Cisco Internet Streamer CDS 2.4 Command Reference
Internet Streamer CDS Release 2.4 Software Commands - lls through show statistics cdnfs

Table Of Contents

lls

logging

ls

mkdir

mkfile

movie-streamer

mtu

no (global configuration)

no (interface configuration)

ntp

ntpdate

ping

ping6

port-channel

primary-interface

pwd

qos

radius-server

rcp

rea

reload

rename

restore

rmdir

rtsp

rule

script

service-router

setup

show access-lists

show acquirer

show alarms

show arp

show authentication

show authsvr

show bandwidth

show banner

show bitrate

show cache

show capability

show cdnfs

show clock

show cms

show content

show debugging

show device-mode

show direct-server-return

show disks

show distribution

show flash

show flash-media-streaming

show ftp

show hardware

show hosts

show http

show icap

show interface

show inventory

show ip access-list

show ip routes

show ldap

show logging

show movie-streamer

show ntp

show processes

show programs

show qos

show radius-server

show rea

show rcp

show rtsp

show rule

show running-config

show service-router

show services

show snmp

show ssh

show standby

show startup-config

show statistics access-lists 300

show statistics acquirer

show statistics authentication

show statistics cdnfs


lls

To view a long list of directory names, use the lls EXEC command.

lls [directory]

Syntax Description

directory

(Optional) Name of the directory for which you want a long list of files.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

This command provides detailed information about files and subdirectories stored in the present working directory (including size, date, time of creation, sysfs name, and long name of the file). This information can also be viewed with the dir command.

Examples

The following example shows how to view a long list of directory names:

ServiceEngine#lls
      size          time of last change             name               
-------------- -------------------------          -----------        
          4096 Mon Jan 10 14:02:26 2005 <DIR>    WebsenseEnterprise
          4096 Mon Jan 10 14:02:26 2005 <DIR>    Websense_config_backup
         10203 Mon Feb 28 04:24:53 2005           WsInstallLog
          4096 Wed Feb 9 00:59:48 2005 <DIR>    core_dir
          4096 Mon Jan 10 13:49:27 2005 <DIR>    crash
           382 Tue Mar 1 03:32:13 2005           crka.log
          1604 Tue Feb 22 03:55:04 2005           dbupgrade.log
          4096 Mon Jan 10 14:02:31 2005 <DIR>    downgrade
          4096 Mon Feb 28 04:17:32 2005 <DIR>    errorlog
         53248 Tue Mar 1 03:01:53 2005 <DIR>    logs
         16384 Mon Jan 10 13:49:26 2005 <DIR>    lost+found
           438 Tue Jan 11 05:37:57 2005           new_file.xml
          8192 Tue Mar 1 00:00:00 2005 <DIR>    preload_dir
          4096 Tue Mar 1 03:26:00 2005 <DIR>    sa
         40960 Tue Mar 1 03:32:15 2005 <DIR>    service_logs
          4096 Tue Feb 22 03:51:25 2005 <DIR>    smartfilter
        384802 Mon Feb 28 03:46:00 2005           syslog.txt
         16296 Mon Feb 21 04:42:12 2005           test
          4096 Mon Jan 10 14:02:24 2005 <DIR>    var
          4096 Sat Feb 12 07:15:23 2005 <DIR>    wmt_vod

Related Commands

dir
ls

logging

To configure system logging, use the logging global configuration command. To disable logging functions, use the no form of this command.

logging {console {enable | priority loglevel} | disk {enable | filename filename | priority loglevel | recycle size} | facility facility | host {hostname | ip-address} [port port_num | priority loglevel | rate-limit message_rate]}

no logging {console {enable | priority} | disk [enable | filename | priority | recycle] | facility | host {hostname | ip-address} [port port_num | priority loglevel | rate-limit message_rate]}

Syntax Description

console

Sets system logging to a console.

enable

Enables system logging to a console.

priority

Sets which priority level messages to send to a syslog file.

loglevel

Use one of the following keywords:

alert

Immediate action needed. Priority 1.

critical

Immediate action needed. Priority 2.

debug

Debugging messages. Priority 7.

emergency

System is unusable. Priority 0.

error

Error conditions. Priority 3.

information

Informational messages. Priority 6.

notice

Normal but significant conditions. Priority 5.

warning

Warning conditions. Priority 4.

disk

Sets system logging to a disk file.

enable

Enables system logging to a disk file.

filename

Sets the name of the syslog file.

filename

Specifies the name of the syslog file.

recycle

Overwrites the syslog.txt when it surpasses the recycle size.

size

Size of the syslog file in bytes (1000000-50000000).

facility

Sets the facility parameter for syslog messages.

facility

Use one of the following keywords:

auth

Authorization system.

daemon

System daemons.

kernel

Kernel.

local0

Local use.

local1

Local use.

local2

Local use.

local3

Local use.

local4

Local use.

local5

Local use.

local6

Local use.

local7

Local use.

mail

Mail system.

news

USENET news.

syslog

Syslog itself.

user

User process.

uucp

UUCP system.

host

Sets the system logging to a remote host.

hostname

Hostname of the remote syslog host. Specifies up to four remote syslog hosts.

Note To specify more than one syslog host, use multiple command lines; specify one host per command.

ip-address

IP address of the remote syslog host. Specifies up to four remote syslog hosts.

Note To specify more than one syslog host, use multiple command lines; specify one host per command.

port

(Optional) Specifies the port to be used when logging to a host.

port_num

Port to be used when logging to a host. The default port is 514.

priority

(Optional) Sets the priority level for messages when logging messages to a host. The default priority is warning.

loglevel

Use one of the following keywords:

alert

Immediate action needed. Priority 1.

critical

Immediate action needed. Priority 2.

debug

Debugging messages. Priority 7.

emergency

System is unusable. Priority 0.

error

Error conditions. Priority 3.

information

Informational messages. Priority 6.

notice

Normal but significant conditions. Priority 5.

warning

Warning conditions. Priority 4.

rate-limit

(Optional) Sets the rate limit (in messages per second) for sending messages to a host.

message_rate

Rate limit (in messages per second) for sending messages to the host. (0-10000). Setting the rate limit to 0 disables rate limiting.


Defaults

Logging: on

Priority of message for console: warning

Priority of message for log file: debug

Priority of message for a host: warning

Log file: /local1/syslog.txt

Log file recycle size: 10,000,000 bytes

Command Modes

Global configuration

Usage Guidelines

Use the logging command to set specific parameters of the system log file. System logging is always enabled internally on the SE. The system log file is located on the sysfs partition as /local1/syslog.txt. This file contains the output from many of the CDS components running on the SE, such as authentication entries, privilege levels, administrative details, and diagnostic output during the boot process.

To view information about events that have occurred in all devices in your CDS network, you can use the system message log feature. When a problem occurs in the CDS network, use the system message logs to diagnose and correct such problems.

The syslog.txt file on the CDSM contains information about events that have occurred on the CDSM and not on the registered nodes. The messages written to the syslog.txt file depend on specific parameters of the system log file that you have set using the logging global configuration command. For example, a critical error message logged on a registered node does not appear in the syslog.txt file on the CDSM because the problem never occurred on the CDSM but occurred only on the registered node. However, such an error message will be displayed in the syslog.txt file on the registered node.

A disk failure syslog message is generated every time that a failed sector is accessed. Support for filtering multiple syslog messages for a single failed sector on an IDE disk was added. Support for filtering multiple syslog messages for a single failed section for SCSI disks and SATA disks exists.

To configure the SE to send varying levels of event messages to an external syslog host, use the logging host option. Logging can be configured to send various levels of messages to the console using the logging console priority option.

The no logging disk recycle size command sets the file size to the default value. Whenever the current log file size surpasses the recycle size, the log file is rotated. The log file cycles through at most five rotations, and they are saved as [log file name].[1-5] under the same directory as the original log. The rotated log file is the one configured using the logging disk filename command.

Configuring System Logging to Remote Syslog Hosts

Cisco Internet Streamer Release 2.4 software, supported logging to only a single remote syslog host, and the following two commands is used to configure a single remote syslog host for an SE:

ServiceEngine(config)#logging host hostname
ServiceEngine(config)#logging priority priority

You can configure an SE to send varying levels of messages to up to four remote syslog hosts. To accommodate this, logging host priority priority global configuration command (shown above) is deprecated, and the logging host hostname global configuration command is extended as follows:

ServiceEngine(config)#[no] logging host hostname [priority priority-code | port port 
|rate-limit limit]

where the following is true:

hostname is the hostname or IP address of the remote syslog host. Specify up to four remote syslog hosts. To specify more than one syslog host, use multiple command lines; specify one host per command.

priority-code is the severity level of the message that should be sent to the specified remote syslog host. The default priority-code is "warning" (level 4). Each syslog host can receive a different level of event messages.


Note You can achieve syslog host redundancy by configuring multiple syslog hosts on the SE and assigning the same priority code to each configured syslog host (for example, assigning a priority code of "critical" level 2 to syslog host 1, syslog host 2, and syslog host 3).


port is the destination port of the remote syslog host to which the SE is to send the messages. The default port is port 514. In releases prior to the Internet Streamer CDS Release 2.x software, you could not change the default port. Syslog messages were only sent to port 514 on the specified syslog host.

rate-limit specifies the number of messages that are allowed to be sent to the remote syslog host per second. To limit bandwidth and other resource consumption, messages to the remote syslog host can be rate limited. If this limit is exceeded, messages to the specified remote syslog host are dropped. There is no default rate limit, and by default all syslog messages are sent to all of the configured syslog hosts. If the rate limit is exceeded, a message of the day (MOTD) will be printed for any CLI EXEC shell login.

Mapping syslog Priority Levels to RealProxy Error Codes

The RealProxy system generates error messages and writes them to the RealProxy log file. These error messages are captured by the caching application and passed to the system log file. A one-to-one mapping exists between the RealProxy error codes and the syslog priority levels.

Examples

The following example shows that the SE is configured to send messages that have a priority code of "error" (level 3) to the console:

ServiceEngine(config)#logging console priority warnings

The following example shows that the SE is configured to disable sending of messages that have a priority code of "error" (level 3) to the console:

ServiceEngine(config)#no logging console warnings

The following example shows that the SE is configured to send messages that have a priority code of "error" (level 3) to the remote syslog host that has an IP address of 172.31.2.160:

ServiceEngine(config)# logging host 172.31.2.160 priority error

Related Commands

clear logging
debug
show logging

ls

To view a list of files or subdirectory names within a directory, use the ls EXEC command.

ls [directory]

Syntax Description

directory

(Optional) Name of the directory for which you want a list of files.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

To list the filenames and subdirectories within a particular directory, use the ls directory command; to list the filenames and subdirectories of the current working directory, use the ls command. To view the present working directory, use the pwd command.

Examples

The following example displays a list of files within the current working directory:

ServiceEngine#ls
/local1

The following example displays a list of files within the /local1 directory:

ServiceEngine#ls /local1
core_dir
crash
errorlog
logs
lost+found
service_logs
smartfilter
syslog.txt

Related Commands

dir
lls
pwd

mkdir

To create a directory, use the mkdir EXEC command.

mkdir directory

Syntax Description

directory

Name of the directory to create.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command to create a new directory or subdirectory in the SE file system.

Examples

The following example shows how to create a new directory under local1:

ServiceEngine#mkdir /local1/mydir

Related Commands

dir
lls
ls
pwd
rmdir

mkfile

To create a new file, use the mkfile EXEC command.

mkfile filename

Syntax Description

filename

Name of the file that you want to create.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command to create a new file in any directory of the SE.

Examples

The following example shows how to create a new file:

ServiceEngine#mkfile traceinfo

Related Commands

lls
ls
mkdir

movie-streamer

To enable and configure the Movie Streamer server, use the movie-streamer global configuration command. To disable the Movie Streamer, use the no form of this command.

movie-streamer accelerate vod enable

movie-streamer advanced {client {idle-timeout num | rtp-timeout} | origin server idle-interval num}

movie-streamer broadcast port-list num port num

movie-streamer cache {age-multiplier num | enable | max-ttl {days num | hours num | minutes num | seconds num} | reval-each-request}

movie-streamer enable

movie-streamer max-concurrent-sessions num

movie-streamer proxy outgoing rtsp host ip address port num

movie-streamer transport-src-address ip address

no movie streamer {accelerate vod enable | advanced {client {idle-timeout num | rtp-timeout} | origin server idle-interval num} | broadcast port-list num port num | cache {age-multiplier num | enable | max-ttl {days num | hours num | minutes num | seconds num} | reval-each-request} | enable | max-concurrent-sessions num | proxy outgoing rtsp host ip address port num | transport-src-address ip address}

Syntax Description

accelerate

Configures Movie Streamer kernel streaming acceleration.

vod

Configures kernel streaming acceleration for VOD.

enable

Enables kernel streaming acceleration.

advanced

Configures Movie Streamer Advanced features.

client

Configures advanced client features.

idle-timeout

Sets the RTSP timeout.

num

Client idle timeout in seconds (0-300).

rtp-timeout

Sets the RTP timeout.

origin-server

Configures the advanced origin server.

idle-interval

Sets the origin server idle interval.

num

Server idle interval in seconds (1-10).

broadcast

Configures the Movie Streamer live broadcast.

port-list

Specifies a port list.

num

Broadcast list number (1-1024).

port num

Broadcast port number.

cache

Configures the Movie Streamer cache.

age-multiplier

Sets the Movie Streamer cache heuristic modifier.

num

Expiration time as a percentage of their age (0-100).

enable

Enables the Movie Streamer media cache.

max-ttl

Sets the maximum time to live for objects in the cache

days

Specifies the maximum time to live units in days.

num

Maximum time to live (1-1825).

hours

Specifies the maximum time to live units in hours.

num

Maximum time to live (1-43800).

minutes

Specifies the maximum time to live units in minutes.

num

Maximum time to live (1-2628000).

seconds

Specifies the maximum time to live units in seconds.

num

Maximum time to live (1-157680000).

reval-each-request

Sets the scope of revalidation for the request.

enable

Enables the Movie Streamer.

max-concurrent-sessions

Specifies the Movie Streamer maximum concurrent sessions.

num

The maximum concurrent sessions (1-16000).

proxy

Configures the Movie Streamer proxy.

outgoing

Configures the Outgoing proxy.

rtsp

Configures the Outgoing RTSP proxy.

host

Specifies the outgoing proxy server.

ip address

IP address of outgoing proxy server.

port num

Port number of outgoing proxy server (1-65535).

transport-src-address

Specifies the source IP address to be set in transport header (useful if behind NAT).

ip address

Source IP address in transport header.


Defaults

days: 1 day

hours: 72 hours

minutes: 4320 minutes

seconds: 259200 seconds

Command Modes

Global configuration

Usage Guidelines

The movie-streamer accelerate vod enable command enables kernel streaming acceleration for VOD.

The movie-streamer advanced client command sets the RTSP or RTP timeout value.

The movie-streamer advanced origin-server command sets the origin-server idle-interval value, which can determine the origin-server RTP timeout value.

The Idle Timeout field and the movie-streamer advanced client idle-timeout command (as well as the movie-streamer advanced client rtp-timeout command), are only intended for performance testing when using certain testing tools that do not have full support of the RTCP receiver report. Setting these timeouts to high values causes inefficient tear-down of client connections when the streaming sessions have ended.

For typical deployments, it is preferable to leave these parameters set to their defaults. The default is 60.

The movie-streamer advanced client idle-timeout command has a range from 0 to 300, whereas the Idle Timeout field has a range from 30-180. This is by design.

Examples

The following example shows how to set the original server interval:

ServiceEngine(config)#movie-streamer advanced origin-server idle-interval 5

The following example shows how to set the broadcast port list:

ServiceEngine(config)#movie-streamer broadcast port-list 1 5000 5002

The following example shows how to set the expiration time as a percentage of the age:

ServiceEngine(config)#movie-streamer cache age-multiplier 50

The following example shows how to set the content cache maximum TTL:

ServiceEngine(config)#movie-streamer cache max-ttl days 100

The following example shows how to set the maximum concurrent sessions:

ServiceEngine(config)#movie-streamer max-concurrent-sessions 7000

The following example shows how to set the outgoing proxy:

ServiceEngine(config)#movie-streamer proxy outgoing rtsp host 10.74.61.98 554

The following example shows how to set the source IP of the transport header while behind NAT:

ServiceEngine(config)#movie-streamer transport-src-address 10.74.61.99

The following example shows how to set the client timeout:

ServiceEngine(config)#movie-streamer advanced client idle-timeout 150

The following example shows how to set the RPT time out:

ServiceEngine(config)#movie-streamer advanced client rtp-timeout 150
Set original server interval is 5 second
ServiceEngine(config)#movie-streamer advanced origin-server idle-interval 5
Set broadcast port list
SPCDN-QA-35(config)#movie-streamer broadcast port-list 1 5000 5002
Set Expiration time as a percentage of their age's 50%
SPCDN-QA-35(config)#movie-streamer cache age-multiplier 50
Set cache content max ttl is 100 days
SPCDN-QA-35(config)#movie-streamer cache max-ttl days 100
Set max con-current sessions is 7000
SPCDN-QA-35(config)#movie-streamer max-concurrent-sessions 7000
Set out going proxy
SPCDN-QA-35(config)#movie-streamer proxy outgoing rtsp host 10.74.61.98 554
Set the source Ip of transport header while behind NAT
SPCDN-QA-35(config)#movie-streamer transport-src-address 10.74.61.99

Related Commands

show movie-streamer
show statistics movie-streamer

mtu

To set the interface maximum transmission unit (MTU) packet size, use the mtu interface configuration

command. Use the no form of this command to reset the MTU packet size.

mtu mtusize

no mtu mtusize

Syntax Description

mtusize

MTU packet size in bytes (576-1500).


Command Default

The default MTU packet size for an Ethernet interface is 1500 bytes.

Command Modes

Interface configuration

Usage Guidelines

The MTU is the largest size of IP datagram that can be transferred using a specific data link connection. Use the mtu command to set the maximum packet size in bytes.

Examples

The following example sets the MTU packet size as 1500 bytes:

ServiceEngine(config-if)#mtu 1500

The following example resets the MTU packet size:

ServiceEngine(config-if)#no mtu 1500

Related Commands

show interface
show running-config
show startup-config

no (global configuration)

To undo a global configuration command or set its defaults, use the no form of a global configuration command.

no command


Note The commands you can use with a CDS device (including the no form of each command) vary based on whether the device is configured as a CDSM, SE, or SR. See Table 2-1 to identify the commands available for a specific device.


Syntax Description

command

Specifies the command type; see the "" section for valid values.


Defaults

No default behavior or values.

Command Modes

Global configuration

Usage Guidelines

Valid values for command are as follows:

aaa

Configures authentication, authorization, and accounting (AAA).

access-lists

Configures access control list entries.

acquirer

Configures acquisition parameters.

asset

Configures the asset tag name string.

authentication

Configures the authentication.

bandwidth

Configures bandwidth controls.

bitrate

Configures the bit rate.

cdsm

Configures the CDSM settings.

clock

Configures the time-of-day clock.

cms

Configures the Centralized Management System (CMS).

device

Configures the device mode.

dns

Configures the SE DNS cache.

exec-timeout

Configures the EXEC timeout.

external-ip

Configures up to eight external (NAT) IP addresses.

ftp

Configures FTP caching-related parameters.

help

Configures the assistance for the command-line interface.

hostname

Configures the system's network name.

http

Configures HTTP-related parameters.

icap

Configures the ICAP feature for the HTTP protocol.

interface

Configures a Gigabit Ethernet interface.

ip

Configures IP parameters.

ip access-list

Configures IP access lists.

kernel

Enables access to the kernel debugger.

ldap

Configures Lightweight Directory Access Protocol (LDAP) parameters.

logging

Configures the system logging (syslog).

network-filesystem

Configures the network file system server and client.

ntp

Configures the Network Time Protocol (NTP).

offline-operation

Configures the offline service operation.

pace

Configures the HTTP pacing bandwidth and bit rate.

port-channel

Configures port-channel global options.

primary-interface

Configures a primary interface.

radius-server

Configures RADIUS server authentication.

rtsp

Configures Real-Time Streaming Protocol (RTSP)-related parameters.

rule

Configures the Rules Template.

snmp-server

Configures the SNMP server.

sshd

Configures the Secure Shell (SSH) service.

tcp

Configures global TCP parameters.

telnet enable

Configures Telnet services.

transaction-logs

Configures the transaction logging.

username

Establishes username authentication.

wmt

Configures Windows Media Technologies (WMT) parameters .


Use the no command to disable functions or negate a command. If you need to negate a specific command, such as the default gateway IP address, you must include the specific string in your command, such as no ip default-gateway ip-address.

no (interface configuration)

To negate a Gigabit Ethernet or port-channel interface configuration command or set its defaults, use the no interface configuration command.

no interface {GigabitEthernet slot/port | PortChannel {1 | 2} | Standby group num}

Syntax Description

GigabitEthernet

Selects a Gigabit Ethernet interface to configure.

slot/port

Slot and port number for the selected interface. The slot range is 0-2; the port range is 0-3. The slot number and port number are separated with a forward slash character (/).

PortChannel

Selects the EtherChannel of interfaces to configure.

1

Sets the port-channel interface number to 1.

2

Sets the port-channel interface number to 2.

Standby

Sets the standby group for the interface.

group num

Group number for the selected interface. The group number range is 1-4.


Defaults

No default behavior or values.

Command Modes

Interface configuration

Related Commands

interface
show interface
show running-config
show startup-config

ntp

To configure the Network Time Protocol (NTP) server and to allow the system clock to be synchronized by a time server, use the ntp global configuration command. To disable this function, use the no form of this command.

ntp server {ip-address | hostname} [ip-addresses | hostnames]

no ntp server {ip-address | hostname} [ip-addresses | hostnames]

Syntax Description

server

Sets the NTP server IP address.

ip-address

NTP server IP address.

hostname

NTP server hostname.

ip-addresses

(Optional) IP address of the time server providing the clock synchronization (maximum of four).

hostnames

(Optional) Hostname of the time server providing the clock synchronization (maximum of four).


Defaults

No default behavior or values.

Command Modes

Global configuration

Usage Guidelines

Use this command to synchronize the SE, SR or CDSM clock with the specified NTP server. The ntp server command enables NTP servers for timekeeping purposes and is the only way to synchronize the system clock with a time server.

When you synchronize the CDSM clock with an NTP server, there is a possibility of all devices registered with the CDSM being shown as offline and then reverted to online status. This situation can occur when synchronization with the NTP server sets the CDSM clock forward in time by an interval greater than at least two polling intervals or when the software clock on the CDSM is changed by a similar value using the clock EXEC command. The CDSM determines the status of devices in the CDS network depending on when it was last contacted by the devices for a getUpdate request. If you set the CDSM clock ahead in time, you have added that amount of time to the period since the CDSM received the last getUpdate request. However, it is only a transient effect. Once the devices contact the CDSM for their next getUpdate request after the clock setting change, the CDSM GUI reports the status of all devices correctly.

Examples

The following example configures the IP address of the time server providing the clock synchronization:

ServiceEngine(config)#ntp 172.16.22.44 

The following example resets the time server providing the clock synchronization:

ServiceEngine(config)#no ntp 172.16.22.44 

Related Commands

clock
show clock
show ntp status

ntpdate

To set the software clock (time and date) using a Network Time Protocol (NTP) server, use the ntpdate EXEC command.

ntpdate {hostname | ip-address}

Syntax Description

hostname

NTP hostname.

ip-address

NTP server IP address.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use NTP to find the current time of day and set the SE current time to match. The ntpdate command synchronizes the software clock with the hardware clock.

Examples

The following example sets the software clock of the SE using an NTP server:

ServiceEngine#ntpdate 10.11.23.40

Related Commands

clock set
show clock

ping

To send echo packets for diagnosing basic network connectivity on networks, use the ping EXEC command.

ping {hostname | ip-address}

Syntax Description

hostname

Hostname of system to ping.

ip-address

IP address of system to ping.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

To use this command with the hostname argument, be sure that DNS functionality is configured on your SE. To force the timeout of a nonresponsive host or to eliminate a loop cycle, press Ctrl-C.

Following are sample results of the ping command:

Normal response—The normal response occurs in 1 to 10 seconds, depending on network traffic.

Destination does not respond—If the host does not respond, a "no answer from host" appears in 10 seconds.

Destination unreachable—The gateway for this destination indicates that the destination is unreachable.

