Teldat Dm704-I Configuration Monitoring
Teldat Dm704-I Configuration Monitoring
Legal Notice
Warranty
Teldat is not liable for any direct, indirect, collateral, consequential or any other damage connected to the delivery,
supply or use of this manual.
Table of Contents
I Related Documents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.4.12 ENABLE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.4.13 EVENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.4.14 FEATURE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.4.15 FILE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
2.4.16 FIRMWARE-CHECKING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
2.4.17 FIXED-NUMBER-SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.4.18 FORMAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.4.19 GLOBAL-PROFILES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.4.20 GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
2.4.21 LICENCE-CHANGE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
2.4.22 LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
2.4.23 LOG-COMMAND-ERROR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
2.4.24 MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
2.4.25 MULTICPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
2.4.26 NETWORK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
2.4.27 NO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
2.4.28 NODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
2.4.29 PRIVILEGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
2.4.30 PROTOCOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
2.4.31 QUICK CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
2.4.32 RUSH-ENGINE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
2.4.33 SAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
2.4.34 SET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
2.4.35 STRONG PASSWORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
2.4.36 TELEPHONY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
2.4.37 TIME . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
2.4.38 UCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
2.4.39 UNSET-DEMO-LICENCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
2.4.40 USER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
2.4.41 END . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
I Related Documents
Teldat Dm211-I Quick Menu
1.1 Introduction
All of our routers use the same user interface regardless of the model. They differ in terms of the software of the pro-
tocols loaded on each device.
Local terminal
Local terminals are directly connected to the Teldat Router by an RS-232 serial cable. See your device's installation
manual for more information.
Remote terminal
Remote terminals provide the same function as local terminals, except that you must use a local connection for initial
configuration. Remote terminals connect to the Teldat Router via TELNET once the IP protocol has been enabled.
For more information on enabling the IP protocol, see the following manual: Teldat Dm702-I TCP-IP Configuration .
Local or remote terminals allow you to access the Teldat Router to perform different processes. These are related to
device configuration, monitoring and statistics, and you can also receive event messages. The following table out-
lines the various processes:
P 1 (GESTCON): This is the console management process. It is the starting point when starting a
console session and provides access to the other processes.
P 2 (VISEVEN): This process allows you to view the events that occur in the system, from estab-
lished connections to system errors. These events must be preprogrammed in
process 4 (CONFIG) or process 3 (MONITOR) through the Event Logging System.
See Event Logging System ELS on page 186 for more details.
P 3 (MONITOR): Allows you to MONITOR system status and any statistics gathered by the device.
P 4 (CONFIG): This process allows you to edit all the configuration parameters. From here you
can create a full configuration without altering the device operation. You need to
save the configuration and restart the device for the changes to take effect.
P 5 (RUNNING-CONFIG): This process allows you to change the device's active configuration. Changes
made in this process take effect immediately, but any unsaved changes will be lost
when the device is restarted.
Note
Local connection
Detailed information about the hardware and software configuration of the device and the system initialization pro-
gress are displayed at system startup. Once the boot phase is complete, the user is invited to start a console session
by pressing any key.
The router's local connection is protected, so a username and password are required to access it. By default no
users are registered. In this case, a username and password are not required when attempting to login and the fol-
lowing welcome dialog and Management Console prompt appear:
Teldat (c)2001-2002
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
1 LAN, 2 WAN Line , 2 ISDN Line
Operating System version: ZZZZZ
*
To find out how to register a user, see the user command in Teldat Router Configuration on page 19. Registered
users are prompted to enter a username and password. If authentication is accepted, the welcome dialog appears.
User: Root
Password:****
Teldat (c)2001-2002
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
1 LAN, 2 WAN Line , 2 ISDN Line
Operating System version: ZZZZZ
Where XXXXX is the specific router model, YYYY/YYYY is the unit serial number, and ZZZZ is the OS version that is
running.
User: Root
Password:******
Access denied
If the password is not correct, the console will be inaccessible. The application blocks the user for 1 minute after the
maximum number of incorrect password attempts.
If a user is authenticated and an idle timeout is configured (see the set command in Teldat Router Configuration on
page 19 ), the router will drop the connection if the user remains idle for longer than the configured idle timeout value.
The user will need to re-enter their password before they can gain access to the console again.
A user access level determines the type of processes and commands available.
The user access level is specified with a value from 0 to 15 and a mode, default or strict.
You must save the configuration (see the save command in Teldat Router Configuration on page 19) if you want
users to continue to be able to log in after a device restart. Otherwise, their settings will be lost.
You manage users using the user command. It enables you to add, delete, enable and disable users, and list and
change access levels:
no user name:
Deletes a user from the user list. You can delete as many users as you want, but not the last root user if there are
still some users registered in the system. In this case, you can only delete the rest of the registered users (were you
to delete the last root user without removing the remaining registered users, then you wouldn't be able to manage
those users). You can delete the last root user once you have removed all the registered users. Then the system
would no longer request a username and password to access the device because there would be no users left in the
system.
Allows you to enable users. You simply indicate the user name you want to enable.
list user:
Displays the list of registered users, their access level, and whether or not they are enabled.
Allows you to change a registered user's access level, but not for users with root-level access.
The user command is described in greater detail in Teldat Router Configuration on page 19.
User management is compatible with the password specified with the set password command. Thus, if you update
a device that has this password enabled, the device will continue to allow access when that password is entered
while no user is registered.
Note
User management has priority over the device password. Thus, once users are registered and enabled
(by default, users are enabled when they are registered), the old password will no longer be valid.
Remote connection
To connect to the Teldat Router by initiating a TELNET session on the host (the host is the system where the re-
mote terminal resides), you need to provide the IP address of the device you want to connect to.
Example:
telnet 128.185.132.43
The Teldat Router acts as a TELNET server. The remote terminal acts as a TELNET client.
Once a TELNET session is established with the Teldat Router, if necessary, the user is required to enter a user-
name and password to access the system. Once the user is authenticated, the welcome dialog appears:
User: Root
Password:****
Teldat (c)2001-2002
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
1 LAN, 2 WAN Line , 2 ISDN Line
Operating System version: ZZZZZ
*
Where XXXXX is the specific router model, YYYY/YYYY is the unit serial number, and ZZZZ is the OS version that is
running.
Access control on the Teldat Router is similar to local mode access. If users have been defined and are enabled
(they are enabled by default upon creation), they are prompted to enter a username and password to allow them to
connect to the system. When the authentication is correct, the welcome dialog and prompt appear and the authentic-
ated user's privileges will be available.
User: Root
Password:******
Access denied
Note
If the password is not entered within 20 seconds or is entered incorrectly three times in a row, the
device will disconnect the TELNET session.
Example:
If we type u in the menu with the user, upload, and down commands, we will get an error message telling us that
we have entered an ambiguous command (user and upload both begin with the letter u). Typing d , do, dow or
down will run the down command, typing us , use or user will run the user command, while upl , uplo , uploa or
upload will run the upload command. Any other input will produce an error because no command will match what is
typed.
To delete the last character(s) in the command line, use the backspace ( <-) key.
To split a long command into several lines, type a backslash ( \) at the end of the line.
Example:
Config>set \
Config>host\
Config>n MY_\
Config>HOST_N\AME
is equivalent to:
Command history:
Release Modification
11.00.05 This command option was introduced as of version 11.00.05.
The most common processes are: GESTCON, MONITOR, CONFIG, RUNNING-CONFIG and VISEVEN. The follow-
ing diagram shows the structure of the processes in the Teldat Router.
As you can see, each process has a different prompt. You can tell which process you are in by looking at the prompt.
The following list shows the prompts for the different processes:
Process Prompt
GESTCON *
MONITOR +
CONFIG Config>
RUNNING-CONFIG Config$
The Teldat Router offers the possibility of personalizing the device by inserting a text string before the prompt. This
text can be up to 8 characters long, and is taken from the name assigned to the device. To enter it, see the set host-
name configuration command.
GESTCON process
This is the Management Console and its mission is to provide access to the other processes.
MONITOR process
This allows the user to monitor the router's hardware/software status and statistics. It provides access to the protocol
and interface menus. These menus allow the user to monitor configured protocols and other parameters.
CONFIG process
This allows you to configure various parameters, such as network addresses and events. It provides access to the
protocol configuration environment to configure protocol parameters. From this process you can perform a complete
device configuration, but the changes will not take effect until they are saved and the device restarted. Therefore, this
process is used to modify the device's startup configuration.
RUNNING-CONFIG process
This provides access to the configuration of interfaces, protocols, etc. All parameters configured from here will take
effect immediately, but unsaved changes will be lost when the device is restarted. Therefore, this process is used to
dynamically modify the device's active configuration.
VISEVEN process
Receives system event messages and displays them on the terminal according to user selection criteria.
*process 4
User Configuration
Config>
However, there are a number of specific commands you can use to access the most common processes. The follow-
ing table shows these commands:
Command Process
monitor Process 2: monitoring.
config Process 4: startup configuration editor.
running-config Process 5: active configuration.
To end a TELNET session that you have initiated with another device from the Teldat Router, you can use the
Ctrl+s escape character. This escape character forces the TELNET session initiated by the Teldat Router to close.
Note
To return to the Management Console, use the Ctrl+p escape character. To close a TELNET session,
use Ctrl+s.
Example:
*config
User Configuration
Config> Press (Ctrl + p)
*
*monitor
Console Operator
+ Press (Ctrl + p)
*
Note
The configuration and monitoring processes allow you to access other protocol configuration/monitoring
menus. To return to a higher-level configuration/monitoring process, use the exit command. To return
to the Management Console, use the Ctrl+p escape character.
You can also type a question mark ( ?) after a command or option to obtain a corresponding list of commands or op-
tions. In addition, you can press the tab key to automatically complete a command or option that is already perfectly
defined.
Example:
Config>protocol ?
arp Access ARP protocol
asrt Access ASRT protocol
bfd Access BFD protocol
The GESTCON process contains a set of commands that you can use to check the status of processes, monitor in-
terfaces and packet transmission, and configure several parameters.
GESTCON process commands table
Commands Function
MONITOR Accesses the monitoring process.
CONFIG Accesses the boot configuration editing process.
RUNNING-CONFIG Accesses the active configuration editing process.
FLUSH Clears all messages stored in the event buffer thus far.
INTERCEPT Allows you to change the process escape character.
LOAD Reloads the application from flash memory.
LOGOUT Terminates a Telnet connection established with the device.
PROCESS Lets you access another device process and enable its commands.
RESTART Restarts the device by re-reading the configuration.
SSH Opens an SSH client connection to a remote device whose address is specified.
STATUS Displays process names and identifiers.
TELNET<address> Opens a Telnet client connection to a remote device whose address is specified.
VRF-TELNET <vrf> <address> Opens a Telnet client connection to a remote client device whose address is spe-
cified in the specified VRF.
1.4.1 MONITOR
Accesses the monitoring process.
Syntax:
*monitor
Example:
*monitor
Console Operator
+
1.4.2 CONFIG
Accesses the startup configuration editing process.
Syntax:
*config
Example:
*config
Config>
1.4.3 RUNNING-CONFIG
Accesses the active configuration editing process.
Syntax:
*running-config
Example:
*running-config
Config$
1.4.4 FLUSH
Clears the event viewer (VISEVEN) output buffer of all events.
Syntax:
*flush
Example:
*flush
*
1.4.5 INTERCEPT
Allows you to change the process escape character. In the example below, the default escape character is changed
from Ctrl+u to Ctrl+p.
Syntax:
*intercept
Example:
*intercept
Press the new escape key and then Enter: Press (Ctrl+u) and <¿>
Press the new escape key again and then enter: Press (Ctrl+u) and <¿>
Escape key updated
*
Note
1.4.6 LOAD
Allows you to load the application from flash memory.
Syntax:
• < option > specifies the type of load you want to use.
• yes option can be used to bypass the system's confirmation question.
The activate option allows you to program the router to load the routing application at a certain time. The time is set
in 24-hour format.
Syntax:
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06
The deactivate option overrides a programmed reload that has not completed. If there are no programmed reloads,
an error message is displayed.
Syntax:
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
*load deactivate
Reload is timed at 20:00
Are you sure you want to cancel the timed reload(Yes/No)? y
Timed reload was canceled
*
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06
Syntax:
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
*load immediate
Are you sure you want to reload the device(Yes/No)? y
*
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06
Allows the user to program the routing application program to restart at a certain time. The time is set in 24-hour
format.
Syntax:
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06.
Disables a programmed restart. If there are no programmed restarts, an error message is displayed.
Syntax:
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
*load rdeactivate
Reload is timed at 17:00
Are you sure you want to cancel the timed restart(Yes/No)? y
Timed restart was canceled
*
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06.
1.4.7 LOGOUT
Terminates the Telnet connection to the router without using any Telnet client commands.
Syntax:
*logout
Example:
*logout
Do you wish to end telnet connection (Yes/No)?
1.4.8 PROCESS
Allows you to access other processes, such as MONITOR, VISEVEN, or CONFIG. After connecting to a new pro-
cess, you can send specific commands or receive output from that process. To obtain the process identifier, use the
status command. Once you are connected to another process, such as MONITOR, VISEVEN, or CONFIG, use the
Ctrl+p escape character to return to the Management Console (GESTCON).
Syntax:
*process <pid>
• < pid > this is the identifier of the process whose console you want to access.
Example:
*process 4
User Configuration
Config>
When you are in any of the protocol menus (e.g., Conf IP> or IP>), use the exit command to return to a process
menu.
1.4.9 RESTART
Restarts the Teldat Router without reloading the software. The router then:
Note
If this command is used on a remote terminal connection, the TELNET session is lost because all the
processes on the device are restarted.
Syntax:
*restart [yes]
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
*restart
Are you sure you want to restart the system(Yes/No)? y
Done
Restarting. Please wait ...............................................
APP DATA DUMP..........................................
Running application
Flash configuration read
Parsing text mode configuration ...
Configuration parsed
Initializing
Press any key to get started
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06.
1.4.10 SSH
Establishes an SSH connection to a remote device with a specified address. The address can be an IPv4 address or
a domain name if you configure a DNS client.
Syntax:
*ssh [vrf <vrf>] <address> [login <login-name> | port <port> | version <1-2> | cipher <cipher> | <cr> ]
The vrf option allows you to specify the VRF that will be used to initiate the SSH session. If this option is not used,
then the primary VRF is used.
• vrf < vrf > specifies the VRF that will be used to initiate the SSH session.
• < address > specifies which IP address or device domain name to access via SSH.
• login < login-name > specifies the user ID to use for logging onto the remote networking device running the SSH
server. When no user ID is specified, the current user ID is used by default.
• port < port > specifies the remote host's port number. The default is 22.
• version < 1-2 > specifies the SSH version to use.
• cipher < cipher > selects the cipher specification for encrypting the session.
Examples:
The following example will establish an SSH connection to the router with IP address 192.168.212.201 using the
specified user ID:
Teldat (c)2001-2015
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
Router1 *
The following example will establish an SSH connection to the router with IP address 192.168.212.201 without using
the user ID (local root user).
Teldat (c)2001-2015
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
Router1 *
The following example will establish an SSH connection to the router with IP address 192.168.212.201 using the
user ID and port 50 when the SSH server is NOT listening to that port and the connection cannot be established.
The following example will establish an SSH connection to the router with IP address 192.168.212.201 using the
user ID and port 50 when the SSH server is listening to port 50 as well.
Teldat (c)2001-2015
Router model XXXXX CPU MPC860 S/N: YYYY/YYYYY
Router1 *
The following example will establish an SSH connection to the router at 192.168.212.201 forcing version 1 when the
SSH server only supports SSHv2 and the connection cannot be established.
The following example will establish an SSH connection to the router with hostname ares.id.teldat.com with the user
ID.
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
The following example will establish an SSH VRF connection to the router with IP address 192.168.140.254 using a
user ID.
Command history:
Release Modification
11.00.05 SSH client was introduced as of version 11.00.05.
11.01.00 SSH client was introduced as of version 11.01.00.
11.00.06 This command was modified as of version 11.00.06. "Ctrl T" is the new escape key.
11.01.02 This command was modified as of version 11.01.02. "Ctrl T" is the new escape key.
11.01.09 SSH VRF command was introduced as of version 11.01.08.
1.4.11 STATUS
This option allows you to find out process names and identifiers (PID).
Syntax:
*status
Example:
*status
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
1.4.12 TELNET
Establishes a Telnet connection to a remote device with a specified address. You can use this command with
IPv4/IPv6 addresses or with a domain name if you configure a DNS client.
Syntax:
*telnet
[vrf <vrf>] <address> [source <address>] [port <port>]
<cr>
The vrf option allows you to specify the VRF that will be used to initiate the Telnet session. If this option is not used,
then the primary VRF is used.
If no parameter is entered (telnet <cr> option), all telnet parameters are requested and the primary VRF is used. In
this case, the telnet source and destination addresses can only be IPv4.
• vrf <vrf> specifies the VRF that will be used to initiate the Telnet session.
• <address> specifies the IP address or domain name of the device to access via Telnet.
• source <address> specifies the source IP address to use for Telnet. If a domain name is specified as the destina-
tion, the source address can only be IPv4.
• port <port> specifies the destination port to use for Telnet.
Examples:
The following example will telnet to the router with IP address 172.123.23.67:
*telnet 176.123.23.67
Trying to connect...
(Press Control S to come back to local router)
Connection established
The following example will telnet to the router with IP address 172.24.78.92 using the source address 80.1.1.1 and
port 6623.
FTP *telnet
Telnet destination []? 172.24.78.92
Telnet source [172.24.78.94]? 80.1.1.1
Telnet port [23]? 6623
Trying to connect...
(Press Control S to come back to local router)
Connection established
The following example will telnet to the router at 172.24.78.92 using the source address 80.1.1.1 and port 6623, spe-
cifying the parameters with options.
The following example will telnet to the router with IPv6 address 2001:db8:1::1 using the source address
2001:db8:1::2. Since it is an IPv6 destination, you must specify the parameters with options:
The following example will telnet to the router with domain name router1.midominio.es:
The following example will telnet to the router at 172.24.78.92 using the router_aux VRF.
Command history:
Release Modification
11.01.09 IPv6 VRF support was introduced as of version 11.01.09.
1.4.13 VRF-TELNET
Establishes a Telnet connection to a remote device with a specified address in a particular VRF. The address can be
a domain name if the DNS client is configured.
Syntax:
*telnet <vrf>
<address> [source <address> | port <port> | <cr> ]
<cr>
• < vrf > specifies the name of the VRF you want to use to initiate the Telnet session.
If no additional parameters are entered ( vrf-telnet <vrf> <cr> option), you are prompted to enter all Telnet paramet-
ers.
• < address > specifies the IP address or domain name of the device to access via Telnet.
• source < address > specifies the source IP address to use for Telnet.
• port < port > specifies the destination port to use for Telnet
Examples:
The following example will telnet to the router with IP address 172.123.23.67 in the VRF called client.
The following example will telnet to the router with IP address 172.24.78.92 in the VRF called client using the source
address 80.1.1.1 and port 6623.
FTP *vrf-telnet
vrf tag []? client
Telnet destination []? 172.24.78.92
Telnet source [172.24.78.94]? 80.1.1.1
Telnet port [23]? 6623
Trying to connect...
(Press Control S to come back to local router)
Connection established
The following example will telnet to the router at 172.24.78.92 in the VRF called client using the source address
80.1.1.1 on port 6623, specifying the parameters with options.
Trying to connect...
(Press Control S to come back to local router)
Connection established
The following example will telnet to the router with the domain name router1.midominio.es in the VRF called client:
2.1 Introduction
From a functional point of view, the Teldat Router has two virtual devices:
As you can see in the diagram, each virtual machine governs its own set of interfaces. It is therefore necessary to be
able to accurately identify the different interfaces and to know whether an interface belongs to the router or to the
node.
The way that you identify the interfaces in the Teldat Router configuration is by means of a name.
For physical interfaces, the name consists of a string of text followed by two numbers separated by a slash. The text
indicates the type of interface (serial line, ISDN, etc.), the first of the numbers indicates the interface's location in the
device (0 for the motherboard, 1 for the first pci extension, 2 for the second, etc.), and the second number indicates
the number of occurrences of that interface type for a single location (serial line 0, 1, 2, etc.).
In user-added interfaces, the name consists of a text string that indicates the interface type and a number that is
unique for that type of interface. Subinterfaces are an exception to this rule as their name consists of the base inter-
face name followed by a period (.) and then by a number that is unique for that subinterface on the base interface.
The list devices command in the configuration process lists the interface identifiers. Here you can see the output of
this command on a specific device:
Config>list devices
Interface Connector Type of interface
ethernet0/0 LAN1 Quicc Ethernet
serial0/0 SERIAL0/WAN1 AT COM
atm0/0 DSL1 ATM
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
Config>
The first column indicates the name of the interface ( Interface), the second column indicates the corresponding phys-
ical connector (Connector), and the third column specifies the type of interface programmed.
To select an interface you need to type its name, but you do not necessarily have to type all the characters of the
name. For physical interfaces, simply type the beginning of the text in such a way that it does not match any other in-
terface text, followed by the location if there is more than one interface of the same type. You don't always have to
enter the interface location (X/X); this is only necessary when there are several interfaces of the same type (for ex-
ample, several serial interfaces).
Examples:
Config>list devices
Interface Con Type of interface CSR CSR2 int
ethernet0/0 LAN1 Fast Ethernet interface fa200e00 27
serial0/0 WAN1 X25 fa200a00 fa203c00 5e
serial0/1 WAN2 X25 fa200a20 fa203d00 5d
serial0/2 WAN3 X25 fa200a60 fa203f00 5b
bri0/0 ISDN1 ISDN Basic Rate Int fa200a40 fa203e00 5c
x25-node --- Router->Node 0 0
Config>
Here are some examples of valid commands that you can use to access the first serial interface on the motherboard
(WAN 1) according to the devices listed in the previous table:
Config>network serial0/0
Config>network ser0/0
Config>network ser0
Config>network s0
Config>network serial
Config>network ser
Config>network ser0/4
Config>network s7
The network serial command is incorrect because there are several serial interfaces on the device. Therefore, you
need to specify the interface location.
Here are some examples of valid commands that you can use to access the bri interface:
Config>network bri0/0
Config>network b0/0
Config>network bri0
Config>network b
In this case, as there is only one bri interface, you only need to type the text string of the interface and not the loca-
tion. And you don't have to type the full text string. You can abbreviate it by typing just enough characters to distin-
guish the interface from all the others. In this case no other interface begins with the letter b, so one letter will suffice.
