Configuration and Monitoring Teldat-Dm70 PDF
Configuration and Monitoring Teldat-Dm70 PDF
Legal Notice
Warranty
Teldat is not liable for any direct, indirect, collateral, consequential or any other damage connected to the delivery,
supply or use of this manual.
Table of Contents
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.4.15 FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
2.4.16 FIRMWARE-CHECKING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
2.4.17 FORMAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.4.18 GLOBAL-PROFILES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.4.19 LICENCE-CHANGE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
2.4.20 LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.4.21 LOG-COMMAND-ERROR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
2.4.22 MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
2.4.23 NETWORK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
2.4.24 NO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.4.25 NODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.4.26 PRIVILEGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.4.27 PROTOCOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.4.28 QUICK CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
2.4.29 RUSH-ENGINE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
2.4.30 SAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
2.4.31 SET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
2.4.32 STRONG PASSWORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
2.4.33 TELEPHONY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
2.4.34 TIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
2.4.35 UCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
2.4.36 UNSET-DEMO-LICENCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
2.4.37 USER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
2.4.38 END . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
1.1 Introduction
All our devices employ the same user interface for every model. They only differ regarding the protocol software
loaded in each.
Local Terminal
A local terminal is directly connected to the Teldat Router through an RS-232 serial cable. For further information
see the Device Installation Manual.
Remote Terminal
The remote connections provide the same features as the local ones, except a local terminal must be used for the
initial configuration. The remote terminals are connected to the Teldat Router through TELNET, once the IP protocol
has been enabled. See manual Teldat Dm702-I TCP-IP Configuration for further information on how to enable the IP
protocol.
Through a local or remote terminal you can access the Teldat Router and carry out different processes. Said pro-
cesses are related to device configuration with status monitoring and related statistics. Messages can also be re-
ceived on any generated events. The following table provides names and additional information:
P 1 (GESTCON): This is the console management process (GESTCON). This is the starting point
for booting a console session, which accesses other processes.
P 2 (VISEVEN): This process allows events generated in the system to be displayed, from estab-
lished connections to errors in the system ( VISEVEN). These events should be
pre-configured either in process 4 (CONFIG), or in process 3 (MONITOR), through
the Event Logging System. See Event Logging System ELS on page 135 for further
details.
P 3 (MONITOR): This allows you to MONITOR the state of the system as well as the statistics
gathered by the device.
P 4 (CONFIG): This process allows you to edit all configuration parameters. From here you can
generate a complete configuration for the router without altering the operation pro-
cedure. To activate said configuration, save it in the file system and restart the
device.
P 5 (RUNNING-CONFIG): This is the process where changes in the router active configuration are affected.
The configuration changes executed here take immediate effect, however if they
aren't saved in the file system, they are lost on reboot.
Note
• Executing a command.
• User interface processes.
• Accessing the process.
• Return to the Console Manager.
• Obtaining help.
Local Connection
During device booting, the user can see information on both the device hardware and software configuration and
system startup progress. Once booting is complete, the user is asked to initiate a session by pressing any key.
User/password controls access the router local connection. By default no user is registered, so they are not reques-
ted. The first thing to appear is the welcome text and the console management prompt, as shown below.
Teldat (c)2001-2002
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
1 LAN, 2 WAN Line , 2 ISDN Line
CIT software version: ZZZZZ
*
To register a user, please see the user command in Teldat Router Configuration on page 16. Where there are en-
abled users, a user and corresponding password is requested. If authentication is accepted, then the welcome text is
shown.
User: Root
Password:****
Teldat (c)2001-2002
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
1 LAN, 2 WAN Line , 2 ISDN Line
CIT software version: ZZZZZ
where XXXXX is the specific router model, YYYY/YYYY the unit serial number and ZZZZ the CIT code release cur-
rently running.
User: Root
Password:******
Access denied
If the password is incorrectly entered, you won't be able to access the console. If you exhaust the maximum number
of erroneous attempts, the application blocks for one minute.
If you have been authenticated in the system and an inactive time period has also been configured (see the set com-
mand in Teldat Router Configuration on page 16 ), a monitoring process begins. If the configured inactive time period
times out, without the user touching any of the keys, the local connection closes. Consequently, the user must
reenter the password again when he wishes to use the console.
Depending on the user you have authenticated with, you can access the different processes and possibly execute
some restricted commands.
The user access level is specified with a value between 0 and 15 together with a mode: default or strict.
Five different predetermined access levels are defined in the default mode:
NONE [0]: System access is not allowed.
EVENTS [1]: You can access the Console Management (P1), the Events Viewing (P2), but you
cannot execute the Ping, Telnet, Restart or Load or commands.
MONITOR [5]: You can access the Console Management (P1), the Events Viewing (P2) and the
Monitoring process (P3). You can also execute the Ping and Telnet and com-
mands, but not the Restart or Load commands.
CONFIG [10]: You can access all processes and standard commands.
ROOT [15]: In addition to being able to access all the processes and the standard commands,
you can also access the user management own commands. These are explained
further on in this manual.
You must save the configuration (see the save command in chapter Teldat Router Configuration on page 16) To
maintain the users registered on restarting the device as contrariwise you lose said user configuration.
The user command manages the users and allows the following actions: add, delete, enable and disable users, list
and change the user access level:
no user name:
Deletes a user from the user list. You can eliminate as many users as you want, except if there is only one Root user
and there are other registered users. This means you can only delete the rest of the users as contrariwise you can-
not manage the remaining users. If you eliminate all the users except the last Root, then you can also delete the lat-
ter. The system subsequently does not request a user and password to access the device, as there are no users re-
gistered in the system.
Allows you to enable users. Simply indicate the user name you wish to enable.
list user:
Displays a list of registered users, their access level and if they are enabled or not.
Allows you to change the access level for any registered user, except for users with a Root access level.
For further information on the user command, please see Teldat Router Configuration on page 16.
User management is compatible with the password defined through the set password command. Therefore if you
update a device with said password enabled, this continues to allow access (through the password) while not regis-
tering any user.
Note
User management has priority over the device password; when there are registered and enabled users
(these are enabled by default when they are registered) the old password is no longer valid.
Remote connection
To connect to Teldat Router initializing a TELNET session in the host (the host being the system connected to the
remote terminal), you need the IP address for the device you want to connect to.
Example:
telnet 128.185.132.43
The Teldat Router acts as a TELNET server. The remote terminal acts as a TELNET client.
Once a TELNET session is established with the Teldat Router, you may find a user and password is requested to
access the system. Once correctly authenticated, the following welcome text appears.
User: Root
Password:****
Teldat (c)2001-2002
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
1 LAN, 2 WAN Line , 2 ISDN Line
CIT software version: ZZZZZ
*
where XXXXX is the specific router model, YYYY/YYYY the unit serial number and ZZZZ the CIT code release cur-
rently running.
Access control to the Teldat Router is similar to local mode access. If there are users defined and these are enabled
(these enable by default when created), the introduction of a user and his corresponding password is requested for
connection purposes. Once authenticated, the welcome text and prompt appear and you can access the user per-
mits (as indicated in the connection via local).
User: Root
Password:******
Access denied
Note
If the password is not entered within approximately 20 seconds, or the password provided is invalid, at
the third attempt the device disconnects the TELNET session.
Example:
user
upload
down
If you key in a u , an error is produced indicating you have entered an ambiguous command (both user and upload
begin with a u). If you enter a d , do , dow or down , said command is executed. In the same way, if you enter us ,
use or user , this command executes, and likewise up, upl , uplo , uploa or upload . Any other entry produces an
error, as no command coincides with those characters.
To delete the last character(s) from the command line use the backspace ( <-) key.
To split a long command into multiple lines, you can end a line with a backslash ( \).
Example:
Config>set \
Config>host\
Config>n MY_\
Config>HOST_N\AME
is equivalent to:
Command history:
Release Modification
11.00.05 This command option was introduced as of version 11.00.05.
The processes normally handled are: GESTCON, MONITOR, CONFIG, RUNNING-CONFIG and VISEVEN. The fol-
lowing diagram describes the structure of the processes in the Teldat Router.
As shown in the figure, each process has a different prompt. The prompt indicates which process you are in.
The following list shows the prompts for the different processes:
Prompt
Process
GESTCON *
MONITOR +
CONFIG Config>
RUNNING-CONFIG Config$
The Teldat Router offers the possibility of personalizing the device and can include a text before the prompt. This
text can contain a maximum of 8 characters and takes the name assigned to the device. To enter said text, please
see the configuration command set hostname.
GESTCON Process
This is the console manager: its task is to simplify access to the rest of the processes on the console.
MONITOR Process
Allows the user to monitor the status and statistics of the router hardware and software. Provides access to the pro-
tocol and interface menus, which in turn allow the user to monitor the configured protocols and other parameters.
CONFIG Process
Enables configuration of various parameters such as net addresses and events. Provides access to the configuration
of protocols permitting protocol parameter configuration. As user, you execute all the device configuration from this
process; however it doesn't activate until saved and you have rebooted. This process is used to edit the device boot
up configuration.
RUNNING-CONFIG Process
Provides access to configure the interfaces, protocols, etc. All parameters configured through this process take im-
mediate effect, however if not saved, they are lost on device restart. This process serves to dynamically modify the
device active configuration.
VISEVEN Process
Receives messages from the Event Logging System and displays them on the terminal, complying with the user se-
lection criterion.
*process 4
User Configuration
Config>
The most common processes however, can be accessed through specific commands. These are as follows.
Command Process
monitor Process 2: monitoring.
config Process 4: startup configuration editor.
running-config Process 5: active configuration.
To end a TELNET session initiated from a Teldat Router to another device, use Ctrl + s. Said escape character
forces the TELNET session, started by a Teldat Router, to close.
Note
The Ctrl. + p escape character is used to return to the console Manager, while Ctrl. + s is used to end a
TELNET session.
Example:
*config
User Configuration
Config> Press (Ctrl + p)
*
*monitor
Console Operator
+ Press (Ctrl + p)
*
Note
Other protocol configuration/monitoring menus can be accessed from the configuration or monitoring
processes. To return to the corresponding process, use the exit command. To return to the console
manager use the escape character ( default is Ctrl + p).
You can enter an ? after any command to get a list of options available in said command.
You can also terminate a command, or an option, using the ? to access a list of commands or options, which match
the entered one. The tabulation key can also be used to automatically complete a fully determined command or op-
tion.
Example:
Config>protocol ?
arp Access ARP protocol
asrt Access ASRT protocol
bfd Access BFD protocol
bgp Access BGP protocol
dhcp Access DHCP protocol
dhcpv6 Access DHCPv6 protocol
dls Access DLS protocol
dot1x Access 802.1X protocol
gw104 Access GW-104 protocol
h323 Access H323 protocol
igmp Access IGMP protocol
ip Access IP protocol
ipv6 Access IPv6 protocol
l2tp Access L2TP protocol
mgcp Access MGCP protocol
msdp Access MSDP protocol
nhrp Access NHRP protocol
noe Access NOE protocol
ospf Access OSPF protocol
ospfv3 Access OSPFv3 protocol
pim Access PIM protocol
rip Access RIP protocol
ripng Access RIPNG protocol
sccp Access SCCP protocol
sip Access SIP protocol
snmp Access SNMP protocol
Config>protocol a?
arp Access ARP protocol
asrt Access ASRT protocol
Config>protocol a
From GESTCON, you can access a set of commands allowing you to check the status of the processes, monitor
device interface and packet transference efficiency, as well as the configuration of various parameters.
GESTCON process commands table
Commands Function
MONITOR Accesses the monitoring process.
CONFIG Accesses the startup configuration editing process.
RUNNING-CONFIG Accesses the active configuration editing process.
FLUSH Clears all the stored messages from the events buffer.
INTERCEPT Allows you to change the procedures’ escape character.
LOAD Reloads the application from the flash memory.
LOGOUT Ends the Telnet connection established with the device.
PROCESS Allows you to access a different device procedure and to enable the commands.
RESTART Allows you to restart the device rereading the configuration.
SSH Establishes a SSH connection as the remote device client, whose remote address
is specified.
STATUS Displays the names and identifiers for each process.
TELNET<address> Establishes a Telnet connection as the remote device client, whose remote ad-
dress is specified.
VRF-TELNET <vrf> <address> Establishes a Telnet connection as client for the remote device, whose address is
specified in the indicated VRF.
1.4.1 MONITOR
Accesses the monitoring process.
Syntax:
*monitor
Example:
*monitor
Console Operator
+
1.4.2 CONFIG
Accesses the startup configuration editing process.
Syntax:
*config
Example:
*config
Config>
1.4.3 RUNNING-CONFIG
Accesses the active configuration editing process.
Syntax:
*running-config
Example:
*running-config
Config$
1.4.4 FLUSH
Deletes all the current events messages from the VISEVEN procedure output buffer.
Syntax:
*flush
Example:
*flush
*
1.4.5 INTERCEPT
Allows you to change the escape character for processes. The following example shows the default escape charac-
ter being changed from (Ctrl+u) to (Ctrl+p).
Syntax:
*intercept
Example:
*intercept
Press the new escape key and then Enter: Press (Ctrl+u) and <¿>
Press the new escape key again and then enter: Press (Ctrl+u) and <¿>
Escape key updated
*
Note
1.4.6 LOAD
Allows you to load the program from flash memory.
Syntax:
* load <option>
ACTIVATE
DEACTIVATE
IMMEDIATE
RACTIVATE
RDEACTIVATE
• < option > specifies the load type you want to execute.
The activate option allows the user to program a specific time to reload the routing application program. Said time is
configured in a 24-hour format.
Syntax:
*load activate
Example:
The deactivate option allows you to cancel a preconfigured loading, which has not as yet been carried out. If no
loading has been programmed, an error message appears.
Syntax:
*load deactivate
Example:
*load deactivate
Reload is timed at 20:00
Are you sure to cancel the timed reload(Yes/No)? y
Timed reload was cancelled
*
Syntax:
*load immediate
Example:
*load immediate
Are you sure to reload the device(Yes/No)? y
*
Allows the user to program a specific time when the routing application program restarts. Said time is configured in a
24-hour format.
Syntax:
*load ractivate
Example:
Allows you to deactivate the programmed restart process. If there is no restart programmed, an error message ap-
pears.
Syntax:
*load rdeactivate
Example:
*load rdeactivate
Reload is timed at 17:00
Are you sure to cancel the timed restart(Yes/No)? y
Timed restart was cancelled
*
1.4.7 LOGOUT
Ends the Telnet connection established with the router without using a Telnet client command.
Syntax:
*logout
Example:
*logout
Do you wish to end telnet connection (Yes/No)?
1.4.8 PROCESS
This provides access to another device process e.g. MONITOR, VISEVEN, or CONFIG. Once a new process has
been accessed, you can send specific commands or receive the process output. To obtain the process identifier,
enter the status command. Once connected to another process, such as MONITOR, VISEVEN, or CONFIG, use the
escape character (Ctrl+p) to return to the console manager (GESTCON).
Syntax:
*process <pid>
• < pid > this is the process identifier number for the console you want to access.
Example:
*process 4
User Configuration
Config>
When in one of the protocol menus such as Conf IP> or IP>, use the exit command to return from the process menu
you are currently in.
1.4.9 RESTART
Restarts Teldat Router without reloading the software. This has the following effects:
Note
If this command is used during a remote terminal connection, the TELNET session is lost since all
device procedures are restarted.
Syntax:
*restart
Example:
*restart
Are you sure to restart the system(Yes/No)? y
Done
Restarting. Please wait ...............................................
APP DATA DUMP..........................................
Running application
Flash configuration read
Parsing text mode configuration ...
Configuration parsed
Initializing
Press any key to get started
1.4.10 SSH
Establishes an SSH connection as the remote device client with a specified address. This address can be an IPv4
Address or a domain name when a DNS client has been configured.
Syntax:
*ssh <address> [login <login-name> | port <port> | version <1-2> | cipher <cipher> | <cr> ]
• < address > specifies the IP address or the device domain name you wish to access via SSH.
• login < login-name > specifies the user ID to use when logging in on the remote networking device running the
SSH server. If no user ID is specified, the default is the current user ID.
• port < port > specifies the port number for the remote host. Default is 22.
• version < 1-2 > specifies the SSH version to be used.
• cipher < cipher > selects the cipher specification for encrypting the session.
Examples:
Teldat (c)2001-2015
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
Router1 *
SSH to router with address 192.168.212.201 with no user ID (local user root).
Teldat (c)2001-2015
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
Router1 *
SSH to router with address 192.168.212.201 using user ID and port 50 when the SSH server is NOT listening to this
port and connection cannot be established.
SSH to router with address 192.168.212.201 using user ID and port 50 when the SSH server is listening to port 50
too.
Teldat (c)2001-2015
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
Router1 *
SSH to router with address 192.168.212.201 forcing version 1 when SSH server only supports SSHv2 and connec-
tion cannot be established.
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Command history:
Release Modification
11.00.05 SSH client was introduced as of version 11.00.05.
11.01.00 SSH client was introduced as of version 11.01.00.
1.4.11 STATUS
Provides you with each process identifier (pid), as well as the name.
Syntax:
*status
Example:
*status
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
1.4.12 TELNET
Establishes a Telnet connection as the remote device client with a specified address. This address can be an IPv4
Address, an IPv6 Address or a domain name when the DNS client has been configured.
Syntax:
*telnet
<address> [source <address> | port <port> | <cr> ]
vrf <vrf>
<cr>
You can specify the VRF through the vrf option when you want to start the telnet session. Where this option is not
used, the main VRF is used. When a VRF is specified, the source and destination addresses must be IPv4.
Where no parameters are entered ( telnet <cr> option), you are asked for all the telnet parameters taking the main
VRF as the VRF. Consequently, the telnet source and destination addresses must be IPv4.
• < address > specifies the IP address or the device domain name you wish to access via telnet.
• source < address > specifies the source IP address to use for Telnet. If a domain name has been specified as
destination, the source address must be IPv4.
• port < port > specifies the destination port to use for Telnet.
Examples:
*telnet 176.123.23.67
Trying to connect...
(Press Control S to come back to local router)
Connection established
Telnet to router 172.24.78.92 using source address 80.1.1.1 and port 6623.
FTP *telnet
Telnet destination []? 172.24.78.92
Telnet source [172.24.78.94]? 80.1.1.1
Telnet port [23]? 6623
Trying to connect...
(Press Control S to come back to local router)
Connection established
Telnet to router 172.24.78.92 using source address 80.1.1.1and port 6623, specifying the parameters with options.
Connection established
Telnet to router with IPv6 2001:db8:1::1 address using source address 2001:db8:1::2. As the destination is IPv6, you
need to specify the parameters with options:
1.4.13 VRF-TELNET
Establishes a Telnet connection in the indicated VRF, as client for the remote device whose address is specified.
This address can be a domain name where the DNS client is configured.
Syntax:
*telnet <vrf>
<address> [source <address> | port <port> | <cr> ]
<cr>
• < vrf > specifies the VRF name where you wish to initiate the telnet session.
Where no additional parameters are entered ( vrf-telnet <vrf> <cr> option), you are asked for all the telnet paramet-
ers.
• < address > specifies the IP address or domain name for the device you wish to access via telnet.
• source < address > specifies the source IP address to use for Telnet.
• port < port > specifies the destination port to use for Telnet
Examples:
Telnet to router with address 172.24.78.92 in the VRF client using source address 80.1.1.1 and port 6623.
FTP *vrf-telnet
vrf tag []? client
Telnet destination []? 172.24.78.92
Telnet source [172.24.78.94]? 80.1.1.1
Telnet port [23]? 6623
Trying to connect...
(Press Control S to come back to local router)
Connection established
Telnet to router 172.24.78.92 in the client VRF using source address 80.1.1.1 and port 6623 specifying the paramet-
ers with options.
Connection established
2.1 Introduction
There are two virtual devices integrated in the Teldat Router:
As the above figure shows, each virtual device manages its own set of interfaces. You must accurately identify the
different interfaces and know whether an interface belongs to the router or the node.
The interfaces in the Teldat Router configuration are identified through a name.
The name for the physical interfaces is made up of a text string followed by two numbers separated by a slash. This
text indicates the type of interface (serial line, ISDN, etc). The first of these two numbers indicates the interface loca-
tion in the device (0 for the motherboard, 1 for the first extension pci, 2 for the second etc.) and the second number
indicates the event number for said interface for the same location (serial line 0, 1, 2, etc.).
For interfaces added by the user, the name consists of a text string, which indicates the type of interface, and an
identifier number, which must be unique for each interface of the same type. An exception to this rule is the subinter-
faces, as their name is made up with the base interface number, over which these are configured, following by a peri-
od (.) and an identifier number. Once again, this identifier number must be unique for each subinterface pertaining to
the same base interface.
The table of interface identifiers is obtained through the list devices command in the configuration process. The out-
put of this command in a specific device is shown below:
Config>list devices
Interface Connector Type of interface
ethernet0/0 LAN1 Quicc Ethernet
serial0/0 SERIAL0/WAN1 AT COM
atm0/0 DSL1 ATM
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
Config>
The first column indicates the interface name ( Interface), the second column, the physical connector the interface
(Connector) corresponds to, and the third column specifies the type of interface programmed.
You must enter the name when selecting an interface (although you don’t have to enter all the characters). For phys-
ical interfaces, simply enter the beginning of the text, thus ensuring this does not coincide with any other interface
text, followed by the position, if there is more than one interface of the same type. You don't always need to introduce
the position (X/X): this is only necessary when various interfaces of the same type are present (e.g. various serial in-
terfaces).
Examples:
Config>list devices
Interface Con Type of interface CSR CSR2 int
ethernet0/0 LAN1 Fast Ethernet interface fa200e00 27
serial0/0 WAN1 X25 fa200a00 fa203c00 5e
serial0/1 WAN2 X25 fa200a20 fa203d00 5d
serial0/2 WAN3 X25 fa200a60 fa203f00 5b
bri0/0 ISDN1 ISDN Basic Rate Int fa200a40 fa203e00 5c
Example of the valid commands to access the first serial interface on the motherboard (WAN 1) depending on the
devices listed in the above box.
Config>network serial0/0
Config>network ser0/0
Config>network ser0
Config>network s0
Config>network serial
Config>network ser
Config>network ser0/4
Config>network s7
This network serial command is incorrect as there are various interfaces in the device with serial text; consequently
you need to specify the interface location.
Config>network bri0/0
Config>network b0/0
Config>network bri0
Config>network b
As there is only one bri , you don't need to indicate the position within the equipment, simply introduce its text string,
which does not necessarily need to be complete. The only characters necessary are those distinguishing this from
other interfaces. As there aren’t any other interfaces beginning with the letter b, said letter suffices.
• Another important aspect is there are interfaces, which do not have a physical connector associated. This is the
case of the x25-node interface in the example. Said interface allows the virtual machines to join and consequently
does not have an external connector associated.
With this information, you can modify the previous figure for this case:
Suppose now you change the protocol in one of the WAN lines, through the set data-link command and then consult
the interface table.
As you can see, there is now an additional interface managed by the router and, one less managed by the node.
In the following example, a generic Frame Relay interface is added over an ISDN basic access:
Config>add device fr 1
Config>
The interface identifier is a number between 1 and 9999. This allows you to distinguish the created interface from
other interfaces of the same type i.e. other frame-relay dial interfaces.
Config>list devices
For those dial interfaces added by the user, you don’t have to enter the whole name to refer to the interface. Simply
enter sufficient characters to distinguish this from the other interfaces. The identifier however is mandatory.
Example of valid commands to access the FR dial interface, created according to the devices listed in the previous
box:
Config>network fr1
Config>network f1
Where we have ATM interfaces, subinterfaces associated to said interfaces can be configured. E.g. in a configura-
tion with an xDSL card in SLOT 3:
Config>list devices
Interface Connector Type of interface
ethernet0/0 GE0/FE0/LAN1 GigabitEthernet interface
ethernet0/1 GE1/FE1/LAN2 GigabitEthernet interface
x25-node --- Router->Node
atm3/0 SLOT3 Generic ATM
Config>
To access said interface, enter the base interface name followed by a period and the subinterface ID. This ID must
be unique for all subinterfaces associated to the same base interface, so they can be differentiated from each other.
The ID must be entered to access the subinterface, even if there is only one subinterface. When indicating the base
interface name, follow the same rules as for the physical interfaces.
Example of the valid commands to access an atm subinterface created according to the devices listed in the previ-
ous box:
Config>network atm3/0.2
Config>network atm3.2
Config>network atm.2
Config>network a.2
As there is only one ATM base interface, you don't need to indicate the location.
• Interfaces.
• Protocols.
The configuration process CONFIG allows you to display and change the router startup configuration and store it in
flash memory or in a smart card. To store the changes made in this procedure, execute the save command. The
router must be restarted so the configuration changes take effect. To restart the router, do either of the following:
The RUNNING-CONFIG configuration process allows you to display and dynamically change the router active con-
figuration and store it either in the flash memory or in a smart card. So the changes made in this process are stored,
execute the save command. Changes made in the RUNNING-CONFIG process take immediate effect.
Note
All the active configuration can be displayed in the RUNNING-CONFIG process, however you cannot
modify all of it. This means not all the commands are available in the RUNNING-CONFIG process, for
example no config.
