Académique Documents
Professionnel Documents
Culture Documents
Technical Training
08-10-2010
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15
of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment
generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15
of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If the equipment causes interference to radio or television reception, which can be determined by turning the equipment off and on,
users are encouraged to try to correct the interference by using one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Modifications to this product not authorized by Cisco could void the FCC approval and negate your authority to operate the product.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version
of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL
FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE
PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. [Insert any required attribution of a third party mark.] [Other] Third party trademarks mentioned are the property of their respective owners. The use of
the word partner does not imply a partnership relationship between Cisco and any other company.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output,
network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is
unintentional and coincidental.
Gprs/Umts Trouleshooting
2010 Cisco Systems, Inc. and/or its affiliated entities. All rights reserved.
Table of Contents
Lesson 1: ST16/ASR5000 Hardware Troubleshooting
1-1
2-1
3-1
4-1
4-15
5-1
5-5
GPRS/UMTS Trouleshooting
ST16/ASR5000
Hardware
Troubleshooting
Lesson 1
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1-1
GPRS/UMTS Trouleshooting
Lesson Overview
This module outlines a methodology for troubleshooting the hardware of the
ST16/ASR5000.
Starting with a broad view, important CLI commands are presented and illustrated
that can be used to verify the integrity of the system. Then you will be shown CLI
commands that allow you to take a close look at each card and each port.
1-2
GPRS/UMTS Trouleshooting
Lesson Overview
In this module, a hardware troubleshooting
methodology will be presented.
Hardware-related CLI commands will be introduced
that provide detailed information about the system,
each card, and each port
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1-3
GPRS/UMTS Trouleshooting
The show temp command displays the present temperature of each installed card.
The show maximum-temperatures command shows the highest temperature
reached on each card, and when it occurred.
1-4
GPRS/UMTS Trouleshooting
Mounting brackets
show power
show power all
Line cards
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1-5
GPRS/UMTS Trouleshooting
Field
Description
SPC/SMC,
PAC/PSC
Which Switch Fabric modes the card can do. Possible values are:
- control plane
- switch fabric
Card
Programmables
All
Slave SCB
PAC/PSC, SPIO,
RCC, and line
cards
SPC CPLD
SPC
SRM
SMC
CIF FPGA
SMC
PSR
PSC
BIOS
PSC, SMC
DT FPGA
PSC
Switch Fabric
Modes
1-6
GPRS/UMTS Trouleshooting
Slot 25
SPIO (standby
Slot 32
Slot 24
SPIO (active)
S S
P
P
I
O I
(R)O
Slot 17
RR
CC
CC
Slot 48
Slot 33
Slot 1
Chassis rear
Slot 41
RCC
Slot 40
RCC
Slot 16
Slot 8
SPC/SMC (active)
Chassis front
Slot 9
SPC/SMC (standby)
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1-7
GPRS/UMTS Trouleshooting
Description
Administrative
State
Indicates whether or not the card has been configured for use via software. If it has
been configured, Enabled will be displayed. If not, Disabled will be displayed.
Description
MAC Address
The media access control (MAC) address for the port. If Virtual MAC addressing is
enabled the MAC address displayed is followed by (Virtual).
Link State
Link Duplex
The actual duplex mode currently being used for the link. Either Full or Half will be
displayed.
Link Speed
The actual data rate currently being supported by the port. Either 10 Mb, 100 Mb,
or 1000 Mb will be displayed.
Operational
State
The operational state and mode of the card. The operational state is listed first
followed by a comma ( , ), then the operational mode. The operational state is
listed as either Up or Down. The operational mode of the card that the port belongs
to. The card can be in one of the following modes:
Active: Indicates that the card is an active component that will be used to process
subscriber data sessions.
Standby: Indicates that the card is a redundant component. Redundant
components will become active through manual configuration or automatically
should a failure occur.
Offline: Indicates that the card is installed but is not ready to process subscriber
data sessions. This could be due to the fact that it is not completely installed (i.e.
the card interlock switch is not locked, refer to the System Installation Guide for
information on installing cards in the system) or that its processes have been
halted.
1-8
GPRS/UMTS Trouleshooting
Console Port
GE Lan
Interface
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1-9
GPRS/UMTS Trouleshooting
Applicable
Line Card(s)
Description
RX OVF
FELC/GELC
RX
SHORT
OK
FELC/GELC
RX
SHORT
CRC
FELC/GELC
RX
NORM
CRC
FELC/GELC
RX
LONG
OK
FELC/GELC
RX
LONG
CRC
FELC/GELC
RX
PAUSE
FELC/GELC
RX FALS FELC/GELC
CRS
RX
GPCS
ERR
GELC
TX
PAUSE
FELC/GELC
TX ERR
FELC/GELC
1-10
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11
1-11
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1-12
12
GPRS/UMTS Trouleshooting
ST16/ASR5000 Software
Troubleshooting
Lesson 2
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2-1
GPRS/UMTS Trouleshooting
Lesson Overview
This module provides a collection of CLI commands that could be used for
troubleshooting the software of the ST16/ASR5000.
The CLI commands shown will allow you to:
2-2
gain some visibility into the call processing behavior of the system.
GPRS/UMTS Trouleshooting
Lesson Overview
Software-related CLI commands will be introduced
that provide:
Detailed information about the operating system
Insight into call processing behavior
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2-3
GPRS/UMTS Trouleshooting
2-4
On what CP it is running
Allocated/used memory
Allocated/used files
Allocated/used session
General Status
GPRS/UMTS Trouleshooting
(active)
(standby)
SMC
SMC
vpnctrl
Controller
tasks
sessctrl
Control Bus
CP0
CP0
aaamgr
sessmgr
sessmgr
CP0
aaamgr
vpnmgr
a11mgr
CP1
CP1
sessmgr
aaamgr
PSC
CP1
aaamgr
sessmgr
PSC
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
PSC tasks
sub-manager
2-5
GPRS/UMTS Trouleshooting
how many sessions are being handled by the manager, and from what
service.
the maximum number of sessions, per service, that have been handled by
this instance of the session manager.