• It is important to note that some interfaces do not have an associated physical connector. This is the case of the
x25-node interface example. This is because the interface itself allows the virtual machines to connect and there-
fore it does not have an external connector associated with it.
Using this information, you can redo the previous diagram for this case as follows:
Now suppose you change the protocol of one of the WAN lines using the set data-link command and then you con-
sult the interface table.
In the following example, the X25 protocol is assigned to the physical line 1:
As you can see, the router is now managing one more interface, while the node is managing one less.
The following example adds a generic Frame Relay interface over a basic ISDN access:
Config>add device fr 1
Config>
The interface identifier is a number between 1 and 9999 that allows you to distinguish the newly created interface
from others of the same type, that is, from other frame-relay dial interfaces.
Config>list devices
User-added dial interface names can be abbreviated by typing just enough characters to distinguish the interface
from all the others. The identifier is mandatory.
Here are some examples of valid commands you can use to access the FR dial interface according to the devices
listed in the previous table:
Config>network fr1
Config>network f1
ATM interfaces can be configured with associated subinterfaces. For example, in a configuration with an xDSL card
in SLOT 3:
Config>list devices
To access this subinterface, you need to enter the base interface name followed by a period (.) and the subinterface
ID. This ID must be different from that of any other subinterface on the same base interface (to be able to distinguish
it from the others). You have to type it to access the subinterface even if there is only one. When naming the base in-
terface, the same rules apply as for physical interfaces.
Here are some examples of valid commands you can use to access an atm subinterface according to the devices lis-
ted in the previous table:
Config>network atm3/0.2
Config>network atm3.2
Config>network atm.2
Config>network a.2
As there is only one ATM interface, you do not need to indicate its location.
• Interfaces
• Protocols
The CONFIG configuration process allows us to display and change the router's boot configuration and store it in
flash memory or on a smart card. Any changes that you make in this process will not be stored unless you run the
save command and will not take effect until you restart the router. To restart the router you can do two things:
• Run the restart command from the Management Console prompt (*), or
• Turn the router off and on again.
The RUNNING-CONFIG configuration process allows us to dynamically change and display the router's active con-
figuration and store it in flash memory or on a smart card. Any changes that you make in this process are not stored
unless you run the save command. Changes made in the RUNNING-CONFIG process take effect immediately.
Note
The RUNNING-CONFIG process displays the active configuration but it does not allow you to modify all
of it. For this reason, not all the CONFIG process commands (such as the no config command) are
available in the RUNNING-CONFIG process.
The CONFIG and RUNNING-CONFIG processes fit into the router structure as follows:
To enter the RUNNING-CONFIG process from the GESTCON Management Console prompt ( *), type the running-
config command.
Example:
*config
Config>
To exit the configuration process and return to the GESTCON Management Console prompt ( *), type the escape
character whose default value is (Ctrl+p).
If a conflict of this type does occur, the device prevents the user from accessing the configuration environment while
informing him of the circumstance that led to the blocking.
Example:
+system telnet
ID USER IP ADDRESS:PORT CONNECTION TIME INACTIVITY TIME
-------------------------------------------------------------------
*config
Config>protocol ip
-- Internet protocol user configuration --
IP config>
*config
Config>protocol ip
CLI Error: Command locked by another user
CLI Error: Command error
Config>
In this case, the sample user intends to access the IP protocol configuration environment and is prevented from do-
ing so by the device because the root user is currently accessing said menu.
Show command
The show command can be used in any menu in the configuration process. It allows three options:
Config>show ?
all-config
config
menu
Config>
The show all-config command shows all menu and submenu configurations on the device that the user has access
to. That is, it shows the console commands that would need to be entered to configure the device as it is in the mo-
ment the show all-config command is executed.
Example:
Config>show all-config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.78.116 255.255.0.0
;
;
;
;
;
exit
;
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
protocol ip
; -- Internet protocol user configuration --
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
exit
;
;
dump-command-errors
end
; --- end ---
Config>
This command shows all configurations on the router that the user has access to, regardless of the menu or sub-
menu he is working on. For example from the IP menu:
IP config>show all-config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.78.116 255.255.0.0
;
;
;
;
;
exit
;
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
protocol ip
; -- Internet protocol user configuration --
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
exit
;
;
dump-command-errors
end
; --- end ---
IP config>
The show config command shows all menu and submenu configurations on the device that the user has access to
and that are accessed through the menu the user is in when he runs the command.
Example:
Config>show config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.78.116 255.255.0.0
;
;
;
;
;
exit
;
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
protocol ip
; -- Internet protocol user configuration --
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
exit
;
;
dump-command-errors
end
As you can see, running the show config command from the root menu is the same as running the show all-config
command. However, if you run the show config command from the IP menu, only the IP and TVRP configurations
are displayed:
IP config>show config
; Showing Menu and Submenus Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
classless
;
tvrp
; -- TVRP Configuration --
enable
;
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
;
exit
;
IP config>
The show menu command shows the configuration of the menu that the command is executed from, but it does not
show the configuration of its submenus.
Examples:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
dump-command-errors
end
Config>
IP config>show menu
; Showing Menu Configuration for access-level 15 ...
classless
;
IP config>
The configuration generated by the show command can be copied to a text file, edited at the user's convenience,
and then pasted to a non-configured device in such a way that it gets configured.
If you want to abort the process while the router is showing the configuration, press the escape character ( Ctrl+p by
default).
Filtering the output of these commands is possible. To do this, we must add a pipe ("|") to the command, the filter we
will use and the regular expression. If there is more than one word in the regular expression, please enter quotation
marks. The filters allowed are:
• begin. Displays the result of the first occurrence of the regular expression.
• end. Displays the result until the first occurrence of the regular expression.
• exclude. Filters the show command output so that it excludes lines that contain the regular expression.
• include. Filters the show command output so that it only displays the lines that contain the regular expression.
• more. Displays the result of the number of lines specified. The default value is 25 lines.
*p 5
group 1 ip 172.24.78.128
group 1 local-ip 172.24.78.116
Command history:
Release Modification
11.01.05 The filtering options were introduced as of version 11.01.05.
Home command
The home command is available in all menus within the configuration process. It allows you to return to the configur-
ation process prompt regardless of the current menu or submenu. Using this command, you don't have to leave the
menus one by one with the "exit" command.
Examples:
*p 4
Config>protocol ip
Config>
*p 5
Config$network ethernet0/0
Config$
Command history:
Release Modification
11.01.03 This command was introduced as of version 11.01.03.
Root command
The root command is available in all menus that can be accessed during the configuration and monitoring pro-
cesses. It allows you to return to the root prompt, regardless of the menu or submenu you are currently in.
Examples:
*
*p 4
Config>protocol ip
Command history:
Release Modification
11.01.06 This command was introduced as of version 11.01.06.
List of options
In many situations when you are configuring your device, you will need to choose an option to configure certain fea-
tures of the router, such as Frame Relay PVCs ( Teldat Dm703-I Frame Relay ) or TVRP groups (Teldat Dm725-I
TVRP Protocol).
Options can be abbreviated. You simply type just enough characters to distinguish an option from those available.
Examples:
serial0/0 FR config>pvc 16 ?
backup Configure several backup parameters
Bc Outgoing Committed Burst Size
Be Outgoing Excess Burst Size
CIR Outgoing Committed Information Rate
compression Enable/disable compression for this circuit
default Create the virtual circuit
encapsulation Encapsulation type
encrypt Enable/disable encryption
fragmentation-size Forced fragmentation size
inverse-arp Inverse ARP configuration for this dlci
name Set the virtual circuit name
no
route Set static route for PVC switching
serial0/0 FR config>pvc 16 cir 32000
serial0/0 FR config>
In this case, you could also have typed ci, since no other option starts with ci. If you had typed the letter c and noth-
ing else, you would have got an error message because there is another option starting with that letter
(compression).
Transaction command
This command allows you to run transactions from the configuration menus. A transaction allows you to input and
temporarily suspend configuration commands. At the end of the transaction, the commands that have been entered
since the start of the transaction are executed and then applied to the configuration.
It is possible to abort an active transaction. In this case, the commands that have been entered since the beginning
of the transaction are undone and are not applied to the configuration.
Optionally, you can configure the transaction so that no changes are applied in the configuration at the end of the
transaction if any of the entered commands return an error. This is useful if you are using a remote management ap-
plication and you want to apply a set of configuration commands atomically.
You can run the transaction command from any configuration menu, either in the static configuration or in the dy-
namic configuration. There are four options:
Config$transaction ?
abort Terminate an active transaction discarding changes
commit Terminate an active transaction and apply changes
fail-on-error Make a transaction fail if any command returns an error
start Start a CLI transaction
Config$
The transaction abort command rolls back an active transaction, which undoes any changes from commands
entered since the start of the transaction.
The transaction commit command ends an active transaction, applying the changes from commands entered since
the start of the transaction to the configuration. If you have configured the transaction not to apply changes when a
command fails (using the transaction fail-on-error command) and some of the commands entered have generated
an error, the detected errors are reported and no changes are applied.
The transaction fail-on-error command configures an active transaction to avoid applying changes upon termina-
tion of the transaction with the transaction commit command if any of the commands entered have returned an er-
ror.
The transaction start command initiates a transaction, at which time the entered commands start being registered
to apply them together at the end of the transaction with transaction commit.
2.4.1 ADD
Allows you to create a virtual interface.
Syntax:
Config>add <option>
device Create a virtual device
Syntax:
• <virtual interface> is the type of virtual interface to create. To find out what types of interfaces are available, type
add device ?:
Config>add device ?
atm-subinterface Create a virtual ATM Subinterface interface
bvi Create a virtual Bridge interface
bvi-subinterface Create a virtual Bridge subinterface
cellular-data Create a cellular data interface over cellular network
dial-routing Create a virtual Dial-Route interface
direct-ip Create a virtual Direct IP interface
eth-subinterface Create a virtual Ethernet Subinterface interface
fr Create a virtual Frame-Relay interface
fr-subinterface Create a virtual FR Subinterface interface
hdlc Create a virtual HDLC interface
l2tp Create a virtual L2TP interface
loopback Create a virtual Loopback interface
ppp Create a virtual PPP interface
rcellular Create a virtual Remote Celullar interface
tnip Create a virtual TNIP interface
voip-cellular Create a virtual VoIP interface over cellular network
voip-dummy Create a virtual VoIP interface with no hardware
voip-isdn Create a virtual VoIP interface over ISDN
wlan-subinterface Create a virtual Wireless LAN subinterface
x25 Create a virtual X25 interface
xot Create a virtual XOT interface
• [options] The options that are available will depend on the type of virtual interface we want to create. They are de-
scribed in the relevant interface manual.
Example:
For more information, please refer to the manual associated with the particular virtual interface you want to create.
Release Modification
11.02.03 The "cellular-data" option was introduced as of version 11.02.03.
2.4.2 AUTOINSTALL
Sets the device parameters to auto-install by frame relay from a TELDAGES network manager.
Syntax:
Command history:
Release Modification
11.00.03 This command is obsolete as of version 11.00.03.
Specifies the type of device identifier for correct interpretation from the TELDAGES network manager.
Syntax:
• <type> is the type of device identifier. Currently, only serial, which uses the device's serial number, is available to
identify the device with the network manager.
Example:
Identifies the management station that will be used to perform remote autoconfiguration.
Syntax:
• <host identifier> is the management station identifier. This identifier can be an IP address or a Fully Qualified Do-
main Name/Hostname.
Example:
2.4.3 BACKUP-FILES
Creates a recovery point by making a copy of the system files from the primary partition to the backup partition. In
this way, if the file system were to be corrupted, the device would automatically restore files from the recovery point
and remain functional.
The configuration monitoring command displays information about the recovery process, indicating whether the
device booted normally (from the primary partition) or whether it restored from a recovery point (from the backup par-
tition).
The [no] firmware-checking configuration command determines whether file system restore is enabled in case any
required firmware files are corrupted.
Note
Syntax:
Config>backup-files
Example 1:
Config>backup-files
Backup in progress...
Backup successful.
Config>
Example 2:
Config>backup-files
CLI Error: Backup device not available.
CLI Error: Command error
Config>
In this example the device did not have a partitioned flash, so the command returned an error and no recovery point
was created.
2.4.4 BANNER
Allows you to configure a banner on the device.
Syntax:
Config>banner <type>
login Set login banner
exec Set exec banner
Use this command to configure an access banner to be displayed whenever a user tries to connect to the device
through the console, telnet or FTP.
If the banner contains more than one line of text, each line must be configured separately using the banner login
command. The lines of text should be entered in the order you want to display them. If a line of text contains spaces,
it must be enclosed in quotation marks.
The size of the banner is limited to a maximum of 15 lines of text and 80 characters per line.
Syntax:
Example:
no ip address
;
exit
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
;
;
dump-command-errors
end
; --- end ---
Config>save yes
################################################################################
# Este equipo es propiedad de Sample, S.A. y su uso está restringido a sus #
# empleados. Por favor, aborte esta conexión si usted no es empleado de #
# Sample, S.A. o tiene una autorización legal para acceder al equipo. #
################################################################################
User:
Use this command to configure a welcome banner to be displayed when a user is granted access to the device
through the console, Telnet, SSH or FTP.
If the banner contains more than one line, each line must be configured separately using the banner exec com-
mand. The lines should be entered in the order you want to display them. If a line of text contains spaces, it must be
enclosed in quotation marks.
The banner is limited to a maximum of 15 lines of text and 80 characters per line.
Syntax:
Example:
##############################################################
............::::::::::: WELCOME :::::::::::............
##############################################################
*
2.4.5 CONFIG-MEDIA
Use this command to select the active storage device. The configuration will be saved to this device when you apply
the save configuration command. It is also the default media in the file list command.
The devices can use two types of storage media: flash memory and smart card. All devices use flash as their primary
storage media. Not all device models support smart cards. Please refer to your device's installation manual to find
out whether your device supports smart card technology.
By default, devices that support smart cards are configured with the smartcard-flash value while those that do not
are configured with the flash option. You can check which drive is active by using the file list configuration com-
mand.
Syntax:
Config>config-media <media>
flash Configurations are stored only in Flash
smartcard Configurations are stored only in SmartCard
smartcard-flash Configurations are stored in SmartCard and Flash
• < media > specifies the name of the storage drive to be used.
For more information on using storage units, refer to the file list and file copy commands in this manual and your
device's installation manual. For more information on how to select the active configuration file, refer to your device's
installation manual.
The behavior described below is slightly different when the e microswitch is set to ON. For more information, please
see your device's installation manual.
Specifies that flash memory is to be used as the only active storage device when reading or writing configurations.
The device reads the configuration from flash when powering up. If it can't find the active configuration file, it boots
from the default configuration instead. The save command saves the configuration to flash under the active filename.
Example:
Config>config-media flash
Specifies that the smart card is to be used as the only active storage device when reading or writing configurations.
The device reads the configuration from the smart card when powering up. If it cannot detect the smart card or find
the active configuration, it boots from the default configuration instead. The save command saves the configuration
to the smart card under the active filename.
Example:
Config>config-media smartcard
Specifies that both the smart card and flash memory are to be used as the active storage devices when reading or
writing configurations. The smart card takes priority over flash.
The device reads the configuration from the smart card when powering up. If it cannot detect the smart card or find
the active configuration, it repeats the operation in flash. If it cannot find the file in flash, it boots from the default con-
figuration instead. If, after reading the configuration from the smart card, the device ascertains that the file is not in
flash, it writes it in to synchronize the two media.
The save command saves the configuration to both the smart card and flash under the active filename. The devices
used to store the configuration show up on the console, as does a warning text if the recording was not possible on
either device.
Example:
Config>config-media smartcard-flash
2.4.6 CONFIRM-CFG
Use this command to confirm that the current configuration is configured correctly. You must have saved a configura-
tion with the confirm saved configuration function enabled (see the confirm-cfg-needed command).
Syntax:
Config>confirm-cfg
You can also perform this action via SNMP. See CONFIRM-CFG-NEEDED on page 36.
2.4.7 CONFIRM-CFG-NEEDED
Use this command to confirm that the saved configuration is configured correctly. When you run this command, the
configuration is saved in TEMP.CFG for testing. If, after restarting the device, you don't save the configuration with
the confirm-cfg command within the programmed time, the device boots with the previous configuration. If you con-
firm the configuration, it is saved under its corresponding name; so the use of TEMP.CFG is transparent to the user.
If the new configuration causes the device to restart before reaching the programmed test time, the previous config-
uration will be restored after ten restarts without the configuration being confirmed. If you use the no confirm-cfg
command, the device restarts with the previous configuration. The no confirm-cfg-needed command disables the
requirement that new saved configurations be confirmed.
Syntax:
Config>confirm-cfg-needed <option>
default Enables the need of configuration confirmation
timeout Sets a timeout to wait for confirmation
Enables the requirement that the saved configurations be confirmed within a 10-minute time period.
Syntax:
Config>confirm-cfg-needed default
Example:
Config>confirm-cfg-needed default
Config>
Configures the test period for the new configuration. This is the amount of time the device will wait before restarting
the previous configuration if the new configuration is not confirmed. The minimum value is one minute and the max-
imum is 5 weeks.
Syntax:
• < option > specifies the test period in any of the following formats: Xw, Xd, Xh, Xm, Xs, HH:MM, HH:MM:SS.
Example:
It is possible to run the confirm saved configuration feature via SNMP. For this purpose, three new SNMP variables
have been created with their corresponding OIDs:
Setting this variable to 1 in a write operation confirms the current configuration. Setting it to 0 rejects the current
test configuration so that the device restarts with the previous configuration.
A 0 value (confirmed) in a read operation indicates that the current configuration has been confirmed. A value of 1
(test_cnfg_inactive) indicates that the current configuration has not yet been confirmed (therefore it is a test config-
uration) and is not active; the previous configuration is the active configuration. A value of 2 (test_cnfg_active) in-
dicates that the current configuration has not yet been confirmed (i.e., it is a test configuration) but it is the active
configuration. A value of 3 (configuration_recovered) indicates that the previous configuration has been recovered,
confirmed and is active. A value of 4 (undefined) is only given if the confirm saved configuration feature is disabled
because, in this case, the use of this SMNP variable is meaningless.
There are three scenarios in which the old configuration can be recovered (and therefore the telAdminStatusCon-
firmConfig variable would get the value 3 of configuration_recovered):
a) After the confirmation timer expires without confirming the test configuration.
b) After 10 consecutive device restarts (produced before the confirmation timer expires). Restoring the old config-
uration in this scenario is meant to protect us in the event the new configuration forces the device to restart before
reaching the scheduled test time.
c) After rejecting the current test configuration with the no confirm-cnfg command (or via SNMP by typing a 0 in
the telAdminStatusConfirm Config variable).
• telAdminStatusConfirmEnabled (OID: 1.3.6.1.4.1.2007.1.2.15). This variable is used to enable/disable the con-
firm saved configuration feature.
Setting this variable to 1 in a write operation enables the need to confirm the saved configuration. Setting it to 0,
disables the need to confirm new saved configurations.
A 0 value (disable) in a read operation indicates that the confirm configuration feature is disabled, while a value of
1 (enable) indicates that the confirm configuration feature is enabled.
• telAdminStatusTimeoutConfirm (OID: 1.3.6.1.4.1.2007.1.2.16). This variable is used to configure the value of
the confirm saved configuration feature timer (in seconds). That is, you use it to set the amount of time the device
waits before restarting the previous configuration if the current configuration is not confirmed.
Valid values for this variable range from 60 (1 minute) to 3024000 (5 weeks). Its default value is 600 (10 minutes).
In a write operation, values between 60 and 3024000 set the timer to the input value.
In a read operation, values between 60 and 3024000 return the seconds to the timer value.
Therefore, a logical operating sequence for the confirm saved configuration feature via SNMP is:
• Initially, the confirm saved configuration feature is disabled. The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 4 (undefined)
- telAdminStatusConfirmEnabled = 0 (disable)
- telAdminStatusTimeoutConfirm = 600
• We enable the confirm saved configuration feature (setting the telAdminStatusConfirmEnabled SNMP variable
value to 1). The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 0 (confirmed)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 600
• We set the confirmation timer value to the desired value (for example, 1 minute). To do this, set the telAdmin-
StatusTimeoutConfirm SNMP variable value to 60. The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 0 (confirmed)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• We make the appropriate changes to the device configuration and save them (setting the telAdminStatusSaveCon-
fig SNMP variable value to 1). The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 1 (test_cnfg_inactive)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• We restart the device. The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 2 (test_cnfg_active)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• We confirm the (active) test configuration before the 60 second timer expires (setting the telAdminStatusConfirm-
Config SNMP variable value to 1). The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 0 (confirmed)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Continuing the example, we could make further changes to the device configuration and save them (by setting the
telAdminStatusSaveConfig SNMP variable to 1). The SNMP variables have the following values:
- telAdminStatusConfirmConfig = 1 (test_cnfg_inactive)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• We restart the device, noting the test configuration is active. The SNMP variables show the following values:
- telAdminStatusConfirmConfig = 2 (test_cnfg_active)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
• Now we let the timer expire (1 minute) without confirming the test configuration. Or we can restore the previous
configuration by setting the telAdminStatusConfirmEnabled SNMP variable value to 0. In both cases, the device re-
starts with the previous configuration as the active configuration, and the SNMP variables show the following val-
ues:
- telAdminStatusConfirmConfig = 3 (configuration_recovered)
- telAdminStatusConfirmEnabled = 1 (enable)
- telAdminStatusTimeoutConfirm = 60
2.4.8 COPY
Allows you to copy the configuration from running-config (P5) to config (P4). The device asks for confirmation if the
config configuration (P4) has been modified.
Syntax:
Config>copy ?
config-file Copy a config. file to Config.
running-config Copies Running Config
Command history:
Release Modification
11.00.04 This command option was introduced as of version 11.00.04.
Allows you to apply a configuration file (previously saved to flash) to config (P4).
Syntax:
Example:
Syntax:
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06.
2.4.9 DESCRIPTION
Adds descriptive texts about the device configuration. This description is displayed on the screen when you run the
list configuration command.
Syntax:
Config>description <text>
• < text > is the configuration description text. If the text contains spaces, it must be enclosed in quotation marks
(e.g., description “description with spaces”).