Network or host unreachable—The SE found no corresponding entry in the route table.

Examples

The following example shows how to test the basic network connectivity with a host:

ServiceEngine#ping 172.19.131.189
PING 172.19.131.189 (172.19.131.189) from 10.1.1.21 : 56(84) bytes of
data.
64 bytes from 172.19.131.189: icmp_seq=0 ttl=249 time=613 usec
64 bytes from 172.19.131.189: icmp_seq=1 ttl=249 time=485 usec
64 bytes from 172.19.131.189: icmp_seq=2 ttl=249 time=494 usec
64 bytes from 172.19.131.189: icmp_seq=3 ttl=249 time=510 usec
64 bytes from 172.19.131.189: icmp_seq=4 ttl=249 time=493 usec
--- 172.19.131.189 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/mdev = 0.485/0.519/0.613/0.047 ms
ServiceEngine#

ping6

To ping the IPv6 address, use the ping6 EXEC command.

ping6 line ip-address

Syntax Description

line

Destination Host or IP Address.

ip-address

IP address of system to ping.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example shows how to ping the IPv6 address:

ServiceEngine(config)#pingv5 fec0::100/64

Related Commands

ping

port-channel

To configure the port-channel load-balancing options, use the port-channel global configuration command. To disable load-balancing options, use the no form of this command.

port-channel load-balance {dst-ip | dst-mac | round-robin}

no port-channel load-balance

Syntax Description

load-balance

Configures the load-balancing method.

dst-ip

Specifies the load-balancing method using destination IP addresses.

dst-mac

Specifies the load-balancing method using destination Media Access Control (MAC) addresses.

round-robin

Specifies the load-balancing method using round-robin sequential, cyclical resource allocation.


Defaults

Round-robin is the default load-balancing method.

Command Modes

Global configuration

Usage Guidelines

The port-channel load-balance command configures one of three load-balancing algorithms and provides flexibility in choosing interfaces when an Ethernet frame is sent. The round-robin option allows evenly balanced usage of identical network interfaces in a channel group. Because this command takes effect globally, if two channel groups are configured, they must use the same load-balancing option.

Because the Internet Streamer CDS software normally initiates IP packets or Ethernet frames, it does not support hashing based on the source IP address and source MAC address. Cisco Internet Streamer Release 2.4 software adds the round-robin option, which is the default load-balancing algorithm, to evenly distribute traffic among several identical network interfaces.

Examples

The following example shows how to configure the round-robin load-balancing method on an SE:

ServiceEngine(config)#port-channel load-balance round-robin

Related Commands

interface

primary-interface

To configure the primary interface for the CDS network, use the primary-interface global configuration command. Use the no form of the command to remove the configured primary interface.

primary-interface {GigabitEthernet 1-2/port | PortChannel 1-2 | Standby group_num}

no primary-interface {GigabitEthernet 1-2/port | PortChannel 1-2 | Standby group_num}

Syntax Description

GigabitEthernet

Selects a Gigabit Ethernet interface as the CDS network primary interface.

1-2/

Gigabit Ethernet slot numbers 1 or 2.

port

Port number of the Gigabit Ethernet interface.

PortChannel

Selects a port-channel interface as the CDS network primary interface.

1-2

Port channel number 1 or 2.

Standby

Selects a standby group as the CDS network primary interface.

group_num

Standby group number.


Defaults

The default primary interface is the first operational interface on which a link beat is detected. Interfaces with lower-number IDs are polled first (for example, GigabitEthernet 0/0 is checked before 1/0). Primary interface configuration is required for the proper functioning of the Centralized Management System (CMS). After devices are registered to the CDSM, the CDSM uses the configured primary interface to communicated with the registered devices.

You cannot enable the CDS network without specifying the primary interface. Also, you must have chosen the primary interface before you enable the CMS. The primary interface can be changed without disabling the CDS network. The primary interface specifies the default route for an interface. To change the primary interface, choose a different interface as the primary interface.

In Cisco Internet Streamer Release 2.4 software and later releases, you can select a standby interface as the primary interface (you can enter the primary-interface Standby group_num command) to specify a standby group as the primary interface on an SE.

Command Modes

Global configuration

Usage Guidelines

The primary-interface global configuration command allows the administrator to specify the primary interface for the CDS network.

The primary interface can be changed without disabling the CDS network. To change the primary interface, re-enter the command string and specify a different interface.


Note If you use the restore factory-default preserve basic-config command, the configuration for the primary interface is not preserved. On a device in a CDS network, if you want to re-enable the CDS network after using the restore factory-default preserve basic-config command, make sure to reconfigure the primary interface after the factory defaults are restored.


Examples

The following example shows how to specify the GigabitEthernet slot 1 port 0 as the primary interface on an SE:

ServiceEngine(config)#primary-interface GigabitEthernet 1/0 

The following example shows how to specify the GigabitEthernet slot 2 port 0 as the primary interface on an SE:

ServiceEngine(config)#primary-interface GigabitEthernet 2/0

pwd

To view the present working directory, use the pwd EXEC command.

pwd

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command to display the present working directory of the SE.

Examples

The following example shows how to view the present working directory:

ServiceEngine#pwd
/local1

Related Commands

cd
dir
lls
ls

qos

To globally enable QoS functionality on the switch, use the qos command. To globally disable QoS functionality, use the no form of this command.

qos {device-policy-service {config-file url | enable} | dsvc num name name fqdn icap ip address num list request-type {all num num name redirect-url {no-redirect list num | url list num}| http-download num num name{no-redirect list num | url list num} | wmt-streaming num num name redirect-url {no-redirect list num | url list num}}

no qos {device-policy-service {config-file url | enable} | dsvc num name name fqdn icap ip address num list request-type {all num num name redirect-url {no-redirect list num | url list num}| http-download num num name{no-redirect list num | url list num} | wmt-streaming num num name redirect-url {no-redirect list num | url list num}}

Syntax Description

device-policy-service

Configures Camiant qos cdn-am policy service.

config-file

Specifies the policy service configuration file.

url

URL or local configuration file.

enable

Enables Camiant policy service.

dsvc

Configures PCMM QoS details for the delivery service.

num

the delivery service ID, which is obtained from the CDSM (1-4294967295).

name

Delivery Service Name as obtained from the CDSM.

name

Service Routed Domain for delivery service.

fqdn

Service FQDN for delivery service

icap

Specifies that authorization needed using ICAP.

ip address

IP address of the Policy Server.

num

Port of the Policy Server for authorization (1-65535).

list

List of URI extension separated by commas for which Authorization is to be done.

request-type

Configures the QoS setting needed for Windows Media Streaming or download.

all

Configures the QoS setting for Windows Media Streaming and download.

num

Signature details as key ID.

num

Signature details as key ID.

name

Signature details as key.

redirect-url

Specifies the redirect URL string on signature validation failure.

no-redirect

Always returns forbidden if validation fails.

url

Redirect URL String on signature validation failure.

list

List of URI extensions separated by commas for which Signature validation is to be done.

num

(1) Enable or (0) Disable the setting given.

http-download

Specifies the QoS setting for download.

wmt-streaming

Specifies the QoS setting for Windows Media Streaming.


Defaults

QoS functionality is disabled.

Command Modes

Global configuration

Usage Guidelines

If QoS functionality is globally enabled, it is enabled on all interfaces, except on the interfaces where QoS has been disabled. If QoS functionality is globally disabled, all traffic is passed in QoS pass-through mode.

Examples

This example shows how to enable QoS functionality globally on the switch:

ServiceEngine(config)#qos device-policy-service enable

Related CommandsPlease ensure you have purchased License for this advanced feature

Related CommandsSwitch(config)#

show qos
show statistics qos

radius-server

To configure RADIUS authentication parameters, use the radius-server global configuration command. To disable RADIUS authentication parameters, use the no form of this command.

radius-server {enable | host {hostname | hostipaddr} [auth-port port] | key keyword | redirect {enable | message reply location url} | retransmit retries | timeout seconds}

no radius-server {enable | host {hostname | hostipaddr} | key | redirect {enable | message reply location url} | retransmit | timeout}

Syntax Description

enable

Enables HTTP RADIUS authentication.

host

Specifies a RADIUS server.

hostname

Hostname of the RADIUS server.

hostipaddr

IP address of the RADIUS server.

auth-port

(Optional) Sets the UDP port for the RADIUS authentication server.

port

UDP port number (1-65535). The default is 1645.

key

Specifies the encryption key shared with the RADIUS servers.

keyword

Text of the shared key (15 characters maximum).

redirect

Redirects the response if an authentication request fails.

enable

Enables the redirect feature.

message

Replies with an authentication failure message.

reply

Reply message text string (24 characters maximum).

location

Sets the HTML page location, for example, http://www.cisco.com.

url

URL destination of authentication failure instructions.

retransmit

Specifies the number of transmission attempts to an active server.

retries

Number of transmission attempts for a transaction (1-3).

timeout

Time to wait for a RADIUS server to reply.

seconds

Wait time in seconds (1-20).


Defaults

auth-port port: UDP port 1645

retransmit retries: 2

timeout seconds: 5

Command Modes

Global configuration

Usage Guidelines

RADIUS is a client/server authentication and authorization access protocol used by an CDS network device to authenticate users attempting to connect to a network device. The CDS network device functions as a client, passing user information to one or more RADIUS servers. The CDS network device permits or denies network access to a user based on the response that it receives from one or more RADIUS servers. RADIUS uses the User Datagram Protocol (UDP) for transport between the RADIUS client and server.

You can configure a RADIUS key on the client and server. If you configure a key on the client, it must be the same as the one configured on the RADIUS servers. The RADIUS clients and servers use the key to encrypt all RADIUS packets transmitted. If you do not configure a RADIUS key, packets are not encrypted. The key itself is never transmitted over the network.


Note For more information about how the RADIUS protocol operates, see RFC 2138, Remote Authentication Dial In User Service (RADIUS).


RADIUS authentication usually occurs in these instances:

Administrative login authentication—When an administrator first logs in to the SE to configure the SE for monitoring, configuration, or troubleshooting purposes. For more information, see the "Enabling and Disabling Administrative Login Authentication and Authorization Through RADIUS" section.

HTTP request authentication—When an end user sends a service request that requires privileged access to content that is served by the SE. For more information, see the "Configuring RADIUS Authentication of HTTP Requests" section.

RADIUS authentication is disabled by default. You can enable RADIUS authentication and other authentication methods at the same time. You can also specify which method to use first.

To configure RADIUS parameters, use the radius-server command in global configuration mode. To disable RADIUS authentication parameters, use the no form of this command.

The redirect option of the radius-server command redirects an authentication response to a different authentication server if an authentication request using the RADIUS server fails.


Note The following rule command is relevant to RADIUS authentication only if the redirect option has been configured.


To exclude domains from RADIUS authentication, use the rule no-auth domain command. RADIUS authentication takes place only if the site requested does not match the specified pattern.

Enabling and Disabling Administrative Login Authentication and Authorization Through RADIUS

When configuring an SE to use RADIUS to authenticate and authorize administrative login requests, follow these guidelines:

By default, RADIUS authentication and authorization is disabled on an SE.

Before enabling RADIUS authentication on the SE, you must specify at least one RADIUS server for the SE to use.

You can enable RADIUS authentication and other authentication methods at the same time. You can specify which method to use first using the primary keyword. When local authentication is disabled, if you disable all other authentication methods, local authentication is re-enabled automatically.

You can use the SE GUI or the CLI to enable RADIUS authentication and authorization on an SE.


Tip From the SE GUI, choose Devices > General Settings > Authentication. Use the displayed Authentication Configuration window.


To use the SE CLI to enable RADIUS authentication and authorization on an SE, enable RADIUS authentication for normal login mode by entering the authentication login radius global configuration command as follows:

ServiceEngine(config)# authentication login radius enable [primary] [secondary]

Use the authentication configuration radius global configuration command to enable RADIUS authorization as follows:

ServiceEngine(config)# authentication configuration radius enable [primary] [secondary]

Note To disable RADIUS authentication and authorization on an SE, use the no radius-server enable command.


Configuring RADIUS Authentication of HTTP Requests

To configure RADIUS authentication for HTTP requests on an SE, configure the RADIUS server settings on the SE and enable RADIUS authentication for HTTP requests on the SE using the radius-server global configuration command.

Examples

The following example enables the RADIUS client, specifies a RADIUS server, specifies the RADIUS key, accepts retransmit defaults, and excludes the domain name, mydomain.net, from RADIUS authentication. You can verify the configuration with the show radius-server and show rule all commands.

ServiceEngine(config)#radius-server enable
ServiceEngine(config)#radius-server host 172.16.90.121 
ServiceEngine(config)#radius-server key myradiuskey
ServiceEngine(config)#rule action no-auth pattern-list 2 
ServiceEngine(config)#rule pattern-list 2 domain mydomain.net
ServiceEngine#show radius-server
Login Authentication for Console/Telnet/Ftp/SSH Session: enabled
Configuration Authentication for Console/Telnet/Ftp/SSH Session: enabled (secondary)
Radius Configuration:
---------------------
Radius Authentication is on
Timeout = 5
Retransmit = 2
Key = ****
Radius Redirect is off
There is no URL to authentication failure instructions
Servers
-------
IP 172.16.90.121 Port = 1645 
ServiceEngine#show rule all
Rules Template Configuration
----------------------------
Rule Processing Enabled
rule no-auth domain mydomain.net

The following example disables RADIUS authentication on the SE:

ServiceEngine(config)#no radius-server enable

The following example shows how to force the SE to try RADIUS authentication first:

ServiceEngine(config)# authentication login radius enable primary

Related Commands

debug authentication user
rule
show radius

rcp

To enable the Remote Copy Program (RCP), use the rcp global configuration command. To disable RCP, use the no form of this command.

rcp enable

no rcp enable

Syntax Description

enable

Enables RCP services.


Defaults

No default behavior or values.

Command Modes

Global configuration

Examples

The following example shows how to enable RCP:

ServiceEngine(config)# rcp enable

Related Commands

show rcp

rea

To initiate the remote execution agent, use the rea EXEC command.

rea {start | stop}

Syntax Description

start

Starts the remote execution agent services.

stop

Stops the remote execution agent services.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example shows the remote execution agent services being started.

ServiceEngine(config)# rea start

Related Commands

show rea

reload

To halt and perform a cold restart on the SE, use the reload EXEC command.

reload [force]

Syntax Description

force

(Optional) Forces a reboot without further prompting.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

To reboot the SE, use the reload command. If the current running configuration is different from the startup configuration and if the configuration changes are not saved to flash memory, you are prompted to save the current running configuration parameters to the startup configuration.

To save any file system contents to disk from memory before a restart, use the cache synchronize command.

Examples

The following example reloads the SE after you have saved the configuration changes.

ServiceEngine#reload
System configuration has been modified. Save?[yes]:yes
Proceed with reload?[confirm]yes
Shutting down all services, will timeout in 15 minutes.
reload in progress .....

The following example forces a reboot on the SE:

ServiceEngine#reload force

Related Commands

cache synchronize
write
write erase

rename

To rename a file on the SE, use the rename EXEC command.

rename oldfilename newfilename

Syntax Description

oldfilename

Original filename.

newfilename

New filename.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command to rename any sysfs file without making a copy of the file.

Examples

The following example renames a file named errlog.txt as old_errlog.txt:

ServiceEngine#rename errlog.txt old_errlog.txt

Related Commands

cpfile

restore

To restore the device to its manufactured default status, removing the user data from the disk and flash memory, use the restore EXEC command. This command erases all existing content on the device.

restore factory-default [preserve basic-config]

Syntax Description

factory-default

Resets the device configuration and data to their manufactured default status.

preserve

(Optional) Preserves certain configurations and data on the device.

basic-config

Selects basic network configurations.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command to restore data on disk and in flash memory to the factory default, while preserving particular time-stamp evaluation data. You need to enter this command from the root directory, or else the following error message is displayed:

ServiceEngine#restore factory-default                       
Need to cd to / before issuing this command
Command aborted.
SERVICEENGINE#

Be sure to back up the CDSM database and copy the backup file to a safe location that is separate from that of the CDSM, or change over from the primary to a standby CDSM before you use the restore factory-default command on your primary CDSM. The primary CDSM operation must be halted before proceeding with backup and restore commands.


Caution This command erases user-specified configuration information stored in the flash image and removes the data on the disk, the user-defined disk partitions, and the entire CDSM database. User-defined disk partitions that are removed include the sysfs and cdnfs partitions. The configuration being removed includes the starting configuration of the device.

By removing the CDSM database, all configuration records for the entire CDS network are deleted. If you do not have a valid backup file or a standby CDSM, you must use the cms deregister force command and reregister every SE and SR after you have reconfigured the CDSM, because all previously configured data is lost.

If you used your standby CDSM to store the database while you reconfigured the primary, you can simply register the former primary as a new standby CDSM.

If you created a backup file while you configured the primary CDSM, you can copy the backup file to this newly reconfigured CDSM and use the cms database restore command.


Caution If you upgraded your software after you received your software recovery CD-ROM, using the CD-ROM software images may downgrade your system.

Cisco Internet Streamer CDS software consists of three basic components:

Disk-based software

Flash-based software

Hardware platform cookie (stored in flash memory)

All of these components must be correctly installed for Cisco Internet Streamer CDS software to work properly.

Examples

The following two examples show the results of using the restore factory-default and restore factory-default preserve basic-config commands. Because configuration parameters and data are lost, prompts are given before initiating the restore operation to ensure that you want to proceed.


Note If you use the restore factory-default preserve basic-config command, the configuration for the primary interface is not preserved. On a device running the Internet Streamer CDS Release 2.x software, if you want to re-enable the CDS network after using the restore factory-default preserve basic-config command, make sure to reconfigure the primary interface after the factory defaults have been restored.


CDSM# restore factory-default 
This command will wipe out all of data on the disks
and wipe out CDS CLI configurations you have ever made.
If the box is in evaluation period of certain product,
the evaluation process will not be affected though.
It is highly recommended that you stop all active services
before this command is run.
Are you sure you want to go ahead?[yes/no]
CDSM# restore factory-default preserve basic-config 
This command will wipe out all of data on the disks
and all of CDS CLI configurations except basic network 
configurations for keeping the device online.
The to-be-preserved configurations are network interfaces,
default gateway, domain name, name server and hostname.
If the box is in evaluation period of certain product,
the evaluation process will not be affected.
It is highly recommended that you stop all active services
before this command is run.
Are you sure you want to go ahead?[yes/no]

Note You can enter basic configuration parameters (such as the IP address, hostname, and name server) at this point or later through entries in the command-line interface.


The following example shows that entering the show disk command after the restore command verifies that the restore command has removed data from the partitioned file systems (sysfs and cdnfs):

ServiceEngine#show disk
SYSFS        0.0GB        0.0%
CDNFS       0.0GB        0.0%
FREE        29.9GB      100.0%

Because flash memory configurations were removed after the restore command was used, the show startup-config command does not return any flash memory data. The show running-config command returns the default running configurations.

The show wmt commands continue to display the same license evaluation periods as before the restore factory-default command was invoked, because the evaluation period is not affected by this restore command. For example, if there were 21 days remaining in the evaluation period before the restore factory-default command was used, there would continue to be 21 days remaining in the evaluation period.

Related Commands

cms database backup
cms database restore
show disks
show rtsp server real-subscriber
show running-config
show startup-config
show wmt

rmdir

To delete a directory, use the rmdir EXEC command.

rmdir directory

Syntax Description

directory

Name of the directory that you want to delete.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command to remove any directory from the SE file system. The rmdir command removes only empty directories.

Examples

The following example removes the oldfiles directory under /local1:

ServiceEngine#rmdir /local1/oldfiles

Related Commands

lls
ls
mkdir

rtsp

To configure the Real-Time Streaming Protocol (RTSP)-related parameters, use the rtsp global configuration command. To disable individual options, use the no form of this command.

rtsp {advanced ip address {bypass-gateway movie-streamer | max-initial-setup-delay time_delay | max-request-rate num}| ip-address ip address}

no rtsp {advanced ip address {bypass-gateway movie-streamer | max-initial-setup-delay time_delay | max-request-rate num}| ip-address ip address}

Syntax Description

advanced

Performs advanced configuration of the RTSP gateway.

ip address

The IP address of RTSP gateway.

bypass-gateway

Allows bypassing the RTSP gateway for RTSP requests.

movie-streamer

Allows bypassing the RTSP gateway for Movie Streamer RTSP requests.

max-initial-setup-delay

Specifies the maximum delay in seconds between the TCP accept and first RTSP message from the client. The default is 10 seconds.

time_delay

The RTSP advanced maximum initial setup delay in seconds (0-2147483647).

max-request-rate

Specifies the maximum incoming requests allowed by the RTSP Gateway per second.

num

The maximum requests per second (1-2147483647).

ip-address

Configures the IP address for the RTSP gateway.

ip-address

The IP address of the RTSP gateway.


Defaults

max-initial-setup-delay time_delay: 10 seconds

max-request-rate num: 40 requests

Command Modes

Global configuration

Usage Guidelines

RTSP is a standard Internet streaming control protocol (RFC 2326). It is an application-level protocol that controls the delivery of data with real-time properties, such as video and audio. Apple QuickTime, Real Networks, and the Cisco Streaming Engine use RTSP as the streaming control protocol.

Live Streaming with the Cisco Streaming Engine

The Internet Streamer CDS software supports live streaming content with many kinds of network topologies and deployment scenarios. This feature allows the integration of streaming content from Cisco IP/TV Servers and QuickTime live broadcast servers with the CDS network. Support for broadcast of playlists is included (except for SEs at the network edge), allowing you to convert one or more disk files into a playlist and to send them out through simulated live streaming.

An RTSP source is a fully qualified RTSP URL that references an external streaming server, such as a parent SE, which provides the corresponding RTSP request point.

RTSP Gateway

The RTSP gateway is a process that runs on the SE. The RTSP gateway accepts an RTSP request and performs the initial RTSP handshake with RTSP-based clients (for example, Windows Media  9 players) on behalf of the back-end RTSP servers (for example, the WMT RTSP server) that are running on the SE.

For every RTSP request, the RTSP gateway examines the following properties of the request:

The URL and its position in the Unified Name Space (UNS)

The user agent

The IP address of the final destination

The media type

After the successful completion of uniformity checks, the RTSP gateway tunnels the request to the appropriate back-end RTSP server that is running on the SE. The RTSP gateway can tunnel the request to RealProxy, RealSubscriber, or the Cisco Streaming Engine on the SE, depending on the requested media type, the back-end RTSP servers that are currently enabled on the SE, and the media player that is requesting the content.

After the RTSP gateway tunnels the request to a particular back-end RTSP server that is running on the SE and the back-end server and the client negotiate the UDP ports, the RTSP gateway continues with RTSP message passing (SETUP). When the RTSP client issues a PLAY request, the streaming server starts streaming the data to the client over UDP.

Based on the properties of the incoming request, including user agent, final destination, and media file type, the RTSP gateway performs the following tasks with SEs:

Forwards the incoming request to the appropriate back-end RTSP server that is running on the SE. The incoming request goes to the WMT RTSP server if the client is a Windows Media 9 player. The SE uses the IETF standard RTSP protocol and proprietary Microsoft extensions to serve the content to Windows Media 9 players.

Redirects the incoming request.

Rejects the incoming request.

If the SE is registered with a CDSM, the RTSP gateway also redirects the incoming requests to other content distributors (for example, RealSubscriber or Cisco Streaming Engine) that are configured on the SE.

Network Address Translation (NAT) is designed for IP address simplification and conservation because it enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private addresses in the internal network into legal addresses before packets are forwarded onto another network. As part of this functionality, NAT can be configured to advertise only one external address for the entire network. This configuration provides additional security, effectively hiding the entire internal network from the world behind that address. NAT has the dual functionality of security and address conservation and is typically implemented in remote access environments.


Note If the SE is behind a NAT-enabled router, you must specify the IP address of the RTSP gateway that is running on the SE. By default, no IP address is specified.


Default RTSP Gateway Settings

The RTSP gateway is automatically enabled on the SE and cannot be disabled with a command. Table 2-12 lists the default settings for the RTSP gateway.