The configuration procedures CONFIG and RUNNING-CONFIG are framed into the router structure as shown in the
following figure:
To enter the configuration procedure RUNNING-CONFIG from prompt * in the console manager GESTCON, enter
the running-config command.
Example:
*config
Config>
To exit the configuration procedure and return to console manager GESTCON prompt *, press the escape character
(Ctrl-p by default).
When this conflict arises, the user can't access the configuration environment and device sends information on the
circumstances triggering said situation.
Example:
+system telnet
ID USER IP ADDRESS:PORT CONNECTION TIME INACTIVITY TIME
-------------------------------------------------------------------
*config
Config>protocol ip
-- Internet protocol user configuration --
IP config>
*config
Config>protocol ip
CLI Error: Command locked by another user
CLI Error: Command error
Config>
Here, the sample user is trying to access the IP protocol configuration environment and the device prevents it, as the
root user is currently accessing said menu.
Show Command
The show command can be executed from any configuration process menu. This allows three options:
Config>show ?
all-config
config
menu
Config>
The show all-config command displays the net configuration for all device menus and submenus the user can ac-
cess. I.e. displays all the commands, which must be entered through the console to configure the device as it is,
when executing the show all-config command.
Example:
Config>show all-config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.78.116 255.255.0.0
;
;
;
;
;
exit
;
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
protocol ip
; -- Internet protocol user configuration --
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
exit
;
;
dump-command-errors
end
; --- end ---
Config>
This command shows the whole of the device net configuration, which the user can access independently of the
menu and submenu, where the user is located. From the IP menu, for example:
IP config>show all-config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.78.116 255.255.0.0
;
;
;
;
;
exit
;
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
protocol ip
; -- Internet protocol user configuration --
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
exit
;
;
dump-command-errors
end
; --- end ---
IP config>
The show config command displays the net configuration for all menus and submenus the user can access, which
can be accessed from the menu where the user is located when he executes this command.
Example:
Config>show config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.78.116 255.255.0.0
;
;
;
;
;
exit
;
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
protocol ip
; -- Internet protocol user configuration --
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
exit
;
;
dump-command-errors
end
As you can see, executing the show config command (from the root menu) is the same as executing the show all-
config command. However, if you execute said show config command from the IP menu, only the IP and the TVRP
configurations are shown:
IP config>show config
; Showing Menu and Submenus Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
IP config>
The show menu command displays the configuration of the menu where the command is executed, but does not
display the submenu configuration.
Examples:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
dump-command-errors
end
Config>
IP config>show menu
; Showing Menu Configuration for access-level 15 ...
classless
;
IP config>
The configuration generated by the show command can be copied to a text file and edited to the user’s require-
ments. Subsequently it can be installed in an unconfigured device, automatically configuring it.
If, during the period where the router is displaying the configuration, you wish to abort the process, enter the escape
character (default is Ctrl + p).
Options List
When configuring a device, you are frequently asked to select an option to configure determined entities for the
router such as Frame Relay PVCs ( Teldat Dm703-I ) or TVRP groups (Teldat Dm725-I ).
On selecting an option, you don't need to enter the whole the text, simply enter sufficient characters to distinguish
this option from the rest.
Examples:
serial0/0 FR config>pvc 16 ?
backup Configure several backup parameters
Here, you could have simply entered ci as no other option begins with this. However entering just c would be invalid
as there is another option with c (compression), consequently triggering an error.
Transaction command
This allows you to execute the transactions from the configuration menus. A transaction allows you to enter configur-
ation commands, temporarily suspending its application. Once the transaction has terminated, the commands
entered prior to the start of the transaction are executed and permanently applied to the configuration.
You can abort an active transaction, so commands entered the beginning of the transaction are not applied to the
configuration.
Optionally you can configure the transaction so when a command, from one of those entered, returns an error, no
change is applied to the configuration on termination. This is useful when, through a remote management applica-
tion, you want to automatically apply a set of configuration commands.
The transaction command can be executed from any configuration menu, both in static as well as the dynamic con-
figuration. There are four options:
Config$transaction ?
abort Terminate an active transaction discarding changes
commit Terminate an active transaction and apply changes
fail-on-error Make a transaction to fail if any command returns an error
start Start a CLI transaction
Config$
The transaction abort command aborts an active transaction, canceling execution of commands entered from the
start of the transaction.
The transaction commit command terminates an active transaction, applying changes in the configuration due to
commands entered prior to the start of the transaction. If you have configured the transaction to not apply changes
when a command fails (through transaction fail-on-error) and one of the entered commands returns an error, the
errors detected are reported and no change is applied.
The transaction fail-on-error command configures an active transaction to prevent the application of any changes
to finalize the transaction with transaction commit, if one of the entered commands returns an error.
The command transaction start starts a transaction, at this point this begins to register the commands entered, and
apply them simultaneously, to terminate the transaction with transaction commit.
2.4.1 ADD
Allows you to create a virtual interface.
Syntax:
Config>add <option>
device Create a virtual device
Syntax:
• < virtual interface> this is the virtual interface you want to create. To discover what types of interfaces are avail-
able, enter add device ?
Config>add device ?
atm-subinterface Create a virtual ATM Subinterface interface
bvi Create a virtual Bridge interface
bvi-subinterface Create a virtual Bridge subinterface
dial-routing Create a virtual Dial-Route interface
direct-ip Create a virtual Direct IP interface
eth-subinterface Create a virtual Ethernet Subinterface interface
fr Create a virtual Frame-Relay interface
• [options] The options available depend on the type of virtual interface you wish to create. These are described in
the manual specifically related to said interface.
Example:
For further information, please see the manual associated to the virtual interface you wish to create.
2.4.2 AUTOINSTALL
Establishes the device parameters for autoinstallation through Frame Relay from a TELDAGES network manager.
Syntax:
Command history:
Release Modification
11.00.03 This command is obsolete as of version 11.00.03.
Specifies the type of device identifier, so it is correctly interpreted from the TELDAGES network manager.
Syntax:
• <type> this is the type of device identifier. Currently only serial is available, which uses the device serial number to
identify it for the network manager.
Example:
Syntax:
• <host identifier> management station identifier. This identifier can be an IP address or a Fully Qualified Domain
Name/Hostname.
Example:
2.4.3 BACKUP-FILES
This creates a recovery point by making a copy of the system files, from the primary partition to the backup partition.
Should the filing system become corrupt, the device automatically restores the files from the recovery point and can
continue operating.
The configuration monitoring command shows information relative to the recovery process, indicating if it has star-
ted up normally (from the first partition) or if it’s being restored from the recovery point (from the backup partition).
The configuration command [no] firmware-checking determines if restoration for the filing system is enabled where
a significant firmware file is corrupt.
Note
Syntax:
Config>backup-files
Example 1:
Config>backup-files
Backup in progress...
Backup successful.
Config>
Example 2:
Config>backup-files
CLI Error: Backup device not available.
CLI Error: Command error
Config>
In this example, the device does not have a partitioned flash. Consequently, the command has returned an error
message, without creating a recovery point.
2.4.4 BANNER
Allows you to configure banner in the device.
Syntax:
Config>banner <type>
login Set login banner
exec Set exec banner
Allows you to configure an access banner in the device, which is always displayed when a user tries to access said
device through console, telnet or ftp.
To enter various lines of text in the banner, execute the banner login command, in order and consecutively, followed
by each line of text (between inverted commas if there are any spaces).
The size of an access banner is limited to 15 lines of text, each containing 80 characters.
Syntax:
Example:
Configuration parsed
Initializing
Press any key to get started
################################################################################
# Este equipo es propiedad de Sample, S.A. y su uso está restringido a sus #
# empleados. Por favor, aborte esta conexión si usted no es empleado de #
# Sample, S.A. o tiene una autorización legal para acceder al equipo. #
################################################################################
User:
Configures a welcome banner, which is displayed when a user accesses the device through console, Telnet, SSH or
FTP.
If the banner contains more than one line, then each line must be independently configured through the banner exec
command, entering each line in the order you want them displayed. If the line text contains spaces, these must be
entered between quotation marks.
The banner is limited to a maximum of 15 lines of text and 80 characters per line.
Syntax:
Example:
##############################################################
............::::::::::: WELCOME :::::::::::............
##############################################################
*
2.4.5 CONFIG-MEDIA
This allows you to select the active storage device where the configurations are saved on applying the configuration
command save. This is also the default media in the file list command.
There may be two storage medias in the routers: flash memory and smart cards. All routers take flash as the basic
storage unit. The availability of smart cards depends on the type of router. To find out if your router supports smart
card, please see the installation manual.
By default, the router has smartcard-flash configured in those routers that support smart card, and flash in those that
don’t. You can check which unit is active through the file list configuration command.
Syntax:
Config>config-media <media>
flash Configurations are stored only in Flash
smartcard Configurations are stored only in SmartCard
smartcard-flash Configurations are stored in SmartCard and Flash
• < media > specifies the name of the storage unit to be used.
For further information on the use of storage units, please see the file list and file copy commands described in this
manual, as well as the installation manual for your router. For further information on how to select a file as the active
configuration, please see the set file command described in this manual.
The behavior described below alters slightly if the microswitch e is set to ON. For further information please see the
installation manual for your router.
Specifies the flash memory as the only active storage unit when reading or writing configurations.
On booting the router, the configuration is read from flash. If the active configuration file is not found, the device
boots with the default configuration. On saving the configuration, through the save command, it's saved in flash
memory with the name of the active file.
Example:
Config>config-media flash
Specifies the smart card as the only active storage unit when reading or writing configurations.
On booting the device the configuration is read from the smart card . If the card is not present or the active configura-
tion file is not found, the device boots with the default configuration. On saving the configuration through the save
command, it is saved in the smart card with the name of the active file.
Example:
Config>config-media smartcard
Specifies both the smart card as well as the flash memory as active storage devices when reading or writing config-
urations. The smart card is considered as having priority over the flash memory.
Initially on booting, the configuration is read from the smart card . If the card is not present or the active configuration
file cannot be found, the operation is repeated from flash. If the file is not found in flash, then the router boots with the
default configuration. After reading the smart card configuration file, the router checks to see if this is written in flash .
If the configuration is not present, then the device enters it so both medias are synchronized.
On saving the configuration through the save command, the configuration is saved in both the smart card and flash
with the name of the active file. The console indicates the devices where the configuration has been stored and,
through a warning text, shows the devices where recording has not been possible.
Example:
Config>config-media smartcard-flash
2.4.6 CONFIRM-CFG
Confirms the current configuration. A configuration must be saved with the configuration confirmation function activ-
ated. Please see confirm-cfg-needed.
Syntax:
Config>confirm-cfg
This action can also be executed via SNMP. Please see CONFIRM-CFG-NEEDED on page 32.
2.4.7 CONFIRM-CFG-NEEDED
Enables the necessity to confirm the saved configuration. If you have executed this command, the configuration is
saved in TEMP.CFG for subsequent checking. If after restarting the configuration is not confirmed with the confirm-
cfg command, within the configured time, the device restarts with the previous configuration. If the configuration is
confirmed, it is saved with the corresponding name i.e. the use of TEMP.CFG is transparent to the user. Should the
new configuration force the device restart before the programmed test time is reached, after ten restarts without the
configuration being confirmed, the previous configuration is restored. If you execute the no confirm-cfg command,
the device restarts with the previous configuration. The no confirm-cfg-needed command disables the necessity to
confirm newly saved configurations.
Syntax:
Config>confirm-cfg-needed <option>
default Enables the need of configuration confirmation
timeout Sets a timeout to wait for confirmation
Enables the necessity to confirm the saved configurations with a test time of 10 minutes.
Syntax:
Config>confirm-cfg-needed default
Example:
Config>confirm-cfg-needed default
Config>
Configures the new configuration test time, which the device waits before restarting the previous configuration if con-
firmation is not carried out. The minimum is one minute and the maximum is 5 weeks.
Syntax:
• < option > specifies the test time in any of the following formats: Xw, Xd, Xh, Xm, Xs, HH:MM, HH:MM:SS.
Example:
You can execute the confirmed save configuration feature through SNMP. To do this, three new SNMP variables
have been created with their corresponding OIDs:
• telAdminStatusConfirmConfig (OID: 1.3.6.1.4.1.2007.1.2.14). This variable serves to confirm (or not) the current
configuration.
In a write operation, setting this variable to 1 confirms the current configuration, and setting it to 0 rejects the cur-
rent test configuration and the device restarts with the previous configuration.
In a read operation, a 0 value (confirmed) indicates the current configuration has been confirmed. A 1 value
(test_cnfg_inactive) indicates the current configuration has not been confirmed as yet (consequently this is a test
configuration) and neither is it active: the previous configuration is still active. A 2 value (test_cnfg_active) indicates
the current configuration has not been confirmed as yet (and consequently this is a test configuration), but we are
dealing with an active configuration. A value of 3 (configuration_recovered) indicates the previous configuration
has been recovered, is confirmed and active. A value of 4 (undefined) only occurs where the confirmed saved con-
figuration is disabled, so the use of said SMNP variable makes no sense.
There are three scenarios where recuperation of the old configuration can be produced (consequently the telAd-
minStatusConfirmConfig variable takes the configuration_recovered value 3):
a) After the confirmation wait timer has timed out without confirming the test configuration.
b) After 10 consecutive device restarts (produced before the confirmation wait timer has timed out). The aim of
restoring the old configuration in this scenario is to protect us should the new configuration make the device restart
before reaching end of the programmed test time.
c) After rejecting the current test configuration through the no confirm-cnfg command (or through SNMP by enter-
ing a 0 in the telAdminStatusConfirm Config variable).
• telAdminStatusConfirmEnabled (OID: 1.3.6.1.4.1.2007.1.2.15). This variable serves to enable/disable the con-
firmed save.
In a write operation, setting this variable to 1 enables the necessity to confirm the saved configuration. Setting this
variable to 0 disables the necessity to configure the new saved configurations.
In a read operation, a 0 value (disable) indicates the confirmed save configuration feature is disabled. And a value
of 1 (enable) indicates that the confirmed save configuration is enabled.
• telAdminStatusTimeoutConfirm (OID: 1.3.6.1.4.1.2007.1.2.16). This variable serves to configure the value (in
seconds) the confirmed save configuration feature timer takes. I.e. this is the time the device waits before restart-
ing the old configuration if this is not confirmed.
The permitted values for this variable are from 60 (1 minute) and 3024000 (5 weeks). Default is 600 (10 minutes).
In a write operation, values between 60 and 3024000 configure the timer to the entered value.
In a read operation, values between 60 and 3024000 returns the seconds value to the value the timer is configured
with.
Therefore, a logical operating sequence for the confirmed save configuration via SNMP is:
• Initially the confirmed save configuration is disabled. The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 4 (undefined)
- telAdminStatusConfirmEnabled = 0 (disable)
- telAdminStatusTimeoutConfirm = 600
• Enable the confirmed save configuration (setting the telAdminStatusConfirmEnabled SNMP variable value to 1).
The SNMP variables take the following values:
- telAdminStatusConfirmConfig = 0 (confirmed)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 600
• Set the confirmation wait timer value to the value you want (1 minute for example). To do this, set the telAdmin-
StatusTimeoutConfirm SNMP variable value to 60. The SNMP variables take the following values:
- telAdminStatusConfirmConfig = 0 (confirmed)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Make the changes in the device configuration you consider opportune and save them (setting the telAdminStatus-
SaveConfig SNMP variable value to 1). The SNMP variables take the following values:
- telAdminStatusConfirmConfig = 1 (test_cnfg_inactive)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Restart the device. The SNMP variables take the following values:
- telAdminStatusConfirmConfig = 2 (test_cnfg_active)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Confirm the tests configuration (that is active) before the 60 second timer times out (setting the telAdmin-
StatusConfirmConfig SNMP variable value to 1). The SNMP variables take the following values:
- telAdminStatusConfirmConfig = 0 (confirmed)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Continuing with the example, we could execute some new changes in the device configuration and save them
(setting the telAdminStatusSaveConfig SNMP variable to 1). The SNMP variables take the following values:
- telAdminStatusConfirmConfig = 1 (test_cnfg_inactive)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Restart the device. We can see the test configuration is active. The SNMP variables take the following values:
- telAdminStatusConfirmConfig = 2 (test_cnfg_active)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Now we need to leave the timer to timeout (1 minute) without confirming the test configuration. Or we could restore
the previous configuration by setting the telAdminStatusConfirmEnabled SNMP variable value to 0. In both cases,
the device restarts with the old configuration as the active configuration and the SNMP variables displays the fol-
lowing values:
- telAdminStatusConfirmConfig = 3 (configuration_recovered)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
2.4.8 COPY
This command allows you to copy any configuration (Running Config (P5) or a config file) to Config (P4). Confirma-
tion is requested when the Config (P4) configuration has been modified.
Syntax:
Config>copy ?
config-file Copy a config. file to Config.
running-config Copies Running Config
Command history:
Release Modification
11.00.04 This command option was introduced as of version 11.00.04.
Allows a configuration file, presaved in the flash unit, to be applied to Config (P4) .
Syntax:
Example:
Syntax:
Example:
2.4.9 DESCRIPTION
Allows you to enter descriptive texts for the device configuration. Said description is displayed on screen on execut-
ing the list configuration configuration command.
Syntax:
Config>description <text>
• < text > the configuration description text. If this text contains spaces, it must be written between quotation marks
(e.g. description “description containing spaces”).
Example:
Config>description Madrid_Branch_Outcoming_Router
2.4.10 DISABLE
Disables a specific personalized parameter. This command is used to deactivate behavior activated through the en-
able patch <parameter> command. To use this, you need to know the name of the activated parameters. Use the
list patch command in the configuration console.
Syntax:
• < id > name of the parameter to deactivate. If you introduce default as the parameter name, ALL the active para-
meters are deactivated.
Example:
2.4.11 DUMP-COMMAND-ERRORS
Displays a list of the first five erroneous commands entered in the configuration console from the point where the
log-command-errors command was executed. This command is particularly useful for detecting errors generated
when loading a complete configuration file in a device.
Syntax:
Config>dump-command-errors
Example:
Config>dump-command-errors
Warning: possible errors in the configuration, at least these found:
line 2 -> ast
line 4 -> dev eth1
line 5 -> dev ser134
line 6 -> conf 0
line 7 -> list interf eth1
(lines counting since last log-command-erros command)
Too many errors, some cannot be printed (printed 5 of 8)
Config>
2.4.12 ENABLE
This enables a specific personalized parameter. This command allows you, under certain circumstances, to modify
router behavior. It deals with the management of personalized versions. You need the names of the available para-
meters 1 and their possible admitted values to use it. Entering the name and desired value for the parameter activates
it.
Syntax:
Example:
To check the active parameters in your device at any point, use the list patch command. To disable an active per-
sonalized parameter, use the disable patch command followed by the parameter name.
2.4.13 EVENT
This allows you to record those events you wish to be stored by the Event Logging System in the configuration. Enter
exit to return to the Config> prompt.
Syntax:
Config>event
Example:
Config>event
-- ELS Config --
ELS Config>
To see the commands that can be executed from this prompt, please see Event Logging System ELS on page 135.
2.4.14 FEATURE
This defines the additional features of the router, which are not associated to a pre-determined interface.
Syntax:
Syntax:
Config>feature aaa
Example:
Config>feature aaa
-- AAA user configuration --
AAA config>
Syntax:
Config>feature access-lists
Example:
Config>feature access-lists
-- Access Lists user configuration --
Access Lists config>
For further information, please see manual Teldat Dm752-I Access Control .
Syntax:
Config>feature act
Example:
Config>feature act
-- Alsa Custom Trap configuration --
ACT config>
For further information, please see manual Teldat Dm818-I ACT Feature .
Syntax:
Config>feature afs
Example:
Config>feature afs
AFS config>
Accesses the autoset-cfg configuration environment for routers that support this.
Syntax:
Config>feature autoset-cfg
Example:
Config>feature autoset-cfg
-- Autosetcfg Configuration --Autoset-cfg Config>?
For further information, please see manual Teldat Dm797-I Dynamic Configuration Control .
Syntax:
Config>feature bandwidth-reservation
Example:
Config>feature bandwidth-reservation
-- Bandwidth Reservation user configuration --
BRS Config>
For further information, please see manual Teldat Dm715-I Bandwidth Reservation System.
Syntax:
Config>feature class-map
Example:
Config>feature class-map
-- Class-Map Menu Configuration --
Class-map Config>
For further information, please see manual Teldat Dm795-I Policy map Class map .
Accesses the control-access configuration environment for the Corporate Encryption System. This environment is
only accessible in devices with encryption cards.
Syntax:
Config>feature control-access
Example:
Config>feature control-access
CtrlAcc Config>
Accesses the DNS configuration environment. For further information please see manual Teldat Dm723-I DNS
Client.
Syntax:
Config>feature dns
Example:
Config>feature dns
-- DNS resolver user configuration --
DNS config>
Syntax:
Config>feature dns-updater
Example:
Config>feature dns-updater
-- DNS UPDATER configuration --
DNS UPDATER config>
For further information, please see manual Teldat Dm785-I DNS Updater .
Syntax:
Config>feature echo-responder
Example:
Config>feature echo-responder
-- ECHO user configuration --
ECHO config>
Syntax:
Config>feature err-disable
Example:
Config>feature err-disable
-- Error Disable user configuration --
errdisable config>
Accesses the Frame Relay switch configuration environment. For further information, please see manual Teldat
Dm703-I Frame Relay.
Syntax:
Config>feature frame-relay-switch
Example:
Config>feature frame-relay-switch
-- Frame Relay Switch configuration --
Frame Relay Switch>
Syntax:
Config>feature gps-applications
Example:
Config>feature gps-applications
-- GPS Applications Configuration --
GPS-Apps Cfg>
Accesses the HotSport feature configuration menu. Please see Dm820-I HotSpot Feature manual for further inform-
ation.
Syntax:
Config>feature hotspot
Example:
Config>feature hotspot
-- Hotspot configuration --
HS config>
Command history:
Release Modification
11.00.03 New command added.
Accesses the router http protocol configuration. This command or functionality depends on the device i.e. it might not
apply to your device.
Syntax:
Config>feature http
Example:
Config>feature http
-- HTTP user configuration --
HTTP config>
Syntax:
Config>feature ip-discovery
Example:
Config>feature ip-discovery
-- Teldat IP Discovery Protocol configuration --
TIDP config>
Syntax:
Config>feature ipv6-access-list
Example:
Config>feature ipv6-access-list
-- IPv6 Access Lists user configuration --
IPV6 Access Lists config>
For further information, please see manual Teldat Dm808-I IPv6 Access Control .
Accesses the istud configuration environment for those devices that support this.
Syntax:
Config>feature istud
Example:
Config>feature istud
-- ISTUD configuration --
ISTUD config>
For further information, please see manual Teldat Dm784-I ISTUD Feature .
Syntax:
Config>feature key-chain
Example:
Config>feature key-chain
-- Key Chain user configuration --
Key-chain Config>
For further information, please see manual Teldat Dm792-I Key Management .
Syntax:
Config>feature ldap
Example:
Config>feature ldap
-- LDAP User Configuration --
LDAP config>
Syntax:
Config>feature mac-filtering
Example:
Config>feature mac-filtering
-- MAC Filtering user configuration --
Filter config>
This command accesses the feature management configuration menu. This allows you to program tasks so they ex-
ecute when they receive a notification from an NSLA advisor (Network Service Level Advisor). For further informa-
tion, please see manual Teldat-Dm754-I NSLA.
Syntax:
Config>feature management
Example:
Config>feature management
-- Management user configuration --
MGT config>
MGT config>?
no Negate a command or set its defaults
operation Configure an operation to be executed
script Configure a script to be executed
exit Exit to parent menu
An operation is defined as a task that must be executed on receiving a notification from an advisor. The configuration
for said operation consists of two phases. First, the task to execute is specified together with its possible parameters.
Next, the advisor (whose notification triggered the operation) is configured.
A script is a list of commands that can be executed in an operation when receiving a notification from an advisor.
Command history:
Release Modification
11.00.05 Script execution and command script were introduced as of version 11.00.05.
11.01.00 Script execution and command script were introduced as of version 11.01.00.
This command programs a device reset, which executes as soon as a notification from the advisor is received and is
configured through the operation <id> track nsla-advisor <advisor id> command.
Example:
This command programs an execution of the list of commands configured on the script identified by <id_script> con-
figured on an operation, which executes as soon as a notification from the advisor is received and is configured
through the operation <id> track nsla-advisor <advisor id> command.
Example:
Command history:
Release Modification
11.00.05 Script execution and command script were introduced as of version 11.00.05.
11.01.00 Script execution and command script were introduced as of version 11.01.00.
This command programs a reset for the MTC+ with the corresponding id This executes as soon as a notification from
the advisor is received (configured through the operation <id> track nsla-advisor <advisor id> command).
Example:
Command history:
Release Modification
11.00.03 New command added.
Use this command to subscribe an operation to receive notifications from an NSLA advisor.
Example:
Example:
Command history:
Release Modification
11.00.05 name command was introduced as of version 11.00.05.
11.01.00 name command was introduced as of version 11.01.00.
Use this command to add commands on a determined script to be executed in an operation when a notification from
the advisor is received.
The commands should start from the next menu to GESTCON menu, as the first thing carried out then executing a
command is allocating the monitor on that menu.