Example:
Config>description Madrid_Branch_Outcoming_Router
2.4.10 DISABLE
Disables a specific customizable parameter. This command disables the behavior enabled by the enable patch
<parameter>. In order to use it, you need to know the name of the parameters enabled. To find out this information,
use the list patch command in the configuration console.
Syntax:
• < id > is the name of the parameter to disable. If we enter the default parameter name, ALL the active parameters
will be disabled.
Example:
2.4.11 DUMP-COMMAND-ERRORS
Displays a list of the first five erroneous commands entered in the configuration console since the log-com-
mand-errors command was used. This command is especially useful for detecting errors that occurred when loading
an entire configuration file to a device.
Syntax:
Config>dump-command-errors
Example:
Config>dump-command-errors
Warning: possible errors in the configuration, at least these found:
line 2 -> ast
line 4 -> dev eth1
line 5 -> dev ser134
line 6 -> conf 0
line 7 -> list interf eth1
(lines counting since last log-command-errors command)
Too many errors, some cannot be printed (printed 5 of 8)
Config>
2.4.12 ENABLE
Enables a specific customizable parameter. This command is used to modify the behavior of the router in certain cir-
cumstances. It is used when you need to manage custom versions. In order to use it, you need to know the name of
the available parameters (the customizable parameters relating to each router functionality are duly documented in
the manuals associated with those functionalities) and the possible values that they support. To enable a parameter,
you need to enter its name and the desired value.
Syntax:
Example:
To check which parameters are currently active on your device, use the list patch command. To disable an active
customizable parameter, use the disable patch command followed by the parameter name.
2.4.13 EVENT
Records events stored by the Event Logging System as configuration items. Type exit to return to the Config>
prompt.
Syntax:
Config>event
Example:
Config>event
-- ELS Config --
ELS Config>
To find out which commands are available from this prompt, please see Event Logging System ELS on page 186.
2.4.14 FEATURE
Defines additional router features, not associated with any default interface.
Syntax:
Syntax:
Config>feature aaa
Example:
Config>feature aaa
-- AAA user configuration --
AAA config>
For further information on how to set up the AAA feature, please see the following manual: Teldat Dm800-I AAA Fea-
ture.
Syntax:
Config>feature access-lists
Example:
Config>feature access-lists
-- Access Lists user configuration --
Access Lists config>
For further information on how to configure generic access lists, please see the following manual: Teldat Dm752-I
Access Control.
Syntax:
Config>feature act
Example:
Config>feature act
-- Alsa Custom Trap configuration --
ACT config>
For further information on how to configure the ACT feature, please see the following manual: Teldat Dm818-I ACT
Feature.
Syntax:
Config>feature afs
Example:
Config>feature afs
AFS config>
For further information on how to configure afs, please see the following manual: Teldat Dm786-I AFS .
Allows routers that support autoset-cfg to access the autoset-cfg configuration environment.
Syntax:
Config>feature autoset-cfg
Example:
Config>feature autoset-cfg
-- Autosetcfg Configuration --Autoset-cfg Config>?
For further information on how to configure autoset-cfg, please see the following manual: Teldat Dm797-I Dynamic
Configuration Control.
Syntax:
Config>feature bandwidth-reservation
Example:
Config>feature bandwidth-reservation
-- Bandwidth Reservation user configuration --
BRS Config>
For further information on how to configure bandwidth reservation, please see the following manual: Teldat Dm715-I
Bandwidth Reservation System.
Syntax:
Config>feature class-map
Example:
Config>feature class-map
-- Class-Map Menu Configuration --
Class-map Config>
For further information on how to configure class-map, please see the following manual: Teldat Dm795-I Policy Map
Class Map.
Accesses the control-access configuration environment for the Corporate Encryption System. This environment is
only accessible on devices with encryption cards.
Syntax:
Config>feature control-access
Example:
Config>feature control-access
CtrlAcc Config>
Accesses the CPE Wan Management Protocol configuration environment. For more information, please see the fol-
lowing manual: Teldat Dm826-I CPE Wan Management Protocol (CWMP) .
Syntax:
Config>feature cwmp
Example:
Config>feature control-access
-- CPE WAN Management Protocol configuration --
CWMP Config>
Command history:
Release Modification
11.01.02 The "cwmp" feature was introduced as of version 11.01.02.
Accesses the DNS configuration environment. For more information, please see the following manual: Teldat
Dm723-I DNS Client.
Syntax:
Config>feature dns
Example:
Config>feature dns
-- DNS resolver user configuration --
DNS config>
Syntax:
Config>feature dns-updater
Example:
Config>feature dns-updater
-- DNS UPDATER configuration --
DNS UPDATER config>
For further information on how to configure dns-updater, please see the following manual: Teldat Dm785-I DNS Up-
dater.
Syntax:
Config>feature echo-responder
Example:
Config>feature echo-responder
-- ECHO user configuration --
ECHO config>
For further information on how to configure the echo-responder, please see the following manual: Teldat Dm702-I
TCP IP.
Syntax:
Config>feature err-disable
Example:
Config>feature err-disable
-- Error Disable user configuration --
errdisable config>
When a DGe is attached to the device and a power failure occurs, the DGe sends a signal to the device. If the fea-
ture is enabled, the device reacts to that signal by generating a GW.075 event and initiating a system close. It then
reboots itself to go to a safe place to wait for the power supply to discharge completely.
A delay can be configured to wait between the generation of the GW.075 event and the system close and reboot.
Syntax:
Config>feature external-dying-gasp
Example:
Config>feature external-dying-gasp
-- External Dying Gasp Configuration --
Ext-dying-gasp Config>
Ext-dying-gasp Config> ?
delay Close device delay in seconds after a power failure
enable Enable external dying gasp feature
no Negate a command or set its defaults
update Update a level indicator
exit Exit to parent menu
The "delay" option allows you to set a delay, in seconds, from DGe signal detection to the close and reboot of the
device.
The "update level-indicator" option updates the level indicator <id> in the configured value <val>. The indicator in-
creases its <val> value during power-off. Updating can be canceled by running <no>. Level indicators are used as
entries in the NSLA functionality (please see manual Teldat Dm754-I Network Service Level Advisor ).
Command history:
Release Modification
11.01.08 The "feature external dying-gasp" command was introduced as of version
11.01.08.
11.01.14 The "delay" option was introduced as of version 11.01.14.
11.02.02 The "delay" option was introduced as of version 11.02.02.
11.01.14 The "update level-indicator" command was introduced as of version 11.01.14.
11.02.03 The "update level-indicator" command was introduced as of version 11.02.03.
Syntax:
Config>feature external-tcms
Example:
Config>feature external-tcms
-- External tcms Configuration --
Ext-tcms Config>
Ext-tcms Config> ?
enable Enable external tcms feature
no Negate a command or set its defaults
exit Exit to parent menu
When enabled, the ext-tcms configuration will provide two options: activate the line or set an inactive line. The ex-
ternal-tcms option is not enabled by default.
Please note that, when feature external-tcms is enabled, the console will no longer appear.
Example:
This configuration activates the line when a working ethernet is detected and disables the line configuration when an
ethernet is identified as down. For more information, please see the scripts section.
Command history:
Release Modification
11.01.08 The "feature external-tcms" command was introduced as of version 11.01.08
For more information, please see the following manual: Teldat Dm703-I Frame Relay .
Syntax:
Config>feature frame-relay-switch
Example:
Config>feature frame-relay-switch
-- Frame Relay Switch configuration --
Frame Relay Switch>
Allows devices that support gps-applications to access the gps-applications configuration environment.
Syntax:
Config>feature gps-applications
Example:
Config>feature gps-applications
-- GPS Applications Configuration --
GPS-Apps Cfg>
For further information on how to configure gps-applications, please see the following manual: Teldat Dm812-I GPS .
Accesses the HotSpot feature's configuration menu. For more information, please see the following manual: Dm820-I
HotSpot Feature.
Syntax:
Config>feature hotspot
Example:
Config>feature hotspot
-- Hotspot configuration --
HS config>
Command history:
Release Modification
11.00.03 The "Hotspot" feature was introduced as of version 11.00.03.
Accesses the router's http protocol configuration. This command (or functionality) is not available on all models.
Syntax:
Config>feature http
Example:
Config>feature http
-- HTTP user configuration --
HTTP config>
This environment can only be accessed by devices that support internal dying gasp.
When an internal dying gasp is present and a power failure occurs, the dying gasp system generates an internal sig-
nal. If the feature is enabled, the device reacts to that signal by generating a GW.075 event and initiating a system
close. It then reboots itself to go to a safe place to wait for the power supply to discharge completely.
A delay can be configured to wait between the generation of the GW.075 event and the system close and reboot.
Syntax:
Config>feature internal-dying-gasp
Example:
Config>feature internal-dying-gasp
-- Internal Dying Gasp Configuration --
Int-dying-gasp Config>
Int-dying-gasp Config>?
delay Close device delay in seconds after a power failure
disable Disable internal dying gasp feature
no Negate a command or set its defaults
exit Exit to parent menu
The "delay" option allows you to set a delay, in seconds, from power failure detection to the close and reboot of the
device.
The "disable" option disables power failure detection and, therefore, no dying gasp actions can be taken.
Command history:
Release Modification
11.01.14 The "feature internal dying-gasp" command was introduced as of version
11.01.14.
11.02.02 The "feature internal dying-gasp" command was introduced as of version
11.02.02.
Syntax:
Config>feature ip-discovery
Example:
Config>feature ip-discovery
-- Teldat IP Discovery Protocol configuration --
TIDP config>
Syntax:
Config>feature ipv6-access-list
Example:
Config>feature ipv6-access-list
-- IPv6 Access Lists user configuration --
IPV6 Access Lists config>
For further information on how to configure IPv6 access lists, please see the following manual: Teldat Dm808-I IPv6
Access Control.
Allows devices that support istud to access the istud configuration environment.
Syntax:
Config>feature istud
Example:
Config>feature istud
-- ISTUD configuration --
ISTUD config>
For further information on how to configure istud, please see the following manual: Teldat Dm784-I ISTUD Feature .
Syntax:
Config>feature key-chain
Example:
Config>feature key-chain
-- Key Chain user configuration --
Key-chain Config>
For further information on how to configure key-chain , please see the following manual: Teldat Dm792-I Key Man-
agement.
Syntax:
Config>feature ldap
Example:
Config>feature ldap
-- LDAP User Configuration --
LDAP config>
Syntax:
Config>feature mac-filtering
Example:
Config>feature mac-filtering
-- MAC Filtering user configuration --
Filter config>
Accesses the feature management configuration menu. This feature allows you to schedule tasks to run upon receipt
of an NSLA advisor (Network Service Level Advisor) or a system event notification. For more information about the
NSLA feature, please see the following manual: Teldat Dm754-I NSLA.
Syntax:
Config>feature management
Example:
Config>feature management
-- Management user configuration --
MGT config>
MGT config>?
no Negate a command or set its defaults
operation Configure an operation to be executed
script Configure a script to be executed
exit Exit to parent menu
An operation is defined as a task that must be performed when an advisor or system event notification is received. In
order to configure an operation, you must set up an advisor or system event notification.After doing so, the event or
advisor will be registered and you can check it's statistics from the monitor menu under feature management. Once
done, you can specify the task that you want to run and it's valid parameters. There is no order among the com-
mands, so you can first define the tasks and then the advisor or event. It will work either way, but only the operations
with a track advisor or event will be registered and printed in the monitor menu (as previously stated).
A script is a list of commands that can be executed in an operation after an advisor notification is received, after an
event occurs or once it is manually executed. The last option can be executed from the monitor menu under feature
management. Multiple scripts execute sequentially in the order in which they were triggered. This means that two
scripts cannot run at the same time.
Command history:
Release Modification
11.00.05 The event option was introduced as of version 11.00.05.
11.01.01 The event option was introduced as of version 11.01.01.
This command causes the device to reset when a notification is received from the advisor configured with the opera-
tion <id> track nsla-advisor <advisor id> command or from a system event configured with the operation <id>
track event <text> command.
Example:
Executes a list of commands configured on the system script (identified by <id_script>) and on an operation when a
notification is received from the advisor or the event configured. This is possible with the operation <id> track nsla-
advisor <advisor id> and operation <id> track event <text> command.
Example:
Command history:
Release Modification
11.00.05 Script execution and command script were introduced as of version 11.00.05.
11.01.00 Script execution and command script were introduced as of version 11.01.00.
Allows you to configure an event to be sent upon receipt of a notification from a configured advisor or from a system
event.
Example:
Thus, the event is sent when the advisor sends a notification to the operation:
Additional information:
To display the event, you need to enable SMGT subsystem events with INFO log level or above.
Command history:
Release Modification
11.00.05 The event option was introduced as of version 11.00.05.
11.01.01 The event option was introduced as of version 11.01.01.
Causes the MTC+ to reset with the corresponding id when it receives a notification from the advisor configured with
the operation <id> track nsla-advisor <advisor id> command and operation <id> track event <text> command.
Example:
Command history:
Release Modification
11.00.03 New command added.
This command is used when you want an operation to receive notifications from an NSLA advisor.
Example:
To stop the operation receiving notifications from said advisor, use the no operation <id> track command.
2.4.14.27.6 operation <id> track event <text> {filter <id> text <text>}
You use this command when you want an operation to detect an event occurrence. You can either specify the name
of the event to track (track all events with the specified name) or you can add filters to limit tracking to one or more
text strings. To apply the desired filters, you need to use the filter option. This option allows you to configure one or
more text filters. These text filters are applied as an OR operation.
Example:
To halt operation event tracking, use the no operation <id> track command .
Command history:
Release Modification
11.01.03 The track event command was introduced as of version 11.01.03.
Adds a unique name to an operation for monitoring purposes. If the name already exists elsewhere, a display error
will pop up.
Example:
Command history:
Release Modification
11.00.05 The name command was introduced as of version 11.00.05.
11.01.13 The name command was modified as of version 11.01.13.
11.01.00 The name command was introduced as of version 11.01.00.
11.02.02 The name command was modified as of version 11.02.02.
Sets a limit to the number of actions performed when an Event or NSLA advisor notification is received. For example:
if you receive 10 notifications from an advisor and the action to perform is to show a custom event, by setting the
number of triggers to 1 only one custom event will appear. As a result, in statistics, the count number will only in-
crease by 1.
Example:
Command history:
Release Modification
11.01.03 The number-of-triggers command was introduced as of version 11.01.03.
Allows you to add commands to a script that will be run in an operation when a notification is sent from the advisor or
when an event is registered in the system.
The first script command will execute from the GESTCON menu (i.e., the starting point that grants access to other
processes).
Example:
To remove the commands from the script, use the no script <id_script> command.
Note
Before designing your own script, please take the following considerations into account.
-The commands should be written as described in the manuals (i.e., literally). Using abbreviations for
the commands entered is not recommended. For example: instead of writing "fea ntp" to access the
NTP menu, enter "feature ntp". The use of abbreviations in this system can cause the script to behave
in an unpredictable fashion.
-To navigate between different menus or access the console management process ( GESTCON), you
must use the "root" command. This action is equivalent to executing the CTRL+P shortcut in the con-
sole.
-The confirmation question asked by certain commands can be bypassed by entering the "yes" option
at the end of the command (for instance, write 'script n commands "save yes"'). This speeds up script
execution.
Command history:
Release Modification
11.00.05 script <id_script> commands were introduced as of version 11.00.05.
11.01.00 script <id_script> commands were introduced as of version 11.01.00.
Example:
Command history:
Release Modification
11.01.13 operation <id> description command was introduced as of version 11.01.13.
11.02.02 operation <id> description command was introduced as of version 11.02.02.
Allows you to halt an operation (i.e., it stops the operation from performing a given task).
Example:
Command history:
Release Modification
11.01.13 operation <id> break command was introduced as of version 11.01.13.
11.02.02 operation <id> break command was introduced as of version 11.02.02.
Syntax:
Config>feature netflow
Example:
Config>feature netflow
NETFLOW config
For further information on how to configure netflow, please see the following manual: Teldat Dm789-I NETFLOW .
Accesses the NSLA ( Network Service Level Advisor ) configuration environment that provides functionalities for
monitoring the service level offered by the network (Service Level) and for generating notifications related to SLAs
(Service Level Agreements).
Syntax:
Config>feature nsla
Example:
Config>feature nsla
-- Feature Network Service Level Advisor --
NSLA config>
For further information, please see the following manual: Teldat Dm754-I NSLA (Network Service Level Advisor) .
Accesses the NSM (Network Service Monitor) system configuration environment that provides network service level
information by using different probes built into the router that can measure performance.
Syntax:
Config>feature nsm
Example:
Config>feature nsm
-- Network Service Monitor configuration --
NSM config>
For further information, please see the following manual: Teldat Dm749-I NSM manual.
Syntax:
Config>feature ntp
Example:
Config>feature ntp
-- NTP Protocol user configuration --
NTP config>
For further information, please see the following manual: Teldat Dm728-I NTP Protocol .
Syntax:
Config>feature policy-map
Example:
Config>feature policy-map
-- Policy-Map Menu Configuration --
Policy-map Config>
For further information on how to configure policy-map, please see the following manual: Teldat Dm795-I Policy Map
Class Map.
Syntax:
Config$feature power-switch
Example:
Config$feature power-switch
POWER-SWITCH$
For further information, please see the following manual: Teldat Dm689-I MTC+ .
Command history:
Release Modification
11.00.04 The "power-switch" feature was introduced as of version 11.00.04.
Syntax:
Config>feature prefix-lists
Example:
Config>feature prefix-lists
-- Prefix Lists user configuration --
Prefix Lists config>
For further information on how to configure prefix lists, please see the following manual: Teldat Dm780-I Prefix Lists .
Syntax:
Config>feature radius
Example:
Config>feature radius
-- RADIUS User Configuration --
RADIUS Config>
For further information on how to configure this protocol, please see the following manual: Teldat Dm733-I RADIUS
Protocol.
Syntax:
Config>feature rmon
Example:
Config>feature rmon
-- Remote Network Monitoring configuration --
RMON config>
For further information on how to configure rmon, please see the following manual: Teldat Dm796-I RMON Feature .
Syntax:
Config>feature route-map
Example:
Config>feature route-map
-- Route maps user configuration --
Route map config>
For further information on how to configure route map, please see the following manual: Teldat Dm745-I Policy Rout-
ing.
Syntax:
Config>feature scada-forwarder
Example:
Config>feature scada-forwarder
-- SCADA Forwarder Configuration --
SCADA-FWD Cfg>
Syntax:
Config>feature sniffer
Example:
Config>feature sniffer
-- SNIFFER configuration --
SNIFFER config>
Syntax:
Config>feature spi
Example:
Config>feature spi
-- SPI global configuration --
SPI Config>
For further information on how to configure spi, please see the following manual: Teldat Dm793-I SPI Agent .
Syntax:
Config>feature ssh
Example:
Config>feature ssh
-- SSH protocol configuration --
SSH Config>
For further information on how to configure ssh, please see the following manual: Teldat Dm787-I SSH Protocol .
Syntax:
Example:
For further information, please see the following manual: Teldat Dm769-I STUN Protocol.
Syntax:
Config>feature syslog
Example:
Config>feature syslog
-- SYSLOG client configuration --
SYSLOG config>
For further information, please see the following manual: Teldat Dm753-I Syslog Client .
Syntax:
Config>feature tftp
Example:
Config>feature tftp
-- TFTP user configuration --
TFTP config>
For further information on how to configure tftp, please see the following manual: Teldat Dm765-I TFTP Protocol .
Syntax:
Config>feature tms
Example:
Config>feature tms
TMS config>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. The TMS feature is no longer suppor-
ted.
Allows you to access the IEEE 802.1Q switch configuration environment to support the creation of virtual networks
(Virtual LAN).
Syntax:
Config>feature vlan
Example:
Config>feature vlan
-- VLAN configuration --
VLAN config>
For further information, please see the following manual: Teldat Dm751-I VLAN .
Accesses the vli configuration environment from devices that support it.
Syntax:
Config>feature vli
Example:
Config>feature vli
-- VLI configuration --
VLI config>
For further information on how to configure vli, please see the following manual: Teldat Dm803-I Virtual Linux Inter-
face (VLI).
Syntax:
Config>feature vrf
Example:
Config>feature vrf
-- VRF user configuration --
VRF config>
For more information, please see the following manual: Teldat Dm775-I VRF-Lite Facility.
Syntax:
Config>feature wnms
Example:
Config>feature wnms
For further information on how to configure WNMS, please see the following manual: Teldat Dm819-I Wireless Net-
work Management System .
Command history:
Release Modification
11.00.03 The "WNMS" feature was introduced as of version 11.00.03.
Syntax:
Config>feature wrr-backup-wan
Example:
Config>feature wrr-backup-wan
For further information on this configuration environment, please see the following manual: Teldat Dm727-I Backup
WAN Reroute .
Syntax:
Config>feature wrs-backup-wan
Example:
Config>feature wrs-backup-wan
-- WAN Back-up user configuration --
Back-up WAN>
For further information on how to configure WRS backup, please see the following manual: Teldat Dm711-I Frame
Relay ISDN Backup Configuration..
2.4.15 FILE
Accesses the files in the device's storage units.
The storage units are explicitly represented by a letter and the colon symbol (:). The flash memory unit is called A:
and the smart card unit is called S:. Not all devices support both storage units. For more details, please see your
device's installation manual.
One of the storage units is considered the active or default unit. To change the active storage unit, see the config-
media command in this manual. If you want to refer to the active unit, do not include any unit names.
The S: unit is a compressed unit whereby the information that is stored is compressed with the gzip algorithm. To
show this, the last letter is changed each time something is stored in the unit. For details on using this type of unit,
please see your device's installation manual.
Syntax:
• < operation > is the operation to be performed on the storage unit or file.
• [parameters] are the parameters required for the specified operation.
Allows you to copy files to the storage units. The source and destination files can be on the same unit or on different
ones. If they are from different units or they are not from the active unit, you have to specify the storage units. If both
files belong to the active unit, you do not have to specify the storage unit.
Syntax:
Example 1:
Example 2:
You can view the results of these two examples in the next section. Please note the MIKE11.CFG file appears as
MIKE11.CFZ to indicate it is a compressed file.
Allows you to create files in the storage unit. You can create files with ASCII or HEX content. Press CTRL+P to end
the file creation process.
Syntax:
• < destination file > is the name of the file you want to create.
• < input mode > is the type of input content used to create the specified file.
• the yes option can be used to automatically save the file in the system.