Table 2-12 Default Settings for the RTSP Gateway 

RTSP Gateway Setting
Default Setting

IP address of RTSP gateway

Not specified

Incoming RTSP port

Port 554

Incoming RTSP request rate

40 requests per second

Layer 4 switching

Not enabled

Maximum initial setup delay

10 seconds

Maximum request rate

40 requests per second


By default, the RTSP gateway is always enabled on an SE and cannot be disabled by entering a CLI command. As Table 2-12 shows, the RTSP gateway has a set of default settings. You only need to change these default settings under the following conditions:

You want to configure the RTSP gateway to listen for incoming RTSP requests on a port other than the default port (port 554).

The SE is behind a NAT-enabled router. In this case, you must specify the IP address of the RTSP gateway. By default, an IP address for the RTSP gateway is not specified.


Note A description of the Real-Time Streaming Protocol (RTSP) is available as IETF RFC 2326.


Examples

The following example shows how to set up the Movie Streamer RTSP bypass gateway:

ServiceEngine(config)#rtsp advanced bypass-gateway movie-streamer

The following example shows how to establish the maximum initial setup delay:

ServiceEngine(config)#rtsp advanced max-initial-setup-delay 15

The following example shows how to establish the maximum request rate:

ServiceEngine(config)#rtsp advanced max-request-rate 50

The following example shows how to assign the RTSP IP address:

ServiceEngine(config)#rtsp ip-address 10.74.61.1

Related Commands

show rtsp

rule

To set the rules by which the SE filters HTTP, HTTPS, and RTSP traffic, use the rule global configuration command. To disable individual options, use the no form of this command.

The general rule command is as follows:

rule {action action-type pattern-list list_num [protocol {all | protocol-type}] | enable | pattern-list list_num pattern-type}

The specific rule commands are as follows:

rule action allow pattern-list list_num [protocol {all | http | rtmp | rtsp}]

rule action block pattern-list list_num [protocol {all | http | rtmp | rtsp}]

rule action generate-url-signature {include-client-src-ip | key-id-owner 1-32 {key-id-number 1-16} {pattern-list 1-512} [protocol {all | http}]}

rule action no-cache pattern-list list_num [protocol {all | http | rtmp | rtsp}]

rule action redirect url pattern-list list_num [protocol {all | http | rtmp | rtsp}]

rule action refresh pattern-list list_num [protocol {all | http }]

rule action replace pattern-list list_num [protocol {all | http | rtmp | rtsp}]

rule action rewrite pattern-list list_num [protocol {all | http | rtmp | rtsp}]

rule action use-icap-service service-name pattern-list list_num [protocol {all | http}]

rule action validate-url-signature {error-redirect-url url | exclude {all error-redirect-url url pattern-list num [protocol {all | http | rtmp | rtsp}] | client-ip error-redirect-url url pattern-list num [protocol {all | http | rtmp | rtsp}] | expiry-time error-redirect-url url pattern-list num [protocol {all | http | rtmp | rtsp}]}}

rule enable

rule pattern-list list-num domain dn_regexp

rule pattern-list list-num group-type {and | or}

rule pattern-list list-num header-field {referer ref_regexp | request-line req_regexp | user-agent ua_regexp}

rule pattern-list list-num src-ip s_ipaddress s_subnet

rule pattern-list list-num url-regex url_regexp

rule pattern-list list-num url-regsub url_regexp url_sub

no rule action {allow pattern-list list_num [protocol {all | http | https | rtsp}] | block pattern-list list_num [protocol {all | http | https | rtsp}] | generate-url-signature {include-client-src-ip | key-id-owner 1-32 {key-id-number 1-16} {pattern-list 1-512} [protocol {all | http}]} | no-cache pattern-list list_num [protocol {all | http | https}] | redirect url pattern-list list_num [protocol {all | http | https | rtsp}] | refresh pattern-list list_num [protocol {all | http | https}] | replace pattern-list list_num [protocol {all | http | https | rtsp}] | rewrite pattern-list list_num [protocol {all | http | https | rtsp}] | use-icap-service service-name pattern-list list_num [protocol {all | http | https}] | validate-url-signature pattern-list error-redirect-url url | exclude {all error-redirect-url url pattern-list num [protocol {all | http | rtmp | rtsp}] | client-ip error-redirect-url url pattern-list num [protocol {all | http | rtmp | rtsp}] | expiry-time error-redirect-url url pattern-list num [protocol {all | http | rtmp | rtsp}]}

no rule enable

no rule pattern-list list-num {domain dn_regexp | group-type {and | or} | header-field {referer ref_regexp | src-ip s_ipaddress s_subnet | url-regex url_regexp | url-regsub url_regexp url_sub}}

Syntax Description

action

Describes the action that the rule is to take.

action-type

Types of actions that you can associate with a defined pattern list.

pattern-list

Configures the pattern list.

list_num

Pattern list number (1-512).

protocol

Specifies the protocol for which this rule is to be matched.

all

Matches this rule with all applicable protocols for this action.

protocol-type

Protocol types that support rule actions, namely, http, https, and rtsp.

Note The term http traffic is used to refer to requests over HTTP including HTTP, FTP over HTTP, and HTTPS over HTTP. The Rules Template is not supported for FTP native requests.

enable

Enables rules processing on the SE.

pattern-type

Types of rule patterns that you can add to a pattern list.

allow

Allows the incoming request that matches the pattern list. This can be used in combination with block actions to allow selective types of requests. Allow does not carry any meaning as a standalone action.

http

Matches this rule with HTTP.

rtmp

Matches this rule with RTMP.

rtsp

Matches this rule with RTSP.

block

Blocks this request and allows all others.

generate-url-signature

Specifies that the SE generates a signed URL that is included in the autogenerated ASX file when content routing is in use and the pattern matches.

include-client-src-ip

Specifies the client IP to be included in the signed URL.

key-id-owner

Specifies the owner of the key (1-32). The key is a shared secret string.

1-32

Specifies the owner of the key.

key-id-number

Specifies the identification number of the key (1-16).

1-16

Specifies the indentification number of the key.

pattern-list

Specifies the number of the pattern list (1-512). Valid patterns are domain, url-regex, or dst-ip.

1-512

Specifies the number of the pattern list.

no-cache

Does not cache the object.

redirect

Redirects the request to the rewritten URL.

url

Redirect URL.

refresh

Revalidates the object with the web server.

replace

Replaces the text string in the object.

rewrite

Rewrites the original request as a specified URL and fetches the rewritten URL on a cache miss.

use-icap-service

Uses a specific ICAP server.

service-name

Service name used for handling a request through an ICAP server.

validate-url-signature

Validates a signed URL.

error-redirect-url

Specifies the error URL.

exclude

Specifies what field in the URL signature must be validated.

all

Specifies both client-ip and expiry time fields will be excluded in validation.

client-ip

Specifies that the client-ip field will be excluded in validation.

expiry-time

Specifies that the expire-time field will be excluded in validation.

domain

Specifies the regular expression to match the domain name.

dn_regexp

Regular expression to be matched with the domain name.

group-type

Specifies whether the pattern list is an AND or OR type.

and

Specifies an AND pattern to the pattern list.

or

Specifies an OR pattern to the pattern list.

header-field

Pattern type—Specifies the header field pattern of the request and substitute replacement pattern.

referer

Specifies the referer request header.

ref_regexp

Regular expression to be matched with the referer request header.

request-line

Specifies the request method line.

req_regexp

Regular expression to be matched with the request method line.

user-agent

Specifies the user agent request header.

ua_regexp

Regular expression to be matched with the User Agent request header.

src-ip

Specifies the source IP address of the request.

s_ipaddress

Source IP address of the request.

s_subnet

Source IP subnet mask.

url-regex

Specifies the regular expression to match a substring of the URL.

url_regexp

Regular expression to be matched with the URL string.

url-regsub

Sets the regular expression to match the URL and replacement pattern.

url_sub

URL string replacement pattern.


Defaults

The default is rule processing disabled.

The group-type pattern is OR by default.

Command Modes

Global configuration

Usage Guidelines

The Rules Template allows you to specify a set of rules, each clearly identified by an action and a pattern. The Rules Template allows you to configure an SE to use specific rules to filter HTTP, HTTPS, and RTSP traffic. A common use of this feature is to configure an SE to block the spread of Internet worms and viruses within an organization by checking whether a requested web page matches the pattern of a known Internet worm and if so then automatically blocking the request.

If you have enabled rules processing on an SE (enabled the Rules Template feature on the SE and configured rules for the SE), the SE checks each incoming client request to determine if a rule pattern matches the requested content. If a rule pattern matches the given request, the SE uses the specified action (policy) to handle this incoming traffic.

The SE can match incoming requests against the following:

Patterns in the IP address of the client requesting the content (source IP address), including the IP address, the network mask, and the port list

Patterns in the IP address of the origin web or media server (destination IP addresses), including the IP address, the network mask, and the port list

Regular expression of the URL

Regular expression of the domain portion of the URL

MIME types of the web object that the client is requesting

Regular expressions symbolizing domain names

Headers that are sent in the request, including the following:

User-agent of the request, which indicates which client software is issuing the request

Referer, which indicates the web page from which the browser jumped to this link

Request line, which indicates the request line itself

You can apply the policies defined in the Rules Template to HTTP (including FTP over HTTP) and HTTPS and to RTSP for streaming media objects. Policies that can be applied include the following:

Allowing a request to be completed

Blocking the request

Overriding the HTTP response header and caching the object

Caching the object depending on the HTTP response header

Bypassing authentication for the request

Replacing the text string

Not caching an object

Bypassing an upstream proxy for the request

Redirecting the request to a different URL

Revalidating the object with the origin server

Rewriting the URL

No URL filtering for the specified HTTP and HTTPS requests

Using a specific ICAP server

Using a specific upstream proxy

Using a specific server for the request


Note To enter a question mark (?) in a rule regular expression from the command-line interface, use the escape character followed by a question mark (?). Use of the escape sequence prevents the command-line interface from displaying context-sensitive help.


Supported Rule Actions per Protocol

For RTSP, the redirect and the redirect_url_for_cdn rule actions are supported for RTSP requests from RealMedia players. These two rule actions are not supported for RTSP requests from Windows Media Players. For example, Windows Media Services 9 (WMS 9) supports theblock, rewrite, and allow rule actions for RTSP requests, but does not support the redirect and redirect_url_for cdn rule actions for RTSP requests.

Supported Action and Pattern Combinations

Not all actions support all patterns for request matching because some patterns do not make sense for some actions.

Understanding Actions and Patterns

A rule is specified by an action and a pattern list. An action is performed on a request if this request matches the pattern list specified in the rule pattern-list command.

An action is something that the SE performs when processing a request; for instance, an action could be blocking the request, using an alternative proxy, and so forth.

A pattern list defines the limits of a request; for instance, a pattern list may specify that the source IP address falls in the subnet range 172.16.*.*.

Rules can be dynamically added, displayed, or deleted from the SE. The rules are preserved across reboots because they are written into persistent storage, such as NVRAM, using the appropriate CLI commands, the SE GUI, or the CDSM GUI. Only the system resources limit the number of rules that the SE can support. Because rules consume resources, the more rules that you define can greatly impact how the SE performs.


Note The number of actions is limited only by available resources. The maximum number of pattern lists is 512. The maximum number of patterns per action is 128. A single pattern list can contain up to 128 patterns of a particular pattern type.


Actions

The Rules Template supports the following types of actions:

Allow—Allows incoming requests that match the pattern list.

This rule action can be used in combination with block actions to allow selective types of requests. Allow does not carry any meaning as a standalone action.

Block—Blocks this request and allows all others.

No-cache—Does not cache this object.

Redirect—Redirects the original request to a specified URL. Redirect is relevant to the RADIUS server only if the RADIUS server has been configured for redirect.

Refresh—For a cache hit, forces an object freshness check with the server.

Replace— Replaces the text string in the object.

Rewrite—Rewrites the original request as a specified URL. The SE searches for the rewritten URL in the cache, and then on a cache miss, fetches the rewritten URL and returns the object transparently to the client. You should use a redirect rule instead of a rewrite rule because of possible performance impacts. The reason for the performance impact is that, for a redirect rule, the SE sends a 302 (Found) message to the client with the new redirect URL. The client issues a separate request to the redirected URL. However, for a rewrite action, the original request URL is rewritten as the specified URL. The URL rewrite could change the domain name of the URL, which necessitates a Domain Name Server (DNS) lookup to find the destination IP address of the new rewritten server to which the request must be sent.

Use-icap-service—Uses a specified ICAP server.

Validate-url-signature—Validates a signed URL.

Actions can be applied to specific protocols or to a set of protocols. If no protocol is configured, then the specified action will be taken for all the traffic that goes through the SE.

Patterns

The Rules Template supports the following pattern types:

Domain—Matches the domain name in the URL or the Host header against a regular expression. For example, .*ibm.* matches any domain name that contains the ibm substring. The \.foo\.com$ domain name matches any domain name that ends with the .foo.com substring.


Note In regular expression syntax, the dollar sign ($) metacharacter directs that a match is made only when the pattern is found at the end of a line.


Group-type—Specifies whether the pattern list is an AND or OR type. The default is OR.

Src-ip—Matches the request's source IP address and netmask. Specify an IP address and a netmask.

URL-regex—Matches the URL against a regular expression. The match is case insensitive. Specify a regular expression.

Header-field—Matches the header field pattern of the request.

Request header field patterns referer, request-line, and user-agent are supported for the actions block, redirect, and rewrite. The referer pattern is matched against the Referer header in the request, the request-line pattern is matched against the first line of the request, and the user-agent pattern is matched against the User-Agent header in the request.

URL-regsub—Matches the URL against a regular expression to form a new URL per pattern substitution specification for the rewrite and redirect actions. The match is case insensitive. The valid substitution index range is from 1 to 9.

If an empty string is given as a replacement pattern, the Referer header is stripped. Stripping of the Referer header occurs in the user-agent pattern.

Multiple patterns can be entered on the same pattern list. If any of them matches the incoming request, the corresponding action is taken.

Multiple patterns for the same pattern list must be entered on different lines.

Rules Template Processing Considerations

Actions and patterns have a predefined order of execution. A group of rules with the same action is always executed either before or after another group of rules with a different action. The block, rewrite, and redirect rule actions support the following additional patterns: request-line, referer, and user-agent regular expressions. The request-line regular expression matches the first line of the request. The user-agent regular expression matches the User-Agent header value of the request. The referer regular expression matches the Referer header value of the request. The order is not affected by the order in which the rules are entered using CLI commands.

Allow and block carry the same precedence. The order of execution depends on the order of configuration between allow and block actions. Other actions always take precedence over allow.

Among rules of the same action, a predefined execution order exists among the rule patterns, which means that within a group of rules of the same action, one group of rules with the same pattern is always executed either before or after another group of rules with a different pattern.

Among all rules of the same action and of the same rules pattern, the rules are evaluated in a Last-Entered-First-Examined fashion (the reverse of the order in which the rules were entered). This order is not affected by the order in which the rules are entered using CLI commands.

Most actions do not have any parameters.

Service Rules for URLs

There are three cases for service rules:

1. If allow rules are configured, then it is an implicit deny.

2. If deny rules are configured then it is implicit allow.

3. If both allow and deny are configured, then it is an implicit allow.

For example, if all URL requests that match HTML are blocked, implicitly, all requests that match other URL requests are allowed.

If all URL requests that match WMV are allowed, implicitly, all request that match other URL requests are blocked.

If both of the above rules are configured, then HTML URL requests are blocked, and all other URL requests are allowed.

Examples

The following example shows that the SE is configured to replace the internal.domain.com string in a request to the server named dummy:

ServiceEngine(config)# rule action rewrite header-field referer internal.domain.com dummy 

The following example shows that if an empty string is given as a replacement pattern, then the referer header is stripped. This rule states that all requests, which have a referer header that indicates a corporate internal server in ABCBigCorp, strip the referer field so that the outside web server does not see the name of the corporate internal server.

ServiceEngine(config)# rule action rewrite header-field referer internal.abcbigcorp.com "" 

The following example shows that the rule pattern-list command is configured to add a pattern to an existing pattern list to perform an action to be defined on destination IP address 172.16.25.25 using the dst-ip pattern:

ServiceEngine#show rule pattern-list 10 all 
Rules Template Configuration
----------------------------
Rule Processing Enabled
Pattern-Lists : 
rule pattern-list 11 dst-ip 172.16.25.25 255.255.255.0
rule pattern-list 11 domain foo.com

The following example shows that the rule action block command is configured and associated with an existing pattern list:

ServiceEngine(config)#rule action block pattern-list 10 protocol all
ServiceEngine#show rule action block 
Rules Template Configuration
----------------------------
Rule Processing Enabled
Actions : 
rule action block pattern-list 10 protocol all 

The following example shows that the rule action block command is configured and associated with an existing pattern list, which lists as its pattern the domain yahoo.com:

ServiceEngine(config)#rule pattern-list 10 domain yahoo.com
ServiceEngine#show rule pattern-list 10 all
Rules Template Configuration
----------------------------
Rule Processing Enabled
Pattern-Lists :
rule pattern-list 10 domain yahoo.com
ServiceEngine(config)#rule action block pattern-list 10 protocol all

In this example, the request (using HTTP) to yahoo.com was denied three times.

The following example shows that the rule action block command (action) blocks all patterns specified with the rule pattern-list 12 command:

ServiceEngine(config)#rule pattern-list 12 domain \.foo.com
ServiceEngine(config)#rule action block pattern-list 12
ServiceEngine(config)#

The following example prevents caching of requests that match a URL request that contains the *cgi-bin* string:

ServiceEngine(config)#rule pattern-list 13 url-regex \.*cgi-bin.*
ServiceEngine(config)#rule action no-cache pattern-list 13
ServiceEngine(config)#

The actions that are to be taken by the rules are configured through the rule action commands. Patterns that are to be matched to a particular pattern that you specify are configured through rule pattern-list commands.

The following example shows how patterns use AND by configuring patterns with the same pattern list number and applying that pattern list to an action:

ServiceEngine(config)#rule action block pattern-list 1
ServiceEngine(config)#rule pattern-list 1 url-regex yahoo
ServiceEngine(config)#rule pattern-list 1 dst-port 80

Other options of the rule command work similarly to the preceding examples.

The following example redirects a request for old-domain-name that has been changed to new-domain-name:

Cache(config)#rule action redirect http://old-domain-name/ pattern-list 1 protocol http
Cache(config)#rule pattern-list 1 url-regsub http://old-domain-name/ 
http://new-domain-name/

The following example redirects requests from an IETF site to a site that is locally mirrored:

Cache(config)#rule action redirect http://www.ietf.org/rfc/(.*)  pattern-list 2 protocol 
http

The following example shows that if the request URL is http://www.ietf.org/rfc/rfc1111.txt, the SE rewrites the URL as http://wwwin-eng.cisco.com/RFC/RFC/rfc1111.txt and sends a 302 Temporary Redirect response with the rewritten URL in the Location header to the client. The browser automatically initiates a request to the rewritten URL.

Cache(config)#rule pattern-list 2 url-regsub http://www.ietf.org/rfc/(.*) 
http://wwwin-eng.cisco.com/RFC/RFC/\1   

The following example redirects all requests for linux.org to a local server in India that is closer to where the SE is located:

Cache(config)#rule action redirect http://linux.org/(.*) pattern-list 3 protocol http 

The following example shows that two URLs are to be matched if the pattern is url-regsub. If the URLs that are given in the action configuration are invalid, a warning is displayed during the configuration of this rule. The action URL is taken when the header field patterns are configured.

Cache(config)#rule pattern-list 3 url-regsub http://linux.org/(.*)  http://linux.org.in/\1   

The following example bypasses requests with cisco.com as the domain from URL filtering:

ServiceEngine(config)#rule action no-url-filtering pattern-list 6 protocol all
ServiceEngine(config)#rule pattern-list 6 domain cisco.com

Related Commands

clear
show rule

script

To execute a script provided by Cisco or check the script for errors, use the script EXEC command.

script {check | execute} file_name

Syntax Description

check

Checks the validity of the script.

execute

Executes the script. The script file must be a sysfs file in the current directory.

file_name

Name of the script file.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The script EXEC command opens the script utility, which allows you to execute Cisco-supplied scripts or check errors in those scripts. The script utility can read standard terminal input from the user if the script you run requires inputs from the user.


Note The script utility is designed to run only Cisco-supplied scripts. You cannot execute script files that lack Cisco signatures or that have been corrupted or modified.


Examples

The following example checks for errors in the script file foo.script:

ServiceEngine#script check foo.script
 Script file foo.script is valid.

service-router

To configure service routing, use the service-router global configuration command. To disable last-resort routing, use the no form of this command.

On the SE:

service-router {keepalive-interval num | service-monitor {number-of-samples {all num | cpu num | disk num | fms num | kmemory num | memory num | wmt num | nic num} | sample-period {all num | cpu num | disk num | fms num | kmemory num | memory num | movie-streamer num | nic num | wmt num} | threshold {all num | cpu num | disk num | failcntdisk num | fms num | kmemory num | memory num | nic num | wmt num} | type {all | cpu | disk | failcntdisk | fms | kmemory | memory | nic | wmt}}}

no service-router

On the SR:

service-router {access-policy enable | content-based-routing {enable | redundant} | dns-ttl num | lastresort {domain name {allow all | alternate name} | error-domain name error-file} | location-based-routing { enable | geo-location-server {primary ip address num | secondary ip address num}} | proximity-based-routing {enable | proximity-cache timeout num | proximity-server ip address num} | redirect-mode { ip-redirect} | service-monitor {number-of-samples {all num | cpu num | disk num | kmemory num | memory num}} | sample-period {cpu num | disk num | failcntdisk num| kmemory num | memory num} | threshold {all num | cpu num | disk num | kmemory num | memory num} | type {all | cpu | disk | kmemory | memory}}

no service-router

Syntax Description

keepalive-interval

Specifies the SR keepalive interval in seconds.

num

Number of seconds (1-120).

service-monitor

Configures Service Monitor related parameters.

number-of-samples

Counts the latest sampled values to be used when calculating average.

all

Sets to all monitor types.

num

Count of latest sampled values to be used when calculating average (1-120).

cpu

Enables the monitor CPU load.

disk

Sets the disk monitor type.

fms

Sets the Flash Media Server (FMS) monitor type.

kmemory

Sets the monitor kernel memory type.

memory

Sets the monitor memory type.

wmt

Sets the Windows Media Technology (WMT) monitor type.

nic

Sets the Network Interface Card monitor type.

sample-period

Configures the time interval between two consecutive samples.

num

Time interval between two consecutive samples in seconds (1-160).

threshold

Configures threshold values.

failcntdisk

Sets the disk failure monitor type.

num

The disk FailureCnt threshold value.

movie-streamer

Sets the Movie Streamer monitor type.

type

Configures the type to be monitored.

access-policy

Configures the service-router access-policy.

enable

Enables access-policy.

content-based-routing

Configures content based routing.

enable

Enables content based routing.

redundant

Specifies the number of redundant copies of the content.

num

Number of redundant copies of the content (1-4).

dns-ttl

Configures Time to Live (TTL) of Domain Name Server (DNS) records issued by SR.

num

Number of seconds (1-60).

lastresort

Configures the lastresort domain.

domain

Configures the domain.

name

Domain name.

allow

Allows the client to be routed through an alternate domain or origin server.

all

Allows all requests.

alternate

Configures an alternate domain.

name

Alternate domain name.

error-domain

Configures error domain.

name

Error domain name.

error-file

Configures error file name.

name

Error file name.

location-based-routing

Configures location-based routing.

enable

Enables location-based routing.

geo-location-server

Configures geo location server IP address and port.

primary

Configures the primary geographical (geo) location server IP address and port.

ip address

IP address of primary geo location server.

num

Port number of primary geo location server.

secondary

Configures the secondary geo location server IP address and port.

ip address

IP address of secondary geo location server.

num

Port number of secondary geo location server.

proximity-based-routing

Configures proximity-based routing.

enable

Enables proximity-based routing.

proximity-cache

Configures proximity cache.

timeout

Configures proximity cache timeout.

num

Proximity cache timeout in seconds (1-86400).

proximity-server

Configures proximity server IP address and port.

ip address

IP address of proximity server.

num

Port number of proximity server (1-65535).

redirect-mode

Configures the service router redirect mode.

ip-redirect

Enables IP redirection.

service-monitor

Configures service monitor parameters.

number-of-samples

Counts the latest sampled values to be used when calculating average.

all

Allows all monitor types.

num

Count of latest sampled values to be used when calculating average (1-120).

cpu

Sets the CPU monitor type.

disk

Sets the disk monitor type.

kmemory

Sets the monitor kernel memory.

memory

Sets the monitor memory.

failcntdisk

Sets the disk failure monitor type.

sample-period

Configures the time interval between two consecutive samples.

threshold

Configures threshold values.

type

Configures the type to be monitored.