2-6
GPRS/UMTS Trouleshooting
(active)
(standby)
SMC
SMC
vpnctrl
sessctrl
Control Bus
CP0
CP0
aaamgr
sessmgr
sessmgr
CP0
aaamgr
vpnmgr
a11mgr
CP1
CP1
sessmgr
aaamgr
PSC
CP1
aaamgr
sessmgr
PSC
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
PSC
2-7
GPRS/UMTS Trouleshooting
2-8
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Licensed
2-9
GPRS/UMTS Trouleshooting
2-10
GPRS/UMTS Trouleshooting
RNC
SGSN
RNC
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11
2-11
GPRS/UMTS Trouleshooting
Field
Description
Attached Subscribers
Total Attached
3G Attached
2G Attached
Home Subscribers
Total Home
3G Home
2G Home
Total-Visiting-Foreign
3G-Visiting-Foreign
2G-Visiting-Foreign
Activated Subscribers
Total Activated
3G Activated
2G Activated
Message Statistics
IMSI
Total-IMSI-Attach
2-12
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
13
2-13
GPRS/UMTS Trouleshooting
MAP Details
You can get multiple counters related to the MAP operations of the SGSN using the
show map statistics.
Here is an example of the output of this command:
MAP Statistics:
Open Req TX:
Open Response TX:
Close Req TX:
Abort Req TX:
Authentication Req TX:
Failed:
Check IMEI Req TX:
Failed:
GPRS Loc Upd Req TX:
Failed :
Ins Sub Data(ISD)Reqs RX:
ISD Rsp TX :
Del Sub Data Req RX :
Failure Rsp TX :
Auth Fail Rep Req TX :
Failed :
Cancel Location Req RX :
Failure Rsp TX :
Purge Req TX :
Failed :
MO FWD Req TX :
Failed :
MT FWD Req RX :
Failure Rsp Tx:
Ready For SM Req TX :
Failed :
HLR RESET RX :
General Stats:
Open Rsp Failure :
Version Mismatch :
2-14
2
Open Req RX:
0
Open Rsp RX:
2
0
Close Req RX:
2
0
Abort Req RX:
0
4
Successful:
4
0
Timed Out
0
Successful:
0
0
Timed Out
1
Successful:
1
0
Timed Out:
1
StandAlone ISD Req RX:
0
1
ISD Failure Rsp TX:
0
Successful Rsp TX:
0
0
0
Successful:
0
0
Timed Out
0
Successful Rsp TX:
0
0
0
Successful:
0
0
Timed Out:
0
Successful:
0
Timed Out:
0
Successful Rsp Tx:
0
0
Successful:
0
Timed Out:
0
0
0
0
0
0
0
0
0
0
0
0
0
0
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
15
2-15
GPRS/UMTS Trouleshooting
GTP-related Statistics
The GTP tunneling operation of the system can be observed using one of the
commands shown on the opposite page. You can view GTP statistics per SGSN,
Per GGSN, per APN etc.
You can also view GTP statistics per subscriber as long as you know either the
callid, username, msid, or imsi. This, too, is shown on the opposite page.
2-16
GPRS/UMTS Trouleshooting
VLR
MSC
SS7
Network
Radius
AAA
RAN
Iu
Interface
BTS
BSC
Mobile
Node
Gn
Core Network
Gn
Gi
RNC
PDN
Radio Tower
SGSN
GGSN
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
17
2-17
GPRS/UMTS Trouleshooting
RADIUS Commands
A detailed look at the RADIUS subsystem on the ST16/ASR5000 can be obtained
using the commands shown on the opposite page.
However, it is important to remember that these commands execute within a
context, and if there are no RADIUS servers in that context you will not receive any
output. So you must first change your context to that which contains some RADIUS
configuration, and then execute the commands.
2-18
GPRS/UMTS Trouleshooting
HLR
VLR
MSC
SS7
Network
Radius
AAA
RAN
Iu
Interface
BTS
BSC
Mobile
Node
Gn
Core Network
Gn
Gi
RNC
PDN
Radio Tower
SGSN
GGSN
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
19
2-19
GPRS/UMTS Trouleshooting
2-20
GPRS/UMTS Trouleshooting
HLR
VLR
SS7
Network
MSC
Home
AAA
AAA
RAN
Mobile
Node
R-P
Interface
BTS
BSC
Pi
IP Network
Pi
PDN
PCF/RNC
Correspondent
Node (CN)
Radio Tower
PDSN serving
as Foreign
Agent (FA)
Home Agent
(HA)
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
21
2-21
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2-22
22
GPRS/UMTS Trouleshooting
ST16/ASR5000
Logging
Lesson 3
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3-1
GPRS/UMTS Trouleshooting
Lesson Overview
This module introduces and defines the various types of logging that can be done
on the system. System logs are generated by various facilities on the system. You
can control the verbosity of these logs as well as which facility adds information to
the system log.
There are five types of logging possible: runtime, active, trace, monitor, and crash.
All of these are discussed in this lesson.
3-2
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3-3
GPRS/UMTS Trouleshooting
Runtime Logging
Event logs are stored in a memory buffer on the active management module. They
are not stored on the flash card.
The buffer used for event log storage can store up to 50,000 events. Once this
buffers reaches its capacity, the oldest information is removed to make room for the
newest. To prevent the loss of log data, the system can be configured to transmit
logs to a syslog server over a network interface.
By default, all facilities on the system are configured to submit events to the event
log that are of a severity level error. This is referred to as runtime logging.