Example 1:
Config>
Example 2:
Config>
Use the list and type options to view the results of these examples and check whether the files have been correctly
created.
Command history:
Release Modification
11.00.04 This command option was introduced as of version 11.00.04.
11.01.06 The "[yes]" option was introduced as of version 11.01.06.
Allows you to delete files stored in the router's storage units. For security reasons, the file containing the device code
cannot be deleted.
Syntax:
• < filename > is the name of the file you want to delete.
Example 1:
Config>file list
Active Device: Flash
A: ROUTER.CFG 3510 12/09/02 12:45 Flash
A: TKR.CFG 1050 09/19/02 18:08 Flash
A: TEST.CFG 4708 04/26/02 15:33 Flash
A: SINTEST.CFG 4593 09/25/02 15:28 Flash
Example 2:
Allows you to format a storage unit on the device. At present, only the smart card can be formatted. Please note that
formatting a unit will erase all the files on the unit.
Syntax:
• < store unit > is the name of the storage unit you want to format. At present, only the smart card can be formatted.
Example:
Lists the files on the router's storage units. It also shows which unit is active. To change the active unit, see the con-
fig-media command in this manual.
Each line shows the following information: the unit identifier, filename, extension, byte size, date and time the unit
was created, and the name of the storage unit as a text. Finally, the amount of free space available on each unit is
shown.
Syntax:
Config>file list
Example:
Config>file list
Active Device: Flash
Keep in mind that the smart card is a slow storage unit and may take several seconds to respond.
Allows you to rename files in the device's storage units. If you want to rename a file, you need to specify the original
name first, followed by the new name. The unit indicated in the original name and the new name must match. For se-
curity reasons, the file containing the device code cannot be renamed.
Syntax:
• < filename > is the name of the file you want to rename.
• < new name > is the new name you want to give to the specified file.
Example 1:
Config>file list
Active Device: Flash
A: ROUTER.CFG 3510 12/09/02 12:45 Flash
A: TKR.CFG 1050 09/19/02 18:08 Flash
A: TEST.CFG 4708 04/26/02 15:33 Flash
A: SINTEST.CFG 4593 09/25/02 15:28 Flash
A: MIKE.CFG 1494 12/26/02 16:47 Flash
A: MIKE2.CFG 6302 12/13/02 10:09 Flash
A: XOT1.CFG 1494 12/26/02 14:33 Flash
A: XOT2.CFG 1494 12/27/02 12:27 Flash
A: XOT3.CFG 1554 12/26/02 13:18 Flash
A: APPCODE1.BIN 2760544 01/03/03 10:39 Flash
Example 2:
Example 3:
Displays the files stored in the device's storage units. Each non-printable character is replaced by a dot (.) in the dis-
play.
Syntax:
• header this option only shows the first few lines of the file.
• < filename > is the name of the file you want to view.
• hex dumps the file content byte by byte in hexadecimal mode, with its correspondence in text characters. Codes
that do not correspond to standard text characters appear as a dot (.) in the text correspondence.
• text displays the contents of the file in text mode. Non-standard characters are replaced by a dot (.) in the display.
Example 1:
Example 2:
internal-ip-address 172.24.78.116
;
address ethernet0/0 172.24.78.116 255.255.0.0
;
;
;
exit
;
;
protocol bgp
; -- Border Gateway Protocol user configuration --
enable
;
aggregate default 192.168.0.0 mask 255.255.0.0
aggregate default 10.0.0.0 mask 255.0.0.0
;
aggregate 10.0.0.0 mask 255.0.0.0 10.0.0.0 mask 255.0.0.0 refines
;
as 100
exit
;
dump-command-errors
end
; --- end ---
Config>
Example 3:
Config>
2.4.16 FIRMWARE-CHECKING
Enables the firmware integrity check. This command is used in conjunction with the backup-files command to en-
sure device availability in serious cases of file system corruption.
Note
Syntax:
Config> firmware-checking
Example:
Config>firmware-checking
Config>
2.4.17 FIXED-NUMBER-SNMP
This feature sets the persistence of bandwidth-reservation (BRS) interface and class indexes over time, regardless of
whether new interfaces/classes are added or existing ones deleted. With this new functionality, the order of inter-
faces and classes will match the order of creation (i.e., new interfaces and classes will be added at the end of their
corresponding lists, instead of being grouped according to their priority). The order of interfaces and classes will re-
main the same when saved, even after the device is restarted.
The physical interfaces activated by the router's license always appear first and in a fixed position.
Syntax:
Config>fixed-number-snmp
Example:
Config>fixed-number-snmp
-- Fixed configuration config>
For further information on how the fixed-number-snmp feature works, please see the following manuals: Teldat
Dm715-I Bandwidth Reservation System and Teldat Dm772-I Configuration Interface .
Command history:
Release Modification
11.01.08 The "fixed-number-snmp" command was introduced as of version 11.01.08.
11.01.09 The "fixed-number-snmp" command was modified as of version 11.01.09.
2.4.18 FORMAT
Formats the specified storage device.
Syntax:
Config>format <device>
• < device > is the name of the storage device to be formatted. At present, you can only format the smart card sys-
tem.
Example:
Config>format smartcard
2.4.19 GLOBAL-PROFILES
Defines router profiles (PPP, ATM, etc.).
Syntax:
• < profile name > is the ID of the profile type whose configuration menu you want to access.
Command history:
Release Modification
11.00.02 Options tcp-menu and trmtp-menu are obsolete as of version 11.00.02. The DEP pro-
tocol is no longer supported.
Syntax:
Config>global-profiles dial
Example:
Config>global-profiles dial
-- Dial Profiles Configuration --
Dial Profiles config>
This configuration environment is described in greater detail in the following manual: Teldat Dm732-I Dial Profile .
Syntax:
Config>global-profiles ppp
Example:
Config>global-profiles ppp
-- PPP Profiles Configuration --
PPP Profiles config>
This configuration environment is described in greater detail in the following manual: Teldat Dm710-I PPP Interface .
Accesses the DEP over TCP (Transport Control Protocol ) profile configuration environment for the encapsulation of
POS or Dataphone traffic in IP networks.
For further information on this configuration environment, please see the following manual: Teldat Dm263-I Forward-
er DEP.
Syntax:
Config>global-profiles tcp-menu
Example:
Config>global-profiles tcp-menu
-- UDAFO TCP Configuration Menu --
UDAFO TCP Cfg>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. The DEP protocol is no longer suppor-
ted.
Accesses the DEP over the TRMTP (Trivial Message Transfer Protocol) profile configuration environment for the en-
capsulation of POS or Dataphone traffic in IP networks.
For further information on this configuration environment, please see the following manual: Teldat Dm263-I Forward-
er DEP.
Syntax:
Config>global-profiles trmtp-menu
Example:
Config>global-profiles trmtp-menu
-- UDAFO TRMTP Configuration Menu --
UDAFO TRMTP Cfg>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. The DEP protocol is no longer suppor-
ted.
2.4.20 GUI
Accesses the GUI configuration menu.
The GUI is an interface intended to make the configuration of the device simpler and more intuitive. To access it,
connect to the device IP address through a web browser and enter your credentials.
Syntax:
Config>gui
-- GUI configuration --
GUI config>
Command history:
Release Modification
11.01.12.10.01 The "GUI" command was introduced as of version 11.01.12.10.01.
11.02.01.80.01 The "GUI" command was introduced as of version 11.02.01.80.01.
11.02.02 The "GUI" command was introduced as of version 11.02.02.
2.4.20.1 GW-LAN
Allows you to set an interface as a LAN gateway in the Interface Grouping functionality of the GUI.
Although this command is available in the console, it is mainly intended to be configured through the GUI.
Syntax:
GUI config>gw-lan ?
<interface> Interface name
GUI config>
• < interface > is the interface you want to select as lan gateway.
Example 1:
Command history:
Release Modification
11.01.12.10.01 The "GW-LAN" command was introduced as of version 11.01.12.10.01.
11.02.01.80.01 The "GW-LAN" command was introduced as of version 11.02.01.80.01.
11.02.02 The "GW-LAN" command was introduced as of version 11.02.02.
2.4.20.2 LAN
Allows you to set an interface as LAN in the Interface Grouping functionality of the GUI.
Although this command is available in the console, it is mainly intended to be configured through the GUI.
Syntax:
GUI config>lan ?
<interface> Interface name
GUI config>
Example 1:
Command history:
Release Modification
11.01.12.10.01 The "LAN" command was introduced as of version 11.01.12.10.01.
11.02.01.80.01 The "LAN" command was introduced as of version 11.02.01.80.01.
11.02.02 The "LAN" command was introduced as of version 11.02.02.
2.4.20.3 NO
Sets parameters back to their default values or deletes previously added configuration elements.
Syntax:
• < command > is the name of the command you want undone.
• [parameters] are the parameters required for the specified command.
Example:
2.4.20.4 VIEW-CONTROL
Access the View Control menu to configure the View Control system of the GUI.
The View Control system allows administrators to select which pages of the GUI will be available for users. To do so,
administrators must first create a View Control profile that includes all the pages allowed for users, and then assign
that profile to a user. When said user logs in the GUI, only the pages allowed in their profile will be visible.
Be aware that, for a user to be able to view a page, they must also have the required access level (configured when
the user is created).
Syntax:
GUI config>view-control
Command history:
Release Modification
11.01.14 The "VIEW-CONTROL" command was introduced as of version 11.01.14.
11.02.03 The "VIEW-CONTROL" command was introduced as of version 11.02.03.
2.4.20.4.1 CHANGE-NAME
Allows you to change the profile name without having to delete it and create it again.
Syntax:
Example 1:
Command history:
Release Modification
11.01.14 The "CHANGE-NAME" command was introduced as of version 11.01.14.
11.02.03 The "CHANGE-NAME" command was introduced as of version 11.02.03.
2.4.20.4.2 NO
Sets parameters back to their default values or deletes previously added configuration elements.
Syntax:
• < command > is the name of the command you want undone.
• [parameters] are the parameters required for the specified command.
Example:
2.4.20.4.3 PROFILE
Allows you to create a View Control profile. This profile is a list of pages which are visible for the user to whom this
profile is assigned.
Syntax:
• < profile name > is the name you want to give the profile.
Example 1:
Command history:
Release Modification
11.01.14 The "PROFILE" command was introduced as of version 11.01.14.
11.02.03 The "PROFILE" command was introduced as of version 11.02.03.
2.4.20.4.3.1 DEFAULT-PAGE
Allows you to configure a default page instead of the Dashboard. This is the page that will be presented after login. It
needs to be configured as visible under its corresponding section.
Setting this parameter is mandatory if the Dashboard is not configured as visible in the profile. Otherwise, the user
will be shown an empty page (as the Dashboard is not available for him).
Syntax:
Example 1:
Command history:
Release Modification
11.01.14 The "DEFAULT-PAGE" command was introduced as of version 11.01.14.
11.02.03 The "DEFAULT-PAGE" command was introduced as of version 11.02.03.
2.4.20.4.3.2 SECTION-STATUS
Accesses the configuration of visible pages in the "Status" section. Only configured pages are visible. If you don't
configure any page in this section, the entire section will be invisible.
Syntax:
Command history:
Release Modification
11.01.14 The "SECTION-STATUS" command was introduced as of version 11.01.14.
11.02.03 The "SECTION-STATUS" command was introduced as of version 11.02.03.
2.4.20.4.3.2.1 PAGE-VIEW
Configures a page from the "Status" section of the GUl as visible. Be careful with links within pages: If a page with a
link is configured here but the destination page for the link is not, the user will be presented with the default page
when clicking it.
Be aware that, for the page to be visible, it needs to be configured here and the user to whom this profile is assigned
needs to have the required access level.
Syntax:
Command history:
Release Modification
11.01.14 The "PAGE-VIEW" command was introduced as of version 11.01.14.
11.02.03 The "PAGE-VIEW" command was introduced as of version 11.02.03.
2.4.20.4.3.3 SECTION-CONFIGURATION
Accesses the configuration of visible pages in the "Configuration" section. Only the configured pages are visible. If
you don't configure any page in this section, the entire section will be invisible.
Syntax:
Command history:
Release Modification
11.01.14 The "SECTION-CONFIGURATION" command was introduced as of version 11.01.14.
11.02.03 The "SECTION-CONFIGURATION" command was introduced as of version 11.02.03.
2.4.20.4.3.3.1 PAGE-VIEW
Configures a page from the "Configuration" section of the GUI as visible. Be careful with links within pages: If a page
with a link is configured here but the destination page for the link is not, the user will be presented with the default
page when clicking it.
Be aware that, for the page to be visible, it needs to be configured here and the user to whom this profile is assigned
needs to have the required access level.
Syntax:
Command history:
Release Modification
11.01.14 The "PAGE-VIEW" command was introduced as of version 11.01.14.
11.02.03 The "PAGE-VIEW" command was introduced as of version 11.02.03.
2.4.20.4.3.4 SECTION-DIAGNOSTICS
Accesses the configuration of visible pages in the "Diagnostics" section. Only the configured pages are visible. If you
don't configure any page in this section, the entire section will be invisible.
Syntax:
Command history:
Release Modification
11.01.14 The "SECTION-DIAGNOSTICS" command was introduced as of version 11.01.14.
11.02.03 The "SECTION-DIAGNOSTICS" command was introduced as of version 11.02.03.
2.4.20.4.3.4.1 PAGE-VIEW
Configures a page from the "Diagnostics" section of the GUl as visible. Be careful with links within pages: If a page
with a link is configured here but the destination page for the link is not, the user will be presented with the default
page when clicking it.
Be aware that, for the page to be visible, it needs to be configured here and the user to whom this profile is assigned
needs to have the required access level.
Syntax:
Command history:
Release Modification
11.01.14 The "PAGE-VIEW" command was introduced as of version 11.01.14.
11.02.03 The "PAGE-VIEW" command was introduced as of version 11.02.03.
2.4.20.4.3.5 SECTION-NETWORK
Accesses the configuration of visible pages in the "Network" section. Only the configured pages are visible. If you
don't configure any page in this section, the entire section will be invisible
Syntax:
Command history:
Release Modification
11.01.14 The "SECTION-NETWORK" command was introduced as of version 11.01.14.
11.02.03 The "SECTION-NETWORK" command was introduced as of version 11.02.03.
2.4.20.4.3.5.1 PAGE-VIEW
Configures a page from the "Network" section of the GUl as visible. Be careful with links within pages: If a page with
a link is configured here but the destination page for the link is not, the user will be presented with the default page
when clicking it.
Be aware that, for the page to be visible, it needs to be configured here and the user to whom this profile is assigned
needs to have the required access level.
Syntax:
Command history:
Release Modification
11.01.14 The "PAGE-VIEW" command was introduced as of version 11.01.14.
11.02.03 The "PAGE-VIEW" command was introduced as of version 11.02.03.
2.4.20.4.3.6 SECTION-ADMINISTRATION
Accesses the configuration of visible pages in the "Administration" section. Only the configured pages are visible. If
you don't configure any page in this section, the entire section will be invisible
Syntax:
Command history:
Release Modification
11.01.14 The "SECTION-ADMINISTRATION" command was introduced as of version 11.01.14.
11.02.03 The "SECTION-ADMINISTRATION" command was introduced as of version 11.02.03.
2.4.20.4.3.6.1 PAGE-VIEW
Configures a page from the "Administration" section of the GUl as visible. Be careful with links within pages: If a page
with a link is configured here but the destination page for the link is not, the user will be presented with the default
page when clicking it.
Be aware that, for the page to be visible, it needs to be configured here and the user to whom this profile is assigned
needs to have the required access level.
Syntax:
Command history:
Release Modification
11.01.14 The "PAGE-VIEW" command was introduced as of version 11.01.14.
11.02.03 The "PAGE-VIEW" command was introduced as of version 11.02.03.
2.4.20.4.4 USER
Assigns a profile to a user. The profile must have been previously created.
Syntax:
• < user name > is the name of the user to whom you want to limit page visibility.
• < profile name > is the name of the profile that controls which pages are visible.
Example 1:
Command history:
Release Modification
11.01.14 The "USER" command was introduced as of version 11.01.14.
11.02.03 The "USER" command was introduced as of version 11.02.03.
2.4.20.5 WAN
Allows you to set an interface as WAN in the Interface Grouping functionality of the GUI.
Although this command is available in the console, it is mainly intended to be configured through the GUI.
Syntax:
GUI config>wan ?
<interface> Interface name
GUI config>
Example 1:
Command history:
Release Modification
11.01.12.10.01 The "WAN" command was introduced as of version 11.01.12.10.01.
11.02.01.80.01 The "WAN" was introduced as of version 11.02.01.80.01.
11.02.02 The "WAN" command was introduced as of version 11.02.02.
2.4.21 LICENCE-CHANGE
Allows you to change the device license in order to enable/disable certain features. You need a special license to be
able to use this command. After you have selected the language that will be used when interacting with the device,
the current license appears. Once the type of installation performed has been specified, you must decide whether to
enable each of the available functionalities in this new license. Once you have finished doing this, you are asked
whether you want to save the changes. If you do, you are asked whether you want to restart the device immediately.
If you prefer to perform this operation later, the changes will not be effective until the reboot takes place.
Syntax:
Config>licence-change
Example:
Config>licence-change
1. English
2. Español
Language/Idioma[1]? 1
FUNCTIONALITY ENABLED
-------------- ----------
ISDN NO
IPSEC YES
SNA YES
VOIP NO
Please indicate here if you are installing the router to carry out one of the fol
lowing tasks:
R. Register for the first time
M. Maintenance to resolve an event
Please select an option > m
Enable ISDN (Yes/No)[Y]?y
Enable IPSEC (Yes/No)[Y]?y
Enable SNA (Yes/No)[Y]?y
Enable VOIP (Yes/No)[Y]?y
Enable NOE (Yes/No)[Y]?n
2.4.22 LIST
Displays configuration information on the active storage unit (flash or smart card), protocols, interfaces, users, pools
and enabled patches.
Syntax:
Config>list <info>
configuration List generic configuration information
devices List router devices
patch Check the personalized parameters that are active
• < info > is the identifier of the information you want listed.
Command history:
Release Modification
11.00.06 The pool option is obsolete as of version 11.00.06.
11.01.01 The pool option is obsolete as of version 11.01.01.
Syntax:
Config>list configuration
Example:
Syntax:
Config>list devices
Example:
Config>list devices
Interface Connector Type of interface
ethernet0/0 GE0/FE0/LAN1 Fast Ethernet interface
ethernet0/1 GE1/FE1/LAN2 Fast Ethernet interface
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
Config>
Syntax:
Config>list patch
Example:
Config>list patch
Patch Name value
-----------------------------------------
ARPI_SND_LCL 1 (0x1)
Config>
Shows the number of bytes assigned to each memory pool as well as the number of free bytes.
Syntax:
Config>list pool
Example:
Config>list pool
3 Iorbs pool: 4194304
4 MSGs pool: 1204000
Total memory pools: 5398304 Total free memory: 0
Config>
Command history:
Release Modification
11.00.06 The "list pool" command is obsolete as of version 11.00.06.
11.01.01 The "list pool" command is obsolete as of version 11.01.01.
Displays the list of registered users, their password, access level, mode of access and whether or not they are en-
abled.
Syntax:
Config>list user
Example:
Config>list user
Name Password Access Level Strict Enabled
config **************** [10]Config N N
monitor **************** [ 5]Monitor N Y
root **************** [15]Root N Y
mabm **************** [15]Root N Y
guest **************** [ 2] Y Y
viewer **************** [ 1]Events N Y
Config>
2.4.23 LOG-COMMAND-ERROR
Initializes (clears) the error log holding the errors that have occurred when running commands from the configuration
console.
Syntax:
Config>log-command-errors
Example:
Config>log-command-errors
Config>
This command is usually used before loading a new configuration file because you can follow it with the dump-
command-errors command to view any possible errors.
2.4.24 MANAGEMENT
Enters the master router configuration environment.
Syntax:
Config>management
Example:
Config>management
-- Routers management user configuration --
Management config>
2.4.25 MULTICPU
Configures multi-CPU options in devices with multi-CPU capability.
The multi-CPU capability allows the device to process data packets in parallel over multiple CPUs, improving device
performance.
Syntax:
Config>multicpu ?
disable Disable Multicpu processing
<cr>
Config>
Example:
Config>muticpu
Config>
Execute the multicpu command with no options to enable the multi-CPU feature in devices with multi-CPU capabil-
ity.
Command History:
Release Modification
11.02.01.20.01 This command was introduced as of version 11.02.01.20.1.
11.02.02 This command was introduced as of version 11.02.02.
Syntax:
Config>rush-engine fragmentation-control ?
disable Disable fragmentation control support
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
2.4.26 NETWORK
Allows you to access the command menu to configure a specific interface. To exit this menu, type exit.
Syntax:
Config>network <name>
You can find out which interfaces are available on the device by typing list devices.
Example 1:
Config>network ethernet0/0
-- Ethernet Interface User Configuration --
ethernet0/0 config>
Example 2:
Config>network serial0/4
CLI Error: Unrecognized command or invalid value
Config>
For more information on interfaces, please see the Teldat Dm722-I Telephony Over IP manual and the manual asso-
ciated with the network interface whose configuration environment you want to access.
2.4.27 NO
Sets parameters back to their default values, disables options or deletes previously added configuration elements.
Syntax:
• < command > is the name of the command you want undone.
• [parameters] are the parameters required for the specified command.
Deletes the specified virtual interface. (For an alternative means of deleting an interface, please see no device).
Syntax:
• < virtual interface type> is the virtual interface you want deleted.
• [options] The options depend on the type of virtual interface you are going to delete. They are the same as those
used to create the interface with the add device command.
Example:
Release Modification
11.01.00 The new command was introduced as of version 11.01.00.
2.4.27.2 NO AUTOINSTALL
Syntax:
Config>no autoinstall
Example:
Config>no autoinstall
Config>
Release Modification
11.00.03 This command is obsolete as of version 11.00.03.
2.4.27.3 NO BANNER
Syntax:
< type > specifies the type of banner to be deleted. Currently, the only type available is the access (login) banner.
Example:
2.4.27.4 NO CONFIGURATION
Syntax:
Config>no configuration
Example:
Config>no configuration
Config>
2.4.27.5 NO CONFIRM-CFG
Rejects the current test configuration, thus causing the device to restart with the previous configuration following a
warning message. For more information, see the confirm-cfg-needed and confirm-cfg commands.
