Table Of Contents
Cisco Internet Streamer CDS Release 3.2 Software Commands
aaa
access-lists
acquirer (EXEC)
acquirer (Global configuration)
acquisition-distribution
alarm
area nssa
area stub
asset
authsvr
bandwidth (Global configuration)
bandwidth (interface configuration)
banner
bitrate
blink
bootstrap-node
cache
capability
cd
cdn-select
cdnfs
cdsm
clear cache
clear content
clear ip
clear ipv6
clear isis
clear logging
clear service-router
clear srp database offline
clear srp descriptor
clear srp neighbor
clear srp resource
clear srp route
clear statistics
clear transaction-logs
clear users
clear wmt
clock (EXEC)
clock (Global configuration)
cms (EXEC)
cms (Global configuration)
configure
contentmgr
content-mgr disk-info force-reset
content-origin
copy
cpfile
debug
debug ip bgp
debug ip ospf
debug ip proximity
debug ip rib
debug isis
debug srp
delfile
deltree
device
dir
direct-server-return
disable
disk (EXEC)
disk (Global configuration)
distribution
dnslookup
domain
enable
enable password
end
exec-timeout
exit
expert-mode password
external-ip
find-pattern
flash-media-streaming
flooding
geo-location-server
gulp
help
hostname
install
interface
ip (Global configuration)
ip (Interface configuration)
ip access-list
ip ospf priority
ip rib route
ip router isis
ipv6
isis
is-type
kernel
key
key-string
key chain
lacp
line
Cisco Internet Streamer CDS Release 3.2 Software Commands
This chapter contains an alphabetical listing of all the commands in Cisco Internet Streamer CDS Release 3.2 software. The Internet Streamer CDS software CLI is organized into the following command modes:
•
EXEC mode—For setting, viewing, and testing system operations. It is divided into two access levels, user and privileged. To use the privileged access level, enter the enable command at the user access level prompt and then enter the privileged EXEC password when you see the password prompt.
•
Global configuration (config) mode—For setting, viewing, and testing the configuration of Internet Streamer CDS software features for the entire device. To use this mode, enter the configure command from privileged EXEC mode.
•
Interface configuration (config-if) mode—For setting, viewing, and testing the configuration of a specific interface. To use this mode, enter the interface command from Global configuration mode.
•
Other configuration modes—Several configuration modes are available from the Global configuration mode for managing specific features. The commands used to access these modes are marked with a footnote in Table 2-1.
See Chapter 1 "Command-Line Interface Command Summary," for a complete discussion of using CLI command modes.
Table 2-1 summarizes the Internet Streamer CDS commands and indicates the command mode for each command. The same command may have different effects when entered in a different command mode, and for this reason, they are listed and documented separately. In Table 2-1, when the first occurrence is entered in EXEC mode, the second occurrence is entered in Global configuration mode. When the first occurrence is entered in Global configuration mode, the second occurrence is entered in interface configuration mode.
The Internet Streamer CDS software device mode determines whether the Internet Streamer CDS device is functioning as a Service Engine (SE), CDS Manager (CDSM), or Service Router (SR). The commands available from a specific CLI mode are determined by the Internet Streamer CDS device mode in effect. Table 2-1 also indicates the device mode for each command. All indicates that the command is available for every device mode.
Note
When viewing this guide online, click the name of the command in the left column of the table to jump to the command page, which provides the command syntax, examples, and usage guidelines.
Note
See "Acronyms" for an expansion of all acronyms used in this publication.
Table 2-1 CLI Commands
Command
|
Description
|
CLI Mode
|
Device Mode
|
aaa
|
Specifies accounting, authentication and authorization methods.
|
Global configuration
|
All
|
access-lists
|
Configures the access control list entries.
|
Global configuration
|
SE
|
acquirer (EXEC)
|
Configures the content acquirer.
|
Privileged-level EXEC
|
SE
|
acquirer (Global configuration)
|
Enables authentication when the acquirer obtains content through a proxy server.
|
Global configuration
|
SE
|
acquisition-distribution
|
Starts and stops the acquisition and distribution database cleanup process and the content acquisition and distribution process.
|
Privileged-level EXEC
|
SE
|
alarm
|
Configures alarms.
|
Global configuration
|
All
|
area nssa
|
Configures an area as an NSSA1 .
|
OSPF configuration
|
SR
|
area stub
|
Defines an area as a stub area.
|
OSPF configuration
|
SR
|
asset
|
Configures the CISCO-ENTITY- ASSET-MIB.
|
Global configuration
|
All
|
authsvr
|
Enables and configures the Authorization server.
|
Global configuration
|
SE
|
bandwidth (Global configuration)
|
Sets the allowable bandwidth usage and its duration for the Movie Streamer and WMT2 streaming media.
|
Global configuration
|
SE
|
bandwidth (interface configuration)
|
Sets the specified interface bandwidth to 10, 100, or 1000 Mbps.
|
Interface configuration
|
All
|
banner
|
Configures the EXEC, login, and MOTD3 banners.
|
Global configuration
|
All
|
bitrate
|
Configures the maximum pacing bit rate for the Movie Streamer and configures WMT bit-rate settings.
|
Global configuration
|
SE
|
blink
|
Identifies physical devices by blinking their LED(s).
|
Privileged-level EXEC
|
All
|
bootstrap-node
|
Configures a bootstrap node IP address.
|
SRP configuration
|
SR
|
cache
|
Specifies the cache commands.
|
Global configuration
|
SE
|
capability
|
Modifies the capability configuration.
|
Global configuration
|
SE
|
cd
|
Changes the directory.
|
User-level EXEC and privileged-level EXEC
|
All
|
cdn-select
|
Enables the CDN Selector for third-party service selection.
|
Global Configuration
|
SR
|
cdnfs
|
Manages the Internet Streamer CDNFS4 .
|
Privileged-level EXEC
|
SE
|
cdsm
|
Configures the CDSM IP address and primary or standby role settings.
|
Global configuration
|
All
|
clear cache
|
Clears the HTTP object cache.
|
Privileged-level EXEC
|
SE, SR
|
clear content
|
Clears the URL content.
|
Privileged-level EXEC
|
SE, SR
|
clear ip
|
Clears the IP configuration.
|
Privileged-level EXEC
|
All
|
clear ipv6
|
Clears the IPv6 configuration.
|
Privileged-level EXEC
|
All
|
clear isis
|
Clears the IS-IS Routing for IP.
|
Privileged-level EXEC
|
SR
|
clear logging
|
Clears the syslog messages saved in the disk file.
|
Privileged-level EXEC
|
All
|
clear service-router
|
Clears the Service Router.
|
Privileged-level EXEC
|
SR
|
clear srp database offline
|
Clears the SRP database while it is offline.
|
Privileged-level EXEC
|
SR
|
clear srp descriptor
|
Deletes a single descriptor or all descriptors from the service routing layer.
|
Privileged-level EXEC
|
SR
|
clear srp neighbor
|
Removes a neighbor Proximity Engine from the neighbor list of the local Proximity Engine.
|
Privileged-level EXEC
|
SR
|
clear srp resource
|
Deletes a resource from a descriptor in the service routing layer.
|
Privileged-level EXEC
|
SR
|
clear srp route
|
Deletes a single route entry from the DHT routing table of the local Proximity Engine.
|
Privileged-level EXEC
|
SR
|
clear statistics
|
Clears the statistics.
|
Privileged-level EXEC
|
All
|
clear transaction-logs
|
Clears and archives the working transaction logs.
|
Privileged-level EXEC
|
SE, SR
|
clear users
|
Clears the connections (login) of authenticated users.
|
Privileged-level EXEC
|
All
|
clear wmt
|
Clears the WMT streams.
|
Privileged-level EXEC
|
SE
|
clock (EXEC)
|
Manages the system clock.
|
Privileged-level EXEC
|
All
|
clock (Global configuration)
|
Sets the summer daylight saving time of day and time zone.
|
Global configuration
|
All
|
cms (EXEC)
|
Configures the CMS5 -embedded database parameters.
|
Privileged-level EXEC
|
All
|
cms (Global configuration)
|
Schedules the maintenance and enables the Centralized Management System on a given node.
|
Global configuration
|
All
|
configure6
|
Enters configuration mode from privileged EXEC mode.
|
Privileged-level EXEC
|
All
|
contentmgr
|
Configures the Content Manager.
|
Global configuration
|
SE
|
content-mgr disk-info force-reset
|
Forces the Content Manager to reset the disk share memory information.
|
User-level EXEC and privileged-level EXEC
|
SE
|
content-origin
|
Supports multiple origin servers within a content origin.
|
Global configuration
|
SE
|
copy
|
Copies the configuration or image files to and from the CD-ROM, flash memory, disk, or remote hosts.
|
Privileged-level EXEC
|
All
|
cpfile
|
Copies a file.
|
User-level EXEC and privileged-level EXEC
|
All
|
debug
|
Configures the debugging options.
|
Privileged-level EXEC
|
All
|
debug ip bgp
|
Displays information related to the BGP process.
|
Privileged-level EXEC
|
SR
|
debug ip ospf
|
Displays information related to the OSPF process.
|
Privileged-level EXEC
|
SR
|
debug ip proximity
|
Debugs the transport layer of proximity process.
|
Privileged-level EXEC
|
SR
|
debug ip rib
|
Turns on proximity debugging information.
|
Privileged-level EXEC
|
SR
|
debug isis
|
Displays information related to the IS-IS process.
|
Privileged-level EXEC
|
SR
|
debug srp
|
Turns on SRP debugging information.
|
Privileged-level EXEC
|
SR
|
delfile
|
Deletes a file.
|
User-level EXEC and privileged-level EXEC
|
All
|
deltree
|
Deletes a directory and its subdirectories.
|
User-level EXEC and privileged-level EXEC
|
All
|
device
|
Configures the mode of operation on a device.
|
Global configuration
|
All
|
dir
|
Displays the list of files in a directory.
|
User-level EXEC and privileged-level EXEC
|
All
|
direct-server-return
|
Enables a VIP for direct server return.
|
Global configuration
|
SE, SR
|
disable
|
Turns off the privileged EXEC commands.
|
Privileged-level EXEC
|
All
|
disk (EXEC)
|
Allocates the disks among the CDNFS and sysfs file systems.
|
Privileged-level EXEC
|
All
|
disk (Global configuration)
|
Configures how the disk errors should be handled.
|
Global configuration
|
All
|
distribution
|
Reschedules and refreshes the content redistribution through multicast for all delivery services or a specified delivery service ID or name.
|
Privileged-level EXEC
|
SE
|
dnslookup
|
Resolves a host or domain name to an IP address.
|
User-level EXEC and privileged-level EXEC
|
All
|
domain
|
Sets the domain ID for the SRP.
|
SRP configuration
|
SR
|
enable6
|
Accesses the privileged EXEC commands.
|
User-level EXEC and privileged-level EXEC
|
All
|
enable password
|
Changes the enable password.
|
Global configuration
|
All
|
end
|
Exits configuration and privileged EXEC modes.
|
Global configuration
|
All
|
exec-timeout
|
Configures the length of time that an inactive Telnet or SSH7 session remains open.
|
Global configuration
|
All
|
exit
|
Exits from interface, Global configuration, or privileged EXEC modes.
|
All
|
All
|
expert-mode password
|
Sets the expert-mode password.
|
Global configuration
|
All
|
external-ip
|
Configures up to a maximum of eight external IP addresses.
|
Global configuration
|
All
|
find-pattern
|
Searches for a particular pattern in a file.
|
Privileged-level EXEC
|
All
|
flash-media-streaming
|
Enables and configures Flash Media Streaming.
|
Global configuration
|
SE, SR
|
flooding
|
Sets the flooding threshold for SRP multicast.
|
SRP configuration
|
SR
|
geo-location-server
|
Redirects requests to different CDNs based on the geographic location of the client.
|
Global configuration
|
SR
|
gulp
|
Captures lossless gigabit packets and writes them to disk.
|
Privileged-level EXEC
|
SE
|
help
|
Obtains online help for the command-line interface.
|
Global configuration and user-level EXEC
|
All
|
hostname
|
Configures the device network name.
|
Global configuration
|
All
|
install
|
Installs a new version of the caching application.
|
Privileged-level EXEC
|
All
|
interface6
|
Configures a Gigabit Ethernet or port channel interface. Provides access to interface configuration mode.
|
Global configuration
|
All
|
ip (Global configuration)
|
Configures the Internet Protocol.
|
Global configuration
|
All
|
ip (Interface configuration)
|
Configures the interface Internet Protocol.
|
Interface configuration
|
All
|
ip access-list6
|
Creates and modifies the access lists for controlling access to interfaces or applications. Provides access to ACL configuration mode.
|
Global configuration
|
All
|
ip ospf priority
|
Sets the router priority, which helps determine the designated router for this network.
|
Interface configuration mode under OSPF configuration
|
SR
|
ip rib route
|
Configures unicast static routes for the Proximity Engine.
|
Global configuration
|
SR
|
ip router isis
|
Specifies the interfaces to be used for routing IS-IS.
|
Interface configuration mode under IS-IS configuration mode
|
SR
|
ipv6
|
Specifies the default gateway's IPv6 address.
|
Global configuration
|
SE
|
isis
|
Configures IS-IS routing for IP.
|
Interface configuration mode under IS-IS configuration
|
SR
|
is-type
|
Configures a Proximity Engine to act as a Level 1 (intra-area) router, as both a Level 1 router and a Level 2 (interarea) router, or as an inter-area router only.
|
IS-IS configuration
|
SR
|
kernel
|
Configures the kernel.
|
Global configuration
|
All
|
key
|
Creates a key ID and enters into key ID configuration submode.
|
Key chain submode
|
SR
|
key-string
|
Creates a key string to be used for authentication.
|
Key ID configuration submode
|
SR
|
key chain
|
Creates a key chain and enters into key chain configuration submode.
|
Global configuration
|
SR
|
lacp8
|
Turns on LACP.
|
Interface configuration
|
All
|
line
|
Specifies the terminal line settings.
|
Global configuration
|
All
|
lls
|
Displays the files in a long-list format.
|
User-level EXEC and privileged-level EXEC
|
All
|
location community
|
Configures the community values that are associated with a Proximity Engine.
|
BGP configuration
|
SR
|
log-adjacency-changes
|
Configures the router to send a syslog message when an IS-IS neighbor goes up or down.
|
BGP, IS-IS and OSPF configuration
|
SR
|
logging
|
Configures syslog9 .
|
Global configuration
|
All
|
log-neighbor-changes
|
Enables logging of BGP neighbor resets.
|
BGP configuration
|
SR
|
ls
|
Lists the files and subdirectories in a directory.
|
User-level EXEC and privileged-level EXEC
|
All
|
lsp-mtu
|
Sets the maximum transmission unit MTU10 size of IS-IS LSPs.
|
IS-IS configuration
|
SR
|
mkdir
|
Makes a directory.
|
User-level EXEC and privileged-level EXEC
|
All
|
mkfile
|
Makes a file (for testing).
|
User-level EXEC and privileged-level EXEC
|
All
|
model
|
Changes the CDE250 platform model number after a remanufacturing or rescue process.
|
User-level EXEC and privileged-level EXEC
|
All
|
movie-streamer
|
Enables and configures the Movie Streamer server.
|
Global configuration
|
SE
|
multicast (Global Configuration)
|
Configures multicast options.
|
Global configuration
|
SE
|
multicast (EXEC Configuration)
|
Generate multicast packets and tests connectivity through multicast routers.
|
User-level EXEC and privileged-level EXEC
|
SE, CDSM
|
mtu
|
Sets the interface maximum transmission unit packet size.
|
Interface configuration
|
All
|
neighbor
|
Configures the BGP neighbors.
|
BGP configuration
|
SR
|
net
|
Configures an IS-IS NET11 for a CLNS12 routing process.
|
IS-IS configuration
|
SR
|
netmon
|
Displays the transmit and receive activity on an interface.
|
Privileged-level EXEC
|
SE
|
netstatr
|
Displays the rate of change of netstat statistics.
|
Privileged-level EXEC
|
SE
|
network area
|
Defines the interfaces on which OSPF runs and defines the area ID for those interfaces.
|
OSPF configuration
|
SR
|
no (Global configuration)
|
Negates a Global configuration command or sets its defaults.
|
Global configuration
|
All
|
no (interface configuration)
|
Negates an interface command or sets its defaults.
|
Interface configuration
|
All
|
ntp
|
Configures the Network Time Protocol server.
|
Global configuration
|
All
|
ntpdate
|
Sets the NTP software clock.
|
Privileged-level EXEC
|
All
|
ping
|
Sends the echo packets.
|
User-level EXEC and privileged-level EXEC
|
All
|
ping srp
|
Pings the SRP ring.
|
User-level EXEC and privileged-level EXEC
|
SR
|
ping6
|
Pings the IPv6 address.
|
User-level EXEC and privileged-level EXEC
|
SE
|
port-channel
|
Configures the port channel load balancing options.
|
Global configuration
|
All
|
primary-interface
|
Configures a primary interface for the Internet Streamer CDS network to be a Gigabit Ethernet or port channel interface.
|
Global configuration
|
All
|
proximity algorithm bgp
|
Enables a BGP proximity algorithm option for the Proximity Engine.
|
Global configuration
|
SR
|
proximity engine enable
|
Enables the Proximity Engine.
|
Global Configuration
|
SR
|
pwd
|
Displays the present working directory.
|
User-level EXEC and privileged-level EXEC
|
All
|
radius-server
|
Configures the RADIUS authentication.
|
Global configuration
|
All
|
rcp
|
Enables RCP.
|
Global configuration
|
All
|
reload
|
Halts a device and performs a cold restart.
|
Privileged-level EXEC
|
All
|
rename
|
Renames a file.
|
User-level EXEC and privileged-level EXEC
|
All
|
restore
|
Restores a device to its manufactured default status.
|
Privileged-level EXEC
|
All
|
rmdir
|
Removes a directory.
|
User-level EXEC and privileged-level EXEC
|
All
|
router bgp
|
Configures a BGP routing process.
|
Global configuration
|
SR
|
router isis
|
Enables the IS-IS routing protocol and specifies an IS-IS process.
|
Global configuration
|
SR
|
router ospf
|
Enables the OSPF13 routing process.
|
Global configuration
|
SR
|
router srp
|
Enters SRP configuration mode.
|
Global configuration
|
SR
|
rtsp
|
Configures the Real-Time Streaming Protocol-related parameters.
|
Global configuration
|
SE
|
rule
|
Sets the rules by which the SE filters HTTP, HTTPS, and RTSP traffic.
|
Global configuration
|
SE
|
script
|
Checks the errors in a script or executes a script.
|
Privileged-level EXEC
|
All
|
service
|
Specifies the type of service.
|
Privileged-level EXEC
|
All
|
service-router
|
Configures service routing.
|
Global configuration
|
All
|
setup
|
Configures the basic configuration settings and a set of commonly used caching services.
|
Privileged-level EXEC
|
All
|
show aaa
|
Displays the accounting, authentication, and authorization configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show access-lists 300
|
Displays the access control list configuration.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show acquirer
|
Displays the acquirer delivery service information and progress for a specified delivery service number or name.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show alarms
|
Displays information on various types of alarms, their status, and history.
|
User-level EXEC and privileged-level EXEC
|
All
|
show arp
|
Displays the Address Resolution Protocol entries.
|
User-level EXEC and privileged-level EXEC
|
All
|
show authentication
|
Displays the authentication configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show authsvr
|
Displays the Authorization Server status.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show bandwidth
|
Displays the bandwidth allocated to a particular device.
|
User-level EXEC and privileged-level EXEC
|
SE, SR
|
show banner
|
Displays information on various types of banners.
|
User-level EXEC and privileged-level EXEC
|
All
|
show bitrate
|
Displays the SE bit-rate configuration.
|
User-level EXEC and privileged-level EXEC
|
SE, SR
|
show cache
|
Displays a list of cached contents.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show cache-router
|
Displays cache-route information for various Protocol Engines.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show capability
|
Displays information for the Cap-X profile ID.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show cdn-select
|
Displays the status of the CDN Selector.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show cdnfs
|
Displays the Internet Streamer CDS network file system information.
|
User-level EXEC and privileged-level EXEC
|
CDSM, SE
|
show clock
|
Displays the system clock.
|
User-level EXEC and privileged-level EXEC
|
All
|
show cms
|
Displays the Centralized Management System protocol, embedded database content, maintenance status, and other information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show content
|
Displays all content entries in the CDS.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show content-mgr
|
Displays all content management information in the CDS.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show content-origin
|
Displays information about the NAS14 mount.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show debugging
|
Displays the state of each debugging option.
|
User-level EXEC and privileged-level EXEC
|
All
|
show debugging srp
|
Displays the debug flags that are turned on for the SRP.
|
Privileged-level EXEC
|
SR
|
show device-mode
|
Displays the configured or current mode of a CDSM, SE, or SR device.
|
User-level EXEC and privileged-level EXEC
|
All
|
show direct-server-return
|
Displays the Direct Server return information.
|
User-level EXEC and privileged-level EXEC
|
SE, SR
|
show disks
|
Displays the disk configurations.
|
User-level EXEC and privileged-level EXEC
|
All
|
show distribution
|
Displays the distribution information for a specified delivery service.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show flash
|
Displays the flash memory information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show flash-media-streaming
|
Displays the Flash Media Streaming information.
|
User-level EXEC and privileged-level EXEC
|
SE, SR
|
show ftp
|
Displays the caching configuration of the FTP15 .
|
User-level EXEC and privileged-level EXEC
|
All
|
show hardware
|
Displays the system hardware information.
|
Privileged-level EXEC
|
All
|
show hosts
|
Displays the IP domain name, name servers, IP addresses, and host table.
|
User-level EXEC and privileged-level EXEC
|
All
|
show interface
|
Displays the hardware interface information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show inventory
|
Displays the system inventory information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show ip access-list
|
Displays the information about access lists that are defined and applied to specific interfaces or applications.
|
Privileged-level EXEC
|
All
|
show ip bgp
|
Displays the contents of a particular host in the BGP routing table.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip bgp all
|
Displays the contents of the BGP routing table.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip bgp community
|
Displays BGP routes that match a specified BGP community string.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip bgp ipv4 unicast
|
Displays information relating to all IPV4 unicast routes in the BGP routing table.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip bgp memory
|
Displays memory usage information of the running BGP daemon.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip bgp neighbors
|
Displays information about the TCP and BGP connections to neighbors.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip bgp nexthop-database
|
Displays the next-hop database information in the BGP routing table.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip bgp summary
|
Displays the status of all BGP connections.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip interface
|
Displays the IP interface state and its address and mask for all interfaces.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf
|
Displays general information about OSPF routing processes.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf border-routers
|
Displays general information about OSPF border routers.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf database
|
Displays information specific to the OSPF database for a specific router.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf interface
|
Displays OSPF-related interface information.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf memory
|
Displays memory usage of the OSPF process.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf neighbor
|
Displays OSPF neighbor information.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf request-list
|
Displays a list of all LSAs16 requested by a router.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf retransmission-list
|
Displays a list of all LSAs waiting to be re-sent.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf route
|
Displays the OSPF RSPF route for OSPF routes.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf rspf route
|
Displays OSPF RSPF17 from specific routers.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip ospf traffic
|
Displays OSPF traffic statistics.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip proximity algorithm
|
Displays the proximity algorithm options currently in use by this Proximity Engine.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip proximity servers
|
Displays the interface addresses and hostnames of the proximity servers currently in use by this Proximity Engine.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip rib clients
|
Displays details of all the routing protocol instances that are clients of the RIB.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip rib memory
|
Displays the memory usage information of the RIB.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip rib recursive-next-hop
|
Displays IP recursive next-hop information from the RIB.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip rib route
|
Displays IP RIB route information.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip rib unresolved-next-hop
|
Displays unresolved next-hop information from the RIB.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ip routes
|
Displays the IP routing table.
|
Privileged-level EXEC
|
All
|
show ip static route
|
Displays IP static route information.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show ipv6
|
Displays IPv6 information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show isis adjacency
|
Displays IS-IS adjacencies.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis clns route
|
Displays one or all the destinations to which the router knows how to route CLNS packets.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis database
|
Displays the IS-IS link-state database.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis hostname-table
|
Displays the router-name-to-system-ID mapping table entries for an IS-IS router.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis interface
|
Displays information about the IS-IS interfaces.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis ip route
|
Displays the Intermediate IS-IS RSPF route for IS-IS learned routes.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis ip rspf route
|
Displays the Intermediate IS-IS RSPF route for IS-IS learned routes.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis memory
|
Displays memory usage information for an IS-IS instance.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis process
|
Displays summary information about an IS-IS instance.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis rrm
|
Displays IS-IS RRM18 information.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis spf-log
|
Displays how often and why the router has run a full SPF19 calculation.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show isis srm
|
Displays SRM20 information for an IS-IS process.
|
Privileged-level EXEC
|
SR
|
show isis ssn
|
Displays SSN21 information for an IS-IS process.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show key chain
|
Displays the key chains in the system.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show lacp
|
Displays LACP information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show logging
|
Displays the system logging configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show movie-streamer
|
Displays the Movie Streamer configuration.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show multicast
|
Displays whether or not the multicast sender and receiver are enabled.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show ntp
|
Displays the Network Time Protocol configuration status.
|
User-level EXEC and privileged-level EXEC
|
All
|
show processes
|
Displays the process status.
|
User-level EXEC and privileged-level EXEC
|
All
|
show programs
|
Displays the scheduled programs.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show radius-server
|
Displays the RADIUS server information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show rcp
|
Displays RCP information
|
User-level EXEC and privileged-level EXEC
|
All
|
show rtsp
|
Displays the RTSP configurations.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show rule
|
Displays the Rules Template configuration information.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show running-config
|
Displays the current operating configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show service-router
|
Displays the Service Router configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show services
|
Displays the services-related information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show snmp
|
Displays the SNMP parameters.
|
User-level EXEC and privileged-level EXEC
|
All
|
show srp database
|
Displays the descriptor-related information saved in the descriptor database.
|
Privileged-level EXEC
|
SR
|
show srp leafset
|
Displays SRP leafset information.
|
Privileged-level EXEC
|
SR
|
show srp memory
|
Displays SRP memory usage information.
|
Privileged-level EXEC
|
SR
|
show srp multicast database
|
Displays multicast database information for an SRP process.
|
Privileged-level EXEC
|
SR
|
show srp neighbor
|
Displays SRP neighbor information.
|
Privileged-level EXEC
|
SR
|
show srp process
|
Displays the basic configurations for SRP.
|
Privileged-level EXEC
|
SR
|
show srp replica-set
|
Displays the replica-set information for a Proximity Engine.
|
Privileged-level EXEC
|
SR
|
show srp route
|
Displays route information for a Proximity Engine to its neighbor nodes on the same DHT network.
|
Privileged-level EXEC
|
SR
|
show srp subscribers
|
Displays SRP multicast group subscriber information.
|
Privileged-level EXEC
|
SR
|
show ssh
|
Displays the Secure Shell status and configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show standby
|
Displays the information related to the standby interface.
|
User-level EXEC and privileged-level EXEC
|
All
|
show startup-config
|
Displays the startup configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics aaa
|
Displays accounting, authentication, and authorization statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics access-lists 300
|
Displays the access control list statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics acquirer
|
Displays the SE acquirer delivery service statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics admission
|
Displays admission control statistics.
|
User-level EXEC and privileged-level EXEC
|
SE, CDSM
|
show statistics authsvr
|
Displays the Authentication Server statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics cdn-select
|
Displays the statistics for the CDN Selector.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show statistics cdnfs
|
Displays the SE Internet Streamer CDS network file system statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics content-mgr
|
Displays the Content Manager statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics distribution
|
Displays the simplified statistics for content distribution components.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics flash-media-streaming
|
Displays the statistics for Flash Media Streaming.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics icmp
|
Displays the Internet Control Message Protocol statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics ip
|
Displays the Internet Protocol statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics isis
|
Displays IS-IS traffic counters.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show statistics movie-streamer
|
Displays statistics for the Movie Streamer.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics netstat
|
Displays the Internet socket connection statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics radius
|
Displays the RADIUS authentication statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics replication
|
Displays the delivery service replication status and related statistical data.
|
User-level EXEC and privileged-level EXEC
|
CDSM, SR
|
show statistics service-router
|
Displays the Service Router statistics.
|
User-level EXEC and privileged-level EXEC
|
SR
|
show statistics services
|
Displays the services statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics snmp
|
Displays the SNMP statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics srp
|
Displays SRP statistics information.
|
Privileged-level EXEC
|
SR
|
show statistics tacacs
|
Displays the Service Engine TACACS+ authentication and authorization statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics tcp
|
Displays the Transmission Control Protocol statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics transaction-logs
|
Displays the transaction log export statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics udp
|
Displays the User Datagram Protocol statistics.
|
User-level EXEC and privileged-level EXEC
|
All
|
show statistics web-engine
|
Displays the Web Engine statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show statistics wmt
|
Displays the Windows Media Technologies statistics.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show tacacs
|
Displays TACACS+ authentication protocol configuration information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show tech-support
|
Displays the system information for Cisco technical support.
|
User-level EXEC and privileged-level EXEC
|
All
|
show telnet
|
Displays the Telnet services configuration.
|
User-level EXEC and privileged-level EXEC
|
All
|
show transaction-logging
|
Displays the transaction logging information.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show url-signature
|
Displays the URL signature information.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show user
|
Displays the user identification number and username information.
|
User-level EXEC and privileged-level EXEC
|
All
|
show users
|
Displays the specified users.
|
User-level EXEC and privileged-level EXEC
|
All
|
show version
|
Displays the software version.
|
User-level EXEC and privileged-level EXEC
|
All
|
show web-engine
|
Displays the Web Engine information.
|
User-level EXEC and privileged-level EXEC
|
SE
|
show wmt
|
Displays the WMT configuration.
|
User-level EXEC and privileged-level EXEC
|
SE
|
shutdown (interface configuration)
|
Shuts down the specified interface.
|
Interface configuration
|
All
|
shutdown (EXEC)
|
Shuts down the device (stops all applications and operating system).
|
Privileged-level EXEC
|
All
|
snmp-server community
|
Configures the community access string to permit access to the SNMP.
|
Global configuration
|
All
|
snmp-server contact
|
Specifies the text for the MIB object sysContact.
|
Global configuration
|
All
|
snmp-server enable traps
|
Enables the SNMP traps.
|
Global configuration
|
All
|
snmp-server group
|
Defines a user security model group.
|
Global configuration
|
All
|
snmp-server host
|
Specifies the hosts to receive SNMP traps.
|
Global configuration
|
All
|
snmp-server location
|
Specifies the path for the MIB object sysLocation.
|
Global configuration
|
All
|
snmp-server notify inform
|
Configures the SNMP inform request.
|
Global configuration
|
All
|
snmp-server user
|
Defines a user who can access the SNMP engine.
|
Global configuration
|
All
|
snmp-server view
|
Defines an SNMPv222 MIB view.
|
Global configuration
|
All
|
splunk-uf-monitor
|
Configure Splunk Universal Forwarder monitoring,
|
Global configuration
|
SE, SR
|
ss
|
Dumps socket statistics.
|
Privileged-level EXEC
|
SE
|
sshd
|
Configures the SSH service parameters.
|
Global configuration
|
All
|
streaming-interface
|
Configures the streaming interface.
|
Global configuration
|
SE
|
sysreport
|
Saves the sysreport to a user-specified file.
|
Privileged-level EXEC
|
SE
|
tacacs
|
Configures TACACS+ server parameters.
|
Global configuration
|
All
|
tcpdump
|
Dumps the TCP traffic on the network.
|
Privileged-level EXEC
|
All
|
tcpmon
|
Searches all TCP connections.
|
Privileged-level EXEC
|
SE
|
tcp timestamp
|
Enables and disables TCP timestamp.
|
Global configuration
|
All
|
telnet
|
Starts the Telnet client.
|
User-level EXEC and privileged-level EXEC
|
All
|
telnet enable
|
Enables the Telnet services.
|
Global configuration
|
All
|
terminal
|
Sets the terminal output commands.
|
User-level EXEC and privileged-level EXEC
|
All
|
test-url
|
Tests the accessibility of a URL using FTP, HTTP, or HTTPS.
|
User-level EXEC and privileged-level EXEC
|
SE, SR
|
top
|
Displays a dynamic real-time view of a running CDS.
|
Privileged-level EXEC
|
All
|
traceroute
|
Traces the route to a remote host.
|
User-level EXEC and privileged-level EXEC
|
All
|
traceroute srp
|
Traces the route of the SRP ring.
|
User-level EXEC and privileged-level EXEC
|
SR
|
traceroute6
|
Traces the route to a remote IPv6-enabled host.
|
User-level EXEC and privileged-level EXEC
|
SE, SR
|
transaction-log force
|
Forces archiving of the working log file to make a transaction log file.
|
Privileged-level EXEC
|
All
|
transaction-logs
|
Configures and enables the transaction logging parameters.
|
Global configuration
|
SE
|
type
|
Displays a file.
|
User-level EXEC and privileged-level EXEC
|
All
|
type-tail
|
Displays the last several lines of a file.
|
User-level EXEC and privileged-level EXEC
|
All
|
undebug
|
Disables debugging functions.
|
Privileged-level EXEC
|
All
|
url-signature
|
Configures the URL signature.
|
Global configuration
|
SE
|
username
|
Establishes the username authentication.
|
Global configuration
|
All
|
web-engine (EXEC)
|
Configures the Web Engine.
|
User-level EXEC
|
SE
|
web-engine (Global configuration)
|
Configures the Web Engine caching parameters and disables revalidation.
|
Global configuration
|
SE
|
whoami
|
Displays the current user's name.
|
User-level EXEC and privileged-level EXEC
|
All
|
wmt
|
Configures the WMT.
|
Global configuration
|
SE
|
write
|
Writes or erases the startup configurations to NVRAM or to a terminal session, or writes the MIB persistence configuration to disk.
|
Privileged-level EXEC
|
All
|
aaa
To specify accounting, authentication, and authorization methods, use the aaa command in global configuration mode. To selectively disable options, use the no form of this command.
aaa {accounting {commands {0 {start-stop tacacs + | stop-only tacacs+} | 15 {start-stop tacacs
+ | stop-only tacacs+}} | exec {start-stop tacacs + | stop-only tacacs+} | system {start-stop
tacacs + | stop-only tacacs+}} | authentication {enable {primary | secondary | tertiary} |
radius {primary | secondary | tertiary} | tacacs+ {primary | secondary | tertiary}} | login
{fail-over server-unreachable | local {primary | secondary | tertiary} | radius {primary |
secondary | tertiary} | tacacs+ {primary | secondary | tertiary}} | authorization
{commands {0 tacacs+ [if-authenticated] | 15 tacacs+ [if-authenticated]} |
config-commands | console | exec {local {primary | secondary | tertiary} | radius {primary
| secondary | tertiary} | tacacs+ {primary | secondary | tertiary}}}}
no aaa {accounting {commands {0 {start-stop tacacs + | stop-only tacacs+} | 15 {start-stop
tacacs + | stop-only tacacs+}} | exec {start-stop tacacs + | stop-only tacacs+} | system
{start-stop tacacs + | stop-only tacacs+}} | authentication {enable {enable {primary |
secondary | tertiary} | radius {primary | secondary | tertiary} | tacacs+ {primary |
secondary | tertiary}} | login {fail-over server-unreachable | local {primary | secondary |
tertiary} | radius {primary | secondary | tertiary} | tacacs+ {primary | secondary |
tertiary}} | authorization {commands {0 tacacs+ [if-authenticated] | 15 tacacs+
[if-authenticated]} | config-commands | console | exec {local {primary | secondary |
tertiary} | radius {primary | secondary | tertiary} | tacacs+ {primary | secondary |
tertiary}}}}
Syntax Description
accounting
|
Sets the Accounting configurations parameters.
|
commands
|
Configures exec (shell) commands.
|
0
|
Enables level for normal user.
|
start-stop
|
Records start and stop without waiting.
|
tacacs+
|
Uses Tacacs+ hosts for accounting.
|
stop-only
|
Records stop when service terminates.
|
15
|
Enables level for super user.
|
exec
|
Starts an exec (shell).
|
system
|
Configures System events.
|
authentication
|
Sets the Authentication configurations parameters.
|
enable
|
Sets authentication for enable.
|
enable
|
Uses enable password for authentication.
|
primary
|
Sets authentication method as primary.
|
secondary
|
Sets authentication method as secondary.
|
tertiary
|
Sets authentication method as tertiary.
|
radius
|
Uses Radius hosts for authentication.
|
tacacs+
|
Uses Tacacs+ hosts for authentication.
|
login
|
Sets authentication for logins.
|
fail-over
|
Specifies a condition to switch to a local authentication scheme.
|
server-unreachable
|
Fail-over if server is unreachable.
|
local
|
Uses local username authentication.
|
radius
|
Uses Radius hosts for authentication.
|
tacacs+
|
Uses Tacacs+ hosts for authentication.
|
authorization
|
Sets the Authorization configurations parameters.
|
commands
|
Configures exec (shell) commands.
|
0
|
Enables level for normal user.
|
tacacs+
|
Uses Tacacs+ hosts for authorization.
|
15
|
Enables level for super user.
|
config-commands
|
Sets configuration mode commands.
|
console
|
Sets all commands on the console line.
|
local
|
Uses local username authorization.
|
primary
|
Sets authorization method as primary.
|
secondary
|
Sets authorization method as secondary.
|
tertiary
|
Sets authorization method as tertiary.
|
radius
|
Uses Radius hosts for authorization.
|
tacacs+
|
Uses Tacacs+ hosts for authorization Tacacs+ hosts for authorization.
|
Command Defaults
aaa authorization config-commands: disabled
Command Modes
Global configuration
Usage Guidelines
The aaa accounting commands command enables accounting using TACACS+ for normal and supper users.
The aaa accounting exec command enables accounting records for user EXEC terminal sessions on the Tacacs+ server, including username, date, start, and stop times.
The aaa accounting system command enables accounting of the system events, such as system reboot, NIC interface up or down, accounting configuration enabled or disabled, and using TACACS+.
The aaa authentication login command enables authentication using TACACS+ or the RADIUS server to determine if the user has access permission on the SE. The local authentication uses the local database for authentication, if configured. This can be enabled to provide a fallback in case of TACACS+ or Radius server failure.
If there are multi-authentication methods configured, the SE tries to authenticating the user through all configured methods, one by one, until one of them succeeds. The authentication order complies with the priority specified (primary, secondary, then tertiary). If the primary is empty, the secondary is considered as primary, and so on.
If the configured TACACS+ or Radius server is unreachable, use the aaa authentication login fail-over server-unreachable command to switch off the TACACS+ or Radius server, and enable fail-over to use the local password file for authentication.
The aaa authentication enable command enables authentication using TACACS+ or the RADIUS server to determine if the normal user can enter the privileged exec mode. Alternatively, the enable authentication method uses the local database (the enable password) for authentication.
The aaa authorization command enables authorization using the TACACS+ server to determine if the specified user can execute commands or not. In case the configured TACACS+ server is unreachable, the if-authenticated option can switch off the TACACS+ server and authorization is granted to anyone who is authenticated.
Note
The following commands bypass authorization and accounting:
CTRL+C, CTRL+Z, exit, end, and all of configuration commands for entering submode, for example, interface GigabitEthernet 1/0.
The aaa authorization config-commands command reestablishes the default created when the aaa authorization commands command was issued.
If the aaa authorization commands level method command is enabled, all commands, including configuration commands, are authorized using the method specified for the specified user. To bypass the configuration commands, using the no aaa authorization config-commands command stops the network access server from attempting configuration command authorization.
After the no form of this command is entered, AAA authorization of configuration commands is completely disabled. Take care before entering the no form of this command because it potentially reduces the amount of administrative control on configuration commands.
Use the aaa authorization config-commands command if, after using the no form of this command, you need to reestablish the default set by the aaa authorization commands level method command.
Note
This command is disabled by default. You get the same result if you (1) do not configure this command, or (2) configure the no aaa authorization config-commands.
The aaa authorization console command applies authorization to a console. To disable the authorization, use the no form of this command.
The no aaa authorization console command is the default, and the authorization that is configured on the console line always succeeds. If you do not want the default, you need to configure the aaa authorization console command.
The aaa authorization exec command enables authorization using the TACACS+ or RADIUS server to determine if the user can startup an exec (shell). The local authentication uses the local database for authorization, if configured. This can be enabled to provide a fallback in case the TACACS+ or Radius server fails.
If you are trying to disable the aaa authorization exec command, at least one authorization method must be selected (local is the default). At least one authentication method must be selected for login.
Note
As long as the login authentication fail-over is enabled, it is applied to the exec authorization as well. In other words, the local database is used for authorization as well if the remote severs is unreachable.
Examples
The following configures accounting commands for a normal user using Tacacs+ hosts:
ServiceEngine(config)# aaa accounting commands 0 start-stop tacacs+
The following example enables/disables authentication for login:
ServiceEngine(config)# aaa authentication login
The following example applies authorization to a console:
ServiceEngine(config)# aaa authorization console
Related Commands
Command
|
Description
|
enable password
|
Changes the password.
|
show aaa
|
Shows the AAA configuration for a different service.
|
show statistics aaa
|
Shows the AAA statistics.
|
access-lists
To configure access control list (ACL) entries, use the access-lists command in Global configuration mode. To remove access control list entries, use the no form of this command.
access-lists {300 {deny groupname {any [position number] | groupname [position number]}} |
{permit groupname {any [position number] | groupname [position number]}} | enable}
no access-lists {300 {deny groupname {any [position number] | groupname [position number}}
| {permit groupname {any [position number] | groupname [position number]}} | enable}
Syntax Description
300
|
Specifies the group name-based access control list (ACL).
|
deny
|
Specifies the rejection action.
|
groupname
|
Defines which groups are granted or denied access to content that is served by this SE.
|
any
|
Specifies any group name.
|
position
|
(Optional) Specifies the position of the ACL record within the access list.
|
number
|
(Optional) Position number within the ACL. The range is from 1 to 4294967294.
|
groupname
|
Name of the group that is permitted or denied from accessing the Internet using an SE.
|
permit
|
Specifies the permission action.
|
enable
|
Enables the ACL.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
You can configure group authorization using an ACL only after a user has been authenticated against an LDAP HTTP-request Authentication Server. The use of this list configures group privileges when members of the group are accessing content provided by an SE. You can use the ACL to allow the users who belong to certain groups or to prevent them from viewing specific content. This authorization feature offers more granular access control by specifying that access is only allowed to specific groups.