To see a list of facilities that can contribute to the event log, and the severity level
they are set to, you can use the following command:
show logging
To view the contents of the system log (memory buffer), use the following command:
show logs
3-4
GPRS/UMTS Trouleshooting
Runtime Logging
These are logs that are generated by various facilities on the system
Enabled by default at system boot, set a a severity level of error
Output sent to SPIO console and stored in active memory buffer on
SMC/SPC module
Buffer has 50,000 event capacity
When full, wraps around to beginning (oldest events lost)
Optionally, output can be sent to an external syslog server
Use show logging command to view default runtime logging settings
System facilities
aaaclient
aaamgr
aaaproxy
.
.
user-data
user-l3tunnel
vpn
Active Buffer
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3-5
GPRS/UMTS Trouleshooting
Description
facility
Specifies the facility to log information for. A facility is a protocol or task that is
in use by the system. a complete list of facilities that can be seen with the
show logging command.
report_level
Specifies the log severity level for the filter. report_level can be one of the
following severity level:
critical: Logs only those events indicating a serious error has occurred that
is causing the system tor a system component to cease functioning. This is
the highest severity level.
error: Logs events that indicate an error has occurred that is causing the
system or a system component to operate in a degraded state. This level also
logs events with a higher severity level.
warning: Logs events that may indicate a potential problem. This level also
logs events with a higher severity level.
unusual: Logs events that are very unusual and may need to be
investigated. This level also logs events with a higher severity level.
info: Logs informational events and events with a higher severity level.n
trace: Logs events useful for tracing and events with a higher severity level.
debug: Logs all events regardless of the severity.
NOTE: It is recommended that a level of error or critical be configured to
maximize the value of the logged information while minimizing the quantity of
logs generated.
critical-info
no-criticalinfo
Specifies that events with a category attribute of critical information are not to
be displayed.
3-6
GPRS/UMTS Trouleshooting
Active Buffer
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3-7
GPRS/UMTS Trouleshooting
Description
Specifies the IP address of the Syslog server. ip_address is an IP
address in dotted decimal notation.
Specifies the local facility for which the logging options shall be applied
as one of facilities:
facility facilities
local0, local1, local2, local3, local4, local5, local6, or local7.The default
is local7.
rate value
Specifies the rate in which log entries are allowed to be sent to the
system log server. value must be an integer from 0 through 100000.
The default is 1000 events per second.
pdu-verbosity
pdu_level
pdu-data format
Specifies output format for protocol data units when logged as one of
format:
none: Displays results in raw, or unformatted text
hex: Displays results hexadecimal format
hex-ascii: Displays results in hexadecimal and ASCII similar to a mainframe dump
event-verbosity
event_level
3-8
GPRS/UMTS Trouleshooting
Buffer
Capacity: 50,000K events
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3-9
GPRS/UMTS Trouleshooting
Active Logging
Active logging is when the system is configured to send events to a specific CLI
instance. Active logging is configurable on a CLI instance-by-CLI instance.
Each active log can be configured with filter and display properties that are
independent of those configured globally for the system. Active logs are displayed in
real time as they are generated and are not written to the active memory buffer by
default.
The command to configure active logging for a particular CLI instance is:
logging active
logging filter active facility facility level report_level [
critical-info | no-critical-info ]
Keyword/Variable
Description
facility
Specifies the facility to log information for. A facility is a protocol or task that is
in use by the system. a complete list of facilities that can be seen with the
show logging command.
report_level
Specifies the log severity level for the filter. report_level can be one of the
following severity level:
critical: Logs only those events indicating a serious error has occurred that
is causing the system tor a system component to cease functioning. This is
the highest severity level.
error: Logs events that indicate an error has occurred that is causing the
system or a system component to operate in a degraded state. This level also
logs events with a higher severity level.
warning: Logs events that may indicate a potential problem. This level also
logs events with a higher severity level.
unusual: Logs events that are very unusual and may need to be
investigated. This level also logs events with a higher severity level.
info: Logs informational events and events with a higher severity level.n
trace: Logs events useful for tracing and events with a higher severity level.
debug: Logs all events regardless of the severity.
NOTE: It is recommended that a level of error or critical be configured to
maximize the value of the logged information while minimizing the quantity of
logs generated.
critical-info
no-criticalinfo
Specifies that events with a category attribute of critical information are not to
be displayed.
3-10
GPRS/UMTS Trouleshooting
Active Logging
Allows a CLI user (with operator priv or above) to view events of specific
facilities
CLI users can independently set their own logging display and filtering
properties
2.
3.
Turn off active logging: no logging active (or exit from CLI
session)
CLI user 1
(logging active)
display
facility
info
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
11
3-11
GPRS/UMTS Trouleshooting
Trace Logging
Trace logging can be used to quickly isolate issues that may arise for a specific
subscriber session that is already connected. Traces can be started for a particular
session based on call identification (callid) number, IP address, mobile station
identification (MSID) number, or username.
Note that the session must be up before it can be traced. This type of logging
cannot be used to view logging information about a call that is being established, or
about to be established.
Trace logging is a refined form of active logging: from an active trace of the session
manager, you are filtering all output except that of a single subscriber (session).
The output from trace logging goes directly into the system log. There is nothing
displayed in the CLI session where the trace was started.
Also note that trace logging can affect performance. Under heavy system load, they
can be intrusive to the processing of a session.
The command used to start a trace is shown in the slide. The table below provides
some details:
Keyword/Variable
Description
callid call_id
Indicates a trace log will be generated for a session identified by the call
identification number. call_id is specified as a 4-byte hexadecimal number.
ipaddr
ip_address
msid ms_id
Indicates a trace log will be generated for a session identified by the mobile
station identification (MSID) number. ms_id must be from 7 to 16 digits
specified as an IMSI, MIN, or RMI.
name username
3-12
GPRS/UMTS Trouleshooting
Trace Logging
Is a refined form of active logging: you can view information about a single
subscriber session
Used to gain more information about user sessions
Implication is that user session is active
Session to be traced can be identified by any of the following:
Call-id
IP address
Mobile Stations Identifier (msid)
Subscriber username
(trace logging active)
CLI user 1
Output sent to system log
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
13
3-13
GPRS/UMTS Trouleshooting
Monitor Logging
Monitor logging records all activity associated with a particular session. This
includes call setup.