Example:
Command history:
Release Modification
11.00.05 Command script <id_script> commands was introduced as of version 11.00.05.
11.01.00 Command script <id_script> commands was introduced as of version 11.01.00.
Syntax:
Config>feature netflow
Example:
Config>feature netflow
NETFLOW config
Accesses the NSLA ( Network Service Level Advisor ) configuration environment. This offers management functions
at the Service Level (offered by the network) and also generates reports relative to the SLA ( Service Level Agree-
ments ).
Syntax:
Config>feature nsla
Example:
Config>feature nsla
-- Feature Network Service Level Advisor --
NSLA config>
For further information, please see manual Teldat Dm754-I NSLA (Network Service Level Advisor) .
Accesses the NSM system (Network Service Monitor) configuration environment. This provides information on the
network service level by using different polls incorporated in the router. It also measures performance.
Syntax:
Config>feature nsm
Example:
Config>feature nsm
-- Network Service Monitor configuration --
NSM config>
For further information, please see manual Teldat Dm749-I NSM (Network Service Monitor).
Syntax:
Config>feature ntp
Example:
Config>feature ntp
-- NTP Protocol user configuration --
NTP config>
For further information, please see manual Teldat Dm728-I NTP Protocol .
Syntax:
Config>feature policy-map
Example:
Config>feature policy-map
-- Policy-Map Menu Configuration --
Policy-map Config>
For further information, please see manual Teldat Dm795-I Policy map Class map .
Syntax:
Config$feature power-switch
Example:
Config$feature power-switch
POWER-SWITCH$
Command history:
Release Modification
11.00.04 New feature added.
Syntax:
Config>feature prefix-lists
Example:
Config>feature prefix-lists
-- Prefix Lists user configuration --
Prefix Lists config>
For further information, please see manual Teldat Dm780-I Prefix Lists .
Syntax:
Config>feature radius
Example:
Config>feature radius
-- RADIUS User Configuration --
RADIUS Config>
For further information, please see manual Teldat Dm733-I RADIUS Protocol .
Syntax:
Config>feature rmon
Example:
Config>feature rmon
-- Remote Network Monitoring configuration --
RMON config>
For further information, please see manual Teldat Dm796-I RMON Feature .
Syntax:
Config>feature route-map
Example:
Config>feature route-map
-- Route maps user configuration --
Route map config>
For further information, please see manual Teldat Dm745-I Policy Routing .
Syntax:
Config>feature scada-forwarder
Example:
Config>feature scada-forwarder
-- SCADA Forwarder Configuration --
SCADA-FWD Cfg>
Accesses the packet capture (sniffer) configuration environment, integrated in the device.
Syntax:
Config>feature sniffer
Example:
Config>feature sniffer
-- SNIFFER configuration --
SNIFFER config>
Syntax:
Config>feature spi
Example:
Config>feature spi
-- SPI global configuration --
SPI Config>
For further information, please see manual Teldat Dm793-I SPI Agent .
Syntax:
Config>feature ssh
Example:
Config>feature ssh
-- SSH protocol configuration --
SSH Config>
For further information, please see manual Teldat Dm787-I SSH Protocol .
Syntax:
Example:
For further information, please see manual Teldat Dm769-I STUN Protocol.
Syntax:
Config>feature syslog
Example:
Config>feature syslog
-- SYSLOG client configuration --
SYSLOG config>
For further information, please see manual Teldat Dm753-I Syslog Client .
Syntax:
Config>feature tftp
Example:
Config>feature tftp
-- TFTP user configuration --
TFTP config>
For further information, please see manual Teldat Dm765-I TFTP Protocol .
Syntax:
Config>feature tms
Example:
Config>feature tms
TMS config>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. TMS feature is no longer supported.
Accesses the IEEE 802.1Q switch configuration environment to support creation of virtual private networks (Virtual
LAN).
Syntax:
Config>feature vlan
Example:
Config>feature vlan
-- VLAN configuration --
VLAN config>
Syntax:
Config>feature vli
Example:
Config>feature vli
-- VLI configuration --
VLI config>
For further information, please see manual Teldat Dm803-I Virtual Linux Interface VLI .
Syntax:
Config>feature vrf
Example:
Config>feature vrf
-- VRF user configuration --
VRF config>
For further information, please see manual Teldat Dm775-I VRF-Lite Facility.
Syntax:
Config>feature wnms
Example:
Config>feature wnms
For further information, please see manual Teldat Dm819-I Wireless Network Management System .
Command history:
Release Modification
11.00.03 New command added.
Syntax:
Config>feature wrr-backup-wan
Example:
Config>feature wrr-backup-wan
-- WAN Reroute Backup user configuration --
Backup WRR>
For further information, please see manual Teldat Dm727-I Backup WAN Reroute .
Syntax:
Config>feature wrs-backup-wan
Example:
Config>feature wrs-backup-wan
-- WAN Back-up user configuration --
Back-up WAN>
For further information, please see manual Teldat Dm711-I Frame Relay ISDN Backup Configuration.
2.4.15 FILE
Accesses the files present in the device storage units.
The storage units are explicitly represented through a letter and the colon symbol (:). The unit supported over the
flash memory is labeled A: and the unit supported by the smart card is labeled S:. Not all devices support both stor-
age units. For further details, please see the installation manual for your device.
One of the (present) units is considered the active, or predetermined, unit. To change the active unit, please see the
config-media command found in this manual. If you wish to refer to the active unit, do not include the name of any
unit.
The S: unit is a compressed unit. When information is stored, it's compressed with the gzip program algorithm. To
show this when you store something in said unit, change the last character. For further details on how to operate with
this unit, please see the installation manual for your device.
Syntax:
• < operation > operation to execute over the storage unit or file.
• [parameters] parameters required for the specified operation.
Allows you to copy files in the storage units. The source and destination files can be in the same unit or in different
units. If these are in different units (and not in the active unit), you must indicate the storage units. If both files pertain
to the active unit, don't indicate the storage unit.
Syntax:
• < origin file > name of the file you wish to copy.
• < destination file > name of the destination file where you wish to copy the original specified file to.
Example 1:
Example 2:
The results of both examples can be seen in the figure in the next section. Please note that the MIKE11.CFG file ap-
pears as MIKE11.CFZ, as it is a compressed file.
Command history:
Release Modification
11.00.04 This command option was introduced as of version 11.00.04.
Allows you to create files in the storage unit. You can create files from ASCII or HEX content. To finish file creation,
press CTRL+P.
Syntax:
• < destination file > name of the file you wish to create.
• < input mode > type of input content used to create the specified file.
Example 1:
Config>
Example 2:
Config>
The results of both examples can be seen through options list and type. (Checks if the files are properly created.)
Allows you to delete files present in the device storage units. For security reasons, you cannot delete a file containing
the device code.
Syntax:
Example 1:
Config>file list
Active Device: Flash
A: ROUTER.CFG 3510 12/09/02 12:45 Flash
A: TKR.CFG 1050 09/19/02 18:08 Flash
A: TEST.CFG 4708 04/26/02 15:33 Flash
A: SINTEST.CFG 4593 09/25/02 15:28 Flash
A: MIKE.CFG 1494 12/26/02 16:47 Flash
A: MIKE2.CFG 6302 12/13/02 10:09 Flash
Example 2:
Allows you format a storage unit in the device. Currently, you can only format the smart card. Please note that when
you format a unit, all the files contained in said unit are deleted.
Syntax:
• < store unit > name of the storage unit to format. Currently only the smart card can be formatted.
Example:
Lists the files present in the device storage units. This also shows which unit is active. To change the active unit,
please see the config-media command found in this manual.
Each line displays the unit identifier, the file name, the extension, the size in bytes, the date and time it was created
and finally the storage unit as a text. The free available space in each unit is also displayed.
Syntax:
Config>file list
Example:
Config>file list
Active Device: Flash
A: ROUTER.CFG 3510 12/09/02 12:45 Flash
A: TKR.CFG 1050 09/19/02 18:08 Flash
A: TEST.CFG 4708 04/26/02 15:33 Flash
Please note that the smart card unit is a slow storing unit and may take various seconds to respond.
Allows you to rename the files present in the device storage units. You must first indicate the original name and sub-
sequently enter the new name you wish to give the file. The unit indicated in the original name and in the new name
must coincide. For security reasons, you are not allowed to rename a file containing the device code.
Syntax:
Example 1:
Config>file list
Active Device: Flash
A: ROUTER.CFG 3510 12/09/02 12:45 Flash
A: TKR.CFG 1050 09/19/02 18:08 Flash
A: TEST.CFG 4708 04/26/02 15:33 Flash
A: SINTEST.CFG 4593 09/25/02 15:28 Flash
A: MIKE.CFG 1494 12/26/02 16:47 Flash
A: MIKE2.CFG 6302 12/13/02 10:09 Flash
A: XOT1.CFG 1494 12/26/02 14:33 Flash
A: XOT2.CFG 1494 12/27/02 12:27 Flash
A: XOT3.CFG 1554 12/26/02 13:18 Flash
A: APPCODE1.BIN 2760544 01/03/03 10:39 Flash
Config>
Example 2:
Example 3:
Allows you to display the files present in the device storage units. Each character that cannot be printed is substi-
tuted with a period when viewed.
Syntax:
• header this option means you only see the first lines of the file.
• < filename > name of the file you wish to view.
• hex dumps the file content, byte by byte, in hexadecimal format with the corresponding texts characters. Codes
that do not correspond to the standard text characters, appear as a period in the corresponding text.
• text displays the file content in text mode. Non-standard characters are substituted for a period on the display.
The complete file is displayed in text mode if you do not specify any option.
Example 1:
Example 2:
;
;
;
exit
;
;
protocol bgp
; -- Border Gateway Protocol user configuration --
enable
;
aggregate default 192.168.0.0 mask 255.255.0.0
aggregate default 10.0.0.0 mask 255.0.0.0
;
aggregate 10.0.0.0 mask 255.0.0.0 10.0.0.0 mask 255.0.0.0 refines
;
as 100
exit
;
dump-command-errors
end
; --- end ---
Config>
Example 3:
Config>
2.4.16 FIRMWARE-CHECKING
Enables the integrity checking for firmware. This command is used together with the backup-files command to en-
sure device availability when faced with serious cases of corruption in the filing system.
Note
Syntax:
Config> firmware-checking
Example:
Config>firmware-checking
Config>
2.4.17 FORMAT
Formats the specified storage device.
Syntax:
Config>format <device>
• < device > name of the storage device to format. Currently you can only format the smart card system (smartcard
option).
Example:
Config>format smartcard
2.4.18 GLOBAL-PROFILES
Defines the router PPP, ATM etc. profiles.
Syntax:
• < profile name > profile type identifier whose configuration menu you wish to access.
Command history:
Release Modification
11.00.02 Options tcp-menu and trmtp-menu are obsolete as of version 11.00.02. DEP protocol is
no longer supported.
Syntax:
Config>global-profiles dial
Example:
Config>global-profiles dial
-- Dial Profiles Configuration --
Dial Profiles config>
For further details on this configuration environment, please see manual Teldat Dm732-I Call Profiles .
Syntax:
Config>global-profiles ppp
Example:
Config>global-profiles ppp
Accesses the DEP protocol over TCP ( Transport Control Protocol ) profiles configuration environment to encapsulate
the traffic from POS or Dataphones in IP networks. For further information, please see manual Teldat Dm263-I For-
warder DEP.
Syntax:
Config>global-profiles tcp-menu
Example:
Config>global-profiles tcp-menu
-- UDAFO TCP Configuration Menu --
UDAFO TCP Cfg>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. DEP protocol is no longer supported.
Accesses the DEP protocol over TRMTP (Trivial Message Transfer Protocol) profiles configuration environment to
encapsulate the traffic from POSs or Dataphones in IP networks. For further information, please see manual Teldat
Dm263-I Forwarder DEP .
Syntax:
Config>global-profiles trmtp-menu
Example:
Config>global-profiles trmtp-menu
-- UDAFO TRMTP Configuration Menu --
UDAFO TRMTP Cfg>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. DEP protocol is no longer supported.
2.4.19 LICENCE-CHANGE
Allows you to change the device license so determined features are enabled or disabled. This command is only oper-
ative if you have a special license. After selecting the language where the texts appear for the interaction, the config-
uration for the current license is displayed. To introduce a new license (after specifying the type of installation), indic-
ate if you want to enable all the available functions. Once this process has finalized, confirm if you want these
changes to be saved. If you do, confirm restart (Yes). However, you can delay restart until later on although the
changes will not take affect until the device is restarted.
Syntax:
Config>licence-change
Example:
Config>licence-change
1. English
2. Español
Language/Idioma[1]? 1
FUNCTIONALITY ENABLED
-------------- ----------
ISDN NO
IPSEC YES
SNA YES
VOIP NO
Please indicate here if you are installing the router to carry out one of the fol
lowing tasks:
R. Register for the first time
M. Maintenance to resolve an event
Please select an option > m
Enable ISDN (Yes/No)[Y]?y
Enable IPSEC (Yes/No)[Y]?y
Enable SNA (Yes/No)[Y]?y
Enable VOIP (Yes/No)[Y]?y
Enable NOE (Yes/No)[Y]?n
2.4.20 LIST
Lists information on the active unit configuration (flash or smart card), protocols, interfaces, users, pools and enabled
patches configuration.
Syntax:
Config>list <info>
configuration List generic configuration information
devices List router devices
patch Check the personalized parameters that are active
pool Number of bytes assigned to each memory pool
user Displays the list of registered users
• < info > identifier for the type of information you wish to list.
Syntax:
Config>list configuration
Example:
0 IP DOD-IP
3 ARP Address Resolution Protocol
4 H323 H323
6 DHCP Dynamic Host Configuration Protocol
10 BGP BGP
11 SNMP SNMP
12 OSPF Open SPF-Based Routing Protocol
13 RIP Route Information Protocol
17 SIP SIP
23 ASRT Adaptive Source Routing Transparent Enhanced Bridge
25 NHRP Next Hop Resolution Protocol
26 DLS Data Link Switching
29 L2TP L2TP
30 EAPOL Extensible Authentication Protocol Over LAN
31 Preauth WLAN Preauthentication
Syntax:
Config>list devices
Example:
Config>list devices
Interface Connector Type of interface
ethernet0/0 GE0/FE0/LAN1 Fast Ethernet interface
ethernet0/1 GE1/FE1/LAN2 Fast Ethernet interface
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
Config>
Syntax:
Config>list patch
Example:
Config>list patch
Patch Name value
-----------------------------------------
ARPI_SND_LCL 1 (0x1)
Config>
Use this command to see the number of bytes assigned to each memory pool as well as the unassigned bytes.
Syntax:
Config>list pool
Example:
Config>list pool
3 Iorbs pool: 4194304
4 MSGs pool: 1204000
Total memory pools: 5398304 Total free memory: 0
Config>
Displays the list of registered users, their password, access level, access mode and whether they are enabled or not.
Syntax:
Config>list user
Example:
Config>list user
Name Password Access Level Strict Enabled
config **************** [10]Config N N
monitor **************** [ 5]Monitor N Y
root **************** [15]Root N Y
mabm **************** [15]Root N Y
guest **************** [ 2] Y Y
viewer **************** [ 1]Events N Y
Config>
2.4.21 LOG-COMMAND-ERROR
This command initializes (deletes) the generated errors register log when executing commands from the configura-
tion console.
Syntax:
Config>log-command-errors
Example:
Config>log-command-errors
Config>
This is usually executed as the first command before loading a new configuration file. Subsequently you can see
possible errors through the dump-command-errors command.
2.4.22 MANAGEMENT
Accesses the master router configuration environment.
Syntax:
Config>management
Example:
Config>management
-- Routers management user configuration --
Management config>
2.4.23 NETWORK
Accesses the commands menu to configure a specific interface. To exit this menu, enter exit.
Syntax:
Config>network <name>
To find out what interfaces are available in the device, enter list devices.
Example 1:
Config>network ethernet0/0
-- Ethernet Interface User Configuration --
ethernet0/0 config>
Example 2:
Config>network serial0/4
For further information on interfaces, please see the common configuration for interfaces manual ( Teldat Dm722-I
Common Configuration for Interfaces) and the manual associated to the specific network interface you wish to ac-
cess.
2.4.24 NO
Sets parameters to their default value, disables options or deletes previously added configuration elements.
Syntax:
• < command > name of the command where you want to invalidate execution.
• [parameters] the parameters required for the specified command.
Deletes the specified virtual interface. (See also the no device command for another way to delete an interface.)
Syntax:
• < virtual interface type> this is the virtual interface you want to delete.
• [options] The options depend on the type of virtual interface to delete. These are the same as those used to cre-
ate the interface through the add device command.
Example:
Release Modification
11.01.00 New command was introduced as of version 11.01.00.
2.4.24.2 NO AUTOINSTALL
Syntax:
Config>no autoinstall
Example:
Config>no autoinstall
Config>
Release Modification
11.00.03 This command is obsolete as of version 11.00.03.
2.4.24.3 NO BANNER
Syntax:
< type > specifies the type of banner to delete. The only one currently available is access (login).
Example:
2.4.24.4 NO CONFIGURATION
Syntax:
Config>no configuration
Example:
Config>no configuration
Config>
2.4.24.5 NO CONFIRM-CFG
Rejects the current test configuration. After the warning message, the device restarts with the previous configuration.
For further information, please see confirm-cfg-needed and confirm-cfg commands.
Syntax:
Config>no confirm-cfg
Example:
Config>no confirm-cfg
!!!!LOOK OUT!!!!
This command reboots the system
If you go on, previous configuration will be restored
You can test this configuration again with: set file-cfg TEMP
To go on write RECOVER: RECOVER
This action can also be executed through SNMP. Please see CONFIRM-CFG-NEEDED on page 32.
2.4.24.6 NO CONFIRM-CFG-NEEDED
Disables the necessity to confirm the new configurations. Please see confirm-cfg-needed.
Syntax:
Config>no confirm-cfg-needed
Example:
Config>no confirm-cfg-needed
Config>
This action can also be executed through SNMP. Please see CONFIRM-CFG-NEEDED on page 32.
2.4.24.7 NO CONTACT-PERSON
Deletes the identification assigned to the contact person. For further information, please see the set-contact-person
command.
Syntax:
Config>no contact-person
Example:
Config>no contact-person
Config>
2.4.24.8 NO DESCRIPTION
Deletes the description(s) assigned to the device configuration. For further information, please see the description
command.
Syntax:
Config>no description
Example:
Config>no description
Config>
2.4.24.9 NO DEVICE
Eliminates the specified virtual interface. See also the no add device command for an alternative way to delete an
interface.
Syntax:
Example:
2.4.24.10 NO FIRMWARE-CHECKING
Syntax:
Config>no firmware-checking
Example:
Config>no firmware-checking
Config>
2.4.24.11 NO HOST-LOCATION
Deletes the text indicating device location. For further information, please see the set-host-location command.
Syntax:
Config>no host-location
Example:
Config>no host-location
Config>
2.4.24.12 NO HOSTNAME
Deletes the name assigned to the device. For further information, please see the set hostname command.
Syntax:
Config>no hostname
Example:
Config>no hostname
Config>
2.4.24.13 NO LOGIN
Deactivates the login options configured through the set login command.
Syntax:
• <option> this is the login option to deactivate. Currently only the case-sensitive option is supported. This deactiv-
ates upper-case/lower-case sensitivity.
Example:
2.4.24.14 NO PASSWORD
Eliminates the device access password configuration. For further information, please see the set password com-
mand.
Syntax:
Config>no password
Example:
Config>no password
Config>
2.4.24.15 NO PRIVILEGE
Syntax:
Example:
Config>no privilege 3
Config>
2.4.24.16 NO RUSH-ENGINE
Disables Rush engine or sets default idle flows timeout configuration, which is 5 seconds.
Syntax:
• timeout this is an optional parameter. If specified, the idle flows timeout is set to default. If this is omitted, the com-
mand disables Rush engine.
Example:
Command history:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
2.4.24.17 NO USER
Deletes a user from the user list. You can eliminate as many users as you wish except for a Root user, if there is only
one, and there are other registered users. You can only delete the rest of the users, as if you do, you won't be able to
manage the remaining users. If you eliminate all the users except for the last Root, then this may be deleted. Sub-
sequently, the system doesn't request user or password to access the device as there are no users registered in the
system.
Syntax:
Example:
2.4.25 NODE
Accesses the node configuration (X.25, XOT and 270). You can also access this through the network command fol-
lowed by the interface the node is configured over.
Syntax:
Config>node <name>
270 Access the 270 configuration
x25 Access the X25 node configuration
xot Access the XOT configuration
• < name > name of the node whose configuration menu you wish to access.
Syntax:
Config>node 270
Example:
Config>node 270
270 Config>
Syntax:
Config>node x25
Example:
Config>node x25
X25 Config>
For further information, please see manual Teldat Dm707-I X.25 Configuration .
Accesses the node configuration environment relative to XOT (X.25 over TCP/IP).
Syntax:
Config>node xot
Example:
Config>node xot
XOT config>
For further information on the node, please see manual Teldat-Dm 713-I XOT Protocol.
2.4.26 PRIVILEGE
Allows you to specify personalized execution privileges for process commands.
Syntax:
• < level > access level to assign to the command specified in < command path>.
• < command path> this is the command path.
• < all > option allowing you to apply the specified level to all the subcommands (where the paths coincide) for the
command specified in <command path>.
The <level> parameter, which specifies the access level to assign to the command. This takes values between 0 and
15.
The < command path> parameter. This specifies the specific path for the command where you are going to person-
alize the access level. This latter is constructed by consecutively writing the necessary commands, separated by the
> character, needed to execute this.
You must write between inverted commas ( “) and your syntax must adjust to the following norms:
1) As a general rule, to define the access level for a specified command, the path identifying this must begin with the
> character.
Example:
If you try and assign an access level to a command independently of the menu you are in, said initial character is
omitted and you can't use the command in the path.
Example:
Config$privilege 7 "list"
Config$privilege 7 "ppp>ipcp"
CLI Error: Wrong specification of command path (misuse of >)
CLI Error: Command error
Config$
The >config path refers to both the static and the dynamic configuration. It is not possible to give different permis-
sions to the same command, depending on whether the user is dynamically or statically configuring the device.
2) The > character is used to as a separator between the device process level/menus when specifying the command
path.
Example:
3) The * character can be used as a wildcard parameter in the command path definition.
Example:
This assigns an access level 5 to the list command in any net configuration menu (net ppp1, net ppp2, net fr1, etc.).
To find the complete path for a parameter configuration command in a device, execute show from the configuration.
Example:
Config>show config
; Showing System Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
add device ppp 1
set data-link sync serial0/0
set data-link x25 serial0/1
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.73.23 255.255.0.0
;
;
;
;
exit
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
;
network ppp1
; -- Generic PPP User Configuration --
ip address 1.1.1.1 255.255.255.0
;
;
;
;
ppp
; -- PPP Configuration --
ipcp remote address fixed 1.1.1.2
exit
;
base-interface
; -- Base Interface Configuration --
base-interface serial0/0 link
;
exit
;
exit
;
;
;
dump-command-errors
end
; --- end ---
Config>
For example, to establish access level 12 to a base interface assignment for net ppp1 ( base-interface serial0/0
command), you need to use path ">config>network ppp1>base-interface>base-interface serial0/0 link “
The <all> option allows you to apply the specified level to all the subcommands for that specified in <command
path> i.e. to all commands whose path coincides from the start (taking into account all wildcards).
Example:
This configuration is applied at the access level for all commands whose paths begins with " >network" such as
">config>network ppp1" or ">network ppp2>ppp"
If this option is not specified, the access level is strictly applied to the command defined by the path, i.e. whose exe-
cution ends with a carriage return <CR>. Consequently, if you have a configuration as shown below (without the all
option being active):
Config>privilege 12 “>config>confirm-cfg”
Config>privilege 12 “>config>protocol *>no *"
Config>
And access with user level 10 and try and carry out the following executions:
Config>confirm-cfg
CLI Error: Incomplete command
Config>protocol ip
You get an error in execution, as these commands have access level 12. However if you execute:
Config>confirm-cfg-needed default
Config>protocol ip
-- Internet protocol user configuration --
IP config>no aggregation-route 192.168.0.0 255.255.0.0
IP config>
No error has been produced as the all option has not been configured. The access level change has not affected
these commands (they take access level 10 by default).
This system allows you to specify different access levels for the same command, with the possibility of creating two
types of users: default and strict (see the user command). Where this situation arises and a default user (not strict)
accesses, the system assigns the most restrictive access layer (highest) to the command .
Here we are going to see how to use the commands execution privilege to define a user who can only configure
parameters related to the device IP telephony. Two users are defined: one with root privileges and the other with ac-
cess level 7, which has monitoring privileges as well as the privileges configured through the privilege command.
The voip user can access all the voip voice interfaces: the telephony menu, the sip and h323 protocols; he can
configure access lists 50 and use them in telephony, configure two nsm operations and two filters, nsla alarm
and adviser, a global-profiles dial profile known as voip to be applied in an isdn voice interface, he can exit any
menu through the exit command and save the configuration. This user has full control over the IP telephony con-
figuration for the device; however he cannot modify any routing parameter or restart the device.