Use the access-lists enable Global configuration command to enable the use of the ACL.
Use the access-lists 300 command to permit or deny a group from accessing the Internet using an SE. For instance, use the access-lists 300 deny groupname marketing command to prevent any user from the marketing group from accessing content through an SE.
At least one login authentication method, such as local, TACACS+, or RADIUS, must be enabled.
Note
We recommend that you configure the local login authentication method as the primary method.
The ACL contains the following feature enhancements and limitations:
•
A user can belong to several groups.
•
A user can belong to an unlimited number of groups within group name strings.
•
A group name string is a case-sensitive string with mixed-case alphanumeric characters.
•
Each unique group name string cannot exceed 128 characters.
Note
If the unique group name string is longer than 128 characters, the group is ignored.
•
Group names in a group name string are separated by a comma.
•
Total string of individual group names cannot exceed 750 characters.
For Windows-based user groups, append the domain name in front of the group name in the form domain or group as follows:
For Windows NT-based user groups, use the domain NetBIOS name.
Wildcards
The access-list command does not use a netmask; it uses a wildcard bitmask. The source and destination IP and wildcard usage is as follows:
•
source_ip—Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source:
–
Use a 32-bit quantity in four-part dotted decimal format.
–
Use the any keyword => source and source-wildcard of 0.0.0.0 255.255.255.255.
–
Use the host keyword => specific source and source_wildcard equal 0.0.0.0.
•
source-wildcard—Wildcard bits to be applied to source. Each wildcard bit set to 0 indicates the corresponding bit position in the source. Each wildcard bit set to 1 indicates that both a 0 bit and a 1 bit in the corresponding position of the IP address of the packet is considered a match to this access list entry.
To specify the source wildcard, use a 32-bit quantity in four-part dotted decimal format. Place 1s in the bit positions you want to ignore.
Note
Wildcard bits set to 1 need not be contiguous in the source wildcard. For example, a source wildcard of 0.255.0.64 would be valid.
Examples
The following example shows how to display the configuration of the ACL by using the show access-lists 300 command:
ServiceEngine# show access-lists 300
Access Control List Configuration
---------------------------------
Access Control List is enabled
Groupname-based List (300)
1. permit groupname techpubs
2. permit groupname acme1
3. permit groupname engineering
4. permit groupname sales
5. permit groupname marketing
The following example shows how to display statistical information for the ACL by using the show statistics access-lists 300 command:
ServiceEngine# show statistics access-lists 300
Access Control Lists Statistics
-----------------------------------------
Groupname and username-based List (300)
Number of deny responses: 0
Number of permit responses: 1
The following example shows how to reset the statistical information for the ACL by using the clear statistics access-lists 300 command:
ServiceEngine# clear statistics access-lists 300
ServiceEngine(config)# access-lists 300 permit groupname acme1 position 2
Related Commands
Command
|
Description
|
show access-lists 300
|
Displays the ACL configuration.
|
show statistics access-list 300
|
Displays the ACL statistics.
|
acquirer (EXEC)
To start or stop content acquisition on a specified acquirer delivery service, use the acquirer command in EXEC configuration mode. You can also use this command to verify and correct the Last-Modified-Time attribute in content acquired using the Cisco Internet Streamer CDS software.
acquirer {check-time-for-old-content [delivery-service-id delivery-service-num |
delivery-service-name delivery-service-name] | [correct [delivery-service-id
delivery-service-num | delivery-service-name delivery-service-name]] | start-delivery-service
{delivery-service-id delivery-service-num | delivery-service-name delivery-service-name} |
stop-delivery-service {delivery-service-id delivery-service-num | delivery-service-name
delivery-service-name} | test-url url [use-http-proxy url | use-smb-options smb-options]}
Syntax Description
check-time-for-old-content
|
Checks the content for the Last-Modified-Time attributes in the local time format.
|
delivery-service-id
|
(Optional) Sets the delivery service number identifier.
|
delivery-service-num
|
(Optional) Delivery service number. The range is from 0 to 4294967295.
|
delivery-service-name
|
(Optional) Sets the delivery service name descriptor.
|
delivery-service-name
|
(Optional) Delivery service name.
|
correct
|
(Optional) Changes the Last-Modified-Time attributes in the local time format to the Greenwich Mean Time (GMT) format.
|
start-delivery-service
|
Starts the content acquisition.
|
stop-delivery-service
|
Stops the content acquisition.
|
test-url
|
Tests the accessibility of a URL, using HTTP, HTTPS, FTP, or SMB.
|
url
|
URL to be tested.
Note For the SMB protocol, use the Uniform Naming Convention (UNC) path, for example, //host/share/file.
|
use-http-proxy
|
(Optional) Specifies the HTTP proxy. The connectivity of the URL (content request over HTTP) through the HTTP proxy server (SE) is tested. Use this option only when the HTTP protocol is used.
|
url
|
(Optional) HTTP proxy URL. Use one of the following formats to specify the HTTP proxy URL:
http://proxyIpAddress:proxyPort
http://proxyUser:proxypasswd@proxyIpAddress:proxyPort
|
use-smb-options
|
(Optional) Specifies the username, password, port, and domain for the SMB URL.
|
smb-options
|
(Optional) Parameters to be specified when an SMB URL is used. Use the following format to specify these parameters:
username=xxx,password=xxx,port=xxx,workgroup=xxx
Note All the comma-separated key=value pairs are optional and need to be specified only if the SMB host requires them.
|
Command Defaults
If you do not specify the delivery service, this command applies to all delivery services assigned to the Content Acquirer.
Command Modes
EXEC configuration mode.
Usage Guidelines
The acquirer is a software agent that gathers delivery service content before it is distributed to the receiver SEs in an Internet Streamer CDS network. The acquirer maintains a task list, which it updates after receiving a notification of changes in its delivery service configuration.
The acquirer stores the Last-Modified-Time attribute in the local time format. Content acquired using earlier software releases has a Last-Modified-Time attribute that is incorrect if used with later versions of the Internet Streamer CDS software, which use GMT format.
Correct the Last-Modified-Time attributes for content acquired with earlier releases by entering the following command from the privileged EXEC prompt:
acquirer check-time-for-old-content correct [delivery-service-id delivery-service-num delivery-service-name delivery-service-name]
This command changes the Last-Modified-Time attributes for content in all delivery services assigned to the Content Acquirer unless you specify the delivery service ID or name.
SEs identify changes in the Last-Modified-Time attribute and download content only when changes have occurred.
Use the acquirer start-delivery-service command to immediately start acquisition tasks for the selected delivery service. Use the acquirer stop-delivery-service command to immediately stop all acquisition tasks for the selected delivery service.
Use the acquirer test-url url command in EXEC configuration mode to test whether a URL is accessible or not. The actual content is dumped into the /dev/null path.
Examples
The following example shows how the acquirer starts acquiring content on delivery service 86:
ServiceEngine# acquirer start-delivery-service delivery-service-id 86
ServiceEngine# acquirer start-delivery-service delivery-service-name corporate
The following example shows how the acquirer stops acquiring content on delivery service 86:
ServiceEngine# acquirer stop-delivery-service delivery-service-id 86
ServiceEngine# acquirer stop-delivery-service delivery-service-name corporate
The following example shows how the acquirer test-url command is used to test a URL:
ServiceEngine# acquirer test-url http://172.16.150.26
--05:16:41-- http://10.107.150.26
Connecting to 10.107.150.26:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1,722 [ text/html ]
100% [ ====================================> ] 1,722 1.64M/s ETA 00:00
02:45:40 (1.64 MB/s) - `/dev/null' saved [ 1722/1722 ]
Related Commands
Command
|
Description
|
show acquirer
|
Displays the acquirer delivery service information and progress for a specified delivery service number or name.
|
show statistics acquirer
|
Displays the SE acquirer delivery service statistics.
|
acquirer (Global configuration)
To provide authentication when the acquirer obtains content through a proxy server, use the acquirer command in Global configuration mode. To disable acquirer proxy authentication, use the no form of this command.
acquirer proxy authentication {outgoing {hostname | ip-address} port-num} username |
password password}
no acquirer proxy authentication {outgoing {hostname | ip-address} port-num} username |
password password}
Syntax Description
proxy
|
Configures parameters for outgoing proxy mode requests for content acquisition.
|
authentication
|
Enables authentication so that the acquirer can obtain content through a proxy server.
|
outgoing
|
Enables authentication for a nontransparent proxy server.
|
hostname
|
Hostname of a nontransparent proxy server.
|
ip-address
|
IP address of a nontransparent proxy server.
|
port-num
|
Port number of a nontransparent proxy server. The range is from 1 to 65535.
|
username
|
Username for authentication using a maximum of 256 characters.
|
password
|
Allows the use of a password for authentication.
|
password
|
Password for authentication using a maximum of 256 characters.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Use the acquirer proxy authentication outgoing Global configuration command to configure authentication when you enable content acquisition through a proxy server. First configure the proxy host and the port using the http proxy outgoing host Global configuration command. The maximum number of outgoing proxies allowed is eight. When you remove an outgoing proxy using the no http outgoing proxy command, the authentication information associated with that proxy is automatically removed.
Use the acquirer proxy authentication transparent command for transparent caches in the Internet Streamer CDS network that require authentication.
The acquirer supports a proxy with basic authentication. Content acquisition through a proxy server is supported only for HTTP and not for HTTPS or FTP. Also, authentication is only supported for a single proxy server in a chain, so if multiple proxy servers in a chain require authentication, the request fails.
Acquisition through a proxy server can be configured when the Content Acquirer cannot directly access the origin server because the origin server is set up to allow access only by a specified proxy server. When a proxy server is configured for Content Acquirer content acquisition, the acquirer contacts the proxy server instead of the origin server, and all requests to that origin server go through the proxy server.
Note
Content acquisition through a proxy server is only supported for HTTP requests. It is not supported for HTTPS, FTP, MMS, or MMS-over-HTTP requests.
There are three ways to configure the proxy server: through the CDSM GUI. If you need to configure the SE to use the proxy for both caching and prepositioned content, use the CLI to configure the proxy. The CLI command is a Global configuration command that configures the entire SE to use the proxy. If only the acquirer portion of the SE needs to use the proxy for acquiring the prepositioned content, use the manifest file or specify the outgoing proxy. When you configure the proxy server in the manifest file, you are configuring the acquirer to use the proxy to fetch the content for a particular delivery service.
Note
Proxy configurations in the manifest file take precedence over proxy configurations in the CLI. A noProxy attribute configuration in the manifest file takes precedence over the other proxy server configurations in the manifest file.
You can also configure a proxy for fetching the manifest file by using the CDSM GUI (the Creating New Delivery Service or Modifying Delivery Service window). When you configure a proxy server in the CDSM GUI, the proxy configuration is valid only for acquiring the manifest file and not for acquiring the delivery service content. Requests for the manifest file go through the proxy server, and requests for the content go directly to the origin server.
Tip
Before configuring a proxy server, verify that the Content Acquirer is able to ping the proxy server. To check whether the proxy server is accepting incoming HTTP traffic at the configured port, use the acquirer test-url http://proxyIP:proxyport command in Global configuration mode in the Content Acquirer CLI, where the URL in the command is the URL of the proxy server being tested. If the proxy is not servicing the configured port, the message "failed: Connection refused."
Examples
The following example shows the authentication configuration for a transparent proxy server with basic authentication:
ServiceEngine(config)# acquirer proxy authentication transparent 192.168.1.1 8080 myname
Related Commands
Command
|
Description
|
http proxy outgoing
|
Configures an SE to direct all HTTP miss traffic to a parent cache.
|
show acquirer
|
Displays the acquirer delivery service information and progress for a specified delivery service number or name.
|
acquisition-distribution
To start or stop the content acquisition and distribution process, use the acquisition-distribution command in EXEC configuration mode.
acquisition-distribution {database-cleanup {start | stop} | start | stop}
Syntax Description
database-cleanup
|
Cleans up the acquisition and distribution database to maintain consistency with the file system.
|
start
|
Starts the cleanup of the acquisition and distribution database.
|
stop
|
Stops the cleanup of the acquisition and distribution database.
|
start
|
Starts the acquisition and distribution process.
|
stop
|
Stops the acquisition and distribution process.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
When you use the acquisition-distribution database-cleanup command, the acquisition and distribution database is checked to ensure that all prepositioned content is available in Cisco Network File System (CDNFS). If any prepositioned content is found to be missing from CDNFS, the content is replicated to all SEs in the Internet Streamer CDS network. Content Acquirers assigned to a delivery service acquire the content directly from the origin server and replicate the content through the delivery service either by unicast or multicast transmission to other SEs in the delivery service. Receiver SEs obtain the content from forwarder SEs either by unicast or multicast. In the case of a disk00 failure, when the database is stored on disk00 in an internal file system (/state), the recovery of the acquisition and distribution database is done automatically. You should run the acquisition and distribution database cleanup if a failure occurs or if you have to replace a disk drive other than disk00.
Examples
The following example shows how to start the acquisition and distribution database cleanup process:
ServiceEngine# acquisition-distribution database-cleanup start
The following example shows how to start the acquisition and distribution process:
ServiceEngine# acquisition-distribution start
The following example shows how to stop the acquisition and distribution process:
ServiceEngine# acquisition-distribution stop
Related Commands
Command
|
Description
|
cdnfs cleanup
|
Cleans up the content of deleted channels from the acquisition and distribution database.
|
show acquirer
|
Displays the acquirer delivery service information and progress for a specified delivery service number or name.
|
show distribution
|
Displays the distribution information for a specified delivery service.
|
alarm
To configure alarms, use the alarm command in Global configuration mode. To disable alarms, use the no form of this command.
alarm {admin-shutdown-alarm enable | overload-detect {clear 1-999 [raise 10-1000] | enable |
raise 10-1000 [clear 1-999]}}
no alarm {admin-shutdown-alarm enable | overload-detect {clear 1-999 [raise 10-1000] |
enable | raise 10-1000 [clear 1-999]}}
Syntax Description
admin-shutdown-alarm
|
Generates a linkdown alarm when an interface shuts down.
|
enable
|
Enables admin shutdown alarm overload detection.
|
overload-detect
|
Specifies alarm overload configuration.
|
clear
|
Specifies the threshold below which the alarm overload state on an SE is cleared and the Simple Network Management Protocol (SNMP) traps and alarm notifications to the Centralized Management System (CMS) resume.
Note The alarm overload-detect clear command value must be less than the alarm overload-detect raise value.
|
1-999
|
Number of alarms per second that ends an alarm overload condition.
|
raise
|
(Optional) Specifies the threshold at which the CDE enters an alarm overload state and SNMP traps and alarm notifications to CMS are suspended.
|
10-1000
|
Number of alarms per second that triggers an alarm overload.
|
enable
|
Enables the detection of alarm overload situations.
|
Command Defaults
admin-shutdown-alarm: disabled
raise: 10 alarms per second
clear: 1 alarm per second
Command Modes
Global configuration (config) mode.
Usage Guidelines
The alarm admin-shutdown-alarm command must be enabled for an admin-shutdown alarm to take effect. If an admin-shutdown alarm occurs, disabling this option does not clear the outstanding alarm properly. There are two ways to avoid this situation:
•
Clear the outstanding admin-shutdown alarm first before disabling this option.
•
Disable this option and reboot, which clears this alarm.
When multiple applications running on an SE experience problems at the same time, numerous alarms are set off simultaneously, and an SE may stop responding. Use the alarm overload-detect command to set an overload limit for the incoming alarms from the node Health Manager. If the number of alarms exceeds the maximum number of alarms allowed, an SE enters an alarm overload state until the number of alarms drops down to the number defined in the clear.
When an SE is in the alarm overload state, the following events occur:
•
Alarm overload notification is sent to SNMP and the CMS. The clear and raise values are also communicated to SNMP and the CMS.
•
SNMP traps and CMS notifications for subsequent alarm raise and clear operations are suspended.
•
Alarm overload clear notification is sent.
•
SE remains in the alarm overload state until the rate of incoming alarms decreases to the clear value.
Note
In the alarm overload state, applications continue to raise alarms and the alarms are recorded within an SE. The show alarms and show alarms history command in EXEC configuration modes display all the alarms even in the alarm overload state.
Examples
The following example shows how to generate a linkdown alarm when an interface shuts down:
ServiceEngine(config)# alarm admin-shutdown-alarm enable
The following example shows how to enable the detection of alarm overload:
ServiceEngine(config)# alarm overload-detect enable
The following example shows how to set the threshold for triggering the alarm overload at 100 alarms per second:
ServiceEngine(config)# alarm overload-detect raise 100
The following example shows how to set the level for clearing the alarm overload at 10 alarms per second:
ServiceEngine(config)# alarm overload-detect clear 10
Related Commands
Command
|
Description
|
show alarms
|
Displays information on various types of alarms, their status, and history.
|
show alarm status
|
Displays the status of various alarms and alarm overload settings.
|
area nssa
To configure an area as a not-so-stubby area (NSSA), use the area nssa router configuration command. To remove the NSSA distinction from the area, use the no form of this command.
area area-id nssa
no area area-id nssa
Syntax Description
area-id
|
Identifier of the area for which authentication is to be enabled. The identifier can be specified as either a decimal value or an IP address (ID range is from 0 to 4294967295).
|
Command Defaults
No NSSA area is defined.
Command Modes
OSPF configuration (config-ospf) mode.
Usage Guidelines
This command is used to configure an area as a NSSA. The area ID range is given as 0 to 4294967295, but area 0 cannot be configured as an NSSA area.
Examples
In the following example area 1 is configured as an NSSA area:
ServiceRouter(config)# router ospf
ServiceRouter(config-ospf)# network 192.168.20.0 0.0.0.255 area 1
ServiceRouter(config-ospf)# area 1 nssa
ServiceRouter(config-ospf)#
area stub
To define an area as a stub area, use the area stub router configuration command. To disable this function, use the no form of this command
area area-id stub
no area area-id stub
Syntax Description
area-id
|
Identifier for the stub area. The identifier can be specified as either a decimal value or an IP address (ID range is from 0 to 4294967295).
|
Command Defaults
No stub area is defined.
Command Modes
OSPF configuration (config-ospf) mode.
Usage Guidelines
This command is used to define an area as a stub area. The area ID range is given as 0 to 4294967295, but area 0 cannot be configured as a stub area.
Examples
The following example shows how to configure area 1 as a stub area:
ServiceRouter(config)# router ospf
ServiceRouter(config-ospf)# network 192.168.20.0 0.0.0.255 area 1
ServiceRouter(config-ospf)# area 1 stub
ServiceRouter(config-ospf)#
asset
To configure the CISCO-ENTITY-ASSET-MIB, use the asset command in Global configuration mode. To remove the asset tag name, use the no form of this command.
asset tag name
no asset tag name
Syntax Description
tag
|
Sets the asset tag.
|
name
|
Asset tag name string.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Examples
The following example shows how to configure a tag name for the asset tag string:
ServiceEngine(config)# asset tag entitymib
authsvr
To enable and configure the Authorization server, use the authsvr command in Global configuration mode. To disable the Authorization server, use the no form of this command.
authsvr {enable | location-server {cache-timeout num | primary ip addr port num | secondary ip
addr port num} | unknown-server allow}
no authsvr {enable | location-server {primary ip addr port num | secondary ip addr port num} |
unknown-server allow}
Syntax Description
enable
|
Enables the Authorization server.
|
location-server
|
Configures the geo location server IP address and port.
|
cache-timeout
|
Configures the location server cache timeout.
|
num
|
Location server cache timeout in seconds. The range is from 1 to 864000.
|
primary
|
Configures the primary geo location server IP address and port.
|
ip addr
|
IP address of the primary geo location server.
|
port num
|
Port number of the primary geo location server.
|
secondary
|
Configures the secondary geo location server IP address and port.
|
ip addr
|
IP address of the secondary geo location server.
|
port num
|
Port number of the secondary geo location server.
|
unknown-server
|
Configures the Authorization server unknown server or domain.
|
allow
|
Allows requests for an unknown server or domain.
|
Command Defaults
authsvr: enabled
cache-timeout: 691200 seconds or 8 days.
unknown-server: blocked
Command Modes
Global configuration (config) mode.
Usage Guidelines
Changing the primary or secondary Geo-Location server configuration requires a restart of the authsvr for the configuration change to take effect. To restart the authsvr, disable it by entering the no authsvr enable and then re-enable it by entering the authsvr enable command.
The no authsvr unknown-server allow command causes all blocked requests to increment the authsvr block statistic.
Examples
The following example shows how to enable the Authorization server:
ServiceEngine(config)# authsvr enable
Related Commands
Command
|
Description
|
debug authsvr
|
Debugs the Autnentication Server.
|
debug authsvr error
|
Sets the debug level to error.
|
debug authsvr trace
|
Sets the debug level to trace.
|
show authsvr
|
Display the status of the Authorization server.
|
show statistics authsvr
|
Displays the Authentication Server statistics.
|
bandwidth (Global configuration)
To set an allowable bandwidth usage limit and its duration for Cisco Streaming Engine Windows Media Technology (WMT) streaming media, use the bandwidth command in Global configuration mode. To remove individual options, use the no form of this command.
bandwidth {movie-streamer {incoming bandwidth | outgoing bandwidth {default |
max-bandwidth start-time day hour end-time day hour}} | wmt {incoming bandwidth |
outgoing bandwidth}}
no bandwidth {movie-streamer {incoming bandwidth | outgoing bandwidth {default |
max-bandwidth start-time day hour end-time day hour}} | wmt {incoming bandwidth |
outgoing bandwidth}}
Syntax Description
movie-streamer
|
Configures the maximum pacing bit rate, in kilobits per second (kbps), for the Movie Streamer.
|
incoming
|
Configures the duration of allowable incoming bandwidth settings for WMT.
|
bandwidth
|
Bandwidth size for the Movie Streamer, in kbps. The range is from 0 to 2147483647.
|
outgoing
|
Configures the duration of allowable outgoing bandwidth settings for WMT.
|
default
|
Specifies the default value for bandwidth if the scheduled bandwidth is not configured.
|
max-bandwidth
|
Specifies the maximum value of bandwidth, in kbps.
|
start-time
|
Specifies the start time for this bandwidth setting.
|
day
|
Day of the week.
|
hour
|
Time to start (hh:mm). The range is from 00 to 23:00 to 59.
|
end-time
|
Specifies the end time for this bandwidth setting.
|
wmt
|
Configures the duration of allowable bandwidth settings for WMT. For more information, see the "Configuring Incoming and Outgoing WMT Bandwidth" section.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
With the various types of traffic originating from a device, every type of traffic, such as streaming media, HTTP, and metadata, consumes network resources. Use the bandwidth command to limit the amount of network bandwidth used by the WMT streaming media.
The content services bandwidth includes the bandwidth allocation for WMT. WMT bandwidth settings apply to WMT streaming of live, cached, and prepositioned content.
For each type of bandwidth, you can specify the amount of bandwidth to be used for a particular time period. This type is called scheduled bandwidth. The default bandwidth is the amount of bandwidth associated with each content service type when there is no scheduled bandwidth. In centrally managed deployments (the SEs are registered with a CDSM), if the SE is assigned to a device group and no default bandwidth has been configured for the SE itself, the device group default bandwidth settings are applied. However, if the default bandwidth has been configured for the SE, then that setting overrides the device group settings. If the SE is a member of multiple device groups, the most recently updated default bandwidth settings are applied.
The maximum bandwidth specifies the upper limit for the allowable bandwidth. The total bandwidth configured for all content services must not exceed the bandwidth limits specified for any SE platform model in the Internet Streamer CDS network. In addition, the license keys configured for WMT further restrict the maximum bandwidth available for each SE model.
Configuring Incoming and Outgoing WMT Bandwidth
The bandwidth between the WMT proxy server (the SE) and the WMT client is called the WMT outgoing bandwidth.
The bandwidth between the WMT proxy and the origin streaming server is called the incoming bandwidth. Because the bandwidth from the edge to the outside IP WAN is limited, you must specify a per session limit (the maximum bit rate per request) for each service that is running on the SE and that consumes the incoming bandwidth (for example, the WMT streaming service), and an aggregate limit (the maximum incoming bandwidth.) You need to control the outgoing bandwidth based on the WMT license that is configured on the SE.
The bandwidth wmt outgoing and bandwidth incoming commands enable you to specify a WMT incoming and an outgoing bandwidth as follows:
•
Use the bandwidth wmt outgoing kbits command in Global configuration mode to specify the outgoing WMT bandwidth in kbps. This command sets the maximum bandwidth for the WMT content that can delivered to a client that is requesting WMT content. The range of values is between 0 and 2,147,483,647 kbps.
If the specified outgoing bandwidth is above the limit specified by the WMT license, then a warning message is displayed. However, the specified outgoing bandwidth setting is applied to the SE because the outgoing bandwidth may be configured before the WMT licenses are enabled or an enabled WMT license may be changed to a higher value at a later time.
•
Use the bandwidth wmt incoming kbits command in Global configuration mode to specify the incoming WMT bandwidth in kbps. This command sets the maximum bandwidth for the WMT content that can delivered to the SE from the origin streaming server or another SE in the case of a cache miss. The specified bit rate is the maximum incoming WMT per session bit rate. The range of values is between 0 and 2,147,483,647 kbps. The incoming bandwidth applies to VoD content from the origin server for a cache miss.
Related Commands
Command
|
Description
|
bandwidth (interface configuration)
|
Sets the specified interface bandwidth to 10, 100, or 1000 Mbps.
|
interface
|
Configures a Gigabit Ethernet or port channel interface. Provides access to interface configuration mode.
|
show bandwidth
|
Displays the bandwidth allocated to a particular device.
|
show interface
|
Displays the hardware interface information.
|
show running-config
|
Displays the current operating configuration.
|
show startup-config
|
Displays the startup configuration.
|
bandwidth (interface configuration)
To configure an interface bandwidth, use the bandwidth command in interface configuration mode. To restore default values, use the no form of this command.
bandwidth {10 | 100 | 1000}
no bandwidth {10 | 100 | 1000}
Syntax Description
10
|
Sets the bandwidth to 10 megabits per second (Mbps).
|
100
|
Sets the bandwidth to 100 Mbps.
|
1000
|
Sets the bandwidth to 1000 Mbps. This option is not available on all ports.
|
Command Defaults
None
Command Modes
Interface configuration (config-if) mode.
Usage Guidelines
The bandwidth is specified in Mbps. The 1000 Mbps option is not available on all ports. On an SE model that has an optical Gigabit Ethernet interface, you cannot change the bandwidth of this interface. Therefore, Gigabit Ethernet interfaces run only at 1000 Mbps. For newer models of the SE that have a Gigabit Ethernet interface over copper, this restriction does not apply; you can configure these Gigabit Ethernet interfaces to run at 10, 100, or 1000 Mbps.
You can configure the Gigabit Ethernet interface settings (bandwidth, and duplex settings) if the Gigabit-over-copper-interface is up or down. If the interface is up, it applies the specific interface settings. If the interface is down, the specified settings are stored and then applied when the interface is brought up. For example, you can specify any of the following commands for a Gigabit-over-copper-interface, which is currently down, and have these settings automatically applied when the interface is brought up:
ServiceEngine(config-if)#
bandwidth 10
ServiceEngine(config-if)#
bandwidth 100
ServiceEngine(config-if)#
bandwidth 1000
You cannot configure the Gigabit Ethernet interface settings on an optical Gigabit Ethernet interface.
Examples
The following example shows how to set an interface bandwidth to 10 Mbps:
ServiceEngine(config-if)# bandwidth 10
The following example shows how to restore default bandwidth values on an interface:
ServiceEngine(config-if)# no bandwidth
Related Commands
Command
|
Description
|
interface
|
Configures a Gigabit Ethernet or port channel interface. Provides access to interface configuration mode.
|
banner
To configure the EXEC, login, and message-of-the-day (MOTD) banners, use the banner command in Global configuration mode. To disable the banner feature, use the no form of this command.
banner {enable | exec {message line | message_text} | login {message line | message_text} | motd
{message line | message_text}}
no banner {enable | exec [message] | login [message] | motd [message]}
Syntax Description
enable
|
Enables banner support on the SE.
|
exec
|
Configures an EXEC banner.
|
message
|
Specifies a message to be displayed when an EXEC process is created.
|
line
|
EXEC message text on a single line. The SE translates the \n portion of the message to a new line when the EXEC banner is displayed to the user.
|
message_text
|
EXEC message text on one or more lines. Press the Return key or enter delimiting characters (\n) to specify an EXEC message to appear on a new line. Supports up to a maximum of 980 characters, including new line characters (\n). Enter a period (.) at the beginning of a new line to save the message and return to the prompt for the Global configuration mode.
Note The EXEC banner content is obtained from the command- line input that the user enters after being prompted for the input.
|
login
|
Configures a login banner.
|
message
|
Specifies a message to be displayed before the username and password login prompts.
|
line
|
Login message text on a single line. The SE translates the \n portion of the message to a new line when the login banner is displayed to the user.
|
message_text
|
Login message text on one or more lines. Press the Return key or enter delimiting characters (\n) to specify a login message to appear on a new line. Supports up to a maximum of 980 characters, including new line characters (\n). Enter a period (.) at the beginning of a new line to save the message and return to the prompt for the Global configuration mode.
Note The login banner content is obtained from the command-line input that the user enters after being prompted for the input.
|
motd
|
Configures an MOTD banner.
|
message
|
Specifies an MOTD message.
|
line
|
MOTD message text on a single line. The SE translates the \n portion of the message to a new line when the MOTD banner is displayed to the user.
|
message_text
|
MOTD message text on one or more lines. Press the Return key or enter delimiting characters (\n) to specify an MOTD message to appear on a new line. Supports up to a maximum of 980 characters, including new-line characters (\n). Enter a period (.) at the beginning of a new line to save the message and return to the prompt for the Global configuration mode.
Note The MOTD banner content is obtained from the command line input that the user enters after being prompted for the input.
|
Command Defaults
Banner support is disabled by default.
Command Modes
Global configuration (config) mode.
Usage Guidelines
You can configure the following three types of banners in any Internet Streamer CDS software device mode:
•
MOTD banner sets the message of the day. This message is the first message that is displayed when a login is attempted.
•
Login banner is displayed after the MOTD banner but before the actual login prompt appears.
•
EXEC banner is displayed after the EXEC CLI shell has started.
Note
All these banners are effective on a console, Telnet, or a Secure Shell (SSH) Version 2 session.
After you configure the banners, enter the banner enable command to enable banner support on the SE. Enter the show banner command in EXEC configuration mode to display information about the configured banners.
Note
When you run an SSH Version 1 client and log in to the SE, the MOTD and login banners are not displayed. You need to use SSH Version 2 to display the banners when you log in to the SE.
Examples
The following example shows how to enable banner support on the SE:
ServiceEngine(config)#
banner enable
The following example shows how to use the banner motd message command to configure the MOTD banner. In this example, the MOTD message consists of a single line of text.
ServiceEngine(config)#
banner motd message This is an Internet Streamer CDS 2.3 device
The following example shows how to use the banner motd message global command to configure a MOTD message that is longer than a single line. In this case, the SE translates the \n portion of the message to a new line when the MOTD message is displayed to the user.
ServiceEngine(config)#
banner motd message "This is the motd message.
\nThis is an Internet Streamer CDS 2.3 device\n"
The following example shows how to use the banner login message command to configure a MOTD message that is longer than a single line. In this case, SE A translates the \n portion of the message to a new line in the login message that is displayed to the user.
ServiceEngine(config)#
banner login message "This is login banner.
\nUse your password to login\n"
The following example shows how to use the banner exec command to configure an interactive banner. The banner exec command is similar to the banner motd message commands except that for the banner exec command, the banner content is obtained from the command-line input that the user enters after being prompted for the input.
ServiceEngine(config)# banner exec
Please type your MOTD messages below and end it with '.' at beginning of line:
(plain text only, no longer than 980 bytes including newline)
This is the EXEC banner.\nUse your Internet Streamer CDS username and password to log in
to this SE.\n
Message has 99 characters.
Assume that the SE has been configured with the MOTD, login, and EXEC banners as shown in the previous examples. When a user uses an SSH session to log in to the SE, the user sees a login session that includes a MOTD banner and a login banner that asks the user to enter a login password as follows:
This is an Internet Streamer CDS 2.3 device
Use your password to login.
After the user enters a valid login password, the EXEC banner is displayed, and the user is asked to enter the Internet Streamer CDS username and password as follows:
Last login: Fri Oct 1 14:54:03 2004 from client
System Initialization Finished.
Use your Internet Streamer CDS username and password to log in to this SE.
After the user enters a valid Internet Streamer CDS username and password, the SE CLI is displayed. The CLI prompt varies depending on the privilege level of the login account. In the following example, because the user entered a username and password that had administrative privileges (privilege level of 15), the EXEC configuration mode CLI prompt is displayed:
Related Commands
Command
|
Description
|
show banner
|
Enables banner support on the SE.
|
bitrate
To configure the maximum pacing bit rate for large files for the Movie Streamer and to separately configure WMT bit-rate settings, use the bitrate command in Global configuration mode. To remove the bit-rate settings, use the no form of this command.
bitrate {movie-streamer bitrate | wmt {incoming bitrate | outgoing bitrate}}
no bitrate {movie-streamer bitrate | wmt {incoming | outgoing}}
Syntax Description
movie-streamer
|
Configures the maximum pacing bit rate, in kbps, for the Movie Streamer.
|
bitrate
|
Bit rate in kbps. The range is from 1 to 2147483647.
|
wmt
|
Configures the bit rate, in kbps, for large files sent using the WMT protocol.
|
incoming
|
Sets the incoming bit-rate settings.
|
bitrate
|
Incoming bit rate, in kbps. The range is from 0 to 2147483647.
|
outgoing
|
Sets the outgoing bit-rate settings.
|
bitrate
|
Outgoing bit rate, in kbps. The range is from 0 to 2147483647.
|
Command Defaults
movie-streamer bitrate: 1500 kbps
wmt incoming bitrate: 0 (no limit)
wmt outgoing bitrate: 0 (no limit)
Command Modes
Global configuration (config) mode.
Usage Guidelines
The WMT proxy has the ability to cache on-demand media files when the user requests these files for the first time. All subsequent requests for the same file are served by the WMT proxy using the RTSP protocol. The WMT proxy can also live-split a broadcast, which causes only a single unicast stream to be requested from the origin server in response to multiple client requests for the stream.
The bit rate between the proxy and the origin server is called the incoming bit rate. Use the bitrate command to limit the maximum bit rate per session for large files. The bitrate wmt incoming and bitrate wmt outgoing commands enable you to specify a WMT incoming and outgoing per session bit rate as follows:
•
Use the bitrate wmt incoming bitrate command to specify the maximum incoming streaming bit rate per session that can be delivered to the WMT proxy server (the SE) from the origin streaming server or another SE in the case of a cache miss. The specified bit rate is the maximum incoming WMT per session bit rate. The range of values is between 0 and 2,147,483,647 kbps. The default value is 0 (no bit-rate limit).
•
Use the bitrate wmt outgoing bitrate command to set the maximum outgoing streaming bit rate per session that can delivered to a client requesting WMT content. The specified bit rate is the maximum outgoing WMT per session bit rate). The range of values is between 0 and 2,147,483,647 kbps. The default value is 0 (no bit-rate limit). The outgoing bandwidth applies to VoD content from the WMT proxy server on the SE in the case of a cache miss.
Note
The aggregate bandwidth used by all concurrent users is still limited by the default device bandwidth or by the limit configured using the bandwidth command.
Variable WMT Bit Rates
A content provider can create streaming media files at different bit rates to ensure that different clients who have different connections—for example, modem, DSL, or LAN—can choose a particular bit rate. The WMT caching proxy can cache multiple bit-rate files or variable bit-rate (VBR) files, and based on the bit rate specified by the client, it serves the appropriate stream. Another advantage of creating variable bit-rate files is that you only need to specify a single URL for the delivery of streaming media.
Note
In the case of multiple bit-rate files, the SE that is acting as the WMT proxy server retrieves only the bit rate that the client has requested.
Examples
The following example shows how to configure an incoming bit rate for the Movie Streamer:
ServiceEngine(config)# bitrate movie-streamer incoming 100
The following example shows how to configure an incoming bit rate for a file sent using WMT. Use the show wmt command to verify that the incoming bit rate has been modified.
ServiceEngine(config)# bitrate wmt incoming 300000
ServiceEngine(config)# exit
--------- WMT Server Configurations -----------------
WMT disallowed client protocols: none
WMT bandwidth platform limit: 1000000 Kbits/sec
WMT outgoing bandwidth configured is 500000 Kbits/sec
WMT incoming bandwidth configured is 500000 Kbits/sec
WMT max sessions configured: 14000
WMT max sessions platform limit: 14000
WMT max sessions enforced: 14000 sessions
WMT max outgoing bit rate allowed per stream has no limit
WMT max incoming bit rate allowed per stream has no limit
WMT cache max-obj-size: 25600 MB
WMT cache revalidate for each request is not enabled
WMT cache age-multiplier: 30%
WMT cache min-ttl: 60 minutes
WMT cache max-ttl: 1 days
WMT debug client ip not set
WMT debug server ip not set
WMT accelerate live-split is enabled
WMT accelerate proxy-cache is enabled
WMT accelerate VOD is enabled
WMT fast-start is enabled
WMT fast-start max. bandwidth per player is 3500 (Kbps)
WMT fast-cache is enabled
WMT fast-cache acceleration factor is 5
WMT maximum data packet MTU (TCP) enforced is 1472 bytes
WMT maximum data packet MTU (UDP) is 1500 bytes
WMT client idle timeout is 60 seconds
WMT forward logs is enabled
WMT server inactivity-timeout is 65535
WMT Transaction Log format is Windows Media Services 4.1 logging
RTSP Gateway incoming port 554
--------- WMT HTTP Configurations -------------------
WMT http extensions allowed:
asf none nsc wma wmv nsclog
--------- WMT Proxy Configurations ------------------
MMS-over-HTTP Proxy-Mode:
is not configured. ServiceEngine#
Related Commands
Command
|
Description
|
show wmt
|
Displays the WMT configuration.
|
blink
To identify physical devices by blinking their LED(s), use the blink command in EXEC configuration mode.
blink {disk name | interface {GigabitEthernet slot/port_num | TenGigabitEthernet
slot/port_num}}
Syntax Description
disk
|
Flash disk LED for 3s.
|
name
|
disk name (format is disk00).
|
interface
|
Flash network interface port LED for 3s.
|
GigabitEthernet
|
Selects a Gigabit Ethernet interface.
|
slot/port_num
|
Slot and port number for the selected interface. The slot range is from 1 to 14; the port range is from 0 to 0. The slot number and port number are separated with a forward slash character (/).
|
TenGigabitEthernet
|
Selects a Ten Gigabit Ethernet interface.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The blink disk command submits IO to a disk, do not use this command in systems with live traffic.
Examples
The following example shows how to blink a disk:
ServiceRouter# blink disk disk00
Blinking disk00 LED for 3 seconds
The following example shows how to blink a GigabitEthernet interface:
ServiceRouter# blink interface gigabitEthernet 1/0
Blinking eth0 LED for 3 seconds
bootstrap-node
To configure a bootstrap node IP address, use the bootstrap-node Service Routing Protocol (SRP) configuration command. To remove a bootstrap node address, use the no or default form of the command.
bootstrap-node ip-address
[no | default] bootstrap-node ip-address
Syntax Description
ip-address
|
Valid IP address for the bootstrap node. IP addresses 0.0.0.0 and 255.255.255.255 are not valid addresses for a bootstrap node.
|
Command Defaults
No bootstrap node address is configured.
Command Modes
SRP configuration (config-srp) mode.
Usage Guidelines
This command is used to set bootstrap nodes for an SRP. A Proximity Engine specifies one or more bootstrap nodes to join a DHT network. In a DHT network, the domain ID of the bootstrap nodes and the Proximity Engine must the same.
The first Proximity Engine in the network, which acts as the bootstrap node for others, does not have to configure the bootstrap node address itself. This is the only exception to configuring bootstrap nodes. All other nodes need to configure a bootstrap node address before they can join any network.
The no and default forms of the command remove a given bootstrap node from the list of available bootstrap nodes of a Proximity Engine. The port number for bootstrap node is 9000. The show srp process command lists configured bootstrap nodes.
A Proximity Engine cannot be its own bootstrap node. A maximum 25 bootstrap nodes are allowed.
Examples
The following example shows how to configure a bootstrap node address with the bootstrap-node command:
ServiceRouter# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
ServiceRouter(config)# router srp
ServiceRouter(config-srp)# bootstrap-node 192.168.6.91
ServiceRouter(config-srp)# end
The following example shows how the show srp process command displays configured bootstrap nodes:
ServiceRouter# show srp process
Node Id: 6b05858ab28345e62e9e614a48e1206445ec9ca0884fa0e827c1072f5fe8c5f5
Database Mirroring: Disabled
# of storages requested for mirroring: 2
# of storages used for mirroring : 1
Related Commands
Command
|
Description
|
domain
|
Sets the domain ID for the SRP.
|
router srp
|
Enters SRP configuration mode.
|
show srp process
|
Displays the basic configurations for SRP.
|
cache
To restrict the maximum number of contents in the CDS, use the cache command in Global configuration mode.
cache content {eviction-preferred-size {small | large} | eviction-protection {min-size-100MB
{min-duration-1hr | min-duration-2hr | min-duration-3hr | min-duration-4hr}|
min-size-1GB {min-duration-1hr | min-duration-2hr | min-duration-3hr |
min-duration-4hr} | min-size-4GB {min-duration-1hr | min-duration-2hr |
min-duration-3hr | min-duration-4hr} | min-size-500MB {min-duration-1hr |
min-duration-2hr | min-duration-3hr | min-duration-4hr}}| max-cached-entries num
Syntax Description
content
|
Configures the cached contents.
|
eviction-preferred-size
|
Configures cache content eviction preferred.
|
large
|
Selects cache content eviction preferred size (Retain smaller objects).
|
small
|
Selects cache content eviction preferred size (Retain larger objects).
|
eviction-protection
|
Configures the eviction protection.
|
min-size-100MB
|
Minimum cache entry size to protect.
|
min-duration-1hr
|
Minimum duration to protect the content from eviction.
|
min-duration-2hrs
|
Minimum duration to protect the content from eviction.
|
min-duration-3hrs
|
Minimum duration to protect the content from eviction.
|
min-duration-4hrs
|
Minimum duration to protect the content from eviction.
|
min-size-1GB
|
Minimum cache entry size to protect.
|
min-size-4GB
|
Minimum cache entry size to protect.
|
min-size-500MB
|
Minimum cache entry size to protect.
|
max-cached-entries
|
Cleans up the unwanted entries in the CDNFS.
|
num
|
Max cached entries. The range is from 1 to 20000000.
|
Command Defaults
The max-cached-entries default is 2000000 entries.