Syntax:
Config>no confirm-cfg
Example:
Config>no confirm-cfg
!!!!LOOK OUT!!!!
This command reboots the system
If you go on, previous configuration will be restored
You can test this configuration again with: set file-cfg TEMP
To go on write RECOVER: RECOVER
You can also perform this action via SNMP. See CONFIRM-CFG-NEEDED on page 36.
2.4.27.6 NO CONFIRM-CFG-NEEDED
Syntax:
Config>no confirm-cfg-needed
Example:
Config>no confirm-cfg-needed
Config>
You can also perform this action via SNMP. See CONFIRM-CFG-NEEDED on page 36.
2.4.27.7 NO CONTACT-PERSON
Deletes the contact name/ID. For more information, see the set-contact-person command.
Syntax:
Config>no contact-person
Example:
Config>no contact-person
Config>
2.4.27.8 NO CRYPTO
Syntax:
Config>no crypto ?
Note
Command History:
Release Modification
11.01.09.90.01 This option was introduced in version 11.01.09.90.01.
11.01.13 This option was introduced as of version 11.01.13.
11.02.02 This option was introduced as of version 11.02.02.
Disables the running of cryptography and software integrity self-tests in the selected mode.
Syntax:
Command History:
Release Modification
11.01.09.90.01 This option was introduced in version 11.01.09.90.01.
11.01.13 This option was introduced as of version 11.01.13.
11.02.02 This option was introduced as of version 11.02.02.
Syntax:
Example:
Command History:
Release Modification
11.01.09.90.01 This option was introduced in version 11.01.09.90.01.
11.01.13 This option was introduced as of version 11.01.13.
11.02.02 This option was introduced as of version 11.02.02.
2.4.27.9 NO DESCRIPTION
Clears the device configuration description(s). For more information, see the description command.
Syntax:
Config>no description
Example:
Config>no description
Config>
2.4.27.10 NO DEVICE
Deletes the specified virtual interface. See the no add device command for an alternative way to delete an interface.
Syntax:
Example:
2.4.27.11 NO FIRMWARE-CHECKING
Syntax:
Config>no firmware-checking
Example:
Config>no firmware-checking
Config>
2.4.27.12 NO HOST-LOCATION
Deletes the text indicating the device's location. For more information, see the set-host-location command.
Syntax:
Config>no host-location
Example:
Config>no host-location
Config>
2.4.27.13 NO HOSTNAME
Deletes the assigned device name. For more information, see the set hostname command.
Syntax:
Config>no hostname
Example:
Config>no hostname
Config>
2.4.27.14 NO LOGIN
Disables the login options configured using the set login command.
Syntax:
• <option> is the login option to disable. Currently, only the case-sensitive option (which is used to disable case
checking) is supported.
Example:
2.4.27.14.1 LAST-LOGIN
Disables the last login option configured by using the set login last login option.
Syntax:
Example:
2.4.27.15 NO MULTICPU
The multi-CPU capability allows the device to process data packets in parallel over multiple CPUs, improving device
performance.
Syntax:
Config>no multicpu ?
<cr> Disable Multicpu processing
Config>
Example:
Config>no multicpu
Config>
Command History:
Release Modification
11.02.01.20.01 This command was introduced as of version 11.02.01.20.1.
11.02.02 This command was introduced as of version 11.02.02.
2.4.27.16 NO PASSWORD
Deletes the device's password settings. For more information, see the set password command.
Syntax:
Config>no password
Example:
Config>no password
Config>
2.4.27.17 NO PRIVILEGE
Syntax:
Example:
Config>no privilege 3
Config>
2.4.27.18 NO RUSH-ENGINE
Disables Rush Engine or restores the default configuration for Rush Engine options.
Syntax:
Config>no rush-engine ?
timeout Sets the default Rush Engine idle flows timeout in seconds
fragmentation-control Fragmentation control options
offload Offloading options
<cr> Disable Rush Engine
Example:
Command history:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
Sets the default Rush Engine idle flows timeout, which is 5 seconds.
Syntax:
Command History:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
Syntax:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Enables fragmentation control support in the Rush Engine. The fragmentation control feature allows the Rush En-
gine to accelerate IP fragments.
Syntax:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Sets the default Rush Engine offloading options. This command is only available on devices with offloading capabil-
ity.
Syntax:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Syntax:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Disables the functional and configuration restrictions imposed by the selected certification.
Syntax:
Note
Command History:
Release Modification
11.01.09.90.01 This option was introduced in version 11.01.09.90.01.
11.01.13 This option was introduced as of version 11.01.13.
11.02.02 This option was introduced as of version 11.02.02.
Disables the functional and configuration restrictions imposed by the LINCE certification. It is important to note that, if
the device is operating in LINCE mode, the configuration must be saved and the device rebooted to completely dis-
able the restrictions.
Syntax:
Example:
Command History:
Release Modification
11.01.09.90.01 This option was introduced in version 11.01.09.90.01.
11.01.13 This option was introduced as of version 11.01.13.
11.02.02 This option was introduced as of version 11.02.02.
2.4.27.20 NO STRONG-PASSWORD
Disables the level of strength of a password. Disables the temporal restriction to change passwords and enables the
password command to change a password.
Syntax:
Config>no strong-password ?
no-reuse Disable reusing passwords
<cr>
Example:
Config>no strong-password
Config>
Note
Please note that the execution of no strong-password will only disable a password's strength level.
The no strong-password no-reuse command must be used to disable password temporal restrictions.
Disables the temporal restriction to change passwords and enables the password command to change a password.
Syntax:
Example:
Config>no strong-password
Config>
Command history:
Release Modification
11.01.11 This command was introduced as of version 11.01.11.
2.4.27.21 NO TIME
Negates a command within the time configuration environment or sets its defaults.
Syntax:
• < option > specifies the selected option. The available options are summer-time, timezone and full-numer-
ic-year.
Command history:
Release Modification
11.01.12 This command was modified as of version 11.01.12.
Syntax:
Syntax:
Example:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
time summer-time recurring 1 mon jan 03:00 1 mon dec 03:00
time summer-time zone-name "CET"
;
dump-command-errors
end
Config>no time summer-time zone-name
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
Deletes all the summer time settings, including the start and end dates and times and the time zone.
Syntax:
Example:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
time summer-time recurring 1 mon jan 03:00 1 mon dec 03:00
time summer-time zone-name "CET"
;
dump-command-errors
end
Config>no time summer-time
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
dump-command-errors
end
Config>
2.4.27.22 NO USER
Deletes a user from the user list. You can delete as many users as you want, but not the last root user if there are
still some users registered in the system. In this case, you can only delete the rest of the registered users (were you
to delete the last root user without removing the remaining registered users, then you wouldn't be able to manage
those users). You can delete the last root user once you have removed all the registered users. Then the system
would no longer request a username and password to access the device because there would be no users left in the
system.
Syntax:
Example:
2.4.28 NODE
Allows you to access node configuration (X.25, XOT and 270). You can also gain access by typing the network com-
mand followed by the interface on which the node is configured.
Syntax:
Config>node <name>
270 Access the 270 configuration
x25 Access the X25 node configuration
xot Access the XOT configuration
• < name > is the name of the node whose configuration menu you want to access.
Syntax:
Config>node 270
Example:
Config>node 270
270 Config>
Syntax:
Config>node x25
Example:
Config>node x25
X25 Config>
For more information on the X.25 node configuration environment, please see the following manual: Teldat Dm707-I
X.25.
Syntax:
Config>node xot
Example:
Config>node xot
XOT config>
For more information on the XOT node configuration environment, please see the following manual: Teldat Dm713-I
XOT Protocol.
2.4.29 PRIVILEGE
Allows you to define custom execute permissions for the device's process commands.
Syntax:
• < level > is the access level to assign to the command specified in < command path>.
• < command path> is the command path.
• < all > is an option that lets you apply the specified access level to all subcommands (paths match) of the com-
mand specified in <command path>.
The <level> parameter, which specifies the level of access to be assigned to the command, allows values in the
range of 0-15.
The <command path> parameter specifies the specific path of the command whose access level we want to cus-
tomize. It is built by typing the commands necessary to execute the command consecutively one after another and
separated by a >.
It must be enclosed in double quotation marks (“) and its syntax must conform to the following standards:
1) As a general rule, to define an access level for a specific command, the path identifying it must start with a >.
Example:
To assign an access level to a command regardless of the current menu, we will have to omit the > character and not
use it within the path.
Example:
Config$privilege 7 "list"
Config$privilege 7 "ppp>ipcp"
CLI Error: Wrong specification of command path (misuse of >)
CLI Error: Command error
Config$
The >config path refers to both static and dynamic configuration. Adding different permissions to the same com-
mand will depend on whether the user is configuring the device statically or dynamically.
2) When specifying the command path, the greater-than character ( >) is used as a separator between the various
device process levels and menus.
Example:
3) While defining the command path, you can use an asterisk (*) as a wildcard parameter.
Example:
This would assign level 5 access to the list command on any net configuration menu (net ppp1, net ppp2, net fr1,
etc.).
You can run the show configuration command to help you find out the full path of a device parameter configuration
command.
Example:
Config>show config
; Showing System Configuration for access-level 15 ...
log-command-errors
no configuration
set inactivity-timer disabled
add device ppp 1
set data-link sync serial0/0
set data-link x25 serial0/1
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
ip address 172.24.73.23 255.255.0.0
;
;
;
;
exit
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
exit
;
;
network ppp1
; -- Generic PPP User Configuration --
ip address 1.1.1.1 255.255.255.0
;
;
;
;
ppp
; -- PPP Configuration --
ipcp remote address fixed 1.1.1.2
exit
;
base-interface
; -- Base Interface Configuration --
base-interface serial0/0 link
;
exit
;
exit
;
;
;
dump-command-errors
end
; --- end ---
Config>
If, for example, you want to grant level 12 access to the assignment of a base interface to the ppp1 net ( base-in-
terface serial0/0 link command), you need to use the following path: ">config>network
ppp1>base-interface>base-interface serial0/0 link“
The <all> option allows you to apply the specified level to all subcommands specified in <command path>. That is,
to all those commands whose path matches from the start (allowing for wildcards).
Example:
This configuration applies the access level to all commands whose path begins with ">network", such as ">con-
fig>network ppp1" or ">network ppp2>ppp".
If you do not specify this option, the access level only applies to the command defined by the path, that is, to the one
whose execution ends with a carriage return <CR>. So, for example, if we have the following configuration (without
the all option):
Config>privilege 12 “>config>confirm-cfg”
Config>privilege 12 “>config>protocol *>no *"
Config>
And we access as a level 10 user and try to run the following commands:
Config>confirm-cfg
CLI Error: Incomplete command
Config>protocol ip
-- Internet protocol user configuration --
IP config>no description
CLI Error: Command error
IP config>
We get an execution error because these commands require level 12 access. If, however, we run:
Config>confirm-cfg-needed default
Config>protocol ip
-- Internet protocol user configuration --
IP config>no aggregation-route 192.168.0.0 255.255.0.0
IP config>
We don't get an error this time because the all option is not configured. The change of access level does not affect
these commands, which have level 10 access by default.
The systems lets you define multiple access levels for the same command, and you have the option of creating two
user types: default and strict (see the user command). If this situation occurs and you access the system using a de-
fault user (not strict), the command acquires the highest access level.
Let's take a look at how to use command execute permissions to define a user who is only allowed to configure para-
meters related to the device's IP telephony functionality. Two users are defined: one with root privileges and the oth-
er with level 7 access, monitoring privileges and other privileges configured with the privilege command.
The VoIP user is allowed to access all the VoIP voice interfaces, the telephony menu, the sip and h323 protocols;
configure access list 50 to use it in telephony; configure two NSM operations, two filters, alarms and NSLA ad-
visors, and one global-profiles dial profile called VoIP to apply on an ISDN voice interface; exit any menu using the
exit command; and save the configuration. This way, the user has complete control over the device's IP telephony
configuration, but cannot alter any routing parameter values nor restart the device.
; -- Privilege Configuration –
privilege 7 ">config>feature access-list>access-list 50" all
privilege 7 ">config>feature access-list>access-list 51" all
privilege 7 ">config>feature access-list>no access-list 50" all
privilege 7 ">config>feature access-list>no access-list 51" all
privilege 7 ">config>feature nsla>advisor 10" all
privilege 7 ">config>feature nsla>advisor 11" all
privilege 7 ">config>feature nsla>alarm 10" all
privilege 7 ">config>feature nsla>alarm 11" all
privilege 7 ">config>feature nsla>filter 10" all
privilege 7 ">config>feature nsla>filter 11" all
privilege 7 ">config>feature nsla>no advisor 10" all
privilege 7 ">config>feature nsla>no advisor 11" all
privilege 7 ">config>feature nsla>no alarm 10" all
privilege 7 ">config>feature nsla>no alarm 11" all
privilege 7 ">config>feature nsla>no filter 10" all
privilege 7 ">config>feature nsla>no filter 11" all
privilege 7 ">config>feature nsm>no operation 10" all
privilege 7 ">config>feature nsm>no operation 11" all
privilege 7 ">config>feature nsm>operation 10" all
privilege 7 ">config>feature nsm>operation 11" all
privilege 7 ">config>global-profiles dial>no profile voip" all
privilege 7 ">config>global-profiles dial>profile voip" all
privilege 7 ">config>network voip" all
privilege 7 ">config>protocol h323" all
privilege 7 ">config>protocol sip" all
privilege 7 ">config>save" all
privilege 7 ">config>telephony" all
privilege 7 "exit"
;
;
user root hash-password A44AD55CE197114B241EE3DDEBB04660
;
user voip hash-password 7A325D20A3B026A12D094C61DB21D880
user voip access-level 7
;
event
; -- ELS Config --
enable syslog subsystem CNSL ALL
console
; -- Console Events Configuration --
log source-ip
log prompt
exit
;
exit
;
feature syslog
You also configure events to be sent to a syslog server each time a command is executed, thus giving you a record
of all the commands executed by each user. The IP of the device that sends the event and the complete command
execution prompt are included in the event. As you can see below, the event also includes the user who executes
the command and the remote IP address or local console he connected from.
2.4.30 PROTOCOL
Accesses a protocol's configuration environment. You enter the desired protocol configuration by typing the protocol
name after the command. The number of protocols available will depend on the device you have and its application
license.
Config>protocol ?
arp Access ARP protocol
asrt Access ASRT protocol
bfd Access BFD protocol
bgp Access BGP protocol
dhcp Access DHCP protocol
dhcpv6 Access DHCPv6 protocol
dls Access DLS protocol
dot1x Access 802.1X protocol
gw104 Access GW-104 protocol
h323 Access H323 protocol
igmp Access IGMP protocol
ip Access IP protocol
ipv6 Access IPv6 protocol
l2tp Access L2TP protocol
mgcp Access MGCP protocol
msdp Access MSDP protocol
nhrp Access NHRP protocol
noe Access NOE protocol
ospf Access OSPF protocol
ospfv3 Access OSPFv3 protocol
pim Access PIM protocol
rip Access RIP protocol
ripng Access RIPNG protocol
sccp Access SCCP protocol
sip Access SIP protocol
snmp Access SNMP protocol
Config>protocol
(2) Type protocol followed by the name of the protocol to be configured. The prompt of the specified protocol ap-
pears. From this prompt, you can enter configuration commands that are specific to that protocol.
Example:
Config>protocol arp
-- ARP user configuration --
ARP config>
ARP config>exit
Config>
Syntax:
Config>protocol <name>
• <name> is the name of the protocol whose configuration menu we want to access.
Example:
Config>protocol ip
-- Internet protocol user configuration --
IP config>
For more information, please see the following manual: Teldat Dm211-I Quick Menu
Example:
Config>quick-configuration
-- Quick Configuration Menu --
Quick config>
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. Quick Menu setup is no longer suppor-
ted.
2.4.32 RUSH-ENGINE
Configures Rush Engine parameters.
Rush Engine is a traffic flow accelerator that optimizes routing performance by learning existing flows and uses a
cache for packets received from each flow.
When existing traffic is used to learn a flow, the latter is stored in the cache while the traffic persists. After a pre-
defined time of traffic inactivity (idle flow timeout), the flow is removed from the cache.
Syntax:
Config>rush-engine ?
disable Disable Rush Engine
fragmentation-control Fragmentation control options
timeout Rush Engine idle flows timeout in seconds
offload Offloading options
<cr>
Config>
Command history:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
Syntax:
Config>rush-engine disable ?
<cr>
Command History:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
Configures the Rush Engine options for fragmentation control. The fragmentation control feature allows the Rush
Engine to accelerate IP fragments.
Syntax:
Config>rush-engine fragmentation-control ?
disable Disable fragmentation control support
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Disables fragmentation control support in the Rush Engine. When the fragmentation control feature is disabled, the
Rush Engine no longer accelerates IP fragments.
Syntax:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Sets the inactivity timeout period (in seconds) for established flows. Default is 5. Valid values range from 1 to 3600
seconds.
Syntax:
Config>rush-engine timeout ?
<1..3600> Value in the specified range
Command History:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
Configures the Rush Engine offloading options. This option is only available on devices with offloading capability.
Currently, only bridge flows can be offloaded.
Syntax:
Config>rush-engine offload ?
disable Disable offloading capability
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Syntax:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
2.4.33 SAVE
Saves the configuration to the active storage unit. The active storage unit is configured using the config-media com-
mand.
Before the configuration is saved, and as long as the command has no accompanying parameters that indicate oth-
erwise, the device asks the user to confirm the operation. If the user confirms the operation, the device selects the
chosen media and then informs the user of the result of the operation. If the active unit comprises two media types,
the configuration is saved to both and this is then indicated in the final message. Please refer to the config-media
command in this manual and your device's installation manual for more information.
If the configuration confirmation requirement has been enabled, the configuration is saved in a temporary file
(TEMP.CFG ) awaiting confirmation. If it is confirmed (confirm-cfg), it is saved again, but this time under the corres-
ponding name. If the save command is used in a test configuration, the configuration is saved to the TEMP.CFG file
again without modifying the old configuration (that will be restored if the temporary configuration is not confirmed).
The timer is not cleared, so once the test time has elapsed, if the device has not been restarted, the old configuration
is restored. For more information, see the confirm-cfg and confirm-cfg-needed commands.
When using the save command, it is very important to keep in mind what configuration you are saving. There are two
configurations on the device at all times. These match when the device powers on and continue to match until the
user modifies one of them. One of the configurations is accessible from the RUNNING-CONFIG (Config$) process
and is the one that is being used at all times. The other configuration is accessible from the CONFIG (Config>) pro-
cess and is for editing purposes only.
So, if we run the save command from the RUNNING-CONFIG process, we will save the configuration that was being
used at the time of saving. However, by using the save command in the CONFIG process, we will save the configur-
ation that we edited in that process. Thus, you have to be extremely careful when modifying and saving configura-
tions, especially when there are multiple users managing the device.
Syntax:
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
• < file-name > is the the name of the file in which to save the configuration. If no name is entered, the device will
use the active configuration filename (see set file-cfg).
Example 1:
Config>save
Save configuration (Yes/No)? y
Building configuration as text... OK
Writing configuration... OK on Flash
Config>
Example 2:
2.4.34 SET
Allows you to configure some general system parameters.
Syntax:
Config>set <parameter>
4-digits-format Sets the year format to 4 digits
application-active Permits you to select the code used to boot the router
configuration-mode Configures the device according to a Certification
Command History:
Release Modification
11.00.06 The pool option is obsolete.
11.01.01 The pool option is obsolete.
11.01.07 The low-power-timer option was introduced as of version 11.01.07.
11.01.09.90.01 The configuration-mode option was introduced in version 11.01.09.90.01.
11.01.13 The configuration-mode option was introduced as of version 11.01.13.
11.02.02 The configuration-mode option was introduced as of version 11.02.02.
11.01.09.90.01 The crypto option was introduced in version 11.01.09.90.01.
11.01.13 The crypto option was introduced as of version 11.01.13.
11.02.02 The crypto option was introduced as of version 11.02.02.
Allows you to choose which code the router will boot up with.
Syntax:
• < code file > is the name of the code file we want the device to use at boot up. If this field is left empty, the avail-
able code files are displayed.
Example:
Syntax:
Config>set configuration-mode ?
lince Configure in accordance with the Lince Certification
Note
Command History:
Release Modification
11.01.09.90.01 The configuration-mode option was introduced in version 11.01.09.90.01.
11.01.13 The configuration-mode option was introduced as of version 11.01.13.
Release Modification
11.02.02 The configuration-mode option was introduced as of version 11.02.02.
Preconfigures the device to operate under the restrictions imposed by the LINCE Certification. It is important to note
that, during the pre-configuration process, any parts of the current device configuration that are not compatible with
the LINCE requirements will be removed or changed. To finish activating the LINCE mode, the configuration must be
saved and the device rebooted.
Once the device has been pre-configured, modifying the configuration is allowed (provided no LINCE requirements
are breached).
When a device is operating under LINCE mode, access to it must be protected. Depending on the device and ver-
sion, the configuration can be saved (or not) without having to create users. In the event this is allowed, user admin
with password admin1234 will be enabled to access the device.
Syntax:
Example:
For more information about the configuration of your device in LINCE mode and its restrictions, check the public part
of the CCN-CERT portal to learn how to use your device safely.
Command History:
Release Modification
11.01.09.90.01 The lince option was introduced in version 11.01.09.90.01.
11.01.13 The lince option was introduced as of version 11.01.13.
11.02.02 The lince option was introduced as of version 11.02.02.
Syntax:
Config>set console
Example:
Config>set console
-- Console configuration --
Con config>?
accounting Set accounting options
authorization Set authorization options
function Set CONF port functionality
login Set login options
speed Set console serial port speed
exit
Con config>
2.4.34.3.1 ACCOUNTING
Associates an accounting method list configured through the AAA facility. This way, the console service applies the
methods from the accounting exec list when it registers a Shell access, and the methods from the accounting com-
mand list when it registers an executed command.
Syntax:
Example 1:
In example 1, the AccCmds method list is configured to be used when accounting for a level 10 command.
Example 2:
In example 2, the AccExec method list is configured to be used when accounting for a Shell access.
Method lists can only be applied if the AAA facility is enabled. Therefore, once the AAA configuration is complete, it
must be enabled in order to apply the lists to the different services. Information on how to set up the AAA facility can
be found in the following manual: Teldat Dm800-I AAA Feature .