Unlike trace logging, monitor logging is a command entered while in configuration
mode. This means that that monitor becomes part of the configuration file, and will
survive system re-boots. It also means that the monitor is always running,
regardless of how many CLI sessions are active.
The output of monitor logging goes to the system log (buffer), and any associated
syslog servers.
This functionality is primarily available in order to comply with law enforcement
agency requirements for monitoring capabilities of particular subscribers.
Monitors can be performed based on a subscribers MSID, username or IP address:
Keyword/Variable
Description
msid ms_id
Indicates a monitor log will be generated for a session identified by the mobile
station identification (MSID) number. ms_id must be from 7 to 16 digits
specified as an IMSI, MIN, or RMI.
username
username
ip_addr
Specific IP address.
ipv6_addr
3-14
GPRS/UMTS Trouleshooting
Monitor Logging
Like trace logging, used to obtain detailed information about sessions, but
includes call setup
Output goes to active buffer and syslog server
Can only be started by user with administrator privilege
Not dependent on a CLI instance to run
started in config mode
runs in background
can be save to config file (survive reboots)
Does affect performance
[local]Training# config
[local]Training(config)# logging monitor username
remoteuser2
CLI user 1
Buffer
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
15
3-15
GPRS/UMTS Trouleshooting
Crash Logging
In the event of a software crash, the system stores information that could be useful
in determining the reason for the crash. This information can be maintained in
system memory or it can be transferred and stored on a network server.
The system supports the generation of the following two types of logs:
The abridged crash log will always be available. Abridged crash logs are stored on
the CompactFlash on the SPC/SMC. They are located in the /flash/crsh2/ directory
with file names in the mc-slot-cpu-pid-xxxxxxxx format. You can see a list with the
following command:
show crash list
Details of one of the entries on the list can be obtained with the following CLI
command:
show crash number <crash_number>
Details of configuring the system to store an un-abridged crash log are shown on
the next slide.
3-16
GPRS/UMTS Trouleshooting
Crash Logging
Stores information about software crashes on the system
Used for debugging by Cisco engineering
Two flavors:
Abridged (mini-core) crash log automatically configured
and stored in memory on SMC module
Un-abridged (core) crash log core; must be configured and
is stored on an external device (CF, PCMCIA or network
server)
Compact Flash on SMC/SPC
Process
Crash
abridged
(default)
/crsh2/
mc-xx-xx-xxxxx.xxxxxxx
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
17
3-17
GPRS/UMTS Trouleshooting
Network Server - Any workstation or server on the network that the system
can access using the Trivial File Transfer Protocol (TFTP), the File Transfer
Protocol (FTP), the Secure File Transfer Protocol (SFTP), or the Hyper-Text
Transfer Protocol (HTTP); this is recommended for large network
deployments in which multiple systems require the same configuration.
The table below provides some details of the command shown on the opposite
page:
Keyword/Variable
Description
encrypted
filename-pattern
pattern
url crash_url
Specifies the path and name that the configuration file is to be stored to.
crash_url represents the Universal Resource Locator for the configuration
file and can be expressed in one of the following formats:
{ /flash | /pcmcia1 | /hd }/directory/file_name
file:/{ /flash | /pcmcia1 | /hd } /directory/file_name
tftp://{ ipaddress | host_name }/directory/file_name
ftp://[ username [ :password ] @ ] { ipaddress |
host_name }/directory/file_name
sftp://[ username [ :password ] @ ] host [ /path ] /filename
restrict mbyte
Specifies the maximum amount of memory to use for storing crash files on a
local device. This keyword should only be used if the URL points to a local
device.
The default is 128 megabytes.
3-18
GPRS/UMTS Trouleshooting
Process
Crash
abridged
(default)
/crsh2/
mc-xx-xx-xxxxx.xxxxxxx
Un-abridged
(requires configuration)
CF, PCMCIA or network
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
19
3-19
GPRS/UMTS Trouleshooting
3-20
Runtime logging filter settings a list of all facilities and their present filter
setting.
Syslog configuration if any syslog servers are configured, this will be shown.
Disabled Event logs certain logging events can be disabled so that they will
not be seen in the system log. If configured, the disabled event IDs will be
shown.
Console logging state normally, all entries in the system log are also
displayed at the console; therefore the default setting is enabled.
Configure logging monitors if a monitor log has been configured for any
subscribers, it will be listed here.
GPRS/UMTS Trouleshooting
Syslog configuration
Trace logging configured
Disabled event logs
Console logging state
Configured logging monitors
CLI sessions
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
21
3-21
GPRS/UMTS Trouleshooting
From the syslog server - If the system is configured to send logs to a syslog
server, the logs can be viewed directly on the syslog server.
From the system CLI - Logs stored in the system memory buffers can be
viewed directly from the CLI.
There are two memory buffers that store event logging information. The first buffer
stores the active log information. The second buffer stores inactive logging
information. The inactive buffer is used as a temporary repository to allow you to
view logs without having data be overwritten. Logs are copied to the inactive buffer
only through manual intervention.