Defaults

keepalive-interval: 2 seconds

redundant copies: 1 copy

dns-ttl: 60 seconds

proximity cache timeout: 1800 seconds

sample-period: 1 second

nic sample-period: 3 seconds

number of samples: 2 samples

Command Modes

Global configuration

Usage Guidelines

To configure last-resort routing, use the service-router global configuration command, where domain is the service routing domain name, and alternate is where to route requests.

Last-resort routing is applicable when load-based routing is enabled and all SEs have exceeded their thresholds or all SEs in the domain are offline. The SR can redirect requests to a configurable alternate domain when all SEs serving a client network region are overloaded.


Note If the last-resort domain is not configured and the SE thresholds are exceeded, requests are redirected to the origin server.


Crossdomain Support

When a client requests the content from a portal and the content then makes a request to a different remote domain (or origin server), the request cannot be served unless the origin server or the remote domain has a crossdomain.xml that grants access to the original portal to continue with the streaming.

For example, a client request for abc.com/streaming.html (which has the content), makes a request for cds-origin.com/vod/sample.flv (which is a different domain), then the client must request a crossdomain.xml. The crossdomain.xml allows access to abc.com and can then stream sample.flv. If the cds-origin.com does not have crossdomain.xml, then the request is denied.


Note In the case of Flash, the request is made for crossdomain.xml. In the case of Silverlight the request is made for clientaccesspolicy.xml.


Instead of directly going to cds-origin.com, the request first comes to the service router. So when the request for crossdomain.xml comes to the service router, it is served to the client. This xml grants access to the portal for the file requested. So the client then sends the request for the file which is served.


Note For Silverlight the client access policy is requested only when web service calls are made. Depending on the client player, for both Silverlight and Flash applications, the clientaccesspolicy.xml and crossdomain.xml need to be provisioned on the origin server.


FLVPlaybackComponent does not currently crossdomain requests for video files. The crossdomain request is issued only when a query string is present. In such cases, the video gets downloaded but does not play.

The number of the HTTP Requests (normal) in Request Received ("show statistics service-router summary") should increase.

Examples

The following example shows how to configure the keepalive interval:

ServiceRouter(config)#service-router keepalive-interval 2 

The following example shows how to configure the service monitor type:

ServiceRouter(config)#service-router service-monitor type all 

Crossdomain Support

The following example shows how to enable crossdomain support:

ServiceEngine(config)#service-router access-policy enable

The following example shows how to disable crossdomain support:

ServiceEngine(config)#no service-router access-policy enable

Related Commands

show service-router

setup

To configure basic configuration settings (general settings, device network settings, and disk configuration) on the SE and a set of commonly used caching services, use the setup EXEC command. You can also use the setup EXEC command to complete basic configuration after upgrading.

setup

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example shows the part of the output when you enter the setup EXEC command on an SE running the Internet Streamer CDS software:

ServiceEngine#setup
Here is the current profile of this device
CDN device                    : Yes
Do you want to change this (y/n) [n]:
Press the ESC key at any time to quit this session

show access-lists

To display the access control list (ACL) configuration, use the show access-lists 300 EXEC command.

show access-lists 300

Syntax Description

None

Command Default

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-13 describes the fields shown in the show access-lists 300 display.

Table 2-13 show access-lists Field Descriptions

Field
Description

Access Control List Configuration

Access Control List is enabled

Configuration status of the access control list option.

Groupname and username-based List

Lists the group name-based access control lists.


Related Commands

access-lists

show acquirer

To display the acquirer information and progress of content acquisition for a specified channel number or name, use the show acquirer EXEC command.

show acquirer [delivery-service {delivery-service-id delivery-service-id | delivery-service-name delivery-service-name} | progress {delivery-service-id delivery-service-id | delivery-service-name delivery-service-name} | proxy authentication]

Syntax Description

delivery-service

Displays acquirer information for the delivery service.

delivery-service-id

(Optional) Displays the ID for the delivery service.

delivery-service-id

Delivery service ID.

delivery-service-name

(Optional) Displays the name for the delivery service.

delivery-service-name

Delivery service name.

progress

(Optional) Displays the acquisition progress for the specified channel.

proxy

(Optional) Displays the proxy information for the acquirer.

authentication

Displays the proxy authentication details for the acquirer.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The show acquirer progress command displays information for all channels for which the SE is the root SE. It displays the number of acquired objects in relation to the total number of objects for both a single item or crawler jobs. When an acquisition is in progress, it displays the number of data bytes currently being downloaded in relation to the total size of the object and its URL. The show acquirer progress command also displays information about the authentication that allows the acquirer to access content through a transparent or nontransparent proxy server.

The show acquirer proxy authentication command displays the proxy authentication configuration for the acquirer if you have enabled content acquisition through a proxy server and proxy authentication is configured. Use the acquirer proxy authentication outgoing global configuration command to configure authentication when you enable content acquisition through a proxy server. You must first configure the proxy host and the port using the http proxy outgoing host global configuration command.

When you enable content acquisition through a proxy server, you can provide the proxy configuration and proxy authentication information in the manifest file. If the proxy and proxy authentication are configured in the manifest file, the show acquirer proxy authentication command does not display any proxy details.

Examples

The show acquirer progress EXEC command displays the progress of the acquirer for a specified channel. If a specific channel is not mentioned, the display shows the progress for all the channels for which the SE is the root.

Table 2-14 describes the fields shown in the show acquirer progress display.

Table 2-14 show acquirer progress Field Descriptions 

Field
Description

Channel-id

Numerical identifier for the channel.

Channel-Name

Name for the channel.

Acquired Single Items

Total number of single items completed out of all of the single items specified in the manifest. For example, 200/301 shows that all 200 items out of a total of 301 items have been acquired.

Acquired Crawl Items

Total number of links with crawling completed out of the total crawlable items for each crawling task specified in the manifest, along with the starting URL.

Download Size (Bytes)

Current URL fetched by the acquirer for the channel, if applicable, along with the file size details.


The following example shows the output from the show acquirer proxy authentication command when there are no proxies configured using the acquirer proxy authentication global configuration command:

ServiceEngine#show acquirer proxy authentication
No proxy authentication information configured

The following example shows the output from the show acquirer proxy authentication command after configuring the proxy using the acquirer proxy authentication global configuration command:

ServiceEngine#show acquirer proxy authentication
acquirer proxy authentication outgoing 172.28.225.29 8080 admin password **** My-Domain 
basic-auth-disable     
acquirer proxy authentication transparent admin password **** My-Domain basic-auth-disable 

Related Commands

acquirer (global configuration)
http
show statistics acquirer

show alarms

To display information on various types of alarms, their status, and history, use the show alarms EXEC command.

show alarms [critical [detail [support]] | detail [support] | history [[start_num [end_num [detail [support]] | detail [support]]] | critical [start_num [end_num [detail [support]] | detail [support]]] | detail [support] | major [start_num [end_num [detail [support]] | detail [support]]] | minor [start_num [end_num [detail [support]]] | detail [support]]] | major [detail [support]] | minor [detail [support]] | status]

Syntax Description

critical

(Optional) Displays critical alarm information.

detail

(Optional) Displays detailed information for each alarm.

support

(Optional) Displays additional information about each alarm.

history

(Optional) Displays information about the history of various alarms.

start_num

(Optional) Alarm number that appears first in the alarm history.

end_num

(Optional) Alarm number that appears last in the alarm history.

major

(Optional) Displays information about major alarms.

minor

(Optional) Displays information about minor alarms.

status

(Optional) Displays the status of various alarms and alarm overload settings.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The Node Health Manager enables CDS applications to raise alarms to draw attention to error or significant conditions. The Node Health Manager, which is the data repository for such alarms, aggregates the health and alarm information for the applications, services (for example, the cache service), and resources (for example, disk drives) that are being monitored on the SE. For example, the Node Health Manager gives you a mechanism to determine if a monitored application (for example, the HTTP proxy caching service) is alive on the SE. These alarms are referred to as Internet Streamer CDS software alarms.

The Internet Streamer CDS software uses SNMP to report error conditions by generating SNMP traps. In the Internet Streamer CDS software, the following SE applications can generate an Internet Streamer CDS software alarm:

Node Health Manager (alarm overload condition and Node Manager aliveness)

Node Manager for service failures (aliveness of monitored applications)

System Monitor (sysmon) for disk failures

The three levels of alarms in the Internet Streamer CDS software are as follows:

Critical—Alarms that affect the existing traffic through the SE and are considered fatal (the SE cannot recover and continue to process traffic).

Major—Alarms that indicate a major service (for example, the cache service) has been damaged or lost. Urgent action is necessary to restore this service. However, other node components are fully functional and the existing service should be minimally impacted.

Minor—Alarms that indicate that a condition that will not affect a service has occurred but corrective action is required in order to prevent a serious fault from occurring.

You can configure alarms using the snmp-server enable traps alarm global configuration command.

Use the show alarms critical EXEC command to display the current critical alarms being generated by the Internet Streamer CDS software applications. Use the show alarms critical detail EXEC command to display additional details for each of the critical alarms being generated. Use the show alarms critical detail support EXEC command to display an explanation about the condition that triggered the alarm and how you can find out the cause of the problem. Similarly, you can use the show alarms major and show alarms minor EXEC commands to display the details of major and minor alarms.

Use the show alarms history EXEC command to display a history of alarms that have been raised and cleared by the Internet Streamer CDS software on the SE. The Internet Streamer CDS software retains the last 100 alarm raise and clear events only.

Use the show alarm status EXEC command to display the status of current alarms and the SE's alarm overload status and alarm overload configuration.

Examples

Table 2-15 describes the fields shown in the show alarms history display.

Table 2-15 show alarms history Field Descriptions

Field
Description

Op

Operation status of the alarm. Values are R-Raised or C-Cleared.

Sev

Severity of the alarm. Values are Cr-Critical, Ma-Major, or Mi-Minor.

Alarm ID

Type of event that caused the alarm.

Module/Submodule

Software module affected.

Instance

Object that this alarm event is associated with. For example, for an alarm event with the Alarm ID disk_failed, the instance would be the name of the disk that failed. The Instance field does not have pre-defined values and is application specific.


Table 2-16 describes the fields shown in the show alarms status display.

Table 2-16 show alarms status Field Descriptions 

Field
Description

Critical Alarms

Number of critical alarms.

Major Alarms

Number of major alarms.

Minor Alarms

Number of minor alarms.

Overall Alarm Status

Aggregate status of alarms.

Device is NOT in alarm overload state.

Status of the device alarm overload state.

Device enters alarm overload state @ 999 alarms/sec.

Threshold number of alarms per second at which the device enters the alarm overload state.

Device exits alarm overload state @ 99 alarms/sec.

Threshold number of alarms per second at which the device exits the alarm overload state.

Overload detection is enabled.

Status of whether overload detection is enabled on the device.


Related Commands

alarm overload-detect
snmp-server enable traps

show arp

To display the Address Resolution Protocol (ARP) table, use the show arp EXEC command.

show arp

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The show arp command displays the Internet-to-Ethernet address translation tables of the Address Resolution Protocol. Without flags, the current ARP entry for the hostname is displayed.

Table 2-17 describes the fields shown in the show arp display.

Table 2-17 show arp Field Descriptions 

Field
Description

Protocol

Type of protocol.

Address

Ethernet address of the hostname.

Flags

Current ARP flag status.

Hardware Addr

Hardware Ethernet address given as six hexadecimal bytes separated by colons.

Type

Type of wide-area network.

Interface

Type of Ethernet interface.


show authentication

To display the authentication configuration, use the show authentication EXEC command.

show authentication user

Syntax Description

user

Displays the authentication configuration for the user login to the system.


Defaults

No default behavior or values.

Command Modes

EXEC

Related Commands

authentication
authentication
clear
show statistics authentication

show authsvr

To display the status of the Authorization server, use the show authsvr EXEC command.

show authsvr [unknown-server]

Syntax Description

unknown-server

(Optional) Shows the allow and deny rule for unknown configured servers or domains.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example shows the status of the Authorization server:

ServiceEngine#show authsvr
Authserver is Enabled

Related Commands

authsvr

show bandwidth

To display the bandwidth allocated to a particular device, use the show bandwidth EXEC command.

show bandwidth [flash-media-streaming | movie-streamer | wmt]

Syntax Description

flash-media-streaming

(Optional) Displays the Flash media streaming bandwidth settings.

movie-streamer

(Optional) Displays the Movie Streamer bandwidth settings.

wmt

(Optional) Displays Windows Media Technology (WMT) bandwidth settings.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-18 describes the fields shown in the show bandwidth display.

Table 2-18 show bandwidth Field Descriptions 

Field
Description

Module

Types of application servers for which bandwidth allocation is displayed:

wmt incoming is for incoming WMT streaming content requests from end users.

wmt outgoing is for outgoing WMT media from SEs.

movie-streamer incoming is for incoming Movie Streamer content requests from end users.

movie-streamer outgoing is for outgoing Movie Streamer media from SEs.

flash-media-streaming is for Flash Media Streaming.

Bandwidth Kbps

Maximum amount of bandwidth that you want allowed in kilobits per second (kbps) for a particular period of time. Incoming and outgoing bandwidth enforced is 8000000 kbps.

Start Time

Time of the day for the bandwidth rate setting to begin, using a 24-hour clock in local time on the SE (hh:mm).

End Time

Time of the day for the bandwidth rate setting to end, using a 24-hour clock in local time on the SE (hh:mm).

Default Bandwidth Kbps

Amount of default bandwidth (in kbps). The default bandwidth is the amount of bandwidth associated with each content service type when there is no scheduled bandwidth.

Max Bandwidth Kbps

Maximum bandwidth (in kbps) permitted by the system license. This bandwidth specifies the upper limit of allowable bandwidth.


Related Commands

bandwidth (global configuration)

show banner

To display information on various types of banners, use the show banner EXEC command.

show banner

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-19 describes the fields shown in the show banner display.

Table 2-19 show banner Field Descriptions

Field
Description

Banner is enabled.

Configuration status of the banner feature.

MOTD banner is: abc

Displays the configured message of the day.

Login banner is: acb

Displays the configured login banner.

Exec banner is: abc

Displays the configured EXEC banner.


Related Commands

banner

show bitrate

To display the bit rate allocated to a particular device, use the show bitrate EXEC command.

show bitrate [movie-streamer | wmt]

Syntax Description

movie-streamer

(Optional) Displays the Movie Streamer bit rate settings.

wmt

(Optional) Displays Windows Media Technology (WMT) bit rate settings.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-20 describes the fields shown in the show bitrate display.

Table 2-20 show bitrate Field Descriptions 

Field
Description

Module

Types of application servers for which the bit rate is displayed:

wmt outgoing is the maximum bit rate per WMT stream that can be served by the SE.

wmt incoming is the maximum bit rate per WMT stream that can be received by the SE.

movie-streamer outgoing is the maximum bit rate per streamer that can be served by the SE.

movie-streamer incoming is the maximum bit rate per streamer that can be received by the SE.

Default Bitrate Kbps

Bit rate associated with the application servers when the bit rate has not been configured on the SE.

Configured Bitrate Kbps

Bit rate configured on the SE in kilobits per second.


Related Commands

bitrate

show cache

To display a list of cached contents, use the show cache EXEC command.

show cache [content num]

Syntax Description

content

Displays a list of cached contents in order of decreasing priority.

num

Specifies number of cached contents to be displayed (1-1000).


Defaults

Number of cached contents is 100.

Command Modes

EXEC

Usage Guidelines

The show cache command allows users to check the cached content in an SE. Users can also view the priority, size, and URL information through this command.

Examples

The following example shows the cached contents:

ServiceEngine#show cache content 1000
Max-cached-entries is set as 1000
Number of cal cached assets: 12
------------------------------------------------
Priority    Size         URL
------------------------------------------------
1.09887e+00 16           rtsp://72.163.255.118/c.wmv
1.04340e+00 416          rtsp://72.163.255.118/c.wmv.Ui4HeLMPgB5lLH_+bo2d.03.bmp
6.71782e-01 957          rtsp://72.163.255.118/c.wmv.hdr
5.74964e-01 16           rtsp://72.163.255.118/4.wmv
5.60340e-01 664997       rtsp://72.163.255.118/c.wmv.Ui4HeLMPgB5lLH_+bo2d.03
3.15230e-01 665107       http://72.163.255.118/c.wmv
2.39938e-01 5409         rtsp://72.163.255.118/4.wmv.hdr
2.02040e-01 35256        rtsp://72.163.255.118/4.wmv.rPgfTr1Lo0dT6FJWaxDs.03.bmp
1.59027e-01 873664       http://72.163.255.118/4.flv
1.45368e-01 3603032      http://72.163.255.118/b.wmv
1.23161e-01 70517409     rtsp://72.163.255.118/4.wmv.rPgfTr1Lo0dT6FJWaxDs.03
7.88076e-02 29180088     http://72.163.255.118/4.wmv

Related Commands

cache

show capability

To display the capabilities of the Cap-X profile ID, use the show capability EXEC command.

show capability profile ID profile ID

Syntax Description

profile ID

Displays information for the Cap-X profile.

profile ID

Profile ID number. The range is 1-65535.


Defaults

No default behavior or values.

Command Modes

EXEC

Related Commands

capability

show cdnfs

To display CDS network file system (cdnfs) information, use the show cdnfs EXEC command.

show {cdnfs volumes | usage}

Syntax Description

volumes

Displays CDS network file system volumes.

usage

Displays Content Delivery Network (CDN) current usage.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-21 describes the fields shown in the show cdnfs volumes display.

Table 2-21 show cdnfs volumes Field Descriptions

Field
Description

cdnfs 00-04

CDS network file system and disk number.

nnnnnnKB

Size of the volume in kilobytes.


Related Commands

cdnfs
disk
(EXEC)
show disks
show statistics cdnfs

show clock

To display the system clock, use the show clock EXEC command.

show clock [detail | standard-timezones {all | details timezone | regions | zones region-name}]

Syntax Description

detail

(Optional) Displays detailed information; indicates the Network Timing Protocol (NTP) clock source and the current summer time setting (if any).

standard-timezones

(Optional) Displays information about the standard time zones.

all

Displays all of the standard time zones (approximately 1500 time zones). Each time zone is listed on a separate line.

details

Displays detailed information for the specified time zone.

timezone

Name of the time zone.

regions

Displays the region name of all the standard time zones. All 1500 time zones are organized into directories by region.

zones

Displays the name of every time zone that is within the specified region.

region-name

Name of the region.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The CDS has several predefined standard time zones. Some of these time zones have built-in summertime information while others do not. For example, if you are in an eastern region of the United States (US), you must use the US/Eastern time zone that includes summertime information and will adjust the clock automatically every April and October. There are about 1500 standard time zone names.

The clock summertime command is disabled when a standard time zone is configured. You can only configure summertime if the time zone is not a standard time zone (if the time zone is a customized zone).

In addition, CLI commands exist to enable you to display a list of all the standard time zones. The show clock standard-timezones all EXEC command enables you to browse through all standard time zones and choose from these predefined time zones. You can choose a customized name that does not conflict with the predefined names of the standard time zones. Most predefined names of the standard time zones have two components, a region name and a zone name. You can list time zones by several criteria, such as regions and zones.

Examples

Table 2-22 describes the field in the show clock display.

Table 2-22 show clock Field Description

Field
Description

Local time

Day of the week, month, date, time (hh:mm:ss), and year in local time relative to the UTC offset.


Table 2-23 describes the fields shown in the show clock detail display.

Table 2-23 show clock detail Field Descriptions

Field
Description

Local time

Local time relative to UTC.

UTC time

Coordinated Universal Time (UTC) date and time.

Epoch

Number of seconds since Jan. 1, 1970.

UTC offset

UTC offset in seconds, hours, and minutes.


The following example shows an excerpt of the output from the show clock standard-timezones all EXEC command. As the following example shows, all of the standard time zones (approximately 1500 time zones) are listed. Each time zone is listed on a separate line.

ServiceEngine # show clock standard-timezones all
Africa/Abidjan
Africa/Accra
Africa/Addis_Ababa
Africa/Algiers
Africa/Asmera
Africa/Bamako
Africa/Bangui
Africa/Banjul
Africa/Bissau
Africa/Blantyre
Africa/Brazzaville
Africa/Bujumbura
Africa/Casablanca
Africa/Ceuta
Africa/Conakry
Africa/Dakar
Africa/Dar_es_Salaam
Africa/Djibouti
.
.

ServiceEngine(config)#

The following example shows an excerpt of the output from the show clock standard-timezones region EXEC command. As the example shows, all first level time zone names or directories are listed. All 1500 time zones are organized into directories by region.

ServiceEngine # show clock standard-timezones regions
Africa/
America/
Antarctica/
Arctic/
Asia/
Atlantic/
Australia/
Brazil/
CET
.
.
.

The following example shows an excerpt of the output from the show clock standard-timezones zones EXEC command. As the following example shows, this command lists the name of every time zone that is within the specified region (for example, the US region).

ServiceEngine # show clock standard-timezones zones US
Alaska
Aleutian
Arizona
Central
East-Indiana
Eastern
Hawaii
Indiana-Starke
Michigan
Mountain
Pacific
Samoa

The following example shows an excerpt of the output from the show clock standard-timezones details EXEC command. This command shows details about the specified time zone (for example, the US/Eastern time zone). The command output also includes the standard offset from the Greenwich mean time (GMT).

ServiceEngine # show clock standard-timezones details US/Eastern
US/Eastern is standard timezone.
Getting offset information (may take a while) ...
Standard offset from GMT is -300 minutes (-5 hour(s)).
It has built-in summertime.
Summer offset from GMT is -240 minutes. (-4 hour(s)).

Related Commands

clock (EXEC)

clock (global configuration

show cms

To display the Centralized Management System (CMS) embedded database content and maintenance status and other information, use the show cms EXEC command.

show cms {database {content {dump filename | text | xml} | maintenance [detail]} | info | processes}

Syntax Description

database

Displays embedded database maintenance information.

content

Writes the database content to a file.

dump

Dumps all database content to a text file.

filename

Name of the file to be saved under local1 directory.

text

Writes the database content to a file in text format.

xml

Writes the database content to a file in XML format.

maintenance

Shows the current database maintenance status.

detail

(Optional) Displays database maintenance details and errors.

info

Displays CMS application information.

processes

Displays CMS application processes.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-24 describes the fields shown in the CDSM show cms info display.

Table 2-24 show cms Field Descriptions for the CDSM 

Field
Description

CDN information

Model

Model name of the device.

Node Id

Unique identifier given to the device by the CDSM at registration, which is used to manage the device.

Device Mode

Configured mode of device used during registration.

Current CDSM role

Role of the current CDSM: Primary or Standby.

CMS services information

Service cms_httpd is running

Status of the cms_httpd management service (running or not running). This field is specific to the CDSM only.

Service cms_cdsm is running

Status of the cms_cdsm management service (running or not running). This field is specific to the CDSM only.


Table 2-25 describes the fields shown in the SE show cms info display.

Table 2-25 show cms Field Descriptions for the SE 

Field
Description

CDN information

Model

Model name of the device.

Node Id

Unique identifier given to the device by the CDSM at registration, which is used to manage the device.

Device Mode

Configured mode of device used during registration.

Current CDSM address

Address of the CDSM as currently configured in the cdsm ip global configuration command. This address may differ from the registered address if a standby CDSM is managing the device instead of the primary CDSM with which the device is registered.

Registered with CDSM

Address of the CDSM with which the device is registered.

Status

Connection status of the device to the CDSM. This field may contain one of three values: Online, Offline, or Pending.

Time of last config-sync

Time when the device management service last contacted the CDSM for updates.


The following example writes the database content to a file in text format:

CDSM# show cms database content text 
Database content can be found in /local1/cms-db-12-12-2002-17:06:08:070.txt.

The following example writes the database content to a file in XML format:

CDSM# show cms database content xml 
Database content can be found in /local1/cms-db-12-12-2002-17:07:11:629.xml.