2.4.34.3.2 AUTHORIZATION
Associates an authorization method list configured through the AAA facility. This way, the console service applies the
methods from the authorization exec list when it requires Shell authorization and from the authorization command list
when it requires command authorization.
Syntax:
Example 1:
Example 1 specifies that the AccCmds method list will be used for authorizing level 10 commands.
Example 2:
Example 2 specifies that the AccExec method list will be used for Shell authorization.
You can only apply method lists if the AAA facility is enabled. Therefore, once the AAA configuration is complete, it
must be enabled in order to apply the lists to the different services. Information on how to set the AAA facility up can
be found in the following manual: Teldat Dm800-I AAA Feature .
2.4.34.3.3 FUNCTION
Allows you to configure the behavior of the CONF port and display its configuration status.
Some device versions allow you to select the functionality of the local console port (CONF). In these versions, this
port can behave as a local console or as an asynchronous serial port (UART).
When configuring asynchronous serial port mode, the CONF connector appears as a UART interface in the router's
device list.
Example:
Config>list dev
Config>list dev
Interface Connector Type of interface
ethernet0/0 EXP/SWITCH Marvell Fast Ethernet Switch
serial0/0 SERIAL0/WAN1 Auto Install Interface
uart0/0 CONF Asynchronous Serial Line
x25-node --- Router->Node
Con config>function ?
set Set CONF port functionality
list List CONF port functionality
Con config>
As this is a functionality that affects the device's BIOS (in asynchronous serial port mode during boot up, the device
doesn't send data through this interface), running the save command does not affect this command. On the other
hand, the device must be restarted for the configured value to take effect.
Note
Note
The configured mode will not take effect until you restart the device.
Note
This command is not displayed when you run the show configuration command. As this is a special
command that affects BIOS boot behavior, it is understood that the CONF port functionality will be con-
figured during device installation and that it will not change later.
FUNCTION SET
Configures the operation mode of the CONF port. There are two permitted options:console and asynchronous
serial line.
Syntax:
Example:
FUNCTION LIST
Syntax:
Example:
Allows you to configure the number of failed login attempts before blocking local console access.
Syntax:
Example:
Associates an authentication method list configured through the AAA facility. This way, the console service applies
the methods of the associated list when authentication is needed.
Syntax:
Example:
Example 1 specifies that the AutheLogin method list be used when authentication is required for a user accessing by
console.
You can only apply method lists if the AAA facility is enabled. Therefore, once the AAA configuration is complete, it
must be enabled in order to apply the lists to the different services. Information on how to set the AAA facility up can
be found in the following manual: Teldat Dm800-I AAA Feature .
Allows you to configure the period of time the local console will remain locked if the configured number of failed login
attempts is reached.
Syntax:
• < blocking_time > is the time the local console will remain locked in the event that the configured number of failed
login attempts is reached.
Example:
2.4.34.3.7 SPEED
Allows you to set the speed (baud rate) of the local console port.
Syntax:
• < baud > is the baud rate, in bits per second, of the local console port. Only certain values are supported.
Example:
Con config>speed ?
9600 bits per second
14400 bits per second
19200 bits per second
38400 bits per second
57600 bits per second
115200 bits per second
Con config>speed 115200
Con config>
2.4.34.3.8 EXIT
Syntax:
Con config>exit
Example:
Con config>exit
Config>
Allows you to provide a contact person name/ID for this router. The name can have a maximum of 79 characters.
You can view this information by typing list configuration.
Syntax:
Example:
Allows you to access the crypto options configuration environment. Enter a question mark ( ?) after the crypto com-
mand to obtain a list of available options.
Syntax:
Config>set crypto ?
self-test Set crypto self-test configuration
Note
Command History:
Release Modification
11.01.09.90.01 The crypto option was introduced in version 11.01.09.90.01.
11.01.13 The crypto option was introduced as of version 11.01.13.
11.02.02 The crypto option was introduced as of version 11.02.02.
Enables the execution of a set of self-tests to verify the correct operation of cryptographic algorithms and the integrity
of the software loaded in the device. If the device is operating under LINCE mode and ANY test fails, the device will
reboot.
Note
Note
Syntax:
Command History:
Release Modification
11.01.09.90.01 The self-test option was introduced in version 11.01.09.90.01.
11.01.13 The self-test option was introduced as of version 11.01.13.
11.02.02 The self-test option was introduced as of version 11.02.02.
Syntax:
Example:
Command History:
Release Modification
11.01.09.90.01 The periodic option was introduced in version 11.01.09.90.01.
11.01.13 The periodic option was introduced as of version 11.01.13.
11.02.02 The periodic option was introduced as of version 11.02.02.
Syntax:
• < type > is the type of data link to apply to the WAN line.
To find out what types are available, use the set data-link ? command.
Example:
Config>set data-link ?
arly Alarm Relay on asynchronous data link for a WAN line
asdp ASDP data link for a WAN line
astm ASTM data link for a WAN line
async Asynchronous data link for a WAN line
at AT modem data link for a WAN line
frame-relay Frame-Relay data link for a WAN line
scada SCADA data link for a WAN line
sdlc SDLC data link for a WAN line
sepi SEPI data link for a WAN line
sync Synchronous data link for a WAN line
udafo Udafo data link for a WAN line
x25 X25 data link for a WAN line
x28 X28 data link for a WAN line
• < interface name > is the name of the WAN interface on which we want to apply the specified data link type.
To find out what WAN interfaces are available on the device, type the list devices command.
Example:
Config>list devices
Interface Connector Type of interface
ethernet0/0 GE0/FE0/LAN1 Fast Ethernet interface
ethernet0/1 GE1/FE1/LAN2 Fast Ethernet interface
serial0/0 SERIAL0/WAN1 Auto Install Interface
serial0/1 SERIAL1/WAN2 X25
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
Config>
Example:
You can then check if the command has succeeded by typing the list devices command.
Deletes the current configuration and restores the default configuration. This command (or functionality) is not avail-
able on all models.
Syntax:
Example:
Allows you to select the active configuration file. This is the file that will be processed when the device restarts.
It also shows the active storage unit. For more information on how to change the active storage unit, please see the
config-media command in this manual.
Syntax:
• < file name > is the name of the configuration file to be activated.
The file name is indicated without extension. If none are passed by the command line, the device lists all the cfg files
available. If the selected file does not exist, the device will use the default configuration at startup.
Example:
Config>set file-cfg
Config Media: Flash only
A: ROUTER 494 12/05/06 20:15 Flash
A: SAMPLE 523 12/11/06 15:15 Flash
Current config: ROUTER
Config>set file-cfg sample
Config>
Accesses the FTP (File Transfer Protocol) configuration menu. See the associated manual: Teldat Dm724-I FTP/
sFTP Protocol.
Syntax:
Config>set ftp
Example:
Config>set ftp
-- FTP user configuration --
FTP config>
Allows you to enter the physical location of the router. You can view this information by typing list configuration.
Syntax:
• < place > is the location of the device. The location can have a maximum of 79 characters.
Example:
Allows you to assign a device name to the router. You can view this information by typing list configuration.
Syntax:
• < name > is the name of the device. The name can have a maximum of 79 characters.
Example:
Note
This command is only available on devices that have the power management functionality; usually
those intended for use in vehicles and powered by the vehicle's own battery. Please consult your
device's installation manual to see whether your router supports this functionality.
Allows you to configure the length of time the device will remain on after the ignition is turned off in the vehicle where
the device is installed. The goal is for the device to automatically shut down after a configured period of time to save
the vehicle battery.
Syntax:
• < time > is the time (in minutes) that the device stays on after the ignition is turned off in the vehicle where the
device is installed. After the timer expires, the device performs an orderly shutdown and then switches off. Valid
values range from 0 to 1044 minutes (24 hours).
• disabled disables the timer so that the device shuts down as soon as the vehicle ignition is turned off.
Example:
Config>set ignition-off-powerdown-timer 20
Config>
• This functionality is disabled by default. The device shuts down as soon as the vehicle ignition is turned off
(equivalent to set ignition-off-powerdown-timer disabled) if you do not set a time interval.
Allows you to set a maximum inactivity time for remote terminal connections (TELNET). If the maximum inactivity
time is reached, the device's Telnet server is disconnected.
This maximum inactivity time also applies to the device's local console connection. If the configured inactivity time
expires before any keys have been pressed, the local connection is closed and the user must re-enter the password
to be able to use the console again.
Syntax:
• < time > is the maximum inactivity time, in minutes, before the telnet connection is closed or the console locked.
Valid values range from 1 minute to 10 hours.
• disabled disables the timer so that the telnet connection is not closed and the console is not locked, unless the re-
mote device closes the telnet connection or the user terminates the session using the logout command.
Example:
Config>set inactivity-timer 20
Config>
The inactivity timer is set to 10 minutes (equivalent to set inactivity-timer 10) by default.
Syntax:
Enables case-sensitivity in the username authentication process for console, telnet and ftp access.
Syntax:
Example:
By default, case sensitivity in the username authentication process is disabled on the device.
Allows the last-login to be displayed when a correct login is achieved. The information about the user's last login (if a
log was previously stored) or a message indicating there were no previous logins will be displayed in the login ban-
ner.
Syntax:
Example:
Command history:
Release Modification
11.01.11 This command option was introduced as of version 11.01.11.
Allows you to configure the length of time the device will wait before switching to low power mode.
The manner in which to quit the low power mode depends on the device. Typically, the device will resume operation
when a WoL packet arrives to the Ethernet port used in BIOS or when the factory reset button is pressed.
Syntax:
• < time > is the time (in minutes) that the device waits before switching to low power mode. Valid values range from
1 to 20 minutes.
• "disabled" disables the timer, meaning the device won't ever enter into low power mode.
Example:
Config>set low-power-timer 20
Config>
• This entry will set the device in low power mode after 20 minutes if none of its interfaces has sent or received
traffic.
Note
This command is only available for devices that support the low power functionality. This feature allows
the device to switch to low power when no traffic has been sent or received in a while, in order to save
energy and meet the requirements of the ErP directive.
Command History:
Release Modification
11.01.07 The low-power-timer option was introduced as of version 11.01.07.
Allows you to use a local console connection, a remote Telnet connection, or an FTP connection to configure the
device's access password.
You can enter the password in plain text using the plain option or in ciphered text using the ciphered option.
Syntax:
Config>set password ?
plain Plain password
ciphered Ciphered password
Example:
Example:
Note
Command history:
Release Modification
11.01.09.90.01 The <word> option is obsolete in version 11.01.09.90.01.
11.01.13 The <word> option is obsolete as of version 11.01.13.
11.02.02 The <word> option is obsolete as of version 11.02.02.
11.01.09.90.01 The plain and ciphered command options were introduced in version 11.01.09.90.01.
11.01.13 The plain and ciphered command options were introduced as of version 11.01.13.
11.02.02 The plain and ciphered command options were introduced as of version 11.02.02.
Allows you to configure memory allocation in the device's memory POOLs. A bad setup can leave your device unus-
able.
Syntax:
• < option > is the name of the pool whose size, in bytes, we want to set.
• < size> is the size, in bytes, that we want to give the pool.
Running the set pool ? command displays a list of all the pools available for configuration.
Example:
Note
This command is dangerous and must only be used by qualified personnel. A bad setup can leave your
device unusable.
Command history:
Release Modification
11.00.06 This command is obsolete.
11.01.01 This command is obsolete.
This command is used when you want the device to perform a periodic restart at a specific time or a certain amount
of time after start up. This is useful for devices that are difficult to access and that, due to the installation conditions,
are likely to lose connectivity. In many cases, a device restart can restore connectivity.
Syntax:
• <day-time> is the time of day you want the device to restart or, if time-offset is configured with a value other than
0, the time of day the countdown indicated in time-offset begins. It must be expressed in hh:mm format, except
when the value is 0.
• < time-offset> indicates the time offset value for restarting the device. Its units are seconds, although you can
enter directly: weeks (w), days (d), hours (h), minutes (m) and seconds (s) (e.g., 1w2d3h). The day-time value is
used differently depending on the value you configure:
- day-time = 0. Indicates the period of time that must elapse after device startup before performing a device re-
start.
- day-time # 0. Indicates the period of time that must elapse from the time indicated in day-time before performing
a device restart.
Example:
The command allows you to configure three different types of scheduled restart:
To have this restart, the offset value must not be set or it must be given a value of 0.
Or:
You need to program both the restart time and the desired period.
The logical thing is to program the offset as a multiple of one day; otherwise you would have to calculate when the
device reset is going to take place (time + offset).
In any case, the device has a 180-second time window so that, if at the time of startup the current time is between
the set time + 180 seconds, it understands that it only has to check the offset field, since it is a periodic restart at
the same time. This needs to be taken into account when setting an offset value of less than one day.
For this restart, you need to set the time field to 0. In the offset field, you enter the time that must elapse from start-
ing the device until the restart takes place.
We do not recommend the first method in devices without a battery-powered real-time clock or some other method of
updating the system clock (NTP).
To delete the programming, you can set both fields to 0, or use the no command. For example:
Important
This command may compromise device integrity. Before loading a new software version, firmware
module or saving settings, you must ensure that the automatic process DOES NOT restart the device.
Accesses the TELNET protocol configuration. For more information, please see the following manual: Teldat Dm738-I
TELNET Protocol.
Syntax:
Config>set telnet
Example:
Config>set telnet
-- Telnet user configuration --
Telnet config>
Accesses the Web probe configuration environment. This command (or functionality) is not available on all models.
Syntax:
Config>set web-probe
Example:
Config>set web-probe
-- Web Probe user configuration --
Probe config>
For more information about the Web probe configuration environment, please see the following manual: Teldat
Dm749-I NSM (Network Service Monitor) .
Syntax:
Config>strong-password ?
no-reuse No reuse of passwords in a period of 24 hours
Example:
Config>strong-password 1
Enables the temporal restriction to change passwords and the command change-password. When strong-
password no-reuse is enabled, a user will not be able to be created or modify their password if they have used it
within the last 24 hours.
Syntax:
Config>strong-password no-reuse
Example:
Config>strong-password no-reuse
Config>
Note
When the command is enabled, when configuring in p 4, the user will not be allowed to be created or to
change the password if it was previously used in the last 24 hours. However, as changes in configura-
tion (p 4) are not applied until the next reboot, the password will not be considered as previously used
until this happens. When the command is enabled, when configuring in p 5, the user will not be allowed
to be created or to change the password if it was previously used in the last 24 hours and the password
will be automatically registered as previously used for the next 24 hours.
2.4.36 TELEPHONY
Accesses the Voice over IP (VoIP) configuration environment.
Syntax:
Config>telephony
Example:
Config>telephony
-- Telephony configuration --
Telephony Config>
For more information, please see the following manual: Teldat Dm722-I Telephony Over IP.
2.4.37 TIME
Allows you to change and view the device's date and time settings. It is also used to configure the start and end of
summer time (or daylight saving time).
Syntax:
Syntax:
Config>time list
Example:
Config>time list
Set by: operator
Date: Wednesday, 03/02/05 Time: 16:28:46 CET
Config>
Syntax:
Config>time set <month> <day> <year> <week day> <hour> <minute> <seconds>
Example:
Config>time set 3 2 5 3 16 29 59
Config>
Note
Some devices lose the date and time settings when they are restarted. In such cases, you will need to
configure these parameters using the NTP protocol. For more information, please see the following
manual: Teldat Dm728-I NTP Protocol .
2.4.37.3 TIME NO
Negates a command within the time configuration environment or sets its defaults.
Syntax:
Config>time no <option>
• < option > specifies the selected option. The available options are summer-time, timezone and full-numeric-year.
Command history:
Release Modification
11.01.12 The command is obsolete as of version 11.01.12. It has been replaced by "no time"
Configures when summer time is in effect for the device and the one-hour offset which must be added to the clock
value that would be obtained if it were not within that period.
There are four options available (three of them configuration and one monitoring).
Allows you to configure when summer time is in effect using exact dates and times. Here you are configuring abso-
lute summer time.
Syntax:
• < start day > specifies the day of the month to start summer time.
• < start month > specifies the month to start summer time. Use the first three letters of the month
(jan/feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec) to specify the month.
• < start year > specifies the year to start summer time. Use the last two digits of the year to specify the year, e.g.,
05 for 2005 or 2005 directly.
• < start hour > specifies the time (HH:MM) to start summer time.
• < end day > specifies the day of the month to end summer time.
• < end month > specifies the month to end summer time. Use the first three letters of the month
(jan/feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec) to specify the month.
• < end year > specifies the year to end summer time. Use the last two digits of the year to specify the year, e.g., 05
for 2005 or 2005 directly.
• < end hour > specifies the time (HH:MM) to end summer time.
Example:
Allows you to configure when summer time is in effect by setting the beginning and end of the period in a relative
way using the day of the week, week number, month, hour, and minute from which to consider the one-hour offset,
and the same parameters to configure the return to standard time. Once these data are entered, the device will auto-
matically switch to summer time and revert back to standard time each year.
Syntax:
• < start week number > specifies the week of the month (1 to 5) to start summer time.
• < start week day > specifies the day of the month to start summer time. Use the first three letters of the weekday
(mon/tue/wed/thu/fri/sat/sun) to specify the day of the week.
• < start month > specifies the month to start summer time. Use the first three letters of the month ( jan/
feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec) to specify the month.
• < start hour > specifies the time, in 24 hour format (HH:MM), to start summer time.
• < end week number > specifies the week of the month (1 to 5) to end summer time.
• < end week day > specifies the day of the month to end summer time. Use the first three letters of the weekday
(mon/tue/wed/thu/fri/sat/sun) to specify the day of the week.
• < end month > specifies the month to end summer time. Use the first three letters of the month
(jan/feb/mar/apr/may/jun/jul/aug/sep /oct/nov/dec) to specify the month.
• < end hour > specifies the time, in 24 hour format (HH:MM), to end summer time.
Example:
If summer time were to start on the fourth (start week number = 4) Sunday (start week day = sun) of March (start
month = mar) at 2 a.m. (start hour = 02:00), and end on the fourth (end week number = 4) Sunday (end week day =
sun) in October (end month = oct) at 3 a.m. (end hour = 03:00), you would enter the following:
Sometimes, however, this rule may not be flexible enough. Note, for example, that there are four Sundays in March
2007, while the same month in 2008 has five. To allow for this, set the week number in the month to 5 (using the <
startweek number > and/or < endweek number> parameters). Because of the special significance that these para-
meters have when they are set to 5, the changes are applied on the last weekday configured within the configured
month, regardless of whether it is a five- or only a four-week month.
Example:
If we want summer time to start each year on the last Sunday in March at 2 a.m. and finish each year on the last
Sunday in October at 3 a.m., we must type:
Syntax:
• < text > specifies the summer-time time zone name. If the text contains spaces, it needs to be be placed between
quotation marks.
Example:
The following table includes acronyms commonly used in different time zones for this parameter.
ACRONYM
TIME ZONE NAME AND OFFSET WITH RESPECT TO UTC
Europe
GMT Greenwich Mean Time, as UTC
BST British Summer Time, as UTC + 1 hour
IST Irish Summer Time, as UTC + 1 hour
WET Western Europe Time, as UTC
WEST Western Europe Summer Time, as UTC + 1 hour
CET Central Europe Time, as UTC + 1
CEST Central Europe Summer Time, as UTC + 2
EET Eastern Europe Time, as UTC + 2
EEST Eastern Europe Summer Time, as UTC + 3
MSK Moscow Time, as UTC + 3
MSD Moscow Summer Time, as UTC + 4
United States and Canada
AST Atlantic Standard Time, as UTC –4 hours
ADT Atlantic Daylight Time, as UTC –3 hours
ET Eastern Time, either as EST or EDT, depending on place and time of year
EST Eastern Standard Time, as UTC –5 hours
EDT Eastern Daylight Saving Time, as UTC –4 hours
CT Central Time, either as CST or CDT, depending on place and time of year
Syntax:
Example 1:
Example 2:
Finally, the show config command provides the summer-time settings in text mode.
Example 1:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
time summer-time date 30 mar 3 02:00 26 oct 3 03:00
;
dump-command-errors
end
Config>
Example 2:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
time summer-time recurring 4 sun mar 02:00 4 sun oct 03:00
;
dump-command-errors
end
Config>
Configures the time offset from UTC, thus determining the time zone of the device.
Syntax:
Example:
Config>time timezone 1
Config>
Note
Setting the year format to 4 digits. When enabled, some configuration, monitoring, event system and SNMP menus
will display the year as 4 digits. This command works in dynamic and static modes.
Syntax:
Config>time full-numeric-year
Command history:
Release Modification
11.01.12 This command was introduced as of version 11.01.12.
2.4.38 UCI
Allows you to configure the router's encryption unit.
Syntax:
2.4.39 UNSET-DEMO-LICENCE
Deactivates the demo license on the device so that the base license is used after a reboot.
Syntax:
Config> unset-demo-licence
Example:
Config>unset-demo-licence
Demo licence disabled. Restart device to start using the base licence
Config>
2.4.40 USER
Allows you to create and configure users with access permissions.
Syntax:
• < name > is the name of the new user to create on the device.
• <password | hash-password> specifies the password format – in clear text or hash-code – to enter next for the
specified user.
• < pwd> is the access password in the chosen format to give to the specified user.
Example:
For security reasons, when using the show configuration command to view the configuration of a device on which
users have been created, the command lines used for creating users will always be hashed with the hash-password
option, regardless of whether or not said option was originally used to create them. This means that a user's clear
text password cannot be extracted by reading the device's configuration file. If a user or administrator forgets a pass-
word, you must recreate the user with a new password.
Example:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
user usersample hash-password E7AE08B3FEB1F020EEEDE75FCD0D41F1
;
dump-command-errors
end
Config>
Once you have created two or more users, you can manage their access levels, enable or disable their access, and
so on. Use the following process to access a user's configuration menu: 1
Syntax:
2.4.40.2.1 access-level
Syntax:
[1] Performing user management before you have at least two users makes no sense: if there is only one user, that user has to be the administrator,
or root user, and thus must have all privileges enabled.
- Default. The user can run commands that require an execution level that is less than or equal to his/her access
level.
- Strict. The user can run commands that require an execution level that is exactly equal to his/her access level.
Example:
You can view user access levels by using the list user command in the configuration console.
By default, newly created users are assigned root-level access in default mode.
2.4.40.2.2 active
Syntax:
Example:
You can view user access levels by using the list user command in the configuration console.
2.4.40.2.3 hash-password
Syntax:
Example:
You can view user access levels by using the show configuration command in the configuration console.
2.4.40.2.4 keymanager
Configures a user as an IPSec keymanager on the device. Only root users or another keymanager (if there is one)
can perform this action.
This command partitions the permissions management system by creating two profiles that are completely separate:
one is only used to configure IPSec keys, while the other configures the remaining device parameters.
Syntax:
Example:
Note
When this type of special user exists, there are no longer any users with complete control of the
device's configuration system. Therefore, the use of this option is not recommended except in special
cases where device management is shared.
You can view the users configured as keymanager by using the list user command in the configuration console.
2.4.40.2.5 no
Syntax:
2.4.40.2.6 active
Syntax:
Example:
2.4.40.2.7 keymanager
If you have configured a user as IPSec keymanager on the device, you can use this option to undo that configura-
tion.
Syntax:
Example:
2.4.40.2.8 password
Sets a new user's password or changes a user's password if the strong-password no-reuse command is not en-
abled. When strong-password no-reuse is enabled, this command will only be available to create users. Pass-
words will be saved for the next 24 hours and the same user will not be able to reuse it within that period of time.
Syntax:
Example:
2.4.40.2.9 change-password
Changes a user's password. When strong-password no-reuse is enabled, changing passwords will only be avail-
able from this command and a 24-hour restriction will be applied to these passwords.
Syntax:
Example:
Note
Please note that you will not be able to repeat a password for 24 hours.
Command history:
Release Modification
11.01.11 The "change-password" command was introduced as of version 11.01.11.
2.4.41 END
Marks the end of a configuration file. This command must be included at the end of all configuration files to ensure
they load properly during startup.
The command is automatically appended as the last command in the device's configuration files (cfg) when you run
the save or show config commands.
Syntax:
Config>end
Example:
Config>show config
; Showing System Configuration for access-level 15 ...
; ATLAS50 Router 9 48 Version 10.7.0
log-command-errors
no configuration
;
;
network ethernet0/0
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
network ethernet0/1
; -- Ethernet Interface User Configuration --
no ip address
;
exit
;
;
;
;
network x25-node
; -- X25-node interface configuration --
no ip address
;
Exit
;
;
;
dump-command-errors
end
; --- end ---
Config>
3.1 Introduction
This chapter describes the device's monitoring (p3) process. This process lets you display information about the
status of the system, as well as statistics gathered by the device. It also enables users with the appropriate access
rights to manage those statistics and perform functional testing on certain device functionalities.
• Event (display/hide events -view/hide-). The user must have, at least, EVENT-level access to run these com-
mands.
• Show (statistics list, interface status, counters, etc.). The user must have, at least, MONITOR-level access to run
these commands. Other commands found within this typology include telnet, ssh, ping, vrf-ping, atm-ping,
traceroute, etc.
• Clear (delete/reset statistical information, registers, counters, etc.). The user must have, at least, CONFIG-level ac-
cess to run these commands.
• Conf (interface testing, event management, IPSec tunnel activation, etc.). The user must have, at least, CONFIG-
level access to run these commands. Other commands found within this typology include bping, vrf-bping, tftp,
etc.
• Root (send an escape character to another console terminal connected to the device to force a user to exit a menu
or to terminate a session). The user must have ROOT-level access (level 15) to run these commands.
If the user requests help (?) from the monitoring process, the only commands displayed are the ones the user is al-
lowed to execute.
The access levels available and the configuration process are outlined in Router console on page 3 (section Con-
necting to the Teldat Router on page 4 ) and Teldat Router Configuration on page 19 (section USER on page 114)
herein.
Enter/exit MONITORING
To enter the monitoring process from the GESTCON Management Console prompt (*), type the monitor or process
command followed by the configuration process number, which in this case is 3.
Example:
*monitor
Console Operator
+
To exit the monitoring process and return to the GESTCON Management Console prompt (*), type the escape char-
acter (Ctrl-p by default).
Command Function
? (HELP) Displays a list of monitoring commands.
BUFFER Displays information about the packet buffers assigned to each interface.
CHECK-UPDATE Shows the latest software version available.
CLEAR Clears network statistics.
CONFIGURATION Lists the status of the current protocols and interfaces.
CRYPTO Accesses the crypto options monitoring environment.
DEVICE Displays network hardware statistics or statistics for the specified interface.
ERROR Displays the error counters.
EVENT Enters the event registration system environment.
FEATURE Accesses monitoring commands for router facilities which are outside the usual
protocol and network interface monitoring processes.
HARDWARE Sets hardware configuration.
LAST-CONFIG-CHANGES Shows the last configuration changes made.
MALLOC-MONITOR Accesses device memory management monitoring commands.
Home command
You can use the home command in all of the monitoring process menus. It returns you to the monitoring process re-
gardless of the menu or submenu you are currently in. This command provides a way to return to the monitoring pro-
cess without having to exit the menus one by one with the "exit" command.
Examples:
*p 3
Console Operator
+protocol DHCP
DHCP+server
DHCP-Server+home
Command history:
Release Modification
11.01.03 This command was introduced as of version 11.01.03.
Root command
The root command is available in all menus that can be accessed during the configuration and monitoring pro-
cesses. It allows you to return to the root prompt, regardless of the menu or submenu you are currently in.
Examples:
*p 3
Console Operator
+protocol IP
-- IP protocol monitor --
IP+ipsec
-- IPSec protocol monitor --
IPSec+root
Command history:
Release Modification
11.01.06 This command was introduced as of version 11.01.06.
3.2.1 ? (HELP)
Lists available commands from the current prompt. You can also type a question mark (?) after a specific command
to list its options.
Syntax:
+?
Example:
+?
buffer Packet buffers assigned to each interface
check-update Checks whether updates exist
clear Clear network statistics
configuration List status of current protocols and interfaces
crypto Cryptographic options
device List statistics for the specified interface
error List error counters
event Event Logging System environment
feature Access to monitoring commands for router features
hardware Set hardware configuration
last-config-changes Display the last changes made in the configuration
log Dump log data
malloc-monitor Malloc monitor information
management Master router environment
memory Display memory, buffer and packet data
network Enter the console environment of a specified network
node Enter the node monitoring environment
protocol Enter the commands environment for a specified
protocol
queue Display buffer statistics for a specified interface
quick Access the quick menu monitoring
rush-engine Rush Engine Monitor
statistics Display statistics for a specified interface
system Permit monitoring of the system’s memory and stacks
telephony Monitoring environment for the telephony functions
uci Encryption statistics
web-probe Access the Web poll monitoring
exit
+
3.2.2 BUFFER
Displays information about the packet buffers assigned to each interface.
Note
Each buffer on a device is of the same size and built dynamically. Buffer sizes vary from one device to
another.
Syntax:
• < interface > is the name of the interface about which we want to display information.
• < verbose > displays additional information.
To obtain the available interfaces on the device, type the configuration command at the plus prompt (+). If no name
is entered, the command displays information about all of the interfaces.
Example:
+buffer
+buffer ethernet0/0
TeldatM2 +
• Input buffers
Req Number of input buffers required.
Alloc Number of assigned input buffers.
Low Low threshold for receive (input) buffers (flow control).
Curr Current number of input buffers on this device. If the value is 0, the device is disabled. When a
packet is received, if the value of Curr is less than Low, then the packet is eligible for flow control.
Consult the queue command to find out about the required conditions.
• Buffer sizes
Hdr Is the maximum value between the following two terms:
- largest LLC, plus MAC, plus the size of the device's output headers.
• Bytes
Buffer size Full buffer size.
True Buffer Memory used by each buffer. Includes buffer size and memory allocated for buffer descriptor
size
Packet size Maximum packet size.
Trailer size Maximum trailer size.
Packet offset Packet offset in the buffer.
Filled buffers Buffers where more than data size was used (debug parameter).
3.2.3 CHECK-UPDATE
Displays and installs the latest software version available. To do this, the device will securely connect to the Teldat
servers to obtain such information.
Note
Syntax:
+check-update ?
auto-install Downloads and installs the latest version(s) available
status Status of latest request
<cr>
Note
This functionality requires that the device's time settings are correct and needs a configured DNS serv-
er to verify the validity of the HTTPS certificate.
3.2.3.1 Check-update
Syntax:
+check-update
Example:
+check-update
• [default-srv | server <hostname>] You can use a Teldat server or configure a non-Teldat server to download the
version.
• [default-ca | ca <cert>] You can use a default Teldat certificate or add another certificate.
• auto-reboot You can restart automatically or manually after loading the new version.
Syntax:
+check-update auto-install ?
default-srv Download from a Teldat server
server Download from a non-Teldat server
Example:
CIT: 11.01.13.00.02
Installation in progress.
Syntax:
+check-update status
Example:
+check-update status
Command history:
Release Modification
11.01.09.90.01 This command was introduced in version 11.01.09.90.01.
11.01.13 This command was introduced as of version 11.01.13.
11.02.02 This command was introduced as of version 11.02.02.
11.01.14 The "check-update auto-install" and "check-update status" commands were in-
troduced as of version 11.01.14
11.02.03 The "check-update auto-install" and "check-update status" commands were in-
troduced as of version 11.02.03
3.2.4 TIME
Allows you to change and view the device's date and time settings. It is also used to configure the start and end of
summer time (or daylight saving time).
Syntax:
Syntax:
Config>time list
Example:
Config>time list
Set by: operator
Date: Wednesday, 03/02/05 Time: 16:28:46 CET
Config>
Syntax:
Config>time set <month> <day> <year> <week day> <hour> <minute> <seconds>
Example:
Config>time set 3 2 5 3 16 29 59
Config>
Note
Some devices lose the date and time settings when they are restarted. In such cases, you will need to
configure these parameters using the NTP protocol. For more information, please see the following
manual: Teldat Dm728-I NTP Protocol .
3.2.4.3 TIME NO
Negates a command within the time configuration environment or sets its default values.
Syntax:
Config>time no <option>
• < option > specifies the selected option. The available options are summer-time, timezone and full-numeric-year.
Command history:
Release Modification
11.01.12 The command is obsolete as of version 11.01.12. It has been replaced by "no time"
Configures the summer time period and the one-hour offset to be added to the clock value when that period is no
longer in force.
There are four options available (three of them fall under configuration and one under monitoring).
Allows you to configure the summer time period using exact dates and times. With this option, you are configuring
absolute summer time.
Syntax:
• < start day > specifies the day of the month to start summer time.
• < start month > specifies the month to start summer time. Use the first three letters
(jan/feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec) to specify the month.
• < start year > specifies the year to start summer time. Use the last two digits of the year to specify the year, e.g.,
05 for 2005 or 2005 directly.
• < start hour > specifies the time (HH:MM) to start summer time.
• < end day > specifies the day of the month to end summer time.
• < end month > specifies the month to end summer time. Use the first three letters
(jan/feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec) to specify the month.
• < end year > specifies the year to end summer time. Use the last two digits of the year to specify the year, e.g., 05
for 2005 or 2005 directly.
• < end hour > specifies the time (HH:MM) to end summer time.
Example:
Allows you to configure the summer time period by setting the beginning and end using the day of the week, week
number, month, hour, and minute from which to consider the one-hour offset, and the same parameters to configure
the return to standard time. Once these data are entered, the device will automatically switch to summer time and re-
vert back to standard time each year.
Syntax:
• < start week number > specifies the week of the month (1 to 5) the summer time period starts.
• < start week day > specifies the day of the month the summer time period starts. Use the first three letters of the
weekday (mon/tue/wed/thu/fri/sat/sun) to specify the day of the week.
• < start month > specifies the month the summer time period starts. Use the first three letters ( jan/
feb/mar/apr/may/jun/jul/aug/sep/oct/nov/dec) to specify the month.
• < start hour > specifies the time, in a 24-hour format (HH:MM), the summer time period starts.
• < end week number > specifies the week of the month (1 to 5) the summer time period ends.
• < end week day > specifies the day of the month the summer time period ends. Use the first three letters of the
weekday (mon/tue/wed/thu/fri/sat/sun) to specify the day of the week.
• < end month > specifies the month the summer time period ends. Use the first three letters
(jan/feb/mar/apr/may/jun/jul/aug/sep /oct/nov/dec) to specify the month.
• < end hour > specifies the time, in a 24-hour format (HH:MM), the summer time period ends.
Example:
If summer time were to start on the fourth (start week number = 4) Sunday (start week day = sun) of March (start
month = mar) at 2 a.m. (start hour = 02:00), and end on the fourth (end week number = 4) Sunday (end week day =
sun) in October (end month = oct) at 3 a.m. (end hour = 03:00), you would enter the following:
Sometimes, however, this rule may not be flexible enough. Note, for example, that there are four Sundays in March
2007, while the same month in 2008 has five. To allow for this, set the week number in the month to 5 (using the <
startweek number > and/or < endweek number> parameters). Because of the special significance that these para-
meters have when they are set to 5, the changes are applied on the last weekday configured within the configured
month, regardless of whether it is a five- or only a four-week month.
Example:
If we want summer time to start each year on the last Sunday of March at 2 a.m. and finish each year on the last
Sunday of October at 3 a.m., we must type:
Syntax:
• < text > specifies the summer-time time zone name. If the text contains spaces, it needs to be be placed between
quotation marks.
Example:
The following table includes acronyms commonly used in different time zones for this parameter.
ACRONYM
TIME ZONE NAME AND OFFSET WITH RESPECT TO UTC
Europe
GMT Greenwich Mean Time, as UTC
BST British Summer Time, as UTC + 1 hour
IST Irish Summer Time, as UTC + 1 hour
WET Western Europe Time, as UTC
WEST Western Europe Summer Time, as UTC + 1 hour
CET Central Europe Time, as UTC + 1
CEST Central Europe Summer Time, as UTC + 2
EET Eastern Europe Time, as UTC + 2
EEST Eastern Europe Summer Time, as UTC + 3
MSK Moscow Time, as UTC + 3
MSD Moscow Summer Time, as UTC + 4
United States and Canada
AST Atlantic Standard Time, as UTC –4 hours
ADT Atlantic Daylight Time, as UTC –3 hours
ET Eastern Time, either as EST or EDT, depending on place and time of year
EST Eastern Standard Time, as UTC –5 hours
Syntax:
Example 1:
Example 2:
Finally, the show config command provides the summer-time settings in text mode.
Example 1:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
time summer-time date 30 mar 3 02:00 26 oct 3 03:00
;
dump-command-errors
end
Config>
Example 2:
Config>show menu
; Showing Menu Configuration for access-level 15 ...
log-command-errors
no configuration
time summer-time recurring 4 sun mar 02:00 4 sun oct 03:00
;
dump-command-errors
end
Config>
Configures the time offset from UTC, thus determining the time zone of the device.
Syntax:
Example:
Config>time timezone 1
Config>
Note
Setting the year format to 4 digits. When enabled, some configuration, monitoring, event system and SNMP menus
will display the year in 4 digits. This command works in dynamic and static modes.
Syntax:
Config>time full-numeric-year
Command history:
Release Modification
11.01.12 This command was introduced as of version 11.01.12.
3.2.5 CLEAR
Restarts the statistical information by clearing all counters on all interfaces. This is a useful command when you are
looking for changes to large counters. However, it is important to note that this command does not save memory
space or increase router speed.
Syntax:
+clear
• optional parameter yes allows the device to run an operation without prompting the user to confirm first. If this
parameter is set to yes, no such confirmation is required. If not, the device prompts the user for confirmation.
Example:
+clear
Are you sure you want to clear stats?(Yes/No)?
+
Command history:
Release Modification
11.01.06 The "[yes]" option was introduced as of version 11.01.06
3.2.6 CONFIGURATION
Displays information about the network protocols and interfaces. This command's output can be split into three sec-
tions. The first section contains the router ID, software version, boot ROM version, and watchdog status. It also con-
tains the device's date and time settings and how much time has elapsed since the last restart. The second and third
sections show information about the protocols that can be monitored and the interfaces present.
Syntax:
+configuration
Example:
+configuration
4 interfaces:
Connector Interface MAC/Data-Link Status
GE0/FE0/LAN1 ethernet0/0 Ethernet/IEEE 802.3 Up
GE1/FE1/LAN2 ethernet0/1 Ethernet/IEEE 802.3 Testing
BRI/ISDN1 bri0/0 BRI Net Testing
--- x25-node internal Up
SNMP OperStatus:
Interface OperStatus
ethernet0/0 Up
ethernet0/1 Down
bri0/0 Down
x25-node Up
Encryption Engines:
Hardware: SEC-8272 Revision: 0xA, block 0x0
The first block (lines 1-3) displays general technical information about the device. The first line shows the type of
router, the license in use and its serial number.
The second block (lines 4-5) displays information about the demo license, indicating the time remaining before the li-
cense expires, and the base license to which the device will return once the demo license expires or is manually dis-
abled. This block only appears if there is an active demo license.
The third block (lines 6-12) shows the boot ROM (Read Only Memory) version that is currently installed on the router,
the BIOS version, and the current watchdog timer configuration.
The fourth block (lines 13-15) shows the software version currently running on the router.
The fifth block (lines 16-18) shows the hostname, the active user, the date and time, and the time that has elapsed
since the device was last restarted.
The sixth block shows a list of available protocols and interfaces. The meaning of each of the fields is as follows:
Num Number associated with the protocol.
Name Abbreviation for the protocol name.
Protocol Full name of the protocol.
The seventh block lists the interfaces available on the device. The meaning of each of the fields is as follows:
Connector Connector associated with the interface.
Interface Name of the interface.
MAC/Data Type of MAC/Data link configured for that interface.
Link
Status Current status of the network interface.
Testing The interface is performing a self-diagnostic test. This happens when the router is
first turned on and a problem is detected in the interface. Once the interface is on
the network, it launches periodic test packets to ensure it is working properly. If a
test fails, the router removes the interface from the network and runs a self-
diagnostic test to ensure its integrity. If a fault occurs during a self-diagnostic test,
the router declares the network out of service or down. If the self-diagnostic test
completes successfully, the router declares the network up.
Up The interface is operational and connected.
Down The interface is not operational and a self-test failed. The router re-tests the net-
work at increasing time intervals (starting with five seconds), until the router no
longer tests the interface (which occurs after approximately two minutes).
Disabled The shutdown configuration command has disabled the interface.
Not present Either there is no interface present on the router or the console is incorrectly con-
figured.
Unsupported The current version/license does not support the interface hardware.
Available The state of the secondary interface in a WAN configuration, when the primary in-
terface is active.
Error Disabled. An interface error has been detected that caused it to be disabled.
The eighth block – SNMP OperStatus – shows the operating status of the interface from the point of view of the SN-
MP protocol, as defined in RFC 2233. The meaning of each of the fields is as follows:
Interface Name of the interface.
OperStatus The possible SNMP operating states are:
Up The interface is ready to pass and receive network traffic.
Down The interface is not operational.
Testing The interface is performing a self-diagnostic test so it cannot transmit real traffic
packets.
Unknown For some reason, the interface's operating status can not be determined.
Dormant The interface is operational, but waiting for some external event to begin sending
or receiving packets. Presumably it will switch to an ‘up’ state as soon as the ex-
pected event occurs. An example of this case is the dial-type interfaces when they
have no traffic to carry (and therefore the call was not initiated) or when only in-
coming calls are allowed and the remote end has not started the connection.
Not present This state is a refinement of the ‘down’ state which indicates that the interface is
down specifically because a component (typically hardware) is missing.
Lower layer This is another refinement of the ‘down’ state, which in this case indicates that the
down interface extends from another interface(s) that is down.
The ninth block shows information about the encryption card, cellular/wireless LAN driver versions and generic web
version (if the device supports it).
Command history:
Release Modification
11.02.03 Generic Web Version output added as of version 11.02.03.
3.2.7 CRYPTO
Allows you to access the crypto options monitoring environment. Enter a question mark (?) after the crypto com-
mand to obtain a list of available options.
Syntax:
+crypto ?
self-test Execute a set of self tests to verify the OpenSSL cryptographic
algorithms and the integrity of the software
Note
Command history:
Release Modification
11.01.09.90.01 This command was introduced in version 11.01.09.90.01.
11.01.13 This command was introduced as of version 11.01.13.
11.02.02 This command was introduced as of version 11.02.02.
Runs a set of self-tests to verify the correct operation of cryptographic algorithms and the integrity of the software
loaded in the device. If the device is operating under LINCE mode and ANY test fails, the device will reboot.
Note
Note
Syntax:
+crypto self-test
Example:
+crypto self-test
The following test will affect the performance of the system while it is running
Are you sure you want to run the test?(Yes/No)? yes
OpenSSL self-tests
----------------------------------
RAND ...Pass
Digest tests:
------------------
SHA1 ...Pass
SHA2 ...Pass
HMAC tests:
------------------
HMAC ...Pass
CMAC tests:
------------------
CMAC ...Pass
Cipher tests:
------------------
3DES ...Pass
AES ...Pass
AES-CCM ...Pass
AES-GCM ...Pass
Signature tests:
------------------
RSA ...Pass
ECDSA ...Pass
DSA ...Pass
DH/ECDH tests:
------------------
DH ...Pass
ECDH ...Pass
KDF tests:
------------------
PBKDF2 ...Pass
Command history:
Release Modification
11.01.09.90.01 The self-test option was introduced in version 11.01.09.90.01.
11.01.13 The self-test option was introduced as of version 11.01.13.
11.02.02 The self-test option was introduced as of version 11.02.02.
3.2.8 DEVICE
Displays statistical information about network interfaces, such as Ethernet, Token Ring, etc. This command can be
used to obtain a summary of all interfaces or to obtain detailed information on a particular one.
Syntax:
+device [<interface>]
• < interface > is the name of the interface we want to display information about.
If no interface name is given, the system returns general information on all interfaces.
Example 1:
+device
Auto-test Auto-test Maintenance
Interface CSR Vect valids failures failures
ethernet0/0 fa200e00 27 1 0 0
serial0/0 fa200a00 5E 0 156 0
serial0/1 fa200a20 5D 0 156 0
serial0/2 fa200a60 5B 0 7 0
bri0/0 fa200a40 5C 1 0 0
x25-node 0 0 1 0 0
+
Example 2:
+device ethernet0/0
Auto-test Auto-test Maintenance
Interface CSR Vect valids failures failures
ethernet0/0 fa200e00 27 1 0 0
Input statistics:
failed, frame too long 0 failed, FCS error 0
failed, alignment error 0 failed, FIFO overrun 1
internal MAC rcv error 1 packets missed 1
Output statistics:
deferred transmission 0 single collision 0
multiple collisions 0 total collisions 0
failed, excess collisions 0 failed, FIFO underrun 0
failed, carrier sense err 0 SQE test error 0
late collision 0 internal MAC trans errors 0
Ethernet MAC code release 1
+
The aforementioned fields depend on the type of interface selected. Their names are self-explanatory when it comes
to the information they provide.