; -- Privilege Configuration –
privilege 7 ">config>feature access-list>access-list 50" all
privilege 7 ">config>feature access-list>access-list 51" all
privilege 7 ">config>feature access-list>no access-list 50" all
privilege 7 ">config>feature access-list>no access-list 51" all
privilege 7 ">config>feature nsla>advisor 10" all
privilege 7 ">config>feature nsla>advisor 11" all
privilege 7 ">config>feature nsla>alarm 10" all
privilege 7 ">config>feature nsla>alarm 11" all
privilege 7 ">config>feature nsla>filter 10" all
privilege 7 ">config>feature nsla>filter 11" all
privilege 7 ">config>feature nsla>no advisor 10" all
privilege 7 ">config>feature nsla>no advisor 11" all
privilege 7 ">config>feature nsla>no alarm 10" all
privilege 7 ">config>feature nsla>no alarm 11" all
privilege 7 ">config>feature nsla>no filter 10" all
privilege 7 ">config>feature nsla>no filter 11" all
privilege 7 ">config>feature nsm>no operation 10" all
privilege 7 ">config>feature nsm>no operation 11" all
privilege 7 ">config>feature nsm>operation 10" all
privilege 7 ">config>feature nsm>operation 11" all
privilege 7 ">config>global-profiles dial>no profile voip" all
privilege 7 ">config>global-profiles dial>profile voip" all
privilege 7 ">config>network voip" all
privilege 7 ">config>protocol h323" all
privilege 7 ">config>protocol sip" all
privilege 7 ">config>save" all
privilege 7 ">config>telephony" all
privilege 7 "exit"
;
;
user root hash-password A44AD55CE197114B241EE3DDEBB04660
;
user voip hash-password 7A325D20A3B026A12D094C61DB21D880
user voip access-level 7
;
event
; -- ELS Config --
enable syslog subsystem CNSL ALL
console
; -- Console Events Configuration --
log source-ip
log prompt
exit
;
exit
;
feature syslog
; -- SYSLOG client configuration --
enable
server 172.24.51.47
exit
In addition, the sending of events to a syslog server is configured with each command executed in the device, so
there is a register of all commands executed by each user. The IP of the device, which sends the event and the com-
plete prompt used when executing the device, is included in the event. As you can see below, the event also in-
cludes the user who executed the command and where the user connected: this could be a remote IP or local con-
sole.
2.4.27 PROTOCOL
This accesses the configuration environment for a specific protocol. The protocol command, followed by a protocol
name, accesses the configuration for the desired protocol. The number of available protocols depends on the type of
device and on the application license the device has.
Config>protocol ?
arp Access ARP protocol
asrt Access ASRT protocol
bfd Access BFD protocol
bgp Access BGP protocol
dhcp Access DHCP protocol
dhcpv6 Access DHCPv6 protocol
dls Access DLS protocol
dot1x Access 802.1X protocol
gw104 Access GW-104 protocol
h323 Access H323 protocol
igmp Access IGMP protocol
ip Access IP protocol
ipv6 Access IPv6 protocol
l2tp Access L2TP protocol
mgcp Access MGCP protocol
msdp Access MSDP protocol
nhrp Access NHRP protocol
noe Access NOE protocol
ospf Access OSPF protocol
ospfv3 Access OSPFv3 protocol
pim Access PIM protocol
rip Access RIP protocol
(2) Enter protocol followed by the name of the protocol you want to configure. The specified protocol prompt ap-
pears. Here, enter the selected protocol configuration commands.
Example:
Config>protocol arp
-- ARP user configuration --
ARP config>
ARP config>exit
Config>
Syntax:
Config>protocol <name>
• <name> name of the protocol for the configuration menu you want to access.
Example:
Config>protocol ip
-- Internet protocol user configuration --
IP config>
Example:
Config>quick-configuration
-- Quick Configuration Menu --
Quick config>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. Quick menu configuration is no longer
supported.
2.4.29 RUSH-ENGINE
Configures Rush engine parameters.
Rush engine is a traffic flow accelerator, which optimizes routing performance by learning existing flows and using a
cache for packets received from each flow.
When a flow is learned from existing traffic, it is stored in the cache while said traffic persists. After a predefined time
of traffic inactivity (idle flow timeout), said flow is removed from the cache.
Syntax:
Config>rush-engine ?
disable Disable Rush Engine
timeout Rush Engine idle flows timeout in seconds
<cr>
Config>
Command history:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
2.4.30 SAVE
Allows you to store the configuration in the active storage unit. The active storage unit is configured through the con-
fig-media command.
Before executing this, if the command does not have parameters indicating the contrary, the operation requests con-
firmation for said process. If confirmed, the selected media is accessed and the operation results are displayed.
Where the active unit is made up of various medias, the operation is carried out over both as indicated in the final
message. For further information, please see the config-media command found in this manual and the installation
manual for your device.
If the configuration confirmation is activated, it's saved in a temporary file (TEMP.CFG ). If the new configuration is
confirmed (confirm-cfg), it is resaved using the corresponding name. If you execute save in a test configuration, it
resaves over TEMP.CFG without modifying the previous configuration, which is restored if you do not confirm.
However, this does not eliminate the timer, so once the test time has timed out if the device has not restarted, the
previous configuration is restored. For further information, please see the confirm-cfg and confirm-cfg-needed
commands.
On using the save command, it’s essential you remember which configuration is being saved. There are two config-
urations in the device at all times, which coincide on startup until the user modifies one of them. One configuration is
accessible from the RUNNING-CONFIG (Config$) process and is used at all times. The other configuration is ac-
cessible from the CONFIG (Config>) process and is only available for editing.
If you execute save in the RUNNING-CONFIG process, you are saving the configuration in use when executing said
command. However, if you execute save from the CONFIG process, you save the configuration you edited in said
process. As a result, you need to be very careful when modifying and saving configurations, particularly if the device
is managed by several users.
Syntax:
• yes this is an optional parameter that prevents the device prompting the user for confirmation before executing the
save operation. If this value is yes, confirmation is not required. If it is not included, the device requests confirma-
tion.
• < file-name > filename where you wish to save the configuration. If you do not enter any name, the device uses
the active configuration filename (see set file-cfg).
Example 1:
Config>save
Save configuration (Yes/No)? y
Building configuration as text... OK
Writing configuration... OK on Flash
Config>
Example 2:
2.4.31 SET
Allows you to configure various general parameters in the system.
Syntax:
Config>set <parameter>
application-active Permits you to select the code used to boot the router
console Set console configuration
contact-person Assign a name or identification to the contact-person
data-link Type of data link for a WAN line
default-conf Restores the default configuration
file-cfg Configure a configuration file as active
ftp Permits you to access the FTP configuration menu
Syntax:
• < code file > name of the code file you want to boot the router with. If you don’t fill out this field, the available code
files are displayed.
Example:
Accesses the configuration menu to access the device through the local console.
Syntax:
Config>set console
Example:
Config>set console
-- Console configuration --
Con config>?
accounting Set accounting options
authorization Set authorization options
function Set CONF port functionality
login Set login options
speed Set console serial port speed
exit
Con config>
2.4.31.2.1 ACCOUNTING
This command associates a list of accounting methods, which have been defined using the AAA feature. The con-
sole service applies the accounting exec methods from the list when an access to the Shell is registered, and the ac-
counting commands methods from the list when an executed command is registered.
Syntax:
Example 1:
In example 1, the AccCmds methods list is configured to be used when accounting for a level 10 command is ex-
ecuted.
Example 2:
In example 2, the AccExec methods list is configured to be used when accounting for access to the Shell is ex-
ecuted.
The lists of methods can only be applied if the AAA feature is enabled. To do this, once the AAA configuration has fi-
nalized, you need to enable it so the lists can be applied to the different services. Further information on this can be
found in manual Teldat Dm800-I AAA Feature .
2.4.31.2.2 AUTHORIZATION
This command associates a list of authorization methods, which have been defined using the AAA feature. The con-
sole service applies the authorization exec methods from the list when authorization is needed from the Shell and au-
thorization commands when authorization from a command is needed.
Syntax:
Example 1:
In example 1, the AccCmds methods list is configured to be used when authorization is required from level 10 com-
mands.
Example 2:
In example 2, the AccExec methods list is configured to be used when authorization is needed from the Shell.
The lists of methods can only be applied if the AAA feature is enabled. To do this, once the AAA configuration has fi-
nalized, you need to enable it so the lists can be applied to the different services. Further information on this can be
found in manual Teldat Dm800-I AAA Feature .
2.4.31.2.3 FUNCTION
Allows you to configure the CONF port behavior as well as listing its configuration state.
In some device versions, you can select the local console port (CONF) function. In said devices, this port can behave
as a local console or as an asynchronous serial port (UART).
On configuring the Asynchronous serial port mode, the CONF connector appears as a UART interface when listing
the equipment’s devices.
Example:
Config>list dev
Config>list dev
Interface Connector Type of interface
ethernet0/0 EXP/SWITCH Marvell Fast Ethernet Switch
serial0/0 SERIAL0/WAN1 Auto Install Interface
uart0/0 CONF Asynchronous Serial Line
x25-node --- Router->Node
cellular1/0 SLOT1 AT COM
cellular1/1 SLOT1 AT COM
ppp1 --- Generic PPP
Config>
Con config>function ?
set Set CONF port functionality
list List CONF port functionality
Con config>
As this function affects the device BIOS, as in Asynchronous serial port mode, the device doesn’t send data through
this interface during startup. This command is not affected by the save command. The device also has to be re-
booted so the configured value takes effect.
Note
Note
The device must be rebooted so the configured mode can take effect.
Note
This command cannot be seen through the show configuration command. As this is a special com-
mand affecting BIOS behavior on startup, the CONF port behavior is configured when installing the
device and consequently is not modified.
FUNCTION SET
Allows you to select the operating mode for the CONF port. The two options are console or asynchronous serial
line.
Syntax:
Example:
FUNCTION LIST
Allows you to list the mode the CONF port is configured in.
Syntax:
Example:
Allows you to configure the number of successive failed login attempts before blocking access through the local con-
sole.
Syntax:
Example:
Con config>
This command associates an authentication login methods list defined through the AAA feature. The console service
can apply the methods from the associated list when authentication is executed.
Syntax:
Example:
In example, the AutheLogin methods list is configured to be used when authentication is required from a user ac-
cessing through the console.
The lists of methods can only be applied if the AAA feature is enabled. To do this, once the AAA configuration has fi-
nalized, enable it so the lists can be applied to the different services. Further information this can be found in manual
Teldat Dm800-I AAA Feature .
Allows you to configure the blocking time for the local console where the configured number of failed login attempts
has been reached.
Syntax:
• < blocking_time > this is the time the local console stays blocked for, when the configured number of failed login
attempts has been reached.
Example:
2.4.31.2.7 SPEED
Allows you to configure the speed (baud rate) for the local console port.
Syntax:
• < baud > This is the baud rate for the local console port in bits per second. This can only support certain values.
Example:
Con config>speed ?
9600 bits per second
14400 bits per second
19200 bits per second
38400 bits per second
57600 bits per second
115200 bits per second
Con config>speed 115200
Con config>
2.4.31.2.8 EXIT
Syntax:
Con config>exit
Example:
Con config>exit
Config>
Allows you to assign a name or identification to the contact-person for this router. The name is limited to a maxim-
um of 79 characters. This information can be displayed by entering list configuration.
Syntax:
Example:
Syntax:
• < type > type of data link to apply to the WAN line.
Enter the set data-link ? command to find out what types are available.
Example:
Config>set data-link ?
arly Alarm Relay on asyncronous data link for a WAN line
asdp ASDP data link for a WAN line
astm ASTM data link for a WAN line
async Asynchronous data link for a WAN line
at AT modem data link for a WAN line
frame-relay Frame-Relay data link for a WAN line
scada SCADA data link for a WAN line
sdlc SDLC data link for a WAN line
sepi SEPI data link for a WAN line
sync Synchronous data link for a WAN line
udafo Udafo data link for a WAN line
x25 X25 data link for a WAN line
x28 X28 data link for a WAN line
• < interface name > WAN interface name over which you wish to apply the specified link type.
To find out what WAN interfaces are available in the device, enter the list devices command.
Example:
Config>list devices
Interface Connector Type of interface
ethernet0/0 GE0/FE0/LAN1 Fast Ethernet interface
ethernet0/1 GE1/FE1/LAN2 Fast Ethernet interface
serial0/0 SERIAL0/WAN1 Auto Install Interface
serial0/1 SERIAL1/WAN2 X25
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
Config>
Example:
Subsequently, enter the list devices command to see if the above command has been successful.
Eliminates the current configuration and restores the default configuration. This command depends on the device
and consequently may not apply to the equipment you have.
Syntax:
Example:
Allows you to configure a configuration file as active. This is the one processed when the device is restarted.
The active storage unit is also displayed. For further information on how to change the unit, please see the config-
media command found in this manual.
Syntax:
The file name is indicated without extensions. If none is passed by the line command, a list of available files with cfg
extension is displayed. If the selected file does not exist the device, on rebooting, uses the default configuration.
Example:
Config>set file-cfg
Config Media: Flash only
A: ROUTER 494 12/05/06 20:15 Flash
A: SAMPLE 523 12/11/06 15:15 Flash
Current config: ROUTER
Config>set file-cfg sample
Config>
Accesses the FTP (File Transfer Protocol) configuration menu. For further information please see manual Teldat
Dm724-I FTP Protocol.
Syntax:
Config>set ftp
Example:
Config>set ftp
-- FTP user configuration --
FTP config>
Physical location of the router. This information is displayed by entering list configuration.
Syntax:
• < place > physical location of the router. Admits up to a maximum of 79 characters for the location length.
Example:
Allows you to assign a name to a device. This information is seen by entering list configuration.
Syntax:
Example:
Note
This command is only available in devices, with the power management feature installed, usually inten-
ded for vehicles and powered by the vehicle battery. To determine if your device supports this feature,
please see the device installation manual.
Allows you to configure the time the device remains operating after switching off the ignition in the vehicle it is in-
stalled in. The aim is to keep the device operating during a configurable period of time, automatically powering down
once said period has timed out. This prevents the battery in the vehicle from being used (or flattened).
Syntax:
• < time > time (in minutes) the device remains powered after switching off the vehicle’s ignition where said device is
installed. Once this timer has timed out, the device executes an ordered shutdown and subsequently powers down.
The range is between 0 and 1044 minutes (24 hours).
• disabled disables the timer so as soon as you switch off the ignition, the device powers down.
Example:
Config>set ignition-off-powerdown-timer 20
Config>
• By default, this feature is disabled. If you do not configure a time period then the device powers down as soon as
the ignition is switched off (this is the same as a set ignition-off-powerdown-timer disabled).
Allows you to configure the maximum inactivity time in the process to access the device through a remote terminal
(TELNET). Once this has timed out, the device Telnet server disconnects.
This maximum inactivity time period is also applied to the local connection in the device console. If the configured in-
active time period times out without any of the keys being touched, the local connection closes. If the user wishes to
use the console again, he must reenter the password.
Syntax:
• < time > maximum inactivity time in minutes before the telnet connection closes or the console blocks. The range
is between 1 minute and 10 hours.
• disabled disables the timer so neither the telnet connection nor the console block closes, unless the remote device
closes said telnet connection or the user terminates the session through the logout command.
Example:
Config>set inactivity-timer 20
Config>
By default the inactivity timer is set at 10 minutes (equivalent to set inactivity-timer 10).
Syntax:
Activates the difference between uppercase and lowercase letters, in the user name authentication process, when
accessing a device through console, telnet or ftp.
Syntax:
Example:
By default, the difference between uppercase and lowercase letter in user name authentication is disabled.
Allows you to configure the device access password through a TELNET remote terminal, a local connection via the
console or connection via FTP.
Syntax:
Example:
Allows you to configure the memory distribution in the device’s various POOLs. If this is not correctly configured, the
device may malfunction.
Syntax:
• < option > pool name you want to set the byte size for.
• < size> size in bytes to set for the pool.
Pools available for configuration can be listed by executing the set pool ? command.
Example:
Note
This command is problematic and should only be executed by a specialist. Incorrect configuration can
cause the device to malfunction.
The aim of this command is to periodically execute device reset at a specific time, or after a determined period of
time from start up. This can be useful for devices that are difficult to access and due to installation conditions, are
susceptible to losing connectivity. In many cases a device reset can reestablish connectivity.
Syntax:
• <day-time> the time of day when you want the device reset to execute or, if you configure time-offset with a value
different to 0, the time of day when the countdown indicated in time-offset begins. This must be expressed in
hh:mm format. The exception being where value is 0.
• < time-offset> this indicates the period movement to execute device reset. The units are seconds, which can be
directly entered: weeks (w), days (d), hours (h), minutes (m) and seconds (s) (e.g. 1w2d3h). Depending on the
value configured in day-time, it’s used in a different way:
- day-time # 0. Indicates the time period from the point where the time indicated in day-time is reached until a
device reset is produced.
Example:
Or:
You need to program the time you want the device to reset and the required time period.
Logically you should program a multiple of a day in the offset. If you don’t, you have to calculate when a device re-
set is going to be produced (time + offset).
In either case, the device has a time window of 180 seconds, so if at startup the current time is in the configured
hour + 180 seconds, you only need to check the offset field as this deals with a periodic reset at the same time.
This must be taken into account if you program shorter times (less than one day) in the offset.
You need to set the time field to 0 for this. In the offset field, you program the time that must lapse from start up un-
til the reset occurs.
We don’t recommend case a) configuration in devices that do not have a Real Time Clock powered with a battery, or
other types of system clock updating (NTP).
To eliminate this programming, you can set both fields to 0 or execute the NO command. E.g.
Important
This command can risk the integrity of the device. Before loading a new software version, module firm-
ware or saving the configuration, ensure that the automatic process DOES NOT reset the device.
Accesses the TELNET protocol configuration. For further information, please see manual Teldat Dm738-I TELNET
Protocol.
Syntax:
Config>set telnet
Example:
Config>set telnet
-- Telnet user configuration --
Telnet config>
Accesses the Web probe configuration. This command or functionality depends on the device i.e. it might not apply
to your device.
Syntax:
Config>set web-probe
Example:
Config>set web-probe
-- Web Probe user configuration --
Probe config>
For further information, please see manual Teldat Dm749-I NSM (Network Service Monitor).
Syntax:
Config>strong-password ?
<0..5> Level of strength (0: strongest)
<cr>
Example:
Config>strong-password 1
2.4.33 TELEPHONY
Accesses Voice over IP (VoIP) telephony parameters configuration environment.
Syntax:
Config>telephony
Example:
Config>telephony
-- Telephony configuration --
Telephony Config>
For further information, please see manual Teldat Dm722-I Voice over IP.
2.4.34 TIME
Allows you to change and check the device date and time. You can also configure summer time (or daylight saving)
start and end times.
Syntax:
Use this command to check the date and time of the device.
Syntax:
Config>time list
Example:
Config>time list
Set by: operator
Date: Wednesday, 03/02/05 Time: 16:28:46 CET
Config>
Use this command to change the date and time of the device.
Syntax:
Config>time set <month> <day> <year> <week day> <hour> <minute> <seconds>
• < month > month corresponding to the date you wish to set.
• < day > day corresponding to the date you wish to set.
• < year > year corresponding to the date you wish to set.
• < week day > weekday corresponding to the date you wish to set.
• < hour > hours corresponding to the time you wish to set.
• < minute > minutes corresponding to the time you wish to set.
• < seconds > seconds corresponding to the hour you wish to set.
Example:
Config>time set 3 2 5 3 16 29 59
Config>
Note
Some devices lose the date and time settings when restarted. Said parameters must be configured us-
ing the NTP Protocol. Please see manual Teldat-Dm728 NTP Protocol for further information.
2.4.34.3 TIME NO
Invalidates a command action within the time configuration environment or establishes the default values.
Syntax:
Config>time no <option>
• < option > specifies the selected option. The available options are summer-time and timezone.
Syntax:
Syntax:
Example:
Config>sho menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
time summer-time recurring 1 mon jan 03:00 1 mon dec 03:00
time summer-time zone-name "CET"
;
dump-command-errors
end
Config>time no summer-time zone-name
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
time summer-time recurring 1 mon jan 03:00 1 mon dec 03:00
;
dump-command-errors
end
Config>
Deletes the entire configuration associated to the summer period, both for dates and the start and end times and the
name associated to said time period.
Syntax:
Config>time no summer-time
Example:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
time summer-time recurring 1 mon jan 03:00 1 mon dec 03:00
time summer-time zone-name "CET"
;
dump-command-errors
end
Config>time no summer-time
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
dump-command-errors
end
Config>
Use this command to configure summer-time start and end times. Apply an offset of one hour (must be added to the
clock value), which you would get if you were not within this period.
There are four available options (three in configuration and one in monitoring).
Allows you to configure the summer-time period indicating the summer-time start and end using precise times and
dates. This is known as absolute time configuration.
Syntax:
• < start day > the day of the month to set for starting the summer-time period.
• < start month > the month to set for starting the summer-time period. Indicate which month by using the first three
letters (jan/feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec).
• < start year > the year to set for starting the summer-time period using the last two digits for the appropriate year
(05 for 2005).
• < start hour > this is the time, in hours and minutes (HH:MM) to set for starting the summer-time period.
• < end day > the day of the month to set for the end of the summer-time period.
• < end month > the month to set for the end of the summer-time period. Indicate which month by using the first
three letters (jan/feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec).
• < end year > the year to set for the end of the summer-time period, using the last two digits for the appropriate
year (05 for 2005).
• < end hour > this is the time, in hours and minutes (HH:MM) to set for the end of the summer-time period.
Example:
Allows you to configure the summer-time period establishing the summer-time start and end using the weekday, the
number of the week within the month, the month, the hour and minute after which the one hour offset must be taken
into consideration and the same parameters to configure return to normal time. Once this data has been entered, the
switch to summer-time and return to normal time is repetitively carried out each year.
Syntax:
hour> <end
week number> <end
week
day> <end
month> <end
hour>
• < start week number > the number of the week within the month to apply summer-time start (1 to 5).
• < start week day > weekday you want summer-time to start. Indicate the day by entering the first three appropriate
letters (mon/tue/wed/thu/fri/sat/sun).
• < start month > month to set for starting the summer-time period. Indicate the month by using the first three letters
(jan/feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec).
• < start hour > time, in hours and minutes (HH:MM) to set for starting the summer-time period.
• < end week number > number of the week within the month to apply the return to the normal timetable (1 to 5).
• < end week day > day of the month to set for the return to the normal timetable. Indicate the day by entering the
first three appropriate letters ( mon/tue/wed/thu/fri/sat/sun).
• < end month > month to set for the return to the normal timetable. Indicate the month by using the first three ap-
propriate letters (jan/feb/mar/apr/may/jun/jul/aug/sep /oct/nov/dec).
• < end hour > time, in hours and minutes (HH:MM) to set to return to the normal timetable.
Example:
Supposing summer-time period starts on the fourth (start week number = 4) Sunday (start week day = sun) of March
(start month = mar) at 2 a.m. (start hour = 02:00), and ends the fourth (end week number = 4) Sunday (end week
day = sun) in October (end month = oct) at 3 a.m. (end hour = 03:00), enter the following:
However on occasions, this rule is not flexible enough; for example, March 2007 has four Sundays while in 2008 it
has five. To adapt to this situation, you can configure 5 as the week number within the month < start week number
> and/or < end week number >). Given the special significance of these parameters, when you configure a 5, the
changes are applied to the last day of the week configured within the configured month, both when in one year there
are 5 weeks as when there are only four.
Example:
Supposing we want our summer-time period to annually begin the last Sunday in March at 2 a.m. and end the last
Sunday in October (again every year) at 3 a.m., we need to enter:
Syntax:
• < text > name associated to the summer-time period. If this text contains spaces, it must be entered between com-
mas (e.g. description “description containing spaces”).
Example:
The following shows a table containing the acronyms commonly used in the distinct time zones for this parameter.
ACRONYM
TIME ZONE NAME AND OFFSET WITH RESPECT TO UTC
Europe
GMT Greenwich Mean Time, as UTC
BST British Summer Time, as UTC + 1 hour
IST Irish Summer Time, as UTC + 1 hour
WET Western Europe Time, as UTC
WEST Western Europe Summer Time, as UTC + 1 hour
84 Configuration and Monitoring
Teldat SA 2 Teldat Router Configuration
Syntax:
Example 1:
Example 2:
Lastly, this indicates it’s possible to obtain the summer-time configuration in text mode. through the show config
command.
Example 1:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
time summer-time date 30 mar 3 02:00 26 oct 3 03:00
;
dump-command-errors
end
Config>
Example 2:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
time summer-time recurring 4 sun mar 02:00 4 sun oct 03:00
;
dump-command-errors
end
Config>
Use this command to configure the differences in hours with respect to UTC time. This determines the time zone
where the device is located.
Syntax:
Example:
Config>time timezone 1
Config>
Note
2.4.35 UCI
Use the UCI command to configure the router encryption unit.
Syntax:
2.4.36 UNSET-DEMO-LICENCE
Unsets demo licence currently being used in the device. After a restart, restart the base licence is used.
This command is only enabled when there actually is an active demo licence.
Syntax:
Config> unset-demo-licence
Example:
Config>unset-demo-licence
Demo licence disabled. Restart device to start using the base licence
Config>
2.4.37 USER
Use this command to create and configure the users who have permission to access the device.
Syntax:
• < name > name of the new user you wish to create.