The following example shows the output of the show cms database maintenance detail on an SE:

ServiceEngine#show cms database maintenance detail
Database maintenance is not running.
Regular database maintenance is enabled.
Regular database maintenance schedule is set on Sun, Mon, Tue, Wed, Thu, Fri, Sat at 02:00
Full database maintenance is enabled.
Full database maintenance schedule is set on Sun, Mon, Tue, Wed, Thu, Fri, Sat at 04:00
Disk usage for STATE partition: Total: 1523564K, Available: 1443940K, Use: 6%
DATABASE VACUUMING DETAILS AND ERRORS
-------------------------------------
Database Vacuuming never performed or it did not complete due to error.
Latest Vacuuming status :No Error
Last Vacuum Error : No Error
Last Reindex Time : Thu Jul 15 02:02:49 2004
Latest Reindexing status :No Error
Last Reindex Error: No Error
ServiceEngine#

Related Commands

cms (EXC)
cms (global configuration)

show content

To display all content entries in the CDS, use the show content EXEC command.

show content {all [background | brief] | url url [brief]}

Syntax Description

all

Displays all cached content into a file.

name

The output file to log cache content query results.

background

(Optional) Run this command in background.

brief

(Optional) Using brief display mode.

url

Displays the cached content object with original URL.

url

The original URL for cache content object query.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

This command allows users to check the cached or pre-positioned content in an SE. Through this command, users can view content attributes such as status and file size.

Examples

The following example displays the RTSP URL in the CDS:

ServiceEngine#show content url rtsp://www.cht.com/CHT_2M.wmv
CAL content object attributes:
URL: rtsp://www.cht.com/CHT_2M.wmv
Status is 2 (Servable)
File size is 16 Bytes
Playable by WMT
Authorization is Not Required
Content is CACHED with priority 0.574964 

The following example displays all content entries in the CDS:

ServiceEngine#show content all name background
Command running in background...
ServiceEngine#USER INFO: Your 'show content all' command finished

show debugging

To display the state of each debugging option, use the show debugging EXEC command.

show debugging

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

This command displays only the type of debugging enabled, not the specific subset of the command.

Examples

In the following example, the debug icp client command coupled with the show debugging command shows that Internet Cache Protocol (ICP) debugging is enabled:

ServiceEngine#debug icp client 
ServiceEngine#show debugging
Debug icp (client) is on

Related Commands

debug
undebug

show device-mode

To display the configured or current mode of a device, use the show device-mode EXEC command.

show device-mode {configured | current}

Syntax Description

configured

Displays the configured device mode.

current

Displays the current device mode.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

If the configured and current device modes differ, a reload is required for the configured device mode to take effect.

Examples

The configured device mode field in the show device-mode configured display shows the device mode that has been configured, but has not yet taken effect. The current device mode field in the the show device-mode current display shows the current mode in which the CDS device is operating.

The following example shows how to use the show device-mode command to show the device mode when you change the device from an SE to an SR using the device mode command:

Acmehost# show device-mode current
Current device mode: service-engine
Acmehost# show device-mode configured
Configured device mode: service-engine
Acmehost(config)#device mode service-router
The new configuration will take effect after a reload
Acmehost(config)#exit
Acmehost# show device-mode current
Current device mode: service-engine
Note: The configured and current device modes differ,
a reload is required for the configured device mode to
take effect.
Acmehost# show device-mode configured
Configured device mode: service-router
Note: The configured and current device modes differ,
a reload is required for the configured device mode to
take effect.
Acmehost# write memory
Acmehost# reload force
...reload...
Acmehost# show running-config
device mode service-router
!
hostname Acmehost
..
Acmehost# show device-mode configured
Configured device mode: service-router
Acmehost# show device-mode current
Current device mode: service-router

Related Commands

device

show direct-server-return

To display the Direct Server return information, use the show direct-server-return EXEC command.

show direct-server-return

Syntax Description

This command has no keywords or arguments.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example displays the Direct Server return information:

ServiceEngine#show direct-server-return
direct-server-return vip 11.11.11.11

Related Commands

direct-server-return

show disks

To view information about your disks, use the show disks EXEC command.

show disks [current | details | raid-state | SMART-info [details]]

Syntax Description

current

(Optional) Displays currently effective configurations.

details

(Optional) Displays currently effective configurations with more details.

raid-state

(Optional) Shows the volume and progress information for the RAID disks.

SMART-info

(Optional) Displays hard drive diagnostic information and information about impending disk failures.

details

(Optional) Displays more detailed SMART disk-monitoring information.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The show disks command displays the names of the disks currently attached to the SE.

Proactively Monitoring Disk Health with SMART

The ability to proactively monitor the health of disks with Self Monitoring, Analysis, and Reporting Technology (SMART) was added. SMART provides you with hard drive diagnostic information and information about impending disk failures.

SMART is supported by most disk vendors and is a standard method used to determine the health of a disk. SMART has several read-only attributes (for example, the power-on hours attribute, the load and unload count attribute) that provide the CDS software with information regarding the operating and environmental conditions that may indicate an impending disk failure.

To display more detailed information, enter the show disks SMART-info details EXEC command. The output from the show disks SMART-info and the show disks SMART-info details commands will differ based on the disk vendor and the type of drive technology (Integrated Drive Electronics [IDE], Small Computer Systems Interface [SCSI], and Serial Advanced Technology Attachment [SATA] disk drives).

Even though SMART attributes are vendor dependent, there is a common way of interpreting most SMART attributes. Each SMART attribute has a normalized current value and a threshold value. When the current value exceeds the threshold value, the disk is considered as failed. The CDS software monitors the SMART attributes and reports any impending failure through syslog messages, SNMP traps, and alarms.

The output from the show tech-support EXEC command also includes SMART information.

Filter Out Multiple Syslog Messages for a Single Failed Sector on SCSI, IDE, and SATA Disk Drives

Many disk failure messages were generated when a single disk sector failed, which caused an unnecessary alarm. Changes for suppressing multiple syslog messages on a single sector failure have been implemented for IDE disk drives. This fix has also been extended to SCSI and SATA disk drives.

Examples

Table 2-26 describes the fields shown in the show disks details display.

Table 2-26 show disks details Field Descriptions

Field
Description

disk00

Availability of the disk: Present, Not present or Not responding, Not used, or (*).

Note Disk drives that are currently marked as bad are shown as "Not used" in the output. Future bad disk drives (drives that will not be used after the next time that the SE is reloaded) are shown with an asterisk (*).

Disk identification number and type.

Disk size in megabytes and gigabytes.

disk01

Same type of information is shown for each disk.

System use

Amount of disk space being used for system use.

Free

Amount of unused disk space available.


SMART support is vendor dependent; each disk vendor has a different set of supported SMART attributes. The following example shows the output from the show disks SMART-info EXEC command that was entered on two different SEs (Service Engine A and Service Engine B). These two SEs contain hard disks that were manufactured by different vendors.

ServiceEngine#show disks SMART-info
=== disk00 ===
smartctl version 5.38 [i686-spcdn-linux-gnu] Copyright (C) 2002-8 Bruce Allen
Home page is http://smartmontools.sourceforge.net/
=== START OF INFORMATION SECTION ===
Device Model: ST3500320NS
Serial Number: 5QM19RKR
Firmware Version: SN04
User Capacity: 500,107,862,016 bytes
Device is: Not in smartctl database [for details use: -P showall]
ATA Version is: 6
ATA Standard is: ATA/ATAPI-6 T13 1410D revision 2
Local Time is: Thu May 21 14:09:19 2009 UTC
SMART support is: Available - device has SMART capability.
SMART support is: Enabled
=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED
RUNNING: /usr/sbin/smartctl /dev/sda -H -i
=== disk01 ===
smartctl version 5.38 [i686-spcdn-linux-gnu] Copyright (C) 2002-8 Bruce Allen
Home page is http://smartmontools.sourceforge.net/
=== START OF INFORMATION SECTION ===
Device Model: ST3500320NS
Serial Number: 5QM19B0B
Firmware Version: SN04
User Capacity: 500,107,862,016 bytes
Device is: Not in smartctl database [for details use: -P showall]
ATA Version is: 6
ATA Standard is: ATA/ATAPI-6 T13 1410D revision 2
Local Time is: Thu May 21 14:09:19 2009 UTC
SMART support is: Available - device has SMART capability.
SMART support is: Enabled
=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED
RUNNING: /usr/sbin/smartctl /dev/sdb -H -i
=== disk02 ===
smartctl version 5.38 [i686-spcdn-linux-gnu] Copyright (C) 2002-8 Bruce Allen
Home page is http://smartmontools.sourceforge.net/
=== START OF INFORMATION SECTION ===
Device Model: ST3500320NS
Serial Number: 5QM19SK9
Firmware Version: SN04
User Capacity: 500,107,862,016 bytes
Device is: Not in smartctl database [for details use: -P showall]
ATA Version is: 6
ATA Standard is: ATA/ATAPI-6 T13 1410D revision 2
Local Time is: Thu May 21 14:09:19 2009 UTC
SMART support is: Available - device has SMART capability.
SMART support is: Enabled
=== START OF READ SMART DATA SECTION ===
SMART overall-health self-assessment test result: PASSED
RUNNING: /usr/sbin/smartctl /dev/sdc -H -i 

Table 2-27 describes some typical fields in the show disks SMART-info display.

Table 2-27 show disks SMART-info Field Descriptions 

Field
Description

disk00—disk05

Shows information for disk drives.

Device Model

Vendor number and version number of the disk.

Serial Number

Serial number for the disk.

Device type

Type of device.

Transport protocol

Physical layer connector information, for example: Parallel SCSI (SPI-4).

Local time is

Day of the week, month, date, time (hh:mm:ss), year, clock standard.

Device supports SMART and SMART is Enabled

Status of SMART support: Enabled or Disabled.

Temperature Warning Enabled

Temperature warning status: Enabled or Disabled.

SMART Health Status:

Health status of the disk: OK or Failed.


Related Commands

disk (EXEC)

show distribution

To display the distribution information for a specified delivery service and to probe a remote SE for the liveness of its associated delivery service, use the show distribution EXEC command.

show distribution [delivery-services {delivery-service-id delivery-service-num | delivery-service-name delivery-service-name}]

show distribution [forwarder-list {delivery-service-id delivery-service-num | delivery-service-name delivery-service-name} | detail]

show distribution [location {forwarder-load-weight | live-load-weight | location-leader-preference} {delivery-service-id delivery-service-num | delivery-service-name delivery-service-name}]

show distribution [object-status object-url]

show distribution [processes]

show distribution [remote ip-address {metadata-sender delivery-service-id delivery-service-num [start-generation-id gen-id end-generation-id gen-id] | unicast-sender delivery-service-id delivery-service-num {cdn-url cdn_url | probe | relative-cdn-url cdn_url}}]

show distribution [remote traceroute {forwarder-next-hop delivery-service-id delivery-service-num {max-hop maxhop_num | trace-till-good | trace-till-root} | unicast-sender delivery-service-id delivery-service-num {cdn-url cdn-url | probe | relative-cdn-url cdn-url} {max-hop maxhop_num | trace-till-good | trace-till-root}}]

Syntax Description

delivery-services

(Optional) Displays information about the specified delivery service.

delivery-service-id

(Optional) Specifies the delivery service ID.

delivery-service-num

Delivery service number (64-bit number).

delivery-service-name

(Optional) Specifies the delivery service name.

delivery-service-name

Delivery service name.

forwarder-list

(Optional) Displays the forwarder lists for all delivery services subscribed to by the SE.

detail

(Optional) Displays detailed forwarder lists for all delivery services subscribed to by the SE.

location

(Optional) Displays delivery service routing-related parameters for the SEs in the location (specified by the delivery service ID).

forwarder-load-
weight

Displays the forwarder load weight value of the SEs in the location (specified by the delivery service ID). For more information, see the "Forwarder Probability" section.

live-load-weight

Displays the live load weight value of the SEs in the location (specified by the delivery service ID). For more information, see the "Live Splitting Probability" section.

location-leader-
preference

Displays the location leader preference value of the SEs in the location (specified by the delivery service ID). For more information, see the "Location Leader Preference" section.

object-status

(Optional) Displays information on the status of a pre-positioned object.

object-url

URL of the pre-positioned object.

processes

(Optional) Displays information on distribution processes.

remote

(Optional) Displays delivery service information about a remote SE.

ip-address

IP address of the remote SE.

metadata-sender

Displays the metadata from a remote SE.

start-generation-id

(Optional) Specifies the beginning database value of the current version of the multicast cloud.

gen_id

Beginning database value.

end-generation-id

Specifies the ending database value of the current version of the multicast cloud.

gen_id

Ending database value.

unicast-sender

Displays the unicast data from a remote SE.

cdn-url

Checks the object on a remote SE using the specified URL.

cdn_url

CDS network URL used to check the object on a remote SE.

probe

Probes the remote unicast sender.

relative-cdn-url

Checks the object on a remote SE using the specified URL.

traceroute

Displays the traceroute for the delivery service routing status.

forwarder-next-hop

Displays the next forwarder in the path for the SE.

Note This keyword lets you display the forwarding SEs to the root SE in a manner similar to the traceroute command.

delivery-service-id

Specifies the delivery service ID with which the unicast sender is associated.

delivery-service-num

Delivery service number of the delivery service with which the unicast sender is associated.

max-hop

Displays the maximum number of hops needed to reach the unicast sender.

maxhop_num

Maximum number of hops (1-1024).

trace-till-good

Allows the device to trace the route of an object until the object is found.

trace-till-root

Allows the device to trace the route of an object until the device reaches the root SE.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use the show distribution remote ip-address metadata-sender delivery-service-id delivery-service-num [start-generation-id gen_id end-generation-id gen_id] command option to retrieve the metadata from a remote SE assigned to a specified delivery service ID. The start and end generation IDs specify the beginning and ending database values representing the current version of the multicast cloud stored in the local database.


Note Generation IDs must be greater than zero. Also, you must specify both the start and the end generation IDs, or neither ID.


The show distribution remote ip-address unicast-sender delivery-service-id delivery-service-num relative-cdn-url cdn-url command shows the status of the relative CDS network URL of an object at a remote SE assigned to a specified delivery service ID. A relative CDS network URL is one that lacks the prefix of the protocol and hostname. For example, the relative CDS network URL for http://www.mycompany.com/abc.def.html is abc.def.html.

Use the show distribution remote ip-address unicast-sender delivery-service-id delivery-service-num probe command to probe a remote SE for the liveness of the delivery service to which it is assigned.

The show distribution object-status object-url command can be used to display the properties of a pre-positioned object.

You can view the location leader preference and forwarder weight for the SE using the show distribution command. However, you can configure the location leader preference and forwarder weight only using the CDSM GUI for each SE. Default values are assumed if you do not manually configure them.

The show distribution location forwarder-load-weight command displays the probability of SEs assigned to the delivery service within the location being selected as a forwarder. The show distribution location location-leader-preference command displays the location leader preference value of SEs that are assigned to the delivery service within the location.

Use the show distribution delivery-services command to view the forwarder for the SEs. If a receiver SE is unable to find its forwarder SE, one of the following reasons is displayed in the Status/Reason column of the output of the show distribution delivery-services command:

LLMT—The home SE cannot find the forwarder because the home SE has a limit on the forwarder lookup level.

FAIL—The home SE cannot find the forwarder because there is a failed SE along the path within the specified forwarder lookup level.

NGWT—The home SE cannot find the forwarder because there is an SE with a negative forwarder-load-weight along the path within the specified forwarder lookup level.

Forwarder Probability

When an SE (location leader) selects its forwarder from an upstream location, it uses the forwarderLoad-weight value configured for each SE in its upstream location. The weight value of each SE corresponds to the probability of the SE being selected as the forwarder.

Each SE generates a unique random number. When an SE needs to select an inter-location forwarder, it views all the SEs in one remote location as a collection, with the size corresponding to their weight. It uses the generated random number to select an SE as a forwarder. SEs with a higher weight are more likely to be selected as forwarders.


Note The forwarderLoad-weight value represents a probabilistic value. When a large number of children SEs select a forwarder from a location, the load on the forwarder represents the weight.


The load on the forwarder is the replication load per delivery service on the SE because all SEs subscribed to the delivery service will select a forwarder to balance the load. However, as the number of SEs assigned to different delivery services might differ, a forwarder might receive requests for content from SEs in other delivery services, which increases the load. Therefore, it is possible that the total load (of replicating content) on the forwarder does not reflect the weight but depends on the number of SEs assigned to a delivery service.

For each SE, you can specify the probability of each SE acting as a forwarder to SEs from downstream locations using the CDSM GUI. You can also specify whether certain SEs should never serve as a forwarder to downstream SEs. The specification is delivery service independent.

If you choose not to configure settings using the Location Leader and Forwarder Settings for SE window, the delivery service routing algorithm uses the random number method to generate one permutation of the SE ID ordered list.

Location Leader Preference

For intra-location (list of SEs in an SE's own location) forwarder selection, the delivery service routing algorithm first creates an ordered list of the SEs based on their location leader-preference in a descending order. Next, the delivery service routing algorithm will select the first SE in the ordered list as the location leader.

When multiple SEs have the same location leader-preference, the delivery service routing algorithm guarantees that all the SEs assigned to each delivery service in the location still generate the same ordered list, which avoids routing loops. A routing loop is a deadlock situation in which the forwarder selection among multiple SEs within the loop prevents the SEs from receiving the content from upstream locations. For example, SE1 uses SE2 as the forwarder and SE2 uses SE1 as the forwarder for the same delivery service.

However, for two different delivery services, the ordered list could be different (when multiple SEs have the same location leader probability value) even if the subscribed SEs are the same. When multiple SEs have the highest location leader-preference, although each SE has an equal chance of acting as the location leader (for different delivery services), only one SE always acts as the location leader for one particular delivery service. If you configure all the SEs in your network to have the same location leader-preference value, then each SE has an equal chance of acting as a location leader. When each SE has an equal probability of being selected as the location leader for any particular delivery service, only one particular SE is always selected as the location leader.


Note If there are two SEs in the same location (SE1, SE2) and both of them are assigned to two delivery services (CH1, CH2), and if you want SE1 to be the location leader for CH1 and SE2 to be the location leader for CH2, you cannot configure them using location leader-preference and forwarderLoad-weight.


In a location, you can specify the probability for each SE acting as the location leader. The specification is delivery service independent.

The following limitations are associated with specifying a location leader preference:

When multiple SEs are configured with the same location leader-preference value and assigned to a delivery service, they have an equal probability of being selected as the location leader. In such a case, you do not have a control mechanism to decide which SE should be selected as the location leader.

Only the order among the SEs with the highest preference is randomized to determine the location leader preference and not other SEs with the same preference value. It is possible that if the SE(s) with the highest preference failed and there are several other SEs with the second highest preference value, they will not be balanced across the different delivery services. The same SE will be the location leader for all delivery services.

If an SE with a high location leader-preference is assigned to many delivery services, it is possible that the SE can be selected as the location leader for all these delivery services.

Live Splitting Probability

Similar to the delivery service routing application used for content replication that assigns weight and priority to SEs to tune location leader and forwarder selections, you can specify a configuration parameter liveSplit-load-weight for each SE. This parameter represents the relative probability that an SE is likely to receive live stream splitting traffic as compared to other SEs. The specification is delivery service independent. If you do not configure liveSplit-load-weight, the algorithm should work as it currently does.

A weighted load balancing scheme splits the live stream load on the SEs according to the liveSplit-load-weight value because SEs of different types have an equal probability of being selected as the splitting SE on the location path.

The liveSplit-load-weight is used when the delivery service routing generates the ordered list of SEs for each location. The SEs are ordered in a way that the higher the weight, the greater probability that the SEs are being ordered at the beginning of the list.

The weight represents a relative value. The liveSplit-load-weight assigned to one SE is compared against the weights of other SEs in the same location.

The weight is a probabilistic value. For one particular URL, all SEs generate the same ordered list for a location.

It is possible that an SE with a lower weight is being ordered at the beginning while an SE with a higher weight is being ordered at the end of the list. The weighted load balancing is useful only when there are multiple live stream URLs.

The liveSplit-load-weight parameter applies both within the home location and upstream locations. This setting is different from the distribution settings where locationLeader-priority controls how you choose SEs from the home location, while forwarderLoad-weight controls how you choose SEs from upstream locations.

Examples

The following examples show various ways of using the show distribution remote commands.

The following example shows the status of the object at a remote SE with the IP address 172.16.2.160 and delivery service ID 631. The URL of the content object specified in the command must not be the complete source URL. Instead, it must be the relative CDS network URL of the object.

ServiceEngine#show distribution remote 172.16.2.160 unicast-sender delivery-service-id 631 
relative-cdn-url 101files/100.txt 
 
     Forwarder-Name :                AD-SE08
       Forwarder-ID :                    140
       Forwarder IP :             2.43.10.70
 Forwarder Location :       default-location
   Relative CDN URL :       101files/100.txt
        Actual Size :                     58
   Size Transferred :                     58
        Resource-ID : roVe2aMzp+YhmbhGUfMPpQ
         Content-ID : 7LC5xOlMp4YvkBJlHaQucQ
Last Modified Time :   10:52:38 Jan 04 2005

The following example retrieves the metadata from a remote SE with the IP address 172.16.2.160 assigned to delivery service ID 4999:

ServiceEngine#show distribution remote 172.16.2.160 metadata-sender delivery-service-id 
4999
Getting meta data for delivery service(4999) from genid -1 to 2
Connecting to 2.43.10.101
Remote SE replied with the following headers:
        Action : Processing metadata records
        Latest Gen id is : 2
        Have more records to process : No
        Is metadata still in full reload: No
add-size: 2, del-size: 0
Add Logs: 1 to 2
        add #1: UBsSUMwbTdJzzpqDvxSdYg.., basic_auth/public.html
        add #2: NJyVL9CZwpnyCfw+Is26yw.., index.txt

The following example probes the remote SE with the IP address 172.16.2.160 for the liveness of its assigned delivery service ID 153:

ServiceEngine#show distribution remote 172.16.2.160 unicast-sender delivery-service-id 153 
probe
Probe Successful

The following example shows the beginning database value of the current version of the multicast cloud at a remote SE with the IP address 10.43.10.101 and delivery service ID 4999:

ServiceEngine# show distribution remote 10.43.10.101 metadata-sender delivery-service-id 
4999 start-generation-id 0 end-generation-id 5
Getting meta data for delivery service(4999) from genid -1 to 5
Connecting to 10.43.10.101
Remote SE replied with the following headers:
        Action : Processing metadata records
        Latest Gen id is : 2
        Have more records to process : No
        Is metadata still in full reload: No
add-size: 2, del-size: 0
Add Logs: 1 to 2
        add #1: UBsSUMwbTdJzzpqDvxSdYg.., basic_auth/public.html
        add #2: NJyVL9CZwpnyCfw+Is26yw.., index.txt

Note When start and end generation IDs are not specified in the show distribution remote command, the current maximum generation ID of -100 will be the start generation ID. The end generation ID is equal to the sum of the start generation ID and 100.