Command Modes
Global configuration (config) mode.
Usage Guidelines
The Content Manager manages the caching, storage, and deletion of content.
Current priority favors small objects. The cache content eviction-preferred size command allows users to configure a preference for small or large objects in the Content Manager. Once a preference is specified, it only applies on contents made after the configurative; contents prior to configuration remain unchanged.
Addition and Deletion Processes
Previously, the Internet Streamer CDS software did not restrict adding new content to CDNFS as long as there was enough disk space for the asset. The cache content max-cached-entries command restricted the number of assets, but it was not a hard limit. New content was always added and the CDS would delete old content in an attempt to keep within the limits configured. The CDS could actually have more content than the configured limit, because the process to delete content is slower than the process to add content. The same situation applies to disk-usage based deletion, where deletion occurs when 90 percent of the CDNFS is used.
Content addition stops at 105 percent of the maximum object count or 95 percent of the CDNFS capacity (disk usage). For example, if the maximum number of objects has been configured as 20 million (which is the default value), the CDS starts deleting content if the object count reaches 20 million, but adding content is still allowed. Adding content stops when the maximum number of content objects reaches 21 million (105 percent of 20 million), which allows time for the content deletion process to reduce the number of objects in the CDS to the configured limit. Adding content resumes only after the number of objects is 20 million or less. The same logic applies to disk usage. The deletion process starts when disk usage reaches 93 percent, adding content stops when disk usage reaches 98 percent, and adding content resumes only after the disk usage percentage reaches 95 percent or less.

Note
We recommend that any CDE model that has hard-disk drives (HDDs) (instead of solid-state drives [SDDs]), and is used to stream ABR content, be configured with a maximum of 5 million objects instead of the default of 20 million. This is because HDD-based hardware requires more seek time to access content. The software can handle 20 million objects, but the hard-drive access time impacts the ABR streaming performance. ABR content consists of a large number of small files, which results in a lot of overhead.
For long-tail content (Windows Media Streaming, Flash Media Streaming, Movie Streamer, and progressive download), the maximum number of content objects can be configured with the default of 20 million on the HDD-based hardware models. Two of the HDD-based hardware models are the CDE220-2G2 and CDE250-2M0.
If adding content has been stopped because either the content count reached 105 percent of the limit or the disk usage reached 98 percent of capacity, the un-writable flag is set in the share memory and when the protocol engine calls create, FastCAL library looks into the share memory and denies the creation request. The protocol engine performs a bypass or cut-through operation.
The show cdnfs usage command shows the current status of whether the content is able to be cached or not. Following is an example of the output:
ServiceEngine# show cdnfs usage
Total number of CDNFS entries : 2522634
Total bytes available : 4626.0 GB
Total cache size : 2.4 GB
Total cached entries : 2522634
Cache-content mgr status : Cachable
Units: 1KB = 1024B; 1MB = 1024KB; 1GB = 1024MB
If the maximum object count is reached, the following is displayed:
Cache-content mgr status: Not cacheable on the following disk(s): [/disk00-06]
[/disk01-06] [/disk02-01]
105% of max obj count reached : [/disk00-06] [/disk01-06] [/disk02-01]
If the disk usage reaches more than 98 percent, the following is displayed:
Cache-content mgr status: Not cacheable on the following disk(s): [/disk01-06]
[/disk02-01]
98% of disk usage reached: [/disk01-06] [/disk02-01]
Eviction Protection
The Content Manager provides configurable eviction protection for some content. The Content Manager eviction algorithm is triggered when the disk usage reaches 93 percent or when the cached object count reaches the configured maximum object count. The eviction algorithm assigns a priority number to each content object based on an algorithm similar to the greedy-dual-size-frequency (GDSF) algorithm. The priority number is based on the size and usage of the object. Small objects are given preference over large objects; that is, they are less likely to be deleted.
To protect incoming large objects from getting a low priority and being deleted, use the cache content eviction-protection global configure command. The cache content eviction-protection command allows you to set the minimum content size (100 MB, 500 MB, 1 GB, and 4 GB) and the minimum age (1-4 hours for 100 MB size, 1, 4, 8, or 24 hours for all other sizes) of the content object to be protected from deletion. For example, to set the eviction protection for content objects larger than 100 MB that were ingested in the last two hours, you would enter the following command:
ServiceEngine(config)# cache content eviction-protection min-size-100MB min-duration-2hrs
If the content object being cached is larger than the configured size, it is inserted into a protection table along with the current time stamp. If the difference between the object's time stamp and the current time is greater than the configured time duration, the object is removed from the protection table. If the eviction algorithm is triggered, before it selects an object for deletion, it first looks at the protection table, and if the object is found, it is skipped for that iteration. The clear-cache-content command also checks the protection table before deleting an object. The clear-cache-all command does not check the eviction protection table; cache content is just deleted. As for relative cache content, content in the protection table might still be deleted if the relative content that is not protected is deleted. The eviction protection is disabled by default.
If the Content Manager eviction algorithm is not able to find any content to delete, a syslog message is sent to notify the administrator to revisit the configuration. Changing the settings of the cache content eviction-protection command only affect the content that are currently in the protection table and any new content that is added. Any object that is removed from the protection table prior to the configuration change is not brought back into the protection table.
Reloading the SE or entering the no cache content eviction-protection min-size-xx duration-xx command removes all entries in the eviction protection table.
Note
Changing the time on the SE affects the Content Manager eviction process. If the time is set forward, content is deleted sooner than expected. If the time is set back, content is protected longer.
The show cache content command displays the eviction protection status and the number of elements in the eviction protection table.
Examples
The following example shows how to configure the cache content:
ServiceEngine# cache content max-cached-entries 1000
The show cdnfs usage command shows the current status of whether the content is able to be cached or not. Following is an example of the output:
Total number of CDNFS entries : 2522634
Total bytes available : 4626.0 GB
Total cache size : 2.4 GB
Total cached entries : 2522634
Cache-content mgr status : Cachable
Units: 1KB = 1024B; 1MB = 1024KB; 1GB = 1024MB
If the maximum object count is reached, the following is displayed:
Cache-content mgr status : caching paused[ max count 105% of configured reached ]
If the disk usage reaches more than 95 percent, the following is displayed:
Cache-content mgr status : caching paused[ disk max 95% of disk usage reached ]
Note
When the CDS is started or the cache Content Manager is restarted, it performs a scan of the entire CDNFS. During this period, the deletion starts at 94 percent (not 90 percent) and adding content stops at 95 percent.
Related Commands
Command
|
Description
|
show cache
|
Displays a list of cached contents.
|
capability
To modify the capability configuration, use the capability command in Global configuration mode. To disable capability, use the no form of this command.
capability config profile number [add attrib {capability-url url | user-agent name} | description]
no capability config
Syntax Description
config
|
Enters the capability exchange submode.
|
profile
|
Populates the profile database.
|
number
|
The profile ID. The range is from 1 to 65535.
|
add
|
(Optional) Adds the capability attributes.
|
attrib
|
Adds the capability attributes.
|
capability-url
|
Specifies the capability URL.
|
url
|
The capability URL string.
|
user-agent
|
Specifies the user-agent.
|
name
|
The user-agent name.
|
description
|
(Optional) Specifies the profile description.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Related Commands
Command
|
Description
|
show capability
|
Displays information for the Cap-X profile ID.
|
cd
To change from one directory to another directory, use the cd command in EXEC configuration mode.
cd directoryname
Syntax Description
directoryname
|
Directory name.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Use this command to maneuver between directories and for file management. The directory name becomes the default prefix for all relative paths. Relative paths do not begin with a slash (/). Absolute paths begin with a slash (/).
Examples
The following example shows how to use a relative path:
ServiceEngine(config)# cd local1
The following example shows how to use an absolute path:
ServiceEngine(config)# cd /local1
Related Commands
Command
|
Description
|
deltree
|
Deletes a directory and its subdirectories.
|
dir
|
Displays the files in a long list format.
|
lls
|
Displays the files in a long list format.
|
ls
|
Lists the files and subdirectories in a directory.
|
mkdir
|
Makes a directory.
|
pwd
|
Displays the present working directory.
|
cdn-select
To enable the CDN Selector for third-party service selection, use the cdn-select command in Global configuration mode. To disable the CDN Selector, use the no form of this command.
cdn-select enable
no cdn-select enable
Syntax Description
enable
|
Enables the CDN Selector.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
The cdn-select command enables the CDN Selector, which provides a method to do third-party service selection based on parameters like content type and geographic location.
Examples
The following example shows how to enable the CDN Selector:
ServiceRouter(config)# cdn-select enable
The following example shows how to disable the CDN Selector:
ServiceRouter(config)# no cdn-select enable
Related Commands
Command
|
Description
|
geo-location-server
|
Redirects requests to different Content Delivery Networks based on the geographic location of the client.
|
show cdn-select
|
Displays the status of the CDN Selector.
|
show statistics cdn-select
|
Displays the statistics for the CDN Selector.
|
cdnfs
To browse the Internet Streamer CDS network file system (CDNFS), use the cdnfs browse command in EXEC configuration mode.
cdnfs {browse | cleanup {info | start force | stop}}
Syntax Description
browse
|
Browses the CDNFS directories and files.
|
cleanup
|
Cleans up the unwanted entries in the CDNFS.
|
info
|
Summary information of the garbage entries. No cleanup.
|
start
|
Starts the CDNFS garbage collection.
|
force
|
Forces removing objections that are in transient states.
|
stop
|
Stops the CDNFS garbage collection.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The Internet Streamer CDS CDNFS stores the prepositioned Internet Streamer CDS network content to be delivered by all supported protocols.
Use the cdnfs browse command to browse the CDNFS directories and files. It does not display cached content for the Web Engine or Flash Media Streaming. It only caches content for Windows Media Streaming and Movie Streamer, and displays prefetched content. To display cached content, use the show cache content command.
ServiceEngine# cdnfs browse
------ CDNFS interactive browsing ------
dir, ls: list directory contents
cd,chdir: change current working directory
info: display attributes of a file
more: page through a file
exit,quit: quit CDNFS browse shell
/www.gidtest.com/>info index.html
Last-modified Time Sun Sep 9 01:46:40 2001
Internal path to data file:
/disk06-00/d/www.gidtest.com/05/05d201b7ca6fdd41d491eaec7cfc6f14.0.data.html
note: data file actual last-modified time: Tue Feb 15 00:47:35 2005
Because the CDNFS is empty in this example, the ls command does not show any results. Typically, if the CDNFS contains information, it lists the websites as directories, and file attributes and content could be viewed using these subcommands.
The cdnfs cleanup command, which is used to cleanup unwanted entries in CDNFS, is deprecated in Release 2.6. in the following manner. When an SE is removed from a delivery service, the Content Manager removes all cache content for that delivery service. All prefetched content for that delivery service is removed by the Acquisition and Distribution process. However, if the Acquisition and Distribution process fails because of an SE being offline or for any other reason, then the cdnfs cleanup command is still required to remove the prefetched content.
In certain cases, the Acquirer is not notified by the Centralized Management System (CMS) about deleted channels, and it fails to clear all unified name space (UNS) content. In such cases, the cdnfs cleanup command can be used to clean up all UNS content associated with deleted channels.
Note
You can use the cdnfs cleanup start command to clean up the orphan content. The orphan content is content that is not associated with any channel to which the SE is subscribed.
The cdnfs database recover command must be run when the cdnfs_db_corrupt alarm is raised. This alarm is raised when the Total Cached entries is more than Total CDNFS entries in the output for the show cdnfs usage command:
ServiceEngine# show cdnfs usage
Total number of CDNFS entries : 202
Total bytes available : 5019.5 GB
Total cache size : 21.0 GB
Total cached entries : 218
Cache-content mgr status : Cachable
Units: 1KB = 1024B; 1MB = 1024KB; 1GB = 1024MB
This occurs generally when an internal bookkeeping file is corrupted. With the server in the offloading status, enter the cdnfs database recover command to remove this inconsistency, then reload the server.
Examples
The following example shows the output of the cdnfs cleanup info command:
ServiceEngine# cdnfs cleanup info
Gathering cleanup information. This may take some time....
(Use Ctrl+C or 'cdnfs cleanup stop' to interrupt)
..............................
Summary of garbage resource entries found
-------------------------------------------
Size of entries (KB) : 60820911
The following example shows the output for the cdnfs database recover command:
ServiceEngine# cdnfs database recover
CDNFS database inconsistency issue found.
CDNFS database recovery operation would impact existing and new client sessions.
Recovering database would need device in offloaded state.
Do you want to recover the CDNFS database now (y/n)?
Recovering CDNFS database. It may take few minutes.
CDNFS database recovery is complete. Please reload the device now.
Proceed with reload? [confirm] yes
Shutting down all services, will timeout in 15 minutes.
Related Commands
Command
|
Description
|
show cdnfs
|
Displays the Internet Streamer CDS network file system information.
|
show statistics cdnfs
|
Displays the SE Internet Streamer CDS network file system statistics.
|
cdsm
To configure the Content Delivery System (CDSM) IP address to be used for the SEs or SRs, or to configure the role and GUI parameters on a CDSM device, use the cdsm command in Global configuration mode. To negate these actions, use the no form of this command.
cdsm {ip {hostname | ip-address | role {primary | standby} | ui port port-num}}
no cdsm {ip | role {primary | standby} | ui port}
Syntax Description
ip
|
Configures the CDSM hostname or IP address.
|
hostname
|
Hostname of the CDSM.
|
ip-address
|
IP address of the CDSM.
|
role
|
Configures the CDSM role to either primary or standby (available only from the CDSM CLI).
|
primary
|
Configures the CDSM to be the primary CDSM.
|
standby
|
Configures the CDSM to be the standby CDSM.
|
ui
|
Configures the CDSM GUI port address (available only from the CDSM CLI).
|
port
|
Configures the CDSM GUI port.
|
port-num
|
Port number. The range is from 1 to 65535.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
You can use the cdsm ui port command to change the CDSM GUI port from the standard number 8443 as follows:
CDSM(config)# cdsm ui port 35535
Note
The role and ui options are only available on CDSM devices. Changing the CDSM GUI port number automatically restarts the Centralized Management System (CMS) service if this has been enabled.
The cdsm ip command associates the device with the CDSM so that the device can be approved as a part of the network.
After the device is configured with the CDSM IP address, it presents a self-signed security certificate and other essential information, such as its IP address or hostname, disk space allocation, and so forth, to the CDSM.
Configuring Devices Inside a NAT
In an Internet Streamer CDS network, there are two methods for a device registered with the CDSM (SEs, SRs, or standby CDSM) to obtain configuration information from the primary CDSM. The primary method is for the device to periodically poll the primary CDSM on port 443 to request a configuration update. You cannot configure this port number. The backup method is when the CDSM pushes configuration updates to a registered device as soon as possible by issuing a notification to the registered device on port 443. This method allows changes to take effect in a timelier manner. You cannot configure this port number even when the backup method is being used. Internet Streamer CDS networks do not work reliably if devices registered with the CDSM are unable to poll the CDSM for configuration updates. Similarly, when a receiver SE requests content and content metadata from a forwarder SE, it contacts the forwarder SE on port 443.
All the above methods become complex in the presence of Network Address Translation (NAT) firewalls. When a device (SEs at the edge of the network, SRs, and primary or standby CDSMs) is inside a NAT firewall, those devices that are inside the same NAT use one IP address (the inside local IP address) to access the device and those devices that are outside the NAT use a different IP address (the inside global IP address) to access the device. A centrally managed device advertises only its inside local IP address to the CDSM. All other devices inside the NAT use the inside local IP address to contact the centrally managed device that resides inside the NAT. A device that is not inside the same NAT as the centrally managed device is not able to contact it without special configuration.
If the primary CDSM is inside a NAT, you can allow a device outside the NAT to poll it for getUpdate requests by configuring a static translation (inside global IP address) for the CDSM's inside local IP address on its NAT, and using this address, rather than the CDSM's inside local IP address, in the cdsm ip ip-address command when you register the device to the CDSM. If the SE or SR is inside a NAT and the CDSM is outside the NAT, you can allow the SE or SR to poll for getUpdate requests by configuring a static translation (inside global IP address) for the SE or SIR's inside local address on its NAT and specifying this address in the Use IP Address field under the NAT Configuration heading in the Device Activation window.
Note
Static translation establishes a one-to-one mapping between your inside local address and an inside global address. Static translation is useful when a host on the inside must be accessible by a fixed address from the outside.
Standby CDSMs
The Cisco Internet Streamer CDS software implements a standby CDSM. This process allows you to maintain a copy of the Internet Streamer CDS network configuration. If the primary CDSM fails, the standby can be used to replace the primary.
For interoperability, when a standby CDSM is used, it must be at the same software version as the primary CDSM to maintain the full CDSM configuration. Otherwise, the standby CDSM detects this status and does not process any configuration updates that it receives from the primary CDSM until the problem is corrected.
Note
We recommend that you upgrade your standby CDSM first and then upgrade your primary CDSM. We also recommend that you create a database backup on your primary CDSM and copy the database backup file to a safe place before you upgrade the software.
Switching a CDSM from Warm Standby to Primary
If your primary CDSM becomes inoperable for some reason, you can manually reconfigure one of your warm standby CDSMs to be the primary CDSM. Configure the new role by using the Global configuration cdsm role primary command as follows:
ServiceEngine(config)# cdsm role primary
This command changes the role from standby to primary and restarts the management service to recognize the change.
Note
Check the status of recent updates from the primary CDSM. Use the show cms info command in EXEC configuration mode and check the time of the last update. To be current, the update time should be between 1 and 5 minutes old. You are verifying that the standby CDSM has fully replicated the primary CDSM configuration. If the update time is not current, check whether there is a connectivity problem or if the primary CDSM is down. Fix the problem, if necessary, and wait until the configuration has replicated as indicated by the time of the last update. Make sure that both CDSMs have the same Coordinated Universal Time (UTC) configured.
If you switch a warm standby CDSM to primary while your primary CDSM is still online and active, both CDSMs detect each other, automatically shut themselves down, and disable management services. The CDSMs are switched to halted, which is automatically saved in flash memory.
Examples
The following example shows how to configure an IP address and a primary role for a CDSM:
CDSM(config)# cdsm ip 10.1.1.1
CDSM(config)# cdsm role primary
The following example shows how to configure a new GUI port to access the CDSM GUI:
CDSM(config)# cdsm ui port 8550
The following example shows how to configure the CDSM as the standby CDSM:
CDSM(config)# cdsm role standby
Switching CDSM to standby will cause all configuration settings made on this CDSM
Please confirm you want to continue [ no ] ?yes
The following example shows how to configure the standby CDSM with the IP address of the primary CDSM by using the cdsm ip ip-address command. This command associates the device with the primary CDSM so that it can be approved as a part of the network.
clear cache
To clear the HTTP object cache use the clear command in EXEC configuration mode.
clear cache [all | content 1-1000000 | flash-media-streaming]
Syntax Description
all
|
(Optional) Clears all cached objects.
|
content
|
(Optional) Clears cached content.
|
1-15000
|
Free space, in Mbytes.
|
flash-media-streaming
|
Clears the Flash Media Streaming edge server cached content and DVR cached content.
|
Command Defaults
Cached content is 1000 Mbytes if not specified.
Command Modes
EXEC configuration mode.
Usage Guidelines
The clear cache command removes all cached contents from the currently mounted cache volumes. Objects being read or written are removed when they stop being busy.
The clear cache all command requests the Content Manager to delete all cache contents. Only one clear cache all command can be executed at a time, and the Control-C option is not allowed with this command. During the clear cache all operation, the show cache content and show cdnfs usage outputs display a line about running the clear cache all command, and the progress is displayed in the output of these commands.
Caution 
The
clear cache all command is irreversible, and all cached content is erased. Cisco does not recommend using this command on production systems.
When the clear cache content command is executed, by default, the command evicts 1000MB of content from all disks in the SE. For example, if the SE has 12 disks, then 1000MB/12 = ~83MB content is evicted from each disk. In this case, all content in the SE is 450MB content; therefore, each disk results in a minimum content of 450MB. This causes 450MB * 12 = 5400MB to be evicted. Each disk maintains its own eviction tree, so to avoid this issue, evict each disk separately.
Examples
The following example shows how to clear all cached contents:
ServiceEngine# clear cache all
This operation tries to free up all cached contents. Proceed? [yes|NO] yes
Clear cache all operation will stop CMGRSlowScan process running
Starting clear cache all operation, 100 contents will be deleted.
Clear cache all progress: done[100], total[100], progress[100.00%][####################]
Clear cache all finished, duration[3], tps[33.33].
Related Commands
Command
|
Description
|
cache content
|
Configures the cached contents.
|
show cache content
|
Displays a list of cached contents.
|
show cdnfs usage
|
Displays Content Delivery Network (CDN) current usage.
|
clear content
To clear the content of a Uniform Resource Locator (URL), use the clear content command in EXEC configuration mode.
clear content {last-folder-url url | url url}
Syntax Description
last-folder-url
|
Clears all content with a relative diskpath from the given URL without a filename.
|
url
|
The valid URL without the filename. Protocol is ignored.
|
url
|
Clears cached content with its original URL.
|
url
|
The URL for the content object to delete.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The clear content url command requests the Fast Content Abstraction Layer (FastCAL) API to delete the content of the specified URL and inform the Content Manager to remove it from its internal data structure.
Examples
The following example shows how to clear the content URL:
1.
Verify the URL that is to be deleted from the SE.
ServiceEngine# show cache
Max-cached-entries is set as 10000000
Number of cal cached assets: 10
------------------------------------------------
------------------------------------------------
1.87390e+01 64000 http://7.1.200.200/file-1961503
1.87390e+01 64000 http://7.1.200.200/file-1961548
1.87390e+01 64000 http://7.1.200.200/file-1961450
1.87390e+01 64000 http://7.1.200.200/file-1961495
1.87390e+01 64000 http://7.1.200.200/file-1961540
1.87390e+01 64000 http://7.1.200.200/file-1961399
1.87390e+01 64000 http://7.1.200.200/file-1961349
1.87390e+01 64000 http://7.1.200.200/file-1961395
1.87390e+01 64000 http://7.1.200.200/file-1961302
1.87390e+01 64000 http://7.1.200.200/file-1961575
2.
Clear the URL content from that SE:
ServiceEngine# clear content url http://7.1.200.200/file-1961503
3.
Verify the content is removed from SE:
ServiceEngine# show cache
Max-cached-entries is set as 10000000
Number of cal cached assets: 10
------------------------------------------------
------------------------------------------------
1.87390e+01 64000 http://7.1.200.200/file-1961548
1.87390e+01 64000 http://7.1.200.200/file-1961450
1.87390e+01 64000 http://7.1.200.200/file-1961495
1.87390e+01 64000 http://7.1.200.200/file-1961540
1.87390e+01 64000 http://7.1.200.200/file-1961399
1.87390e+01 64000 http://7.1.200.200/file-1961349
1.87390e+01 64000 http://7.1.200.200/file-1961395
1.87390e+01 64000 http://7.1.200.200/file-1961302
1.87390e+01 64000 http://7.1.200.200/file-1961575
1.87390e+01 64000 http://7.1.200.200/file-1961529
This example shows how to delete all the contents matching the last-folder-url:
ServiceEngine# clear content last-folder-url http://172.XX.XX.XXX/vod
This operation tries to free up all content which matches last-folder-url.
url: [http://172.XX.XX.XXX/vod/rab1.flv]
url: [http://172.XX.XX.XXX/vod/rab2.flv]
url: [http://172.XX.XX.XXX/vod/119M.flv]
clear ip
To clear the IP configuration, use the clear ip command in EXEC configuration mode.
On the SE:
clear ip access-list counters [standard_acl-num | extended_acl_num | acl-name]
On the SR:
clear ip access-list counters [standard_acl-num | extended_acl_num | acl-name] | bgp {ip address
| all} | ospf {neighbor {all | GigabitEthernet slot/port num | PortChannel num} | rspf route
[router-id} | traffic}
Syntax Description
access-list
|
Clears the IP access list statistical information.
|
counters
|
Clears the IP access list counters.
|
standard_acl_num
|
(Optional) Counters for the specified access list, identified using a numeric identifier. The range is from 1 to 99.
|
extended_acl_num
|
(Optional) Counters for the specified access list, identified using a numeric identifier. The range is from 100 to 199
|
acl-name
|
(Optional) Counters for the specified access list, identified using an alphanumeric identifier up to 30 characters, beginning with a letter.
|
bgp
|
Clears the BGP1 neighbors.
|
all
|
Specifies that all current BGP sessions are reset.
|
ip-address
|
Specifies that only the identified BGP neighbor is reset.
|
ospf
|
Clears the OSPF2 tables.
|
neighbor
|
Neighbor statistics per interface.
|
all
|
Clears all neighbors.
|
GigabitEthernet
|
Selects a GigabitEthernet interface.
|
slot/port num
|
Slot and port number for the selected interface. The slot range is 1 to 14, and the port is 0. The slot number and port number are separated with a forward slash character (/).
|
PortChannel
|
Selects the Ethernet Channel of interfaces.
|
num
|
Specifies the Ethernet Channel interface number. The range is from 1 to 4.
|
rspf
|
OSPF rspf.
|
route
|
Internal OSPF rspf routes.
|
router-id
|
(Optional) Specifies the ID of a router for clear routing information.
|
traffic
|
OSPF traffic counters.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Use the clear ip bgp command whenever any of the following changes occur:
•
Additions or changes to the BGP-related access lists
•
Changes to BGP-related weights
•
Changes to BGP-related distribution lists
•
Changes to BGP-related route maps
Examples
The clear ip bgp all command is used to clear all routes in the local routing table. In the following example, the Proximity Engine has only one neighbor, 192.168.86.3:
ServiceRouter# clear ip bgp all
ServiceRouter# show ip bgp summary
BGP router identifier 3.2.5.4, local AS number 1
BGP table version is 3626, IPv4 Unicast config peers 3, capable peers 2
2 network entries and 2 paths using 216 bytes of memory
BGP attribute entries [2/168], BGP AS path entries [3/14]
BGP community entries [2/8], BGP clusterlist entries [0/0]
BGP Location Communities:
Location Communities value: 1:1-2:2 target 1:1-2:2 weight 4
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
3.1.5.13 4 10 12787 8819 0 0 0 00:00:03 Closing
3.1.5.103 4 3 2036 2035 3626 0 0 1d09h 1
37.0.0.7 4 2 2036 2035 3626 0 0 1d09h 1
The following example shows how to clear OSPF of all neighbors:
ServiceRouter# clear ip ospf neighbor all
The following example shows how to clear OSPF of all neighbors in the GigabitEthernet 1/0 interface:
ServiceRouter# clear ip ospf neighbor GigabitEthernet 1/0
The following example shows how to clear OSPF RSPF information for all routers:
ServiceRouter# clear ip ospf rspf route
The following example shows how to clear OSPF RSPF information for the router with the ID 172. 20.168.41:
ServiceRouter# clear ip ospf rspf route 172.20.168.41
Related Commands
Command
|
Description
|
show ip bgp summary
|
Displays the status of all BGP connections.
|
clear ipv6
To clear the IPv6 ACL counters, use the clear ipv6 command in EXEC configuration mode.
clear ipv6 access-list counters [standard_acl-num | extended_acl_num | acl_name]
Syntax Description
access-list
|
Clears the IP access list statistical information.
|
counters
|
Clears the IP access list counters.
|
standard_acl_num
|
(Optional) Counters for the specified access list, identified using a numeric identifier. The range is from 1 to 99.
|
extended_acl_num
|
(Optional) Counters for the specified access list, identified using a numeric identifier. The range is from 100 to 199
|
acl-name
|
(Optional) Counters for the specified access list, identified using an alphanumeric identifier up to 30 characters, beginning with a letter.
|
Command Defaults
No
Command Modes
EXEC configuration mode.
Examples
The following example shows how to clear IPv6 ACL counters:
ServiceRouter# clear ipv6 access-list counters 99
Related Commands
Command
|
Description
|
ipv6
|
Specifies the default gateway's IPv6 address.
|
show ipv6
|
Displays the IPv6 information.
|
traceroute6
|
Traces the route to a remote IPv6-enabled host.
|
clear isis
To clear IS-IS Routing for an IP, use the clear isis command in EXEC configuration mode.
clear isis {adjacency {all | GigabitEthernet slot/port num | PortChannel num} | ip rspf route
[ LSP-ID]}
Syntax Description
adjacency
|
Clears the IS-IS adjacency information.
|
all
|
Clears IS-IS adjacencies on all interfaces.
|
GigabitEthernet
|
Selects a GigabitEthernet interface.
|
slot/port num
|
Slot and port number for the selected interface. The slot range is 1 to 14; the port is 0. The slot number and port number are separated with a forward slash character (/).
|
PortChannel
|
Selects the Ethernet Channel of interfaces.
|
num
|
Specifies the Ethernet Channel interface number. The range is from 1 to 4.
|
ip
|
IS-IS IP information.
|
rspf
|
IS-IS Reverse SPF1 routing information.
|
route
|
Specifies the IS-IS route.
|
LSP_ID
|
(Optional) Clears information for LSPs2 ID in the form of xxxx.xxxx.xxxx.xxxx or name.
|
Command Defaults
If no LSP ID is specified in the clear isis ip rspf route command, IS-IS RSPF information is cleared for all LSP IDs.
Command Modes
EXEC configuration mode.
Usage Guidelines
The clear isis ip rspf route command is used to clear IS-IS RSPF routing information. IS-IS RSPF routing information is displayed only with the show isis ip rspf route command when a new proximity request has been received.
Examples
The following is sample output from the show isis adjacency command before and after running the clear isis adjacency command:
ServiceRouter# show isis adjacency
IS-IS adjacency database:
System ID SNPA Level State Hold Time Interface
0200.c0a8.5401 0000.a1e8.e019 1 UP 00:00:21 GigabitEthernet 3/0
7301-7-core 001d.a1e9.c41b 1 UP 00:00:08 GigabitEthernet 3/0
7301-7-core 001d.a1e9.c41b 2 UP 00:00:08 GigabitEthernet 3/0
ServiceRouter# clear isis adjacency all
ServiceRouter# show isis adjacency
IS-IS adjacency database:
System ID SNPA Level State Hold Time Interface
7301-7-core 001d.a1e9.c41b 1 UP 00:00:09 GigabitEthernet 3/0
7301-7-core 001d.a1e9.c41b 2 UP 00:00:09 GigabitEthernet 3/0
The following is a sample from the show isis ip rspf route command before and after running the show isis ip rspf route command:
ServiceRouter# show isis ip rspf route
LSP ID SPF Time Cache Hit Level Age Max range
0200.c0a8.0a01.00-00 3d22h 0 1 3d22h 10
ServiceRouters# clear isis ip rspf route
ServiceRouter# show isis ip rspf route
LSP ID SPF Time Cache Hit Level Age Max range
Related Commands
Command
|
Description
|
show isis adjacency
|
Displays IS-IS adjacencies.
|
show isis ip rspf route
|
Displays the Intermediate IS-IS RSPF route for IS-IS learned routes.
|
clear logging
To clear the syslog messages saved in the disk file, use the clear logging command in EXEC configuration mode.
clear logging
Syntax Description
This command has no keywords or arguments.
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The clear logging command removes all current entries from the syslog.txt file, but does not make an archive of the file. It puts a "Syslog cleared" message in the syslog.txt file to indicate that the syslog has been cleared, as shown in the following example:
Feb 14 12:17:18 ServiceEngine# exec_clear_logging:Syslog cleared
Examples
The following example shows how to clear the syslogs:
ServiceRouter# clear logging
clear service-router
To clear the proximity-based routing proximity cache , use the clear service-router command in EXEC configuration mode.
clear service-router proximity-based-routing proximity-cache
Syntax Description
proximity-based-routing
|
Clears proximity-based routing.
|
proximity-cache
|
Clears proximity cache.
|
Command Defaults
Clears the cache for all proximity ratings.
Command Modes
EXEC configuration mode.
Usage Guidelines
When an SR receives a redirect request from a client network 1 with proximity-based routing enabled, the SR queries the proximity server for the proximity rating of the SEs. The ratings returned from the proximity server are cached, and the default timeout for the cache is 1800 seconds . If there is any network or proximity rating change within this period, the SR does not know as it redirects based on the ratings cached for that network. The clear service-router command is used to force clear cache.
Examples
The following example shows how to clear the Service Router.
ServiceRouter# clear service-router proximity-based-routing proximity-cache
Related Commands
Command
|
Description
|
show service-router
|
Shows the cache timeout period.
|
clear srp database offline
To clear the SRP database while it is offline, use the clear srp database offline command in privileged EXEC mode.
clear srp database offline
Syntax Description
This command has no keywords or arguments.
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
The clear srp database offline command is used to clear the SRP database while it is offline.
Note
You must turn off SRP before executing this command by entering the no router srp command.
Examples
The following example shows how to clear the SRP database offline:
ServiceRouter# clear srp database offline
Clearing database offline
Related Commands
Command
|
Description
|
show srp database
|
Displays the descriptor-related information saved in the descriptor database.
|
show srp multicast database
|
Displays multicast database information.
|
clear srp descriptor
To delete either a single descriptor or all descriptors from the service routing layer, use the clear srp descriptor command in privileged EXEC mode.
clear srp descriptor key
Syntax Description
key
|
The DHT key in hexadecimal format for the descriptor to be deleted. A valid DHT key has 1 to 64 hexadecimal digits.
|
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
The clear srp descriptor command is used to delete a single descriptor in the descriptor database. The delete operation deletes the descriptor at the descriptor root node (which may not necessarily be the local Proximity Engine). Therefore, the descriptor is deleted from the entire network.
Note
Deleting a group descriptor also causes the deletion of the group from the network (not just the group's descriptor).
A valid DHT key must be specified in key to identify the descriptor that is deleted. Keys with less than 64 hexadecimal characters are appended with zeroes.
Deleting a nonexistent descriptor or a descriptor that does not appear in the descriptor database of the Proximity Engine results in an error message stating that the DHT key does not exist.
Examples
The following example shows how use the clear srp descriptor command to delete a descriptor with key 123. After the deletion, the show srp database command is used to verify that the descriptor has been deleted.
ServiceRouter# clear srp descriptor 123
ServiceRouter# show srp database 123
Getting database entry for
Entity key:
1230000000000000000000000000000000000000000000000000000000000000
Entity was DELETED on (47b4269b599afa86) Thu Feb 14 11:31:39 2008
Related Commands
Command
|
Description
|
show srp database
|
Displays the descriptor-related information saved in the descriptor database.
|
show srp multicast database
|
Displays multicast database information.
|
clear srp neighbor
To remove a neighbor Proximity Engine from the neighbor list of the local Proximity Engine, use the clear srp neighbor command in privileged EXEC mode.
clear srp neighbor key
Syntax Description
key
|
The DHT key in hexadecimal format for the node to be removed from the neighbor list. A valid DHT key has 1 to 64 hexadecimal digits.
|
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
The clear srp neighbor command is used to delete a single neighbor in the service routing layer from the local Proximity Engine neighbor list. After a small interval, the neighbor list is refreshed and the deleted neighbor may be included in the neighbor list again if it is still a neighbor of the local Proximity Engine in the service routing layer.
A valid DHT key should be specified in key to identify the neighbor. Keys with less than 64 hexadecimal characters are appended with zeroes.
If you attempt to delete a neighbor that does not appear in the neighbor list of the local Proximity Engine, clear srp neighbor displays an error message stating that the neighbor could not be found.
Examples
The following example shows how to use Proximity Engine sn-sj85 with one neighbor sn-sj81 as seen in the following show srp neighbor command output. The neighbor sn-sj81 is also in the leafset of sn-sj85 as can be seen in the show srp leafset output. All commands are issued from Proximity Engine sn-sj85.
ServiceRouter# show srp neighbor
Codes: T - local node, L - leafset, P - primary, S - secondary, B - backup
I - Intransitive, D - delay, H - hold time
Number of neighbors in the database: 1
PL 8886822171add71887d54107c266d814b605eaa0d5cc9b54b9160a137f4355d1
via sn-sj81 [ 172.20.168.81 ] :9000, D=0.389864 ms,
ServiceRouter# show srp leafset
Codes: T - local node, L - leafset, P - primary, S - secondary, B - backup
I - Intransitive, W - wrapped
Leafset count: total 3, left 1, right 1
PL 8886822171add71887d54107c266d814b605eaa0d5cc9b54b9160a137f4355d1
via sn-sj81 [ 172.20.168.81 ] :9000, 0.389864 ms, 00:00:08
T 9f752f56f347ca8fcc40a4e09b645f9b4c9b71c73401083f4c04920b30215b0a
via sn-sj85 [ 172.20.168.85, 192.168.20.85, 192.168.86.85 ] :9000
WPL 8886822171add71887d54107c266d814b605eaa0d5cc9b54b9160a137f4355d1
via sn-sj81 [ 172.20.168.81 ] :9000, 0.389864 ms, 00:00:08
The clear srp neighbor command is used to remove sn-sj81 from the neighbor list.
ServiceRouter# clear srp neighbor sn-sj81:9000
Clearing neighbor sn-sj81:9000
Neighbor is found and cleared
Finally, the show srp neighbor and show srp leafset commands are issued again and show the following:
•
Output from show srp neighbor shows that the neighbor sn-sj81 is in the intransitive state (I). The intransitive state means node sn-sj85 cannot reach node sn-sj81.
ServiceRouter# show srp neighbor
Codes: T - local node, L - leafset, P - primary, S - secondary, B - backup
I - Intransitive, D - delay, H - hold time
Number of neighbors in the database: 1
I 8886822171add71887d54107c266d814b605eaa0d5cc9b54b9160a137f4355d1
via sn-sj81 [ 172.20.168.81 ] :9000, D=0.000 ms,
•
Output from show srp leafset shows that there are no leafset entries (PL or WPL) for the Proximity Engine sn-sj85.
ServiceRouter# show srp leafset
Codes: T - local node, L - leafset, P - primary, S - secondary, B - backup
I - Intransitive, W - wrapped
Leafset count: total 1, left 0, right 0
T 9f752f56f347ca8fcc40a4e09b645f9b4c9b71c73401083f4c04920b30215b0a
via sn-sj85 [ 172.20.168.85, 192.168.20.85, 192.168.86.85 ] :9000
The following example shows how to use the clear srp resource command to delete a resource having resource ID 456 from a descriptor with the key 123. The show srp database command is used to verify that the resource exists before the delete operation and that it has been deleted after the delete operation.
ServiceRouter# show srp database 123
Getting database entry for
1230000000000000000000000000000000000000000000000000000000000000
Entity rec type: 101 Entity total length: 175
Entity type: 38b73479 Entity flags: 0
--------------- Element 0 (main)-----------------
Element total len 49 ID len: 0
Delete Time: 47b426ca5c706042
Last Update: Thu Feb 14 11:38:59 2008 (47b42853902a02b6)
Expiration : Sat Mar 15 11:38:59 2008 (47dbb553902a0000)
--------------- Element 1 (comp)-----------------
Element ID: "456"(343536)
Element total len 54 ID len: 3
Last Update: Thu Feb 14 11:39:27 2008 (47b4286f0ad1055a)
Expiration : Sat Mar 15 11:39:27 2008 (47dbb56f0ad10000)
ServiceRouter# clear srp resource 123 456
ServiceRouter# show srp database 123
Getting database entry for
1230000000000000000000000000000000000000000000000000000000000000
Entity rec type: 101 Entity total length: 113
Entity type: 38b73479 Entity flags: 0
--------------- Element 0 (main)-----------------
Element total len 49 ID len: 0
Delete Time: 47b426ca5c706042
Last Update: Thu Feb 14 11:38:59 2008 (47b42853902a02b6)
Expiration : Sat Mar 15 11:38:59 2008 (47dbb553902a0000)
Related Commands
Command
|
Description
|
show srp leafset
|
Displays SRP leafset information.
|
show srp neighbors
|
Displays SRP neighbor information.
|
clear srp resource
To delete a resource from a descriptor in the service routing layer, use the clear srp resource command in privileged EXEC mode.
clear srp resource key
Syntax Description
key
|
The DHT key in hexadecimal format for the descriptor from which the resource are deleted. A valid DHT key has 1 to 64 hexadecimal digits.
|
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
The clear srp resource command is used to delete a resource from a descriptor in the service routing layer. Resources can be added to and deleted from any descriptor that exists in the descriptor database.
A valid DHT key must be specified in key to identify the descriptor from which a resource is deleted. Keys with less than 64 hexadecimal characters are appended with zeroes. If you attempt to delete a resource from a nonexistent descriptor, clear srp resource displays an error stating that the DHT key does not exist. Deleting a nonexistent resource has no impact, and no error warning is generated.
Examples
The following example shows how to use clear srp resource to delete a resource, newResource, having resource ID 456 from a descriptor with the key 123. The show srp database command is used to verify that the resource exists before the delete operation and that it has been deleted after the delete operation.
ServiceRouter# show srp database 123
Getting database entry for
1230000000000000000000000000000000000000000000000000000000000000
Entity rec type: 101 Entity total length: 175
Entity type: 38b73479 Entity flags: 0
--------------- Element 0 (main)-----------------
Element total len 49 ID len: 0
Delete Time: 47b426ca5c706042
Last Update: Thu Feb 14 11:38:59 2008 (47b42853902a02b6)
Expiration : Sat Mar 15 11:38:59 2008 (47dbb553902a0000)
--------------- Element 1 (comp)-----------------
Element ID: "456"(343536)
Element total len 54 ID len: 3
Last Update: Thu Feb 14 11:39:27 2008 (47b4286f0ad1055a)
Expiration : Sat Mar 15 11:39:27 2008 (47dbb56f0ad10000)
ServiceRouter# clear srp resource 123 456
ServiceRouter# show srp database 123
Getting database entry for
1230000000000000000000000000000000000000000000000000000000000000
Entity rec type: 101 Entity total length: 113
Entity type: 38b73479 Entity flags: 0
--------------- Element 0 (main)-----------------
Element total len 49 ID len: 0
Delete Time: 47b426ca5c706042
Last Update: Thu Feb 14 11:38:59 2008 (47b42853902a02b6)
Expiration : Sat Mar 15 11:38:59 2008 (47dbb553902a0000)
Related Commands
Command
|
Description
|
clear srp descriptor
|
Deletes a single descriptor or all descriptors from the service routing layer
|
show srp database
|
Displays the descriptor-related information saved in the descriptor database.
|
clear srp route
To delete a single route entry from the DHT routing table of the local Proximity Engine, use the clear srp route command in privileged EXEC mode.
clear srp route prefix/length
Syntax Description
prefix
|
The prefix of the DHT key of the route entry to delete.
|
length
|
The length of the prefix (in multiples of 4).
|
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
The clear srp route command deletes a single routing table entry from the local DHT routing table. Similar to other routing protocols, the DHT routing table entries consist of a prefix and length that index the DHT ID of the next-hop Proximity Engine. A valid DHT key prefix (1 to 64 hexadecimal characters) and valid prefix length (multiples of four) must be supplied to identify the neighbor to be deleted.