• <password | hash-password> specifies the password format – text in clear or hash code – to be subsequently
entered for the specified user.
• < pwd> access password in the selected format to give to the specified user.
Example:
On displaying the configuration – show configuration command - for a device where users have been created, for
security reasons, creation command lines for said users always appears using the hash-password option, independ-
ently of whether this option was originally chosen. This means a user password does not appear in clear and cannot
be discovered from the device configuration file. Should the user and the device administrator forget his/her pass-
word, said user must be recreated with a new access password.
Example:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
user usersample hash-password E7AE08B3FEB1F020EEEDE75FCD0D41F1
;
dump-command-errors
end
Config>
One, two or more users2 have been created, you can manage the access level for them, enable or disable their ac-
cess, etc. To access a user configuration menu, carry out the following:
Syntax:
2.4.37.2.1 access-level
Syntax:
[2] Previously, this would have made no sense as if there is only one user, he/she must be the device administrator - root - and consequently would
have all permissions activated.
- Default. The user can execute commands requiring an execution level less or equal to his access level.
- Strict. The user can execute commands requiring an execution level, which is exactly the same as his access
level.
Example:
You can display the created users access level through the list user command in the configuration console.
By default, access level root in default mode is assigned when creating new users.
2.4.37.2.2 active
Syntax:
Example:
You can display the created users’ access level through the list user command in the configuration console.
By default, when creating new users access to the device for said users is enabled.
2.4.37.2.3 hash-password
Syntax:
Example:
You can view the created users password hash code by using the show configuration command in the configura-
tion console.
2.4.37.2.4 keymanager
Configures a user as the IPSec keymanager for the device. This action can only be carried out by a user with root
access level or, if there be one, by another keymanager user.
This command divides the permission management system, creating two completely independent profiles: one for
IPSec key configuration only and the other exclusively for configuring the rest of the device parameters.
Syntax:
Example:
Note
Given the existence of this type of special user, there would be no specific user with total control over
the device configuration system. We do not recommend using this option except in extreme cases
where the device management is shared.
You can view the users configured as keymanager using the list user command in the configuration console.
2.4.37.2.5 no
Syntax:
2.4.37.2.6 active
Syntax:
Example:
2.4.37.2.7 keymanager
Syntax:
Example:
2.4.37.2.8 password
Syntax:
Example:
2.4.38 END
Indicates the end of a configuration file. All configuration files must include this command at the end so the file loads
correctly in the device startup process.
This command is automatically added as the last command in the device configuration files (cfg) when executing the
save or show config commands.
Syntax:
Config>end
Example:
Config>show config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
Exit
;
;
;
dump-command-errors
end
; --- end ---
Config>
3.1 Introduction
This chapter describes the device monitoring (p3) process. It allows you to view the system status as well as the stat-
istics gathered by the device. It also enables users, with the appropriate access level, to manage said statistics and
execute operating tests over certain features or functionalities in the device.
Bearing in mind the access level required for execution, the following types of commands have been differentiated
within the monitoring process:
• Event type (event -view/hide-). To execute these commands, the user must have an access level higher or equal to
EVENT.
• Show type (listing statistics, interface status, counters, etc.). The user must have an access level higher or equal to
MONITOR to execute these commands. Within this typology, commands such as telnet, ssh, ping, vrf-ping, atm-
ping, traceroute, etc., are also located.
• Clear type (delete/reset of information regarding statistics, registers, counters, etc.). The user must have an access
level higher or equal to CONFIG to execute these commands.
• Conf type (testing of interfaces, events management, IPSec tunnels activation, etc.). The user must have an ac-
cess level higher or equal to CONFIG to execute these commands. Within this typology, commands such as
bping, vrf-bping, tftp, etc., are also located.
• Root type (sends an escape character to a terminal connected to the device and running a session, to force a user
to exit a determined menu or to close the session ). To execute these commands, the user must have a ROOT ac-
cess level (level 15).
When in the monitoring system, the device only shows the commands a user can use (or execute) when he uses the
help command ?
Access levels available in the device, as well as the configuration process for these, are specified in Router Console
on page 1 (section Teldat Router connection on page 2 ) and Teldat Router Configuration on page 16 (section
USER on page 87) in this manual.
Example:
*monitor
Console Operator
+
To exit the MONITOR procedure and return to console manager GESTCON prompt “*”, press the escape character
(Ctrl-p by default).
Command Function
? (HELP) Lists the MONITOR process commands.
BUFFER Displays information on packet buffers assigned to each interface.
CLEAR Clears network statistics.
CONFIGURATION Lists the status of current protocols and interfaces.
DEVICE Displays network hardware statistics or statistics for the specified interface.
ERROR Displays the error counters.
EVENT Enters Event Logging System environment.
FEATURE Accesses monitoring commands for router features, outside usual protocols, and
network interface monitoring processes.
LAST-CONFIG-CHANGES Displays the latest changes made to the configuration.
MALLOC-MONITOR Accesses monitoring commands for device memory management.
MANAGEMENT Enters master router environment.
3.2.1 ? (HELP)
List the commands available at the current prompt level. You can also type ? after a specific command to list its op-
tions.
Syntax:
+?
Example:
+?
buffer Packet buffers assigned to each interface
clear Clear network statistics
configuration List status of current protocols and interfaces
device List statistics for the specified interface
error List error counters
event Event Logging System environment
feature Access to monitoring commands for router features
last-config-changes Display the last changes made in the configuration
log Dump log data
malloc-monitor Malloc monitor information
management Master router environment
memory Display memory, buffer and packet data
network Enter the console environment of a specified network
node Enter the node monitoring environment
protocol Enter the commands environment for a specified
protocol
queue Display buffer statistics for a specified interface
quick Access the quick menu monitoring
rush-engine Rush Engine Monitor
statistics Display statistics for a specified interface
system Permit monitoring of the system’s memory and stacks
telephony Monitoring environment for the telephony functions
uci Encryption statistics
web-probe Access the Web poll monitoring
exit
+
3.2.2 BUFFER
Displays information on packet buffers assigned to each interface.
Note
Each buffer on a single device is the same size and dynamically built. Buffers vary in size from one
device to another.
Syntax:
• < interface > name of interface you wish to display information for.
• < verbose > displays additional information.
To view available interfaces in the device, enter the configuration command at the + prompt. If you do not enter a
name, information on all interfaces is displayed.
Example:
+buffer
Input Buffers Buffer Sizes
Interface Req Alloc Low Curr Hdr Wrap Data Trail Total
ethernet0/0 40 40 5 40 22 62 1500 4 1588
serial0/0 40 40 5 40 18 62 2048 12 2140
serial0/1 0 0 0 0 0 62 0 0 62
serial0/2 0 0 0 0 0 62 0 0 62
bri0/0 160 160 5 160 17 62 2048 12 2139
x25-node 0 0 0 100 20 62 1500 0 1582
+ buffer ethernet0/0
Input Buffers Buffer Sizes
Interface Req Alloc Low Curr Hdr Wrap Data Trail Total
ethernet0/0 40 40 5 40 22 62 1500 4 1588
• Input buffers
Req Number of input buffers requested.
Alloc Number of input buffers allocated.
Low Low water mark (flow control).
Curr Current number of input buffers in this device. If value is 0, the device is disabled. When a packet is
received and the Curr value is below Low, then the flow control can select it. See the queue com-
mand for conditions.
• Buffer sizes
Hdr This is the maximum value between the two following terms:
• Bytes
Alloc Amount of buffer memory bytes for this device. This value is determined by multiplying the values
of Curr x Total .
Buffer size Complete size of the buffer.
Packet size Maximum packet size.
Trailer size Maximum trailer size.
Packet offset Packet offset in the buffer.
3.2.3 CLEAR
Restarts statistical information on all router interfaces, zeroizing all counters. This command is useful when search-
ing for changes in large counters. Please note that this command does not save memory space or increase the
router speed.
Syntax:
+clear
Example:
+clear
Are you sure to clear stats?(Yes/No)?
+
3.2.4 CONFIGURATION
Displays information on the protocol and network interfaces. The output presented by this command can be divided
into three sections: the first contains data such as router identification, software version, boot ROM version, and the
state of the watchdog, as well as device date and time together with the length of time since last reboot. The second
and third sections display information on protocols that can be monitored and the current interfaces.
Syntax:
+configuration
Example:
+configuration
4 H323 H323
6 DHCP Dynamic Host Configuration Protocol
11 SNMP SNMP
13 RIP Route Information Protocol
17 SIP SIP
30 EAPOL Extensible Authentication Protocol Over LAN
31 Preauth WLAN Preauthentication
4 interfaces:
Connector Interface MAC/Data-Link Status
GE0/FE0/LAN1 ethernet0/0 Ethernet/IEEE 802.3 Up
GE1/FE1/LAN2 ethernet0/1 Ethernet/IEEE 802.3 Testing
BRI/ISDN1 bri0/0 BRI Net Testing
--- x25-node internal Up
SNMP OperStatus:
Interface OperStatus
ethernet0/0 Up
ethernet0/1 Down
bri0/0 Down
x25-node Up
Encryption Engines:
Hardware: SEC-8272 Revision: 0xA, block 0x0
The first block (lines 1-3) display general technical information on the device. The first line lists the type of router,
user license and its serial number.
The second block (lines 4-5) displays information on the demo license (referencing when said license expires) and
base license, which the device returns to on expiry or when manually deactivated. This block only appears if there is
an active demo license.
The third block (lines 6-12) displays the Boot ROM (Read Only Memory) version currently installed in the router from
the BIOS and the current setting for the watchdog timer.
The fourth block (lines 13-15) lists software version currently running on the router.
The fifth block (lines 16-18) displays hostname, active user, the date and time, and the length of time since last
device boot up.
The sixth block lists configured protocols and interfaces. The meaning of each field is as follows:
Num Number associated with the protocol.
Name Abbreviated name of the protocol.
Protocol Full name of the protocol.
The seventh block displays a list of interfaces available in the device. The meaning of each field is as follows:
Connector Connector associated to the interface.
Interface Interface name.
MAC/Data Type of MAC/Data link configured for this interface.
Link
Status Current status of network interface.
Testing The interface is undergoing an auto-test. This occurs the first time the router is
started and this detects problems in the interface. Once the interface is on the net-
work, it periodically sends out test packets to ensure it is still functioning properly.
If the test fails, the router removes the interface from the network and runs the
self-test to ensure integrity. If a failure occurs during auto-test, the router declares
the network down. If the self-test is successful, the router declares the network up.
Up The interface is operational and connected.
Down The interface is not operational and has failed an auto-test. The router continues
to carry out the test over the network at increasing intervals, beginning at five
seconds, until the router stops testing said interface (approximately two minutes).
Disabled Shutdown configuration command has disabled the interface.
Not present Either there is no interface present in the router, or the console is incorrectly con-
figured.
Unsupported The current release/license does not support the interface hardware.
Available State of the secondary interface in a WAN configuration when the main one is act-
ive.
Error Disabled. An error has been detected and the interface has been disabled.
The eighth block – SNMP OperStatus – displays a list on the interface operating status (from the SNMP protocol
point of view, defined in RFC 2233). The meaning of each field is as follows:
Interface Interface name.
OperStatus Possible SNMP operating states are as follows:
Up Interface is ready to transmit and receive network traffic.
Down Interface is not operative.
Testing Interface is executing a test; real traffic packets cannot be transmitted.
Unknown Interface operating status cannot be determined for unknown reasons.
Dormant Interface is operating, but waiting for an external event to begin sending or receiv-
ing packets. It presumably passes to ‘Up’ once the expected event occurs. For ex-
ample: when dial interfaces do not have any traffic to send (have not initiated a
call) or, when only incoming calls are permitted and the remote end has not initi-
ated connection.
Not present This state is a refinement of ‘Down’. This indicates the interface is down, specific-
ally due to the lack of a component (often hardware).
Lower layer This is another refinement of ‘Down’, which indicates the interface has been as-
down sembled on top of one or more interfaces and one of the latter is down.
The ninth block displays information on versions for encryption cards and cellular and wireless LAN drivers.
3.2.5 DEVICE
Displays statistical information on network interfaces such as Ethernet, Token Ring etc. This command is used to ob-
tain a summary report on all interfaces, or to obtain detailed information on a specific interface.
Syntax:
+device [<interface>]
• < interface > name of the interface you wish information on.
If you do not enter the interface name, generic information on all interfaces is displayed.
Example 1:
+device
Auto-test Auto-test Maintenance
Interface CSR Vect valids failures failures
ethernet0/0 fa200e00 27 1 0 0
serial0/0 fa200a00 5E 0 156 0
serial0/1 fa200a20 5D 0 156 0
serial0/2 fa200a60 5B 0 7 0
bri0/0 fa200a40 5C 1 0 0
x25-node 0 0 1 0 0
+
Example 2:
+device ethernet0/0
Auto-test Auto-test Maintenance
Interface CSR Vect valids failures failures
ethernet0/0 fa200e00 27 1 0 0
Input statistics:
failed, frame too long 0 failed, FCS error 0
failed, alignment error 0 failed, FIFO overrun 1
The fields subsequently appearing, depend on the type of interface selected. These have self-explanatory names for
the information they display.
Note
The screen display can vary depending on the router and device.
3.2.6 ERROR
Displays error statistics for the segmented network for various interfaces available in the device. This command
provides error counters.
Syntax:
+error
Example:
+error
Input Input Input Input Output Output
Interface Discards Errors Unk Proto Flow Drop Discards Errors
ethernet0/0 0 0 1016 0 0 0
serial0/0 0 0 0 0 0 0
serial0/1 0 0 0 0 0 0
serial0/2 0 0 0 0 0 0
bri0/0 0 0 0 0 0 0
x25-node 0 0 0 0 0 0
+
The sum between all “Input Flow Drop” and “Output Discards” interfaces is not the same. This is because “Output
Discards” may contain locally generated packets.
3.2.7 EVENT
Use this command to enter the Event Logging System (ELS+) prompt. Here you can temporally create filters for mes-
sages with the aim of solving problems. All changes carried out at the ELS+ prompt are immediate, however these
disappear when the router is re-started. For further information please see Event Logging System ELS on page 135.
To return to the + prompt, enter the exit command.
Syntax:
+event
Example:
+event
-- ELS Monitor --
ELS+
3.2.8 FEATURE
This provides access to the features monitoring menu, which are neither network protocols nor interfaces. Enter ?
after feature to get a list of features available for your software version.
Through this command, enter the corresponding feature monitoring. For further information please see the corres-
ponding manual.
Note
Said feature must be enabled at the configuration prompt before you can monitor it.
Syntax:
+feature <option>
access-lists Generic IP lists monitoring
afs Advanced firewall system feature
bandwidth-reservation Bandwidth-Reservation System feature monitoring
dns DNS monitoring environment
dns-updater DNS UPDATER monitoring enviroment
err-disable Error disable monitoring
gps-applications GPS Applications monitoring
hotspot Hotspot monitoring enviroment
http HTTP server monitoring
ip-discovery Ip-discovery monitoring
ipv6-access-list IPv6 access list monitor
istud IPSEC Tunnel Server Discovery Protocol monitoring
ldap LDAP (Lightweight Directory Access Protocol)
monitoring
mac-filtering MAC-Filtering feature monitoring
management Management Monitoring
management-platform Management Platform monitoring
netflow Netflow client monitoring
nsla NSLA (Network Service Level Advisor) monitoring
nsm NSM (Network Service Monitor) monitoring
ntp NTP (Network Time Protocol) monitoring
policy-map Policy map monitoring
power-switch TeleControl Module control environment
prefix-lists Prefix lists monitoring
radius RADIUS feature monitoring
rmon RMON (Remote Network Monitoring)
scada-forwarder Scada protocol monitoring
spi SPI agent monitoring
stun Stun protocol monitoring
syslog Syslog client monitoring
tftp Access the device#s TFTP client.
ttcp Ttcp (test tcp)
vli Virtual Linux Interface monitoring
wnms Wireless Network Management System monitoring
wrr-backup-wan WAN Reroute feature monitoring
• < option > specifies the type of information you wish to display.
Syntax:
+feature access-lists
Example:
+feature access-lists
-- Access Lists user console --
Access Lists+
For further information on generic access list monitoring, please see manual Teldat Dm752-I Access Control.
Syntax:
+feature afs
Example:
+feature afs
-- AFS Monitor --
AFS+
Use this command to enter Bandwidth-Reservation System feature monitoring. For further information please see
manual Teldat Dm715-I Bandwidth Reservation System .
System:
+feature bandwidth-reservation
Example:
+feature bandwidth-reservation
-- Bandwidth Reservation console --
BRS+
Accesses the DNS monitoring environment. For further information please see manual Teldat Dm723-I DNS Client .
Syntax:
+feature dns
Example:
+feature dns
-- DNS resolver user console --
DNS+
Syntax:
+feature dns-updater
Example:
+feature dns-updater
-- DNS Updater console --
DNS Updater
For further information, please see manual Teldat Dm785-I DNS Updater.
Syntax:
+feature err-disable
Example:
+feature err-disable
-- Error Disable user console --
errdisable+
Syntax:
+feature gps-applications
Example:
+feature gps-applications
-- GPS Applications user console --
GPS Apps+
For further information on gps-applications monitoring, please see manual Teldat Dm812-I GPS.
Use this command to access the HotSpot feature monitoring menu. Please see Dm 820-I HotSpot Feature for further
information.
Syntax:
+feature hotspot
Example:
+feature hotspot
Command history:
Release Modification
11.00.03 New command added.
Accesses HTTP protocol monitoring. For further information, please see manual Teldat Dm737-I HTTP Protocol.
Syntax:
+feature http
Example:
+feature http
-- HTTP server user console --
HTTP+
Use this command to enter feature ip-discovery monitoring. This command or feature depends on the device i.e. it
may not apply to your device.
Syntax:
+feature ip-discovery
Example:
+feature ip-discovery
-- TIDP Console --
TIDP+
Syntax:
+feature ipv6-access-list
Example:
+feature ipv6-access-list
-- IPv6 Access Lists user console --
IPv6 Access Lists+
For further information, please see manual Teldat Dm808-I IPv6 Access Control.
Syntax:
+feature istud
Example:
+feature istud
-- ISTUD console --
ISTUD+
For further information, please see manual Teldat Dm784-I ISTUD Feature.
Use this command to enter LDAP protocol (Lightweight Directory Access Protocol) monitoring.
Syntax:
+feature ldap
Example:
+feature ldap
LDAP client monitor
LDAP+
Syntax:
+feature mac-filtering
Example:
+feature mac-filtering
-- MAC Filtering user console --
Filter+
Syntax:
+feature management
Example:
+feature management
-- Management Console --
management+
Command history:
Release Modification
11.00.05 FEATURE MANAGEMENT menu was introduced as of version 11.00.05.
11.01.00 FEATURE MANAGEMENT menu was introduced as of version 11.01.00.
Syntax:
management+script <id_script>
Example:
management+script 1
Starting executing Script 1
Sending command: p 4
Response: *
Response: Config>
Response: *
Command p 4 sent without errors
management+
Command history:
Release Modification
11.00.05 script <id_script> command was introduced as of version 11.00.05.
11.01.00 script <id_script> command was introduced as of version 11.01.00.
3.2.8.15.2 STATISTICS
Use this command to list all operations associated to advisor notifications and information such as, the times they
have been executed, the last time each operation was executed and if any errors were produced during execution.
Syntax:
management+statistics
Example:
management+statistics
----------------------------------------------------------------------
----------------------------------------------------------------------
6 0 1970-01-01 00:00:00 0
Command history:
Release Modification
11.00.05 statistics command was introduced as of version 11.00.05.
11.01.00 statistics command was introduced as of version 11.01.00.
Syntax:
+feature netflow
Example:
+feature netflow
NETFLOW Monitor
NETFLOW Mon+
Use this command to enter NSLA feature (Network Service Level Advisor) monitoring.
Syntax:
+feature nsla
Example:
+feature nsla
-- NSLA console --
NSLA+
For further information please see manual Teldat Dm754-I NSLA (Network Service Level Advisor) .
Use this command to enter NSM feature (Network Service Monitor) monitoring.
Syntax:
+feature nsm
Example:
+feature nsm
-- NSM console --
NSM+
For further information please see manual Teldat Dm749-I NSM (Network Service Monitor) .
Accesses the NTP (Network Time Protocol) monitoring environment. For further information, please see manual
Teldat Dm728-I NTP Protocol .
Syntax:
+feature ntp
Example:
+feature ntp
Syntax:
+feature policy-map
Example:
+feature policy-map
-- Policy Map user console --
Policy-Map+
For further information, please see manual Teldat-Dm795-I Policy map Class map.
Use this command to access device Telecontrol Module control environment. This environment is only accessible to
the user via telnet, and its use only affects devices connected to a power source through an MTC+ or MTC.
Syntax:
+feature power-switch
Example:
+feature power-switch
POWER-SWITCH monitor
POWER-SWITCH+
For further information please see manuals: Teldat Dm296-I Telecontrol Module (MTC) or Teldat Dm689-MTC+
(MTC+).
Syntax:
+feature prefix-lists
Example:
+feature prefix-lists
-- Prefix Lists user console --
Prefix Lists+
Use this command to enter RADIUS feature monitoring. For further information, please see manual Teldat Dm733-I
RADIUS Protocol.
Syntax:
+feature radius
Example:
+feature radius
-- RADIUS user console --
RADIUS+
Syntax:
+feature rmon
Example:
+feature rmon
-- RMON (Remote Network Monitoring) console --
RMON+
For further information, please see manual Teldat Dm796-I RMON Feature.
Syntax:
+feature scada-forwarder
Example:
+feature scada-forwarder
SCADA Forwarder Console
SCADA FWD+
Syntax:
+feature spi
Example:
+feature spi
-- SPI Agent user console --
SPI+
For further information, please see manual Teldat Dm793-I SPI Agent.
Accesses STUN client monitoring environment. For further information, please see manual Teldat Dm769-I STUN
Protocol.
Syntax:
Example:
Syntax:
+feature syslog
Example:
+feature syslog
-- SYSLOG client console --
SYSLOG+
For further information please see manual Teldat Dm753-I Client syslog .
Syntax:
+feature tftp
Example:
+feature tftp
TFTP manager
TFTP+
For further information, please see manual Teldat Dm765-I TFTP Protocol.
Use this command to enter a menu to carry out tests on ttcp traffic loading.
Syntax:
+feature vli
Example:
+feature vli
-- VLI monitor --
vli+
For further information, please see manual Teldat Dm803-I Virtual Linux Interface VLI.
Accesses WNMS (Wireless Network Management System) feature monitoring. For further information, please see
manual Teldat Dm819-I Wireless Network Management System .
Syntax:
+feature wnms
Example:
+feature wnms
-- WNMS Console --
WNMS+
Command history:
Release Modification
11.00.03 New command added.
Use this command to enter WRR-Backup WAN feature monitoring. For further information please see manual Teldat
Dm727-I Backup WAN Reroute .
Syntax:
+feature wrr-backup-wan
Example:
+feature wrr-backup-wan
-- Back-up WAN Reroute user console --
WRR+
3.2.9 LAST-CONFIG-CHANGES
Use this command to monitor the latest configuration recordings. The first row is the latest configuration the device
has stored. This is the active one provided no other configuration change has been produced after re-starting the
device. If a change has been made, the active configuration is in the second information register. The first informa-
tion register is modified each time the configuration is saved without restarting the device.
Syntax:
+last-config-changes
Example:
+last-config-changes
Last configuration changes
-------------------------------------------------------------------------------
File Acc-Type Address User Date/Time
-------------------------------------------------------------------------------
SAMP1.CFG Console 0.0.0.0 CONSOLE 03/03/05 10:40:29
TFTP.CFG Console 0.0.0.0 usersample 02/28/05 13:37:02
TFTP.CFG Telnet 172.24.51.128 TELNET 02/24/05 15:29:40
TFTP.CFG Telnet 172.24.51.128 TELNET 02/24/05 15:24:21
IGMP.CFG Console 0.0.0.0 usersample 02/24/05 13:45:33
TFTP.CFG Console 0.0.0.0 usersample 02/24/05 11:56:51
TFTP.CFG Console 0.0.0.0 CONSOLE 02/24/05 11:54:51
IGMP.CFG Console 0.0.0.0 usersample 02/23/05 19:34:36
IGMP.CFG Console 0.0.0.0 CONSOLE 02/22/05 17:20:45
+
3.2.10 LAST-APP-VERSION-CHANGES
Command history:
Release Modification
11.00.05 This command was introduced as of version 11.00.05.
Use this command to monitor the latest CIT version upgrades. The first row shows the latest update the device has.
Only the latest 15 upgrades are stored.
Syntax:
+last-app-version-changes
Example:
+last-app-version-changes
VERSION
Date/Time Time and date this version was loaded by the device.
Syntax:
+list current-devices
Example:
+list current-devices
Interface Connector Type of interface
ethernet0/0 GE0/FE0/LAN1 Fast Ethernet interface
ethernet0/1 GE1/FE1/LAN2 Fast Ethernet interface
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
+
Command history:
Release Modification
10.08.34.05.12 This command option was introduced as of version 10.08.34.05.12.
11.00.05 This command option was introduced as of version 11.00.05.
11.01.01 This command option was introduced as of version 11.01.01.
3.2.12 MALLOC-MONITOR
Use this command to monitor the internal system of the device memory management. Through command options,
you can control the diagnosis systems for system memory administration. The use of this command requires in-depth
knowledge of the Teldat Routers software and hardware architecture and should only be used when expressly indic-
ated by Teldat personnel.