The following example shows the list of forwarders in the path toward the root SE:

ServiceEngine#show distribution remote traceroute forwarder-next-hop delivery-service-id 
4999 trace-till-root
Hop NextHop_SEId  NextHop_SEName NextHop_SEIp      GenID Status/Reason
--- ------------  -------------- ------------      ----- -------------
  1    5884            AD-SE07    192.168.1.69     1        REGULAR 
  2    6035            AD-SE13     2.43.10.101     1       LOC-LEAD 
  3    5683            AD-SE12     2.43.10.100     1       LOC-LEAD 
  4    6026       gnadaraj-507       2.43.27.2     1       LOC-LEAD 
  5    5638           devi-507      2.43.27.36     1       LOC-LEAD (Reached RootSE)

The following example shows output from the show distribution object-status command:

ServiceEngine#show distribution object-status http://www.cisco.com/index.txt
        ========== Website Information ==========
Name                      :          cisco-crawl
Origin Server FQDN        :        www.cisco.com
Request Routed FQDN       :                  N/A
Content UNS Reference #   :                    1
        ========== delivery services Information ==========
        *** delivery service 4999 (name = headercheck) ***
Object Replication
------------------
Replication               :                      Done
File State                :    Ready for distribution
Multicast for delivery service     :               Not Enabled
Replication Lock          : Received by Unicast-Receiver/Acquirer
Reference Count           :                         1
Total Size                :                   2208640
Transfered Size           :                   2208640
MD5 of MD5                :  zwhJagyCmRAE4UmTwc0EtA..
Source Url                : http://liqq-linux.cisco.com/index.txt
Source Last Modified Time :  Sun Jul 11 03:23:33 2004
Object Properties
-----------------
Redirect To Origin        :                       Yes
Requires Authentation     :                        No
Alternative URL           :
Serve Start Time          :                       N/A
Serve End Time            :                       N/A
Play servers              :                HTTP HTTPS
Content Metadata          :                      None
Content uns_id            :  yhzR3VZ96MDz5FVHwmGD+A..
Content gen-id            :         5638:1108022220:1
        ========== CDNFS Information ==========
Internal File Name        : 
/disk00-04/d/http-liqq-linux.cisco.com-azk2lrqzsytweswexham5w/32/326cf0278da48aac82d796cb1
19b1caa.0.data.txt
Actual File Size          : 2208640 bytes
MD5 of MD5 (Re-calculated): zwhJagyCmRAE4UmTwc0EtA..
Content metadata          : None
Metadata match with       : delivery service 4999
Number of Source-urls     : 1
        Source-url to CDN-object mapping:
        Source-url                : http://liqq-linux.cisco.com/index.txt
        Used by CDN object        : ---- Yes ----
        Internal File Name        : 
/disk00-04/d/http-liqq-linux.cisco.com-azk2lrqzsytweswexham5w/32/326cf0278da48aac82d796cb1
19b1caa.0.data.txt
        Actual File Size          : 2208640 bytes
        ========== CDNFS lookup output ==========
CDNFS File Attributes:
  Status                 3  (Ready)
  File Size              2208640 Bytes
  Start Time             null
  End Time               null
  Allowed Playback via   HTTP HTTPS
  Last-modified Time     Sun Jul 11 03:23:33 2004
  cdn_uns_id             yhzR3VZ96MDz5FVHwmGD+A..
  last-modified          Sun, 11 Jul 2004 03:23:33 GMT
Internal path to data file: 
/disk00-04/d/http-liqq-linux.cisco.com-azk2lrqzsytweswexham5w/32/326cf0278da48aac82d796cb1
19b1caa.0.data.txt

The show distribution delivery-services output and the show distribution forwarder-list output display additional delivery service routing information. The newly added Status/Reason field displays whether the SE is a location leader and the reason for not having a forwarder SE.

The following example shows the delivery service distribution information:

ServiceEngine#show distribution delivery-services
Delivery Service Name   ID   Priority   Root Forwarder   Status/Reason 
------------   --   --------   ---- ---------   -------------   ----------
00-AD         527      500    No    Rack89-SE-11   REGULAR         N/A
01-AD         586      500    Yes   N/A            N/A             N/A
00-Live       588      500    Yes   N/A            LIVE            N/A
  LOC-LEAD:   This SE is the location leader for this delivery service
   REGULAR:   This SE is not the location leader for this delivery service
      LLMT:   This SE cannot find forwarder because this SE has limit on
              the forwarder lookup level
      FAIL:   This SE cannot find forwarder because there is failed SE along
              the path within specified forwarder lookup level
      NGWT:   This SE cannot find forwarder because there is SE with negative
              forwarder-load-weight along the path within the specified
              forwarder lookup level
      LIVE:   The specified delivery service is live delivery service, forwarder not 
applicable
         *:   MetaData forwarder and Unicast forwarder are different

The following example provides delivery service distribution information for delivery service ID 527:

ServiceEngine#show distribution delivery-services delivery-service-id 527
Delivery service Configuration
---------------------
Delivery service ID                         :                  527
Delivery service Name                       :                00-AD
Website Name                       :                Test1
Website Origin FQDN                :         www.test.com
Delivery service Priority                   :                  500
Configured Distribution Type       :       Multicast only
Root SE Information
-------------------
ID of Configured Root SE           :                  462
Name of Configured Root SE         :         Rack89-SE-11
IP of Configured Root SE           :           2.43.27.38
ID of Effective Root SE            :                  462
Current root-ce-uid                :           1110247321
This SE's Role                     :        Not a Root SE
This SE in Full Reload             :                   No
Root SE Failover/Fallback Information
---------------------------------------
Root SE Failover/Fallback Interval :             120 Mins
Metadata Information
--------------------
Metadata-Forwarder ID              :                  462
Metadata-Forwarder Name            :         Rack89-SE-11
Metadata-Forwarder Primary IP      :           2.43.27.38
Metadata-Forwarder NAT IP/Port     :                  N/A
Address to Poll Metadata-Forwarder :           Primary IP
Metadata-Forwarder Status          :              REGULAR
Last gen-id Switch                 :                Never
Current low-water-marker           :                    1
Current max-gen-id                 :                    0
Current max-del-gen-id             :                    0
Last poll                          :          13 Secs ago
Next poll                          :    107 Secs from now
Idle poll interval                 :             120 Secs
Poll interval multiplier           :                    1
Unicast Information
-------------------
Ucast-Forwarder ID                 :                  462
Ucast-Forwarder Name               :         Rack89-SE-11
Ucast-Forwarder Primary IP         :           2.43.27.38
Ucast-Forwarder NAT IP/Port        :                  N/A
Address to Poll Ucast-Forwarder    :           Primary IP
Ucast-Forwarder Status             :              REGULAR
Multicast Information
---------------------
QoS Configuration
-----------------
MetaData QoS (system config)       :                   16 (Effective)
Progress Information
--------------------
Number of jobs completed           :                    0
Has incomplete jobs                :                   No
  LOC-LEAD:   This SE is the location leader for this delivery service
   REGULAR:   This SE is not the location leader for this delivery service
      LLMT:   This SE cannot find forwarder because this SE has limit on
              the forwarder lookup level
      FAIL:   This SE cannot find forwarder because there is failed SE along
              the path within specified forwarder lookup level
      NGWT:   This SE cannot find forwarder because there is SE with negative
              forwarder-load-weight along the path within the specified
              forwarder lookup level
      LIVE:   The specified delivery service is live delivery service, forwarder not 
applicable
         *:   MetaData forwarder and Unicast forwarder are different

Note The Has Unfinished Job line is only available if the SE is not a root SE. It is only available on a receiver SE.


Related Commands

show statistics distribution

show flash

To display the flash memory version and usage information, use the show flash EXEC command.

show flash

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

If a new software image has been installed and is waiting to be run after a reboot, the show flash command displays this information and the version of Internet Streamer CDS software that will run on the device after reload.

Examples

The following example displays the flash information:

ServiceEngine#show flash
CDS software version (disk-based code): CDS-2.4.0-b328
System image on flash:
Version: 2.4.0.328
System flash directory:
System image: 274 sectors
Bootloader, rescue image, and other reserved areas: 59 sectors
512 sectors total, 179 sectors free.

Table 2-28 describes the fields shown in the show flash display.

Table 2-28 show flash Field Descriptions

Field
Description

Internet Streamer CDS software version (disk-based code)

Internet Streamer CDS software version and build number that is running on the device.

System image on flash:

Version

Version and build number of the software that is stored in flash memory.

System flash directory:

System image

Number of sectors used by the system image.

Bootloader, rescue image, and other reserved areas

Number of sectors used by the bootloader, rescue image, and other reserved areas.

XX sectors total, XX sectors free

Total number of sectors. Number of free sectors.


show flash-media-streaming

To display the Flash Media Streaming information, use the show flash-media-streaming EXEC command.

On the SE:

show flash-media-streaming [license | logging name | mtrack | stream-status {dvrcast [all name] | live [all name]}]

On the SR:

show flash-media-streaming

Syntax Description

license

Shows the Flash Media Streaming licenses.

logging

Sets the Tar Flash Media Streaming transaction logs to /local/local1/filename.tar.gz.

name

Filename.

mtrack

Displays the Flash Media Streaming memory usage.

stream-status

Displays the Flash Media Streaming stream status.

dvrcast

Displays dvrcast stream status.

all

(Optional) Dumps detail statistics into /local/local1/filename.

live

Displays the live stream status.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

When you execute the show flash-media-streaming stream-status live command and the Forwarder is a Content Origin server running Linux, the show command does not show statistics for the Content Origin server.

Examples

The following example displays the Flash media streaming information:

ServiceEngine#show flash-media-streaming        
Flash Media Streaming is disabled.
Max. Allowed concurrent sessions are 200.
Flash Media Streaming Monitoring is enabled.
Admin list allow: 1.1.1.1 
Total number of wholesale licenses is 0.
Bandwidth Details:
Non wholesale bandwidth (Perpetual) is 200000 kbps.
Configured max bandwidth is 10000 kbps.
Total wholesale bandwidth (Term Based) is 0 kbps.
Allowed bandwidth is 10000 kbps.

Related Commands

flash-media-streaming
show statistics flash-media-streaming

show ftp

To display the caching configuration of the File Transfer Protocol (FTP), use the show ftp EXEC command.

show ftp

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

This example lists the caching configuration of FTP:

ServiceEngine#show ftp
FTP heuristic age-multipliers: directory-listing 30% file 60%
Maximum Time To Live in days : directory-listing 3 file 7
Minimum Time To Live in minutes: 60
No objects are revalidated on every request.
Serve-IMS without revalidation if...
Directory listing object is less than 50% of max age
File object is less than 80% of max age
Incoming Proxy-Mode:
Servicing Proxy mode FTP connections on ports: 22 23 88 66 48 488 449 90
Outgoing Proxy-Mode:
Not using outgoing proxy mode.
Maximum size of a cacheable object is unlimited.

show hardware

To display the system hardware status, use the show hardware EXEC command.

show hardware

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC configuration mode.

Usage Guidelines

In Internet Streamer CDS Release 2.4, the output of the show hardware EXEC command displays the version of the TV-out hardware that the SE is equipped with. In the following excerpt of the sample output from the show hardware command, this particular information is highlighted in bold. Rev 3 in the command output indicates that the TV-out hardware uses the newer Revision 3 MPEG decoder PCI part. The Vela II Revision D and Revision E cards use the Revision 3 part.

ServiceEngine#show hardware
.
.
.
Total 1 CPU.
1024 Mbytes of Physical memory.
1 CD ROM drive (CD-224E)
1 AV card (Vela II)
2 GigabitEthernet interfaces
1 Console interface
2 USB interfaces [Not supported in this version of software]
The following PCI cards were found:
PCI-Slot-1 MPEG-Decoder-AV [1105:8476 (Sigma Designs, Inc.) (rev 3)]
PCI-Slot-2 SCSI
Manufactured As: Pre-FCS 565  [867383Z]
.
.
.

The output of the show hardware EXEC command notifies you if the SE is running a version of the CDS software that does not support the TV-out hardware contained in the SE. In the following example, you are notified that the SE has a Vela II audio-video (AV) card that is not supported by the version of the CDS software that is running on the SE. In the following excerpt of the sample output from the show hardware command, this particular information is highlighted in bold:

ServiceEngine # show hardware
CPU 0 is GenuineIntel Intel(R) Celeron(R) CPU 1.70GHz (rev 1) running at 1699MHz
.
Total 1 CPU.
1024 Mbytes of Physical memory.
1 CD ROM drive (CD-224E)
1 AV card (Vela II) [***Revision not supported in this version of software***]
2 GigabitEthernet interfaces
1 Console interface
2 USB interfaces [Not supported in this version of software]
The following PCI cards were found:
.
.
.

Examples

Table 2-29 describes the fields shown in the show hardware display.

Table 2-29 show hardware Field Descriptions 

Field
Description

Compiled hour:minute:second month day year by cnbuild

Compile information for the software build.

System was restarted on day of week month day hour:minute:second year

Date and time that the system was last restarted.

The system has been up for X hours, X minutes, X seconds

Length of time the system has been running since the last reboot.

CPU 0 is

CPU manufacturer information.

Total X CPU

Number of CPUs on the device.

XXXX Mbytes of Physical memory

Number of megabytes of physical memory on the device.

X CD ROM drive

Number of CD-ROM drives on the device.

X Console interface

Number of console interfaces on the device.

Cookie info

SerialNumber

Serial number of the device.

SerialNumber (raw)

Serial number of the device as an ASCII value.

TestDate

Date that the device was tested.

ModelNum (text)

Hardware model of the device.

ModelNum (raw)

Internal model number (ASCII value) that corresponds to the ExtModel number.

HWVersion

Number of the current hardware version.

PartNumber

Not implemented.

BoardRevision

Number of revisions for the current system board.

ChipRev

Number of revisions for the current chipset.

VendID

Vendor ID of the cookie.

CookieVer

Version number of the cookie.

Chksum

Checksum of the cookie showing whether the cookie is valid.

List of all disk drives

Physical disk information

Lists the disks by number.

disk00

Availability of the disk: Present, Not present or Not responding, or Not used (*).

Disk identification number and type.

Disk size in megabytes and gigabytes.

disk01

Same type of information is shown for each disk.

Mounted filesystems

Device

Path to the partition on the disk.

Type

Type of the file system. Values include PHYS-FS, SYSFS, or cdnfs.

Size

Total size of the file system in megabytes and gigabytes.

Mount point

Mount point for the file system. For example, the mount point for SYSFS is /local/local1.

System use

Amount of disk space being used for system use.

Free

Amount of unused disk space available.


Related Commands

show version

show hosts

To view the hosts on your SE, use the show hosts EXEC command.

show hosts

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The show hosts command lists the name servers and their corresponding IP addresses. It also lists the hostnames, their corresponding IP addresses, and their corresponding aliases (if applicable) in a host table summary.

Table 2-30 describes the fields shown in the show hosts display.

Table 2-30 show hosts Field Descriptions

Field
Description

Domain names

Domain names used by the device to resolve the IP address.

Name Server(s)

IP address of the Domain Name Server (DNS) name server or servers.

Host Table

hostname

Fully Qualitifed Domain Name (FQDN) (that is, hostname and domain) of the current device.

inet address

IP address of the current host device.

aliases

Name configured for the current device based on the host global configuration command.


show http

To display HTTP caching parameters, use the show http EXEC command.

show http {age-mult | all | cache-cookie | cache-fill-range | cache-on-abort | object | proxy | reval-each-request | ttl}

Syntax Description

age-mult

Displays HTTP/1.0 caching heuristic modifiers.

all

Displays all HTTP-related caching configurations.

cache-cookie

Displays the configuration for caching of web objects with associated cookies.

cache-fill-range

Displays the configuration for cache-fill, for a range request starting from 0.

cache-on-abort

Displays the cache-on-abort configuration.

object

Displays the configuration of HTTP objects.

proxy

Displays the proxy mode configuration.

reval-each-request

Displays the revalidation configuration for every request.

ttl

Displays the Time To Live for objects in the cache.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example lists the configuration and status of HTTP:

ServiceEngine#show http all
Basic authenticated objects are not cached.
HTTP heuristic age-multipliers: text 30% binary 60%
Serve-IMS without revalidation if...
  Text object is less than 50% of max age
  Binary object is less than 80% of max age
Objects with associated cookies are not cached
Client no-cache requests are retrieved from the origin server
Cache on abort feature is disabled
Objects will always continue to be cached on a client abort 
  Maximum threshold is disabled
  Minimum threshold is disabled
  Percent threshold is disabled
Maximum time to live in days: text 3 binary 7
Minimum time to live for all objects in minutes: 5
Objects are not revalidated on each request
Incoming Proxy-Mode:
  Not servicing incoming proxy mode connections.
Outgoing Proxy-Mode:
  Not using outgoing proxy mode.
 Monitor Interval for Outgoing Proxy Servers is 60 seconds
 Timeout period for probing Outgoing Proxy Servers is 300000 microseconds
Use of Origin Server upon Proxy Failures is disabled.
Persistent connection is enabled and set to all
Persistent connection timeout is 600 seconds
WWW-Authenticate headers containing
No host configured to receive Proxy-Authorization header
No host configured to receive WWW-Authorization header
Maximum size of a cacheable object is unlimited
Requested Object URL validation is enabled
Healing client is disabled
Timeout for responses = 0 seconds
Max number of misses allowed before stop healing mode = 0 
Port number for healing request/response = 14333 
Http-port to forward http request to healing server = 80 

The following example shows the IP address and port numbers of the HTTP incoming and outgoing proxy modes:

ServiceEngine#show http proxy
Incoming Proxy-Mode:
  Servicing Proxy mode HTTP connections on port: 8080
Outgoing Proxy-Mode:
  Directing request to proxy server at 10.1.1.1 port 7777

Related Commands

http
show statistics http

show icap

To display Internet Content Adaptation Protocol (ICAP) configuration details, use the show icap EXEC command.

show icap [service service_name]

Syntax Description

service

(Optional) Displays the configurations for the specified service.

service_name

Name of the service.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use the show icap EXEC command to display the current ICAP configuration for the SE. The command output shows the status of the enabled ICAP features, the service definitions, a list of vectoring points, and an ordered list of ICAP services.

To display the definition and status of a specific ICAP service that is configured on the SE, use the show icap service service_name EXEC command.

Examples

The following example displays the ICAP configuration for the SE:

ServiceEngine#show icap
ICAP global configurations
==========================
ICAP apply: RULES
ICAP logging: DEFAULT
ICAP bypass Streaming content: ENABLED
ICAP rescan cached objects on service update: ENABLED
ICAP service configurations
===========================
----------------------------------------------
Configurations for service test
----------------------------------------------
Enabled Status: ENABLED
Load Balancing Scheme: Weighted-load
Error handling scheme: Send client error
Vectoring points registered:
reqmod-precachereqmod-postcacherespmod-precache
Servers configured:
server URL:       icap://10.1.1.1:1344/test-icap
----------------------------------------------
Configurations for service service
----------------------------------------------
Enabled Status: DISABLED
Load Balancing Scheme: round-robin
Error handling scheme: Bypass
Vectoring points registered:
None
Servers configured:
None
----------------------------------------------
Configurations for service servforicap
----------------------------------------------
Enabled Status: ENABLED
Load Balancing Scheme: round-robin
Error handling scheme: Bypass
Vectoring points registered:
None
Servers configured:
server URL:       icap://1.2.3.4/servforicap

Related Commands

icap service

show interface

To display the hardware interface information, use the show interface EXEC command.

show interface {GigabitEthernet slot/port | PortChannel {1 | 2} | standby group num}

Syntax Description

GigabitEthernet

Selects a Gigabit Ethernet interface to configure.

slot/port

Slot and port number for the selected interface. The slot range is 0 to 2; the port range is 0 to 3. The slot number and port number are separated with a forward slash character (/).

PortChannel

Selects the EtherChannel of interfaces to configure.

1

Sets the port channel interface number to 1.

2

Sets the port channel interface number to 2.

standby

Sets the standby group for the interface.

group num

Group number for the selected interface. The group number range is 1 to 4.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-31 describes the fields shown in the show interface GigabitEthernet display.

Table 2-31 show interface GigabitEthernet Field Descriptions 

Field
Description

Type

Type of interface. Always Ethernet.

Ethernet address

Layer 2 MAC address.

Maximum Transfer Unit Size

Current configured MTU value.

Metric

Metric setting for the interface. The default is 1. The routing metric is used by the routing protocol to determine the most favorable route. Metrics are counted as additional hops to the destination network or host; the higher the metric value, the less favorable the route.

Packets Received

Total number of packets received by this interface.

Input Errors

Number of incoming errors on this interface.

Input Packets Dropped

Number of incoming packets that were dropped on this interface.

Input Packets Overruns

Number of incoming packet overrun errors.

Input Packets Frames

Number of incoming packet frame errors.

Packet Sent

Total number of packets sent from this interface.

Output Errors

Number of outgoing packet errors.

Output Packets Dropped

Number of outgoing packets that were dropped by this interface.

Output Packets Overruns

Number of outgoing packet overrun errors.

Output Packets Carrier

Number of outgoing packet carrier errors.

Output Queue Length

Output queue length in bytes.

Collisions

Number of packet collisions at this interface.

Flags

Interface status indicators. Values include Up, Broadcast, Running, and Multicast.

Mode

Setting, transmission mode, and transmission for this interface.


Table 2-32 describes the fields shown in the show interface PortChannel display.

Table 2-32 show interface PortChannel Field Descriptions

Field
Description

Description

Description of the device, as configured by using the description option of the interface global configuration command.

Type

Type of interface. Always Ethernet.

Ethernet address

Layer 2 MAc address.

Internet Address

Internet IP address configured for this interface.

Broadcast Address

Broadcast address configured for this interface.

Netmask

Netmask configured for this interface.

Maximum Transfer Unit Size

Current configured MTU value.

Metric

Metric setting for the interface. The default is 1. The routing metric is used by the routing protocol. Higher metrics have the effect of making a route less favorable; metrics are counted as addition hops to the destination network or host.

Packets Received

Total number of packets received by this interface.

Input Errors

Number of incoming errors on this interface.

Input Packets Dropped

Number of incoming packets that were dropped on this interface.

Input Packets Overruns

Number of incoming packet overrun errors.

Input Packets Frames

Number of incoming packet frame errors.

Packet Sent

Total number of packets sent from this interface.

Output Errors

Number of outgoing packet errors.

Output Packets Dropped

Number of outgoing packets that were dropped by this interface.

Output Packets Overruns

Number of outgoing packet overrun errors.

Output Packets Carrier

Number of outgoing packet carrier errors.

Output Queue Length

Output queue length in bytes.

Collisions

Number of packet collisions at this interface.

Flags

Interface status indicators. Values include Up, Broadcast, Running, and Multicast.


Table 2-33 describes the fields shown in the show interface standby display.

Table 2-33 show interface standby Field Descriptions 

Field
Description

Standby Group

Number that identifies the standby group.

Description

Description of the device, as configured by using the description option of the interface global configuration command.

IP address, netmask

IP address and netmask of the standby group.

Member interfaces

Member interfaces of the standby group. Shows which physical interfaces are part of the standby group. Shows the interface definition, such as GigabitEthernet 1/0.

Active interface

Interfaces that are currently active in the standby group.


Related Commands

interface
show running-config
show startup-config

show inventory

To display the system inventory information, use the show inventory EXEC command.

show inventory

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The show inventory command allows you to view the unique device identifier information (UDI) for an SE. Typically, Cisco SEs contain the following three identification items, which make up the UDI:

Product ID (PID)

Version ID (VID)

Serial number (SN)

This identity information is stored in the SE nonvolatile memory. Each SE has a unique device identifier (UDI). The UDI shows PID, VID and SN.

The UDI is electronically accessed by the product operating system or network management application to enable identification of unique hardware devices. The data integrity of the UDI is vital to customers. The UDI that is programmed into the SE's nonvolatile memory is equivalent to the UDI that is printed on the product label and on the carton label. This UDI is also equivalent to the UDI that can be viewed through any electronic means and in all customer-facing systems and tools. Currently, there is only CLI access to the UDI; there is no SNMP access to the UDI information.

On newer SE models, you can use the show inventory EXEC command to display the SE's UDI. On older SE models, use the show tech-support EXEC command to display the SE's UDI.

Examples

The following example shows the inventory information for one of the newer SE models (SE-565):

ServiceEngine#show inventory
PID: SE-565-K9 VID: 0 SN: serial_number

In the preceding example, serial number is the serial number of the SE. The version ID is displayed as "0" because the version number is not available.

Table 2-34 describes the fields shown in the show inventory display.

Table 2-34 show inventory Field Descriptions

Field
Description

PID

Product identification (ID) number of the device.

VID

Version ID number of the device. Displays as 0 if the version number is not available.

SN

Serial number of the device.


The following example shows that you must use the show tech-support EXEC command to display the inventory information on an older SE model:

ServiceEngine# show inventory
Please look at 'sh tech-support' for information!
ServiceEngine# show tech-support

Related Commands

show tech-support

show ip access-list

To display the access lists that are defined and applied to specific interfaces or applications, use the show ip access-list EXEC command.

show ip access-list [acl-name | acl-num]

Syntax Description

acl-name

(Optional) Information for a specific access list, using an alphanumeric identifier up to 30 characters, beginning with a letter.

acl-num

(Optional) Information for a specific access list, using a numeric identifier (0 to 99 for standard access lists and 100 to199 for extended access lists).


Defaults

Displays information about all defined access lists.

Command Modes

EXEC configuration mode.