The clear srp route command provides a manual way to delete routing table entries. After a small interval, the DHT routing table is refreshed and the deleted next-hop Proximity Engine may be included in the DHT routing table again if it is still a viable neighbor.
The clear srp route command can be used to test the presence and persistence of neighbors. Deleting a routing entry that does not exist results in an error message.
Examples
In the following example, Proximity Engine sn-sj85 has four routing table entries. The example shows how to use the clear srp route command to clear the routing table entry that has 8/4 as its prefix/length. The show srp route command is used to verify the deletion of the route.
ServiceRouter# show srp route
Codes: T - local node, L - leafset, P - primary, S - secondary, B - backup
PL 8/4 via 8886822171add71887d54107c266d814b605eaa0d5cc9b54b9160a137f4355d1
sn-sj81 [ 172.20.168.81 ] :9000, 0.389525 ms, 00:00:08
PL a/4 via ad3a659121442210a68b79348e9a42eaebfb229f388afb2628fa871f26bc750c
sn-sj67 [ 172.20.168.67, 192.168.20.41, 192.168.20.44, 192.168.22.41, 192.168
.22.42 ] :9000, 1.825903 ms, 00:00:09
PL b/4 via b5ca21563f5b938e46e2cb8f33a148ae00a1f6666f2a5eb735b7ed90c012c882
sn-sj82 [ 172.20.168.82 ] :9000, 0.333920 ms, 00:00:08
PL d/4 via d2fc632c53c9ff1de8683e265386b09502791aedd65f28025fe7f64ad8cab2d9
sn-sj87 [ 172.20.168.87 ] :9000, 0.642357 ms, 00:00:09
ServiceRouter# clear srp route 8/4
The entry is found and cleared
ServiceRouter# show srp route
Codes: T - local node, L - leafset, P - primary, S - secondary, B - backup
PL a/4 via ad3a659121442210a68b79348e9a42eaebfb229f388afb2628fa871f26bc750c
sn-sj67 [ 172.20.168.67, 192.168.20.41, 192.168.20.44, 192.168.22.41, 192.168
.22.42 ] :9000, 1.846593 ms, 00:00:09
PL b/4 via b5ca21563f5b938e46e2cb8f33a148ae00a1f6666f2a5eb735b7ed90c012c882
sn-sj82 [ 172.20.168.82 ] :9000, 0.333920 ms, 00:00:09
PL d/4 via d2fc632c53c9ff1de8683e265386b09502791aedd65f28025fe7f64ad8cab2d9
sn-sj87 [ 172.20.168.87 ] :9000, 0.572056 ms, 00:00:09
Related Commands
Command
|
Description
|
show srp route
|
Displays route information for a Proximity Engine to its neighbor nodes on the same DHT network.
|
clear statistics
To clear the statistics, use the clear statistics command in EXEC configuration mode.
On the SE:
clear statistics {aaa | access-lists 300 | all | authentication | authsvr {all | delivery-service-id |
global} | distribution {all | mcast-data-receiver | mcast-data-sender | metadata-receiver |
metadata-sender | unicast-data-receiver | unicast-data-sender} | flash-media-streaming |
history | icap | icmp | ip | movie-streamer | radius | rule {action action-type | all | pattern
{1-512 | all} | rtsp} | running | snmp | tacacs | tcp | transaction-logs | udp | web-engine
[force] | web-engine [force] | wmt}
On the SR:
clear statistics {aaa | all | authentication | history | http requests | icmp | ip [ospf | proximity
{rib | server}] | isis [GigabitEthernet slot/port num | PortChannel num] | radius | running |
service-registry | service-router | snmp | srp | tacacs | tcp | udp}
Syntax Description
aaa
|
Clears AAA statistics.
|
access-lists
|
Clears the ACL statistics.
|
300
|
Clears the group name-based ACL.
|
all
|
Clears all statistics.
|
authentication
|
Clears the authentication statistics.
|
authsvr
|
Clears the Authorization Server statistics.
|
all
|
Clears global and delivery service-based statistics.
|
delivery-service-id
|
Clears Authentication Server statistics for the delivery service
|
global
|
Clears Authentication Server global statistics.
|
distribution
|
Clears the distribution statistics.
|
all
|
Clears the distribution statistics for every component.
|
mcast-receiver
|
Clears the distribution statistics for the mcast receiver.
Note This command is only available on Cisco Internet Streamer CDS Release 3.1.1.
|
mcast-sender
|
Clears the distribution statistics for the mcast sender.
Note This command is only available on Cisco Internet Streamer CDS Release 3.1.1.
|
metadata-receiver
|
Clears the distribution statistics for the metadata receiver.
Note This command is only available on Cisco Internet Streamer CDS Release 3.1.1.
|
metadata-sender
|
Clears the distribution statistics for the metadata sender.
Note This command is only available on Cisco Internet Streamer CDS Release 3.1.1.
|
unicast-data-receiver
|
Clears the distribution statistics for the unicast data receiver.
Note This command is only available on Cisco Internet Streamer CDS Release 3.1.1.
|
unicast-data-sender
|
Clears the distribution statistics for the unicast data sender.
This command is only available on Cisco Internet Streamer CDS Release 3.1.1.
|
flash-media-streaming
|
Clears the Flash Media Streaming statistics.
|
history
|
Clears the statistics history.
|
icap
|
Clears the ICAP1 statistics.
|
icmp
|
Clears the ICMP statistics.
|
ip
|
Clears the IP statistics.
|
ospf
|
Clears the OSPF statistics.
|
proximity
|
Clears the proximity statistics.
|
rib
|
Clears the RIB proximity statistics.
|
server
|
Clears the Proximity Server statistics.
|
isis
|
Clears counters for an IS-IS instance.
|
GigabitEthernet
|
(Optional) Selects a GigabitEthernet interface.
|
slot/port num
|
Slot and port number for the selected interface. The slot range is 0 to 14; the port is 0. The slot number and port number are separated with a forward slash character (/).
|
PortChannel
|
(Optional) Selects the Ethernet Channel of interfaces.
|
num
|
Specifies the Ethernet Channel interface number. The range is from 1 to 4.
|
movie-streamer
|
Clears the Movie Streamer statistics.
|
radius
|
Clears the RADIUS statistics.
|
rule
|
Clears the rules statistics.
|
action
|
Clears the statistics of all the rules with the same action.
|
action-type
|
Specifies one of the following actions:
allow block generate-url-signature no-cache redirect rewrite use-icap-service validate-url-signature
|
all
|
Clears the statistics of all the rules.
|
pattern
|
Clears the statistics of the pattern lists.
|
1-512
|
Pattern list number.
|
all
|
Clears the statistics for all the pattern lists.
|
rtsp
|
Clears the statistics for the configured RTSP rules (rules configured for RTSP requests from RealMedia players [the RTSP rules] and rules configured for RTSP requests from Windows Media 9 players [the WMT-RTSP rules]).
|
running
|
Clears the running statistics.
|
snmp
|
Clears the SNMP statistics.
|
srp
|
Resets to zero all statistics counters kept by the local DHT service
|
tacacs
|
Clears the TACACS+ statistics.
|
tcp
|
Clears the TCP statistics.
|
transaction-logs
|
Clears the transaction log export statistics.
|
udp
|
Clears the UDP statistics.
|
web-engine
|
Clears the Web Engine statistics.
|
force
|
Clears the Web Engine detail statistics.
|
web-engine
|
Clears Web Engine statistics.
|
force
|
(Optional) Clears Web Engine detail statistics.
|
wmt
|
Clears all WMT statistics.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The clear statistics command clears all statistical counters from the parameters given. Use this command to monitor fresh statistical data for some or all features without losing cached objects or configurations.
This command is used to reset to zero proximity statistics related to the Proximity Engine components that are used for the proximity function. Use the show statistics ip proximity command to display proximity statistics.
The DHT service keeps several counters, such as the number of requests and responses for DHT lookups. These counters can be displayed using the show statistics srp command.
The clear statistics web-engine and clear statistics all commands clear only normal statistics, not the Web Engine statistics details. To clear all Web Engine statistics, use the clear statistics web-engine force command.
The clear stats authsvr delivery-service-id command only clears the authsvr delivery-service specific statistics. It does not clear global statistics. If you want to clear the global statistics, you must use the clear statistics authsvr all or clear statistics authsvr global commands.
Note
The clear statistics web-engine and clear statistics all commands clear only normal statistics, not the Web Engine statistics details. To clear all Web Engine statistics, use the clear statistics web-engine force command. We do not recommend using the clear statistics web-engine force command, but if it is used, restart the Web Engine service by entering the web-engine stop and web-engine start commands.
Examples
The following example shows how to clear proximity statistics with the clear statistics ip proximity command:
ServiceRouter# clear statistics ip proximity server
ServiceRouter# show statistics ip proximity server
Proximity server: Requests received = 0
Proximity server: Responses sent = 0
Proximity server: Faults sent = 0
ServiceRouter# show statistics ip proximity rib
Total number of proximity requests received from applications: 0
Total number of proximity replies sent to applications: 0
Proximity msg exchanges between urib and routing protocols:
Sent Prox Req Received Prox Resp
Local proximity requests from applications: 0
Invalid proximity requests from applications: 0
PSA non-rankable proximity requests from applications: 0
Failed proximity requests to routing protocols: 0
The following is sample output from the show statistics isis command before and after running clear statistics isis command:
ServiceRouter# show statistics isis
PDU Received Sent RcvAuthErr OtherRcvErr
PDU Received Flooded RcvAuthErr OtherRcvErr ReTransmit
ServiceRouter# clear statistics isis *
ServiceRouter# show statistics isis
PDU Received Sent RcvAuthErr OtherRcvErr
PDU Received Flooded RcvAuthErr OtherRcvErr ReTransmit
The following example shows the use of the clear statistics srp command. The show statistics srp command is used to verify that the SRP counters have been reset to zero:
ServiceRouter# show statistics srp
LS exchange request 309 310 0
LS exchange response 310 309 0
Route exchange request 65 0 0
Route exchange response 0 64 0
Ping traceroute request 0 0 0
Ping traceroute response 0 0 0
ServiceRouter# clear statistics srp
Clearing all statistics counters
ServiceRouter# show statistics srp
LS exchange request 1 1 0
LS exchange response 1 1 0
Route exchange request 1 0 0
Route exchange response 0 1 0
Ping traceroute request 0 0 0
Ping traceroute response 0 0 0
Related Commands
Command
|
Description
|
show statistics
|
Displays statistics information.
|
clear transaction-logs
To clear and archive the working transaction log files, use the clear transaction-log command in EXEC configuration mode.
clear transaction-logs
Syntax Description
This command has no keywords or arguments.
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The clear transaction-log command causes the transaction log to be archived immediately to the SE hard disk. This command has the same effect as the transaction-log force archive command.
Examples
The following example shows that the clear transaction-log command forces the working transaction log file to be archived:
ServiceEngine# clear transaction-log
clear users
To clear the connections (login) of authenticated users, use the clear users command in EXEC configuration mode.
clear users administrative
Syntax Description
administrative
|
Clears the connections of administrative users who have been authenticated through a remote login service.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The clear users administrative command clears the connections for all administrative users who are authenticated through a remote login service, such as TACACS. This command does not affect an administrative user who is authenticated through the local database.
Examples
The following example shows how to clear the connections of the authenticated users:
ServiceRouter# clear users administrative
clear wmt
To clear the WMT streams, use the clear wmt command in EXEC configuration mode.
clear wmt {encoder-alarm-msg msg | stale-stat | stream-id num [stale-stat]}
Syntax Description
encoder-alarm-msg
|
Detailed alarm message of the Encoder Alarm to be cleared.
|
msg
|
Detailed alarm message.
|
stream-id
|
Clears the WMT streams that have the specified WMT stream ID. Also stops the SE's WMT process that is associated with the specified stream ID.
|
1-999999
|
WMT stream ID to clear.
|
stale-stat
|
Stale statistic of the WMT stream to be cleared.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Examples
The following example shows how to clear a WMT stream for a stream ID of 22689:
ServiceEngine# clear wmt stream-id 22689
Related Commands
Command
|
Description
|
show statistics wmt
|
Displays the WMT statistics.
|
show wmt
|
Displays WMT bandwidth and proxy mode configuration.
|
clock (EXEC)
To set or clear clock functions or update the calendar, use the clock command in EXEC configuration mode.
clock {read-calendar | set time day month year | update-calendar}
Syntax Description
read-calendar
|
Reads the calendar and updates the system clock.
|
set
|
Sets the time and date.
|
time
|
Current time in hh:mm:ss format (hh: 00 to 23; mm: 00 to 59; ss: 00 to 59).
|
day
|
Day of the month. The range is from 1 to 31.
|
month
|
Month of the year (January, February, March, April, May, June, July, August, September, October, November, December).
|
year
|
Year. The range is from 1993 to 2035.
|
update-calendar
|
Updates the calendar with the system clock.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
If you have an outside source on your network that provides time services (such as a Network Time Protocol [NTP] server), you do not have to set the system clock manually. Enter the local time when setting the clock. The SE calculates the Coordinated Universal Time (UTC) based on the time zone set by the clock timezone command.
Note
We strongly recommend that you configure the SE for the NTP by using the ntp command. See the "ntp" section for more details.
Note
If you change the local time on the device, you must change the BIOS clock time as well; otherwise, the timestamps on the error logs are not synchronized. Changing the BIOS clock is required because the kernel does not handle time zones.
Two clocks exist in the system: the software clock and the hardware clock. The software uses the software clock. The hardware clock is used only at bootup to initialize the software clock. The calendar clock is the same as the hardware clock that runs continuously on the system, even if the system is powered off or rebooted. This clock is separate from the software clock settings that are erased when the system is powered cycled or rebooted.
The set keyword sets the software clock. If the system is synchronized by a valid outside timing mechanism, such as a NTP clock source, you do not have to set the system clock. Use this command if no other time sources are available. The time specified in this command is relative to the configured time zone.
To perform a one-time update of the hardware clock (calendar) from the software clock or to copy the software clock settings to the hardware clock (calendar), use the clock update-calendar command.
Examples
The following example shows how to set the software clock on the SE:
ServiceEngine# clock set 13:32:00 01 February 2000
Related Commands
Command
|
Description
|
clock timezone
|
Sets the clock timezone.
|
ntp
|
Configures the Network Time Protocol server.
|
show clock detail
|
Displays the UTC and local time.
|
clock (Global configuration)
To set the summer daylight saving time and time zone for display purposes, use the clock command in Global configuration mode. To disable this function, use the no form of this command.
clock {summertime timezone {date startday startmonth startyear starthour endday endmonth
endyear offset | recurring {1-4 startweekday startmonth starthour endweekday endmonth
endhour offset | first startweekday startmonth starthour endweekday endmonth endhour
offset | last startweekday startmonth starthour endweekday endmonth endhour offset}} |
timezone {timezone hoursoffset minutesoffset}}
no clock {summertime timezone {date startday startmonth startyear starthour endday endmonth
endyear offset | recurring {1-4 startweekday startmonth starthour endweekday endmonth
endhour offset | first startweekday startmonth starthour endweekday endmonth endhour
offset | last startweekday startmonth starthour endweekday endmonth endhour offset}} |
timezone {timezone hoursoffset minutesoffset}}
Syntax Description
summertime
|
Configures the summer or daylight saving time.
|
timezone
|
Name of the summer time zone.
|
date
|
Configures the absolute summer time.
|
startday
|
Date to start. The range is from 1 to 31.
|
startmonth
|
Month to start. The range is from January through December.
|
startyear
|
Year to start. The range is from 1993-2032.
|
starthour
|
Hour to start in (hh:mm) format. The range is from 0 to 23.
|
endday
|
Date to end. The range is from 1 to 31.
|
endmonth
|
Month to end. The range is from January through December.
|
endyear
|
Year to end. The range is from 1993-2032.
|
endhour
|
Hour to end in (hh:mm) format. The range is from 0 to 23.
|
offset
|
Minutes offset (see Table B-1) from Coordinated Universal Time (UTC) The range is from 0 to 59.
|
recurring
|
Configures the recurring summer time.
|
1-4
|
Configures the starting week number. The range is from 1 to 4.
|
first
|
Configures the summer time to recur beginning the first week of the month.
|
last
|
Configures the summer time to recur beginning the last week of the month.
|
startweekday
|
Day of the week to start. The range is from Monday to Friday.
|
startmonth
|
Month to start. The range is from January through December.
|
starthour
|
Hour to start in hh:mm format. The range is from 0 to 23.
|
endweekday
|
Weekday to end. The range is from Monday to Friday
|
endmonth
|
Month to end. The range is from January through December.
|
endhour
|
Hour to end in hour:minute (hh:mm) format. The range is from 0 to 23.
|
offset
|
Minutes offset (see Table B-1) from UTC. The range is from 0 to 59.
|
timezone
|
Configures the standard time zone.
|
timezone
|
Name of the time zone.
|
hoursoffset
|
Hours offset (see Table B-1) from UTC. The range is from -23 to +23.
|
minutesoffset
|
Minutes offset (see Table B-1) from UTC. The range is from 0 to 59.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
To set and display the local and UTC current time of day without an NTP server, use the clock timezone command with the clock set command. The clock timezone parameter specifies the difference between UTC and local time, which is set with the clock set command in EXEC configuration mode. The UTC and local time are displayed with the show clock detail command in EXEC configuration mode.
Use the clock timezone offset command to specify a time zone, where timezone is the desired time zone entry from Table B-1 and 0 0 is the offset (ahead or behind) Coordinated Universal Time (UTC) in hours and minutes. UTC was formerly known as Greenwich Mean Time (GMT).
SE(config)# clock timezone timezone 0 0
Note
The time zone entry is case sensitive and must be specified in the exact notation listed in the time zone table as shown in "Standard Time Zones." When you use a time zone entry from Table B-1, the system is automatically adjusted for daylight saving time.
Note
If you change the local time on the device, you must change the BIOS clock time as well; otherwise, the timestamps on the error logs are not synchronized. Changing the BIOS clock is required because the kernel does not handle time zones.
The offset (ahead or behind) UTC in hours, as displayed in Table B-1, is in effect during winter time. During summer time or daylight saving time, the offset may be different from the values in the table and are calculated and displayed accordingly by the system clock.
Note
An accurate clock and timezone setting is required for the correct operation of the HTTP proxy caches.
Examples
The following example shows how to specify the local time zone as Pacific Standard Time with an offset of 8 hours behind UTC:
ServiceEngine(config)# clock timezone PST -8
Custom Timezone: PST will be used.
The following example shows how to configure a standard time zone on the SE:
ServiceEngine(config)# clock timezone US/Pacific 0 0
Resetting offset from 0 hour(s) 0 minute(s) to -8 hour(s) 0 minute(s)
Standard Timezone: US/Pacific will be used.
The following example negates the time zone setting on the SE:
ServiceEngine(config)# no clock timezone
The following example shows how to configure daylight saving time:
ServiceEngine(config)# clock summertime PDT date 10 October 2001 23:59 29 April 2002 23:59
60
Related Commands
Command
|
Description
|
clock
|
To set the summer daylight saving time and time zone for display purposes.
|
show clock detail
|
Displays the UTC and local time.
|
cms (EXEC)
To configure the Centralized Management System (CMS) embedded database parameters, use the cms command in EXEC configuration mode.
cms {config-sync | database {backup | create | delete | downgrade [script filename] |
maintenance {full | regular} | restore filename | validate} | deregister [force] | recover
{identity word}}
Syntax Description
config-sync
|
Sets the node to synchronize configuration with the CDSM.
|
database
|
Creates, backs up, deletes, restores, or validates the CMS-embedded database management tables or files.
|
backup
|
Backs up the database management tables.
|
create
|
Creates the embedded database management tables.
|
delete
|
Deletes the embedded database files.
|
downgrade
|
Downgrades the CMS database.
|
script
|
(Optional) Downgrades the CMS database by applying a downgrade script.
|
filename
|
Downgraded script filename.
|
maintenance
|
Cleans and reindexes the embedded database tables.
|
full
|
Specifies a full maintenance routine for the embedded database tables.
|
regular
|
Specifies a regular maintenance routine for the embedded database tables.
|
restore
|
Restores the database management tables using the backup local filename.
|
filename
|
Database local backup filename.
|
validate
|
Validates the database files.
|
deregister
|
Removes the registration of the CMS proto device.
|
force
|
(Optional) Forces the removal of the node registration.
|
recover
|
Recovers the identity of an CDS network device.
|
identity
|
Specifies the identity of the recovered device.
|
word
|
Identity of the recovered device.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The CDS network is a collection of SR, SE, and CDSM nodes. One primary CDSM retains the CDS network settings and provides other CDS network nodes with updates. Communication between nodes occurs over secure channels using the Secure Shell Layer (SSL) protocol, where each node on the CDS network uses a Rivest, Shamir, Adelman (RSA) certificate-key pair to communicate with other nodes.
Use the cms config-sync command to enable registered SRs, SEs, and standby CDSM to contact the primary CDSM immediately for a getUpdate (get configuration poll) request before the default polling interval of 5 minutes. For example, when a node is registered with the primary CDSM and activated, it appears as Pending in the CDSM GUI until it sends a getUpdate request. The cms config-sync command causes the registered node to send a getUpdate request at once, and the status of the node changes as Online.
Use the cms database create command to initialize the CMS database. Before a node can join a CDS network, it must first be registered and then activated. The cms enable command automatically registers the node in the database management tables and enables the CMS. The node sends its attribute information to the CDSM over the SSL protocol and then stores the new node information. The CDSM accepts these node registration requests without admission control and replies with registration confirmation and other pertinent security information required for getting updates. Activate the node using the CDSM GUI.
Once the node is activated, it automatically receives configuration updates and the necessary security RSA certificate-key pair from the CDSM. This security key allows the node to communicate with any other node in the CDS network. The cms deregister command removes the node from the CDS network by deleting registration information and database tables.
Note
The cms deregister command cleans up the database automatically. You do not need to use the cms database delete command. If the deregistration fails, the best practice is to resolve any issues that caused the deregistration failure; for example, the Service Engine is the Content Acquirer of a delivery service and cannot be deleted or deactivated. Assign a different SE as the Content Acquirer in each delivery service where this SE is assigned as the Content Acquirer and try the cms deregister command again.
To back up the existing management database for the CDSM, use the cms database backup command. For database backups, specify the following items:
•
Location, password, and user ID
•
Dump format in PostgreSQL plain text syntax
The naming convention for backup files includes the time stamp.
When you use the cms recover identity word command when recovering lost registration information, or replacing a failed node with a new node that has the same registration information, specify the device recovery key that you configured in the Modifying Config Property, System.device.recovery.key window of the CDSM GUI.
Use the lcm command to configure local or central management (LCM) on an CDS network device. The LCM feature allows settings configured using the device CLI or GUI to be stored as part of the CDS network-wide configuration data (enable or disable).
When you enter the cms lcm enable command, the CMS process running on SEs, SRs, and the standby CDSM detects the configuration changes that you made on these devices using CLIs and sends the changes to the primary CDSM.
When you enter the cms lcm disable command, the CMS process running on SEs, SRs, and the standby CDSM does not send the CLI changes to the primary CDSM. Settings configured using the device CLIs are not sent to the primary CDSM.
If LCM is disabled, the settings configured through the CDSM GUI overwrite the settings configured from the SE or SR; however, this rule applies only to those local device settings that have been overwritten by the CDSM when you have configured the local device settings. If you (as the local CLI user) change the local device settings after the particular configuration has been overwritten by the CDSM, the local device configuration is applicable until the CDSM requests a full-device statistics update from the SE or SR (clicking the Force full database update button from the Device Home window of the CDSM GUI triggers a full update). When the CDSM requests a full update from the device, the CDSM settings overwrite the local device settings.
The cms deregister force command should be used only as the last option, because the CDSM does not know about the device being removed. When executing the cms deregister force command, take note of any messages stating that the deregistration failed and make sure to resolve them before reregistering the device with the same CDSM or registering the device to another CDSM. The cms deregister force command forces the deregistration to continue.
Examples
The following example shows how to back up the database management tables:
CDSM# cms database backup
creating backup file with label `backup'
backup file local1/CDS-db-9-22-2002-17-36.dump is ready. use `copy' commands to move the
backup file to a remote host.
The following example shows how to validate the database management tables:
CDSM# cms database validate
Management tables are valid
In the following example, the CMS deregistration process has problems deregistering the SE, but it proceeds to deregister it from the CMS database when the force option is used:
ServiceEngine# cms deregister force
Deregistration requires management service to be stopped.
You will have to manually start it. Stopping management service on this node...
This operation needs to restart http proxy and streaming proxies/servers (if running) for
memory reconfiguration. Proceed? [ no ] yes
management services stopped
Thu Jun 26 13:17:34 UTC 2003 [ I ] main: creating 24 messages
Thu Jun 26 13:17:34 UTC 2003 [ I ] main: creating 12 dispatchers
Thu Jun 26 13:17:34 UTC 2003 [ I ] main: sending eDeRegistration message to CDSM
10.107.192.168
The following example shows the use of the cms recover identity command when the recovery request matches the SE record, and the CDSM updates the existing record and sends a registration response to the requesting SE:
ServiceEngine# cms recover identity default
Registering this node as Service Engine...
Sending identity recovery request with key default
Thu Jun 26 12:54:42 UTC 2003 [ I ] main: creating 24 messages
Thu Jun 26 12:54:42 UTC 2003 [ I ] main: creating 12 dispatchers
Thu Jun 26 12:54:42 UTC 2003 [ I ] main: Sending registration message to CDSM
10.107.192.168
Thu Jun 26 12:54:44 UTC 2003 [ W ] main: Unable to load device info file in TestServer
Thu Jun 26 12:54:44 UTC 2003 [ I ] main: Connecting storeSetup for SE.
Thu Jun 26 12:54:44 UTC 2003 [ I ] main: Instantiating AStore
'com.cisco.unicorn.schema.PSqlStore'...
Thu Jun 26 12:54:45 UTC 2003 [ I ] main: Successfully connected to database
Thu Jun 26 12:54:45 UTC 2003 [ I ] main: Registering object factories for persistent
store...
Thu Jun 26 12:54:51 UTC 2003 [ I ] main: Dropped Sequence IDSET.
Thu Jun 26 12:54:51 UTC 2003 [ I ] main: Successfully removed old management tables
Thu Jun 26 12:54:51 UTC 2003 [ I ] main: Registering object factories for persistent
store...
Thu Jun 26 12:54:54 UTC 2003 [ I ] main: Created Table FILE_CDSM.
Thu Jun 26 12:54:55 UTC 2003 [ I ] main: Created SYS_MESS_TIME_IDX index.
Thu Jun 26 12:54:55 UTC 2003 [ I ] main: Created SYS_MESS_NODE_IDX index.
Thu Jun 26 12:54:55 UTC 2003 [ I ] main: No Consistency check for store.
Thu Jun 26 12:54:55 UTC 2003 [ I ] main: Successfully created management tables
Thu Jun 26 12:54:55 UTC 2003 [ I ] main: Registering object factories for persistent
store...
Thu Jun 26 12:54:55 UTC 2003 [ I ] main: AStore Loading store data...
Thu Jun 26 12:54:56 UTC 2003 [ I ] main: ExtExpiresRecord Loaded 0 Expires records.
Thu Jun 26 12:54:56 UTC 2003 [ I ] main: Skipping Construction RdToClusterMappings on
non-CDSM node.
Thu Jun 26 12:54:56 UTC 2003 [ I ] main: AStore Done Loading. 327
Thu Jun 26 12:54:56 UTC 2003 [ I ] main: Created SYS_MESS_TIME_IDX index.
Thu Jun 26 12:54:56 UTC 2003 [ I ] main: Created SYS_MESS_NODE_IDX index.
Thu Jun 26 12:54:56 UTC 2003 [ I ] main: No Consistency check for store.
Thu Jun 26 12:54:56 UTC 2003 [ I ] main: Successfully initialized management tables
Node successfully registered with id 103
The following example shows the use of the cms recover identity command when the hostname of the SE does not match the hostname configured in the CDSM GUI:
ServiceEngine# cms recover identity default
Registering this node as Service Engine...
Sending identity recovery request with key default
Thu Jun 26 13:16:09 UTC 2003 [ I ] main: creating 24 messages
Thu Jun 26 13:16:09 UTC 2003 [ I ] main: creating 12 dispatchers
Thu Jun 26 13:16:09 UTC 2003 [ I ] main: Sending registration message to CDSM
10.107.192.168
There are no SE devices in CDN
register: Registration failed.
Related Commands
Command
|
Description
|
cms enable
|
Enables the CMS.
|
show cms
|
Displays the CMS protocol, embedded database content, maintenance status, and other information.
|
cms (Global configuration)
To schedule maintenance and enable the Centralized Management System (CMS) on a given node, use the cms command in Global configuration mode. To negate these actions, use the no form of this command.
cms {database maintenance {full {enable | schedule weekday at time} | regular {enable |
schedule weekday at time}} | enable | rpc timeout {connection 5-1800 | incoming-wait
10-600 | transfer 10-7200}}
no cms {database maintenance {full {enable | schedule weekday at time} | regular {enable |
schedule weekday at time}} | enable | rpc timeout {connection 5-1800 | incoming-wait
10-600 | transfer 10-7200}}
Syntax Description
database maintenance
|
Configures the embedded database, clean, or reindex maintenance routine.
|
full
|
Configures the full maintenance routine and cleans the embedded database tables.
|
enable
|
Enables the full maintenance routine to be performed on the embedded database tables.
|
schedule
|
Sets the schedule for performing the maintenance routine.
|
weekday
|
Day of the week to start the maintenance routine.
every-day—Every day Fri—every Friday Mon—every Monday Sat—every Saturday Sun—every Sunday Thu—every Thursday Tue—every Tuesday Wed—every Wednesday
|
at
|
Sets the maintenance schedule time of day to start the maintenance routine.
|
time
|
Time of day to start the maintenance routine. The range is from 0 to 23:0 to 59 in hh:mm format.
|
regular
|
Configures the regular maintenance routine and reindexes the embedded database tables.
|
enable
|
Enables the node CMS process.
|
rpc timeout
|
Configures the timeout values for remote procedure call connections.
|
connection
|
Specifies the maximum time to wait for when making a connection.
|
5-1800
|
Timeout period, in seconds. The default for the CDSM is 30; the default for the SE and the SR is 180.
|
incoming-wait
|
Specifies the maximum time to wait for a client response.
|
10-600
|
Timeout period, in seconds. The default is 30.
|
transfer
|
Specifies the maximum time to allow a connection to remain open.
|
10-7200
|
Timeout period, in seconds. The default is 300.
|
Command Defaults
database maintenance regular: enabled
database maintenance full: enabled
connection: 30 seconds for CDSM; 180 seconds for the SE and the SR
incoming wait: 30 seconds
transfer: 300 seconds
Command Modes
Global configuration (config) mode.
Usage Guidelines
Use the cms database maintenance command to schedule routine, full-maintenance cleaning (vacuuming) or a regular maintenance reindexing of the embedded database. The full maintenance routine runs only when the disk is more than 90 percent full and runs only once a week. Cleaning the tables returns reusable space to the database system.
The cms enable command automatically registers the node in the database management tables and enables the CMS process. The no cms enable command stops only the management services on the device and does not disable a primary sender. You can use the cms deregister command to remove a primary or backup sender SE from the CDS network and to disable communication between two multicast senders.
Examples
The following example shows how to schedule a regular (reindexing) maintenance routine to start every Friday at 11:00 p.m.:
ServiceEngine(config)# cms database maintenance regular schedule Fri at 23:00
The following example shows how to enable the CMS process on an SE:
ServiceEngine(config)# cms enable
This operation needs to restart http proxy and streaming proxies/servers (if running) for
memory reconfiguration. Proceed? [ no ] yes
Registering this node as Service Engine...
Thu Jun 26 13:18:24 UTC 2003 [ I ] main: creating 24 messages
Thu Jun 26 13:18:25 UTC 2003 [ I ] main: creating 12 dispatchers
Thu Jun 26 13:18:25 UTC 2003 [ I ] main: Sending registration message to CDSM
10.107.192.168
Thu Jun 26 13:18:27 UTC 2003 [ I ] main: Connecting storeSetup for SE.
Thu Jun 26 13:18:27 UTC 2003 [ I ] main: Instantiating AStore
'com.cisco.unicorn.schema.PSqlStore'...
Thu Jun 26 13:18:28 UTC 2003 [ I ] main: Successfully connected to database
Thu Jun 26 13:18:28 UTC 2003 [ I ] main: Registering object factories for persistent
store...
Thu Jun 26 13:18:35 UTC 2003 [ I ] main: Dropped Sequence IDSET.
Thu Jun 26 13:18:35 UTC 2003 [ I ] main: Dropped Sequence GENSET.
Thu Jun 26 13:18:35 UTC 2003 [ I ] main: Dropped Table USER_TO_DOMAIN.
Thu Jun 26 13:18:39 UTC 2003 [ I ] main: Created Table FILE_CDSM.
Thu Jun 26 13:18:40 UTC 2003 [ I ] main: Created SYS_MESS_TIME_IDX index.
Thu Jun 26 13:18:40 UTC 2003 [ I ] main: Created SYS_MESS_NODE_IDX index.
Thu Jun 26 13:18:40 UTC 2003 [ I ] main: No Consistency check for store.
Thu Jun 26 13:18:40 UTC 2003 [ I ] main: Successfully created management tables
Thu Jun 26 13:18:40 UTC 2003 [ I ] main: Registering object factories for persistent
store...
Thu Jun 26 13:18:40 UTC 2003 [ I ] main: AStore Loading store data...
Thu Jun 26 13:18:41 UTC 2003 [ I ] main: ExtExpiresRecord Loaded 0 Expires records.
Thu Jun 26 13:18:41 UTC 2003 [ I ] main: Skipping Construction RdToClusterMappings on
non-CDSM node.
Thu Jun 26 13:18:41 UTC 2003 [ I ] main: AStore Done Loading. 336
Thu Jun 26 13:18:41 UTC 2003 [ I ] main: Created SYS_MESS_TIME_IDX index.
Thu Jun 26 13:18:41 UTC 2003 [ I ] main: Created SYS_MESS_NODE_IDX index.
Thu Jun 26 13:18:41 UTC 2003 [ I ] main: No Consistency check for store.
Thu Jun 26 13:18:41 UTC 2003 [ I ] main: Successfully initialized management tables
Node successfully registered with id 28940
Warning: The device will now be managed by the CDSM. Any configuration changes
made via CLI on this device will be overwritten if they conflict with settings on the
CDSM.
Please preserve running configuration using 'copy running-config startup-config'.
Otherwise management service will not be started on reload and node will be shown
management services enabled
Related Commands
Command
|
Description
|
cms database
|
Creates, backs up, deletes, restores, or validates the CMS-embedded database management tables or files.
|
show cms
|
Displays the CMS protocol, embedded database content, maintenance status, and other information.
|
configure
To enter Global configuration mode, use the configure command in EXEC configuration mode.
configure
To exit Global configuration mode, use the end or exit commands. In addition, you can press Ctrl-Z to exit from Global configuration mode.
Syntax Description
This command has no keywords or arguments.
Command Defaults
None
Command Modes
EXEC configuration mode.
Examples
The following example shows how to enable Global configuration mode:
Related Commands
Command
|
Description
|
end
|
Exits configuration and privileged EXEC configuration modes.
|
exit
|
Exits from interface, Global configuration, or privileged EXEC configuration modes.
|
show running-config
|
Displays the current operating configuration.
|
show startup-config
|
Displays the startup configuration.
|
contentmgr
To configure the Content Manager, use the contentmgr command in Global configuration mode. To remove the configuration, use the no form of this command.
contentmgr {delivery-service cache-content purge-on-delete num | disk-bucket-fail-threshold num | hitcnt-decay-half-life num}
no contentmgr {delivery-service cache-content purge-on-delete num | disk-bucket-fail-threshold num | hitcnt-decay-half-life num}
Syntax Description
delivery-service
|
Configures the Content Manager delivery service.
Note This command was introduced in the 2.6.3 software release.
|
cache-content
|
Configures the Content Manager delivery service cache content.
|
purge-on-delete
|
Configures the Content Manager delivery service cache content purge on delete.
|
num
|
Purge after minutes (0 to 1440).
Note 0 means not deleting.
|
disk-bucket-fail-threshold
|
Configures threshold percentage of disk failures per bucket, to raise alarm.
|
num
|
Threshold percentage (1 to 100).
|
hitcnt-decay-half-life
|
Configure half life decay period for cache hit count updates.
|
num
|
Half life decay for cache content hit count updates (1 to 30).
|
Command Defaults
purge-on-delete: 5 minutes
disk-bucket-fail-threshold: default is 30 percent.
hitcnt-decay-half-life: default is 14 days.
Command Modes
Global configuration (config) mode.
Usage Guidelines
As part of FastCAL, the Content Manager module replaces the Ucache process in Cisco Internet Streamer CDS 2.6 Release software. The Content Manager keeps track of all the files in CDNFS, and maintains all content popularity information and stores it in a snapshot file.
The contentmgr disk-bucket-fail-threshold command monitors the percentage of disks failed in a particular disk bucket. A minor alarm would be raised if the percentage disk failure crosses the configured threshold value.
A disk bucket is a logical unit in FastCAL module, where all the disks on an SE are distributed equally among each disk bucket. The number of disk buckets can be 1, 3, or 4 depending on the platform.
For example:
•
A CDE220 with 12 hard-disks (disk00 to disk11):
–
This hardware has 3 disk-buckets.
–
Each disk-bucket has 4 disks in it (sequentially allocated).
–
The allocation of disks is as follows:
disk-bucket00 | disk-bucket01 | disk-bucket02
--------------|-----------------|---------------
disk00 | disk01 | disk02
disk03 | disk04 | disk05
disk06 | disk07 | disk08
disk09 | disk10 | disk11
–
The Number of Disk buckets for each platform type is as as follows:
2S6 = 4
2M1 = 3
2M0 = 4
2S3I = 3
CDE220 = 3
2G2 = 3
CDE205 = 1
Use the contentmgr hitcnt-decay-half-life command to configure the time period after which cache hit count is decayed.
The Content Manager transaction logs help identify whether a content is being added, updated, deleted, or evicted. The format for Content Manager transaction logging is as follows:
ServiceEngine# tail -f /local/local1/logs/content_mgr/working.log
Examples
The following example shows how to configure the Content Manager delivery service cache content purge on delete after 10 minutes:
ServiceEngine# delivery-service cache-content purge-on-delete 10
The following example shows how to configure the cache hit count half life to 10 days:
ServiceEngine# contentmgr hitcnt-decay-half-life 10
The following example shows how to configure the percentage of disk failures to 20 percent:
ServiceEngine# contentmgr disk-bucket-fail-threshold 20
The following example shows the disk bucket alarm:
ServiceEngine# show alarms
Alarm ID Module/Submodule Instance
-------------------- -------------------- -------------------------
Alarm ID Module/Submodule Instance
-------------------- -------------------- -------------------------
1 psu sysmon Power Supply
2 disk_bucket_thresh sysmon/cmgr/bucket00 Disk Bucket 00
3 disk_bucket_thresh sysmon/cmgr/bucket01 Disk Bucket 01
4 disk_failure sysmon disk05
5 disk_failure sysmon disk09
6 disk_failure sysmon disk12
Related Commands
Command
|
Description
|
content-mgr disk-info force-reset
|
Forces the Content Manager to reset the disk share memory information
|
show content-mgr
|
Displays all content management information.
|
show statistics content-mgr
|
Displays the Content Manager statistics.
|
content-mgr disk-info force-reset
To force the Content Manager to reset the disk share memory information, use the copy command in EXEC configuration mode.
content-mgr disk-info-force-reset
Syntax Description
This command has no keywords or arguments.
Command Defaults
None
Command Modes
EXEC configuration mode.
Examples
The following example shows how to force the Content Manager to reset the disk share memory information:
ServiceEngine# content-mgr disk-info force-reset
Disk info force reset completed.
Related Commands
Command
|
Description
|
contentmgr
|
Configures the Content Manager.
|
show content-mgr
|
Displays all content management information.
|
show statistics content-mgr
|
Displays the Content Manager statistics.
|
content-origin
To support multiple origin servers within a content origin, use the content-origin command in Global configuration mode. To remove configured content origin, use the no form of this command.
content-origin request-fqdn domain config-url url [username username password password]
no content-origin request-fqdn domain config-url url [username username password password]
Syntax Description
request-fqdn
|
Configures the request FQDN1 .
|
domain
|
Domain of the request FQDN. Domain size range should be between 1to 255 characters.
|
config-url
|
URL of the content origin configuration file.
|
url
|
URL name.
|
username
|
Configures a username to access configuration file.
|
username
|
Specifies a username.
|
password
|
Configures a password to access configuration file.
|
password
|
Specifies a password.
|
Command Defaults
None
Command Modes
Global configuration mode.
Usage Guidelines
Previously, only one origin server per content origin was allowed and the same origin server could not be shared across multiple content origins. Users had to create delivery services or content origins and different content origin domain names resolving to same IP addresses of the origin server. This created much overhead during deployment. The content-origin command supports multiple origin servers within a content origin and allows users to share single origin servers across multiple delivery service or content origins.
Examples
The following example shows how to create a
ServiceEngine# content-origin request-fqdn xxx.com config-url
http://171.XX.XX.XXX/cdsorigin.xml username admin password default
Related Commands
Command
|
Description
|
show content-origin
|
Displays information about the NAS mount.
|
copy
To copy the configuration or image data from a source to a destination, use the copy command in EXEC configuration mode.
copy cdnfs disk url sysfs-filename
copy disk {ftp {hostname | ip-address} remotefiledir remotefilename localfilename |
startup-config filename}
copy ftp {disk {hostname | ip-address} remotefiledir remotefilename localfilename | install
{hostname | ip-address} remotefiledir remotefilename}
copy http install {{hostname | ip-address} remotefiledir remotefilename} [port port-num [proxy
{hostname | ip-address} | username username password [proxy {hostname | ip-address}
proxy_portnum]] | proxy {hostname | ip-address} proxy_portnum | username username
password [proxy {hostname | ip-address} proxy_portnum]]
copy running-config {disk filename | startup-config}
copy startup-config {disk filename | running-config}
copy system-status disk filename
copy tech-support {disk filename | remotefilename}
Syntax Description
cdnfs
|
Copies a file from the CDNFS to the sysfs.
|
disk
|
Copies a file to the disk.
|
url
|
URL of the CDNFS file to be copied to the sysfs.
|
sysfs-filename
|
Filename to be copied in the sysfs.
|
disk
|
Copies a local disk file.
|
ftp
|
Copies to a file on an FTP server.
|
hostname
|
Hostname of the FTP server.
|
ip-address
|
IP address of the FTP server.
|
remotefiledir
|
Directory on the FTP server to which the local file is copied.
|
remotefilename
|
Name of the local file after it has been copied to the FTP server.
|
localfilename
|
Name of the local file to be copied.
|
startup-config
|
Copies the configuration file from the disk to startup configuration (NVRAM).
|
filename
|
Name of the existing configuration file.
|
ftp
|
Copies a file from an FTP server.
|
disk
|
Copies a file to a local disk.
|
hostname
|
Hostname of the FTP server.
|
ip-address
|
IP address of the FTP server.
|
remotefiledir
|
Directory on the FTP server where the file to be copied is located.
|
remotefilename
|
Name of the file to be copied to the local disk.
|
localfilename
|
Name of the copied file as it appears on the local disk.
|
install
|
Copies the file from an FTP server and installs the software release file to the local device.
|
hostname
|
Name of the FTP server.
|
ip-address
|
IP address of the FTP server.
|
remotefiledir
|
Remote file directory.
|
remotefilename
|
Remote filename.
|
http install
|
Copies the file from an HTTP server and installs the software release file on a local device.
|
hostname
|
Name of the HTTP server.
|
ip-address
|
IP address of the HTTP server.
|
remotefiledir
|
Remote file directory.
|
remotefilename
|
Remote filename.
|
port
|
(Optional) Specifies the port to connect to the HTTP server. The default is 80.
|
port-num
|
HTTP server port number. The range is from 1 to 65535.
|
proxy
|
Allows the request to be redirected to an HTTP proxy server.
|
hostname
|
Name of the HTTP server.
|
ip-address
|
IP address of the HTTP server.
|
proxy_portnum
|
HTTP proxy server port number. The range is from 1 to 65535.
|
username
|
Specifies the username to access the HTTP proxy server.
|
username
|
User login name.
|
running-config
|
Copies the current system configuration.
|
disk
|
Copies the current system configuration to a disk file.
|
filename
|
Name of the file to be created on disk.
|
startup-config
|
Copies the running configuration to the startup configuration (NVRAM).
|
disk
|
Copies the startup configuration to a disk file.
|
filename
|
Name of the startup configuration file to be copied to the local disk.
|
running-config
|
Copies the startup configuration to a running configuration.
|
system-status disk
|
Copies the system status to a disk file.
|
filename
|
Name of the file to be created on the disk.
|
tech-support
|
Copies system information for technical support.
|
disk
|
Copies system information for technical support to a disk file.
|
filename
|
Name of the file to be created on disk.
|
remotefilename
|
Remote filename of the system information file to be created on the TFTP server. Use the complete pathname.
|
Command Defaults
HTTP server port: 80
Default working directory for sysfs files: /local1
Command Modes
EXEC configuration mode.
Usage Guidelines
The copy cdnfs command in EXEC configuration mode copies data files from of the CDNFS to the sysfs for further processing. For example, you can use the install imagefilename command in EXEC configuration mode to provide the copied files to the command.
The copy disk ftp command copies files from a sysfs partition to an FTP server. The copy disk startup-config command copies a startup configuration file to NVRAM.
The copy ftp disk command copies a file from an FTP server to a sysfs partition.
Use the copy ftp install command to install an image file from an FTP server. Part of the image goes to the disk and part goes to the flash memory.
Use the copy http install command to install an image file from an HTTP server and install it on a local device. It transfers the image from an HTTP server to the SE using HTTP as the transport protocol and installs the software on the device. Part of the image goes to the disk and part goes to the flash memory. You can also use this command to redirect your transfer to a different location or HTTP proxy server, by specifying the proxy hostname | ip-address option. A username and a password have to be authenticated with the remote HTTP server if the server is password protected and requires authentication before the transfer of the software release file to the SE is allowed.
Use the copy running-config command to copy the running system configuration to a sysfs partition or flash memory. The copy running-config startup-config command is equivalent to the write memory command.
The copy startup-config command copies the startup configuration file to a sysfs partition.
The copy system-status command creates a file on a sysfs partition containing hardware and software status information.
The copy tech-support tftp command copies technical support information to a a sysfs partition.
Related Commands
Command
|
Description
|
install
|
Installs a new version of the caching application.
|
reload
|
Halts a device and performs a cold restart.
|
show running-config
|
Displays the current operating configuration.
|
show startup-config
|
Displays the startup configuration.
|
write
|
Writes or erases the startup configurations to NVRAM or to a terminal session, or writes the MIB persistence configuration to disk.
|
cpfile
To make a copy of a file, use the cpfile command in EXEC configuration mode.
cpfile oldfilename newfilename
Syntax Description
oldfilename
|
Name of the file to be copied.
|
newfilename
|
Name of the copy to be created.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Use this command to create a copy of a file. Only sysfs files can be copied.
Examples
The following example shows how to create a copy of a file:
ServiceEngine# cpfile syslog.txt syslog.txt.save
Related Commands
Command
|
Description
|
copy
|
Copies the configuration or image files to and from the CD-ROM, flash memory, disk, or remote hosts.
|
dir
|
Displays the files in a long-list format.
|
lls
|
Displays the files in a long-list format.
|
ls
|
Lists the files and subdirectories in a directory.
|
mkfile
|
Makes a file (for testing).
|
rename
|
Renames a file.
|
rmdir
|
Removes a directory.
|
debug
To monitor and record caching application functions, use the debug command in EXEC configuration mode. To disable these functions, use the no form of this command.
debug option
no debug option
Syntax Description
option
|
Specifies the debugger type; see the section for valid values.
|
Command Defaults
debug all: default logging level is ERROR.
Command Modes
EXEC configuration mode.
Usage Guidelines
We recommend that you use the debug command only at the direction of Cisco TAC because the SE performance is affected when you enter the debug command.
You can use the logging disk priority debug command with the debug command. This configuration causes the debugging messages to be logged in the syslog file, which is available in the /local1 directory by default. You can then download the messages from the SE, copy them to a local disk file (for example, using the copy disk ftp command), and forward the logs to Cisco TAC for further investigation.
By default, system log messages are logged to the console and you need to copy and paste the output to a file. However, this method of obtaining logs is more prone to errors than capturing all messages in the syslog.txt file. When you use system logging to a disk file instead of system logging to a console, there is no immediate feedback that debug logging is occurring, except that the syslog.txt file gets larger (you can track the lines added to the syslog.txt file by entering the type-tail syslog.txt follow command). When you have completed downloading the system logs to a local disk, disable the debugging functions by using the undebug command (see the "undebug" section section for more details), and reset the level of logging disk priority to any other setting that you want (for example, notice priority).
Table 2-2 shows valid values for the debug command options.
Table 2-2 debug Command Options
aaa
access-lists 300
dump
query
username username
groupname groupnames
|
debugs AAA.
Debugs the ACL.
Dumps the ACL contents.
Queries the ACL configuration.
Queries the ACL username.
Queries the ACL group name or names of groups of which the user is a member. Each group name must be separated by a comma.
|
acquirer
error
trace
|
Debugs the acquirer.
Sets the debug level to error.
Sets the debug level to trace.
|
all
|
Enables all debugging.
|
authentication
user
|
Debugs authentication.
Debugs the user login against the system authentication.
|
authsvr
error
trace
|
Debugs the Autnentication Server.
Sets the debug level to error.
Sets the debug level to trace.
|
bandwidth
advanced
error
trace
|
Debugs the bandwidth module.
Advanced bandwidth controller debug commands.
Sets the debug level to error.
Sets the debug level to trace.
|
buf
all
dmbuf
dmsg
|
Debugs the buffer manager.
Debugs all buffer manager functions.
Debugs the buffer manager dmbuf.
Debugs the buffer manager dmsg.
|
cache-content
all
error
trace
|
Debugs the caching service.
(Optional) Sets the debug level to all.
(Optional) Sets the debug level to error.
(Optional) Sets the debug level to trace.
|
cache-router
error
trace
|
Debugs the caching router.
Sets the debug level to error.
Sets the debug level to trace.
|
cdnfs
|
Debugs the CNNFS.
|
cli
all
bin
parser
|
Debugs the CLI command.
Debugs all CLI commands.
Debugs the CLI command binary program.
Debugs the CLI command parser.
|
cms
|
Debugs the CMS.
|
content-mgr
error
trace
|
Debugs the Content Manager.
Sets the debug level to error.
Sets the debug level to trace.
|
dataserver
all
clientlib
server
|
Debugs the data server.
Debuts all data server functions.
Debugs the data server client library module.
Debugs the data server module.
|
dfs
all
api
diskcache
memcache
rawio
|
Debugs the DFS.
Sets the debug level to all.
Debugs the DFS application API.
Debugs the DFS in-memory disk-directory cache management.
Debugs the DFS in-memory cache.
Debugs the DFS raw disk I/O.
|
dhcp
|
Debugs the DHCP.
|
distribution
all
error
trace
mcast-data-receiver
error
trace
mcast-data-sender
error
trace
metadata-receiver
error
trace
metadata-sender
error
trace
unicast-data-receiver
error
trace
unicast-data-sender
error
trace
|
Debugs the distribution components.
Debugs all distribution components.
Debugs all distribution components to error level 1 (show error).
Debugs all distribution components to trace level 2 (show error and trace).
Debugs the multicast receiver distribution component.
Debugs the multicast receiver distribution component to error level 1.
Debugs the multicast receiver distribution component to trace level 2.
Debugs the multicast sender distribution component.
Debugs the multicast sender distribution component to error level 1.
Debugs the multicast sender distribution component to trace level 2.
Debugs the metadata receiver distribution component.
Debugs the metadata receiver distribution component to error level 1.
Debugs the metadata receiver distribution component to trace level 2.
Debugs the metadata sender distribution component.
Debugs the metadata sender distribution component to error level 1.
Debugs the metadata sender distribution component to trace level 2.
Debugs the unicast receiver distribution component.
Debugs the unicast receiver distribution component to error level 1.
Debugs the unicast receiver distribution component to trace level 2.
Debugs the unicast sender distribution component.
Debugs the unicast sender distribution component to error level 1.
Debugs the unicast sender distribution component to trace level 2.
|
emdb
level
(0-16)
|
Debugs the embedded database.
(Optional) Debug level.
Debug level 0 through 16.
|
flash-media-streaming
error
trace
|
Debugs Flash Media Streaming.
Debugs the Flash Media Streaming log level error.
Debugs the Flash Media Streaming log level debug.
|
http
service-router
|
Debugs HTTP.
Debugs the HTTP Service Router.
|
icap
all
client
daemon
|
Debugs ICAP.
Debugs both ICAP client and ICAP daemon processing.
Debugs the ICAP client (caching proxy) processing.
Debugs the ICAP daemon processing.
|
ip
bgp
ospf
proximity
all
ippc
rib
|
Debugs Internet Protocol.
Debugs Border Gateway Protocol.
Debugs OSPF events.
Proximity debug commands.
All Proximity debugging information.
Proximity IPPC debugs.
Debugs IP routing table events.
|
isis
adjacency
all
csnp
dis
esis
event
hello
lsp
mpls
psnp
spf
timer
|
Debugs IS-IS Routing for IP.
Debugs IS-IS adjacency information.
Debugs all IS-IS debugging.
Debugs IS-IS Complete Sequence Number PDU (CSNP) information.
Debugs IS-IS DIS election information.
Debugs IS-IS ESIS information.
Debugs IS-IS event information.
Debugs IS-IS hello information.
Debugs IS-IS timer LSP information.
Debugs IS-IS MPLS information.
Debugs IS-IS PSNP information.
Debugs IS-IS SPF information.
Debugs IS-IS timer information.
|
logging
all
|
Debugs logging.
Debugs all logging functions.
|
malloc
cache-app
all
caller-accounting
catch-double-free
check-boundaries
check-free-chunks
clear-on-alloc
statistics
dns-server
all
caller-accounting
catch-double-free
check-boundaries
icap
caller-accounting
catch-double-free
check-boundaries
log-directory
word
|
Debug commands for memory allocation.
Debugging commands for cache application memory allocation.
Sets the debug level to all.
Collects statistics for every distinct allocation call-stack.
Alerts if application attempts to release the same memory twice.
Checks boundary over and under run scribble.
Checks if free chunks are over-written after release.
Ensures all allocations are zero-cleared.
Allocator use statistical summary.
DNS Caching Service memory allocation debugging.
Sets the debug level to all.
Collects statistics for every distinct allocation call-stack.
Alerts if application attempts to release the same memory twice.
Checks boundary over and under run scribble.
ICAP Service memory allocation debugging.
Collects statistics for every distinct allocation call-stack.
Alerts if application attempts to release the same memory twice.
Checks boundary over and under run scribble.
Memory allocation debugging log directory.
Directory path name.
|
movie-streamer
error
trace
|
Debug commands for the Movie Streamer.
Sets the debug level to error.
Sets the debug level to trace.
|
ntp
|
Debugs NTP.
|
qos
policy service
error
trace
|
Debug commands for the QoS component.
Debug commands for the policy service.
Sets the debug level to error.
Sets the debug level to trace.
|
rbcp
|
Debugs the RBCP (Router Blade Configuration Protocol) functions.
|
rpc
detail
trace
|
Displays the remote procedure call (RPC) logs.
Displays the RPC logs of priority detail level or higher.
Displays the RPC logs of priority trace level or higher.
|
rtsp
gateway
error
trace
|
Debugs the RTSP functions.
Debugs the RTSP gateway.
Debugs the RTSP gateway to level 1 (show error).
Debugs the RTSP gateway to level 2 (show error and trace).
|
rule
action
all
pattern
|
Debugs the Rules Template.
Debugs the rule action.
Debugs all rule functions.
Debugs the rule pattern.
|
service-router
servicemonitor
|
Debug commands for the Service Router.
Debug commands for the service monitor.
|
session-manager
critical
error
trace
|
Session manager debug commands.
Sets the debug level to critical.
Sets the debug level to error.
Sets the debug level to trace.
|
snmp
agent
all
cli
main
mib
traps
|
Debugs SNMP.
SNMP agent debug.
Debugs all SNMP functions.
Debugs the SNMP CLI.
Debugs the SNMP main.
Debugs the SNMP MIB.
Debugs the SNMP traps.
|
srp
all
api
configuration
database
error
function
host
internal
ippc
ippc-dump
key
leafset
lock
multicast
neighbor
packet
private
replica
route
session
srhp-packet
startup
sync
|
Debugs the Service Routing Protocols.
Debugs all SRP.
Debugs the SRP API.
Debugs the SRP configuration.
Debugs the SRP database.
Debugs the SRP error.
Debugs the SRP function.
Debugs the SRP host.
Debugs the SRP internal.
Debugs the SRP ippc (inter process command).
Debugs the SRP ippc (pkt) dump.
Debugs the SRP key.
Debugs the SRP leafset.
Debugs the SRP lock.
Debugs the SRP multicast.
Debugs the SRP neighbor.
Debugs the SRP packet.
Debugs the SRP private.
Debugs the SRP replica.
Debugs the SRP route.
Debugs the SRP session.
Debugs the SRP srhp packet.
Debugs the SRP startup.
Debugs the SRP sync.
|
standby
all
|
Debugs standby functions.
(Optional) Debugs all standby functions.
|
stats
all
collection
computation
history
|
Debugs the statistics.
Debugs all statistics functions.
Debugs the statistics collection.
Debugs the statistics computation.
Debugs the statistics history.
|
svc
all
desci
desc
err
ippc
xml
registry
err
if
ippc
svc
ven
|
Debugs the Service Registration Daemon and Descriptor Interpreter.
Debugs all SVCREG and Descriptor Interpreter Library (DESCI).
DESCI debug commands.
Debugs DESCI desc.
DESCI internal error.
Debugs DESCI ippc (inter process comm).
Debugs DESCI xml.
Service Registry Daemon (SVCREG) debug commands.
SVCREG internal error.
Debugs SVCREG interface.
Debugs SVCREG ippc (inter process comm).
Debugs SVCREG svc.
Debugs SVCREG ven.
|
translog
all
archive
export
|
Debugs the transaction logging.
Debugs all transaction logging.
Debugs the transaction log archive.
Debugs the transaction log FTP export.
|
uns
all
error
trace
|
Unified naming service debug commands.
(Optional) Sets the debug level to all.
(Optional) Sets the debug level to error.
(Optional) Sets the debug level to trace.
|
webengine
error
trace
|
WebEngine debug commands.
Sets the debug level to error.
Sets the debug level to trace.
|
wi
|
Debugs the web interface.
|
wmt
error
client-ip cl-ip-address
server-ip sv-ip-address
trace
client-ip cl-ip-address
server-ip sv-ip-address
|
Debugs the WMT component.
Debugs the WMT level 1 functionality. For more information, see the "Using WMT Error Logging" section.
(Optional) Debugs the request from a specific client IP address to level 1 (show error).
(Optional) Debugs the request to a specific server IP address to level 1 (show error).
Debugs the WMT level 2 functionality.
(Optional) Debugs the request from a specific client IP address to level 2 (show error and trace).
(Optional) Debugs the request to a specific server IP address to level 2 (show error and trace).
|
Debugging Keywords
All modules have debug error as the default level if they support the error keyword; however, when you execute the show debug command, the error does not display.
Some modules have two debugging keywords (error and trace), but you cannot enable both at the same time. See the table above to identify commands with only the error and trace keywords.
Some modules have the all keyword through which you can enable both the error and trace keywords at the same time. This results in debug set to everything. See Table 2-2 to identify commands with the all keyword.
Note
When debugging is set to trace level, it uses a lot of the CPU on the SE to handle error log writing. When writing the trace-level error logs reaches 100 percent of the CPU usage, 504 timeout error messages start to occur. Therefore, trace-level error logging should not be enabled in production systems.
Debugging the Authsvr
Table 2-3 shows the authsvr debugging commands and provides the corresponding log and error display information.
Table 2-3 Debug Authsvr Command Chart
Command
|
Debug Log Levels Printed
|
Show Debugging
|
undebug authsvr trace
|
error log
|
—
|
undebug authsvr error
|
error log
|
—
|
undebug all
|
error log
|
—
|
debug all
|
error log
|
Debug Authsvr error is on.
|
no debug all
|
error log
|
—
|
debug authsvr error
|
error log
|
Debug Authsvr error is on.
|
debug authsvr trace
|
trace error log
|
Debug Authsvr trace is on.
|
no debug authsvr trace
|
error log
|
—
|
no debug authsvr error
|
error log
|
—
|
Debugging Cdnfs
You can use the debug cdnfs command to monitor the lookup and serving of prepositioned files. If prepositioned files are available in CDNFS but are not served properly, you can use the debug cdnfs command.
Using WMT Error Logging
Error logs are in the same format and location as syslogs. The WMT log messages are logged to /local1/errorlog/wmt_errorlog.current.
You can configure the SE for WMT error logging by using the debug wmt error command in EXEC configuration mode. This command debugs WMT level 1 functionality.
Logging WMT Client Disconnects
When a WMT client is disconnected abruptly, the reasons for the client disconnect (for example, the request was blocked by the rules, the maximum incoming or outgoing bit-rate limit was reached, the maximum incoming or outgoing bandwidth limit was reached) are logged in Internet Streamer CDS software error logs.
The client information includes the client IP address, the server IP address, the requested URL, the client protocol, the version of the client media player, the number of packets that the client received, and the number of packets that the server sent.
Related Commands
Command
|
Description
|
logging
|
Configures system logging (syslog).
|
show debugging
|
Displays the state of each debugging option.
|
undebug
|
Disables the debugging functions (see also debug).
|
debug ip bgp
To display information relating to the BGP process, use the debug ip bgp command in privileged EXEC configuration mode. To disable the display of BGP information, use the undebug form of this command.
debug ip bgp {A.B.C.D. | all | brib | events | internal | io | keepalives | list | packets | rib | updates}
undebug ip bgp {A.B.C.D. | all | brib | events | internal | io | keepalives | list | packets | rib |
updates}
Syntax Description
A.B.C.D.
|
Displays the BGP neighbor IP address.
|
all
|
Displays all BGP debugging information.
|
brib
|
Displays the BGP BRIB.
|
dampening
|
Displays the BGP dampening.
|
events
|
Displays BGP events.
|
internal
|
Displays BGP internal information.
|
io
|
Displays BGP IO information.
|
keepalives
|
Displays BGP keepalives.
|
list
|
Displays the BGP list.
|
packets
|
Displays the BGP packets.
|
rib
|
Displays the BGP RIB.
|
updates
|
Displays BGP updates.
|
Command Defaults
Debugging of the keepalives is turned on upon the start of the BGP daemon.
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
This command turns on BGP debugging information. When debug ip bgp is turned on, the performance of the Proximity Engine may be impacted slightly.
Examples
The following example shows sample output displayed before and after running the debug ip bgp all command:
ServiceRouter# show debugging ip bgp
Debugs Enabled: Keepalives
ServiceRouter# debug ip bgp all
BGP all information debug is on
ServiceRouter# show debugging ip bgp
Debugs Enabled: Events Internal RIB BRIB Updates Keepalives Packets IO List
When the undebug ip bgp all command is run, the following output is displayed:
ServiceRouter# undebug ip bgp all
BGP all information debug is off
Related Commands
Command
|
Description
|
show debugging ip bgp
|
Displays the debugging flags that have been set for BGP.
|
debug ip ospf
To display information related to OSPF process, use the debug ip ospf command in privileged EXEC configuration mode. To disable the display of OSPF information, use the undebug form of this command.
debug ip ospf {adjacency [detail | terse] | all [detail | terse] | database [detail | terse] |
database-timers | events [detail | terse] | flooding [detail | terse] | hello | lsa-generation
[detail | terse] | packets | retransmission | spf [detail | terse] | spf-trigger [detail]}
undebug ip ospf {adjacency [detail | terse] | all [detail | terse] | database [detail | terse] |
database-timers | events [detail | terse] | flooding [detail | terse] | hello | lsa-generation
[detail | terse] | packets | retransmission | spf [detail | terse] | spf-trigger [detail]}
Syntax Description
adjacency
|
Specifies the adjacency events.
|
detail
|
Displays detailed neighbor events.
|
terse
|
Displays only major events.
|
all
|
All OSPF debugging.
|
database
|
OSPF LSDB1 changes.
|
database-timers
|
OSPF LSDB timers.
|
events
|
OSPF related events.
|
flooding
|
LSAs2 flooding.
|
hello
|
Hello packet and DR elections.
|
lsa-generation
|
Local OSPF LSA generation.
|
packets
|
OSPF packets.
|
retransmission
|
OSPF retransmission events.
|
spf
|
SPF calculation.
|
spf-trigger
|
Show SPF triggers
|
Command Defaults
Display of information related to the OSPF process is disabled.
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
When debug ip ospf is turned on, the performance of the Proximity Engine may be impacted slightly.
Examples
Add the detail or terse keywords to each of the following commands to enable detailed or major events respectively.
The following example shows how to enable neighbor adjacency events:
ServiceRouter# debug ip ospf adjacency
The following example shows how to enable all OSPF debugging:
ServiceRouter# debug ip ospf all
The following example shows how to enable debugging for OSPF LSDB changes:
ServiceRouter# debug ip ospf database
The following example shows how to enable debugging for OSPF LSDB timers:
ServiceRouter# debug ip ospf database-timers
The following example shows how to enable debugging for OSPF-related events:
ServiceRouter# debug ip ospf events
The following example shows how to enable debugging for LSA flooding events:
ServiceRouter# debug ip ospf flooding
The following example shows how to enable debugging for hello packets and DR elections:
ServiceRouter# debug ip ospf hello
The following example shows how to enable debugging for local OSPF LSA generation events:
ServiceRouter# debug ip ospf lsa-generation
The following example shows how to enable debugging for of OSPF packets:
ServiceRouter# debug ip ospf packets
The following example shows how to enable debugging for OSPF retransmission events:
ServiceRouter# debug ip ospf retransmission
The following example shows how to enable debugging for SPF calculations:
ServiceRouter# debug ip ospf spf
The following example shows how to enable debugging for SPF triggers:
ServiceRouter# debug ip ospf spf-trigger
Related Commands
Command
|
Description
|
show debugging ip ospf
|
Displays the state of each debugging option for the OSPF process.
|
debug ip proximity
To debug the transport layer of proximity process in an SR, use the debug ip proximity command in privileged EXEC mode. To disable the display of RIB information, use the no form of this command.
debug ip proximity {all | ippc {connection | execute | message | response | send}}
no debug ip proximity {all | ippc {connection | execute | message | response | send}}
Syntax Description
all
|
Enables all proximity debugging.
|
ippc
|
Enables proximity transport logic.
|
connection
|
enables transport connection debugging.
|
execute
|
enables request execution debugging.
|
message
|
enables message creation debugging.
|
response
|
enables received message debugging.
|
send
|
enables sent message debugging.
|
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
The debug ip proximity command enables debugging of the transport layer of the proximity process in an SR to troubleshoot problems with proximity request and response.
Examples
The following example shows how to :
ServiceRouter# debug ip proximity all
Related Commands
Command
|
Description
|
show debugging ip proximity
|
Displays the debug options that are enabled for the proximity process.
|
debug ip rib
To display RIB information, use the debug ip rib command in privileged EXEC mode. To disable the display of RIB information, use the no form of this command.
debug ip rib [add-route | all | delete-route | detail | mod-route | proximity | rnh | summary]
no debug ip rib [add-route | all | delete-route | detail | mod-route | proximity | rnh | summary]
Syntax Description
add-route
|
Adds route events.
|
all
|
Displays all IP routing table events.
|
delete-route
|
Deletes route events.
|
detail
|
Enables detailed debugging for IP routing.
|
mod-route
|
Modifies route events.
|
proximity
|
Turns on proximity debugging information.
|
rnh
|
Turns on recursive next hop events.
|
summary
|
Displays a one-line summary of URIB I/O events.
|
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
This command is used to display debug information related to the routing information base (RIB).
Examples
The following example shows how to display the RIB information:
ServiceRouter# debug ip rib
The following example shows how to add routes:
ServiceRouter# debug ip rib add-route
The following example shows how to turn on all IP routing table events:
ServiceRouter# debug ip rib all
The following example shows how to remove routes:
ServiceRouter# debug ip rib delete-route
The following example shows how to enable detailed debugging for IP routing:
ServiceRouter# debug ip rib detail
The following example shows how to modify IP routing events:
ServiceRouter# debug ip rib mod-route
The following example shows how to turn on proximity debugging information:
ServiceRouter# debug ip rib proximity
URIB proximity routing information debug is on
The following example shows how to enable recursive next hop events:
ServiceRouter# debug ip rib rnh
The following example shows how to display a one-line summary or URIB I/O events:
ServiceRouter# debug ip rib summary
Related Commands
Command
|
Description
|
show debugging ip rib
|
Displays the debug options that are enabled for the RIB process.
|
debug isis
To display information related to IS-IS process, use the debug isis command in privileged EXEC configuration mode. To disable the display of IS-IS information, use the undebug form of this command.
debug isis [adjacency | all | csnp | dis | esis | event | hello | lsp | mpls | psnp | route-map | spf |
timer]
undebug isis [adjacency | all | csnp | dis | esis | event | hello | lsp | mpls | psnp | route-map | spf |
timer]
Syntax Description
adjacency
|
Displays IS adjacency information.
|
all
|
Displays all IS-IS debugging information.
|
csnp
|
Displays IS-IS CSNP information.
|
dis
|
Displays IS-IS DIS election information.
|
esis
|
Displays IS-IS ESIS information.
|
event
|
Displays IS-IS event information.
|
hello
|
Displays IS-IS hello information.
|
lsp
|
Displays IS-IS LSP information.
|
mpls
|
Displays IS-IS MPLS information.
|
psnp
|
Displays IS-IS PSNP information.
|
route-map
|
Displays IS-IS route-map policy information.
|
spf
|
Displays IS-IS SPF information.
|
timer
|
Displays IS-IS timer information.
|
Command Defaults
Display of debugging information is disabled.
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
When debug isis is turned on, the performance of the Proximity Engine may be impacted slightly.
Examples
The following example shows how to turn on the debug information for the interaction between IS-IS and the RPM API library:
ServiceRouter# debug isis route-map
Related Commands
Command
|
Description
|
show debugging isis
|
Displays the debug options that are enabled for the IS-IS process.
|
debug srp
To turn on SRP debugging information, use the debug srp command in Privileged EXEC configuration mode. To turn off the debugging information, use the no form of this command.
debug srp option
no debug srp option
Syntax Description
option
|
Specifies the category of SRP debugging information to turn on. See Table 2-4 for a list of option values.
|
Command Defaults
None
Command Modes
Privileged EXEC configuration mode.
Usage Guidelines
This command turns on SRP debugging information logging either in the trace file or log file.
The log file for SRP is /local/local1/errorlog/srp_log.current. The option argument to the debug srp command specifies a keyword indicating the category of SRP debugging information logging to turn on. Table 2-4 lists the values that can be specified in the option argument.
Each debugging information message includes a tag that indicates the debugging category. For example, the SRP API debug messages include the tag SRP_DEBUG_API. Table 2-4 lists the tags that are used for each category of debugging information.
To turn off SRP debugging information, use the undebug srp command in privileged EXEC configuration mode.
Table 2-4 debug SRP Options
Option
|
Tag
|
Description
|
all
|
not applicable
|
Turns on all categories of SRP debugging information.
|
api
|
SRP_DEBUG_API
|
Turns on SRP API debugging information.
|
configuration
|
SRP_DEBUG_CONFIG
|
Turns on SRP configuration debugging information.
|
database
|
SRP_DEBUG_DATABASE
|
Turns on SRP database debugging information.
|
error
|
SRP_DEBUG_ERROR
|
Turns on SRP error debugging information. Usually, thread creation errors, no memory, key not found, and so forth are reported by this log information.
|
function
|
SRP_DEBUG_FUNC
|
Turns on SRP function debugging information.
|
host
|
SRP_DEBUG_HOST
|
Turns on SRP host debugging information.
|
internal
|
SRP_DEBUG_INT_DUMP
|
Turns on SRP internal debugging information.
|
ippc
|
SRP_DEBUG_IPPC
|
Turns on SRP inter-process procedure (IPPC) call debugging information.
|
ippc-dump
|
SRP_DEBUG_IPPC_DUMP
|
Turns on SRP complete IPPC packet debugging information.
|
key
|
SRP_DEBUG_KEY
|
Turns on SRP key-related debugging information.
|
leafset
|
SRP_DEBUG_LEAFSET
|
Turns on SRP leafset debugging information.
|
lock
|
SRP_DEBUG_LOCK
|
Turns on SRP lock and unlock debugging information.
|
multicast
|
SRP_DEBUG_MCAST
|
Turns on SRP multicast debugging information.
|
neighbor
|
SRP_DEBUG_NEIGHBOR
|
Turns on SRP neighbor debugging information.
|
packet
|
SRP_DEBUG_PACKET
|
Turns on SRP packet debugging information (for example, packet type, key, and so forth).
|
private
|
SRP_DEBUG_PRIVATE
|
Turns on SRP debugging information related to private variables and operations.
|
replica
|
SRP_DEBUG_REPLICA
|
Turns on SRP replica debugging information.
|
route
|
SRP_DEBUG_ROUTE
|
Turns on SRP route debugging information.
|
session
|
SRP_DEBUG_SESSION
|
Turns on SRP session debugging information.
|
srhp-packet
|
SRP_DEBUG_SRHP_PACKET
|
Turns on SRP service routing host packet (SRHP) debugging information.
|
startup
|
SRP_DEBUG_STARTUP
|
Turns on SRP startup debugging information.
|
sync
|
SRP_DEBUG_SYNC
|
Turns on SRP debugging information related to synchronization among peers.
|
Examples
The following example shows how to use the debug srp command to turn on SRP host and neighbor debugging information logging:
ServiceRouter# debug srp host
ServiceRouter# debug srp neighbor
Related Commands
Command
|
Description
|
show debugging srp
|
Displays the debug flags that are turned on for the SRP.
|
undebug srp
|
Turns off SRP debugging information.
|
delfile
To delete a file, use the delfile command in EXEC configuration mode.
delfile filename
Syntax Description
filename
|
Name of the file to delete.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Use this command to remove a file from a sysfs partition.
Examples
The following example shows how to delete a file:
ServiceEngine# delfile /local1/tempfile
Related Commands
Command
|
Description
|
cpfile
|
Copies a file.
|
deltree
|
Deletes a directory and its subdirectories.
|
mkdir
|
Creates a directory.
|
mkfile
|
Creates a file (for testing).
|
rmdir
|
Removes a directory.
|
deltree
To remove a directory with its subdirectories and files, use the deltree command in EXEC configuration mode.
deltree directory
Syntax Description
directory
|
Name of the directory tree to delete.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Use this command to remove a directory and all files within the directory from the SE sysfs file system. Do not remove files or directories required for proper SE functioning.
Examples
The following example shows how to delete a directory from the /local1 directory:
ServiceEngine# deltree /local1/testdir
Related Commands
Command
|
Description
|
delfile
|
Deletes a file.
|
mkdir
|
Creates a directory.
|
mkfile
|
Creates a file (for testing).
|
rmdir
|
Removes a directory.
|
device
To configure the mode of operation on a device as a CDSM, SE or SR, use the device command in Global configuration mode. To reset the mode of operation on a device, use the no form of this command.
device mode {content-delivery-system-manager | service-engine | service-router}
no device mode {content-delivery-system-manager | service-engine | service-router}
Syntax Description
mode
|
Sets the mode of operation of a device to CDSM, SE or SR.
|
content-delivery-system- manager
|
Configures the device operation mode as a CDSM.
|
service-engine
|
Configures the device operation mode as an SE.
|
service-router
|
Configures the device operation mode as an SR.
|
Command Defaults
The default device operation mode is SE.
Command Modes
Global configuration (config) mode.
Usage Guidelines
A CDSM is the content management and device management station of an CDS network that allows you to specify what content is to be distributed, and where the content should be distributed. If an SR is deployed in the CDS network, the SR redirects the client based on redirecting policy. An SE is the device that serves content to the clients. There are typically many SEs deployed in an CDS network, each serving a local set of clients. IP/TV brings movie-quality video over enterprise networks to the desktop of the CDS network user.
Because different device modes require disk space to be used in different ways, disk space must also be configured when the device mode changes from being an SE or SR to CDSM (or the other way around). You must reboot the device before the configuration changes to the device mode take effect.
Disks must be configured before device configuration is changed. Use the disk configure command to configure the disk before reconfiguring the device to the SE or SR mode. Disk configuration changes using the disk configure command takes effect after the next device reboot.
To enable CDS network-related applications and services, use the cms enable command. Use the no form of this command to disable the CDS network.
All CDS devices ship from the factory as SEs. Before configuring network settings for CDSMs and SRs using the CLI, change the device from an SE to the proper device mode.
Configuring the device mode is not a supported option on all hardware models. However, you can configure some hardware models to operate as any one of the four content networking device types. Devices that can be reconfigured using the device mode command are shipped from the factory by default as SEs.
To change the device mode of your SE, you must also configure the disk space allocations, as required by the different device modes, and reboot the device for the new configuration to take effect.
When you change the device mode of an SE to an SR or CDSM, you may need to reconfigure the system file system (sysfs). However, SRs and CDSMs do not require any disk space other than sysfs. When you change the device mode to an SR or a CDSM, disk configuration changes are not required because the device already has some space allotted for sysfs. sysfs disk space is always preconfigured on a factory-fresh CDS network device.
If you are changing the device mode of an SR or a CDSM back to an SE, configure disk space allocations for the caching, pre-positioning (CDNFS) and system use (sysfs) file systems that are used on the SE. You can configure disk space allocations either before or after you change the device mode to an SE.
Examples
The following examples show the configuration from the default mode, SE, to the CDSM, SR, and SE modes:
ServiceEngine(config)# device mode content-delivery-system-manager
CDSM(config)# device mode service-router
ServiceRouter(config)# device mode service-engine
Related Commands
Command
|
Description
|
show device-mode
|
Displays the configured or current mode of a CDSM, SE, or SR device.
|
dir
To view a long list of files in a directory, use the dir command in EXEC configuration mode.
dir [directory]
Syntax Description
directory
|
(Optional) Name of the directory to list.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Use this command to view a detailed list of files contained within the working directory, including names, sizes, and time created. The equivalent command is lls.
Examples
The following example shows how to view a list of files in a directory:
size time of last change name
-------------- ------------------------- -----------
3931934 Tue Sep 19 10:41:32 2000 errlog-cache-20000918-164015
431 Mon Sep 18 16:57:40 2000 ii.cfg
431 Mon Sep 18 17:27:46 2000 ii4.cfg
431 Mon Sep 18 16:54:50 2000 iii.cfg
1453 Tue Sep 19 10:34:03 2000 syslog.txt
1024 Tue Sep 19 10:41:31 2000 <DIR> testdir
Related Commands
Command
|
Description
|
lls
|
Displays the files in a long list format.
|
ls
|
Lists the files and subdirectories in a directory.
|
direct-server-return
To enable a VIP for direct server return, use the direct-server-return command in Global configuration mode. To disable direct server return, use the no form of this command.
direct-server-return vip ip_address
no direct-server-return vip ip_address
Syntax Description
vip
|
Specifies the VIP for direct-server-return.
|
ip_address
|
VIP for direct-server-return.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Direct Server Return (DSR) is a method used by load balancer servers in a load balancing configuration. DSR responds directly to the client, bypassing the load balancer in the response path. Table 2-5 shows the Direct Server Return flow.
Table 2-5 Direct Server Return Flow
Step
|
Process
|
Source IP
|
Destination IP
|
Destination MAC
|
Step 1
|
Client to load balancer
|
171.71.50.140
|
170.1.1.45
|
00:30:48:C3:C7:C5
|
Step 2
|
Load balancer to SR
|
171.71.50.140
|
170.1.1.45
|
00:14:5E:83:6E:7E
|
Step 3
|
SR to client
|
170.1.1.45
|
171.71.50.140
|
Default Gateway MAC
|
Note
When issuing the direct-server-return vip command on an SE, the DSR VIP IP address cannot be the same as the Origin Server FQDN (OFQDN).
Examples
The following example shows how to enable direct server return:
ServiceEngine(config)# direct-server-return vip 1.1.1.1
Related Commands
Command
|
Description
|
show direct-server-return
|
Displays the Direct Server Return information.
|
disable
To turn off privileged command in EXEC configuration mode, use the disable command in EXEC configuration mode.
disable
Syntax Description
This command has no arguments or keywords.
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The disable command places you in the user-level EXEC shell. To turn privileged EXEC configuration mode back on, use the enable command.
Examples
The following example shows how to enter the user-level EXEC configuration mode:
Related Commands
Command
|
Description
|
enable
|
Accesses the privileged EXEC commands.
|
disk (EXEC)
To configure disks and allocate disk space for devices that are using the CDS software, use the disk command in EXEC configuration mode.
disk {erase diskname | mark diskname {bad | good} | policy apply | recover-cdnfs-volumes |
recover-system-volumes | repair diskname sector sector_address_in_decimal | unuse
diskname}
Syntax Description
erase
|
Erases drive (DANGEROUS).
|
diskname
|
Name of the disk to be erased (disk00, disk01, and so on).
|
mark
|
Marks a disk drive as good or bad.
|
diskname
|
Name of the disk to be marked (disk01, disk02, and so on).
|
bad
|
Marks the disk drive as bad.
|
good
|
Marks the disk drive as good.
|
policy
|
Applies disk policy management.
|
apply
|
Invokes the disk policy manager for a disk.
|
recover-cdnfs-volumes
|
Erases all CDNFS volumes and reboots.
|
recover-system-volumes
|
Erases all SYSTEM and SYSFS volumes.
|
repair
|
Repairs the drive.
|
diskname
|
Name of the disk to be repaired (disk00, disk01, and so on).
|
sector
|
Repairs an uncorrectable sector.
|
sector_address_in_decimal
|
Name of the sector address in decimal.
|
unuse
|
Stops applications from using a disk drive.
|
diskname
|
Name of the disk to be stopped for application use (disk01, disk02, and so on).
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The disk space in the CDS software is allocated on a per-file system basis, rather than on a per-disk basis.
Note
For details on the Cisco Internet Streamer CDS software disk storage and configuration requirements for SEs, see the Cisco Internet Streamer CDS 3.2 Software Configuration Guide.
The CDNFS amounts are reported by the actual usable amounts of storage for applications. Because of the internal file system overhead of approximately 3 percent, the reported amounts may be smaller than what you configured.
To view disk details, use the show disk details command.
Note
The show disk details command shows the amount of disk space that is allocated to system use. This detail is not shown by using the show disk current command.
To show the space allocation in each individual file system type, use the show statistics cdnfs command.
After upgrading, the disk space allocation remains the same as previously configured.
Remapping of Bad Sectors on Disk Drives
The disk erase command in EXEC configuration mode performs a low-level format of the SCSI or SATA disks. This command erases all the content on the disk.
If a disk drive continues to report a failure after you have used the disk erase command, you must replace the disk drive.
Caution 
Be careful when using the
disk erase command because this command causes all content on the specified disk to be deleted.
Note
SCSI and SATA drives can be reformatted.
Erasing Disk Drives
The disk erase command replaced the disk reformat command. This command erases all the content on the disk. The sequence to erase a disk with the disk erase and then use the disk policy apply commands. If a disk drive continues to report a failure after you have used the disk erase command, you must replace the disk drive.
Caution 
Be careful when using the
disk erase command because this command causes all content on the specified disk to be deleted.
Disk Hot Swapping
A new disk is recognized and the RAID is rebuilt when the device is rebooted. After inserting the new disk, enter the disk policy apply command to force the Internet Streamer CDS software to detect the new disk and rebuild the RAID.
Note
RAID is not supported for generic hardware (UCS servers). These systems have a single un-RAIDed system disk. Any disk replacement requires that the system first be taken off-line.
The disk policy's design, when adding new disks, is to always favor safety. If when a new disk is added, the disk manager detects "degraded" or "bad" system volumes, the new disk is used to repair the system volumes. Thus, the disk manager always strives to have two disks allocated to the system volumes. If when a new disk is added, the system volumes are "normal" or "syncing," the new disk is added to the cdnfs volume.
Note
For the CDE220-2S3i,and the CDE220-2S3, because the system disks are internal drives, if the system disk is "bad," the CDE should be replaced.
Repairing a Disk
The disk repair command re pairs the bad sector, including the proximal sectors. All data on the drive is lost, but the sectors are repaired and available for data storage again. This command provides equivalent functionality as the repair-disk utility. The disk repair command takes approximately three hours to complete per disk; after the repair disk command completes, reboot the SE to ensure all CDS software services are functioning correctly.
Caution 
The device should be offline before running the
disk repair command. Because this command involves complex steps, we recommend you contact Cisco Technical Support before running this command.
The
disk repair command not only repairs the bad sectors, but reformats the entire drive, so all data on the drive is lost. The difference between the
disk repair command and the
disk erase command is that the
disk erase command only re-initializes the file system and does not repair bad sectors.
A minor alarm is set when an LSE is detected. After the sector is repaired with the disk repair command, the alarm is turned off.
Alarm ID Module/Submodule Instance
-------------------- -------------------- -------------------------
1 badsector sysmon disk11
May 19 20:40:38.213 UTC, Equipment Alarm, #000003, 1000:445011
"Device: /dev/sdl, 1 Currently unreadable (pending) sectors"
Stopping Applications from Using a Disk Drive
The disk unuse command in EXEC configuration mode allows you to stop applications from using a specific disk drive (for example, disk01) without having to reboot the device.
Note
When executing the disk unuse command, any applications using the disk will be terminated. Off-line the device before executing this command.
The disk unuse command has the following behavior:
•
Cannot be used with system disk if the state of RAID-1 is not "Normal".
•
Cannot be used with the CDNFS disk, which contains the "/uns-symlink-tree" directory.
•
Can be used with any disk except as in scenario 1 and 2 above.
Examples
The following example shows how to repair the sector 4660 on disk 02:
ServiceEngine# disk repair disk02 sector 4660
Note
A system disk cannot be unused in a non-RAID system (generic/ucs).
The following examples show usage of the disk unuse command and the resultant actions:
ServiceEngine# disk unuse disk00
disk00 has key CDNFS data and can not be unused!
ServiceEngine# disk unuse disk01
This will restart applications currently using disk01
and unmount all partitions on disk01.
Do you want to continue? (Yes/No): yes
[WARNING] CDNFS and RAID SYSTEM partitions detected on disk01
To safely remove a RAID SYSTEM disk, the entire drive must be erased. This
operation has little effect on the RAID-ed SYSTEM volumes, as their data can
be resynced. However, because the drive also contains non-RAID CDNFS
data, it will result in loss of all CDNFS data for this drive!
Unuse disk01, erasing all CDNFS data? (Yes/No): yes
All partitions on disk01 have been erased.
ServiceEngine# disk unuse disk02
This will restart applications currently using disk02
and unmount all partitions on disk02.
Do you want to continue? (Yes/No): yes
The following example shows how to view disk details:
ServiceEngine# show disk details
disk00: Normal (h02 c00 i00 l00 - mptsas) 476940MB(465.8GB)
disk00/01: SYSTEM 5120MB(5.0GB) mounted internally
disk00/02: SYSTEM 2560MB(2.5GB) mounted internally
disk00/04: SYSTEM 1536MB(1.5GB) mounted internally
disk00/05: SYSFS 32767MB(32.0GB) mounted at /local1
disk00/06: CDNFS 434948MB(424.8GB) mounted internally
disk01: Normal (h02 c00 i01 l00 - mptsas) 476940MB(465.8GB)
Unallocated: 476940MB(465.8GB)
disk02: Normal (h02 c00 i02 l00 - mptsas) 476940MB(465.8GB)
disk02/01: CDNFS 476932MB(465.8GB) mounted internally
The following example shows how to display the current disk space configuration:
ServiceEngine# show disk current
The following examples show how to view space allocation in each file system type:
ServiceEngine# show statistics cdnfs
size of physical filesystem: 444740904 KB
space assigned for CDNFS purposes: 444740904 KB
number of CDNFS entries: 40 entries
space reserved for CDNFS entries: 436011947 KB
available space for new entries: 8728957 KB
physical filesystem space in use: 435593864 KB
physical filesystem space free: 9147040 KB
physical filesystem percentage in use: 98 %
size of physical filesystem: 444740904 KB
space assigned for CDNFS purposes: 444740904 KB
number of CDNFS entries: 43 entries
space reserved for CDNFS entries: 436011384 KB
available space for new entries: 8729520 KB
physical filesystem space in use: 435593720 KB
physical filesystem space free: 9147184 KB
physical filesystem percentage in use: 98 %
size of physical filesystem: 488244924 KB
space assigned for CDNFS purposes: 488244924 KB
number of CDNFS entries: 48 entries
space reserved for CDNFS entries: 479612533 KB
available space for new entries: 8632391 KB
physical filesystem space in use: 479152708 KB
physical filesystem space free: 9092216 KB
physical filesystem percentage in use: 99 %
The following example shows how to erase all CDNFS volumes and reboot the SE:
ServiceEngine# disk recover-cdnfs-volumes
This will erase all CDNFS volumes.
Any applications using CDNFS, including streaming applications, will be killed and the
system will be rebooted.
Please make sure you have offloaded the SE on the CDSM GUI so the SR is no longer sending
traffic to this SE.
Are you sure you want to proceed? [no] yes Are you really sure you want to proceed to
recover and reload? [yes/no] yes
Stopping all services (this may take several minutes) ...
diskman will now recover CDNFS volumes...
CDNFS recovery complete, rebooting now...
Related Commands
Command
|
Description
|
disk (Global configuration mode)
|
Configures how the disk errors should be handled.
|
show cdnfs
|
Displays the Internet Streamer CDS network file system information.
|
show disk
|
Displays the disk configurations.
|
show disk details
|
Displays more detailed SMART disk monitoring information.
|
show statistics
|
Displays statistics by module.
|
disk (Global configuration)
To configure how disk errors should be handled and to define a disk device error-handling threshold, use the disk command in Global configuration mode. To remove the device error-handling options, use the no form of this command.
disk error-handling {bad-sectors-mon-period minutes | reload | threshold {alarm-bad-sectors
bad-sectors | alarm-remapped-sectors remapped-sectors | bad-sectors bad-sectors | errors
errors}}
no disk error-handling {bad-sectors-mon-period minutes | reload | threshold {alarm-bad-sectors
bad-sectors | alarm-remapped-sectors remapped-sectors | bad-sectors bad-sectors | errors
errors}}
Syntax Description
error-handling
|
Configures disk error handling.
|
bad-sectors-mon- period
|
Active bad sectors monitoring period (minutes).
|
minutes
|
Default value is 1440 minutes (24 hours); 0 disables sector monitoring. The range is from 0 to 525600.
|
reload
|
Whether to reload system if SYSFS disk(s) have problems.
|
threshold
|
Configure disk error handling thresholds.
|
alarm-bad-sectors
|
Configures the bad sector alarm threshold.
|
bad-sectors
|
Number of bad sectors allowed before the disk is marked as bad. The range is from 0 to 100. The default value is 15. The value 0 means that the disk should never be marked as bad.
|
alarm-remapped- sectors
|
Configure SMARTinfo remapped sectors alarm threshold (hard drives only).
|
remapped-sectors
|
Number of remapped sectors before alarm is triggered. Default value is 128 (hard drives only). The range is from 0 to 8192.
|
bad-sectors
|
Configure number of allowed (Active) bad sectors before disk is marked bad.
Note Only applies to bad sectors detected since system boot.
|
bad-sectors
|
Number of bad sectors allowed before disk is marked bad. Default value is 30; 0 means the disk is never mark bad. The range is from 0 to 100.
|
errors
|
Configure number of allowed disk errors before marking disk bad.
Note Only applies to disk or sector errors detected since system boot.
|
errors
|
The number of disk errors allowed before the disk is marked bad. Default value is 500; 0 means never mark disk bad. The range is from 0-100000.
|
Command Defaults
Bad sector minutes: 1440
Bad sectors alarm: 15
Remapped sectors: 128
Disk bad sectors: 30
Errors: 500
Command Modes
Global configuration (config) mode.
Usage Guidelines
To operate properly, the SE must have critical disk drives. A critical disk drive is the first disk drive that also contains the first sysfs (system file system) partition. It is referred to as disk00. Disk00 is not guaranteed to be the system drive or the 'key' CDNFS drive. For example, the system drives on a 2S6 are internal (disk24 and disk25), and the 'key' CDNSF disk is typically disk00, although it can move to other disks as a result of a missing or bad disk00.
The sysfs partition is used to store log files, including transaction logs, system logs (syslogs), and internal debugging logs. It can also be used to store image files and configuration files on an SE.
Note
A critical drive is a disk drive that is either disk00 or a disk drive that contains the first sysfs partition. Smaller single disk drive SEs have only one critical disk drive. Higher-end SEs that have more than one disk drive may have more than one critical disk drive.
When an SE is booted and a critical disk drive is not detected at system startup time, the CDS system on the SE runs at a degraded state. On a generic UCS system the boot partition resides on the system disk (single disk, no RAID). In the event that this disk dies, the system is unbootable. If one of the critical disk drives goes bad at run time, the CDS system applications can malfunction, hang, or crash, or the CDS system can hang or crash. Monitor the critical disk drives on an SE and report any disk drive errors to Cisco TAC.
In a RAIDed system, if a single system disk fails, the system handles the failure seamlessly (apart from any would be CDNFS partitions). If the 'key' CDNFS disk, typically the lowest numbered disk containing CDNFS, fails the system enters an bad state and must be rebooted. In a non-RAID system, if the system disk fails, the system is no longer boots.
With an CDS system, a disk device error is defined as any of the following events:
•
Small Computer Systems Interface (SCSI) or Integrated Drive Electronics (IDE) device error is printed by a Linux kernel.
•
Disk device access by an application (for example, an open(2), read(2), or write(2) system call) fails with an EIO error code.
•
Disk device that existed at startup time is not accessible at run time.
The disk status is recorded in flash (nonvolatile storage). When an error on an SE disk device occurs, a message is written to the system log (syslog) if the sysfs partition is still intact, and an SNMP trap is generated if SNMP is configured on the SE.
In addition to tracking the state of critical disk drives, you can define a disk device error-handling threshold on the SE. If the number of disk device errors reaches the specified threshold, the corresponding disk device is automatically marked as bad.
If the specified threshold is exceeded, the SE either records this event or reboots. If the automatic reload feature is enabled and this threshold is exceeded, then the CDS system automatically reboots the SE. For more information about specifying this threshold, see the "Specifying the Disk Error-Handling Threshold" section.
You can remap bad (but unused) sectors on a SCSI drive and SATA drives using the disk repair command.
Disk Latent Sector Error Handling
Latent Sector Errors (LSE) are when a particular disk sector cannot be read from or written to, or when there is an uncorrectable ECC error. Any data previously stored in the sector is lost. There is also a high probability that sectors in close proximity to the known bad sector have as yet undetected errors, and therefore are included in the repair process.
The syslog file shows the following disk I/O error message and smartd error message when there are disk sector errors:
Apr 28 21:00:26 U11-CDE220-2 kernel: %SE-SYS-4-900000: end_request: I/O error, dev sdd, sector 4660
Apr 28 21:00:26 U11-CDE220-2 kernel: %SE-SYS-3-900000: Buffer I/O error on device sdd, logical block 582
Apr 28 21:04:54 U11-CDE220-2 smartd[7396]: %SE-UNKNOWN-6-899999: Device: /dev/sdd, SMART Prefailure Attribute: 1 Raw_Read_Error_Rate changed from 75 to 73
Apr 28 21:04:54 U11-CDE220-2 smartd[7396]: %SE-UNKNOWN-6-899999: Device: /dev/sdd, SMART Usage Attribute: 187 Reported_Uncorrect changed from 99 to 97
Apr 28 21:04:54 U11-CDE220-2 smartd[7396]: %SE-UNKNOWN-2-899999: Device: /dev/sdd, ATA error count increased from 1 to 3
Specifying the Disk Error-Handling Threshold
You can configure a disk error-handling threshold to determine how many disk errors or bad sectors can be detected before the disk drive is automatically marked as bad.
The disk error-handling threshold bad-sectors command determines how many bad sectors can be detected before the disk drive is automatically marked as bad. By default, this threshold is set to 15. To change the default threshold, use the disk error-handling threshold bad-sectors command. Specify 0 if you never want the disk drive to be marked as bad.
If the bad disk drive is a critical disk drive, and the automatic reload feature (disk error-handling reload command) is enabled, then the Internet Streamer CDS software marks the disk drive as bad and the SE is automatically reloaded. After the SE is reloaded, a syslog message and an SNMP trap are generated.
The disk error-handling threshold errors command determines how many disk errors can be detected before the disk drive is automatically marked as bad. By default, this threshold is set to 500. To change the default threshold, use the disk error-handling threshold errors command. Specify 0 if you never want the disk drive to be marked as bad.
By default, the automatic reload feature is disabled on an SE. To enable the automatic reload feature, use the disk error-handling reload command. After enabling the automatic reload feature, use the no disk error-handling reload command to disable it.
Examples
The following example shows that five disk drive errors for a particular disk drive (for example, disk00) are allowed before the disk drive is automatically marked as bad:
ServiceEngine(config)#
disk error-handling threshold errors 5
Related Commands
Command
|
Description
|
disk (EXEC mode)
|
Allocates the disks among the CDNFS and sysfs file systems.
|
show disk
|
Displays the disk configurations.
|
show disk details
|
Displays currently effective configurations with more details.
|
distribution
To reschedule and refresh content redistribution for a specified delivery service ID or name, use the distribution command in EXEC configuration mode.
distribution {failover {delivery-service-id delivery_service_num | delivery-service-name
delivery_service_name} [force] | fallback {delivery-service-id delivery_service_num |
delivery-service-name delivery_service_name} | multicast {resend {all [on-demand-only]|
delivery-service-id delivery_service_num [object url | on-demand-only]|
delivery-service-name delivery_service_name [object url | on-demand-only] |
send-nack-now | stop {all | delivery-service-id delivery_service_num [object url] |
delivery-service-name delivery_service_name [object url]} | primary-ip-fallback
{forwarder-id forwarder_num | forwarder-name forwarder_name} | refresh {meta-data
delivery-service-id delivery_service_num | object object_url}}
Syntax Description
failover
|
Triggers the root or forwarder SE to fail over and make this SE the temporary Content Acquirer.
|
delivery-service-id
|
Specifies the delivery service ID to be used.
|
delivery_service_num
|
Delivery service number. The range is from 0 to 4294967295.
|
delivery-service-name
|
Specifies the delivery service name descriptor to be used.
|
name
|
Delivery service name.
|
force
|
(Optional) Forces a failover regardless of whether the root or forwarder SE is active.
|
fallback
|
Forces the temporary Content Acquirer to become a receiver SE.
|
multicast
|
Resends or stops multicast distribution.
|
resend
|
Resends multicast distribution delivery service.
|
all
|
Stops multicast distribution for all delivery services.
|
on-demand-only
|
(Optional) Triggers a resend only on demand of content NAK for the delivery service.
|
object
|
(Optional) Specifies the URL of object to be stopped.
|
url
|
Object URL.
|
send-nack-now
|
Generates a NACK for uncompleted objects and sends it to the multicast sender immediately.
|
stop
|
Stops multicast distribution delivery service.
|
primary-ip-fallback
|
Triggers the downstream receiver SEs to contact a forwarder using the forwarder's primary IP address. For more information, see the "distribution primary-ip-fallback Command" section.
|
forwarder-id
|
Specifies the forwarder SE ID that is contacted by the receiver SE.
|
forwarder_num
|
Forwarder SE ID.
|
forwarder-name
|
Specifies the name of the forwarder SE that is contacted by the receiver SE.
|
name
|
Forwarder SE name.
|
refresh
|
Forces the redistribution of content to be refreshed on every SE.
|
meta-data
|
Forces the redistribution of metadata to be refreshed on every SE.
|
delivery-service-id
|
Specifies the delivery service ID to be used in the distribution.
|
delivery_service_num
|
Delivery service number. The range is from 0 to 4294967295.
|
object
|
Forces the distribution of objects to be refreshed on every SE.
|
object_url
|
Specifies the object URL that needs to be refreshed on every SE.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Note
This command is only available on Cisco Internet Streamer CDS Release 3.1.1.
When the Content Acquirer fails, use the distribution failover command in EXEC configuration mode on an SE that is going to be the temporary Content Acquirer to trigger an immediate failover to the temporary Content Acquirer if you do not want to wait for the automatic failover process to occur. When you enter this command, the current SE becomes the temporary Content Acquirer if its forwarder is an inactive Content Acquirer. If the Content Acquirer has not failed, a failover to the temporary Content Acquirer does not occur if you use the distribution failover command in EXEC configuration mode. Use the distribution failover force command to force a failover even if the Content Acquirer is active.
Use the distribution fallback command on an SE that is currently the temporary Content Acquirer to cause it to become a receiver SE.
Use the distribution refresh meta-data {delivery-service-id delivery_service_num} command to request that the metadata receiver repeat a previous request for all the content metadata for the specified delivery service from its forwarder SE. This method allows you to start over if the metadata receiver fails to replicate some metadata properly. The content metadata (machine-readable information that describes the characteristics of the content) must be distributed to a receiver first before the content can be replicated. The content metadata helps to define what content to retrieve, how content is retrieved, how recently the content has been updated, how the content is to be prepositioned (for example, expiration time), and so forth. The metadata is always distributed using unicast. The content can also be replicated using unicast.
Use the distribution refresh object object_url command to reissue a request for unicast distribution of the specified object. This command lets you obtain a new copy of an object if there is a corrupted copy on the SE. After you enter this command, if the distribution is unicast, the unicast receiver reissues the request to its forwarder SE. The old content on the SE is removed and a new copy is replicated.
NACK Interval Multiplier
To identify missing content and trigger a resend of a file, receiver SEs send a negative acknowledgement (NACK) message to the sender SE. NACK messages generated by many receiver SEs could generate more traffic than the sender can handle. You can adjust the average interval between NACKs by configuring a NACK interval multiplier for an individual receiver SE. This value (an integer between 0.1 to 10) adjusts the default average NACK interval (the default is 20 minutes) by the value configured as the interval multiplier. For example, if you set the NACK interval multiplier to 3, the interval between NACKs becomes 20 minutes x 3, or 60 minutes. This adjustment can be made as needed by choosing Devices > Devices > Prepositioning > Distribution in the CDSM GUI.
distribution primary-ip-fallback Command
When downstream receiver SEs at the edge of the network try to access a forwarder SE that is inside a NAT firewall, those receiver SEs that are inside the same NAT use one IP address (called the inside local IP address) to access the forwarder, but other receiver SEs that are outside the NAT need to use a different forwarder's IP address (called the inside global IP address or NAT address) to access the forwarder. A forwarder SE registers the IP address configured on its primary interface with the CDSM, and the CDSM uses the primary IP address for communication with devices in the CDS network. If the registered primary IP address is the inside local IP address and the forwarder is behind a NAT firewall, a receiver that is not inside the same NAT as the forwarder cannot contact it without special configuration. All other receivers inside the NAT use the inside local IP address to contact the forwarder that resides inside the NAT.
Cisco Internet Streamer CDS supports NAT for unicast distribution (see the "NAT Firewall" section for more information). When the receiver SE polls its forwarder from an upstream location for the content metadata or content, the receiver first connects to the forwarder using the forwarder's primary IP address. If it fails and the NAT address of the forwarder has been configured, then the unicast receiver tries to poll the forwarder using the forwarder's NAT address. If the receiver polls the forwarder successfully using the NAT address, the receiver continues to use the forwarder's NAT address during the subsequent polling intervals with the same forwarder. The unicast receiver retries to connect to the forwarder using the forwarder's primary IP address only after one hour. Even if the unicast receiver is able to poll the forwarder using the forwarder's primary IP address, it would take one hour for the receiver to fall back to the forwarder's primary IP address automatically. You can use the distribution primary-ip-fallback command to enable the receiver that is using the NAT address of the forwarder to fall back to the primary IP address immediately, if you are certain that the forwarder's primary IP address is working.
NAT Firewall
NAT enables private IP internetworks that use nonregistered IP addresses to connect to the Internet. NAT is configured on the firewall at the border of a stub domain (referred to as the inside network) and a public network such as the Internet (referred to as the outside network). NAT translates the internal local addresses to globally unique IP addresses before sending packets to the outside network. You can configure NAT to advertise only one address for the entire network to the outside world. This configuration provides additional security, effectively hiding the entire internal network from the world behind that address. NAT has the dual functionality of security and address conservation and is typically implemented in remote access environments.
In the inside network's domain, hosts have addresses in the one address space. While on the outside, they appear to have addresses in another address space when NAT is configured. The first address space is referred to as the local address space while the second is referred to as the global address space.
Hosts in outside networks can be subject to translation and can have local and global addresses.
NAT uses the following definitions:
•
Inside local address—The IP address that is assigned to a host on the inside network. The address is probably not a legitimate IP address assigned by the Network Information Center (NIC) or service provider.
•
Inside global address—A legitimate IP address (assigned by the NIC or service provider) that represents one or more inside local IP addresses to the outside world.
•
Outside local address—The IP address of an outside host as it appears to the inside network. Not necessarily a legitimate address, it was allocated from an address space routable on the inside.
•
Outside global address—The IP address assigned to a host on the outside network by the host's owner. The address was allocated from a globally routable address or network space.
Multicasting Content
Use the distribution multicast command to resend or stop metadata transfer. It is important to note that content metadata must be distributed to a receiver before the content itself can be replicated via either multicast or unicast. The meta data is sent to receiver only by unicast. Content metadata specifies what content to distribute, how the content will be distributed, how the content has been updated, how the content is to be pre-positioned. A multicast receiver rejects a multicast sender's advertisement of a file if the proper content metadata has not arrived yet.
Multicast transmission happens on an SE if the following conditions are met:
•
The SE is capable of sending multicast.
•
The SE belongs to a multicast-enabled delivery service.
•
The SE has an IP multicast address assigned to that delivery service.
Then, the multicast replicator on the SE multicasts out every file of that delivery service to the assigned addresses.
Related Commands
Command
|
Description
|
clear
|
Clears the HTTP object cache, the hardware interface, statistics, archive working transaction logs, and other settings.
|
show distribution
|
Displays the distribution information for a specified delivery service.
|
show statistics distribution
|
Displays the simplified statistics for content distribution components.
|
dnslookup
To resolve a host or domain name to an IP address, use the dnslookup command in EXEC configuration mode.
dnslookup line
Syntax Description
line
|
Domain name of host on the network.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The dnslookup command accepts IPv6 address. If an IPv6 address is specified in the dnslookup command, the server replies to a query including the IPv6 address and the IPv6 address displays in the output of the and tcpdump and netstat commands and all logs.
Examples
The following examples show that the dnslookup command is used to resolve the hostname myhost to IP address 172.31.69.11, cisco.com to IP address 192.168.219.25, and an IP address used as a hostname to 10.0.11.0:
ServiceEngine# dnslookup myhost
official hostname: myhost.cisco.com
ServiceEngine# dnslookup cisco.com
official hostname: cisco.com
ServiceEngine# dnslookup 10.0.11.0
official hostname: 10.0.11.0
domain
To set the domain ID for the SRP, use the domain SRP configuration command. To remove a domain ID, use the no or default form of the command.
domain [id]
[no | default] domain [id]
Syntax Description
id
|
(Optional) A positive 32-bit integer for the domain.
|
Command Defaults
If the no domain command is used, the domain ID is 0.
Command Modes
SRP configuration (config-srp) mode.
Usage Guidelines
This command is used to set the domain ID for an SRP. All Proximity Engines running SRP routing with the same domain ID form a single network if the nodes are found through a bootstrap node. By changing a Proximity Engine's domain, the Proximity Engine leaves its current network.
The no and default forms of the command replace current domain ID with the default domain ID, which is 0.
Examples
The following example shows how to configure a domain ID with domain.
ServiceRouter# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
ServiceRouter(config)# router srp
ServiceRouter(config-srp)# domain 100
ServiceRouter(config-srp)# end
The following example illustrates how show srp process command displays the configured domain ID.
ServiceRouter# show srp process
Node Id: 2a2db308fd3dc172940a7902a4db7c16c98c3a32e1b048005bce1e832b6d056f
*GigabitEthernet 1/0, GigabitEthernet 2/0, GigabitEthernet 3/0
Related Commands
Command
|
Description
|
bootstrap-node
|
Configures a bootstrap node IP address.
|
router srp
|
Enters SRP configuration mode.
|
show srp process
|
Displays the basic configurations for SRP.
|
enable
To access privileged commands in EXEC configuration modes, use the enable command in EXEC configuration mode.
enable
Syntax Description
This command has no arguments or keywords.
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
To access privileged EXEC configuration mode from EXEC configuration mode, use the enable command. The disable command takes you from privileged EXEC configuration mode to user EXEC configuration mode.
Examples
The following example shows how to access privileged EXEC configuration mode:
Related Commands
Command
|
Description
|
disable
|
Turns off the privileged EXEC commands.
|
exit
|
Exits from interface, Global configuration, or privileged EXEC configuration modes.
|
enable password
To change the enable password, which is used if aaa authentication enable enable is configured, use the enable password command in Global configuration mode.
enable password
Syntax Description
This command has no arguments or keywords.
Command Defaults
None
Command Modes
Global configuration mode.
Usage Guidelines
The enable password changes the enable password, which is used if aaa authentication enable enable is configured.
Examples
The following example shows how to access privileged EXEC configuration mode:
ServiceEngine> enable password
Related Commands
Command
|
Description
|
aaa authentication enable enable
|
Enables authentication.
|
end
To exit Global configuration mode, use the end command in Global configuration mode.
end
Syntax Description
This command has no arguments or keywords.
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Use the end command to exit Global configuration mode after completing any changes to the running configuration. To save new configurations to NVRAM, use the write command.
In addition, you can press Ctrl-Z to exit Global configuration mode.
Examples
The following example shows how to exit Global configuration mode:
ServiceEngine(config)# end
Related Commands
Command
|
Description
|
exit
|
Exits from interface, Global configuration, or privileged EXEC configuration modes.
|
exec-timeout
To configure the length of time that an inactive Telnet or Secure Shell (SSH) session remains open, use the exec-timeout command in Global configuration mode. To revert to the default value, use the no form of this command.
exec-timeout timeout
no exec-timeout
Syntax Description
timeout
|
Timeout in minutes. The range is from 0-44640. The default is 15.
|
Command Defaults
The default is 15 minutes.
Command Modes
Global configuration (config) mode.
Usage Guidelines
A Telnet or SSH session with the SE can remain open and inactive for the interval of time specified by the exec-timeout command. When the exec-timeout interval elapses, the SE automatically closes the Telnet or SSH session.
Configuring a timeout interval of 0 minutes by entering the exec-timeout 0 command is equivalent to disabling the session-timeout feature.
Examples
The following example shows how to configure a timeout of 100 minutes:
ServiceEngine(config)# exec-timeout 100
The following example negates the configured timeout of 100 minutes and reverts to the default value of 15 minutes:
ServiceEngine(config)# no exec-timeout
Related Commands
Command
|
Description
|
sshd
|
Configures the SSH service parameters.
|
telnet enable
|
Enables the Telnet services.
|
exit
To access commands in EXEC configuration mode shell from the global, interface, and debug configuration command shells, use the exit command.
exit
Syntax Description
This command has no arguments or keywords.
Command Defaults
None
Command Modes
EXEC, Global configuration (config), and interface configuration (config-if) modes.
Usage Guidelines
Use the exit command in any configuration mode to return to EXEC configuration mode. Using this command is equivalent to pressing the Ctrl-Z key or entering the end command.
The exit command issued in the user-level EXEC shell terminates the console or Telnet session. You can also use the exit command to exit other configuration modes that are available from the Global configuration mode for managing specific features (see the commands marked with a footnote in Table 2-1).
Examples
The following example shows how to exit the Global configuration mode and return to the privileged-level EXEC configuration mode:
ServiceEngine(config)# exit
The following example shows how to exit the privileged-level EXEC configuration mode and return to the user-level EXEC configuration mode:
Related Commands
Command
|
Description
|
end
|
Exits configuration and privileged EXEC configuration modes.
|
expert-mode password
To set the customer configurable password, use the expert-mode password command in Global configuration mode.
expert-mode password [encrypted] password
Syntax Description
encrypted
|
(Optional) Encrypts the password.
|
password
|
The encrypted password.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
This is a customer configurable password for allowing to enter engineering mode for troubleshooting purposes. The function prompts the user for the current admin password to verify that the user attempting to set the expert-mode password is authorized to do so. If the user is authenticated, the user is prompted twice to enter the new expert-mode password. The new expert-mode password is encrypted prior to being persisted.
Examples
The following example shows how to configure four external NAT IP addresses:
ServiceEngine(config)# expert-mode password encrypted xxxx
New Expert Mode Password: xxxx
Confirm New Expert Mode Password: xxxx
Password successfully changed
external-ip
To configure up to eight external Network Address Translation (NAT) IP addresses, use the external-ip command in Global configuration mode. To remove the NAT IP addresses, use the no form of this command.
external-ip ip_addresses
no external-ip ip_addresses
Syntax Description
ip_addresses
|
A maximum of eight external or NAT IP addresses can be configured.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Use this command to configure up to eight Network Address Translation IP addresses to allow the router to translate up to eight internal addresses to registered unique addresses and translate external registered addresses to addresses that are unique to the private network. If the IP address of the RTSP gateway has not been configured on the SE, then the external IP address is configured as the IP address of the RTSP gateway.
In an CDS network, there are two methods for a device registered with the CDSM (SEs, SRs, or the standby CDSM) to obtain configuration information from the primary CDSM. The primary method is for the device to periodically poll the primary CDSM on port 443 to request a configuration update. You cannot configure this port number. The backup method is when the CDSM pushes configuration updates to a registered device as soon as possible by issuing a notification to the registered device on port 443. This method allows changes to take effect in a timelier manner. You cannot configure this port number even when the backup method is being used. CDS networks do not work reliably if devices registered with the CDSM are unable to poll the CDSM for configuration updates. When a receiver SE requests the content and content metadata from a forwarder SE, it contacts the forwarder SE on port 443.
When a device (SEs at the edge of the network, SRs, and primary or standby CDSMs) is inside a NAT firewall, those devices that are inside the same NAT use one IP address (the inside local IP address) to access the device and those devices that are outside the NAT use a different IP address (the NAT IP address or inside global IP address) to access the device. A centrally managed device advertises only its inside local IP address to the CDSM. All other devices inside the NAT use the inside local IP address to contact the centrally managed device that resides inside the NAT. A device that is not inside the same NAT as the centrally managed device cannot contact it without a special configuration.
If the primary CDSM is inside a NAT, you can allow a device outside the NAT to poll it for getUpdate requests by configuring a static translation (NAT IP address or inside global IP address) for the CDSM's inside local IP address on its NAT, and using this address, rather than the CDSM's inside local IP address in the cdsm ip ip_address command when you register the device to the CDSM. If an SE or SR is inside a NAT and the CDSM is outside the NAT, you can allow the SE or SR to poll for getUpdate requests by configuring a static translation (NAT IP address or inside global IP address) for the SE or SR's inside local address on its NAT.
Note
Static translation establishes a one-to-one mapping between your inside local address and an inside global address. Static translation is useful when a host on the inside must be accessible by a fixed address from the outside.
Examples
The following example shows how to configure four external NAT IP addresses:
ServiceEngine(config)# external-ip 192.168.43.1 192.168.43.2 192.168.43.3 192.168.43.4
find-pattern
To search for a particular pattern in a file, use the find-pattern command in EXEC configuration mode.
find-pattern {binary filename | case {binary filename | count filename | lineno filename | match
filename | nomatch filename | recursive filename} | count filename | lineno filename | match
filename | nomatch filename | recursive filename}
Syntax Description
binary
|
Does not suppress the binary output.
|
filename
|
Filename.
|
case
|
Matches the case-sensitive pattern.
|
count
|
Prints the number of matching lines.
|
lineno
|
Prints the line number with output.
|
match
|
Prints the matching lines.
|
nomatch
|
Prints the nonmatching lines.
|
recursive
|
Searches a directory recursively.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
Use this command to search for a particular regular expression pattern in a file.
Examples
The following example shows how to search a file recursively for a case-sensitive pattern:
ServiceEngine# find-pattern case recursive admin removed_core
-rw------- 1 admin root 95600640 Oct 12 10:27 /local/local1/core_dir/c
-rw------- 1 admin root 97054720 Jan 11 11:31 /local/local1/core_dir/c
ore.cache.5.3.0.b131.cnbuild.14086
-rw------- 1 admin root 96845824 Jan 11 11:32 /local/local1/core_dir/c
ore.cache.5.3.0.b131.cnbuild.14823
-rw------- 1 admin root 101580800 Jan 11 12:01 /local/local1/core_dir/
core.cache.5.3.0.b131.cnbuild.15134
-rw------- 1 admin root 96759808 Jan 11 12:59 /local/local1/core_dir/c
ore.cache.5.3.0.b131.cnbuild.20016
-rw------- 1 admin root 97124352 Jan 11 13:26 /local/local1/core_dir/c
ore.cache.5.3.0.b131.cnbuild.30249
-rw------- 1 admin root 98328576 Jan 11 11:27 /local/local1/core_dir/c
ore.cache.5.3.0.b131.cnbuild.8095
The following example searches a file for a pattern and prints the matching lines:
ServiceEngine# find-pattern match 10 removed_core
Tue Oct 12 10:30:03 UTC 2004
-rw------- 1 admin root 95600640 Oct 12 10:27 /local/local1/core_dir/c
-rw------- 1 admin root 101580800 Jan 11 12:01 /local/local1/core_dir/
core.cache.5.3.0.b131.cnbuild.15134
The following example searches a file for a pattern and prints the number of matching lines:
ServiceEngine# find-pattern count 10 removed_core
Related Commands
Command
|
Description
|
cd
|
Changes the directory.
|
dir
|
Displays the list of files in a directory.
|
lls
|
Displays the files in a long list format.
|
ls
|
Lists the files and subdirectories in a directory.
|
flash-media-streaming
To enable and configure Flash Media Streaming, use the flash-media-streaming command in Global configuration mode. To disable Flash Media Streaming, use the no form of this command.
On the SE:
flash-media-streaming {admin-api [ip {allow ip_address}] | application-virtual-path vod map
mapping string | enable | ignore-query-string enable | max-bandwidth number |
max-sessions number | monitoring enable}}
no flash-media-streaming {admin-api [ip {allow ip address}] | application-virtual-path vod
map mapping_string | enable | ignore-query-string enable | max-bandwidth number |
max-sessions number | monitoring enable}}
On the SR:
flash-media-streaming {application-virtual-path vod map mapping string | enable | monitoring
enable}
no flash-media-streaming {application-virtual-path vod map mapping string | enable |
monitoring enable}
Syntax Description
admin-api
|
Allows accessing admin API from the IP.
|
ip
|
Allows an IP Address.
|
allow
|
Allows an IP Address.
|
ip_address
|
IP Address or hostname (input maximum 32 of partial or full IP address or hostname, such as 10.60, 10.60.1.133, or foo.com).
|
application-virtual- path
|
Configures the virtual-path for applications.
|
vod
|
Configures the virtual-path for VOD applications.
|
map
|
Maps to a directory.
|
mapping_string
|
Mapping string.
|
enable
|
Enables Flash Media Streaming.
|
ignore-query-string
|
Configures Flash Media Streaming to ignore query strings in requests.
|
enable
|
Enables ignoring query string in requests.
|
max-bandwidth
|
Configures max bandwidth for Flash Media Streaming.
|
number
|
Max bandwidth number Kbps. The range is from 1000 to 8000000).
|
max-sessions
|
Configures maximum sessions for Flash Media Streaming.
|
number
|
Maximum sessions number. The range is from 1 to 15000.
|
monitoring
|
Configures Flash Media Streaming monitoring.
|
enable
|
Enables monitoring.
|
Command Defaults
The ignore- query-string is disabled.
Command Modes
Global configuration (config) mode.
Usage Guidelines
Flash Media Streaming needs an application name (vod, live or dvrcast) as part of a client's request. In the case of a VOD application, the origin server should have a first level directory of vod for dynamic ingestion. For example, in a Flash Media Streaming VOD cache miss case, the request from the client should be rtmp://cdnsecure.bbc.co.uk/vod/iplayerstreaming/secure_auth/scifi.flv, and the origin server should have http://cdnsecure.bbc.co.uk/vod/iplayerstreaming/secure_auth/scifi.flv. However, this restricts customer deployments when vod is the only folder name they can use. Therefore, an application-virtual-path vod command is available so customers can map to whichever folder they want on the origin server.
For VOD streams, all RTMP calls in the SWF file must be in the following format:
rtmp://rfqdn/vod/path/foo.flv
In this format, rfqdn is the routing domain name of the Service Router, vod is the required directory, and path is the directory path to the content file that conforms to the standard URL specification.
If you are unable to store the VOD content in the required "vod" directory on your origin server, you can create a VOD virtual path for all RTMP requests. All client requests for RTMPcalls still use the rtmp://rfqdn/vod/path/foo.flv format for VOD streams, but the SE replaces the "vod" directory with the string specified in the flash-media-streaming application-virtual-path vod map command.
Use the flash-media-streaming application-virtual-path vod map <mapping_string> command on each SE participating in a Flash Media Streaming delivery service. The mapping string variable accepts all alpha-numeric characters and the slash (/) character, and can be from 1 to 128 characters. For example, to map the "vod" directory to "media" for the go-tv-stream.com origin server, use the flash-media-streaming application-virtual-path vod map media command. If comedy.flv is the content being requested, the RTMP call in the SWF file would be rtmp://go-tv-stream.com/vod/ comedy.flv. The SE would replace the "vod" directory and request http://go-tv-stream.com/media/ comedy.flv from the upstream SE or origin server. If just the slash (/) character is used to replace the "vod" directory, the SE request would be http://go-tv-stream.com/comedy.flv.
Editing a Wholesale License
The wholesale license feature has four operations from the CLI—adding and removing licenses and enabling and disabling alerts. Users read license details from the documentation and add them to the CLI and CDSM. If a user enters a license incorrectly, the only way to edit it is to delete the license and add the it again.
Ignore Query String
Previously, if an RTMP request had a query string in the URL for VOD, the Web Engine could decide whether or not to cache the content based on the Web Engine configuration. However, if the query string in the RTMP URL included the end user and not the stream name, every request would have a different URL because every user has a different query string. This leads to the same content getting cached multiple times.
The flash-media-streaming ignore-query-string enable command tells Flash Media Streaming to remove the query string before forwarding the request to the Web Engine in the case of VOD, or before forwarding the request to the forwarder SE in the case of live streaming.
If URL signature verification is required, the sign verification is performed before the query string check is invoked. The URL signing and validation, which adds its own query string to the URL, continues to work independently of this enhancement.
When the flash-media-streaming ignore-query-string enable command is entered, for every request in which the query string has been ignored, a message is written to the FMS error log, and the Query String Bypassed counter is incremented in the output of the show statistics flash-media-streaming command. The FMS access log on the edge SE contains the original URL before the query string was removed.
The flash-media-streaming ignore-query-string enable command affects every VOD and live streaming request and is not applicable to proxy-style requests.
Examples
The following example shows how to map a vod folder:
ServiceEngine(config)# flash-media-streaming application-virtual-path vod map media
This means mapping vod folder to media. When client request cache-miss case: rtmp://Tem4.se.cdsfms.com/vod/foo.flv is mapped to rtmp://Temp4.se.cdsfms.com/media/foo.flv
ServiceEngine(config)# flash-media-streaming application-virtual-path vod map /
This means mapping vod folder to /.
When client request cache-miss case: rtmp://Tem4.se.cdsfms.com/vod/abc/foo.flv is mapped to rtmp://Temp4.se.cdsfms.com/abc/foo.flv
When client request cache-miss case: rtmp://Tem4.se.cdsfms.com/vod/bar/foo.flv is mapped to rtmp://Temp4.se.cdsfms.com/bar/foo.flv.
Related Commands
Command
|
Description
|
show flash-media-streaming
|
Displays the Flash Media Streaming information.
|
show statistics flash-media-streaming
|
Displays the statistics for Flash Media Streaming.
|
flooding
To set the flooding threshold for SRP multicast, use the flooding threshold SRP configuration command. To restore the default flooding threshold, use the no or default form of the command.
flooding threshold value
[no | default] flooding threshold value
Syntax Description
threshold
|
Configures the flooding threshold.
|
value
|
A positive integer for the flooding threshold.
|
Command Defaults
If no flooding command is issued, the default threshold is 50.
Command Modes
SRP configuration (config-srp) mode.
Usage Guidelines
This command is used to set the flooding threshold for SRP multicasting.
SRP protocol uses flooding to send multicast messages for a multicast group if the number of subscribers of the group is equal or more than the value specified in flooding. An effective threshold value may improve protocol message overhead. The threshold value depends on the number of nodes in your DHT network. In general, the threshold value should be greater than half and smaller than 3/4 of the total number of DHT nodes in the network.
The no or default forms of the command replace the current flooding threshold value with the default flooding threshold value (50).
Examples
The following example shows how use the flooding command to set a flooding threshold value of 45.