Syntax:
+malloc-monitor <option>
DISABLE
ENABLE
ASSIGNED-MEMORY-BLOCKS
LIST
SHOW-FLAGS
ALL-REQUESTS
IGNORE-START-REQUESTS-FLAG
NEWEST-REQUESTS-FLAG (less than a minute age)
OLDEST-REQUESTS-FLAG (more than a minute age)
START-RECORD
STOP-RECORD
GET-MEMORY
VIEW-MEMORY
FREE-MEMORY
3.2.13 MANAGEMENT
Enters the master router monitoring environment.
Syntax:
+management
Example:
+management
-- Routers management user console--
MANAGEMENT+
3.2.14 MEMORY
This command displays information relative to the different types of memory available in the device.
The first, SYSTEM MEMORY, shows an overview, highlighting how the system has assigned RAM memory. These
values are set when the router starts and do not change during operation.
In the second block, information on the HEAP memory is displayed. Data displayed in this block is subdivided in
four extra sub-blocks, separated by a blank line, providing a snapshot of the HEAP status. The first sub-block sum-
marizes the current use of the HEAP; the second sub-block lists currently existing chunks (a size smaller than block
size); the third sub-block provides information on chunks one size bigger than the block size. Their statistics are
stored in registers, which are labeled by an arithmetic progression, based on their chunk size; the forth sub-block
provides information on chunks one size bigger than those displayed in the previous sub-block. Statics on the latter
are stored in registers, labeled with a geometric progression, based on their chunk size.
• Total : amount of memory assigned to the HEAP, including internal system data.
• Usable: maximum amount of memory the HEAP can allocate to support running processes.
• Free: free memory in HEAP.
• Block size: the heap is divided in bocks of n size.
Chunk usage is a global measurement used for currently assigned chunks smaller than block size.
In this second sub-block, the number of assigned chunks, for a given size, is allocated as needed by taking memory
space from chunks displayed in next sub-blocks. The more chunks in this sub-block the less size for chunks in the
next sub-blocks.
As already said, it is important to know that statistics for chunk sizes in the third sub-block are registered in an arith-
metical progression, while in the fourth sub-block they are stored geometrically. This means that in the third sub-
block, the number of assigned bytes for a chunk size is calculated by multiplying the chunk size by the number of
Size chunks for registers in third sub-block are separated by block size. The first line in the example is interpreted as
follows: in the register for chunk sizes of 12288 bytes, there are 85 allocated chunks with a total size of 1044480
bytes. The maximum number of chunks concurrently assigned for this register is 85 and there are no free chunks of
12288 bytes to be stored in this register.
Size chunks for registers in the fourth sub-block are separated by a multiple of block size, resulting in the evolution of
registered chunk sizes in a geometrical progression form. Here, each register shares statistics between different
chunk sizes; this is what happens in the second line of the previous example. This line is interpreted as follows: in
the register for chunk sizes between 16822272 bytes and the next registered chunk size, there are two allocated
chunks with a total size of 54730752 bytes. The maximum number of chunks concurrently assigned for this register
is two and there are no free chunks with said size to be stored in this register.
Depending on the equipment, statistics relative to different chunk sizes are not available, global information on used
and free chunks are displayed instead.
In the third block, information relative to the memory POOL1 is displayed. POOL1 is an area of memory reserved
for messages and buffers from the node in fixed size partitions.
Syntax:
+memory
Example:
+memory
SYSTEM MEMORY:
Total 536870912
Dynamically managed 502296576
Code 34574336
Caches ON Write Back
HEAP:
total 502296576
usable 501772288
free 377067688
block size 4096
8 bytes chunks: 39936 ( 319488 bytes) total, 345 ( 2760 bytes) free
16 bytes chunks: 5888 ( 94208 bytes) total, 244 ( 3904 bytes) free
32 bytes chunks: 35072 ( 1122304 bytes) total, 105 ( 3360 bytes) free
64 bytes chunks: 7168 ( 458752 bytes) total, 24 ( 1536 bytes) free
128 bytes chunks: 544 ( 69632 bytes) total, 11 ( 1408 bytes) free
256 bytes chunks: 80 ( 20480 bytes) total, 4 ( 1024 bytes) free
512 bytes chunks: 28968 ( 14831616 bytes) total, 1 ( 512 bytes) free
1024 bytes chunks: 56 ( 57344 bytes) total, 0 ( 0 bytes) free
2048 bytes chunks: 36934 ( 75640832 bytes) total, 0 ( 0 bytes) free
Chunk usage: 99.00%
4096 bytes chunks: 22638 ( 92725248 bytes) used ( 22638 max), 0 ( 0 bytes) free
8192 bytes chunks: 28 ( 229376 bytes) used ( 28 max), 0 ( 0 bytes) free
12288 bytes chunks: 85 ( 1044480 bytes) used ( 85 max), 0 ( 0 bytes) free
16384 bytes chunks: 45 ( 737280 bytes) used ( 45 max), 0 ( 0 bytes) free
POOLS:
POOL1 Sz:9631710 AllocPart:1 AvlPart:27917
Important
The appearance of the data resulting from this command depends on the device model.
3.2.15 NETWORK
Displays the monitoring prompt for the specified network interface, such as the Frame Relay, PPP, X.25 network etc.
Statistical information can be displayed from said prompt.
Syntax:
+network <interface>
• < interface > name of the network interface whose monitoring environment you wish to access.
Enter device at the + prompt to see the networks the router is configured for.
Example:
+device
Auto-test Auto-test Maintenance
Interface CSR Vect valids failures failures
ethernet0/0 fa200e00 27 1 0 0
serial0/0 fa200a00 5E 0 373 0
serial0/1 fa200a20 5D 0 373 0
serial0/2 fa200a60 5B 0 10 0
bri0/0 fa200a40 5C 1 0 0
x25-node 0 0 1 0 0
+network serial0/0
For further information, please see the manual associated to the specified network interface for the monitoring envir-
onment you wish to access.
Syntax:
+node <name>
X25
XOT
270
• < name > name of the node for the monitoring menu you wish to access.
Accesses node monitoring relative to X.25. The parameters relative to a port can be configured in the network for
said port (+network port command).
Syntax:
+node x25
Example:
+node x25
-- X25 Monitor --
X25+
Accesses node monitoring relative to 270. You can also access from the 270 network (+ network port command).
Syntax:
+node 270
Example:
+node 270
270 Monitoring
270>
3.2.17 PROTOCOL
Use this command to enter the commands environment for the protocols' software installed in the router. The pro-
tocol command followed by the desired protocol number, or short name, accesses a protocol command environ-
ment. After entering this command, the specified protocol prompt appears. From this prompt, enter the specific com-
mands for said protocol.
Syntax:
+protocol <identifier>
• < identifier > protocol identifier name whose monitoring menu you wish to access.
Example:
+protocol ?
arp Access ARP protocol
asrt Access ASRT protocol
bfd Access BFD protocol
bgp Access BGP protocol
dhcp Access DHCP protocol
dhcpv6 Access DHCPv6 protocol
dls Access DLS protocol
dot1x Access 802.1X protocol
gw104 Access GW-104 protocol
h323 Access H323 protocol
igmp Access IGMP protocol
ip Access IP protocol
ipv6 Access IPv6 protocol
3.2.18 QUEUE
Displays statistics on the length of input and output queues in the specified interfaces. Information provided by the
queue command includes:
Syntax:
+queue <interface>
• < interface > name of the network interface whose monitoring environment you wish to access.
If you do not specify the interface, information on all interfaces available in the device is displayed.
Example:
+queue
Input Queue Output Queue
Interface Alloc Burst Low Curr Min Cur.Req Max.Req Fair Current Max
ethernet0/0 256 16 5 256 256 256 257 246 0 0
ethernet0/1 256 16 5 256 0 256 256 246 0 0
x25-node 0 --- 0 100 0 0 0 40 0 0
ethernet1/0 40 16 5 40 40 40 41 40 0 0
+
• Input Queue
Alloc Number of buffers allocated to this device.
Burst Maximum number of buffers processed in the burst. Where there is overload, various buffers are
processed in burst to increase performance and consequently reach maximum speed. This inform-
ation is only available for certain interfaces.
Low Water mark for flow control in this device.
Curr Current number of buffers in this device. Value is 0 if the device is disabled.
Min Minimum number of buffers in the input queue for this device.
Cur.Req Number of buffers currently used to receive through this interface. This is the sum of the buffers
ready to receive and the buffers used to receive, which are presently being processed by the
router.
Max.Req Maximum number of buffers used to receive through the interface.
• Output Queue
Fair Fair level for the output queue in this device.
Current Number of packets currently waiting to be transmitted in this device.
Max Maximum number of buffers in the output queue for this device.
The router attempts to keep at least the Low value packets available for receiving over an interface. If the router re-
ceives a packet and the value of Curr is less than Low, then the packet is subject to flow control. If a buffer subject to
flow control is on this device and the Curr level is greater than Fair, the router drops the buffer instead of queuing it.
The error command displays the dropped buffer in its Output Discards column. It also generates ELS event GW.036
or GW.057.
3.2.19 QUICK
To access the quick monitoring menu, first access the general monitoring menu and from there enter quick.
Syntax:
+quick
Example:
+quick
Quick Monitor Menu
Quick Monitor+
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. Quick menu configuration is no longer
supported.
3.2.20 RUSH-ENGINE
Displays statistical information on the Rush engine and existing flows on each interface.
Syntax:
+rush-engine ?
all Monitor all interfaces
interface Monitor interface information
state Display Rush Engine state
+
Command history:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
Display statistics for all interfaces. It is possible to specify a filter to display only those flows that match the filter.
This command also allows you to clear the current counters and remove all flows from the Rush engine.
Syntax:
Example:
Display statistics for a specific interface. It is possible to specify a filter to display only those flows that match the fil-
ter.
This command also allows you to clear the current counters and remove all flows in the interface from the Rush en-
gine.
Syntax:
Example:
Show Rush engine enabled state, current idle flow timeout value and information on the memory used by internal
structures.
Syntax:
+rush-engine state
3.2.21 STATISTICS
Displays statistical information on the network software, such as networks configured in the router.
Syntax:
+statistics <interface>
• < interface > name of the network interface whose monitoring environment you wish to access.
To view the networks the router has been configured for, enter the command device at the + prompt. If you do not
specify the network interface, information on all networks available in the device is displayed.
Example:
+statistics
Unicast Multicast Bytes Packets Bytes
Interface Pqts Rcv Pqts Rcv Received Transmitted Transmitted
ethernet0/0 0 5384 3090255 0 0
serial0/0 0 0 0 0 0
serial0/1 0 0 0 0 0
serial0/2 0 0 0 0 0
bri0/0 0 0 0 0 0
x25-node 0 0 0 0 0
+
3.2.22 SYSTEM
Allows monitoring for system memory and stacks, CPU use, configuration of console port speed, display firmwares
needed for device operation, activate determined debugging information, show the history of users who have ac-
cessed the device, view open Telnet and SSH sessions and exchange commands or messages between terminals
corresponding to said open sessions.
Syntax:
+system <option>
console-speed Configure the console-serial port speed.
cpu-graph Display a system load measurement graph
cpu-history-48h Display the system load for the last 48 hours
cpu-text Display the average load in the system
dba-debug DBA subsystem debug level
disable-process-monitor Disable CPU load monitoring of processes
enable-process-monitor Enable CPU load monitoring of processes
firmwares-required Display the firmware required
http Display information on the users connected by HTTP
licence Show information about licences in the equipment
login Shows if the difference between upper and lower
case characters is activated
login-historic Display a list containing information on the users
who have accessed the device console
memory Display statistics on the system memory
pcmcia Access the PCMCIA interface status monitoring
power-off-status Display power off timers and ignition status
process-list Display the system processes status
ssh Display information on the users connected by SSH
stack-status Display the system stack status
telnet Display information on the users connected to the
device
telnet-clients Display information on open Telnet sessions to
remote devices
terminal Interchange commands or messages between terminals
usb Access the USB interface status monitoring
+
Syntax:
< speed > speed in bps you wish to set. Permitted values are 9.600, 14.400, 19.200, 38.400, 57.600 and 115.200.
Example:
Displays graphic measurement of the system load in percent for the last five minutes. The left hand side shows the
oldest values and the right, the most recent. Each column represents the load during 5 seconds and is displayed
both in graph (a vertical bar of points, which ascends until the corresponding percentage) as well as in numerical
format (written vertically from top to bottom).
Syntax:
+system cpu-graph
Example:
+system cpu-graph
CPU usage during the last 5 minutes (%):
211122222211111111111111111111111111111111111111111111111111
100_ 588837877797797777777777777777777777777777777777777777777777
90_|
80_|
70_|
60_|
50_|
40_|
30_|
20_|. ..:...
10_|:::::::::::..:..............................................
0_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
5min. 1min. 0
In the above example, you can see that in the last 5 minutes (left hand column) there was a 25 % load (vertical writ-
ing at the top of said column). This load has varied over time (18 % in the following 15 seconds, 23 % in the next 5
seconds, etc) until it established at a current load of 17 % (right hand column).
This command displays a graph showing CPU usage in the system, up to a maximum of 48 hours. From left to right,
the graph shows the oldest time values to the most recent ones. The read values for the CPU load vary, depending
on the time range displayed on the graph horizontal axis. Consequently, a time range of 2 hours displays the maxim-
um CPU usage percentages for each interval of 2 minutes, and a time range of 48 hours displays the maximum per-
centages for each interval of 48 minutes. The numerical percentage values are located on the upper part of the
graph and is read from top to bottom. This command can specify a temporary range in viewing hours in the available
history.
Syntax:
Example 1:
+system cpu-history-48h
CPU usage during the last 48 hours (%):
21
100_ 225222222222222222222222222222229262222222222222222232422222
95_|
90_|
85_|
80_|
75_|
70_|
65_|
60_|
55_|
50_|
45_|
40_|
35_|
30_|
25_|
20_| .
15_| :
10_| ::
5_| :::
0_|..:.............................:::........................
48h. 36h 24h 12h 0h
In this example, entry parameters haven’t been specified and all available history, up to the current moment, is dis-
played. The device has not been operating for more than three hours; consequently the time range shown by the
graph is from 3 to 0 hours. Each graph percentage value represents the maximum CPU usage in a 3 minute interval.
The horizontal axis range automatically increases (depending on how long the device has been operating for) up to a
maximum of 48 hours. After this, the axis maintains the range from 48 to 0 hours.
Example 2:
+system cpu-history-48h 12 3
CPU usage in range from 12 to 3 hours ago (%):
100_ 222222222322222222222222222222259222222222222222222223124222
95_|
90_|
85_|
80_|
75_|
70_|
65_|
60_|
55_|
50_|
45_|
40_|
35_|
30_|
25_|
20_|
15_|
10_|
5_| : :
0_|.........:.......................:.....................:.....
12h. 11h 7h 3
In this example, the max_hour and min_hour parameters have been specified. This determines the viewing range is
from 12 hours ago to 3 hours ago.
Displays the average load in the system as a percentage, for short, medium and long term.
Syntax:
+system cpu-text
Example:
+system cpu-text
CPU Short-Term Usage (5 sec.): 24.5%
CPU Medium-Term Usage (1 min.): 19.2%
CPU Long-Term Usage (5 min.): 17.6%
+
This command disables monitoring for the system processes, preventing you from getting CPU usage statistics for
processing. The processes monitoring is disabled on device startup.
Syntax:
+system disable-process-monitor
Example:
+system disable-process-monitor
Process monitoring disabled
+
This command enables monitoring for the system processes where you can obtain CPU usage statistics for pro-
cessing. Processes monitoring is disabled on device startup.
Syntax:
+system enable-process-monitor
Example:
+system enable-process-monitor
Process monitoring enabled
Equipment performances can be affected while process monitoring is enabled.
+
Note
When process monitoring is enabled, this can negatively affect device performance.
Syntax:
+system firmwares-required
Example:
+system firmwares-required
List of required firmwares for detected hardware
------------------------------------------------
Filename Description
-------------- ---------------------------------------------------
fw000000.bfw Alcatel-SGS Thomson DynaMiTe ADSL over POTS
+
Command history:
Release Modification
10.08.34.05.12 This command option was introduced as of version 10.08.34.05.12.
11.00.05 This command option was introduced as of version 11.00.05.
11.01.01 This command option was introduced as of version 11.01.01.
Example:
+system http
Command history:
Release Modification
11.01.01 This command option was introduced as of version 11.01.01. This system is in use as of
version 11.01. Earlier devices do not have this.
Allows you to view license information and execute actions over the new license system.
Syntax:
+system licence ?
check Check licence file previously loaded
create Create a licence file
files Show information about licence files loaded in the equipment
+system licence
This command allows a user to check a precreated license file, find out if the license is valid or if it has unsupported
parameters (for the current CIT version).
Example 1:
Example 2:
Example 3:
This command allows a user to create a licence file. On completion, the created file is checked to see if it contains a
valid licence or has unsupported parameters for the current CIT version.
Example 1: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 Successfully Saved
Licence file OK
+
Example 2:
Allows a user to check if the licence file is processed properly by the device on startup and whether the license is ap-
plied or discarded (due to errors).
Example 1:
Example 2:
This first shows if the difference between upper and lower case characters is activated in the user name authentica-
tion process. Subsequently it dumps a list with information on users who have accessed the Teldat device console.
Syntax:
<clear after show> this parameter (possible values: yes / no) indicates if you wish to delete the history after display-
ing it on screen. If no value is introduced here, the device asks the user for a value after showing the list.
Example:
+system login
Case-sensitive login: enabled
Displays a list containing information on the users who have accessed the device console.
Syntax:
<clear after show> parameter (possible values yes / no) allowing you to delete the history after showing it on
screen. If you do not enter a value, the device prompts you for one after displaying the list.
Example:
+system login-historic
Date Login Type
-------------- ---------- ------
01/03 10:41:01 root REMOTE
01/03 10:42:05 user1 REMOTE
02/04 16:58:06 LOCAL
02/04 16:58:19 user1 REMOTE
02/04 16:59:55 user1 REMOTE
03/07 10:09:49 omateo REMOTE
03/07 10:26:29 rsanchez LOCAL
03/07 10:27:06 user1 REMOTE
03/07 10:30:06 root REMOTE
03/07 10:30:09 LOCAL
03/07 10:30:16 root REMOTE
Clean historic?(Yes/No) [No]? No
+
Syntax:
+system memory
Example:
+system memory
Caller Second C. Third C. Address Size Age Hsh
-------------------------------------------------
xxxxxxx xxxxxxxx xxxxxxxx xxxxxx xxxx xxxxx xxxxxx
Note
This command accesses the PCMCIA interface status monitoring environment at the physical layer (controller and
card).
Syntax:
• <option> specifies an action to execute: events enable/disable [DEBUG] or dump the controller and card status in-
formation [DUMP].
• <parameters> parameters required for different possible actions.
Example:
For further information, please see manual Teldat Dm757-I PCMCIA UMTS Interface.
This command displays the current status of the ignition signal, the value programmed in the timer and where the
ignition signal is not active, the time lapsed from the moment the ignition was switched off.
Syntax:
+system power-off-status
Example 1:
+system disable-process-monitor
Ignition signal state ACTIVE
Programmed time to power off: 60 seconds
+
Example 2:
+system disable-process-monitor
Ignition signal state DEACTIVE
Programmed time to power off: 60 seconds
Time elapsed with ignition off: 10 seconds
+
This command displays the percentage of CPU usage and the stack status stack for each active process in the sys-
tem. This command displays three CPU usage percentages corresponding to the latest 5 seconds, the last minute
and the last 5 minutes respectively. To use this command, process monitoring must be enabled. These processes
come in three types:
(a) Interrupts. This is a high priority process which responds to petitions from different hardware components, such
as reception of a packet or a change in the physical layer of an interface.
(b) High level interrupt handler. These processes respond at a higher level (lower priority) the interruptions captured
through the Interrupts process.
(c) Task . These processes handle the rest of the device tasks, such as monitoring, configuration, routing protocols,
etc.
Syntax:
+system process-list
Example:
+system process-list
Process monitoring enabled.
Stack status and CPU load for each process.
Type: I (interrupts), H (high level interrupt handler), T (task)
Note
When the processes monitoring is enabled, this may negatively affect device performance.
This command displays the stack status for each system process. Each system process has its own stack memory
where the current status of said process is stored. Use this command to view the stack status for each active pro-
cess in the system. Said processes can be one of three types:
(1) Interrupts. This is the highest priority process and manages petitions for the various hardware components,
such as packet reception or a change in the interface physical layer.
(2) High level interrupt handler. These processes handle interruptions captured through the Interrupts process at a
high level (lower priority).
(3) Task . These processes handle the rest of the device tasks, such as monitoring, configuration, routing protocols,
etc.
Syntax:
+system stack-status
Example:
+system stack-status
Stack status for each process.
Type: I (interrupts), H (high level interrupt handler), T (task)
Note
Syntax:
+system telnet
Example:
+system telnet
An asterisk appears in the list next to the inactivity time field indicating the session you are accessing from.
This command displays information on Telnet sessions (to remote devices) opened from the device.
Syntax:
+system telnet-clients
Example:
+system telnet-clients
This command executes exchange of messages and commands between the terminals for the different sessions es-
tablished with the monitoring device.
Syntax:
This command forces termination of an established session and doesn't take into account any data entered after said
command. A list of currently active sessions is displayed where a user selects those he wishes to end (kill) through a
request. Only users with ROOT permission can execute this command (access level 15).
Example:
This command sends the escape character (Ctrl+p by default) to the terminal corresponding to a determined session
(this doesn't take into account data entered after said command). Next, a list of currently established sessions is dis-
played. A user (with ROOT permission) selects the sessions he wants to send the escape character to and sends
said escape request, with the result that users currently in the selected sessions exit the console menus. Only users
with ROOT permission can execute this command (access level 15).
Example:
This command sends a message to another terminal, i.e. to a user using another established session with the mon-
itored device (this doesn't take into account any data entered after said command). A list of currently established ses-
sions is displayed. A user can then select the sessions to send a request to (-1 sends to all sessions) subsequently
writing the message to be sent. All users with access levels equal or above MONITOR can execute this command.
Example:
Accesses the PCMCIA interface status monitoring environment at the physical layer (controller and card).
Syntax:
• <option> specifies an action to execute: events enable/disable [DEBUG] or dump controller and card status in-
formation [DUMP].
• <parameters> parameters required for the different possible actions.
Example:
For further information, please see manual Teldat Dm757-I PCMCIA UMTS Interface.
3.2.23 TFTP
This command provides access for device TFTP client (Trivial File Transfer Protocol).
Syntax:
+tftp
Example:
+tftp
TFTP manager
TFTP+
For further information, please see manual Teldat Dm765-I TFTP Protocol.
3.2.24 TELEPHONY
The telephony command provides access to device telephony functions monitoring environment based on the Voice
over IP.
Syntax:
+telephony
Example:
+telephony
Telephony Monitor
Telephony Mon+
For further information, please see manual Teldat Dm722-I Voice over IP.
3.2.25 UCI
The UCI command allows you to configure the Teldat Router encryption unit.
Syntax:
+uci <option>
HELP_STATISTICS
INIT_STATISTICS
LINE_X25
RESET_LINE_X25
STATISTICS
GENERAL_CRYP
CLEAR_STACRYP
Example:
+uci help_statistics
Statistics meanings
RECEIVED FRAMES REJECTED
TOO_LARGE: The received frame has, or has not, too large size
concided with encryption header
FAILURE: Frame reception failure
WITHOUT.LINE: Frame received but impossible to be transmitted to
destination because the receiver was not ready
WRONG.ENCRYPT: Impossible to encrypt a received frame
WITHOUT.MEM: Not enough memory for the transmitted frame
PROCESSED FRAMES
ENCRYPTED: Frames encrypted correctly
DECRYPTED: Frames decrypted with DLCI key
DEC.KEY.DEF: Decrypted frames with the default key, not decrypted
with the DLCI key
TRANSPARENTS: Transparent frames
3.2.26 UPTIME
Displays current Date and Time of the router, and time interval since last router boot up.
Syntax:
+uptime
Example:
+uptime
Command history:
Release Modification
11.00.03 New command added.
3.2.27 VERSION
Displays all information related to hardware, license, boot ROM version, software version, cellular driver and wireless
LAN driver versions.
Syntax:
+version
Example:
+version
System Info:
PCB:0x13A GPPORCR:0x00000000 PVR:0x80212151 SVR:0x80F90110
CLKs: CCB=396000 CPU0/1=792000/0 DDR(clk)=330000 LBUS=99000 PCI0/1=0/0
Watchdog:Enabled
MMU Mode:Dynamic
ICache:ON DCache:ON Write-Back L2Cache:ON
Command history:
Release Modification
11.00.03 New command added.
3.2.28 WEB-PROBE
Accessing the web-probe monitoring menu.
Syntax:
+web-probe
Example:
+web-probe
-- Web Probe user monitoring --
PROBE+
3.2.29 LOG
Allows you to obtain additional information on the device operation. This is only useful for Teldat’s technical support
service maintenance tasks. Said information is displayed as a hexadecimal dumping via the screen.