Usage Guidelines

Use the show ip access-list EXEC command to display the access lists that have been defined on the current system. Unless you identify a specific access list by name or number, the system displays information about all the defined access lists, including the following sections:

Available space for new lists and conditions

Defined access lists

References by interface and application

Examples

The following example shows sample output from the show ip access-list command:

ServiceEngine#show ip access-list
Space available:
    47 access lists
   492 access list conditions
Standard IP access list 1 
  1 permit 10.1.1.2
  2 deny   10.1.2.1
    (implicit deny any: 2 matches)
  total invocations: 2
Extended IP access list 100
  1 permit tcp host 10.1.1.1 any
  2 permit tcp host 10.1.1.2 any
  3 permit tcp host 10.1.1.3 any
    (implicit fragment permit: 0 matches)
    (implicit deny ip any any: 0 matches)
  total invocations: 0
Standard IP access list test
  1 permit 1.1.1.1 (10 matches)
  2 permit 1.1.1.3
  3 permit 1.1.1.2
    (implicit deny: 2 matches)
  total invocations: 12
Interface access list references:
  GigabitEthernet 0/0  inbound   100
Application access list references:
  tftp_server                     standard  1
    UDP ports:    69

The following example shows sample output from the show ip access-list command for the access list named test:

ServiceEngine#show ip access-list test
Standard IP access list test
  1 permit 1.1.1.1 (10 matches)
  2 permit 1.1.1.3
  3 permit 1.1.1.2
    (implicit deny: 2 matches)
  total invocations: 12

Note The system displays the number of packets that have matched a condition statement only if the number is greater than zero.


Related Commands

clear
ip access-list

show ip routes

To display the IP routing table, use the show ip routes EXEC command.

show ip routes

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC configuration mode.

Examples

The show ip routes command displays the IP routing table.

Table 2-35 describes the fields shown in the show ip routes display.

Table 2-35 show ip routes Field Descriptions

Field
Description

Destination

Destination address IP route mask.

Gateway

IP address or IP alias of the gateway router.

Netmask

Subnet mask of the gateway router.


.

Related Commands

ip

show ldap

To display the Lightweight Directory Access Protocol (LDAP) parameters, use the show ldap EXEC command.

show ldap

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-36 describes the fields shown in the show ldap display.

Table 2-36 show ldap Field Descriptions 

Field
Description

LDAP Authentication

State of LDAP authentication (enabled or disabled).

Allow mode

Access to users when the LDAP server is unavailable.

Base DN

Base distinguished name.

Filter

LDAP filter for authentication group.

Retransmits

Number of retransmissions.

Timeout

Wait time in seconds for an LDAP server to reply.

UID Attribute

User ID attribute on the LDAP server.

Group Attribute

Authentication group attribute:

distinguished name (dn),

unique name (un),

organizational unit (ou) for native LDAP groups, and

member of (memberOf) Active Directory group.

organizationUnit

Group name obtained from the ou attribute of the user account.

Custom Attribute

Group name obtained from the custom attribute of the user account.

Active Directory

Group name obtained from the memberOf attribute of the user account.

Note An Active Directory database is a user database that resides on a Windows 2000 server that is running the Microsoft Active Directory program.

Static Groups

Status of whether the static group query for user membership has been enabled. A static group defines each member individually using the object class attribute of groupOfNames or groupOfUniqueNames.

Group Attribute

Group attribute that the LDAP server uses to search the direct or nested static group configurations.

Group Member

Group member attribute that the LDAP server uses to search the direct or nested static group configurations.

Nested Groups

Any static groups that are nested under the parent group, which the LDAP server searches for user account information.

Nested Level

Number of levels down the LDAP directory from the starting point of the search that the LDAP server searches.

Administrative DN

Administrator distinguished name for the LDAP database search. There is no default value for this field and none is specified if it is not configured.

Administrative Password

Password of administrator for the LDAP database search. There is no default value for this field and none is specified if it is not configured.

LDAP version

LDAP software release version.

LDAP port

TCP port for the LDAP authentication server.

Policy redirect feature

Status of whether the support for acceptable use policy redirection has been configured.

Policy redirect append request URL

Status of whether the SE is enabled to append the request URL (original destination URL) to the LDAP (Acceptable Use Policy) AUP redirect URL.

Policy redirection URL

URL to redirect to if the user still has accepted the usage policy.

Policy redirection LDAP attribute name

Name of the LDAP attribute that is to be queried for the version that the user has accepted.

Policy redirection LDAP attribute value

Value of the LDAP attribute that is to be queried for the version that the user has accepted.

Password Expiry feature

Status of whether support for expiry of authorization passwords has been configured.

Password Expiry redirection URL

URL to redirect to if the user password has expired.

Server

LDAP server IP address.

Status

Status of whether the server is the primary or secondary host.

Primary

Primary host.

Secondary

Secondary host.


show logging

To display the system message log configuration, use the show logging EXEC command.

show logging

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The following is an example of a syslog message for proxy-mode native FTP support:

SE-FTP_PROXY-3-252009:   Failed to configure FTP Proxy-mode listener on port
                    '[port]'. 
Explanation:        Could not start proxy-mode listener for FTP control 
                    connection for the specified port.  The port is temporarily
                    in an un-bindable state, or is in use by some other
                    application. 
Action:             Check whether the port has been configured for use by a 
                    different application.  If not, retry the 
                    incoming proxy command after 2 minutes.  If this error
                    repeats frequently, contact Cisco TAC. 

To view information about events that have occurred in all devices in your CDS network, you can use the system message log in the CDSM GUI. The CDSM logs only severity level critical or higher messages from registered nodes. Also, the CDSM logs certain other status messages that are considered important to the Centralized Management System (CMS). The messages displayed in the system message log for device, SE, are not related to the messages logged in the system log file on the sysfs partition on the CDSM as /local1/syslog.txt.

The syslog.txt file on the CDSM contains information about events that have occurred on the CDSM and not on the registered nodes. The messages that are written to the syslog.txt file depend on specific parameters of the system log file that you have set by using the logging global configuration command. For example, a critical error message logged on a registered node does not appear in the syslog.txt file on the CDSM because the problem never occurred on the CDSM but only on the registered node. However, this error message is displayed in the system message log for device, SE

Examples

The following example displays the syslog host configuration on an SE:

ServiceEngine#show logging
Syslog to host is disabled
Priority for host logging is set to:  warning
Syslog to console is disabled
Priority for console logging is set to:  warning
Syslog to disk is enabled
Priority for disk logging is set to:  notice
Filename for disk logging is set to:  /local1/syslog.txt
Syslog facility is set to *
Syslog disk file recycle size is set to 500000

Related Commands

clear
logging

show movie-streamer

To display the Movie Streamer configuration, use the show movie-streamer EXEC command.

show movie-streamer [bandwidth | cache | proxy]

Syntax Description

bandwidth

(Optional) Displays Movie Streamer bandwidth configuration.

cache

(Optional) Displays Movie Streamer cache configuration.

proxy

(Optional) Displays Movie Streamer proxy configuration.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example shows the Movie Streamer configuration:

ServiceEngine#show movie-streamer       
Movie Streamer version cde200-5.0.3
Movie Streamer is not enabled
------ Movie Streamer General Configurations ------
Movie Streamer max sessions configured: 8000
Movie Streamer transport source ip address is not configured
Movie Streamer accelerate for VOD is enabled
Movie Streamer client idle timeout is 300 seconds
Movie Streamer origin-server idle interval is 10 seconds
Movie Streamer client rtp timeout is 180 seconds
Movie Streamer outgoing bitrate per streamer has no limit
Movie Streamer incoming bitrate per streamer has no limit
------ Movie Streamer Bandwidth Configurations ----
Movie Streamer Outgoing bandwidth enforced is 2000000 kbps
Movie Streamer Incoming bandwidth enforced is 2000000 kbps
------ Movie Streamer Cache Configurations --------
Movie Streamer cache is enabled
Movie Streamer cache age-multiplier: 30%
Movie Streamer cache max-ttl: 1 (days)
Movie Streamer cache revalidate for each request is enabled
------ Movie Streamer Proxy Configurations --------
Movie Streamer proxy has not been configured.
------ Movie Streamer Broadcast List --------------

Related Commands

movie-streamer
show statistics movie-streamer

show ntp

To display the Network Time Protocol (NTP) parameters, use the show ntp EXEC command.

show ntp status

Syntax Description

status

Displays the NTP status.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-37 describes the fields shown in the show ntp status display.

Table 2-37 show ntp status Field Descriptions 

Field
Description

NTP

Status of whether NTP is enabled or disabled.

server list

NTP server IP and subnet addresses.

remote

Name (first 15 characters) of remote NTP server.

*

In the remote column, identifies the system peer to which the clock is synchronized.

+

In the remote column, identifies a valid or eligible peer for NTP synchronization.

space

In the remote column, indicates that the peer was rejected. (The peer could not be reached or excessive delay occurred in reaching the NTP server.)

x

In the remote column, indicates a false tick and is ignored by the NTP server.

-

In the remote column, indicates a reading outside the clock tolerance limits and is ignored by the NTP server.

refid

Clock reference ID to which the remote NTP server is synchronized.

st

Clock server stratum or layer.

t

Type of peer (local, unicast, multicast, or broadcast).

when

Status of when the last packet was received from the server in seconds.

poll

Time check or correlation polling interval in seconds.

reach

8-bit reachability register. If the server was reachable during the last polling interval, a 1 is recorded; otherwise, a 0 is recorded. Octal values 377 and above indicate that every polling attempt reached the server.

delay

Estimated delay (in milliseconds) between the requester and the server.

offset

Clock offset relative to the server.

jitter

Clock jitter.


Related Commands

clock
ntp

show processes

To display CPU or memory processes, use the show processes EXEC command.

show processes [cpu | debug pid | memory | system [delay 1-60 | count 1-100]]

Syntax Description

cpu

(Optional) Displays the CPU utilization.

debug

(Optional) Displays the system call and signal traces for a specified process identifier (PID) to display system progress.

pid

Process identifier.

memory

(Optional) Displays memory allocation processes.

system

(Optional) Displays system load information in terms of updates.

delay

(Optional) Specifies the delay between updates, in seconds (1-60).

1-60

Displays delays between updates, in seconds.

count

(Optional) Specifies the number of updates that are displayed (1-100).

1-100

Displays the number of updates displayed.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use the commands shown in this section to track and analyze system CPU utilization.

The show processes debug command displays the extensive internal system call information and a detailed account of each system call (and arguments) made by each process and the signals that it has received.

Use the show processes system command to display system updates. The delay option specifies the delay between updates, in seconds. The count option specifies the number of updates that are displayed. This command displays these items:

A list of all processes in wide format.

Two tables listing the processes that utilize CPU resources. The first table displays the list of processes in descending order of utilization of CPU resources based on a snapshot taken after the processes system (ps) output is displayed. The second table displays the same processes based on a snapshot taken 5 seconds after the first snapshot.

Virtual memory used by the corresponding processes in a series of five snapshots, each separated by 1 second.


Note CPU utilization and system performance may be affected when you use the show process command. We recommend that you avoid using the show process command with keywords system and especially debug, unless it is absolutely necessary.


Examples

Table 2-38 describes the fields shown in the show processes displays.

Table 2-38 show processes Field Descriptions 

Field
Description

CPU Usage

CPU utilization as a percentage for user, system overhead, and idle.

PID

Process identifier.

STATE

Current state of corresponding processes.

R = Running
S = Sleeping in an interruptible wait
D = Sleeping in an uninterruptible wait or swapping
Z = Zombie
T = Traced or stopped on a signal

PRI

Priority of processes.

User T

User time utilization in seconds.

Sys T

System time utilization in seconds.

COMMAND

Process command.

Total

Total available memory in bytes.

Used

Memory currently used in bytes.

Free

Free memory available in bytes.

Shared

Shared memory currently used in bytes.

Buffers

Buffer memory currently used in bytes.

Cached

Cache memory currently used in bytes.

TTY

TTY to which the process is attached. For example, TTY may indicate which processes belong to network Telnet sessions.

%MEM

Percentage of memory used by corresponding processes.

VM Size

Virtual memory size (in bytes) allocated to the corresponding process.

RSS (pages)

Resident set size, which indicates the number of pages that the process has in real memory minus three (-3) for administrative purposes. These pages count toward text, data, and stack space but do not count demand-loaded or swapped-out pages.

Name

Filename of the executable in parentheses.


show programs

To display a list of programs on the SE, use the show programs EXEC command.

show programs [ movie-streamer [cli | live | rebroadcast] | program-id id | program-name name]

Syntax Description

movie-streamer

(Optional) Displays the list of programs served by the Movie Streamer.

cli

(Optional) Displays the list of CLI programs served by the Movie Streamer.

live

(Optional) Displays the list of live programs served by the Movie Streamer.

rebroadcast

(Optional) Displays the list of rebroadcast programs served by the Movie Streamer.

program-id

(Optional) Displays detailed program information for the specified program ID.

id

Unique number identifying the program.

program-name

(Optional) Displays detailed program information for the specified program name.

name

Name of the program.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Typically, users create programs using the CDSM by defining programs in the manifest file or by using the Program API. The show programs command output displays the program type, the channel with which the program is associated, the current status of the program, and the next time that the program will start and end.

A program in the Internet Streamer CDS software is defined as a scheduled event in which the content is presented to the end user. Attributes of the program include the start and end time of the program, whether the content is pre-positioned or live, the set of SEs assigned to the program, and the streaming server to be used for content delivery.

Program types determine the hardware or software component involved in delivering content to the user. Different program types that are shown in the output of the show programs command are as follows:

Movie streamer live

Movie streamer rebroadcast

The CDSM GUI allows you to create a program, schedule it, and deliver it over your multicast-enabled CDS network. Programs can consist of prerecorded video or live events. In the case of live events, the Internet Streamer CDS software interoperates with third-party encoders and IP/TV Broadcast Servers to transmit the live stream across the CDS network.

When creating a program in the CDSM GUI, the administrator specifies the following information:

Streaming server—How the program will be streamed or delivered to the end user.

Movie streamer—The event is played from a PC using the Apple QuickTime application or using the IP/TV Viewer application.

Exported—The program is exported over HTTP to a set-top box.

Media source

Live stream transmitted from a third-party encoder or an IP/TV Broadcast Server

Pre-positioned content stored on SEs

Destination

A set of SEs or device groups

A channel (live or export)

Delivery method

Unicast or multicast live events

Multicast scheduled rebroadcasts

TV-out or export playlists

Schedule

Start time and duration

Looping forever (enabled or disabled)

Multiple playback times

Repeating playback times

Publishing URL—The URL used to view the program

Live Events

Live events are streamed from third-party encoders (such as the Windows Media encoder Version 9 and the QuickTime encoder) or from streaming servers (such as Windows Media Server). The live stream is acquired by the root SE and transmitted to edge SEs using unicast. From the edge SEs, the live stream is transmitted to end users using either multicast or multicast and unicast live splitting. The live program is available to viewers only during its scheduled times.

Before setting up a live event in the CDSM GUI, the administrator must complete the following tasks:

1. Set up the live event on the encoder or streaming server. This task is done externally to the CDSM GUI.

2. In the CDSM GUI, accept the streaming server's license agreement on the SEs designated to acquire and distribute the stream.

3. Create a live channel (or designate an existing channel as a live channel), assign SEs to the live channel, and designate a root SE to acquire the stream.

After you have completed the preceding tasks, you are ready to define the program and configure the program settings in the CDSM GUI. The CDSM allows you to define two types of live events based on the streaming server being used:

WMT live

Cisco Streaming Engine live

Configuration Requirements for Managed Live Events

If you have channels for live programs configured in your Internet Streamer CDS Release 2.4 network, make sure that there are no external proxy servers physically located between your Internet Streamer SEs and your root SE that require proxy authentication. Also, make sure that proxy authentication is not enabled on any receiver SEs that might be in the logical, hierarchical path between the root SE and the receiver SE that is going to serve the live stream to the requesting clients. If a live stream encounters any device that requires proxy authentication, the stream will be dropped before it reaches its destination.

If your network is set up with intermediary devices that require proxy authentication, you can work around the problem by configuring rules to bypass authentication on these devices.

For example, to enable the formation of the unicast splitting tree and, in turn, enable live broadcasting from all receiver SEs, you can specify the following rule on all of the parent SEs in the channel:

ServiceEngine(config)# rule pattern-list 1 downstream-SE-ipaddress 
ServiceEngine(config)# rule no-auth pattern-list 1

Live Stream Interruptions

During a WMT live broadcast, any interruption of the live stream that lasts 5 minutes or longer causes the multicast broadcast to stop for the duration of the currently scheduled period. If the live stream is interrupted for less than five minutes, the broadcast resumes.

Live stream interruptions can be caused by unexpected encoder failures or by an operational restart. If you have early trials scheduled prior to the live event, we recommend that you configure multiple schedules, one for each trial. We also recommend that you start the encoder prior to the scheduled time.

If the live stream stops for more than 5 minutes and resumes later while the program is still scheduled, you can modify the schedule or any other attribute of the program (such as the description) to trigger a restart of the multicast broadcast. Restarting might take up to 5 minutes under these circumstances. This setting does not apply to Movie Streamer live programs.

Scheduled Rebroadcasts

In a scheduled rebroadcast, the pre-positioned content is scheduled to be streamed from edge SEs using multicast. To define a program for a rebroadcast event, the administrator must complete the following tasks:

1. Create a content acquisition channel and pre-position the content.

2. Assign media files to the program.

3. Specify the multicast address and port or define a program address pool.

4. Specify the days and times for the rebroadcast.


Note For rebroadcast programs, the media can only be selected from one channel. The SEs and device groups assigned to the channel are selected automatically when you choose the media files for the program.


The CDSM allows you to define a program as a Movie Streamer rebroadcast.

Fast Encoder Failover

In Internet Streamer CDS, release 2.4, the show programs command was enhanced to support encoder failover. Issues with the previous release were as follows:

In the forwarder list item, only the primary origin server's IP address showed. If the device failed over to the backup origin server, the forwarder list presented the primary origin server's IP address and did not reflect the real origin server that was connected by the root SE.

In the source item, it presented every track's server IP address and port in the source, and there were no other explanations and tips. If the source included two tracks in the same server, the output was confusing.

In the non-root SE, users could not obtain the information about the serving origin server.

With this release, the output of the command looks like the following:

ServiceEngine#show programs program-name live2
Current Time          : May 18 2009 @ 10:10:33 IST      (1242621633)
Program ID            : 1341
Program Name          : live2
Delivery Service ID   : 1340
Delivery Service Name : live2
Type                  : WMT Managed Scheduled Live
Forwarder List        : 3.1.2.11 <- 172.22.28.104
Schedules             :
Schedule #1:
        Start Time (loc)  : May 18 2009 @ 10:11:00 IST  (1242621660)
        End Time (loc)    : May 18 2009 @ 10:12:00 IST  (1242621720)
        Duration          : 60 secs
        Repeat            : N/A
        Repeatdays        : N/A
        Time spec         : local
Source                :
        Server            : http://172.22.28.104:1881
Destination           :
        Unicast Access URL: rtsp://kinswmt.spcdn.net/live2
        Multicast URL     : http://kinswmt.spcdn.net/live2.nsc.asx
        Multicast Address : 224.2.2.58:94
Start Time (loc)      : May 18 2009 @ 10:11:00 IST      (1242621660)
Start Time            : May 18 2009 @ 04:41:00 GMT      (1242601860)
End Time (loc)        : May 18 2009 @ 10:12:00 IST      (1242621720)
End Time              : May 18 2009 @ 04:42:00 GMT      (1242601920)
Current Status        : Scheduled
Time left             : N/A
ServiceEngine#show clock
Local time: Mon May 18 10:10:47 IST 2009
RT-612-2#sh programs program-name live2
Current Time          : May 18 2009 @ 10:11:05 IST      (1242621665)
Program ID            : 1341
Program Name          : live2
Delivery Service ID   : 1340
Delivery Service Name : live2
Type                  : WMT Managed Scheduled Live
Forwarder List        : 3.1.2.11 <- 172.22.28.104
Schedules             :
Schedule #1:
        Start Time (loc)  : May 18 2009 @ 10:11:00 IST  (1242621660)
        End Time (loc)    : May 18 2009 @ 10:12:00 IST  (1242621720)
        Duration          : 60 secs
        Repeat            : N/A
        Repeatdays        : N/A
        Time spec         : local
Source                :
        Server            : http://172.22.28.104:1881
Destination           :
        Unicast Access URL: rtsp://kinswmt.spcdn.net/live2
        Multicast URL     : http://kinswmt.spcdn.net/live2.nsc.asx
        Multicast Address : 224.2.2.58:94
Start Time (loc)      : May 18 2009 @ 10:11:00 IST      (1242621660)
Start Time            : May 18 2009 @ 04:41:00 GMT      (1242601860)
End Time (loc)        : May 18 2009 @ 10:12:00 IST      (1242621720)
End Time              : May 18 2009 @ 04:42:00 GMT      (1242601920)
Current Status        : Playing
Time left             : 55 secs
ServiceEngine#show clock
Local time: Mon May 18 10:11:10 IST 2009
RT-612-2#sh programs program-name live2
Current Time          : May 18 2009 @ 10:12:10 IST      (1242621730)
Program ID            : 1341
Program Name          : live2
Delivery Service ID   : 1340
Delivery Service Name : live2
Type                  : WMT Managed Scheduled Live
Forwarder List        : 3.1.2.11 <- 172.22.28.104
Schedules             :
Schedule #1:
        Start Time (loc)  : May 18 2009 @ 10:11:00 IST  (1242621660)
        End Time (loc)    : May 18 2009 @ 10:12:00 IST  (1242621720)
        Duration          : 60 secs
        Repeat            : N/A
        Repeatdays        : N/A
        Time spec         : local
Source                :
        Server            : http://172.22.28.104:1881
Destination           :
        Unicast Access URL: rtsp://kinswmt.spcdn.net/live2
        Multicast URL     : http://kinswmt.spcdn.net/live2.nsc.asx
        Multicast Address : 224.2.2.58:94
Start Time (loc)      : End of Program Reached
Start Time            : End of Program Reached
End Time (loc)        : End of Program Reached
End Time              : End of Program Reached
Current Status        : Stopped
Time left             : N/A
ServiceEngine#show clock
Local time: Mon May 18 10:12:14 IST 2009

Now the show programs command output contains the forwarder list with the backup source, and the root SE and non-root SE output is consistent. Also, if the user executes the show statistics wmt streamstat command from the root SE, the output shows which server is currently serving.

The source URL displays in the source section and the CLI and CDSM are consistent. Because the non-content acquirer cannot get the information on which source is serving, the output contains tips, such as "Please check which source is serving in content acquirer."

The CDSM parses the backup SDP file and puts the results into the database. The item video_file_back_up saves the backup source server's IP address and port in the play_media table.

Examples

Table 2-39 describes the fields shown in the show programs program-name and program-id display.

Table 2-39 show programs Field Descriptions  

Field
Description

Current Time

Date and time of the output.

Program ID

Unique number identifying the program.

Program Name

Name of the program.

Delivery Service ID

Unique number identifying the delivery service.

Delivery Service Name

Unique name identifying the delivery service.

Type

Program type. Program types are as follows:

Movie streamer live

Movie streamer rebroadcast

Windows Media live

Windows Media rebroadcast

Forwarder List

List with primary and backup origin server's IP address.

Schedules

Schedule list. Information is as follows:

Start Time (loc)

End Time (loc)

Duration

Repeat

Repeatdays

Time spec

Source (for Content Acquirer)

Primary and backup source URLs.

Source (for Non-content Acquirer)

Primary and backup source URLs and tips.

Destination

Unicast URLs.


show qos

To display Quality of Service (QoS) information, use the show qos EXEC command.

show qos

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

This example shows the output that might be displayed if you do not enter any keywords:

ServiceRouter# show qos
Camiant policy service config file is not configured
Camiant policy service is running

Related Commands

qos
show statistics qos

show radius-server

To display RADIUS information, use the show radius-server EXEC command.

show radius-server

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-40 describes the fields shown in the show radius-server display.

Table 2-40 show radius-server Field Descriptions 

Field
Description

Login Authentication for Console/Telnet Session

Status of whether RADIUS server is enabled for login authentication.

Configuration Authentication for Console/Telnet Session

Status of whether RADIUS server is enabled for authorization or configuration authentication.

Authentication scheme fail-over reason

Status of whether SEs fail over to the secondary method of administrative login authentication whenever the primary administrative login authentication method fails.

RADIUS Configuration

RADIUS authentication settings.

RADIUS Authentication

Status of whether RADIUS authentication is enabled on the SE.

Key

Key used to encrypt and authenticate all communication between the RADIUS client (the SE) and the RADIUS server.

Timeout

Number of seconds that the SE waits for a response from the specified RADIUS authentication server before declaring a timeout.