Use the show logs command to view the system event log:
Keyword/Variable
Description
active
inactive
callid call_id
facility
facility
Specifies the facility to log information for. A facility is a protocol or task that
is in use by the system. Refer to the Supported Logging Facilities section for
a complete list of facilities that can be used with this keyword.
level
report_level
Specifies the log severity level for the filter. report_level can be one of the
following: critical, error, warning, unusual, info, trace, debug
since
from_date_time
Specifies that only logs generated after a specific time (from_date_time) are
to be displayed.
from_date_time must be formatted as YYYY:MM:DD:HH:mm or
YYYY:MM:DD:HH:mm:ss.
until
to_date_time
3-22
GPRS/UMTS Trouleshooting
Active Buffer
23
3-23
GPRS/UMTS Trouleshooting
3-24
GPRS/UMTS Trouleshooting
25
3-25
GPRS/UMTS Trouleshooting
Event ID Range
90000-90999
91000-91999
30000-30999
77000-77499
53000-53999
2000-2999
66000-66999
47000-47999
98000-98099
45000-45999
21000-21999
20000-20999
55000-55999
48000-48999
69000-69999
94000-94999
17000-17999
25000-25999
23000-23999
10000-12999
22000-22999
1000-1999
3-26
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
27
3-27
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3-28
28
GPRS/UMTS Trouleshooting
ST16/ASR5000
Alarms and Traps
Lesson 4
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4-1
GPRS/UMTS Trouleshooting
Lesson Overview
In this lesson, you are shown the most efficient commands to use in order to view
alarms and/or traps on the system.
4-2
GPRS/UMTS Trouleshooting
Lesson Overview
This module shows important CLI commands for
viewing:
SNMP traps
System alarms
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4-3
GPRS/UMTS Trouleshooting
4-4
GPRS/UMTS Trouleshooting
Alarms
SSH
SNMP
traps
HP OpenView(tm) or
Other NMS
CLI session
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4-5
GPRS/UMTS Trouleshooting
Viewing Alarms
Alarms do not exist unless they are asserted, or outstanding. Therefore, when you
are viewing any alarm, you are viewing outstanding alarms
From a CLI session, you can use the following command to view alarms and some
details about each one:
show alarm outstanding verbose
A sample output from this command is shown in the slide on the opposite page.
You can view some general alarm-related statistics with the following command:
show alarm all
This command also provides some general statistics on the number of alarms that
have occurred, the state of the audible alarm on the SPC/SMC front plate, and the
state of the central office alarm connector on the SPIO card.
4-6
GPRS/UMTS Trouleshooting
Viewing Alarms
Use the following command to view alarm-related
information on the system:
show alarm outstanding all verbose
Timestamp
---------------------------Thursday January 22 07:19:3
Thursday January 22 07:19:3
Thursday January 22 07:19:3
Thursday January 22 07:19:3
Thursday January 22 07:19:3
Alarm ID
----------------------------------5765627287628283904 Port link down
5765627287628283905 Port link down
5765627287628283906 Port link down
5765627287628283907 Port link down
5765627287628283908 Port link down
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4-7
GPRS/UMTS Trouleshooting
Viewing Traps
The best way to view traps that have been sent to a trap manager is to use the
following CLI command:
show snmp trap history
A sample output of this command is shown on the opposite page.
Note that you will not see all traps that have been sent since the system last booted.
You will only see the last four hundred traps. These traps are stored in memory, and
the amount of memory reserved for this purpose is limited.
Anther command that is related to SNMP traps:
show snmp trap statistics
The output of this command shows a cumulative count of traps that have been sent
by the ST16/ASR5000.
4-8
GPRS/UMTS Trouleshooting
Viewing Traps
Use this command to view traps that have been sent to an
external manager:
show snmp trap history
[local]Training# show snmp trap history
There are 83 historical trap records (400 maximum)
Timestamp
Trap Information
------------------------ ---------------------------------------------------Thu Jan 22 07:17:27 2009 Internal trap notification 5 (CardUp) card 8
Thu Jan 22 07:17:27 2009 Internal trap notification 55 (CardActive) card 8
Thu Jan 22 07:17:27 2009 Internal trap notification 55 (CardActive) card 24
Thu Jan 22 07:17:28 2009 Internal trap notification 93 (CardStandby) card 25
Thu Jan 22 07:17:28 2009 Internal trap notification 93 (CardStandby) card 24
Thu Jan 22 07:17:28 2009 Internal trap notification 36 (PortLinkUp) card 24
port 3 ifindex 402849792
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4-9
GPRS/UMTS Trouleshooting
4-10
GPRS/UMTS Trouleshooting
Timestamp
Alarm ID
---------------
Minor
Port 36/8
11
4-11
GPRS/UMTS Trouleshooting
Description
Current
Alarm View
This dialog box displays SNMP events and alarms received from all managed
systems that are configured to report fault information to the EMS.
Historical
Alarm View
Allows you to browse the alarm database on the Web Element Manager for
alarms that have occurred in the past
The Pending Alarm View function performs alarm correlation between incoming
SNMP Events/Traps, denoting a cleared state or an alarm state. If an SNMP trap
such as "Link Down" is received by the EMS server and no corresponding
View Pending clearing SNMP event (in this case Link Up) is received, then the Link Down
trap displays in the Pending Alarm View window. When the Link Up trap is
Alarms
received, the EMS server correlates this clearing event with its corresponding
Link Down event and then automatically removes the event from the Pending
Alarm View. The particular alarms are defined and stored in a configuration file
located on the EMS server. These alarms are not user definable.
Alarm
Information
View
Outstanding
Alarms
Shows only outstanding alarms. Equivalent to the CLI command show alarm
outstanding.
Outstanding
Alarm Statistics
Show alarm statistics for a particular chassis. Equivalent to the CLI command
show alarm statistics.
Alarm History
CO Alarm
Configuration
Shows the present state of the chassis audible alarm and the Central Office
alarm outputs.
Audio Alarm
Scheduler
Provides a schedule for disabling audio alarm on the WEM for specific severity
levels of traps
Audio Alarming
4-12
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
13
4-13
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4-14
14
GPRS/UMTS Trouleshooting
Lab Overview
This lab consists of a series of exercises that allow you to execute various CLI
commands that are related to troubleshooting the system.