Syntax:
+log <number>
Example:
+log 5
0000 0000 0100 004A 0D0A 3031 2F30 312F
3030 2030 303A 3030 3A30 3020 392E 312E
3720 4D61 7220 3133 2032 3030 3220 3137
3A33 303A 3139 2062 7920 2020 6D62 6572
726F 6A6F 206F 6E20 204D 4245 5252 4F4A
4F32 007D
+
4.1 Introduction
This chapter describes the Event Logging System (ELS). It also describes the VISEVEN procedure and how to ob-
tain messages from the Event Logging System. VISEVEN provides information on the internal performance of the
device and its interfaces.
• System activity.
• State changes.
• Service requests.
• Data transmission and reception.
• Errors in the internal data of the system.
The Event Logging System is a device monitoring mechanism, which generates event messages. When something
occurs, the ELS receives data from the system identifying the source and nature of the event. A message is then
generated using said data.
You can select what messages to display (so only useful ones appear), send as traps or send through syslog, by ap-
propriately configuring ELS.
The ELS and the MONITOR procedure counters allow you to isolate problems in the device. A quick view of the
messages tell you if there is a problem and where to start searching for it.
In ELS config> prompt, there are commands you can use to establish a default configuration. This configuration does
not take effect until the device is restarted.
At the ELS config$ prompt, there are commands, which establish an immediately applicable configuration (no device
reboot is required).
Occasionally you may need to temporarily obtain messages through a different configuration (not established
through ELS config> or ELS config$). This is executed from ELS monitoring ( ELS+ prompt) without device reboot.
Here, you can temporarily change event selection so they're displayed on screen, sent as traps or sent through sys-
log messages. This change is immediate and not stored in the system configuration
There is another system similar to the above, which saves logs in non-volatile memory. Said logs register information
on system access (ftp or telnet) and reboots, configuration modifications, etc. The chief difference is, as they are
saved in non-volatile, they remain stored even if the device is switched off or it restarts the application.
The following summary shows the process to access the ELS Config> prompt from the Config> prompt, the ELS con-
fig$ prompt from the Config$ prompt and the ELS+ prompt from the + prompt.
*STATUS
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
(2) Enter process and the process identifier (pid) to access CONFIG (number 4).
*PROCESS 4
Config>
An alternative to steps 1 and 2, is to access configuration using the config command located in the console
manager (*) process.
*CONFIG
Config>
Config>event
-- ELS Config --
ELS config>
You can now execute ELS commands.
Enter exit to exit the ELS and return to the Config> prompt.
ELS config>exit
Config>
Note
All changes performed in this procedure only take effect on device restart. Please remember to
prestore the configuration in flash memory or the smart card.
If you want the configuration changes to take a dynamic effect without a device reboot, access the ELS dynamic con-
figuration process.
(1) From the console manager process * prompt, enter process and the process identifier (pid) to enter the dynam-
ic configuration process (number 5).
*PROCESS 5
Config$
An alternative to the above is to access the dynamic configuration process through the running-config com-
mand located in the console manager process (“*”) :
*RUNNING-CONFIG
Config$
Config$event
-- ELS Config --
ELS config$
ELS commands can now be executed.
Enter exit to exit ELS configuration and return to the Config> prompt.
ELS config$exit
Config$
Note
All the changes made in this process take immediate effect. To keep the configuration for future
reboots, save it in flash or the smart card in the same way as static configuration (config>).
*STATUS
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
(2) Enter process and the process identifier (pid), here it's 3, to access the monitoring process. PROCESS and the
process identifier (pid) to access the MONITOR procedure (3).
PROCESS 3
Console operator
+
An alternative to the sequence, previously indicated by steps 1 and 2, is to access the configuration process
through the MONITOR command from the console manager * process.
*MONITOR
Console Operator
+
+event
-- ELS Monitor --
ELS+
Now you can execute Event Logging System monitoring commands.
To exit the Event Logging System monitoring and return to +, enter exit.
ELS+EXIT
+
The advantage of viewing the events from VISEVEN is they are only displayed when the user requires them and not
as they occur. The advantage of viewing from the active process is they are displayed as they occur and additionally,
you can execute other commandw from the active process. I.e. you can carry out additional tasks or consult more in-
formation.
Disadvantages of displaying events from VISEVEN is you cannot carry out any other task. And if the events buffer is
small, these can be easily lost. Disadvantages of displaying events in the active process is this interferes with the in-
formation displayed by the process currently running and complicates task execution.
To enter VISEVEN from the console manager, carry out the following:
(1) If you do not know VISEVEN PPID, enter status at the * prompt.
*STATUS
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
(2) Enter process and the process identifier (PID) to access VISEVEN (number 2 here).
*PROCESS 2
This process does not present prompts or allow you to execute commands. However it shows the saved messages t.
To exit VISEVEN and return to the console manager ( * prompt), enter (Ctrl + p).
If you wish to ignore all the events stored up to this point, without viewing them, use the flush command.
The commands hide and view are available to view the events from the active process. These commands must be
fully entered to take effect. If the events are displayed in the active process, you cannot enter VISEVEN. The view
command displays the events and hide command hides them.
ELS+LIST SUBSYSTEM GW
GW.019 C-INFO Slf tst ifc %s
Subsystem
Subsystem is an abbreviated and pre-defined name for a router component or functionality such as protocol or inter-
face, etc. GW identifies the subsystem said event has occurred through. GW is the abbreviated name for Gateway.
Other examples of subsystems are ARP, IP, ETH. To see the list of available subsystems in the device, execute the
list subsystem command (from CONFIG or P4 configuration process, or from MONITOR or P3).
Enter the subsystem as a parameter in an Event Logging System command if the command is going affect the whole
subsystem. For example, the enable subsystem GW command enables all events in GW subsystem so, when
events are generated, they are collected by the VISEVEN procedure.
Event Number
The Event number is a pre-defined, unique and arbitrary number assigned to each message within a subsystem.
This does not indicate message priority. For example in GW.019, 19 indicates the event number in the GW subsys-
tem. You can obtain a list of all events in a subsystem through the list subsystem <subsystem name> command.
This is available both in the configuration process (CONFIG or P 4) and the monitoring process (MONITOR or P 3).
The event number always appears together with the subsystem identifier it belongs to, separated by “.”, e.g.
GW.019. The subsystem and event number jointly identify an individual event. They are entered as a parameter in
some Event Logging System commands. When a command is only going to affect one specific event, enter the sub-
system and event number as a command parameter.
Type of Event
Type of Event or Filter Level is a pre-defined identifier classifying each message complying with the nature of the
event generating it. This identifier appears when the command list subsystem <name_subsystem> is executed.
In this table ERROR, INFO, TRACE, STANDARD and ALL are associated to other filtered levels. STANDARD is the
filter level recommended by default.
Groups
Groups are a collection of events defined by the user who gives them a group name. The name of the group can be
entered as a parameter in some Event Logging System commands. There are no pre-defined groups. You need to
create a group before you can specify a group name in the command line.
To create a group, execute the configuration command add, specify the name for the group, and then specify the
events to be included in the group. The included events can be from different subsystems and have different filtering
levels.
Example:
ELS config>add ?
<1..7 chars> Group name
ELS config>add MYGROUP ?
<1..11 chars> Event
ELS config>add MYGROUP GW.019 ?
<cr>
ELS config>add MYGROUP GW.019
ELS config>add MYGROUP PPP.001
ELS config>add MYGROUP PPP.002
ELS config>
Once a group has been created, it can be used to globally manage the events in the group. For example, to enable
the event messages of all events that have been added to a group called MYGROUP to be displayed on screen, in-
clude the name of the group in the command line as follows:
Example:
ELS config>delete ?
<1..7 chars> Group name
ELS config>delete MYGROUP ?
all The whole group
<1..11 chars> Event
ELS config>delete MYGROUP all ?
<cr>
ELS config>delete MYGROUP all
ELS config>
• You need to know what you want to analyze through said system. The problem or events you need to view must
be clearly defined before using the VISEVEN process.
• Execute the clear command in the configuration procedure to erase all the events enabled in said configuration, as
well as the created groups. Or, execute the same command in the monitoring procedure to erase all events en-
abled during execution.
• Enable only those messages related to the problem you wish to investigate.
• If you are working in remote, enable those events to be sent as traps, or through syslog messages, you consider
necessary to determine the problem or analyze device behavior in the specific situation you want to check.
When enabling events to be displayed as traces on the console, you need to bear in mind that if these are produced
too frequently and not viewed on screen at the same rate as produced in the VISEVEN process, the circular mes-
sage buffer may overflow and the initial messages will be lost. When sending events as traps, if the storage buffer
overflows the latest traps, which have not been transmitted are lost. The same occurs with the syslog messages: the
oldest are reserved and the newest discarded.
At the same time as you receive the messages, they may be enabled or disabled depending what events you are in-
terested in.
Console Traces
Any individual event, group of events or subsystem can be enabled to be displayed as traces on the console. These
are visible through VISEVEN (P2) or from the active process by executing view. When using this latter command,
use the hide command to conceal said events.
SNMP Traps
The Event Logging System can be used so a determined event can be sent as a specified private company trap to
any station with SNMP management. The information sent with said trap is a message displayed on screen if the
event is enabled as a trace. A trap occurs each time the selected event occurs (enabled as an SNMP trap). For fur-
ther information, please see the manual Teldat Dm712-I SNMP Agent
Any individual event, group of events or subsystem can be enabled as an SNMP trap.
For example, to enable the SNMP.002 event, so it can be sent as a specific company trap:
(1) At the ELS config>, ELS config$ prompt or ELS+, enter
ENABLE SNMP-TRAP EVENT SNMP.002
Note
If you are in the ELS Config>, save the configuration and restart the device for the change to take
effect.
Note
Save the configuration and restart the device for the change to take effect.
Syslog Messages
The Event Logging System can be used for a specific event sent in a syslog message format to one or various re-
mote stations. Any event, be it individual or belonging to a group or subsystem, can be enabled with this aim.
For example, to enable the ICMP.002 event so it can be sent as a syslog message,
(1) 1. In the ELS config>, ELS config$ or in ELS+ prompts, enter
ENABLE SYSLOG EVENT ICMP.002
Note
If you are in the ELS Config>, save the configuration and restart the device so the changes takes
effect.
(2) In the SYSLOG config> prompt, configure the IP address or the name of the server domain (or servers) where
the notifications are sent. For further information , please see manual Teldat Dm753-I Client Syslog.
Note
Save the configuration and restart the device so any changes takes effect.
If you execute a ping out from any system to the router. The message is received in the configured syslog server.
Once you are familiar with the distinct messages that appear, you can enable or disable those events containing the
information you need.
The Event Logging System allows you to specify which messages are to be shown temporarily or permanently.
The Event Logging System configuration commands allow you to design a permanent message filter, which takes ef-
fect each time the system is switched on or reset.
The monitoring commands allow you to start up temporary filters, which ignore the permanent filter. When the sys-
tem is restarted or reset, the temporary filter is deleted by the software.
• Configure the access to the generic access lists configuration environment. For further information, please see
manual Teldat Dm752-I Access Control.
• Add the lists where you want to enable incoming packet marking, so all events associated to packet processing are
displayed on the console. The corresponding command is enable trace condition access-list <1....1999> .
• Enables all events to be viewed as console traces. Here, enter the enable trace all command. This is available
both in the configuration process (CONFIG or P 4/ RUNNING-CONFIG or P 5) as well as in the monitoring process
(MONITOR or P 3). This command should only be used with the corresponding filtering, so events associated to a
packet are displayed. If you don’t add this restriction, all events available in the device are displayed, with the con-
sequential repercussions in performance.
Example:
This is connected to the device through Telnet if you don't want to see events associated to telnet. To do this, config-
ure an access list that excludes port 23 tcp.
feature access-lists
; -- Access Lists user configuration --
access-list 100
entry 1 default
entry 1 deny
• Add the interfaces where you want to enable incoming packet marking, so all events associated to the packet pro-
cessing are displayed on the console. The corresponding command is enable trace condition interface
<interface name>. Although you can add any interface in the device to the list, keep in mind that it only makes
sense to select incoming interfaces with an associated physical layer (i.e. those known as base interfaces). You
can also select, as a condition, the packet is one from the free buffers global list, normally locally sourced packets,
or one from a protocol, through the enable trace conditional global-buffers and enable trace condition pro-
tocol <protocol name> commands respectively.
• Enables all events to be viewed as console traces. To do this, use the enable trace all command. This is available
both in the configuration process (CONFIG or P 4 / RUNNING-CONFIG or P 5) as well as in the monitoring pro-
cess (MONITOR or P 3). This command should only be used with the corresponding filtering, so events associated
to a packet are displayed. If you don’t add this restriction, all events available in the device are displayed with the
consequential repercussions in performance.
The example below shows what appears on the screen when this feature is enabled in an ethernet0/0 interface and
a packet encapsulated in IPSec has been received:
Important
Where you enable various conditional events at the same time, bear in mind any condition can produce
a trace.
You can also configure the Event Logging System from the dynamic configuration process (at the ELS config$
prompt), so avoiding reboot. However, if you want to maintain the configuration for future reboots, save it through the
save command at the Config$ prompt.
4.4.1.1 ? (HELP)
Lists the available commands in the current prompt. It is also possible to enter “?” after a specific command to list its
options.
Syntax:
ELS config>?
Example 1:
ELS config>?
Example 2:
ELS config>list ?
all Lists the configuration and all the subsystems
configuration Lists the status of the subsystems, groups and events
ev-buffer Lists the events buffer parameters
event Lists the filter level and the specified event message
filter Lists status of the filtering and the configured
filters
groups Lists the groups defined by the user and their content
nvram-log-priority Lists the minimum priority of logs saved
subsystem Lists all the events of a specified subsystem
ELS config>
Adds an individual event to a precreated group or creates a new group. The names of groups must be composed of
alphabetical characters. Numbers or other types of ASCII characters are not permitted. The name can have a max-
imum extension of 7 characters. The maximum number of groups that can be created is 10 and the maximum num-
ber of events in a group is 20.
Syntax:
Example:
ELS config>add
CLI Error: Incomplete command
ELS config>add ?
<1..7 chars> Group name
ELS config>add MYGROUP ?
<1..11 chars> Event
ELS config>add MYGROUP IP.001 ?
<cr>
ELS config>add MYGROUP IP.001
ELS config>
4.4.1.3 APPLY-FILTER
Allows the configuration of events filtering to be dynamically applied over the currently generated events.
Syntax:
ELS config>apply-filter
Clears all the configuration information from the Event Logging System.
All the groups created, events, and subsystems enabled in configuration are erased. Execute this command followed
by the command save at the Config> prompt to clear the configuration from the flash or smart card.
Syntax:
ELS config>clear
Example:
ELS config>clear ?
<cr>
ELS config>clear
ELS config>
4.4.1.5 CONSOLE
Example:
ELS config>console
-- Console Events Configuration --
Console Events config>
The console events menu allows you to configure various parameters related to this type of event.
Syntax:
Activates the inclusion of additional information, within the text, corresponding to the console events.
Syntax:
• < info > type of additional information you wish to include in the event.
LOG PROMPT
Syntax:
Example:
LOG SOURCE-IP
Activates the inclusion of the device IP address and port, the user uses to access the router via telnet, in the console
event user (usr) information field. Where users access via the local console, the text Local Console is displayed to-
gether with the user name.
Syntax:
Example:
Establishes the period of time the device waits before actually executing a command so the system is given time to
finalize the whole of the associated console events process (including the sending of syslog messages or snmp
traces).
• When a command is executed in the active configuration editing process with the exception of the commands:
show menu, show config, show all-config and Ctrl+p (escape character to return to the console manager.)
• The view command allows you to see all Event Logging System messages.
Syntax:
Example:
4.4.1.5.3 NO
Allows you to establish the default values for the configuration parameters for the console events subsystem.
Syntax:
NO LOG <info>
Deactivates the inclusion of specified additional information (prompt or source-ip) within the text corresponding to
the console events.
Syntax:
• < info > type of additional information you want to exclude from the event.
Example:
NO WAIT-TIME
Sets the default time (1 tenth of a second) the device waits before actually executing a command so the system has
time to finalize the whole of the associated console events process (including the sending of syslog messages or sn-
mp traces).
Example:
Deletes an event from an already created group or deletes the whole group. A message is displayed if the event spe-
cified is the last one in the group. When all is specified instead of subsystem.event_num, the whole group is de-
leted.
Syntax:
Example 1:
ELS config>delete ?
<1..7 chars> Group name
ELS config>delete MYGROUP ?
all The whole group
<1..11 chars> Event
ELS config>delete MYGROUP IP.001
ELS config>
Example 2:
4.4.1.7 DISABLE
Selects and disables events so their messages are not displayed on screen, nor sent as traps or transmitted as sys-
log messages. You can also disable groups and subsystems, as well as all the traces if you have previously enabled
them through the enable trace all command. Additionally this allows you to disable events filtering.
Where you’ve selected an incoming interface, to view traces associated to the process and path the packets, re-
ceived in said interface, have followed, the disable trace condition interface <interface name> command allows
you to disable packet marking in said interface. In the same way, you can disable the global buffers and the protocols
condition using the disable trace condition global-buffers and disable trace condition protocol <protocol
name> commands respectively.
Syntax:
ELS config>disable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
FILTER
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SYSLOG
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
TRACE
ALL
CONDITION INTERFACE <nom_interfaz>
CONDITION GLOBAL-BUFFERS
CONDITION PROTOCOL <nom_protocolo>
EVENT <subsystem.event_num>
GROUPS <nom_group>
Example:
This example disables the individual ICMP.001 event so it is not displayed on screen.
Example:
This example disables the MYGROUP group so it is not sent as a syslog message.
Example:
This example disables events with INFO filter level from the IP subsystem, so they are not shown or sent as either
SNMP traps or syslog messages.
4.4.1.8 ENABLE
Selects and enables events so their messages are displayed on screen, sent as traps or transmitted as syslog mes-
sages. You can also enable groups and subsystems. Additionally this allows you to enable the events filtering and
events filtering.
In Event Logging System user interface on page 139 in this chapter, we explained how to activate the feature known
as conditional events: this is carried out through the enable trace condition interface <interface name> command,
to enable packet marking in a determined interface. In addition, you can filter the events for an IP access list through
the enable trace condition access-list <list> command.
In this way you can view all events associated to packet processing as console traces, by using the enable trace all
command. We do not recommend you use this command, except in cases of using said conditional events feature,
and you restrict the number of traces to be shown to those associated to a packet; contrariwise all traces are shown
and device performance could be seriously affected.
As already mentioned in this section, it is possible to enable the trace by using, as an activation condition, the use of
the free global buffers, which are normally locally sourced packets, or which is a packet processed by a protocol,
through the enable trace condition global-buffers and enable trace condition protocol <protocol name> commands re-
spectively.
If you want to debug the condition events feature, you can enable a special trace through the enable condition-debug
command, which prints every time you uncheck a packet.
Syntax:
ELS config>enable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
CONDITION-DEBUG
FILTER
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP1
EVENT <subsystem.event_num>
GROUPS <nom_grupo>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP2
EVENT <subsistema.num_evento>
GROUPS <nom_grupo>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP3
EVENT <subsystem.event_num>
GROUPS <nom_grupo>
Note
On enabling an event as a trap through the snmp-trap command, this is enabled for all trap groups.
Example 1:
Example 2:
Example 3:
This example enables events with INFO filter level from the IP subsystem, so they are shown, sent as SNMP traps
and as syslog messages.
Important
Do not execute this command during long periods of time, while the device is transferring packets, as a
great deal of time is spent contacting the VISEVEN procedure. If this is executed when communicating
with the Teldat Router through a remote terminal, this may cause the device to spend the majority of
its time contacting the remote terminal.
4.4.1.9 ENVIRONMENT-MONITOR
These checks are executed periodically (every minute) and generate an event if an abnormality is detected. This
event can be one of two types:
To view said events on the screen, send them as traps or transmit them as syslog messages, you need to enable
them. (For further information, please see the enable command described further on in this section).
Note
This command is only available for devices where you can monitor the fans and/or are equipped with
temperature sensors.
Syntax:
The event is only sent once if the fault is persistent and the periodic-event option hasn’t been configured. If you con-
figure the periodic-event option, the event is sent each time the configured timeout times out and the problem still
hasn’t been resolved.
Example:
In this example, the temperature and fan sensors monitoring has been enabled, so the events are sent every 2 hours
where the fault is persistent.
Likewise, this command activates the temperature sensor viewing when the configuration command for the monit-
oring procedure is executed.
Example:
*monitor
Console Operator
+configuration
[…]
Watchdog timer Enabled
CASE 1 fan speed: 0 rpm (0 %)
CPU temperature: 51ºC
ADSL1 temperature: 50ºC
ADSL2 temperature: 53ºC […]
Allows you to select the amount of memory reserved for the events buffer. There are two parameters to configure:
one, the number is lines (each event is stored in a line) and the second, the size of each line reserved in memory.
Syntax:
Example:
ELS config>ev-buffer ?
<2..10000> Number of lines
ELS config>ev-buffer 1000 ?
<28..200> Line size
ELS config>ev-buffer 1000 130
Please restart to take effect.
ELS config>
4.4.1.11 FILTER
Event filtering permits filtering within a given event, so relevant information is projected and irrelevant information is
eliminated. The filter has the added advantage that discarded events are not stored so reducing the risk of losing
events due to overflow.
An index is associated to the filters used to determine the order of the application: the lower orders are applied be-
fore the higher orders. The order must be between 1 and 10. You can define a maximum of 10 simultaneous filters.
Another parameter associated to a filter is the application condition where the filter is applied if the condition is ful-
filled. The filters are checked one by one until there are no more or, until one is applied. The condition is only applied
over the event text and not over the event identifier. The condition is given by a text, or a regular expression, to
search for and the position relative to where it is: the text is delimitated by quotation marks; the position where this is
can be given explicitly, or a value – 1 to indicate any position.
The last parameter associated to a filter is the action to be applied. This can be: excluding the event, projecting an
event or accepting an event, rebooting or stop saving traces.
Events filtering can be globally enabled and disabled through the commands enable filter and disable filter respect-
ively.
Syntax:
ELS config>filter ?
<1..10> Entry
ELS config>filter 1 ?
default Create a event filter with action exclude and pos ignore
text Text to filter
position Position
action Action to be applied
ELS config>filter 1 text ?
<0..40 chars> Text
ELS config>filter 1 action ?
include includes the trace
exclude excludes the trace
red shows the trace in red
green shows the trace in green
yellow shows the trace in yellow
blue shows the trace in blue
magent shows the trace in magent
cyan shows the trace in cyan
stop-traces stops saving traces
start-traces starts saving traces
ELS config>
Example 1:
A simple example of using the events filter is IP debugging in a device accessed through Telnet: if the IP events are
enabled, the events being searched for appear; however the events of Telnet itself also appear where the quantity of
IP events is excessive. To resolve this you can enable the events filter so all events for the Telnet client IP address
(172.24.78.94) are excluded.
Example 2:
Displays the GW.019 (an internal event where an autotest is carried out over an interface) event in red.
Displays the GW.019 (an internal event where an autotest is carried out over an interface) event in red, but only for
the ethernet0/0 interface.
Example 4:
Stops saving traces when the first event to include IP address 192.168.212.116 occurs.
4.4.1.12 LIST
Syntax:
ELS config>list ?
all Lists the configuration and all the subsystems
configuration Lists the status of the subsystems, groups and events
ev-buffer Lists the events buffer parameters
event Lists the filter level and the specified event message
filter Lists status of the filtering and the configured
filters
groups Lists the groups defined by the user and their content
LIST ALL
Lists all the created groups together with their events, the status in the subsystems configuration, individual groups
and events, parameters relevant to the size of the storage buffer for events waiting to be displayed on screen, the
possible events filters established as well as if the filtering has been enabled or not and lastly, the minimum priority
the logs must have to be stored in the non-volatile memory.
Example:
LIST CONFIGURATION
This lists the status (enabled or disabled) for the subsystems, groups and individual events, which have been con-
figured. This begins to operate when the device is restarted, provided it has been presaved in the memory.
Suppose you preenabled the GW subsystem to send SNMP traps, to transmit syslog messages and to display (from
VISEVEN) the IP subsystem for an on screen presentation of events, which have a STANDARD filter level, and there
is a group called MYGROUP. Said group is enabled, so it can be notified through syslog messages, and the user en-
abled an ICMP.001 event to be sent as a specific company trap. You would achieve the following results.
Example:
ELS config>
LIST EV-BUFFER
Lists the parameters relative to the size of the storage buffer where, the events waiting to be displayed on screen are
stored.
Example:
LIST EVENT
Example:
LIST FILTER
Lists information relevant to the events filtering: general status of the filtering and the configured filters.
Example:
LIST GROUPS
Lists the names of the groups defined by the user and their content.
Example:
LIST SUBSYSTEM
Example:
If the subsystem name is not entered, a list appears with the name, event number and a description of all subsys-
tems.