ServiceRouter(config)# router srp
ServiceRouter(config-srp)# flooding threshold 45
ServiceRouter(config-srp)# end
Related Commands
Command
|
Description
|
router srp
|
Enters SRP configuration mode.
|
geo-location-server
To redirect requests to different Content Delivery Networks based on the geographic location of the client, use the geo-location-server command in Global configuration mode. To cancel the request, use the no form of this command.
geo-location-server {primary ip_address_port_num | secondary ip_address_port_num}
no geo-location-server {primary ip_address_port_num | secondary ip_address_port_num}
Syntax Description
primary
|
Configures the primary geo location server IP address and port.
|
secondary
|
Configure secondary geo location server IP address and port.
|
ip_address
|
IP address of the geo location server.
|
port_num
|
Port number of the geo location server.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Use the geo-location-server command to redirect requests to different CDNs based on the geographic location of the client. You can configure requests from different countries to be redirected to different third party services.
Note
A Quova server is mandatory to support this feature.
Examples
The following example shows how to configure a primary geo-location-server:
ServiceRouter# geo-location-server primary 171.71.51.140 7000
Related Commands
Command
|
Description
|
cdn-select
|
Enables the CDN Selector for third-party service selection.
|
show cdn-select
|
Displays the status of the CDN Selector.
|
show statistics cdn-select
|
Displays the statistics for the CDN Selector.
|
gulp
To capture lossless gigabit packets and write them to disk, use the gulp command in EXEC configuration mode.
gulp line
Syntax Description
line
|
(Optional) Specifies gulp options, enter -h to get help.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The gulp utility captures lossless gigabit packets and writes them to disk, as well as captures packets remotely. The gulp utility has the ability to read directly from the network.
To view the list of options, enter gulp --h.
ServiceEngine# gulp --help
Usage: /ruby/bin/gulp [--help | options]
--help prints this usage summary
supported options include:
-d decapsulate Cisco ERSPAN GRE packets (sets -f value)
-f "..." specify a pcap filter - see manpage and -d
-i eth#|- specify ethernet capture interface or '-' for stdin
-s # specify packet capture "snapshot" length limit
-r # specify ring buffer size in megabytes (1-1024)
-c just buffer stdin to stdout (works with arbitrary data)
-x request exclusive lock (to be the only instance running)
-X run even when locking would forbid it
-v print program version and exit
-Vx...x display packet loss and buffer use - see manpage
-p # specify full/empty polling interval in microseconds
-q suppress buffer full warnings
-z # specify write blocksize (power of 2, default 65536) for long-term capture
-o dir redirect pcap output to a collection of files in dir
-C # limit each pcap file in -o dir to # times the (-r #) size
-W # overwrite pcap files in -o dir rather than start #+1
-B check if select(2) would ever have blocked on write
-Y avoid writes which would block
Table 2-6 lists the gulp options and provides a description of each.
Table 2-6 gulp Options
Option
|
Description
|
-d
|
Decapsulates packets from a Cisco Encapsulated Remote SPAN Port (ERSPAN). Sets the pcap filter expression to "proto gre" and strips off Cisco GRE headers (50 bytes) from the packets captured. (If used with -f option note that arguments are processed left to right).
|
-f
|
Specify a pcap filter expression. This may be useful to select one from many GRE streams if using -d, or if not using -d, because filtering out packets in the kernel is more efficient than passing them first through the gulp utility and then filtering them out.
|
-i eth#
|
Specify the network interface to read from. The default is eth1 or the value of the environment variable $CAP_IFACE, if present. Specifying a hyphen (-) as the interface reads a pcap file from the standard input instead. (If you forget the -d option during a live capture, you can decapsulate offline this way.)
|
-r #
|
Specify a ring buffer size (in megabytes). Values from 1-1024 are permitted. The default is 100. If possible, the ring buffer is locked into RAM.
|
-c
|
Copy and buffer bytes from stdin to stdout—do not read packets from the network and do not assume anything about the format of the data. This may be useful to improve the real-time performance of another application.
|
-s #
|
Specify packet capture snapshot length. By default, complete packets are captured. For efficiency, captured packets can be truncated to a given length during the capture process, which reduces capture overhead and pcap file sizes. (If used with the -d option, it specifies the length after decapsulation.)
|
-x
|
Use file locking to request (by way of exclusive lock) that this is the only instance of the gulp utility running. If other instances are already running, they must be stopped before the gulp utility can start with this option.
|
-X
|
Override an exclusive lock (-x option) and run anyway. An instance of gulp started this way holds a shared lock if no exclusive locks were broken; otherwise, it holds no locks at all (causing a subsequent attempt to get an exclusive lock to succeed).
|
-v
|
Print program version and exit.
|
-V xxxxxxxx
|
If the string of Xs is wide enough (10 or more), it is overwritten twice per second with a brief capture status update consisting of one digit followed by two percentages. The digit is the number of decimal digits in the actual count of lost packets (0 indicates no drops). The two percentages are the current and maximum ring buffer utilization. The updated argument string can be seen with the ps -x option (or equivalent).
If the string of Xs is too short to hold the information above, a more verbose status line is written, twice per second, to standard error instead. The first method is probably more useful to occasionally check on long captures and the second is more convenient while experimenting and setting up a capture.
|
-p #
|
Specify the thread polling interval (in microseconds). The reader and writer threads poll at this interval when the ring buffer is full or empty. Polling (even frequently) on modern hardware consumes immeasurably few resources. The default interval is 1000.
|
-q
|
Suppress warnings about the ring buffer being full. If input is not from a live capture, no data is lost when the ring buffer fills so the warning can be safely suppressed. If stdin is actually a file, warning suppression happens automatically.
|
-z #
|
Specify output write block size. Any power of two between 4096 and 65536. The default is 65536.
|
-o dir
|
Redirects pcap output into a collection of files in the specified directory. Pcap files are named pcap###, where ### starts at 000 and increments. The directory must exist and be writable by the user running the gulp utility.
|
-C #
|
When using the -o option, start a new pcap file when the old one reaches about # times the size of the ring buffer. The default value is 10 and the default ring buffer size is 100MB; so by default, pcap files grow to about 1000 MB before a new one is started. Since some programs read an entire pcap file into memory when using it, splitting the output into chunks can be helpful.
|
-W #
|
Specifies a maximum number of pcap files to create before overwriting them. The default is to never overwrite them. This option allows capturing to occur indefinitely with finite disk space.
|
-B
|
This option enables the code to check before each write whether the write would block. When the gulp utility exits, it announces whether any writes would have been blocked.
|
-Y
|
This option writes which ones would be blocked, but are deferred until they are not blocked.
|
Examples
The following example shows how to get a basic capture on eth1 with a pcap filter:
ServiceEngine# gulp -i eth1 -f "..." > pcapfile
The ellipsis (...) refers to the Berkeley Packet Filter (pcap) expressions, such as "host foo."
The following example shows how to get a capture of the 10 most recent files of a 200 MB ring buffer to 1000 MB files:
ServiceEngine# gulp -i eth1 -r 200 -C 10 -W 10 -o pcapdir
Related Commands
Command
|
Description
|
netmon
|
Displays the transmit and receive activity on an interface.
|
netstatr
|
Displays the rate of change of netstat statistics.
|
ss
|
Dumps socket statistics.
|
tcpmon
|
Searches all TCP connections.
|
help
To obtain online help for the command-line interface, use the help command in EXEC and Global configuration modes.
help
Syntax Description
This command has no arguments or keywords.
Command Defaults
None
Command Modes
EXEC configuration and Global configuration (config) modes.
Usage Guidelines
You can get help at any point in a command by entering a question mark (?). If nothing matches, the help list is empty, and you must back up until entering a ? shows the available options.
Two styles of help are provided:
•
Full help is available when you are ready to enter a command argument (for example, show ?). In addition, full help describes each possible argument.
•
Partial help is provided when you enter an abbreviated command and you want to know what arguments match the input (for example, show stat?).
Examples
The following example shows the output of the help command in EXEC configuration mode:
Help may be requested at any point in a command by entering a question mark '?'. If
nothing matches, the help list will be empty and you must backup until entering a '?'
shows the available options.
Two styles of help are provided:
1. Full help is available when you are ready to enter a command argument (e.g. 'show ?')
and describes each possible argument.
2. Partial help is provided when an abbreviated argument is entered and you want to know
what arguments match the input (e.g. 'show stat?'.)
hostname
To configure the device's network hostname, use the hostname command in Global configuration mode. To reset the hostname to the default setting, use the no form of this command.
hostname name
no hostname
Syntax Description
name
|
New hostname for the device; the name is case sensitive. The name may be from 1 to 30 alphanumeric characters.
|
Command Defaults
The default hostname is the SE model number.
Command Modes
Global configuration (config) mode.
Usage Guidelines
Use this command to configure the hostname for the SE. The hostname is used for the command prompts and default configuration filenames. This name is also used by content routing and conforms to the following rules:
•
It can use only alphanumeric characters and hyphens (-).
•
Maximum length is 30 characters.
•
Following characters are considered invalid and cannot be used when naming a device: @, # , $,%, ^, &, *, (), | , \""/, <>.
Examples
The following example changes the hostname to Sandbox:
ServiceEngine(config)# hostname Sandbox
The following example removes the hostname:
ServiceEngine(config)# no hostname
Related Commands
Command
|
Description
|
dnslookup
|
Resolves a host or domain name to an IP address.
|
ip
|
Configures the IP.
|
show hosts
|
Displays the IP domain name, name servers, IP addresses, and host table.
|
install
To install the Internet Streamer CDS software image, use the install command in EXEC configuration mode.
install imagefile_name
Syntax Description
imagefile_name
|
Name of the .bin file that you want to install.
|
Command Defaults
None
Command Modes
EXEC configuration mode.
Usage Guidelines
The install command loads the system image into flash memory and the disk.
To install a system image, copy the image file to the sysfs directory local1 or local2. Before entering the install command, change the present working directory to the directory where the system image resides. When the install command is executed, the image file is expanded. The expanded files overwrite the existing files in the SE. The newly installed version takes effect after the system image is reloaded.
Note
The install command does not accept .pax files. Files should be of the .bin type (for example, CDS-2.2.1.7-K9.bin). Also, if the release being installed does not require a new system image, then it may not be necessary to write to flash memory. If the newer version has changes that require a new system image to be installed, then the install command may result in a write to flash memory.
Examples
The following example shows how to install a .bin file on the SE:
ServiceEngine# install CDS-2.2.1.7-K9.bin
Related Commands
Command
|
Description
|
copy ftp install
|
Installs an image file from an FTP server onto a local device.
|
copy http install
|
Installs an image file from an HTTP server onto a local device.
|
reload
|
Halts a device and performs a cold restart.
|
interface
To configure a Gigabit Ethernet or port channel interface, use the interface command in Global configuration mode. To disable selected options, restore default values, or enable a shutdown interface, use the no form of this command.
interface {GigabitEthernet slot/port_num [autosense | bandwidth {10 | 100 | 1000} |
channel-group group_interface | description line | full-duplex | half-duplex | ip
{access-group {access_list_num {in | out} | name} | address {ip_address_netmask | range
low_num high_num netmask} | ipv6 {access-group {access_list_num {in | out}|
access_list_name {in | out}} | address {range low_num high_num netmask {prefix |
subnet_mask} | ip_addr/mask} | mtu mtu_size | shutdown | standby num [priority num] |
tx-queue-limit queue_length] | PortChannel num [autosense | bandwidth {10 | 100 | 1000} |
description line | full-duplex | half-duplex | ip line | ipv6 line | lacp | shutdown | standby num
[priority num] | Standby group_number [description line | errors error_num | ip address
{ip_address_netmask | range low_num high_num netmask}| ipv6 address {range low_num
high_num netmask {prefix | subnet_mask} | ip_addr/mask} | shutdown] | TenGigabitEthernet
slot/port_num [autosense | bandwidth {10 | 100 | 1000} channel-group group_interface |
description line | full-duplex | half-duplex | ip {access-group {access_list_num {in | out} |
name} | address {ip_address_netmask | range low_num high_num netmask} | ipv6
{acccess-group {access_list_num {in | out}| access_list_name {in | out}} | address {range
low_num high_num netmask {prefix | subnet_mask} | ip_addr/mask} | mtu mtu_size | shutdown
| standby num [priority num] | tx-queue-limit queue_length]
no interface {GigabitEthernet slot/port_num [autosense | bandwidth {10 | 100 | 1000} |
channel-group group_interface | description line | full-duplex | half-duplex | ip
{access-group {access_list_num {in | out} | name} | address {ip_address_netmask | range
low_num high_num netmask} | ipv6 {access-group {access_list_num {in | out}|
access_list_name {in | out}} | address {range low_num high_num netmask {prefix |
subnet_mask} | ip_addr/mask} | mtu mtu_size | shutdown | standby num [priority num] |
tx-queue-limit queue_length] | PortChannel num [autosense | bandwidth {10 | 100 | 1000} |
description line | full-duplex | half-duplex | ip line | ipv6 line | lacp | shutdown | standby num
[priority num] | Standby group_number [description line | errors error_num | ip address
{ip_address_netmask | range low_num high_num netmask}| ipv6 address {range low_num
high_num netmask {prefix | subnet_mask} | ip_addr/mask} | shutdown] | TenGigabitEthernet
slot/port_num [autosense | bandwidth {10 | 100 | 1000} channel-group group_interface |
description line | full-duplex | half-duplex | ip {access-group {access_list_num {in | out} |
name} | address {ip_address_netmask | range low_num high_num netmask} | ipv6
{acccess-group {access_list_num {in | out}| access_list_name {in | out}} | address {range
low_num high_num netmask {prefix | subnet_mask} | ip_addr/mask} | mtu mtu_size | shutdown
| standby num [priority num] | tx-queue-limit queue_length]
Syntax Description
GigabitEthernet
|
Selects a Gigabit Ethernet interface to configure.
|
slot/port_num
|
Slot and port number for the selected interface. The slot range is from 1 to 14; the port range is from 0 to 0. The slot number and port number are separated with a forward slash character (/).
|
autosense
|
(Optional) Specifies interface autosense.
|
bandwidth
|
(Optional) Configures the interface bandwidth.
|
10
|
Specifies the interface bandwidth as 10 Mbits per second.
|
100
|
Specifies the interface bandwidth as 100 Mbits per second.
|
1000
|
Specifies the interface bandwidth as 1000 Mbits per second.
|
channel-group
|
(Optional) Configures the EtherChannel group.
|
group_interface
|
EtherChannel group to which the interface belongs. The range is 1 to 4.
|
description
|
(Optional) Specifies interface specific description.
|
line
|
Text describing this interface
|
full-duplex
|
(Optional) Specifies full-duplex.
|
half-duplex
|
(Optional) Specifies half-duplex.
|
ip
|
(Optional) Interface Internet Protocol configuration commands.
|
access-group
|
Specifies access control for packets.
|
acccess_list_num
|
IP access list (standard or extended).
|
in
|
Specifies inbound packets.
|
out
|
Specifies outbound packets.
|
name
|
Specifies the access-list name.
|
address
|
Sets the IP address of the interface.
|
ip_address
|
IP address of the interface
|
netmask
|
Netmask of the interface.
|
range
|
IP address range.
|
low_num
|
IP address low range of the interface.
|
high_num
|
IP address low range of the interface.
|
netmask
|
Netmask of the interface.
|
ipv6
|
(Optional) Interface IPv6 configuration commands.
|
access-group
|
Specifies access control for packets.
|
ip_access_list
|
IP access list (standard or extended).
|
in
|
Inbound packets.
|
out
|
Outbound packets.
|
access-list-name
|
Specifies an access list name.
|
address
|
Specifies the IPv6 address of the interface.
|
range
|
Specifies the IPv6 address range.
|
low-num
|
Specifies the IPv6 address low range of the interface.
|
high-num
|
Specifies the IPv6 address high range of the interface.
|
prefix
|
Interface prefix. The range is from 1 to 128.
|
ip_addr/netmask
|
IPv6 address/netmask of the interface in format X:X:X:X::X/<0-128>.
|
mtu
|
Sets the interface Maximum Transmission Unit (MTU).
|
mtu_size
|
MTU size in bytes. The range is 576 to 9216.
|
shutdown
|
(Optional) Shuts down the specific portchannel interface.
|
standby
|
(Optional) Standby interface configuration commands.
|
interface_group_num
|
Group number for the selected interface. The range is from 1 to 4.
|
priority
|
Sets the priority of the interface. Default value is 100.
|
standby_group_priority
|
Set the priority of the interface for the standby group. The range is from 0 to 4294967295.
|
tx-queue-limit
|
Sets the interface maximum Transmission Queue Length.
|
queue_length
|
Sets the limit on the transmission queue length. The range is from 1000 to 80000.
|
PortChannel
|
Selects the Ethernet Channel of interfaces to be configured.
|
num
|
Sets the Ethernet Channel interface number. The range is from 1 to 4.
|
lacp
|
Specifies Link Aggregation Control Protocol.
|
Standby
|
Specifies a standby group number.
|
standby_group_num
|
Standby group number. The range is from 1 to 4.
|
description
|
(Optional) Standby interface description.
|
line
|
Text describing this interface.
|
errors
|
Sets the maximum number of errors allowed on this interface.
|
error_num
|
Maximum number of errors allowed on this interface for the standby group. The range is from 1 to 2147483647.
|
ip
|
Sets the IP address of the standby group.
|
address
|
Sets the IP address of the interface.
|
standby_group_ip_addr
|
IP address of the standby group.
|
standby_group_ netmask
|
Netmask of the standby group.
|
range
|
Sets the IP address range of the standby group.
|
low_range
|
IP address low range of an interface.
|
high_range
|
IP address high range of an interface.
|
interface_netmask
|
Netmask of the interface.
|
TenGigabitEthernet
|
Selects a ten Gigabit Ethernet interface to configure.
|
Command Defaults
Standby priority: 100.
Command Modes
Global configuration (config) mode.
Usage Guidelines
String to Be Set as Cookie Port Channel (EtherChannel) Interface
EtherChannel for Cisco Internet Streamer CDS supports the grouping of up to four same- network interfaces into one virtual interface. This grouping allows the setting or removing of a virtual interface that consists of two Gigabit Ethernet interfaces. EtherChannel also provides interoperability with Cisco routers, switches, and other networking devices or hosts supporting EtherChannel, load balancing, and automatic failure detection and recovery based on current link status of each interface.
You can use the Gigabit Ethernet ports to form an EtherChannel. A physical interface can be added to an EtherChannel subject to the device configuration.
Configuring Multiple IP Addresses
The Multiple Logical IP Addresses feature supports up to 24 unique IP addresses within the same subnet for the same interface.
When you configure multiple IP addresses on an SE using either the range option or using individual commands, the show running-config output displays all the IP addresses individually. The netmask value is unique for each interface, so under a single interface you cannot have multiple IP addresses with different netmask values.
Configuring IPv6
When configuring an IPv6 address on the interface, if <ipv6addr> is specified, it must be in the form of hexadecimal using16-bit values between colons (X:X:X:X::X). Optionally, a double colon may be used when consecutive 16-bit values are denoted as zero.
To configure the IPv6 access list on an interface, first configure the Access List using the access-list enable command; <in | out> means apply for inbound or outbound packets.
interface {<GigabitEthernet | Portchannel | Standby | TenGigabitEthernet>} ipv6
access-group <access_ list_number | access_list_name> <in | out>
Examples
The following example shows how to create an EtherChannel. The port channel is port channel 2 and is assigned an IP address of 10.10.10.10 and a netmask of 255.0.0.0:
ServiceEngine(config)#
interface PortChannel 2
ServiceEngine(config-if)#
exit
The following example how to remove an EtherChannel:
ServiceEngine(config)#
interface PortChannel 2
ServiceEngine(config-if)#
exit
ServiceEngine(config)#
no interface PortChannel 2
The following example shows a sample output of the show running-config command in EXEC configuration mode:
ServiceEngine#
show running-config
interface GigabitEthernet 0/0
description This is an interface to the WAN
ip address 192.168.1.200 255.255.255.0
The following example shows the sample output of the show interface command:
ServiceEngine#
show interface GigabitEthernet 1/0
Description: This is the interface to the lab
The following example shows how to create standby groups on SEs:
ServiceEngine(config)# interface GigabitEthernet 1/0 standby 2 priority 300
ServiceEngine(config)# interface GigabitEthernet 2/0 standby 2 priority 200
ServiceEngine(config)# interface GigabitEthernet 3/0 standby 2 priority 100
ServiceEngine(config)# interface standby 2 errors 10000
The following example shows how to configure multiple IP addresses using a range command:
ServiceEngine(config)#
interface PortChannel 2
ServiceEngine(config-if)# ip address range 2.2.2.3 2.2.2.6 255.255.255.0
The following example shows a sample output of the show running-config command in EXEC configuration mode after configuring multiple IP addresses:
ServiceEngine#
show running-config
ip address 2.2.2.3 255.255.255.0
ip address 2.2.2.4 255.255.255.0
ip address 2.2.2.5 255.255.255.0
ip address 2.2.2.6 255.255.255.0
Related Commands
Command
|
Description
|
show interface
|
Displays the hardware interface information.
|
show running-config
|
Displays the current operating configuration.
|
show startup-config
|
Displays the startup configuration.
|
ip (Global configuration)
To change initial network device configuration settings, use the ip command in Global configuration
mode. To delete or disable these settings, use the no form of this command.ip {access-list (see
"ip access-list" section) | default-gateway ip_address [gateway_ip_addr] | domain-name
name1 name2 name3 | name-server ip_addresses | path-mtu-discovery enable | route
dest_IP_addr dest_netmask default_gateway [interface source_IP_addr]}
no ip {access-list | default-gateway ip_address [gateway_ip_addr] | domain-name name1 name2
name3 | name-server ip_addresses | path-mtu-discovery enable | route dest_IP_addr
dest_netmask default_gateway [interface source_IP_addr]}
Syntax Description
access-list
|
Specifies the access list.
|
default-gateway
|
Specifies the default gateway (if not routing IP).
|
ip_address
|
IP address of the default gateway.
|
gateway_ip_addr
|
(Optional) Gateway IP address (maximum of 14).
|
domain-name
|
Specifies domain names.
|
name1 through name3
|
Domain name (up to three can be specified).
|
name-server
|
Specifies the address of the name server.
|
ip_addresses
|
IP addresses of the domain server (up to a maximum of eight).
|
path-mtu-discovery
|
Configures RFC 1191 Path Maximum Transmission Unit (MTU) discovery.
|
enable
|
Enables Path MTU discovery.
|
route
|
Specifies the net route.
|
dest_IP_addr
|
Destination route address.
|
dest_netmask
|
Netmask address.
|
default_gateway
|
Gateway address.
|
interface
|
Configures source policy routing to route outgoing traffic using the same interface where the request was received.
|
source_IP_addr
|
IP address of the interface configured for source policy routing.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
To define a default gateway, use the ip default-gateway command. Only one default gateway can be configured. To remove the IP default gateway, use the no form of this command. The SE uses the default gateway to route IP packets when there is no specific route found to the destination.
To define a default domain name, use the ip domain-name command. To remove the IP default domain name, use the no form of this command. Up to three domain names can be entered. If a request arrives without a domain name appended in its hostname, the proxy tries to resolve the hostname by appending name1, name2, and name3 in that order until one of these names succeeds.
The SE appends the configured domain name to any IP hostname that does not contain a domain name. The appended name is resolved by the DNS server and then added to the host table. The SE must have at least one domain name server specified for hostname resolution to work correctly.
To specify the address of one or more name servers to use for name and address resolution, use the ip name-server ip_addresses command. To disable IP name servers, use the no form of this command. For proper resolution of the hostname to the IP address or the IP address to the hostname, the SE uses DNS servers. Use the ip name-server command to point the SE to a specific DNS server. You can configure up to eight servers.
Path MTU autodiscovery discovers the MTU and automatically sets the correct value. Use the ip path-mtu-discovery enable command to start this autodiscovery utility. By default, this feature is enabled. When this feature is disabled, the sending device uses a packet size that is smaller than 576 bytes and the next hop MTU. Existing connections are not affected when this feature is turned on or off.
The Cisco Internet Streamer CDS software supports IP Path MTU Discovery, as defined in RFC 1191. When enabled, Path MTU Discovery discovers the largest IP packet size allowable between the various links along the forwarding path and automatically sets the correct value for the packet size. By using the largest MTU that the links bear, the sending device can minimize the number of packets that it must send.
Note
IP Path MTU Discovery is useful when a link in a network goes down, forcing the use of another, different MTU-sized link. IP Path MTU Discovery is also useful when a connection is first being established and the sender has no information at all about the intervening links.
IP Path MTU Discovery is started by the sending device. If a server does not support IP Path MTU Discovery, the receiving device has no mechanism available to avoid fragmenting datagrams generated by the server.
Use the ip route command to add a specific static route for a network or host. Any IP packet designated for the specified destination uses the configured route.
To configure static IP routing, use the ip route command. To remove the route, use the no form of this command. Do not use the ip route 0.0.0.0 0.0.0.0 command to configure the default gateway; use the ip default-gateway command instead.
Source Policy Routes
To configure source policy routing, use the ip route command with the interface option. By using source policy routing, the reply packet to a client leaves the SE on the same interface where the request came in. Source policy routing tables are automatically instantiated based on the interface subnets defined on the system. The policy routes are added automatically to the policy routing tables based on the nexthop gateway of the routes in the main routing table.
When configuring multiple IP address you must configure a default gateway in the same subnet. You can configure multiple gateways (up to 14) .
The CDE220-2S3i supports multiple IP addresses, which includes specifying the default gateway and IP routes. The IP routes, source policy routes, were added to ensure incoming traffic would go out the same interface it came in on. An IP route was added using the interface keyword and has the following syntax:
ip route <dest_IP_addr> <dest_netmask> <default_gateway> interface <source_IP_addr>
In the following example, all destination traffic (IP address of 0.0.0.0 and netmask of 0.0.0.0) sent from the source interface, 8.1.0.2, uses the default gateway, 8.1.0.1. This is a default policy route.
ip route 0.0.0.0 0.0.0.0 8.1.0.1 interface 8.1.0.2
A non-default policy route defines a specific destination (IP address and netmask). The following ip route command is an example of a non-default policy route:
ip route 10.1.1.0 255.255.255.0 <gateway> interface <source_IP_addr>
When upgrading to Cisco Internet Streamer CDS Release 2.5.9 software, any source policy routes configured using the Cisco Internet Streamer CDS Release 2.5.7 software interface keyword are rejected and are not displayed when the show running-config command is used. However, because you had to define the default gateway for all the interfaces as part of the multi-port support feature, the equivalent source policy route is automatically generated in the routing table. The following example shows the output for the show ip route command after upgrading to Cisco Internet Streamer CDS Release 2.5.9 software with the default source policy routes highlighted in bold and the non-default policy routes highlighted in italics:
ServiceEngine# show ip route
Destination Gateway Netmask
---------------- ---------------- ----------------
172.22.28.0 8.1.0.1 255.255.255.128
6.21.1.0 0.0.0.0 255.255.255.0
8.2.1.0 0.0.0.0 255.255.255.0
8.2.2.0 0.0.0.0 255.255.255.0
171.70.77.0 8.1.0.1 255.255.255.0
8.1.0.0 0.0.0.0 255.255.0.0
Source policy routing table for interface 8.1.0.0/16
172.22.28.0 8.1.0.1 255.255.255.128
171.70.77.0 8.1.0.1 255.255.255.0
8.1.0.0 0.0.0.0 255.255.0.0
Source policy routing table for interface 8.2.1.0/24
8.2.1.0 0.0.0.0 255.255.255.0
Source policy routing table for interface 8.2.2.0/24
8.2.2.0 0.0.0.0 255.255.255.0
If you have a default source policy route where the gateway is not defined as a default gateway, then you must add it after upgrading to Cisco Internet Streamer CDS Release 2.5.9 software. For example, if you had a source policy route with a gateway of 6.23.1.1 for a source interface of 6.23.1.12, and you did not specify the gateway as one of the default gateways, you would need to add it.
If you have a non-default source policy route, then you must add it as a regular static route (without the obsoleted interface keyword) after upgrading to Cisco Internet Streamer CDS Release 2.5.9 software. This route is then added to the main routing table as well as the policy routing table.
Differentiated Services
The differentiated services (DiffServ) architecture is based on a simple model where traffic entering a network is classified and possibly conditioned at the boundaries of the network. The class of traffic is then identified with a differentiated services (DS) code point or bit marking in the IP header. Within the core of the network, packets are forwarded according to the per-hop behavior associated with the DS code point.
DiffServ describes a set of end-to-end QoS (Quality of Service) capabilities. End-to-end QoS is the ability of the network to deliver service required by specific network traffic from one end of the network to another. QoS in the Internet Streamer CDS software supports differentiated services.
With differentiated services, the network tries to deliver a particular kind of service based on the QoS specified by each packet. The network uses the QoS specification to classify, mark, shape, and police traffic, and to perform intelligent queueing.
Differentiated services is used for several mission-critical applications and for providing end-to-end QoS. Typically, differentiated services is appropriate for aggregate flows because it performs a relatively coarse level of traffic classification.
DS Field Definition
A replacement header field, called the DS field, is defined by differentiated services. The DS field supersedes the existing definitions of the IPv4 ToS octet (RFC 791) and the IPv6 traffic class octet. A currently unused (CU) 2-bit field is reserved for explicit congestion notification (ECN). The value of the CU bits is ignored by DS-compliant interfaces when determining the PHB to apply to a received packet.
Per-Hop Behaviors
RFC 2475 defines PHB as the externally observable forwarding behavior applied at a DiffServ-compliant node to a DiffServ Behavior Aggregate (BA).
A PHB refers to the packet scheduling, queueing, policing, or shaping behavior of a node on any given packet belonging to a BA, as configured by a service level agreement (SLA) or a policy map.
There are four available standard PHBs:
•
Default PHB (as defined in RFC 2474)
•
Class-Selector PHB (as defined in RFC 2474)
•
Assured Forwarding (AFny) PHB (as defined in RFC 2597)
•
Expedited Forwarding (EF) PHB (as defined in RFC 2598)
The following sections describe the PHBs.
Assured Forwarding PHB
Assured Forwarding PHB is nearly equivalent to Controlled Load Service, which is available in the integrated services model. AFny PHB defines a method by which BAs can be given different forwarding assurances.
For example, network traffic can be divided into the following classes:
•
Gold—Traffic in this category is allocated 50 percent of the available bandwidth.
•
Silver—Traffic in this category is allocated 30 percent of the available bandwidth.
•
Bronze—Traffic in this category is allocated 20 percent of the available bandwidth.
The AFny PHB defines four AF classes: AF1, AF2, AF3, and AF4. Each class is assigned a specific amount of buffer space and interface bandwidth according to the SLA with the service provider or policy map.
Within each AF class, you can specify three drop precedence (dP) values: 1, 2, and 3. Assured Forwarding PHB can be expressed as shown in the following example: AFny. In this example, n represents the AF class number (1, 2, or 3) and y represents the dP value (1, 2, or 3) within the AFn class.
In instances of network traffic congestion, if packets in a particular AF class (for example, AF1) need to be dropped, packets in the AF1 class are dropped according to the following guideline:
dP(AFny) >= dP(AFnz) >= dP(AFnx)
where dP (AFny) is the probability that packets of the AFny class are dropped and y denotes the dP within an AFn class.
In the following example, packets in the AF13 class are dropped before packets in the AF12 class, which in turn are dropped before packets in the AF11 class:
dP(AF13) >= dP (AF12) >= dP(AF11)
The dP method penalizes traffic flows within a particular BA that exceed the assigned bandwidth. Packets on these offending flows could be re-marked by a policer to a higher drop precedence.
Expedited Forwarding PHB
Resource Reservation Protocol (RSVP), a component of the integrated services model, provides a guaranteed bandwidth service. Applications, such as Voice over IP (VoIP), video, and online trading programs, require this type of service. The EF PHB, a key ingredient of DiffServ, supplies this kind of service by providing low loss, low latency, low jitter, and assured bandwidth service.
You can implement EF by using priority queueing (PQ) and rate limiting on the class (or BA). When implemented in a DiffServ network, EF PHB provides a virtual leased line or premium service. For optimal efficiency, however, you should reserve EF PHB for only the most critical applications because, in instances of traffic congestion, it is not feasible to treat all or most traffic as high priority.
EF PHB is suited for applications such as VoIP that require low bandwidth, guaranteed bandwidth, low delay, and low jitter.
IP Precedence for ToS
IP precedence allows you to specify the class of service (CoS) for a packet. You use the three precedence bits in the IPv4 header's type of service (ToS) field for this purpose.
Using the ToS bits, you can define up to six classes of service. Other features configured throughout the network can then use these bits to determine how to treat the packet. These other QoS features can assign appropriate traffic-handling policies including congestion management strategy and bandwidth allocation. For example, although IP precedence is not a queueing method, queueing methods such as weighted fair queueing (WFQ) and Weighted Random Early Detection (WRED) can use the IP precedence setting of the packet to prioritize traffic.
By setting precedence levels on incoming traffic and using them with the Internet Streamer CDS software QoS queueing features, you can create differentiated service. You can use features, such as policy-based routing (PBR) and Committed Access Rate (CAR), to set the precedence based on an extended access list classification. For example, you can assign the precedence based on the application or user or by destination and source subnetwork.
So that each subsequent network element can provide service based on the determined policy, IP precedence is usually deployed as close to the edge of the network or the administrative domain as possible. IP precedence is an edge function that allows core or backbone QoS features, such as WRED, to forward traffic based on CoS. You can also set IP precedence in the host or network client, but this setting can be overridden by the service provisioning policy of the domain within the network.
The following QoS features can use the IP precedence field to determine how traffic is treated:
•
Distributed-WRED
•
WFQ
•
CAR
How the IP Precedence Bits Are Used to Classify Packets
You use the three IP precedence bits in the ToS field of the IP header to specify a CoS assignment for each packet. You can partition traffic into up to six classes—the remaining two classes are reserved for internal network use—and then use policy maps and extended ACLs to define network policies in terms of congestion handling and bandwidth allocation for each class.
Each precedence corresponds to a name. These names, which continue to evolve, are defined in RFC 791. The numbers and their corresponding names, are listed from least to most important.
IP precedence allows you to define your own classification mechanism. For example, you might want to assign the precedence based on an application or an access router. IP precedence bit settings 96 and 112 are reserved for network control information, such as routing updates.
The IP precedence field occupies the three most significant bits of the ToS byte. Only the three IP precedence bits reflect the priority or importance of the packet, not the full value of the ToS byte.
Examples
The following example shows how to configure a default gateway for the SE:
ServiceEngine(config)# ip default-gateway 192.168.7.18
The following example disables the default gateway:
ServiceEngine(config)# no ip default-gateway
The following example shows how to configure a static IP route for the SE:
ServiceEngine(config)# ip route 172.16.227.128 255.255.255.0 172.16.227.250
The following example negates the static IP route:
ServiceEngine(config)# no ip route 172.16.227.128 255.255.255.0 172.16.227.250
The following example shows how to configure a default domain name for the SE:
ServiceEngine(config)# ip domain-name cisco.com
The following example negates the default domain name:
ServiceEngine(config)# no ip domain-name
The following example shows how to configure a name server for the SE:
ServiceEngine(config)# ip name-server 10.11.12.13
The following example disables the name server:
ServiceEngine(config)# no ip name-server 10.11.12.13
The following example shows how to configure source policy routing for the SE interface assigned with the IP address 192.168.1.5:
ServiceEngine(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1 interface 192.168.1.5
Related Commands
Command
|
Description
|
ip (Interface configuration)
|
Configures the interface Internet Protocol.
|
show ip routes
|
Displays the IP routing table.
|
ip (Interface configuration)
To configure the interface Internet Protocol, use the interface command in interface configuration mode. To delete or disable these settings, use the no form of this command.
ip {access-group {num {in | out} {name {in | out} | address {ip_addr netmask | range
{ip_addr_low ip_addr_high netmask}}
no ip {access-group {num {in | out} {name {in | out} | address {ip_addr netmask | range
{ip_addr_low ip_addr_high netmask}}
Syntax Description
access-group
|
Specifies access control for incoming or outgoing packets.
|
num
|
Specifies an IP access list by number, in standard or extended form. The range is from 1-199.
|
in
|
Configures the IP access list that apply to inbound packets.
|
out
|
Configures the IP access list that apply to outbound packets.
|
name
|
Name of the access list.
|
in
|
Configures the access list name inbound packets.
|
out
|
Configures the access list name outbound packets.
|
address
|
Set the IP address of an interface.
|
ip-addr
|
IP address of the interface.
|
netmask
|
Netmask of the interface.
|
range
|
Specifies the IP address range.
|
ip_addr_low
|
IP address low range of an interface.
|
ip_addr_high
|
IP address high range of an interface.
|
netmask
|
Netmask of the interface.
|
Command Defaults
None
Command Modes
Interface configuration (config-if) mode.
Usage Guidelines
You can configure multiple IP addresses for Gigabit Ethernet, port channel and Standby interfaces in the SEs. With multiple IP support, the SEs can stream the content under a specific IP while having another stream with different source IP address under the same interface.
The ip command configures up to 24 unique IP addresses within the same subnet for the same Gigabit Ethernet, port channel and Standby interface. You can add and delete IP addresses for each interface without affecting other configured IP addresses.
Note
All IP addresses configured in the same interface must be in the same subnet.
The ip range command adds and deletes an IP address range per interface without affecting other configured IP addresses, and it notifies the SR and CDSM on the added and deleted IP address. The IP address can only be deleted when it is already disassociated from the delivery service. If the delivery service's IP address has been updated, for example from 10.1.1.1 to 10.1.1.5, the service is not interrupted. The new stream uses the new IP address.
Examples
Configuring an IP Address Range
The following example shows how to configure an IP address in a range:
ServiceEngine(config)# interface PortChannel 1
ServiceEngine(config-if)# ip address 2.2.2.2 255.255.255.0
ServiceEngine(config-if)# ip address range 2.2.2.3 2.2.2.10 255.255.255.0
ServiceEngine(config-if)# ip address range 2.2.2.12 2.2.2.20 255.255.255.0
If the user configures an IP address range but one or more of the IP addresses in the range matched with an already configured IP address, the configuration is still accepted. For example, if interface PortChannel 1 has the following configuration:
ip address 2.2.2.2 255.255.255.0
ip address 2.2.2.3 255.255.255.0
ip address 2.2.2.5 255.255.255.0
ip address 2.2.2.12 255.255.255.0
The following configuration is accepted and the IP address in the range (not the same subnet) is rejected:
ServiceEngine# configure terminal
ServiceEngine(config)# interface PortChannel 1
ServiceEngine(config-if)# ip address range 2.2.2.3 2.2.2.4 255.255.255.0
ServiceEngine(config-if)# end
If the interface PortChannel 1 has the following configuration:
ip address 2.2.2.2 255.255.255.0
ip address 2.2.2.5 255.255.255.0
ip address 2.2.2.12 255.255.255.0
And you enter the following commands:
ServiceEngine# configure terminal
ServiceEngine(config)# interface PortChannel 1
ServiceEngine(config-if)# ip address range 2.2.3.9 2.2.3.15 255.255.255.0
ServiceEngine(config-if)# end
It is an invalid IP address range and an incompatible netmask.
Configuring an IP Address
The following example shows how to configure an individual IP address:
ServiceEngine(config)# interface PortChannel 1
ServiceEngine(config-if)# ip address 2.2.2.2 255.255.255.0
ServiceEngine(config-if)# ip address 2.2.2.3 255.255.255.0
ServiceEngine(config-if)# ip address 2.2.2.10 255.255.255.0
Removing an IP Address
The following example shows how to remove an IP address range configuration:
ServiceEngine(config)# interface PortChannel 1
ServiceEngine(config-if)# no ip address range 2.2.2.3 2.2.2.10 255.255.255.0
The following example shows how to remove an IP address configuration:
ServiceEngine(config)# interface PortChannel 1
ServiceEngine(config-if)# no ip address 2.2.2.3 255.255.255.
Related Commands
Command
|
Description
|
interface (Global configuration)
|
Configures a Gigabit Ethernet or port channel interface.
|
show interface
|
Displays the hardware interface information.
|
show running-config
|
Displays the current operating configuration.
|
ip access-list
To create and modify access lists for controlling access to interfaces or applications, use the ip access-list standard or ip access-list extended command in Global configuration modes. To remove access control lists, use the no form of this command.
ip access-list {extended {acl_name | acl_num {delete num | deny {num {ip address | any | host} |
gre {ip address | any | host} | icmp {ip address | any | host} | ip {ip address | any | host} | tcp
{ip address | any | host} | udp {ip address | any | host}} | insert {num {deny | permit} | list
{start_line_num | end_line_num} | move {old_line_num | new_line_num} | permit {num {ip
address | any | host} | gre {ip address | any | host} | icmp {ip address | any | host} | ip {ip address
| any | host} | tcp {ip address | any | host} | udp {ip address | any | host}}} | {standard {acl_num
| acl_name {delete num | deny {num {ip address | any | host} | gre {ip address | any | host} |
icmp {ip address | any | host} | ip {ip address | any | host} | tcp {ip address | any | host} | udp
{ip address | any | host}} | insert {num {deny | permit} | list {start_line_num | end_line_num}
| move {old_line_num | new_line_num} | permit {ip address | any | host}}}}
no ip access-list {extended {acl_name | acl_num {delete num | deny {num {ip address | any | host}
| gre {ip address | any | host} | icmp {ip address | any | host} | ip {ip address | any | host} | tcp
{ip address | any | host} | udp {ip address | any | host}} | insert {num {deny | permit} | list
{start_line_num | end_line_num} | move {old_line_num | new_line_num} | permit {num {ip
address | any | host} | gre {ip address | any | host} | icmp {ip address | any | host} | ip {ip address
| any | host} | tcp {ip address | any | host} | udp {ip address | any | host}}} | {standard {acl_num
| acl_name {delete num | deny {num {ip address | any | host} | gre {ip address | any | host} |
icmp {ip address | any | host} | ip {ip address | any | host} | tcp {ip address | any | host} | udp
{ip address | any | host}} | insert {num {deny | permit} | list {start_line_num | end_line_num}
| move {old_line_num | new_line_num} | permit {ip address | any | host}}}}
Syntax Description
standard
|
Enables the standard ACL configuration mode.
|
acl_num
|
Access list to which all commands entered from access list configuration mode apply, using a numeric identifier. For standard access lists, the valid range is 1 to 99; for extended access lists, the valid range is 100 to 199.
|
acl_name
|
Access list to which all commands entered from ACL configuration mode apply, using an alphanumeric string of up to 30 characters, beginning with a letter.
|
delete
|
(Optional) Deletes the specified entry.
|
num
|
(Optional) Position of condition to delete. The range is from 1 to 500.
|
deny
|
(Optional) Causes packets that match the specified conditions to be dropped.
|
num
|
IP Protocol Number.
|
ip address
|
Source IP address.
|
any
|
Any source host.
|
host
|
A single host address.
|
gre
|
Specifies GRE Tunneling by Cisco.
|
icmp
|
Specifies Internet Control Message Protocol.
|
ip
|
Specifies Any IP Protocol.
|
tcp
|
Specifies Transport Control Protocol.
|
udp
|
Specifies User Datagram Protocol.
|
insert
|
(Optional) Inserts the conditions following the specified line number into the access list.
|
num
|
Identifies the position at which to insert a new condition.
|
deny
|
Specifies packets to deny.
|
permit
|
Specifies packets to permit.
|
list
|
(Optional) Lists the specified entries (or all entries when none are specified).
|
start_line_num
|
(Optional) Line number from which the list begins.
|
end_line_num
|
(Optional) Last line number in the list.
|
move
|
(Optional) Moves the specified entry in the access list to a new position in the list.
|
old_line_num
|
Line number of the entry to move.
|
new_line_num
|
New position of the entry. The existing entry is moved to the following position in the access list.
|
permit
|
(Optional) Causes packets that match the specified conditions to be accepted for further processing.
|
extended
|
Enables the extended ACL configuration mode.
|
Command Defaults
An access list drops all packets unless you configure at least one permit entry.