Upon completing this lesson, you will be able to:
4-15
GPRS/UMTS Trouleshooting
4-16
GPRS/UMTS Trouleshooting
4-17
GPRS/UMTS Trouleshooting
count
pattern
size
src
Description
The IP address of the remote node which is the target of the ping
command.
Specifies the number of packets to send to the remote host for
verification. num_packets must be within the range 1 through
10000. The default is 5.
Specifies a pattern to use to fill the internet control message
protocol packets with. packet_pattern must be specified in
hexadecimal format with a value in the range hexadecimal 0x0000
through 0xFFFF. packet_pattern must begin with a 0x followed by
up to 4 hexadecimal digits. The default is that each octet of the
packet is encoded with the octet number of the packet.
Specifies the number of bytes each IP datagram. octet_count must
be a value in the range 40 through 18432. The default is 56.
Specifies an IP address to use in the packets as the source node.
src_host_name: specifies the source node using the nodes logical
host name which must be resolved via DNS lookup.
src_host_ip_address: specifies the source node using the nodes
assigned IP address The default is the IP address of the interface
through which the ping was issued.
GPRS/UMTS Trouleshooting
source of significant packet delays or packet loss on the network. This command
can also be used to identify bottlenecks in the routing of data over the network.
The command has the following syntax:
traceroute { <host_name> | <host_ip_address> } [ count
<packets> ] [ df ] [ maxttl <max_ttl> ] [ minttl <min_ttl> ]
[ port <port_number> ][ size <octet_count> ] [ src
{ <src_host_name> | <src_host_ip_address> } ][ timeout
<seconds> ]
Keyword/Variable
host_name
host_ip_address
count
df
maxttl
minttl
port
size
Description
Identifies the remote node to trace the route to by the hostname.
host_name specifies the remote node using the nodes logical
host name which must be resolved via DNS lookup.
Identifies the remote node to trace the route to by the IP address.
host_ip_address specifies the remote node using the nodes
assigned IP address specified using the standard IPv4 dotteddecimal notation.
Specifies the number of UDP probe packets to send. The default
is 3.
Indicates the packets for the tracing of the route should not be
fragmented. If a packet would require fragmenting then it is
dropped and the ICMP response Unreachable, Needs
Fragmentation is received.
Specifies the maximum time to live (TTL), in seconds, for the
route tracing packets. max_ttl must be specified as a value in the
range of 1 through 255. It is an error if max_ttl is less than min_ttl
whether min_ttl is specified or defaulted. The time to live is the
number of hops through the network, i.e., it is not a measure of
time. The default maximum TTL is 30 seconds.
Specifies the minimum time to live, in seconds, for the route
tracing packets. min_ttl must be specified as a value in the range
of 1 through 255. It is an error if min_ttl is greater than max_ttl
whether max_ttl is specified or defaulted. The time to live is the
number of hops through the network, i.e., it is not a measure of
time. The default minimum TTL is 1 second.
Specifies a specific port to connect to where port_number must
be a value in the range 1 through 65535. The default port is
33434.
Specifies the number of bytes each packet. octet_count must be
a value in the range 40 through 32768. The default is 40.
4-19
GPRS/UMTS Trouleshooting
Keyword/Variable
src
timeout
Description
Specifies an IP address to use in the packets as the source
node. src_host_name: specifies the remote node using the
nodes logical host name which must be resolved via DNS
lookup. src_host_ip_address: specifies the remote node using
the nodes assigned IP address specified using the standard
IPv4 dotted decimal notation. The default is the IP address of the
interface through which the ping was issued.
Specifies the maximum time to wait for a response from each
route tracing packet. seconds must be a value in the range 2
through 100. The default is 5.
Viewing IP Routes
The system provides a mechanism for viewing route information to a specific node
or for an entire context. This information can be used to verify network connectivity
and to ensure the efficiency of the network connection. The command has the
following syntax:
show ip route [<route_ip_address> [<route_gw_address>]]
Keyword/Variable
route_ip_address
route_gw_address
Description
Specifies the IP address of a network node for which route
information will be displayed. route_ip_address must be
expressed in dotted-decimal notation.
Specifies the IP address of the gateway router between the
system and the
network node for which route information will be displayed.
This is an optional
keyword. route_gw_address must be expressed in dotteddecimal notation.
If no keywords are specified, all IP routes within the contexts routing table will be
displayed.
4-20
GPRS/UMTS Trouleshooting
4-21
GPRS/UMTS Trouleshooting
4-22
GPRS/UMTS Trouleshooting
4-23
GPRS/UMTS Trouleshooting
imsi
ipaddr
msid
next-call
username
4-24
Description
Specifies that the monitor is executed for a subscriber
with a specific call identification number (callid). call_id
is the specific call identification number that you wish to
monitor. This must be an 8-byte Hexadecimal number.
Specifies that the monitor is executed for a subscriber
with a specific International Mobile Subscriber Identity
(IMSI) number. imsi is the specific International Mobile
Subscriber Identity number that you wish to monitor.
This must be an IMSI number with a maximum of 15
digits.
Specifies that the monitor is executed for a subscriber
with a specific IP address. ip_address is the specific IP
address that you wish to monitor entered in IPv4 dotted
decimal notation (###.###.###.###).
Specifies that the monitor is executed for a subscriber
with a specific mobile station identification (MSID)
number. ms_id is the specific mobile station
identification number that you wish to monitor. This
must be an MSID number with a maximum of 15 digits.
Monitor the next call made to the system across all
active services.
Specifies that the monitor is executed for a subscriber
with a specific username. subscriber_name is the
specific username that you wish to monitor. The
username must be a string of 1 to 127 alpha and/or
numeric characters.
GPRS/UMTS Trouleshooting
2. If no session matching the specified criteria was being processed when the
monitor was invoked, NO MATCHING CALL - waiting for a matching call to
connect... is displayed.