Example:
ADSL 8 ADSL
AFS 6 Advanced Filtering Subsystem
AINST 23 AutoInstall
ARP 10 Address Resolution Protocol
ASDP 11 Asynchronous Serial Device Proxy
ARLY 41 Alarm Relay
ASYN 5 Asynchronous Serial Line
AT 20 AT Commands Interface
ATM 15 Asynchronous Transfer Mode
BAN 29 Boundary Access Node
BGP 27 Border Gateway Protocol
BR 48 Bridge/Routing
BRS 9 Bandwidth Reservation
BSPF 10 Bridge Spoofing
CIF 34 Encryption
CNSL 4 Console
DEP 30 DEP Forwarder
DHCP 14 DHCP
DHCPC 23 DHCP Client
DLS 459 Data Link Switching
DNAT 12 Dynamic NAT
DNS 30 Domain Name System
EAP 6 EAP
ETH 54 Ethernet
FLT 7 Filter Library
FR 53 Frame Relay
FRBK 8 Frame Relay BACKUP
FTP 4 File Transfer Protocol
G703 25 G703 Digital Interface
GW 64 Router kernel
H323 19 H323
HDLC 11 HDLC Interface
HDSL 57 Symetric High Bitrate Digital Subscriber Line
HSSI 5 High Speed Serial Interface
HOTSPOT 39 HotSpot
HTTP 25 HyperText Transfer Protocol
ICMP 22 Internet Control Message Protocol
IGMP 26 Internet Group Management Protocol
IKE 51 Internet Key Exchange
IP 87 Internet Protocol
IP6 200 IPv6
IPHC 46 IP Header Compression
IPSEC 33 Ip Security
IPX 105 Internetwork Packet Exchange Protocol
ISDN 40 Integrated Services Digital Net
L2TP 56 Layer 2 Tunneling Protocol
ELS config>
Command history:
Release Modification
11.00.05 SMGT event was introduced as of version 11.00.05.
11.01.00 SMGT event was introduced as of version 11.01.00.
LIST NVRAM-LOG-PRIORITY
Lists the minimum priority of the logs saved in the non-volatile memory.
Example:
4.4.1.13 NO
Allows you to eliminate a given filter, or to reestablish the default value, for parameters relative to the size of the stor-
age buffer, where the events waiting to be displayed on screen are stored or for the minimum priority of the logs
saved in the non-volatile memory.
You can also eliminate and reestablish the configuration over the enabled, or disabled, events at any point.
Syntax:
ELS config>no ?
environment-monitor Enables environment monitor
disable Disables events
enable Enables events
ev-buffer Sets default events buffer size
filter Eliminates a given filter
number-events-log Number of events to be logged in case of fatal error
nvram-log-priority Sets the default priority of logs saved
print Configure els show options
stop-traces Stops saving traces
trace-level Configures subsystem trace level
ELS config>
NO ENVIRONMENT-MONITOR
Example:
NO DISABLE
This selects and reestablishes the event default parameters (disabled) shown on the screen, sent as traps or trans-
mitted as syslog messages. You can reestablish groups and subsystems.
Example:
This example reestablishes the default values for events in miGrupo, so they are displayed on the screen and the
corresponding entry is deleted from the configuration.
NO ENABLE
This selects and reestablishes the event default parameters (enabled) shown on the screen, sent as traps or trans-
mitted as syslog messages. You can reestablish groups and subsystems.
Example:
This example reestablishes default values, for events with the ALL filter level, for the ARP subsystem so they are
sent as SNMP traps, and the corresponding entry deleted from the configuration.
Example:
This example reestablishes default values for the individual IP.007 event, so it is transmitted as a syslog message
and the corresponding entry is deleted from the configuration.
NO EV-BUFFER
Reestablishes default values for parameters relative to the storage buffer for events waiting to be displayed as traces
on the console (VISEVEN process), parameters that allow you to select the amount of reserved memory. Said de-
fault values are 50 lines, or messages, and 208 bytes per line.
Example:
NO FILTER
Example:
NO PRINT
Example:
NO STOP TRACES
Example:
NO NUMBER-EVENTS-LOG
Establishes the default value for the number of events, which are stored in the non-volatile memory when a RESET
occurs in the device.
Example:
NO NVRAM-LOG-PRIORITY
Establishes the default value for the minimum priority for the logs stored in the non-volatile memory (priority 5).
Example:
4.4.1.14 NUMBER-EVENTS-LOG
This command configures the number of events registered in the non-volatile memory when a RESET occurs in the
device. Default is 3, the range of configurable values is from 3 to 10000. Knowing the latest events generated, before
an error occurs, is very useful to detect the cause of said error. We suggest configuring a value greater than the de-
fault value for this parameter. This gives you more information to diagnose the problem.
Example:
ELS config>number-events-log ?
<3..10000> value in the specified range
ELS config>number-events-log 100
ELS config>
4.4.1.15 NVRAM-LOG-PRIORITY
Configures the minimum priority the logs must have to be saved. A priority, between 1 and 5, is defined for each log
(1 being the highest priority and 5 the lowest). Given the capacity of the non-volatile memory is limited (the logs are
saved in a circular queue), you may wish to save only the highest priority logs (not the lowest ones).
Logs related to device startups take priorities between 1 and 3. The rest of them (accessing the device, configuration
modifications etc.) are allocated priorities between 4 and 5.
Example:
ELS config>nvram-log-priority ?
<1..5> Minimum priority of logs saved
ELS config>nvram-log-priority 5
ELS config>
4.4.1.16 OPTIONS
Syntax:
ELS config>options ?
circular-buffer Enable circular buffer
no Negate options
time-as-incremental Show time as incremental in milliseconds
time-as-ticks Show time as ticks
time-stamp Include time in events
usb-save Save events on external USB
ELS config>
CIRCULAR-BUFFER
Establishes the default behavior for the Event Logging System, corresponding to events entering in the circular buf-
fer. The new events are always added to the circular buffer and if this is full, the oldest events are dropped.
NO
The Event Logging System stops entering events in the viewing circular buffer when it is full. When the events can-
not be seen, the buffer is full, CPU time is not taken up and system performance is increased. A second effect is the
latest events are lost, not the oldest.
4.4.1.16.2 TIME-AS-INCREMENTAL
Deactivates the milliseconds mark with the time elapsed since the last event entry.
4.4.1.16.3 TIME-AS-TICKS
When viewing this the date and the time do not appear. This means the real clock time is not consulted, diminishing
the probability of losing events, and performance improves.
Example:
4.4.1.16.5 USB-SAVE
Deactivates events dumping in a massive USB external storage device. Please see the usb-save command options.
TIME-AS-INCREMENTAL
The events are marked with a value measured in milliseconds, corresponding to the time lapsed since the last event
Example:
TIME-AS-TICKS
The events are marked with a tick counter instead the date and time and is consequently more accurate.
Example:
TIME-STAMP
Establishes default behavior for the Event Logging System, corresponding to time-stamp viewing.
USB-SAVE
Option to save the device’s active events in a massive storage device connected to the external USB. The events
are saved in a file (known as event.log) in the root directory of the first detected partition. The partition must be
formatted with a FAT or VFAT files system. If the file exists, the new events are added to the end, inserting a session
start mark. The existing information is never deleted.
Example:
################################################################################
# New log session started #
################################################################################
01/01/00 00:00:16 GW.001 System restarted -- H1+ WAN IPSec router cold start
01/01/00 00:00:16 GW.002 Portable CGW H1+ WAN IPSec Rel 10.08.29-Alfa strtd
01/01/00 00:00:17 GW.005 Bffrs: 1471 avail 1441 idle fair 114 low 294
If the device startup configuration has this command configured, the USB device must be connected before starting
up the device. If a device is not detected as connected, said dumping does not occur even if you subsequently con-
nect a device.
The command can dynamically activate and deactivate (option no save-usb). You must connect the USB device to
the external connector before dynamically activating the command. If there is no massive storage device connected
to the USB connector, the dynamic command produces an error. If events dumping in the external USB is activated,
you can deactivate it by executing the no save-usb option command in the dynamic configuration. You must always
dynamically deactivate the events dumping to USB before removing the external storage device. If you extract this
without deactivating dumping, the latest events are lost and you won’t be able to dynamically initiate dumping; you'll
have to restart the device.
Example:
Note
4.4.1.17 PPP
Accesses the specific PPP events menu. For further information, please see manual Teldat Dm710-I Interface PPP .
Example:
ELS config>ppp
-- PPP Events Configuration --
PPP Events config>
4.4.1.18 PRINT
Allows you to specify additional information to print for each event. The additional information is printed in a separate
line after the main event and does not display the date or time.
PRINT EXTRA-INFO
Example:
04/15/08 13:13:17 AFS.001 IP IN src 172.24.100.130 dst 172.24.100.129 prt TCP in ifc
ethernet0/0 -> ACCEPTED
AFS.001 [vrf: <main> inifc: ethernet0/0 outifc: ppp1]
PRINT IP-HEADER
Prints the IP header. The IP header is not available in all the events; in events where it isn’t available, no additional
information is displayed.
Example:
04/15/08 13:13:17 AFS.001 IP IN src 172.24.100.130 dst 172.24.100.129 prt TCP in ifc
ethernet0/0 -> ACCEPTED
4.4.1.19 STOP-TRACES
Stops the events from being logged. Despite the events not being saved, they are analyzed to see if they match a
configured filter.
This can be useful when you want the Event Logging System to startup on detection of a specific event. The device
boots with the Event Logging System detained and a filter is configured to detect the specified event and associated
to a start traces action .
4.4.1.20 TRACE-LEVEL
Allows you to configure the trace level to display for a determined subsystem. The minimum level (the least number
of traces) is error; the maximum level (the greatest number of traces) is excessive.
The events level is not available for all event subsystems, only for a few.
• error: messages produced due to grave errors that can make the associated feature stop executing.
• warning: messages produced due to unexpected errors while the associated feature is executing.
• info: traces related to the normal execution of the associated feature.
• debug: debug traces.
• msg-dump: displays traces related to messages exchanged while the associated feature is executing.
• excessive: displays all the available traces.
Each level includes all the previous levels. If, for example, the debug trace level is enabled, the info, warning and er-
ror trace levels are also included.
Syntax:
Example:
4.4.1.21 VRF
Example:
ELS config>vrf
-- VRF Events Configuration --
VRF Filter Events Config>?
You can configure the VRFs , you want to view the events for, through the menu.
Syntax:
ELS config>vrf
Example:
4.4.1.22 EXIT
Allows you to exit the Event Logging System configuration and return to the Config> prompt.
Syntax:
ELS config>exit
Example:
ELS config>exit
Config>
Changes made in this procedure are automatically executed and are lost when the device is restarted. These com-
mands allow you to enable events during execution.
Command Function
? (HELP) Lists all commands for monitoring the Event Logging System.
CLEAR-ACTIVES Allows you to disable all enabled events at a given time.
CONDITION-DEBUG Displays useful information if you wish to debug the condition event feature.
DISABLE Allows you to disable event messages so they are not displayed on the screen,
nor sent as syslog messages or as specific company traps.
ENABLE Allows you to enable event messages to be displayed on the screen, sent as sys-
log messages or as specific company traps.
EVENT-STORE Allows you to enable event messages to be stored in flash memory when CIT
crashes.
FILTER Configures the rules permitting event filtering so only currently relevant events are
displayed.
HIDE Prevents events from being displayed in the active process. At this point, events
can only be viewed from VISEVEN.
This command is available from any process, although it does not appear when
requesting all available commands: to execute said command enter the full com-
mand name.
LIST Lists information on established events and messages.
NO Disables an option.
NVRLOG Allows you to view logs stored in the non-volatile memory, as well as initialize this.
RESTORE-CONFIGURATION Allows you to activate the current Event Logging System configuration, previously
entered in the corresponding configuration process menu, without having to save
and reboot the device.
SHOW-STORED-LOG Shows a stored events log, generated when CIT crashes, and the event-store op-
tion is enabled.
VIEW Permits events to be displayed in the active process. From here, the events can-
not be viewed from VISEVEN.
This command is available from any process, although it does not appear when
requesting all available commands: to execute this enter the full command name.
EXIT Allows you to exit event monitoring.
4.4.2.1 ? (HELP)
Lists the commands available for the current prompt. It is also possible to enter ? after a specific command to list its
options.
Syntax:
ELS+?
Example 1:
ELS+?
clear-actives Disable all enabled events at a given time
condition-debug Monitoring options of condition events debugging
disable Disable event messages
enable Enable event messages
filter Configure the rules permitting events filtering
hide Prevent the events from being displayed
list List information on established events and messages
nvrlog View/Initialize the logs stored in the non-volatile
memory
restore-configuration Activate the current Events Logging System
configuration
view Display the events in the active process
exit
ELS+
Example 2:
ELS+LIST ?
active List the enabled events of the specified subsystem
condition List the interfaces where packet marking has been enabled
event List event information
groups List group information
subsystem List subsystem information
ELS+
4.4.2.2 CLEAR-ACTIVES
Syntax:
ELS+clear-actives
Example:
ELS+clear-actives
Do you want to disable all active events?(Y/N)(N): y
All events disabled
ELS+
4.4.2.3 CONDITION-DEBUG
Provides useful information if you want to debug the condition events feature, which we saw in Event Logging Sys-
tem user interface on page 139. To exclude events generated by packets that have not been checked, a semaphore
object, which tells the system when a packet is checked, is used. Said semaphore blocks when a packet is checked,
when one of the enabled conditions has been fulfilled, and unblocks when a packet is no longer checked.
Syntax:
ELS+condition-debug ?
semaphore-clear Clear the condition semaphore
semaphore-dump Dump information on the condition semaphore
The semaphore-clear option is used to manually unblock the semaphore, so allowing another packet to be checked
Information on the semaphore state displayed, when the semaphore-dump option is used, is as follows:
Example:
ELS+condition-debug semaphore-dump
==================================
..: Condition events semaphore :..
==================================
Semaphore state: 1
Buffer address: 0x01d1cd8c
Trigger condition: interface ethernet0/0
Calls sequence: 00640490<-0066AD14<-00B62830<-00D62E20<-00D63044<-
ELS+
4.4.2.4 DISABLE
Selects and disables events so their messages are not displayed on the screen in VISEVEN, nor sent as SNMP
traps or syslog messages. You can disable groups and subsystems, as well as all the traces if you have pre-enabled
them through the enable trace all command. This also allows you to disable events filtering.
Where you’ve selected an incoming interface, to view the traces associated to the process and path the packets re-
ceived in said interface have followed, the disable trace condition interface <interface name> command allows
you to disable packet marking in this interface.
You can also disable the global buffers and the protocols condition using the disable trace condition global-buf-
fers and disable trace condition protocol <protocol name> commands respectively.
Syntax:
ELS+disable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SYSLOG
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
FILTER
TRACE
ALL
CONDITION INTERFACE <interface name>
CONDITION GLOBAL-BUFFERS
CONDITION PROTOCOL <nom_protocolo>
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
Example 1:
This example disables the ICMP.001 individual event, so it is not displayed on screen.
Example 2:
This example disables the MYGROUP group, so events pertaining to said group are not notified via syslog mes-
sages.
Example 3:
This example disables the INFO filter level events for the IP subsystem, so they are not displayed nor sent as SNMP
traps or through syslog messages.
4.4.2.5 ENABLE
Selects and enable events so their messages are displayed on the screen, sent as traps or transmitted through sys-
log messages. You can enable groups and subsystems and also events filtering.
In Event Logging System user interface on page 139 in this chapter, we explained how to activate the feature known
as conditional events: this is done by using the enable trace condition interface <interface name> command, to
enable packet marking in a determined interface. You can view all events associated to packet processing as con-
sole traces by subsequently using the enable trace all command. We do not recommend you use this command ex-
cept when using said conditional events feature, and that you restrict the number of traces to be shown to those as-
sociated to a packet. Contrariwise all traces are shown and device performance could be seriously affected.
As indicated, you can enable the trace by using, as an activation condition, the use of the free global buffers, which
are normally locally sourced packets, or a packet processed by a protocol, using the enable trace condition global-
buffers and enable trace condition protocol <protocol name> commands respectively.
Syntax:
ELS+enable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SYSLOG
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
FILTER
TRACE
ALL
CONDITION INTERFACE <interface name>
CONDITION GLOBAL-BUFFERS
CONDITION PROTOCOL <nom_protocolo>
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP1
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP2
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP3
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP4
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
Note
When you enable an event as a trap, through the snmp-trap command, you enable it for all trap
groups.
Example 1:
Example 2:
This example enables the MYGROUP group: events applying to it are notified through syslog messages.
Example 3:
This example enables the INFO filter level events for the IP subsystem, so they are displayed on screen, sent as SN-
MP traps and transmitted through syslog messages.
Important
Do not execute this command during long periods of time while the device is transferring packets, since
a great deal of time is spent in communicating with VISEVEN. If you execute this command when it is
communicating with the Teldat Router, through a remote terminal, this may give rise to the device
spending most of its time communicating with the remote terminal, with a subsequent drop in perform-
ance.
4.4.2.6 EVENT-STORE
Command History:
Release Modification
11.00.05 This command is introduced in version 11.00.05
11.01.01 This command is introduced in version 11.01.01.
Allows you to store the last event, allocated at event buffer, in a flash unit if CIT crashes . This is used for debugging
purposes. The use of this command requiresin-depth knowledge of Teldat Router software and should only be used
when expressly indicated byTeldat's personnel.
Syntax:
ELS+event-store ?
<cr>
ELS+
When this command is executed a message is shown warning the user on the possible operation risks. If said com-
mand is confirmed, the event storing system is enabled and the event buffer will be saved to flash if CIT crashes.
ELS+event-store
WARNING: This command may cause future performance or behaviour issues
Do you want to enable event-store?
Enable event-store(Yes/No)?yes
Event store is enabled. EVENTLOG.EV will be generated when CIT crashes
ELS+
If a previous log was generated, the command issues on warning on this and asks for confirmation.
ELS+event-store
WARNING: This command may cause future performance or behaviour issues
Do you want to enable event-store?
Enable event-store(Yes/No)?yes
Event store is enabled. EVENTLOG.EV will be generated when CIT crashes
4.4.2.7 FILTER
Allows you to add, change or delete filters individually. Enable the filter through the enable filter command to active
it.
For further information, please see the filter command from the event configuration menu.
Syntax:
ELS+filter
add Add/Change filters individually
del Delete filters individually
list Display the status of events filtering
ELS+
FILTER ADD
Adds an entry to the filter table. If this already exists, it’s replaced.
Syntax:
Example:
FILTER DEL
Syntax:
Example:
ELS+filter del 2
FILTER LIST
Syntax:
ELS+filter list
Example:
ELS+filter list
EVENT FILTER
State: disabled
1) 172.24.78.94 /-1 -> Excl
2) rx /1 -> Red
3) --- - ---
4) --- - ---
5) --- - ---
6) --- - ---
7) --- - ---
8) --- - ---
9) --- - ---
10) --- - ---
ELS+
4.4.2.8 HIDE
Prevents events from being displayed in the active process. Subsequently, events can only be viewed from VISEV-
EN.
This command is available from any process, although it does not appear when requesting all the available com-
mands, to execute this enter the full command name.
Syntax:
ELS+hide
Example:
ELS+hide
ELS+
4.4.2.9 LIST
Lists information on events enabled, groups created and subsystems. This also displays the interfaces enabled to
use the conditional events feature.
Syntax:
ELS+list ?
active List the enabled events of the specified subsystem
condition List the interfaces where packet marking has been enabled
event List event information
groups List group information
subsystem List subsystem information
ELS+
LIST ACTIVE
Example:
This lists the enabled events in the ARP subsystem, the number of times each event has occurred and the enabling
vector for each event.
Note
Events with always filter levels are always enabled to be displayed on screen (e.g. GW.001). There are
also events enabled as traps, which cannot be disabled as they generate the SNMP generic traps (e.g.
GW.021® link up).
LIST CONDITION
Example:
ELS+list condition
Established conditions:
Traces for packets received on ethernet0/0
ELS+
Lists the interfaces where packet marking has been enabled, so they can be followed, and the traces associated to
their processing are displayed. For further information, please see section 3 (Event Logging System User Interface),
or the section explaining the use of the enable/disable trace condition interface <interface name> and enable/
disable trace all commands.
LIST EVENT
Example:
Let’s suppose the event is enabled to be displayed on screen, sent as a syslog message and as a specific company
trap, the information we can receive is shown in following example.
LIST GROUP
Example:
ELS+list group
Group: MYGROUP
Event Trace Syslog Snmp-Trap
IP.002 on off on ( all groups )
IP.003 on off on ( group 2 group 4 )
IP.004 on off off
Globaly enable as: (Trace)
ELS+
This shows the group name, the set of events it's made up of, the enabling status of each event and the current glob-
al status of group enabling.
If all the group events are enabled to be displayed on screen and some to be sent as traps and syslog messages,
the information we receive is as shown in following example.
LIST SUBSYSTEM
Example 1:
Example 2:
ELS>list subsystem
Name Events Description
ELS+
Command history:
Release Modification
11.00.05 SMGT event was introduced as of version 11.00.05.
11.01.00 SMGT event was introduced as of version 11.01.00.
4.4.2.10 NO
Command History:
Release Modification
11.00.05 This command is introduced in version 11.00.05
11.01.01 This command is introduced in version 11.01.01.
Syntax:
ELS+no ?
event-store Disable event store on flash
ELS+
NO EVENT-STORE
When the command is executed, a message is shown warning the user on the possible results of the operation.
ELS+no event-store
Event store disabled
ELS+
4.4.2.11 NVRLOG
Allows you to view the logs saved in the non-volatile memory, as well as initialize this.
Syntax:
ELS+nvrlog ?
clear Initialize the bugs system, deleting all previous ones
list Select the number of logs to be displayed on the console
ELS+
NVRLOG LIST
Syntax:
Example:
ELS+nvrlog list 2
02/26/07 11:31:05 -1- RESET:(CODE 0xc0000000) EH ES
BIOS CODE VERSION: 01.09.09 START FROM FLASH L1
02/26/07 11:28:27 -3- Reload issued by the user
ELS+
For each log displayed the following information is given: the date and the time the event took place, the priority as-
sociated to said log (between hyphens) and a text containing information relative to said event.
NVRLOG CLEAR
Example:
ELS+NVRLOG CLEAR 0
01/02/07 10:32:47 -1- Logging memory initialized.
ELS+
4.4.2.12 RESTORE-CONFIGURATION
Allows you to restore the events configuration the device started up with.
Syntax:
ELS+restore
Example:
ELS+restore
Do you want to restore ELS configuration?(Y/N)(N): y
ELS+
4.4.2.13 SHOW-STORED-LOG
Command History:
Release Modification
11.00.05 This command was introduced as of version 11.00.05
11.01.01 This command was introduced as of version 11.01.01.
Allows you to see the last event log generated by the event-store command if CIT crashes. The events are dis-
played from the most recent to oldest.
Syntax:
ELS+show-stored-log ?
<1..10000> Show a specific number of events stored
<cr>
ELS+
You can view only a specified number of stored events or all of them. If there too many events in the latter, you can
stop this command by pressing Ctrl+P.
Example:
ELS+show-stored-log 2
Press (Control + P) if you want to finish operation
04/14/16 17:55:27 ethernet0/0: PHY: Link UP - 100Mbps - Full - Copper
04/14/16 17:55:26 ethernet0/0: PHY is Marvell 88E1011S (01410c67)
ELS+
ELS+show-stored-log
Press (Control + P) if you want to finish operation
04/14/16 17:55:27 ethernet0/0: PHY: Link UP - 100Mbps - Full - Copper
04/14/16 17:55:26 ethernet0/0: PHY is Marvell 88E1011S (01410c67)
04/14/16 17:55:26 GW.005 Bffrs: 25575 avail 25575 idle fair 1312 low 5063
04/14/16 17:55:26 GW.073 CIT Ver Chg: Ver: 11.01.01-Beta-f97b83d+
04/14/16 17:55:26 GW.002 Portable CGW ATLAS160Super Rel 11.01.01-Beta-f97b83d+ strtd
04/14/16 17:55:26 GW.001 System restarted -- ATLAS160Super router cold start
ELS+
4.4.2.14 VIEW
This command is available from any process, although it does not appear when requesting all available commands:
to execute this, enter the full command name.
Syntax:
ELS+view ?
history Display the events history
<cr>
ELS+view
Example:
ELS+view
ELS+
Said history stores the same number of events as events configured through the evbuffer command, provided this is
more than 1000; where there are less, then 1000 are stored.
Syntax:
ELS+view history ?
flush Delete the events history
regex Apply a filter to the events history
<cr>
ELS+view history
Example:
ELS+view history
ELS+
Example:
Syntax:
Example 1:
Example 2:
This filter only show events where a celluar1/1 text appears (stored in the history).
4.4.2.15 EXIT
Allows you to exit the Event Logging System monitoring and return to + prompt.
Syntax:
ELS+exit
Syntax:
ELS+exit
+
SRE_INT_FLAGS
This patch allows you to modify Event Logging system behavior. You don't usually need to use this, however this
patch is useful for debugging and development effects. The patch value is the sum of the flags used.
Ve: 0 Normal Event Logging System operation.
Flag: 1 The Event Logging System stops introducing events in the round viewing buffer when the latter is
full. This means when events cannot be viewed and the buffer is full, CPU time is not consumed so
improving performance. Another effect is it's the latest events that are lost, not the oldest.
Flag: 2 When viewing, the time and date do not appear as it does not consult the real time clock and per-
formance is improved.
Example: