MEM,KMEM,WMT,FMS,WEB,MS,DISK,NIC
Threshold values configured:
---------------------------
Sample periods configured:
--------------------------
Sample counts configured to use in calculating average:
-------------------------------------------------------
Average Kernel Memory : 1%
Critical Service(s) : Running
The following example displays the service router information on the CDSM:
CDSM#show service-router service-monitor
Monitor types configured:
-------------------------
Threshold values configured:
---------------------------
Sample periods configured:
--------------------------
Sample counts configured to use in calculating average:
-------------------------------------------------------
Average Used Memory : 13%
Average Kernel Memory : 1%
Related Commands
service-router
show services
To display services-related information, use the show services EXEC command.
show services {ports [port-num] | summary}
Syntax Description
ports
|
Displays services by port number.
|
port-num
|
(Optional) Up to eight port numbers (1-65535).
|
summary
|
Displays the services summary.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
The following example displays the services information by the port number:
CDSM# show services ports
Service information by port
---------------------------
550 Started on Mon Oct 14 12:13:20 2002
553 Started on Mon Oct 14 12:13:20 2002
554 Started on Mon Oct 14 12:13:20 2002
15256 Started on Mon Oct 14 12:13:20 2002
27999 Started on Mon Oct 14 12:13:20 2002
28000 Started on Mon Oct 14 12:13:20 2002
The following example displays a services information summary, showing the service and the associated port numbers:
CDSM# show services summary
-----------------------------------------------------
CMS 15256 2000 2001 2002 2003 2004 2005
Real_Proxy 1090 8082 9002 555 28000 7879 6060 7071 30
Real_Server 7070 8081 9091 27999 7878 7802 1554 3030 40
temp_RPC_APACHE_PORT 8008
Cisco_Streaming_Engine 550 SNMP
show snmp
To check the status of Simple Network Management Protocol (SNMP) communications, use the show snmp EXEC command.
show snmp {alarm-history | engineID | group | stats | user}
Syntax Description
alarm-history
|
Displays SNMP alarm history information.
|
engineID
|
Displays the local SNMP engine identifier.
|
group
|
Displays SNMP groups.
|
stats
|
Displays SNMP statistics.
|
user
|
Displays SNMP users.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
This command provides information on various SNMP variables and statistics on SNMP operations.
Examples
Table 2-42 describes the fields shown in the snmp alarm-history display.
Table 2-42 show snmp alarm-history Field Descriptions
Field
|
Description
|
Index
|
Serial number of the listed alarms.
|
Type
|
Status of whether the alarm has been Raised or Cleared.
|
Sev
|
Levels of alarm severity (Critical, Major, or Minor).
|
Alarm ID
|
Traps sent by a CDS device contain numeric alarm IDs.
|
ModuleID
|
Traps sent by a CDS device contain numeric module IDs. See Table 2-43 to map module names to module IDs.
|
Category
|
Traps sent by an CDS device contain numeric category IDs. See Table 2-44 to map category names to category IDs.
|
Descr
|
Description of the Internet Streamer CDS software alarm and the application that generated the alarm.
|
Table 2-43 describes themapping of module names to module ids.
Table 2-43 Mapping of Module Names to Module IDs
Module Name
|
Module ID
|
acquirer
|
4000
|
AD_DATABASE
|
8000
|
cms
|
3000
|
MULTICAST_DATA_SENDER
|
7000
|
NHM
|
1
|
NHM/NHM
|
2500
|
nodemgr
|
2000
|
standby
|
4000
|
sysmon
|
1000
|
UNICAST_DATA_RECEIVER
|
5000
|
UNICAST_DATA_SENDER
|
6000
|
Table 2-44 describes themapping of category names to category ids.
Table 2-44 Mapping of Category Names to Category IDs
Category Name
|
Category ID
|
Communications
|
1
|
Service Quality
|
2
|
Processing Error
|
3
|
Equipment
|
4
|
Environment
|
5
|
Content
|
6
|
Table 2-45 describes the fields shown in the show snmp stats display.
Table 2-45 show snmp stats Field Descriptions
Field
|
Description
|
SNMP packets input
|
Total number of SNMP packets input.
|
Bad SNMP version errors
|
Number of packets with an invalid SNMP version.
|
Unknown community name
|
Number of SNMP packets with an unknown community name.
|
Illegal operation for community name supplied
|
Number of packets requesting an operation not allowed for that community.
|
Encoding errors
|
Number of SNMP packets that were improperly encoded.
|
Number of requested variables
|
Number of variables requested by SNMP managers.
|
Number of altered variables
|
Number of variables altered by SNMP managers.
|
Get-request PDUs
|
Number of GET requests received.
|
Get-next PDUs
|
Number of GET-NEXT requests received.
|
Set-request PDUs
|
Number of SET requests received.
|
SNMP packets output
|
Total number of SNMP packets sent by the router.
|
Too big errors
|
Number of SNMP packets that were larger than the maximum packet size.
|
Maximum packet size
|
Maximum size of SNMP packets.
|
No such name errors
|
Number of SNMP requests that specified a MIB object that does not exist.
|
Bad values errors
|
Number of SNMP SET requests that specified an invalid value for a MIB object.
|
General errors
|
Number of SNMP SET requests that failed because of some other error. (It was not a No such name error, Bad values error, or any of the other specific errors.)
|
Response PDUs
|
Number of responses sent in reply to requests.
|
Trap PDUs
|
Number of SNMP traps sent.
|
Table 2-46 describes the fields shown in the show snmp engineID display.
Table 2-46 show snmp engineID Field Descriptions
Field
|
Description
|
Local SNMP Engine ID
|
String that identifies the copy of SNMP on the local device.
|
Table 2-47 describes the fields shown in the show snmp group display.
Table 2-47 show snmp group Field Descriptions
Field
|
Description
|
groupname
|
Name of the SNMP group, or collection of users who have a common access policy.
|
security_model
|
Security model used by the group (v1, v2c, or v3).
|
readview
|
String identifying the read view of the group.
|
writeview
|
String identifying the write view of the group.
|
notifyview
|
String identifying the notify view of the group.
|
Table 2-48 describes the fields shown in the show snmp user display.
Table 2-48 show snmp user Field Descriptions
Field
|
Description
|
User name
|
String identifying the name of the SNMP user.
|
Engine ID
|
String identifying the name of the copy of SNMP on the device.
|
Group Name
|
Name of the SNMP group, or collection of users who have a common access policy.
|
Related Commands
snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server location
snmp-server notify inform
snmp-server user
snmp-server view
show ssh
To display Secure Shell (SSH) status and configuration information, use the show ssh EXEC command.
show ssh
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
To display SSH status, enter the show ssh EXEC command.
Related Commands
sshd
show standby
To display standby interface information, use the show standby EXEC command.
show standby
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
To display standby interface information, enter the show standby EXEC command.
Examples
Table 2-49 describes the fields shown in the show standby display.
Table 2-49 show standby Field Descriptions
Field
|
Description
|
Standby Group
|
Number that identifies the standby group.
|
Description
|
Description of the device, as configured by using the description option of the interface global configuration command.
|
IP address
|
IP address of the standby group.
|
netmask
|
Netmask of the standby group.
|
Member interfaces
|
Member interfaces of the standby group. Shows which physical interfaces are part of the standby group. Shows the interface definition, such as GigabitEthernet 1/0.
|
priority
|
Priority status of each interface.
|
Active interface
|
Interfaces that are currently active in the standby group.
|
Maximum errors allowed on the active interface
|
Maximum number of errors allowed on the active interface.
|
Related Commands
show interface
show running-config
show startup-config
show startup-config
To display the startup configuration, use the show startup-config EXEC command.
show startup-config
Syntax Description
This command has no keywords or arguments.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Use this command to display the configuration used during an initial bootup, stored in nonvolatile random-access memory (NVRAM).
Examples
The following example displays the startup configuration details on the SE:
ServiceEngine#show startup-config
device mode service-engine
primary-interface PortChannel 1
ip address 3.1.14.72 255.255.255.0
ip address 4.0.8.13 255.255.255.0
interface GigabitEthernet 1/0
interface GigabitEthernet 2/0
interface GigabitEthernet 3/0
interface GigabitEthernet 4/0
interface GigabitEthernet 5/0
interface GigabitEthernet 6/0
ip default-gateway 3.1.14.1
rule action block pattern-list 3
rule action redirect http://www.baidu.com pattern-list 2
rule pattern-list 1 url-regex http://chunliu.com/b.wmv
rule pattern-list 2 header-field request-line b.wmv
rule pattern-list 3 header-field request-line c.wmv
server icap://trythis/servername
transaction-logs archive interval 120
username admin password 1 bVmDmMMmZAPjY
username admin privilege 15
authentication login local enable primary
authentication configuration local enable primary
access-lists 300 deny groupname Disney
access-lists 300 permit groupname any
service-router service-monitor threshold wmt 50
service-router service-monitor number-of-samples wmt 5
service-router service-monitor sample-period wmt 15
qos device-policy-service enable
cache content max-cached-entries 1000
! End of CDS configuration
Related Commands
configure
copy
show running-config
show statistics access-lists 300
To display SE access control list statistics, use the show statistics access-lists 300 EXEC command.
show statistics access-lists 300
Syntax Description
This command has no keywords or arguments.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The access control list statistics display the number of access requests, denials, and permissions recorded. Use the show statistics access-lists 300 command to display the number of group name accesses recorded.
Examples
Table 2-50 describes the fields shown in the show statistics access-lists 300 display.
Table 2-50 show statistics access-lists 300 Field Descriptions
Field
|
Description
|
Access Control Lists Statistics
|
Groupname and username-based List
|
Lists the group name-based access control lists.
|
Number of requests
|
Number of requests.
|
Number of deny responses
|
Number of deny responses.
|
Number of permit responses
|
Number of permit responses.
|
Related Commands
clear
show statistics acquirer
To display SE acquirer channel statistics, use the show statistics acquirer EXEC command.
show statistics acquirer [contents {delivery-service-id delivery-service-id |
delivery-service-name delivery-service-name} | delivery-service-id delivery-service-id |
delivery-service-name delivery-service-name | errors {delivery-service-id
delivery-service-id | delivery-service-name delivery-service-name} | job-list
{delivery-service-id delivery-service-id | delivery-service-name delivery-service-name}]
Syntax Description
contents
|
(Optional) Displays the acquired contents of the specified channel.
|
delivery-service-id
|
Displays acquirer statistics for the specified delivery service id.
|
delivery-service-id
|
Delivery service ID.
|
delivery-service-name
|
Displays acquirer statistics for the specified delivery service name.
|
delivery-service-name
|
Delivery service name.
|
errors
|
(Optional) Displays the acquisition error logs for the specified channel.
|
job-list
|
(Optional) Displays the job list statistics for the specified channel.
|
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
The show statistics acquirer command displays acquirer statistics for all channels for which the SE is the root SE. The output of the command displays any manifest file parsing or fetch errors if any errors occur. It displays the total number of acquired objects, number of failed objects, and total disk space used by the acquired objects. When a channel ID or name is specified, acquirer statistics are displayed for that channel specified by ID or name.
The show statistics acquirer contents command displays all the acquired content, its size, and its last-modified time, specified by channel ID or name.
The show statistics acquirer errors command displays acquisition errors, if any, for the channel specified by ID or name. Manifest file parsing and fetch errors, as well as single item or crawler job errors, are displayed.
The show statistics acquirer job-list command displays the details of all the single items and crawler jobs for the channel specified by ID or name.
Examples
Table 2-51 describes the fields shown in the show statistics acquirer display.
Table 2-51 show statistics acquirer Field Descriptions
Field
|
Description
|
Statistics For Channel ID: channel-id
|
Delivery-service-id
|
Delivery service identification number.
|
Delivery-service-name
|
Name of the delivery service.
|
Manifest
|
Fetch Errors
|
Number of manifest file fetch errors.
|
Parsing Errors
|
Number of manifest file parsing errors.
|
Acquisition
|
Total Number of Acquired Objects
|
Total number of acquired objects.
|
Total Size of Acquired Objects (Bytes)
|
Total size of acquired objects (in bytes).
|
Total Number of Failed Objects
|
Total number of failed objects.
|
Related Commands
acquirer (EXEC)
clear statistics
show acquirer
show statistics authentication
To display SE authentication statistics, use the show statistics authentication EXEC command.
show statistics authentication
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Usage Guidelines
Authentication statistics display the number of access requests, denials, and allowances recorded. Use the show statistics authentication command to display the number of authentication accesses recorded.
Examples
The fields shown in the show statistics authentication display include the following
•
Number of access requests
•
Number of access deny responses
•
Number of access allow responses
Related Commands
authentication
clear statistics
show authentication
show statistics authentication
show statistics cdnfs
To display SE CDS network file system (cdnfs) statistics, use the show statistics cdnfs EXEC command.
show statistics cdnfs
Syntax Description
This command has no arguments or keywords.
Defaults
No default behavior or values.
Command Modes
EXEC
Examples
Table 2-52 describes the show statistics cdnfs command fields displayed in the command output.
Table 2-52 show statistics cdnfs Fields
Field
|
Description
|
Size of physical file system
|
Physical disk size of the CDS network file system.
|
Space assigned for cdnfs purposes
|
Amount of physical disk space on the CDS network file system that has been assigned to hold pre-positioned objects. The space can be less than the size of the file system.
|
Number of cdnfs entries
|
Number of cdnfs objects in the CDS network file system.
Note One pre-positioned file internally uses two cdnfs entries. The count of cdnfs entries will be twice the number of actual files displayed to users.
|
Space reserved for cdnfs entries
|
Amount of disk space reserved for existing pre-positioned objects. This space is reserved for cdnfs objects before the file is created and written to the file system.
|
Available space for new entries
|
Amount of physical disk space available in the CDS network file system for new pre-positioned objects.
|
Physical file system in use
|
Amount of physical disk space currently in use by the CDS network file system.
|
Physical file system space free
|
Amount of unused physical disk space in the CDS network file system.
|
Physical file system percentage in use
|
Percentage of physical disk space in use relative to the total disk space available.
|
Related Commands
cdnfs
clear
show cdnfs
show disks