Retransmit

Number of times that the SE is to retransmit its connection to the RADIUS if the RADIUS timeout interval is exceeded.

Radius Redirect

Status of whether the RADIUS server redirects the response if an authentication request fails.

Reply-Message

Message sent to the user if redirection occurs.

URL(s) to authentication failure instructions expired

HTML page location or URL where the redirect message should be sent.

Servers

RADIUS servers that the SE is to use for RADIUS authentication.

IP

Hostname or IP address of the RADIUS server.

Port

Port number on which the RADIUS server is listening.


Related Commands

radius-server

show rea

To display the remote execution agent (REA) information use the show rea EXEC command.

show rea info

Syntax Description

info

(Optional)Displays the agent information.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example displays the REA information:

ServiceEngine#show rea info
rea agent is running

Related Commands

rea

show rcp

To display Remote Copy Program (RCP) information, use the show rcp EXEC command.

show rcp

Syntax Description

This command has no keywords or arguments.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

This example shows how to display RCP information:

ServiceEngine#show rcp
rcp service configurations:
rcp             enable

Related Commands

rcp

show rtsp

To display the Real-Time Streaming Protocol (RTSP) configurations, use the show rtsp EXEC command.

show rtsp [gateway]

Syntax Description

gateway

(Optional) Displays the RTSP gateway configuration.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example display the output of the show rtsp gateway EXEC command.

ServiceEngine#show rtsp gateway 
RTSP Gateway ip-address 10.107.193.30
RTSP Gateway incoming port 67 
RTSP Gateway L4-switch not enabled 
RTSP Gateway Transparent Interception:
             Not configured.

Related Commands

rtsp

show rule

To display rules configuration information, use the show rule EXEC command.

show rule action all [protocol {http | rtmp | rtsp}]

show rule action allow [protocol {http | rtmp | rtsp}]

show rule action block [protocol {http | rtmp | rtsp}]

show rule action generate-url-signature [protocol {http | rtmp | rtsp}]

show rule action no-cache [protocol {http | rtmp | rtsp}]

show rule action [protocol {http | rtmp | rtsp}]

show rule action redirect [protocol {http | rtmp | rtsp}]

show rule action refresh [protocol {http | rtmp | rtsp}]

show rule action rewrite [protocol {http | rtmp | rtsp}]

show rule action use-icap-service [protocol {http | rtmp | rtsp}]

show rule action validate-url-signature [protocol {http | rtmp | rtsp}]

show rule all

show rule pattern-list {1-512 pattern-type | all}

Syntax Description

all

Displays rules with all action types.

http

Displays HTTP-related requests for this action.

rtmp

Displays RTMP-related requests for this action.

rtsp

Displays RTSP-related requests for this action.

protocol

(Optional) Specifies the protocol to which actions apply.

allow

Allows the request.

block

Blocks the request.

generate-url-signature

Generates a signed URL.

no-cache

Does not cache the object.

redirect

Redirects the request to the rewritten URL.

refresh

Revalidates the object with the web server.

rewrite

Rewrites the URL and fetch.

use-icap-service

Sets ICAP service.

validate-url-signature

Validates a signed URL.

all

Displays all the configured actions and pattern lists.

pattern-list

Displays the rules with the specified patterns.

1-512

Specifies the pattern number (1-512).

pattern-type

Pattern type (see Table 2-41).

all

Displays rules with all pattern lists.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

You can use the show rule pattern-list pattern-type command to display rules using a specific pattern type. For a more complete explanation of specific rules, see the "rule" section.Table 2-41 shows the permitted pattern types and describes each pattern type.

Table 2-41 Pattern Types 

Pattern Type
Description

all

Displays configured patterns for all pattern types.

domain

Regular expression to match the domain name.

dst-ip

Destination IP address of the request.

header-field

Request header field pattern.

src-ip

Source IP address of the request.

url-regex

Regular expression to be matched against the URL.

url-regsub

Regular expression to match URL and replacement pattern.


Examples

The following example displays all rules with the configured action types and pattern lists:

ServiceEngine#show rule all
Rules Template Configuration
----------------------------
Rule Processing Enabled
rule block domain bar.com
rule block domain \.foo.com
rule rewrite url-regsub http://www.ietf.org/rfc/.* http://wwwin-eng.cisco.com/RFC/$1
rule no-cache dst-ip 172.31.120.0 255.255.192.0
rule no-cache url-regex \.*cgi-bin* 

Related Commands

clear
rule

show running-config

To display the current running configuration information on the terminal, use the show running-config EXEC command.

show running-config

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command with the show startup-config command to compare the information in running memory to the startup configuration used during bootup.


Note This command replaces the write terminal command.


Examples

The following example displays the current running configuration information:

ServiceEngine#show running-config
V2-CDE200-3#show running-config 
! CDS version 2.3.9
!
device mode service-engine
!
!
hostname V2-CDE200-3
!
!
primary-interface PortChannel 1
!
!
interface PortChannel 1
 ip address 3.1.14.72 255.255.255.0
 exit
interface PortChannel 2
 ip address 4.0.8.13 255.255.255.0
 exit
!
interface GigabitEthernet 1/0
 channel-group 2
 exit
interface GigabitEthernet 2/0
 channel-group 2
 exit
interface GigabitEthernet 3/0
 channel-group 1
 exit
interface GigabitEthernet 4/0
 channel-group 1
 exit
interface GigabitEthernet 5/0
 channel-group 1
 exit
interface GigabitEthernet 6/0
 channel-group 1
 exit
!
!
ip default-gateway 3.1.14.1
!
!
offline-operation enable
!
!
rule action block pattern-list 3   
rule action redirect http://www.baidu.com pattern-list 2   
rule pattern-list 1 url-regex http://chunliu.com/b.wmv
rule pattern-list 2 header-field request-line b.wmv
rule pattern-list 3 header-field request-line c.wmv
!
icap service camiant
  server icap://trythis/servername
  exit
!
!
transaction-logs enable
transaction-logs archive interval 120
!
username admin password 1 bVmDmMMmZAPjY
username admin privilege 15
!
!
authentication login local enable primary
authentication configuration local enable primary
!
access-lists 300 deny groupname Disney
access-lists 300 permit groupname any
access-lists enable
!
!
telnet enable
!
!
cdsm ip 4.0.8.10
cms enable
!
!
service-router service-monitor threshold wmt 50
service-router service-monitor number-of-samples wmt 5
service-router service-monitor sample-period wmt 15
qos device-policy-service enable
!
!
cache content max-cached-entries 1000
! End of CDS configuration
V2-CDE200-3#

Related Commands

configure
copy

show service-router

To display the service router configuration, use the show service-router EXEC command.

On the SE or on the CDSM:

show service-router {keepalive-interval | service-monitor}

On the SR:

show service-router {access-policy | content-based-routing | dns-ttl | forwarding [content-origin content-origin] | lastresort [domain name] | load {all | sename sename} | location-based-routing | proximity-based-routing | routes [content-origin content-origin] | service-monitor | services {all | sename sename} | summary [content-origin content-origin]}

Syntax Description

access-policy

Configures the service-router access-policy.

content-based-routing

Displays the content-based routing configuration.

dns-ttl

Displays the time to live (TTL) of domain name server (DNS) record.

forwarding

Displays the content origin forwarding tables.

content-origin

(Optional) Displays information for one content origin.

content-origin

Content origin fully qualified domain name (FQDN).

lastresort

Displays the domain and alternate domain configured.

domain

(Optional) Displays information for one domain.

name

Domain name.

load

Displays the load and threshold reached status.

all

Displays for all SEs.

sename

Displays for one SE.

sename

SE name.

location-based-
routing

Displays the location-based routing configurations.

proximity-based-
routing

Displays the proximity-based routing configurations.

routes

Displays the content origin routing tables.

service-monitor

Displays the service monitor configuration.

services

Displays the services status.

summary

Displays the content origin routing table summary statistics.

keepalive-interval

Displays the keepalive interval.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

This command allows users to check the service router-releated configuration. Through this command, users can view the configured features of an SR, such as location-based routing and content-based routing.

Examples

The following example displays the service router information on the SE:

ServiceEngine#show service-router service-monitor 
Monitor types configured:
-------------------------
CPU,MEM,KMEM,WMT,FMS,WEB,MS,DISK,NIC
Threshold values configured:
---------------------------
CPU         : 80%
MEM         : 80%
KMEM        : 50%
WMT         : 50%
FMS         : 90%
MS          : 90%
WEB         : 90%
NIC         : 90%
DISK        : 80%
DISKFAILCNT : 7
Sample periods configured:
--------------------------
CPU  : 1 (secs)
MEM  : 1 (secs)
KMEM : 1 (secs)
WMT  : 15 (secs)
FMS  : 1 (secs)
NIC  : 3 (secs)
DISK : 1 (secs)
Sample counts configured to use in calculating average:
-------------------------------------------------------
CPU  : 2
MEM  : 2
KMEM : 2
WMT  : 5
FMS  : 2
NIC  : 2
DISK : 2
Device Status
-------------
CPU
Current load          : 0%
Average load          : 0%
Threshold             : Not reached
DISK
Current load          : 0%
Average load          : 0%
Threshold             : Not reached
Status                : Operational
MEM
Average Used Memory   : 4%
Threshold             : Not reached
KMEM
Average Kernel Memory : 1%
Threshold             : Not reached
NIC
Average BW In         : 0%
Average BW Out        : 0%
Threshold             : Not reached
Average Device load   : 0%
Services Status
---------------
Critical Service(s)   : Running
WEB
Enabled               : Yes
Threshold             : Not reached
Stopped               : No
WMT
Enabled               : Yes
Current Stream Count  : 0
Threshold             : Not reached
Stopped               : No
MS
Enabled               : No
FMS
Enabled               : No

The following example displays the service router information on the CDSM:

CDSM#show service-router service-monitor 
Monitor types configured:
-------------------------
CPU,MEM,KMEM,DISK
Threshold values configured:
---------------------------
CPU         : 80%
MEM         : 80%
KMEM        : 50%
DISK        : 80%
DISKFAILCNT : 1
Sample periods configured:
--------------------------
CPU  : 1 (secs)
MEM  : 1 (secs)
KMEM : 1 (secs)
DISK : 1 (secs)
Sample counts configured to use in calculating average:
-------------------------------------------------------
CPU  : 2
MEM  : 2
KMEM : 2
DISK : 2
Device Status
-------------
CPU
Current load          : 0%
Average load          : 0%
Threshold             : Not reached
DISK
Current load          : 0%
Average load          : 0%
Threshold             : Not reached
Status                : Operational
MEM
Average Used Memory   : 13%
Threshold             : Not reached
KMEM
Average Kernel Memory : 1%
Threshold             : Not reached
Average Device load   : 0%

Related Commands

service-router

show services

To display services-related information, use the show services EXEC command.

show services {ports [port-num] | summary}

Syntax Description

ports

Displays services by port number.

port-num

(Optional) Up to eight port numbers (1-65535).

summary

Displays the services summary.


Defaults

No default behavior or values.

Command Modes

EXEC

Examples

The following example displays the services information by the port number:

CDSM# show services ports
Service information by port
 ---------------------------
  550    Started on Mon Oct 14 12:13:20 2002
         Runs 1 service
                Cisco_Streaming_Engine
  553    Started on Mon Oct 14 12:13:20 2002
         Runs 1 service
                RTSP_Gateway
  554    Started on Mon Oct 14 12:13:20 2002
         Runs 1 service
                RTSP_Gateway
	.
	.
	.
15256    Started on Mon Oct 14 12:13:20 2002
         Runs 1 service
                CMS
27999    Started on Mon Oct 14 12:13:20 2002
         Runs 1 service
                Real_Server
28000    Started on Mon Oct 14 12:13:20 2002
         Runs 1 service
                Real_Proxy

The following example displays a services information summary, showing the service and the associated port numbers:

CDSM# show services summary  
             Service        Ports
-----------------------------------------------------
                 CMS         15256  2000  2001  2002  2003  2004  2005 
                 GUI          8001 
                 Wmt          1755  1756  1757  1799 
                 icp          3128 
                emdb          5432 
             CertMgr          6001 
           MgmtAgent          5252 
          Real_Proxy          1090  8082  9002   555 28000  7879  6060  7071  30
31 
         Cdsm_UI_http          8443 
         Real_Server          7070  8081  9091 27999  7878  7802  1554  3030  40
40  5050 
        RTSP_Gateway           554   553 
     RPC_APACHE_PORT          6550 
temp_RPC_APACHE_PORT          8008 
Cisco_Streaming_Engine         550 SNMP 

show snmp

To check the status of Simple Network Management Protocol (SNMP) communications, use the show snmp EXEC command.

show snmp {alarm-history | engineID | group | stats | user}

Syntax Description

alarm-history

Displays SNMP alarm history information.

engineID

Displays the local SNMP engine identifier.

group

Displays SNMP groups.

stats

Displays SNMP statistics.

user

Displays SNMP users.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

This command provides information on various SNMP variables and statistics on SNMP operations.

Examples

Table 2-42 describes the fields shown in the snmp alarm-history display.

Table 2-42 show snmp alarm-history Field Descriptions 

Field
Description

Index

Serial number of the listed alarms.

Type

Status of whether the alarm has been Raised or Cleared.

Sev

Levels of alarm severity (Critical, Major, or Minor).

Alarm ID

Traps sent by a CDS device contain numeric alarm IDs.

ModuleID

Traps sent by a CDS device contain numeric module IDs. See Table 2-43 to map module names to module IDs.

Category

Traps sent by an CDS device contain numeric category IDs. See Table 2-44 to map category names to category IDs.

Descr

Description of the Internet Streamer CDS software alarm and the application that generated the alarm.


Table 2-43 describes themapping of module names to module ids.

Table 2-43 Mapping of Module Names to Module IDs  

Module Name
Module ID

acquirer

4000

AD_DATABASE

8000

cms

3000

MULTICAST_DATA_SENDER

7000

NHM

1

NHM/NHM

2500

nodemgr

2000

standby

4000

sysmon

1000

UNICAST_DATA_RECEIVER

5000

UNICAST_DATA_SENDER

6000


Table 2-44 describes themapping of category names to category ids.

Table 2-44 Mapping of Category Names to Category IDs  

Category Name
Category ID

Communications

1

Service Quality

2

Processing Error

3

Equipment

4

Environment

5

Content

6


Table 2-45 describes the fields shown in the show snmp stats display.

Table 2-45 show snmp stats Field Descriptions 

Field
Description

SNMP packets input

Total number of SNMP packets input.

Bad SNMP version errors

Number of packets with an invalid SNMP version.

Unknown community name

Number of SNMP packets with an unknown community name.

Illegal operation for community name supplied

Number of packets requesting an operation not allowed for that community.

Encoding errors

Number of SNMP packets that were improperly encoded.

Number of requested variables

Number of variables requested by SNMP managers.

Number of altered variables

Number of variables altered by SNMP managers.

Get-request PDUs

Number of GET requests received.

Get-next PDUs

Number of GET-NEXT requests received.

Set-request PDUs

Number of SET requests received.

SNMP packets output

Total number of SNMP packets sent by the router.

Too big errors

Number of SNMP packets that were larger than the maximum packet size.

Maximum packet size

Maximum size of SNMP packets.

No such name errors

Number of SNMP requests that specified a MIB object that does not exist.

Bad values errors

Number of SNMP SET requests that specified an invalid value for a MIB object.

General errors

Number of SNMP SET requests that failed because of some other error. (It was not a No such name error, Bad values error, or any of the other specific errors.)

Response PDUs

Number of responses sent in reply to requests.

Trap PDUs

Number of SNMP traps sent.


Table 2-46 describes the fields shown in the show snmp engineID display.

Table 2-46 show snmp engineID Field Descriptions

Field
Description

Local SNMP Engine ID

String that identifies the copy of SNMP on the local device.


Table 2-47 describes the fields shown in the show snmp group display.

Table 2-47 show snmp group Field Descriptions

Field
Description

groupname

Name of the SNMP group, or collection of users who have a common access policy.

security_model

Security model used by the group (v1, v2c, or v3).

readview

String identifying the read view of the group.

writeview

String identifying the write view of the group.

notifyview

String identifying the notify view of the group.


Table 2-48 describes the fields shown in the show snmp user display.

Table 2-48 show snmp user Field Descriptions

Field
Description

User name

String identifying the name of the SNMP user.

Engine ID

String identifying the name of the copy of SNMP on the device.

Group Name

Name of the SNMP group, or collection of users who have a common access policy.


Related Commands

snmp-server community
snmp-server contact
snmp-server enable traps
snmp-server group
snmp-server host
snmp-server location
snmp-server notify inform
snmp-server user
snmp-server view

show ssh

To display Secure Shell (SSH) status and configuration information, use the show ssh EXEC command.

show ssh

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

To display SSH status, enter the show ssh EXEC command.

Related Commands

sshd

show standby

To display standby interface information, use the show standby EXEC command.

show standby

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

To display standby interface information, enter the show standby EXEC command.

Examples

Table 2-49 describes the fields shown in the show standby display.

Table 2-49 show standby Field Descriptions 

Field
Description

Standby Group

Number that identifies the standby group.

Description

Description of the device, as configured by using the description option of the interface global configuration command.

IP address

IP address of the standby group.

netmask

Netmask of the standby group.

Member interfaces

Member interfaces of the standby group. Shows which physical interfaces are part of the standby group. Shows the interface definition, such as GigabitEthernet 1/0.

priority

Priority status of each interface.

Active interface

Interfaces that are currently active in the standby group.

Maximum errors allowed on the active interface

Maximum number of errors allowed on the active interface.


Related Commands

show interface
show running-config
show startup-config

show startup-config

To display the startup configuration, use the show startup-config EXEC command.

show startup-config

Syntax Description

This command has no keywords or arguments.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Use this command to display the configuration used during an initial bootup, stored in nonvolatile random-access memory (NVRAM).

Examples

The following example displays the startup configuration details on the SE:

ServiceEngine#show startup-config
! CDS version 2.3.9
!
device mode service-engine
!
!
hostname V2-CDE200-3
!
!
!
primary-interface PortChannel 1
!
!
interface PortChannel 1
 ip address 3.1.14.72 255.255.255.0
 exit
interface PortChannel 2
 ip address 4.0.8.13 255.255.255.0
 exit
!
interface GigabitEthernet 1/0
 channel-group 2
 exit
interface GigabitEthernet 2/0
 channel-group 2
 exit
interface GigabitEthernet 3/0
 channel-group 1
 exit
interface GigabitEthernet 4/0
 channel-group 1
 exit
interface GigabitEthernet 5/0
 channel-group 1
 exit
interface GigabitEthernet 6/0
 channel-group 1
 exit
!
!
ip default-gateway 3.1.14.1
!
!
offline-operation enable
!
!
!
rule action block pattern-list 3   
rule action redirect http://www.baidu.com pattern-list 2   
rule pattern-list 1 url-regex http://chunliu.com/b.wmv
rule pattern-list 2 header-field request-line b.wmv
rule pattern-list 3 header-field request-line c.wmv
!
icap service camiant
  server icap://trythis/servername
  exit
!
!
!
transaction-logs enable
transaction-logs archive interval 120
!
username admin password 1 bVmDmMMmZAPjY
username admin privilege 15
!
!
authentication login local enable primary
authentication configuration local enable primary
!
access-lists 300 deny groupname Disney
access-lists 300 permit groupname any
access-lists enable
!
!
telnet enable
!
!
!
cdsm ip 4.0.8.10
cms enable
!
!
!
service-router service-monitor threshold wmt 50
service-router service-monitor number-of-samples wmt 5
service-router service-monitor sample-period wmt 15
qos device-policy-service enable
!
!
cache content max-cached-entries 1000
! End of CDS configuration

Related Commands

configure
copy
show running-config

show statistics access-lists 300

To display SE access control list statistics, use the show statistics access-lists 300 EXEC command.

show statistics access-lists 300

Syntax Description

This command has no keywords or arguments.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The access control list statistics display the number of access requests, denials, and permissions recorded. Use the show statistics access-lists 300 command to display the number of group name accesses recorded.

Examples

Table 2-50 describes the fields shown in the show statistics access-lists 300 display.

Table 2-50 show statistics access-lists 300 Field Descriptions

Field
Description

Access Control Lists Statistics

Groupname and username-based List

Lists the group name-based access control lists.

Number of requests

Number of requests.

Number of deny responses

Number of deny responses.

Number of permit responses

Number of permit responses.


Related Commands

clear

show statistics acquirer

To display SE acquirer channel statistics, use the show statistics acquirer EXEC command.

show statistics acquirer [contents {delivery-service-id delivery-service-id | delivery-service-name delivery-service-name} | delivery-service-id delivery-service-id | delivery-service-name delivery-service-name | errors {delivery-service-id delivery-service-id | delivery-service-name delivery-service-name} | job-list {delivery-service-id delivery-service-id | delivery-service-name delivery-service-name}]

Syntax Description

contents

(Optional) Displays the acquired contents of the specified channel.

delivery-service-id

Displays acquirer statistics for the specified delivery service id.

delivery-service-id

Delivery service ID.

delivery-service-name

Displays acquirer statistics for the specified delivery service name.

delivery-service-name

Delivery service name.

errors

(Optional) Displays the acquisition error logs for the specified channel.

job-list

(Optional) Displays the job list statistics for the specified channel.


Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

The show statistics acquirer command displays acquirer statistics for all channels for which the SE is the root SE. The output of the command displays any manifest file parsing or fetch errors if any errors occur. It displays the total number of acquired objects, number of failed objects, and total disk space used by the acquired objects. When a channel ID or name is specified, acquirer statistics are displayed for that channel specified by ID or name.

The show statistics acquirer contents command displays all the acquired content, its size, and its last-modified time, specified by channel ID or name.

The show statistics acquirer errors command displays acquisition errors, if any, for the channel specified by ID or name. Manifest file parsing and fetch errors, as well as single item or crawler job errors, are displayed.

The show statistics acquirer job-list command displays the details of all the single items and crawler jobs for the channel specified by ID or name.

Examples

Table 2-51 describes the fields shown in the show statistics acquirer display.

Table 2-51 show statistics acquirer Field Descriptions 

Field
Description

Statistics For Channel ID: channel-id

Delivery-service-id

Delivery service identification number.

Delivery-service-name

Name of the delivery service.

Manifest

Fetch Errors

Number of manifest file fetch errors.

Parsing Errors

Number of manifest file parsing errors.

Acquisition

Total Number of Acquired Objects

Total number of acquired objects.

Total Size of Acquired Objects (Bytes)

Total size of acquired objects (in bytes).

Total Number of Failed Objects

Total number of failed objects.


Related Commands

acquirer (EXEC)
clear statistics
show acquirer

show statistics authentication

To display SE authentication statistics, use the show statistics authentication EXEC command.

show statistics authentication

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Usage Guidelines

Authentication statistics display the number of access requests, denials, and allowances recorded. Use the show statistics authentication command to display the number of authentication accesses recorded.

Examples

The fields shown in the show statistics authentication display include the following

Number of access requests

Number of access deny responses

Number of access allow responses

Related Commands

authentication
clear statistics
show authentication
show statistics authentication

show statistics cdnfs

To display SE CDS network file system (cdnfs) statistics, use the show statistics cdnfs EXEC command.

show statistics cdnfs

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

EXEC

Examples

Table 2-52 describes the show statistics cdnfs command fields displayed in the command output.

Table 2-52 show statistics cdnfs Fields  

Field
Description

Size of physical file system

Physical disk size of the CDS network file system.

Space assigned for cdnfs purposes

Amount of physical disk space on the CDS network file system that has been assigned to hold pre-positioned objects. The space can be less than the size of the file system.

Number of cdnfs entries

Number of cdnfs objects in the CDS network file system.

Note One pre-positioned file internally uses two cdnfs entries. The count of cdnfs entries will be twice the number of actual files displayed to users.

Space reserved for cdnfs entries

Amount of disk space reserved for existing pre-positioned objects. This space is reserved for cdnfs objects before the file is created and written to the file system.

Available space for new entries

Amount of physical disk space available in the CDS network file system for new pre-positioned objects.

Physical file system in use

Amount of physical disk space currently in use by the CDS network file system.

Physical file system space free

Amount of unused physical disk space in the CDS network file system.

Physical file system percentage in use

Percentage of physical disk space in use relative to the total disk space available.


Related Commands

cdnfs
clear
show cdnfs
show disks