3. Configure the amount of information that is to be displayed by the monitor. To
enable or disable options, enter the letter associated with that option (C, D, E,
etc.). To increase or decrease the verbosity, use the plus ( + ) or minus ( - )
keys.
The current state, ON (enabled) or OFF (disabled), is shown to the right of each
option.
4. Repeat step 3 as needed to enable or disable options.
5. Choose the protocols that you wish to monitor by entering the number
associated with the protocol (11 through 19 or 21 through 23).
The current state, ON (enabled) or OFF (disabled), is shown to the right of each
protocol.
6. Repeat step 5 as needed to enable or disable multiple protocols.
7. Press the Enter key to update the menu screen
4-25
GPRS/UMTS Trouleshooting
4-26
GPRS/UMTS Trouleshooting
The following is a sample of this commands output for a successful response when
testing a RADIUS authentication server with an IP address of 192.168.250.150 on
port 1812.
Authentication from authentication server 192.168.250.150,
port 1812
Authentication Success: Access-Accept received
Round-trip time for response was 8.8 ms
4-27
GPRS/UMTS Trouleshooting
Description
Specifies an individual slot in the chassis for
which to display power status.
Specifies that the power status of all chassis
slots should be displayed.
4-28
GPRS/UMTS Trouleshooting
Active: Indicates that the card is an active component that will be used to
process subscriber data sessions.
Standby: Indicates that the card is a redundant component. Redundant
components will become active through manual configuration or
automatically should a failure occur.
Ready: Indicates that an Ethernet 10/100 or Ethernet 1000 line card is
installed behind a PAC/PSC in Standby mode.
Offline: Indicates that the card is installed but is not ready to process
subscriber data sessions. This could be due to the fact that it is not
completely installed (i.e. the card interlock switch is not locked) or that its
processes have been halted.
4-29
GPRS/UMTS Trouleshooting
Direct: The line card is operating in conjunction with the application card
installed directly in front of it.
Cross: The SPIO installed in slot 24 is operating in conjunction with the
SPC/SMC installed in slot 9 or the SPIO in slot 25 is operating in conjunction
with the SPC/SMC in slot 8.
IMPORTANT: Cross mappings will only occur if the SPC/SMC that the SPIO was
formerly operating behind became disabled (either automatically due to an error,
or through manual configuration).
4-30
GPRS/UMTS Trouleshooting
show hardware
inventory
Description
This command provides a table that lists all of the
cards installed in the
chassis and their hardware revision, part, serial,
assembly, and fabrication numbers.
This command provides a table that lists all of the
cards installed in the
chassis and their hardware revision, and the
firmware version of the
on-board Field Programmable Gate Array
(FPGAs).
This command is used to provide detailed
information about a specific card. It reports all of
the same information for the card as the previous
two commands and also includes the cards
description, and information on the CPUs (if
executed for a PAC/PSC or SPC/SMC).
4-31
GPRS/UMTS Trouleshooting
4-32
GPRS/UMTS Trouleshooting
slot_number
port_number
Description
Specifies the number of the chassis slot in
which the card containing the
port is located and can be any integer value
between 17 through 39 and
42 through 48.
Specifies the number of the port that you wish
view information for. For
example, 24/1 would represent the first port on
the SPIO installed in slot
24.
4-33
GPRS/UMTS Trouleshooting
To display the output on your console and write it to a tar file, enter the following
command at the Exec mode prompt:
show support details to file <url>
Keyword/
Variable
Description
Specifies the location where a tar file with the support detail
information should be created. url may refer to a local or a remote
file. url must be entered using one of the following formats:
to file <url>
ST16:
[ file: ] { /flash | /pcmcia1 | /pcmcia2 } [ /directory ]/file_name
tftp://{ host[ :port# ] } [ /directory ]/file_name
[ ftp: | sftp: ]//[ username[ :password ]@ ]
{ host }[ :port# ][ /directory ]/file_name
ASR5000:
[ file: ] { /flash | /pcmcia1 | /hd }[ /directory ]/file_name
tftp://{ host[ :port# ] }[ /directory ]/file_name
[ ftp: | sftp: ]//[ username[ :password ]@ ]
{ host } [ :port# ] [ /directory ]/file_name
directory is the directory name.
filename is the actual file of interest.
username is the user to be authenticated.
password is the password to use for authentication.
host is the IP address or host name of the server.
port# is the logical port number that the communication protocol is
to use.
If the filename is not specified with a .tar extension, it is
automatically appended to the filename when the file is created
and a message is generated.
4-34
GPRS/UMTS Trouleshooting
Category 1 Commands
The commands that impact performance if executed while the system is under
heavy load are as follows:
Hardware Operations: Impact hardware and/or service availability
Exec Mode:
o shutdown
o reload
o card reboot
o card halt
o card restart
o card pac migrate from
o card psc migrate from
Global Config Mode:
o no require pac daughtercard
Logging: (Dependant on facilities selected and system activity, such as number of
subscribers and/or volume of data)
Exec Mode:
o logging filter active facility <XXX> level ( info |
trace | debug )
o logging trace (username <name> | msid <#> | ipaddr
<addr> )
Global Config Mode:
o logging filter runtime facility <XXX> level ( info |
trace | debug )
o logging monitor (msid <name | username <name>)
Monitor and Test Functions:
gtp test echo <XXX> <1...1000000> (Depends on number of
subscribers and/or packets)
monitor protocol (This command menu can be used to select logging of
all PDUs in the system across all calls. For subscriber protocols such as
GTP-C, RADIUS, GTP-U, etc. this can significantly impact performance. The
recommended method for doing this is to execute the "monitor subscriber"
command. Options which may impact performance issue a warning to the
user prior to execution.)
debug ip arp (This could impact GRAT-ARP generation performance
depending on system configuration and/or load.)