Command Modes
Global configuration (config) mode.
Usage Guidelines
Standard ACL Configuration Mode Commands
To work with a standard access list, enter the ip access-list standard command from the Global configuration mode prompt. The CLI enters a configuration mode in which all subsequent commands apply to the current access list.
To add a line to the standard IP ACL, enter the following command. For example, choose a purpose (permit or deny) that specifies whether a packet is to be passed or dropped, enter the source IP address, and enter the source IP wildcard address as follows:
[insert line_num] {deny | permit} {source_ip [wildcard] | host source_ip | any}
To delete a line from the standard IP ACL, enter the following command:
delete line_num
To display a list of specified entries within the standard IP ACL, enter the following command:
list [start_line_num [end_line_num]]
To move a line to a new position within the standard IP ACL, enter the following command:
move old_line_num new_line_num
To return to the CLI Global configuration mode prompt, enter the following command:
exit
To negate a standard IP ACL, enter the following command:
no {deny | permit} {source_ip [wildcard] | host source_ip | any}
Extended ACL Configuration Mode Commands
To work with an extended access list, enter the ip access-list extended command from the Global configuration mode prompt. The CLI enters a configuration mode in which all subsequent commands apply to the current access list.
To delete a line from the extended IP ACL, enter the following command:
delete line_num
To move a line to a new position within the extended IP ACL, enter the following command:
move old_line_num new_line_num
To display a list of specified entries within the standard IP ACL, enter the following command:
list [start_line_num [end_line_num]]
To return to the CLI Global configuration mode prompt, enter the following command:
exit
To add a condition to the extended IP ACL, note that the options depend on the chosen protocol.
For IP, enter the following command to add a condition:
[insert line_num] {deny | permit} {gre | ip | proto_num} {source_ip [wildcard] | host source_ip |
any} {dest_ip [wildcard] | host dest_ip | any}
no {deny | permit} {gre | ip | proto_num} {source_ip [wildcard] | host source_ip | any} {dest_ip
[wildcard] | host dest_ip | any}
where if you enter proto_num is 47 or 0, they represent the equivalent value for GRE or IP.
For TCP, enter the following command to add a condition:
[insert line_num] {deny | permit} {tcp | proto_num} {source_ip [wildcard] | host source_ip | any}
[operator port [port]] {dest_ip [wildcard] | host dest_ip | any} [operator port [port]]
[established]
no {deny | permit} {tcp | proto_num} {source_ip [wildcard] | host source_ip | any} [operator port
[port]] {dest_ip [wildcard] | host dest_ip | any} [operator port [port]] [established]
where proto_num can be 6, which is the equivalent value for TCP.
For UDP, enter the following command to add a condition:
[insert line_num] {deny | permit} {udp | proto_num} {source_ip [wildcard] | host source_ip |
any} [operator port [port]] {dest_ip [wildcard] | host dest_ip | any} [operator port [port]]
no {deny | permit} {udp | proto_num} {source_ip [wildcard] | host source_ip | any} [operator port
[port]] {dest_ip [wildcard] | host dest_ip | any} [operator port [port]]
where proto_num can be 17, which is the equivalent value for UDP.
For ICMP, enter the following command to add a condition:
[insert line_num] {deny | permit} {icmp | proto_num} {source_ip [wildcard] | host source_ip |
any} {dest_ip [wildcard] | host dest_ip | any} [icmp_type [code] | icmp_msg]
no {deny | permit} {icmp | proto_num} {source_ip [wildcard] | host source_ip | any} {dest_ip
[wildcard] | host dest_ip | any} [icmp_type [code] | icmp_msg]
where proto_num can be 2, which is the equivalent value for ICMP.
For extended IP ACLs, the wildcard keyword is required if the host keyword is not specified. For a list of the keywords that you can use to match specific ICMP message types and codes, see Table 2-9. For a list of supported UDP and TCP keywords, see Table 2-7 and Table 2-8.
Use access lists to control access to specific applications or interfaces on an SE. An ACL consists of one or more condition entries that specify the kind of packets that the SE drops or accepts for further processing. The SE applies each entry in the order in which it occurs in the access list, which by default, is the order in which you configured the entry.
The following are some examples of how IP ACLs can be used in environments that have SEs:
•
SE resides on the customer premises and is managed by a service provider, and the service provider wants to secure the device for its management only.
•
SE is deployed anywhere within the enterprise. As with routers and switches, the administrator wants to limit Telnet and SSH access to the IT source subnets.
•
Application layer proxy firewall with a hardened outside interface has no ports exposed. (Hardened means that the interface carefully restricts which ports are available for access, primarily for security reasons. With an outside interface, many types of security attacks are possible.) The SE's outside address is Internet global, and its inside address is private. The inside interface has an IP ACL to limit Telnet and SSH access to the SE.
•
SE is deployed as a reverse proxy in an untrusted environment. The SE administrator wants to allow only port 80 inbound traffic on the outside interface and outbound connections on the back-end interface.
Within ACL configuration mode, you can use the editing commands (list, delete, and move) to display the current condition entries, to delete a specific entry, or to change the order in which the entries are evaluated. To return to Global configuration mode, enter exit at the ACL configuration mode prompt.
To create an entry, use a deny or permit keyword and specify the type of packets that you want the SE to drop or to accept for further processing. By default, an access list denies everything because the list is terminated by an implicit deny any entry. You must include at least one permit entry to create a valid access list.
After creating an access list, you can include the access list in an access group using the access-group command, which determines how the access list is applied. You can also apply the access list to a specific application using the appropriate command. A reference to an access list that does not exist is the equivalent of a permit any condition statement.
To work with access lists, enter either the ip access-list standard or ip access-list extended Global configuration command. Identify the new or existing access list with a name up to 30 characters long beginning with a letter or with a number. If you use a number to identify a standard access list, it must be between 1 and 99; for an extended access list, use a number from 100 to 199. Use a standard access list for providing access to the SNMP server or to the TFTP gateway or server.
After you identify the access list, the CLI enters the appropriate configuration mode and all subsequent commands apply to the specified access list.
ip access-list standard Command
You typically use a standard access list to allow connections from a host with a specific IP address or from hosts on a specific network. To allow connections from a specific host, use the permit host source_ip option and replace source_ip with the IP address of the specific host.
To allow connections from a specific network, use the permit source_ip wildcard option. Replace source_ip with a network ID or the IP address of any host on the network that you want to specify. Replace wildcard with the dotted decimal notation for a mask that is the reverse of a subnet mask, where a 0 indicates a position that must be matched and a 1 indicates a position that does not matter. For instance, the wildcard 0.0.0.255 causes the last eight bits in the source IP address to be ignored. Therefore, the permit 192.168.1.0 0.0.0.255 entry allows access from any host on the 192.168.1.0 network.
ip access-list extended Command
Use an extended access list to control connections based on the destination IP address or based on the protocol type. You can combine these conditions with information about the source IP address to create more restrictive conditions. Table 2-7 lists the UDP keywords that you can use with extended access lists.
Table 2-7 UDP Keywords and Port Numbers
CLI Keyword
|
Description
|
UDP Port Number
|
bootpc
|
BOOTP1 client service
|
68
|
bootps
|
BOOTP server service
|
67
|
domain
|
DNS2 service
|
53
|
netbios-dgm
|
NetBIOS datagram service
|
138
|
netbios-ns
|
NetBIOS name resolution service
|
137
|
netbios-ss
|
NetBIOS session service
|
139
|
nfs
|
Network File System service
|
2049
|
ntp
|
Network Time Protocol settings
|
123
|
snmp
|
Simple Network Management Protocol service
|
161
|
snmptrap
|
SNMP traps
|
162
|
tftp
|
Trivial File Transfer Protocol service
|
69
|
Table 2-8 lists the TCP keywords that you can use with extended access lists.
Table 2-8 TCP Keywords and Port Numbers
CLI Keyword
|
Description
|
TCP Port Number
|
domain
|
Domain Name System
|
53
|
exec
|
Remote process execution
|
512
|
ftp
|
File Transfer Protocol service
|
21
|
ftp-data
|
FTP data connections (used infrequently)
|
20
|
nfs
|
Network File System service applications
|
2049
|
rtsp
|
Real-Time Streaming Protocol applications
|
554
|
ssh
|
Secure Shell login
|
22
|
telnet
|
Remote login using telnet
|
23
|
www
|
World Wide Web (HTTP) service
|
80
|
Table 2-9 lists the keywords that you can use to match specific ICMP message types and codes.
Table 2-9 Keywords for ICMP Message Type and Code
Field
|
Description
|
administratively-prohibited
|
Messages that are administratively prohibited from being allowed access.
|
alternate-address
|
Messages that specify alternate IP addresses.
|
conversion-error
|
Messages that denote a datagram conversion error.
|
dod-host-prohibited
|
Messages that signify a DoD1 protocol Internet host denial.
|
dod-net-prohibited
|
Messages that specify a DoD protocol network denial.
|
echo
|
Messages that are used to send echo packets to test basic network connectivity.
|
echo-reply
|
Messages that are used to send echo reply packets.
|
general-parameter-problem
|
Messages that report general parameter problems.
|
host-isolated
|
Messages that indicate that the host is isolated.
|
host-precedence-unreachable
|
Messages that have been received with the protocol field of the IP header set to one (ICMP) and the type field in the ICMP header set to three (Host Unreachable). This is the most common response. Large numbers of this datagram type on the network are indicative of network difficulties or hostile actions.
|
host-redirect
|
Messages that specify redirection to a host.
|
host-tos-redirect
|
Messages that specify redirection to a host for type of service-based (ToS) routing.
|
host-tos-unreachable
|
Messages that denote that the host is unreachable for ToS-based routing.
|
host-unknown
|
Messages that specify that the host or source is unknown.
|
host-unreachable
|
Messages that specify that the host is unreachable.
|
information-reply
|
Messages that contain domain name replies.
|
information-request
|
Messages that contain domain name requests.
|
mask-reply
|
Messages that contain subnet mask replies.
|
mask-request
|
Messages that contain subnet mask requests.
|
mobile-redirect
|
Messages that specify redirection to a mobile host.
|
net-redirect
|
Messages that are used for redirection to a different network.
|
net-tos-redirect
|
Messages that are used for redirection to a different network for ToS-based routing.
|
net-tos-unreachable
|
Messages that specify that the network is unreachable for the ToS-based routing.
|
net-unreachable
|
Messages that specify that the network is unreachable.
|
network-unknown
|
Messages that denote that the network is unknown.
|
no-room-for-option
|
Messages that specify the requirement of a parameter, but that no room is unavailable for it.
|
option-missing
|
Messages that specify the requirement of a parameter, but that parameter is not available.
|
packet-too-big
|
Messages that specify that the ICMP packet requires fragmentation but the DF2 bit is set.
|
parameter-problem
|
Messages that signify parameter-related problems.
|
port-unreachable
|
Messages that specify that the port is unreachable.
|
precedence-unreachable
|
Messages that specify that host precedence is not available.
|
protocol-unreachable
|
Messages that specify that the protocol is unreachable.
|
reassembly-timeout
|
Messages that specify a timeout during reassembling of packets.
|
redirect
|
Messages that have been received with the protocol field of the IP header set to one (ICMP) and the type field in the ICMP header set to five (Redirect). ICMP redirect messages are used by routers to notify the hosts on the data link that a better route is available for a particular destination.
|
router-advertisement
|
Messages that contain ICMP router discovery messages called router advertisements.
|
router-solicitation
|
Messages that are multicast to ask for immediate updates on neighboring router interface states.
|
source-quench
|
Messages that have been received with the protocol field of the IP header set to one (ICMP) and the type field in the ICMP header set to four (Source Quench). This datagram may be used in network management to provide congestion control. A source quench packet is issued when a router is beginning to lose packets because of the transmission rate of a source. The source quench is a request to the source to reduce the rate of a datagram transmission.
|
source-route-failed
|
Messages that specify the failure of a source route.
|
time-exceeded
|
Messages that specify information about all instances when specified times were exceeded.
|
timestamp-reply
|
Messages that contain time stamp replies.
|
timestamp-request
|
Messages that contain time stamp requests.
|
traceroute
|
Messages that specify the entire route to a network host from the source.
|
ttl-exceeded
|
Messages that specify that ICMP packets have exceeded the Time-To-Live configuration.
|
unreachable
|
Messages that are sent when packets are denied by an access list; these packets are not dropped in the hardware but generate the ICMP-unreachable message.
|
Examples
The following example shows how to create an access list to allow all web traffic and to allow only a specific host administrative access using Secure Shell (SSH):
ServiceEngine(config)# ip access-list extended example
ServiceEngine(config-ext-nacl)# permit tcp any any eq www
ServiceEngine(config-ext-nacl)# permit tcp host 10.1.1.5 any eq ssh
ServiceEngine(config-ext-nacl)# exit
The following example shows how to activate the access list for an interface:
ServiceEngine(config)# interface gigabitethernet 1/0
ServiceEngine(config-if)# exit
The following example shows how this configuration appears when you enter the show running-configuration command:
ip access-list extended example
permit tcp any any eq www
permit tcp host 10.1.1.5 any eq ssh
Related Commands
Command
|
Description
|
clear ip access-list counters
|
Clears the IP access list statistical information.
|
show ip access-list
|
Displays the access lists that are defined and applied to specific interfaces or applications.
|
ip ospf priority
To set the router priority, which helps determine the designated router for this network; use the ip ospf priority command in interface configuration mode. To return to the default value, use the no form of this command.
ip ospf priority number_value
no ip ospf priority number_value
Syntax Description
number_value
|
A number value that specifies the priority of the router (the range is 0 to 255).
|
Command Defaults
Priority of 1
Command Modes
Interface configuration (config-if) mode.
Usage Guidelines
When two routers attached to a network both attempt to become the designated router, the one with the higher router priority takes precedence. If there is a tie, the router with the higher router ID takes precedence. A router with a router priority set to zero is ineligible to become the designated router or backup designated router. Router priority is configured only for interfaces to multi-access networks (that is, not to point-to-point networks).
Examples
The following example shows how to set the router priority value to 4:
ServiceRouter(config)# router ospf
ServiceRouter(config-ospf)# interface GigabitEthernet 2/0
ServiceRouter(config-ospf-if)# ip ospf priority 4
ServiceRouter(config-ospf-if)
Related Commands
Command
|
Description
|
router ospf
|
Enables the Open Shortest Path First (OSPF) routing process.
|
ip rib route
To configure unicast static routes for the Proximity Engine, use the ip rib route command in Global configuration mode. To , use the no form of the command.
ip rib route destination prefix netmask {gateway ip_addr | GigabitEthernet num [gateway
ip_addr]}
no ip rib route destination prefix netmask {gateway ip_addr | GigabitEthernet num [gateway
ip_addr]}
Syntax Description
destination prefix
|
Destination network prefix.
|
netmask
|
Network mask.
|
gateway ip_addr
|
Gateway IP address.
|
GigabitEthernet
|
Selects a GigabitEthernet interface to configure.
|
num
|
GigabitEthernet slot/port number.
|
Command Defaults
None
Command Modes
Global configuration mode.
Usage Guidelines
Unicast static routes can be configured for the Proximity Engine. Static routes provide the Proximity Engine the ability to resolve learned BGP route next hops without IGP routing information.
The show ip rib route static command displays the static routes. The show ip static route command displays the static route configured and stored in the RIB table.
The ip rib route command allows static route configuration where the next-hop resolution depends on other static route configuration, The maximum number of static routes that can be configured is 200. The maximum number of equal cost multiple path (ECMP) static routes is 16.
When the next hop cannot be resolved, the static route configuration is not rejected, but the static route is not installed in Routing Information Base (RIB). When the next hop is resolved, the static route is installed automatically.
Examples
The following examples shows how to configure a static route:
ServiceRouter(config)# ip rib route 10.1.1.1 255.255.255.0 20.1.1.1
The following example shows how to configure a static route with disabled nexthop:
ServiceRouter(config)# ip rib route 10.1.1.1 255.255.255.0 gigabitEthernet 2/0
ServiceRouter(config)# ip rib route 20.1.1.1 255.255.255.0 192.168.82.54
The following examples shows how to configure a static route on a GigabitEthernet interface:
ServiceRouter(config)# ip rib route 10.1.1.1 255.255.255.0 gigabitethernet1/0
The following examples shows how to configure a static route on a GigabitEthernet interface with a gateway IP address:
ServiceRouter(config)# ip rib route 10.1.1.1 255.255.255.0 gigabitethernet1/0 20.1.1.1
Related Commands
Command
|
Description
|
show ip rib route
|
Displays IP RIB route information.
|
show ip static route
|
Displays IP Static route information.
|
ip router isis
To specify the interfaces to be used for routing IS-IS, use the ip router isis command in interface sub-configuration mode under IS-IS configuration mode. To detach the IS-IS process from an interface, use the no form of the command.
ip router isis
no ip router isis
Syntax Description
This command has no arguments or keywords.
Command Defaults
None
Command Modes
Interface configuration mode under IS-IS (config-isis-if) configuration mode.
Usage Guidelines
This command is used to specify the interfaces to actively route IS-IS. Before an IS-IS routing process can be attached to an interface, you must assign a network entity title (NET) using the net command and enter the interface sub-configuration mode.
Examples
The following example shows how to configure an IS-IS process to be attached and form adjacency on Ethernet interface 1:
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# net 49.0001.aaaa.aaaa.aaaa.00
ServiceRouter(config-isis)# interface GigabitEthernet 1/0
ServiceRouter(config-isis-if)# ip router isis
ServiceRouter(config-isis-if)#
Related Commands
Command
|
Description
|
router isis
|
Enables the IS-IS routing protocol and specifies an IS-IS process.
|
ipv6
To specify the default gateway's IPv6 address, use the ipv6 command in Global configuration mode. To disable the IPv6 address, use the no form of this command.
ipv6 {access-list {extended {extended_acess_list_num [delete num | deny {protocol_num {any |
host | ipv6_addr} | gre {any | host | ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any |
host | ipv6_addr} | tcp {any | host | ipv6_addr} | udp {any | host | ipv6_addr} | insert
position_num {deny {protocol_num {any | host | ipv6_addr} | gre {any | host | ipv6_addr} |
icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any | host | ipv6_addr} |
udp {any | host | ipv6_addr}} | permit {any | host | ipv6_addr}} | list [position_start
position_end] | move {move_from move_to} | permit {protocol_num {any | host | ipv6_addr} |
gre {any | host | ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} |
tcp {any | host | ipv6_addr} | udp {any | host | ipv6_addr}}] | access_list name [delete num |
deny {protocol_num {any | host | ipv6_addr} | gre {any | host | ipv6_addr} | icmpv6 {any |
host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any | host | ipv6_addr} | udp {any | host
| ipv6_addr}} | insert position_num {deny {protocol_num {any | host | ipv6_addr} | gre {any
| host | ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any |
host | ipv6_addr} | udp {any | host | ipv6_addr}} | permit} | list [position_start position_end]
| move {move_from move_to} | permit {protocol_num {any | host | ipv6_addr} | gre {any | host
| ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any | host |
ipv6_addr} | udp {any | host | ipv6_addr}}]} | standard {standard_acess_list_num [delete
num | deny {any | host | ipv6_addr} | insert position_num {deny {any | host | ipv6_addr} |
permit {any | host | ipv6_addr}} | list [position_start position_end] | move {move_from
move_to} | permit {any | host | ipv6_addr} | default-gateway ip_address | route dest_ip_adder
gateway_ip_addr}
no ipv6 {access-list {extended {extended_acess_list_num [delete num | deny {protocol_num {any
| host | ipv6_addr} | gre {any | host | ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any |
host | ipv6_addr} | tcp {any | host | ipv6_addr} | udp {any | host | ipv6_addr} | insert
position_num {deny {protocol_num {any | host | ipv6_addr} | gre {any | host | ipv6_addr} |
icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any | host | ipv6_addr} |
udp {any | host | ipv6_addr}} | permit {any | host | ipv6_addr}} | list [position_start
position_end] | move {move_from move_to} | permit {protocol_num {any | host | ipv6_addr} |
gre {any | host | ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} |
tcp {any | host | ipv6_addr} | udp {any | host | ipv6_addr}}] | access_list name [delete num |
deny {protocol_num {any | host | ipv6_addr} | gre {any | host | ipv6_addr} | icmpv6 {any |
host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any | host | ipv6_addr} | udp {any | host
| ipv6_addr}} | insert position_num {deny {protocol_num {any | host | ipv6_addr} | gre {any
| host | ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any |
host | ipv6_addr} | udp {any | host | ipv6_addr}} | permit} | list [position_start position_end]
| move {move_from move_to} | permit {protocol_num {any | host | ipv6_addr} | gre {any | host
| ipv6_addr} | icmpv6 {any | host | ipv6_addr} | ip {any | host | ipv6_addr} | tcp {any | host |
ipv6_addr} | udp {any | host | ipv6_addr}}]} | standard {standard_acess_list_num [delete
num | deny {any | host | ipv6_addr} | insert position_num {deny {any | host | ipv6_addr} |
permit {any | host | ipv6_addr}} | list [position_start position_end] | move {move_from
move_to} | permit {any | host | ipv6_addr} | default-gateway ip_address | route dest_ip_adder
gateway_ip_addr}
Syntax Description
default-gateway
|
Specifies the default gateway's IPv6 address.
|
ip_address
|
IPv6 address of the default gateway.
|
access-list
|
Named access-list.
|
route
|
Specifies IPv6 net route.
|
extended
|
Specifies extended IPv6 Access List.
|
extended_access_list_num
|
Extended IPv6 access-list number. The range is from 100 to199.
|
extended_access_list_name
|
Extended IPv6 Access-list name (maximum 30 characters).
|
delete
|
(Optional) Deletes a condition.
|
num
|
Position of condition to delete. The range is from 1 to 500.
|
deny
|
(Optional) Specifies packets to reject.
|
protocol_num
|
An IP Protocol Number. The range is from 1 to 255.
|
any
|
Any source or destination host.
|
host
|
A single host address.
|
ipv6_addr
|
Source or Destination IPv6 address, in format X:X:X:X::X/(0-128).
|
gre
|
Cisco's GRE Tunneling.
|
icmpv6
|
Internet Control Message Protocol.
|
ip
|
Any IP Protocol.
|
tcp
|
Transport Control Protocol.
|
udp
|
User Datagram Protocol.
|
insert
|
(Optional) Inserts a condition.
|
position_num
|
Position to insert new condition. The range is from 1 to 500.
|
eq
|
Matches only packets on a given port number.
|
gt
|
Matches only packet with a greater port number.
|
host
|
A single host address.
|
lt
|
Matches only packets with a lower port number.
|
neq
|
Matches only packets not on a given port.
|
range
|
Matches only packets in the range of port numbers.
|
list
|
(Optional) Lists conditions.
|
position_start
|
(Optional) Position of condition to start listing. The range is from 1 to 500.
|
position_end
|
(Optional) Position of condition to end listing. The range is from 1 to 500.
|
move
|
(Optional) Moves a condition.
|
move_from
|
(Optional) Position to move condition from. The range is from 1 to 500.
|
move_to
|
(Optional) Position to move condition to. The range is from 1 to 500.
|
permit
|
(Optional) Specifies packets to accept.
|
standard
|
Specifies Standard IPv6 Access List.
|
standard_access_list_num
|
Standard IPv6 access-list number. The range is from 100 to 199.
|
standard_access_list_name
|
Standard IPv6 Access-list name (maximum 30 characters).
|
default-gateway
|
Defines the default gateway's IPv6 address.
|
ip_address
|
Default gateway IPv6 address (maximum of 14), in format X:X:X.
|
route
|
Specifies the IPv6 net route.
|
dest_ip_adder
|
Destination IPv6 address, in format X:X:X:X::X/<0-128.
|
gateway_ip_addr
|
Gateway IPv6 address, in format X:X:X:X::X.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Explosive growth in network device diversity and mobile communications, along with global adoption of networking technologies have resulted in IPv4 addresses getting exhausted. IPv4 address space has a theoretical limit of 4.3 billion addresses. IPv6 quadruples the number of network address bits from 32 bits (in IPv4) to 128 bits. This provides more than enough globally unique IP addresses for every networked device in use.
CDS-IS IPv6 ACL, a permit or deny policy for IPv6 traffic you want to filter is based on source and destination IPv6 address, plus other IPv6 protocol factors such as TCP/UDP, ICMPv6 and GRE, or specify the port number. This command mirrors IPv4:
[no] ipv6 access-list {<standard|extended>} {<name|number>}
{<permit|deny|delete|move|insert|list>} {protocol no|protocol
name}[any|host|ipv6addr/prefix] {any|host|ipv6addr/prefix}
IPv6 access lists are identified by user selected names. Access lists are defined by a list of "permit" and "deny" statements.
[no] ip name-server {<hostname|ipv6addr|ipv4addr>}
[no] ntp server {<hostname|ipv6addr|ipv4addr>}
These above configurations should support both IPv6 and IPv4 addresses.
DNS Configuration
The IPv6 address name server must be configured by using the ipv6 name-server ip-address command.
Note
The Service Router acts as the authoritative DNS server, and supports IPv6 DNS extensions.
If an IPv6 address is configured on the SR for DNS, the communication between the SR and the DNS server is over the IPv6 transport. The IPv4 address of the Service Router must be configured in the DNS server, so that the Service Router can respond to both A and AAAA queries. In this case, the communication between the DNS Server and the SR is over IPv4 transport.
Service Router
Communication between the SE and SR is through the IPv4 stack, including the keep-alive message. If IPv6 is enabled, then the keep-alive message includes the IPv6 address of the SE in the keep-alive message payload. This enables the SR to resolve the SE's IPv6 address correctly.
The SR operates as a DNS Server for the requests that belong to the delivery service to which the SR is associated. The SR is provisioned to respond to A or AAAA queries for the configured Service Routing Domain Name (RFQDN). The query can be on either an IPv4 or IPv6 transport.
The SR accepts the HTTP, RTSP, and RTMP requests and sends back the response by way of the IPv6 transport. The SR also supports the IP-based redirection, and includes the IPv6 address of the SE in the redirect URL. If the redirect URL has the SE host name, the client sends a DNS query to the SR, and the SR responds with the SE's IPv4 address for the A query and the SE's IPv6 address for the AAAA query.
The Coverage Zone file supports IPv6 and IPv4 addresses. The network and subnetwork addresses in the Coverage Zone file support CIDR format (IP address with a prefix).
Note
The Geo-Location servers do no support IPv6 client configuration; therefore, location-based routing only supports IPv4 addresses.
Examples
The following example shows how to configure an IPv6-related address:
ServiceRouter(config)# ipv6 default-gateway fec0::100/64
When configuring a static IPv6 prefix route, specify the host ipv6 address and prefix. <next-hop> is the IPv6 address of the next-hop to reach the destination prefix. The following example shows how to configure a static IPv6 prefix route:
ServiceRouter(config)# ipv6 route <ipv6addr/prefix> <next-hop>
Related Commands
Command
|
Description
|
clear ipv6
|
Clears IPv6 ACL counters.
|
show ipv6
|
Displays the IPv6 information.
|
traceroute6
|
Traces the route to a remote IPv6-enabled host.
|
isis
To configure IS-IS routing for IP, use the isis command in interface configuration mode under route IS-IS configuration mode. To turn off this function, use the no form of this command.
isis {authentication key-chain name {level-1 | level-2} | authentication-check {level-1 | level-2}
| authentication-type {cleartext | md5} | circuit-type [level-1 | level-1-2 | level-2] | priority
priority_value {level-1 | level-2}}
no isis {authentication key-chain name {level-1 | level-2} | authentication-check {level-1 |
level-2} | authentication-type {cleartext | md5} | circuit-type [level-1 | level-1-2 | level-2] |
priority priority_value {level-1 | level-2}}
Syntax Description
authentication
|
Sets hello authentication key chain.
|
key-chain
|
Sets hello authentication key chain.
|
name
|
Authentication key chain name.
|
level-1
|
Specifies authentication key chain for level-1 IIHs.
|
level-2
|
Specifies authentication key chain for level-2 IIHs.
|
authentication- check
|
Checks authentication.
|
authentication-type
|
Sets hello authentication type.
|
cleartext
|
Specifies cleartext.
|
md5
|
Specifies HMAC-MD5.
|
circuit-type
|
Configures circuit type for interface.
|
level-1
|
(Optional) Configures a router for Level 1 adjacency only.
|
level-1-2
|
(Optional) Configures a router for Level 1 and Level 2 adjacency.
|
level-2
|
(Optional) Configures a router for Level 2 adjacency only.
|
priority
|
Sets the priority for DIS election.
|
priority_value
|
Priority setting for interfaces. The range is from 0 to 127.
|
Command Defaults
A Level 1 and Level 2 adjacency is established.
Priority is set to 64 for interfaces.
Authentication-check is on.
Command Modes
Interface configuration mode under IS-IS (config-isis-if) configuration.
Usage Guidelines
Use the isis authentication key-chain command to specify the key chain to be used for the interface and the corresponding level. The key chain range cannot exceed 63 characters.
Use the isis authentication-check command to enables or disables the checking of received packets for the interface on the corresponding level. When authentication-check is disabled, IS-IS adds authentication to the outgoing packets, but it does not check authentication on incoming packets. This feature allows smooth transition of enabling authentication without disrupting the network operation.
Use the isis authentication-type command to specify the md5 or cleartext authentication type for the interface and the corresponding level.
Use the isis circuit-type command to specify adjacency levels on a specified interface.
Use the isis priority configuration command to configure the priority of a specific interface.
Examples
The following example shows how to specify the key chain to be used for `GigabitEthernet 3/0', level-1 for the IS-IS process running on that interface:
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# interface GigabitEthernet 3/0
ServiceRouter(config-isis-if)# isis authentication key-chain my-key level-1
ServiceRouter(config-isis-if)#
The following example shows how to configure the authentication check of interface `GigabitEthernet 3/0', level-1 for the IS-IS process running on that interface:
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# interface GigabitEthernet 3/0
ServiceRouter(config-isis-if)# isis authentication-check level-1
ServiceRouter(config-isis-ifSVCREG internal error
if SVCREG interface debugs
ippc SVCREG ippc (inter process comm) debugs
The following example shows how to configure the authentication type of interface `GigabitEthernet 3/0' to be md5 level-1 for the IS-IS process running on that interface:
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# interface GigabitEthernet 3/0
ServiceRouter(config-isis-if)# isis authentication-type md5 level-1
ServiceRouter(config-isis-if)#
The following example shows how to configure the circuit type of interface `GigabitEthernet 3/0' to be level-1-2 for the IS-IS process running on that interface:
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# interface GigabitEthernet 3/0
ServiceRouter(config-isis-if)# isis circuit-type level-1-2
ServiceRouter(config-isis-if)# end
ServiceRouter#
The following example shows how to set the priority of interface `GigabitEthernet 3/0' to 100 for the IS-IS process running on that interface:
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# interface GigabitEthernet 3/0
ServiceRouter(config-isis-if)# isis priority 100
ServiceRouter(config-isis-if)# end
ServiceRouter#
Related Commands
Command
|
Description
|
router isis
|
Enables the IS-IS routing protocol and specifies the IS-IS process.
|
is-type
To configure a Proximity Engine to act as a Level 1 (intra-area) router, as both a Level 1 router and a Level 2 (interarea) router, or as an inter-area router only, use the is-type IS-IS configuration command. To reset the default value, use the no form of this command.
is-type [level-1| level-1-2 | level-2]
no is-type [level-1| level-1-2 | level-2]
Syntax Description
level-1
|
(Optional) Router performs only Level 1 (intra-area) routing. This router learns only about destinations inside its area. Level 2 (inter-area) routing is performed by the closest Level 1-2 router.
|
level-1-2
|
(Optional) Router performs both Level 1 and Level 2 routing. This router runs two instances of the routing process. It has one link-state packet database (LSDB) for destinations inside the area (Level 1 routing) and runs a shortest path first (SPF) calculation to discover the area topology. It also has another LSDB with link state packets (LSPs) of all other backbone (Level 2) routers, and runs another SPF calculation to discover the topology of the backbone, and the existence of all other areas.
|
level-2
|
(Optional) Routing process acts as a Level 2 (inter-area) router only. This router is part of the backbone, and does not communicate with Level 1-only routers in its own area.
|
Command Defaults
The IS-IS routing process configured is a Level 1-2 (intra-area and inter-area) router.
Command Modes
IS-IS configuration (config-isis) mode.
Usage Guidelines
By default, the first instance of the IS-IS routing process that you configure using the router isis command is a Level 1-2 router.
If the network has only one area, there is no need to run both Level 1 and Level 2 routing algorithms. If IS-IS is used for Connectionless Network Service (CLNS) routing (and there is only one area), Level 1 only must be used everywhere. If IS-IS is used for IP routing only (and there is only one area), you can run Level 2 only everywhere. Areas you add after the Level 1-2 area exists are, by default, Level 1 areas.
If the router instance has been configured for Level 1-2 (the default for the first instance of the IS-IS routing process in a Cisco device), you can remove Level 2 (inter-area) routing for the area by using the is-type command. You can also use the is-type command to configure Level 2 routing for an area, but it must be the only instance of the IS-IS routing process configured for Level 2 on the Cisco device.
Examples
The following example shows how to specify an area router:
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# is-type level-2
ServiceRouter(config-isis)#
Related Commands
Command
|
Description
|
router isis
|
Enables the IS-IS routing protocol and specifies the IS-IS process.
|
kernel
To configure the kernel, use the kernel command in Global configuration mode. To disable the kernel configuration, use the no form of this command.
kernel {kdb | optimization network}
no kernel {kdb | optimization network}
Syntax Description
kdb
|
Specifies the kernel debugger (kdb).
|
optimization
|
Enables kernel performance optimization.
|
network
|
Optimizes network performance.
|
Command Defaults
Kdb is disabled by default.
Command Modes
Global configuration (config) mode.
Usage Guidelines
Once enabled, KDB is automatically activated when kernel problems occur. Once activated, all normal functioning of the CDS device is suspended until KDB is manually deactivated. The KDB prompt looks like this prompt:
To deactivate KDB, enter go at the KDB prompt. If KDB was automatically activated because of kernel problems, you must reboot to recover from the issue. If you activated KDB manually for diagnostic purposes, the system resumes normal functioning in whatever state it was when you activated KDB. In either case, if you enter reboot, the system restarts and normal operation resumes.
Examples
The following example shows how to enable KDB:
ServiceEngine(config)# kernel kdb
The following example shows how to disable KDB:
ServiceEngine(config)# no kernel kdb
key
To create a key ID and enter into key configuration submode, use the key command in Global configuration mode. To exit key chain configuration submode, use the no form of this command.
key keyid
no key keyid
Syntax Description
keyid
|
Key identifier. The range is from 0 to 65535.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Multiple key ID's may be configured under the same key chain. The key chain string cannot exceed 63 characters.
When IS-IS is configured to use a particular key chain for the authentication and the corresponding key chain is not configured in the system, it causes IS-IS to always reject incoming packets that require the key chain.
When a key chain has multiple keys, IS-IS should advertise the first key in the chain. For validation of received packets, it should iterate through all the keys until there is a match.
They key command is within the key chain command context, not simply the key chain itself.
Examples
The following example shows how to create a key ID and enter the key configuration submode:
ServiceRouter(config)# key chain my-key
ServiceRouter(config-keychain)#
Related Commands
Command
|
Description
|
key chain
|
Creates a key chain and enter into key chain configuration submode.
|
key-string
|
Creates a key string to be used for authentication.
|
show key chain
|
Displays the key chains in the system.
|
key-string
To create a key string to be used for authentication, use the key chain command in Key ID configuration submode. To remove the key-string, use the no form of this command.
key-string keyid
no key-string keyid
Syntax Description
keyid
|
The unencrypted (cleartext) user password.
|
Command Defaults
None
Command Modes
Key ID configuration submode.
Usage Guidelines
The key-string command creates a key string to be used for authentication.
A key string is always valid upon creation.
The Proximity Engine does not support key-string expiration.
You can only create one key-string per key ID.
Key-chain string cannot exceed 63 characters.
Examples
The following example shows how to specify terminal line settings:
ServiceRouter(config-keychain-key)# key-string topos123
ServiceRouter(config-keychain-key)#
Related Commands
Command
|
Description
|
key
|
Creates a key ID and enters into key configuration submode.
|
key chain
|
Creates a key chain and enter into key chain configuration submode.
|
show key chain
|
Displays the key chains in the system.
|
key chain
To create a key chain and enter into key chain configuration submode, use the key chain command in Global configuration mode. To exit key chain configuration submode, use the no form of this command.
key chain name
no key chain name
Syntax Description
name
|
Name of the key chain.
|
Command Defaults
None
Command Modes
Global configuration (config) mode.
Usage Guidelines
Multiple key ID's may be configured under the same key chain. Key chain string cannot exceed 63 characters.
When IS-IS is configured to use a particular key chain for the authentication and the corresponding key chain is not configured in the system, it results IS-IS to always reject incoming packets that requires the key chain.
When a key chain has multiple keys, IS-IS should advertise the first key in the chain. For validation of received packets, it should iterate through all the keys until there is a match.
Examples
The following example shows how to create a key and enter into key ID configuration submode:
ServiceRouter(config)# key chain my-key
ServiceRouter(config-keychain)#
The following example shows a complete sample configuration for IS-IS MD5 authentication:
ServiceRouter(config)# key chain lsp-key
ServiceRouter(config-keychain)# key 1
ServiceRouter(config-keychain-key)# key-string lsp
ServiceRouter(config-keychain-key)# exit
ServiceRouter(config-keychain)# exit
ServiceRouter(config)# key chain int-key
ServiceRouter(config-keychain)# key 1
ServiceRouter(config-keychain-key)# key-string topos123
ServiceRouter(config-keychain-key)# exit
ServiceRouter(config-keychain)# exit
ServiceRouter(config)# router isis
ServiceRouter(config-isis)# net 10.1111.1111.1111.00
ServiceRouter(config-isis)# is-type level-1
ServiceRouter(config-isis)# authentication-type md5 level-1
ServiceRouter(config-isis)# authentication key-chain lsp-key level-1
ServiceRouter(config-isis)# interface giagabitethernet 1/0
ServiceRouter(config-isis-if)# isis authentication-type md5 level-1
ServiceRouter(config-isis-if)# isis authentication key-chain int-key level-1
Related Commands
Command
|
Description
|
key
|
Creates a key chain and enter s into key chain configuration submode.
|
key-string
|
Creates a key string to be used for authentication.
|
show key chain
|
Displays the key chains in the system.
|
lacp
To turn on Link Aggregation Control Protocol (LACP), use the lacp command in Interface configuration mode. To turn off lacp, use the no form of this command.
lacp
no lacp
Syntax Description
This command has no keywords or arguments.
Command Defaults
None
Command Modes
Interface configuration (config-if) mode.
Usage Guidelines
The port channel must be configured on both the switch and the host side before enabling LACP. Speed and duplex must be the same for both the switch and host. To configure LACP on the switch side, every interface must be configured.
For load balancing, the round robin method alone is not supported with LACP.
Examples
The following example shows how to turn on LACP:
ServiceEngine(config)# interface portChannel 1
ServiceEngine(config-if)# lacp
The following example shows how to turn off LACP:
ServiceEngine(config)# interface portChannel 1
ServiceEngine(config)# no lacp
The following example shows how to configure the load balancing on a global basis:
ServiceEngine(config)# port-channel load-balance
This command can also include various load balancing methods:
•
dst-ip—Destination IP Address (default)
•
dst-mac—Destination Mac Address
•
dst-mixed-ip-port—Destination IP Address and Layer 4 port, supported in 6500 and 7600
•
dst-port—Destination Layer 4 port
•
round-robin—Round Robin
•
src-dst-ip—Source and Destination IP Address
•
src-dst-ma—Source Destination Mac Address
•
src-dst-mixed-ip-port—Source and Destination IP Address and Layer 4 port, supported in 6500 and 7600
•
src-dst-port—Source and Destination Layer 4 port
•
src-mixed-ip-port—Source IP Address and Layer 4 port, supported in 6500 and 7600
•
src-port—Source Layer 4 port
Related Commands
Command
|
Description
|
show interface portchannel 1 lacp
|
Displays the LACP port channel status.
|
show lacp
|
Displays LACP information.
|
line
To specify terminal line settings, use the line command in Global configuration mode. To disable terminal line settings, use the no form of this command.
line console carrier-detect
no line console carrier-detect
Syntax Description
console
|
Configures the console terminal line settings.
|
carrier-detect
|
Sets the device to check the carrier detect signal before writing to the console.
|
Command Defaults
This feature is disabled by default.
Command Modes
Global configuration (config) mode.
Usage Guidelines
You should enable carrier detection if you connect the SE, SR, or CDSM to a modem for receiving calls. If you are using a null modem cable with no carrier detect pin, the device might appear unresponsive on the console until the carrier detect signal is asserted. To recover from a misconfiguration, you should reboot the device and set the 0x2000 bootflag to ignore the carrier detect setting.
Examples
The following example shows how to specify terminal line settings:
ServiceEngine(config)# line console carrier-detect