4-35
GPRS/UMTS Trouleshooting
Category 2 Commands
4-36
GPRS/UMTS Trouleshooting
ST16/ASR5000
Troubleshooting
Exercise
Lesson 5
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5-1
GPRS/UMTS Trouleshooting
Troubleshooting Lab
In this lab, the instructor is going to insert some configuration-related errors.
The class is going to divide into teams, with each team creating their own GGSN
configuration.
The configuration that is going to be built by each team is shown on the opposite
page.
For the details of putting this configuration in place, consult your lab guide.
5-2
GPRS/UMTS Trouleshooting
Troubleshooting Lab
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5-3
GPRS/UMTS Trouleshooting
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5-4
GPRS/UMTS Trouleshooting
5-5
GPRS/UMTS Trouleshooting
Creating Contexts
The table below lists the name of the contexts, depending on your team number.
Use this table to create the correct contexts.
Team
1
2
3
4
5
6
7
8
Ingress Context
source-1
source-2
source-3
source-4
source-5
source-6
source-7
source-8
Egress Context
destination-1
destination-2
destination-3
destination-4
destination-5
destination-6
destination-7
destination-8
config
context <ingress context name>
exit
context <egress context name>
end
5-6
Gn Interface Name
20/1-gn
20/2-gn
20/3-gn
20/4-gn
20/5-gn
20/6-gn
20/7-gn
20/8-gn
GPRS/UMTS Trouleshooting
IP address/mask
192.168.10.11/24
192.168.10.12/24
192.168.10.13/24
192.168.10.14/24
192.168.10.15/24
192.168.10.16/24
192.168.10.17/24
192.168.10.18/24
exit
exit
port ethernet <slot#/port#>
description <port description>
no shutdown
bind interface <logical int name> <logical int
context>
Team
1
2
3
4
5
6
7
8
Slot#/port
#
20/1
20/2
20/3
20/4
20/5
20/6
20/7
20/8
Port
Description
team1-gn
team2-gn
team3-gn
team4-gn
team5-gn
team6-gn
team7-gn
team8-gn
Logical Int
Name
20/1-gn
20/2-gn
20/3-gn
20/4-gn
20/5-gn
20/6-gn
20/7-gn
20/8-gn
Logical Int
Context
source-1
source-2
source-3
source-4
source-5
source-6
source-7
source-8
end
5-7
GPRS/UMTS Trouleshooting
configure
context <egress context of your team>
interface <interface name>
Team
1
2
3
4
5
6
7
8
Gi Interface Name
29/1-gi-aaa
29/2-gi-aaa
29/3-gi-aaa
29/4-gi-aaa
29/5-gi-aaa
29/6-gi-aaa
29/7-gi-aaa
29/8-gi-aaa
IP address/mask
192.168.2.1/24
192.168.2.2/24
192.168.2.3/24
192.168.2.4/24
192.168.2.5/24
192.168.2.6/24
192.168.2.7/24
192.168.2.8/24
exit
exit
5-8
GPRS/UMTS Trouleshooting
Slot#/port
#
29/1
29/2
29/3
29/4
29/5
29/6
29/7
29/8
Port
Description
team1-aaa
team2-aaa
team3-aaa
team4-aaa
team5-aaa
team6-aaa
team7-aaa
team8-aaa
Logical Int
Name
29/1-gi-aaa
29/2-gi-aaa
29/3-gi-aaa
29/4-gi-aaa
29/5-gi-aaa
29/6-gi-aaa
29/7-gi-aaa
29/8-gi-aaa
Logical Int
Context
destination-1
destination-2
destination-3
destination-4
destination-5
destination-6
destination-7
destination-8
end
configure
context <egress context of your team>
interface <interface name>
Team
1
2
3
4
5
6
7
8
5-9
GPRS/UMTS Trouleshooting
Team
1
2
3
4
5
6
7
8
IP address/mask
135.2.214.1/24
135.2.214.2/24
135.2.214.3/24
135.2.214.4/24
135.2.214.5/24
135.2.214.6/24
135.2.214.7/24
135.2.214.8/24
end
5-10
GPRS/UMTS Trouleshooting
ggsnservice
ggsn-svc-1
ggsn-svc-2
ggsn-svc-3
ggsn-svc-4
ggsn-svc-5
ggsn-svc-6
ggsn-svc-7
ggsn-svc-8
PLMN ID
mcc 201 mnc 301
mcc 202 mnc 302
mcc 203 mnc 303
mcc 204 mnc 304
mcc 205 mnc 305
mcc 206 mnc 306
mcc 207 mnc 307
mcc 208 mnc 308
Gn IP Address
192.168.10.11
192.168.10.12
192.168.10.13
192.168.10.14
192.168.10.15
192.168.10.16
192.168.10.17
192.168.10.18
end
5-11
GPRS/UMTS Trouleshooting
<apn name>
Team Context
containing
APN
1
destination-1
2
destination -2
3
destination -3
4
destination -4
5
destination -5
6
destination -6
7
destination -7
8
destination -8
5-12
APN name
AAA Group
IP Address
Pool name
APN-1
APN-2
APN-3
APN-4
APN-5
APN-6
APN-7
APN-8
aaa-1
aaa-2
aaa-3
aaa-4
aaa-5
aaa-6
aaa-7
aaa-8
pool-1
pool-2
pool-3
pool-4
pool-5
pool-6
pool-7
pool-8
GPRS/UMTS Trouleshooting
end
5-13
GPRS/UMTS Trouleshooting
IP Pool
Name
pool-1
pool-2
pool-3
pool-4
pool-5
pool-6
pool-7
pool-8
Pool Address
Range
10.11.0.0/17
10.12.0.0/17
10.13.0.0/17
10.14.0.0/17
10.15.0.0/17
10.16.0.0/17
10.17.0.0/17
10.18.0.0/17
end
5-14
GPRS/UMTS Trouleshooting
5-15
GPRS/UMTS Trouleshooting
5-16