Note
The screen shown may vary depending on the router and device.
3.2.9 ERROR
Displays network error statistics corresponding to each device interface. This command facilitates error counters.
Syntax:
• < interface > is the name of the network interface whose monitoring environment we want to access.
• Use the verbose option to display errors per-CPU in devices with multi-CPU capability.
Example:
+error
Input Input Input Input Output Output
Interface Discards Errors Unk Proto Flow Drop Discards Errors
ethernet0/0 0 0 1016 0 0 0
serial0/0 0 0 0 0 0 0
serial0/1 0 0 0 0 0 0
serial0/2 0 0 0 0 0 0
bri0/0 0 0 0 0 0 0
x25-node 0 0 0 0 0 0
+
The sum between all Input Flow Drops and Output Discards interfaces is not equal because Output Discards can
contain packets that are locally generated.
Example:
Interface: ethernet0/0
Per-CPU stats: Total main aux1
In Discards 0 0 0
In Errors 0 0 0
In Unk Proto 0 0 0
In Ovflw Tx Drops 0 0 0
In Ovflw mCPU Drops 0 0 0
Out Discards 0 0 0
Out Errors 0 0 0
Using the verbose option, the Input Flow Drop counter is divided into two counters: In Ovflw Tx Drops and In Ovflw
mCPU Drops. The In Ovflw mCPU Drops counter includes the packets that have been discarded by flow control in
inter-CPU communication.
Command History:
Release Modification
11.02.01.20.01 The interface and verbose options were introduced as of version 11.02.01.20.1.
11.02.02 The interface and verbose options were introduced as of version 11.02.02.
3.2.10 EVENT
Goes to the Event Logging System (ELS+) prompt and sets up temporary message filters for troubleshooting pur-
poses. All changes made at the ELS+ prompt are immediate, but will disappear when the router is rebooted. For
more information, see Event Logging System ELS on page 186. To return to the plus (+) prompt, type theexit com-
mand.
Syntax:
+event
Example:
+event
-- ELS Monitor --
ELS+
3.2.11 FEATURE
Provides access to the feature monitoring menu for features that are neither protocols nor network interfaces. Type a
question mark (?) after the feature command to obtain a list of the features available for the software version.
This command is used to monitor the corresponding feature. For more information, check the relevant manual.
Note
Features must be enabled at the configuration prompt before they can be monitored.
Syntax:
+feature <option>
access-lists Generic IP lists monitoring
afs Advanced firewall system feature
bandwidth-reservation Bandwidth-Reservation System feature monitoring
dns DNS monitoring environment
dns-updater DNS UPDATER monitoring environment
err-disable Error disable monitoring
gps-applications GPS Applications monitoring
hotspot Hotspot monitoring environment
http HTTP server monitoring
ip-discovery Ip-discovery monitoring
ipv6-access-list IPv6 access list monitor
istud IPSEC Tunnel Server Discovery Protocol monitoring
ldap LDAP (Lightweight Directory Access Protocol)
monitoring
mac-filtering MAC-Filtering feature monitoring
management Management Monitoring
management-platform Management Platform monitoring
netflow Netflow client monitoring
nsla NSLA (Network Service Level Advisor) monitoring
nsm NSM (Network Service Monitor) monitoring
ntp NTP (Network Time Protocol) monitoring
policy-map Policy map monitoring
power-switch TeleControl Module control environment
prefix-lists Prefix lists monitoring
radius RADIUS feature monitoring
rmon RMON (Remote Network Monitoring)
scada-forwarder Scada protocol monitoring
spi SPI agent monitoring
stun Stun protocol monitoring
syslog Syslog client monitoring
tftp Access the device#s TFTP client.
ttcp Ttcp (test tcp)
vli Virtual Linux Interface monitoring
wnms Wireless Network Management System monitoring
wrr-backup-wan WAN Reroute feature monitoring
+
Syntax:
+feature access-lists
Example:
+feature access-lists
-- Access Lists user console --
Access Lists+
For more information on how to monitor generic access lists, please see the following manual: Teldat Dm752-I Ac-
cess Control.
Syntax:
+feature afs
Example:
+feature afs
-- AFS Monitor --
AFS+
For more information on AFS monitoring, please see the following manual: Teldat Dm786-I AFS.
Accesses Bandwidth-Reservation System monitoring. For more information, please see the following manual: Teldat
Dm715-I Bandwidth Reservation System .
System:
+feature bandwidth-reservation
Example:
+feature bandwidth-reservation
-- Bandwidth Reservation console --
BRS+
Accesses the DNS monitoring environment. For more information, please see the following manual: Teldat Dm723-I
DNS Client.
Syntax:
+feature dns
Example:
+feature dns
-- DNS resolver user console --
DNS+
Syntax:
+feature dns-updater
Example:
+feature dns-updater
-- DNS Updater console --
DNS Updater
For more information on dns-updater monitoring, please see the following manual: Teldat Dm785-I DNS Updater.
Syntax:
+feature err-disable
Example:
+feature err-disable
-- Error Disable user console --
errdisable+
Syntax:
+feature ftp
Example:
+feature ftp
FTP Client
FTP+
For more information, please see the following manual: Teldat Dm724-I FTP/sFTP Protocol.
Command history:
Release Modification
11.00.06 FTP option added.
11.01.02 FTP option added.
Syntax:
+feature gps-applications
Example:
+feature gps-applications
-- GPS Applications user console --
GPS Apps+
For more information on gps-application monitoring, please see the following manual: Teldat Dm812-I GPS.
Accesses the HotSpot monitoring menu. For more information, please see the following manual: Dm820-I HotSpot
Feature.
Syntax:
+feature hotspot
Example:
+feature hotspot
Command history:
Release Modification
11.00.03 The "Hotspot" feature was introduced as of version 11.00.03.
Accesses HTTP protocol monitoring. For more information, please see the following manual: Teldat Dm737-I HTTP
Protocol.
Syntax:
+feature http
Example:
+feature http
-- HTTP server user console --
HTTP+
Accesses the monitoring environment for the ip-discovery feature. This command (or functionality) is not available on
all models.
Syntax:
+feature ip-discovery
Example:
+feature ip-discovery
-- TIDP Console --
TIDP+
Syntax:
+feature ipv6-access-list
Example:
+feature ipv6-access-list
-- IPv6 Access Lists user console --
IPv6 Access Lists+
For more information on ipv6-access-list monitoring, please see the following manual: Teldat Dm808-I IPv6 Access
Control.
Syntax:
+feature istud
Example:
+feature istud
-- ISTUD console --
ISTUD+
For more information about istud monitoring, please see the following manual: Teldat Dm784-I ISTUD Feature.
Syntax:
+feature ldap
Example:
+feature ldap
LDAP client monitor
LDAP+
Syntax:
+feature mac-filtering
Example:
+feature mac-filtering
Syntax:
+feature management
Example:
+feature management
-- Management Console --
management+
Command history:
Release Modification
11.00.05 The FEATURE MANAGEMENT menu was introduced as of version 11.00.05.
11.01.00 The FEATURE MANAGEMENT menu was introduced as of version 11.01.00.
Syntax:
management+script <id_script>
Example:
management+script 1
Starting executing Script 1
Sending command: p 4
Response: *
Response: Config>
Response: *
Command p 4 sent without errors
management+
Command history:
Release Modification
11.00.05 The script <id_script> command was introduced as of version 11.00.05.
11.01.00 The script <id_script> command was introduced as of version 11.01.00.
3.2.11.16.2 STATISTICS
Lists all operations linked to advisor notifications or system events, including information such as the last time an op-
eration was triggered (i.e., a task was executed upon receiving a notification), whether any errors occurred during ex-
ecution, and count the number of times an operation tries to execute the specified task.
Syntax:
management+statistics
Example:
management+statistics
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
2 4 2022-03-25 09:07:57 4
Command history:
Release Modification
11.00.05 The statistics command was introduced as of version 11.00.05.
11.01.13 The statistics command was modified as of version 11.01.13.
11.01.00 The statistics command was introduced as of version 11.01.00.
11.02.02 The statistics command was modified as of version 11.02.02.
3.2.11.16.3 RESET
Syntax:
Example:
management+reset operation 1 id 2
Command history:
Release Modification
11.01.13 The reset command was introduced as of version 11.01.13.
11.02.02 The reset command was introduced as of version 11.02.02.
Syntax:
+feature netflow
Example:
+feature netflow
NETFLOW Monitor
NETFLOW Mon+
For more information, please see the following manual: Teldat Dm789-I NETFLOW.
Allows you to access the NSLA (Network Service Level Advisor) monitoring environment.
Syntax:
+feature nsla
Example:
+feature nsla
-- NSLA console --
NSLA+
For more information, please see the following manual: Teldat Dm754-I NSLA (Network Service Level Advisor) .
Syntax:
+feature nsm
Example:
+feature nsm
-- NSM console --
NSM+
For more information, please see the following manual: Teldat Dm749-I NSM .
Accesses the NTP (Network Time Protocol) monitoring environment. For more information, please see the following
manual: Teldat Dm728-I NTP Protocol .
Syntax:
+feature ntp
Example:
+feature ntp
-- NTP user console --
NTP+
Syntax:
+feature policy-map
Example:
+feature policy-map
-- Policy Map user console --
Policy-Map+
For more information, please see the following manual: Teldat Dm795-I Policy Map Class Map.
Accesses the control environment of the device's Telecontrol Module (MTC). This environment is only accessible to
users via telnet and its use is only effective for devices connected to a power source through an MTC or an MTC+.
Syntax:
+feature power-switch
Example:
+feature power-switch
POWER-SWITCH monitor
POWER-SWITCH+
For more information, please see the following manuals: Teldat Dm296-I Telecontrol Module (MTC) ;Teldat Dm689-I
MTC+ Installation.
Syntax:
+feature prefix-lists
Example:
+feature prefix-lists
-- Prefix Lists user console --
Prefix Lists+
For more information on prefix list monitoring, please see the following manual: Teldat Dm780-I Prefix Lists.
Accesses RADIUS monitoring. For more information, please see the following manual: Teldat Dm733-I RADIUS Pro-
tocol.
Syntax:
+feature radius
Example:
+feature radius
-- RADIUS user console --
RADIUS+
Syntax:
+feature rmon
Example:
+feature rmon
-- RMON (Remote Network Monitoring) console --
RMON+
For more information on rmon monitoring, please see the following manual: Teldat Dm796-I RMON Feature.
Syntax:
+feature scada-forwarder
Example:
+feature scada-forwarder
SCADA Forwarder Console
SCADA FWD+
Syntax:
+feature spi
Example:
+feature spi
-- SPI Agent user console --
SPI+
For further information on how to configure spi, please see the following manual: Teldat Dm793-I SPI Agent .
Allows you to access STUN client monitoring. For more information, please see the following manual: Teldat
Dm769-I STUN Protocol .
Syntax:
Example:
Syntax:
+feature syslog
Example:
+feature syslog
-- SYSLOG client console --
SYSLOG+
For more information, please see the following manual: Teldat Dm753-I Syslog Client .
Syntax:
+feature tftp
Example:
+feature tftp
TFTP manager
TFTP+
For more information on tftp monitoring, please see the following manual: Teldat Dm765-I TFTP Protocol.
Syntax:
+feature ttcp
Example:
+feature ttcp
-- TTCP --
Ttcp+
For more information on TTCP monitoring, please see the following manual: Teldat Dm831-I TTCP Feature.
Syntax:
+feature vli
Example:
+feature vli
-- VLI monitor --
vli+
For more information on vli monitoring, please see the following manual: Teldat Dm803-I Virtual Linux Interface (VLI).
Allows you to access the WNMS (Wireless Network Management System) monitoring environment.
For more information, please see the following manual: Teldat Dm819-I Wireless Network Management System .
Syntax:
+feature wnms
Example:
+feature wnms
-- WNMS Console --
WNMS+
Command history:
Release Modification
11.00.03 The WNMS feature was introduced as of version 11.00.03.
Allows you to access WRR-Backup WAN monitoring. For more information, please see the following manual: Teldat
Dm727-I Backup WAN Reroute .
Syntax:
+feature wrr-backup-wan
Example:
+feature wrr-backup-wan
-- Back-up WAN Reroute user console --
WRR+
3.2.12 HARDWARE
Allows you to modify the way hardware is configured. Enter a question mark ( ?) after the hardware command to ob-
tain a list of available options.
Syntax:
+hardware <option>
application Set application hardware configuration
cit Set cit hardware configuration
show Show hardware configuration
switch Set switch hardware configuration
+
Command history:
Release Modification
11.00.07 The hardware command was introduced as of version 11.00.07.
11.01.02 The hardware command was introduced as of version 11.01.02.
11.01.04 The application core option was introduced as of version 11.01.04.
Example:
+hardware show
Current number of application cores is 2
Switches are aggregated
Command history:
Release Modification
11.01.04 The application cores option was introduced as of version 11.01.04.
Allows you to configure the hardware configuration of the switch. Entering a question mark ( ?) after the hardware
switch command causes the device to list all the possible options.
+hardware switch ?
aggregate Interconnect switches in main board and SLOT1 to form a larger switch
segregate Segregate switch in SLOT1 from main board switch
+hardware switch
Command history:
Release Modification
11.01.04 The application cores option was introduced as of version 11.01.04.
Allows you to combine the expansion card switch with that of the main board.
SWITCH(12) 10/100/1000
(Example with 8 Ethernet ports on the main board and a 4-port Ethernet card)
When switches are aggregated, they will appear as one switch with a single interface managing all ports. For more
information, please see the relevant manual.
Lets you separate the expansion card switch from that of the main board.
On the next boot, switches will appear segregated and it is possible to configure switches as independent network in-
terfaces with their relative number of ports. BIOS shows the following:
(Example with 8 Ethernet ports on the main board and a 4-Ethernet-port card)
Allows you to set the application-related hardware configuration. Entering a question mark ( ?) after the hardware ap-
plication command causes the device to list all possible options.
+hardware application ?
cores Set number of application cores
+hardware application
Command history:
Release Modification
11.01.04 The application cores option was introduced as of version 11.01.04.
Allows you to select the number of CPU cores used by the applications. The configurable core range allowed de-
pends on the device hardware and the license that is currently loaded. Also, the configured number of cores affects
the way the DRAM memory is allocated. For example, if the application cores option configured is 0, then all the
available memory is assigned to the device firmware (CIT). However, if the application cores is > 0, then the total
memory space is split between the space destined to the device firmware and the space destined to the applications.
Syntax:
When we set a different number of application cores than what is currently set, the following text appears:
When the number of application cores is 0, BIOS shows the next boot:
Mem Info:
DRAM size: 1024 Megabytes
BANK 0: 1024 Megabytes
(There is only one bank, because all the memory is assigned to the device firmware)
When the number of application cores is > 0, BIOS shows the next boot:
Mem Info:
DRAM size: 1024 Megabytes
BANK 0: 256 Megabytes
BANK 1: 768 Megabytes
(Memory is split in two banks. One bank is assigned to the device firmware and the other one is assigned to the ap-
plications)
Command history:
Release Modification
11.01.04 The application cores option was introduced as of version 11.01.04.
+hardware cit ?
cpus Set maximum number of cit cpus
+
Command History:
Release Modification
11.02.01.20.01 This command was introduced as of version 11.02.01.20.1.
11.02.02 This command was introduced as of version 11.02.02.
Configures the number of CPUs that can be used by the CIT for multi-CPU processing. The configurable range al-
lowed depends on the device hardware.
Use the unlimited option to allow the CIT to use all the CPU available in the device hardware.
Syntax:
Example:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
3.2.13 LAST-CONFIG-CHANGES
Allows you to monitor the latest changes made to the configuration. The first row shows the last configuration saved.
Provided you haven't made any configuration changes since startup, this will be the active configuration. If some
changes have been made, the active configuration appears in the second register. The first register is modified each
time the configuration is saved without restarting the device.
Syntax:
+last-config-changes
Example:
+last-config-changes
Last configuration changes
-------------------------------------------------------------------------------
File Acc-Type Address User Date/Time
-------------------------------------------------------------------------------
SAMP1.CFG Console 0.0.0.0 CONSOLE 03/03/05 10:40:29
TFTP.CFG Console 0.0.0.0 usersample 02/28/05 13:37:02
TFTP.CFG Telnet 172.24.51.128 TELNET 02/24/05 15:29:40
TFTP.CFG Telnet 172.24.51.128 TELNET 02/24/05 15:24:21
IGMP.CFG Console 0.0.0.0 usersample 02/24/05 13:45:33
TFTP.CFG Console 0.0.0.0 usersample 02/24/05 11:56:51
TFTP.CFG Console 0.0.0.0 CONSOLE 02/24/05 11:54:51
IGMP.CFG Console 0.0.0.0 usersample 02/23/05 19:34:36
IGMP.CFG Console 0.0.0.0 CONSOLE 02/22/05 17:20:45
+
3.2.14 LAST-APP-VERSION-CHANGES
Allows you to monitor the latest OS version upgrades. The first row shows the latest upgrade on the device. Only the
last 15 upgrades are saved.
Syntax:
+last-app-version-changes
Example:
+last-app-version-changes
Date/Time Date and time this version was loaded onto the device.
Command history:
Release Modification
11.00.05 This command was introduced as of version 11.00.05.
Syntax:
+list current-devices
Example:
+list current-devices
Interface Connector Type of interface
ethernet0/0 GE0/FE0/LAN1 Fast Ethernet interface
ethernet0/1 GE1/FE1/LAN2 Fast Ethernet interface
bri0/0 BRI/ISDN1 ISDN Basic Rate Int
x25-node --- Router->Node
+
Command history:
Release Modification
10.08.34.05.12 This command option was introduced as of version 10.08.34.05.12.
11.00.05 This command option was introduced as of version 11.00.05.
11.01.01 This command option was introduced as of version 11.01.01.
3.2.16 MALLOC-MONITOR
Allows you to monitor the device's internal memory management system. By using the command's options, you can
control the system's memory management diagnostics. The use of this command requires a thorough knowledge of
Teldat Router software and hardware architecture. Do not use this command unless instructed to do so by Teldat
support personnel.
Two malloc-monitor tool versions are available: verbose and builtin. While the former records more information, the
latter stores a log file if the device runs into an out-of-memory situation, making the information permanent. The built-
in version is only available on certain devices, which have it enabled by default. The log file is called memtrace.log
and can be displayed through the malloc-monitor show-stored-log command.
Syntax:
+malloc-monitor <option>
DISABLE
ENABLE
ASSIGNED-MEMORY-BLOCKS
LIST
SHOW-FLAGS
SHOW-STORED-LOG
ALL-REQUESTS
IGNORE-START-REQUESTS-FLAG
NEWEST-REQUESTS-FLAG (less than a minute age)
OLDEST-REQUESTS-FLAG (more than a minute age)
START-RECORD
STOP-RECORD
GET-MEMORY
VIEW-MEMORY
FREE-MEMORY
+malloc-monitor enable ?
builtin Built-in version of malloc monitor
verbose Verbose version of malloc monitor
<cr>
+malloc-monitor enable ?
builtin Built-in version of malloc monitor
verbose Verbose version of malloc monitor
<cr>
Command history:
Release Modification
11.01.08 The show-stored-log, enable builtin, enable verbose, disable builtin and disable
verbose command options were introduced as of version 11.01.08.
3.2.17 MANAGEMENT
Allows you to access the master router's monitoring environment.
Syntax:
+management
Example:
+management
-- Routers management user console--
MANAGEMENT+
3.2.18 MEMORY
Displays information on the different types of memory available on the device.
The first section, system memory, shows summary statistics and highlights the manner in which the system as-
signed RAM. These values are set when the router is booted and do not change while the device is in use.
In the second section, you can see information about heap memory. The data displayed in this section are divided
into four extra sub-sections, separated by a blank line, providing a snapshot of heap memory status. The first sub-
section is a summary of heap usage; the second sub-section lists the current chunks (a size smaller than block size);
the third sub-section provides statistics on chunks that are one size larger than block size. Their statistics are stored
in registers, labeled in arithmetic progression, based on their chunk size; the fourth sub-section provides statistics on
chunks that are a size bigger than those displayed in the previous sub-section. Statistics on the latter are stored in
registers, labeled in geometric progression, based on their chunk size.
• Total : amount of memory assigned to the heap, including internal system data.
• Usable: maximum amount of memory the heap can allocate to support running processes.
• Free: free memory in the heap.
• Block size: the heap is divided into n sized blocks.
Chunk usage is a global measurement used for chunks that are currently assigned and are smaller than the block
size.
In this second sub-section, a number of assigned chunks, for a given size, is allocated as needed by taking memory
space from the chunks displayed in subsequent sub-sections. The more chunks in this sub-section, the less size for
chunks in subsequent sub-sections.
The third and fourth sub-sections of the heap show the following data:
As already mentioned, it is important to understand that statistics for chunk sizes in the third sub-section are re-
gistered in arithmetical progression, while in the fourth sub-section they are stored geometrically. This means that, in
the third sub-section, the number of assigned bytes for a chunk size is calculated by multiplying the chunk size by the
number of chunks, and this does not match the fourth sub-section.
Chunk sizes for registers in the third sub-section are separated by block size. The first line in the example is inter-
preted as follows: the register with the 12288 byte-sized chunks, has 85 allocated chunks with a total size of
1044480 bytes. The maximum number of concurrently assigned chunks for this register is 85 and there are no free
chunks of 12288 bytes to be stored in this register.
Chunk sizes for registers in the fourth sub-section are separated by a multiple of block size, resulting in the evolution
of registered chunk sizes in a geometrical progression form. Here, each register shares statistics between different
chunk sizes; this is what happens in the second line of the previous example. This line is interpreted as follows: in
the register for chunk sizes between 16822272 bytes and the next registered chunk size, there are two allocated
chunks with a total size of 54730752 bytes. The maximum number of chunks concurrently assigned for this register
is two and there are no free chunks with said size to be stored in this register.
Please note that statistics relating to different chunk sizes may not be available on your device model. If this is the
case, global information on used and free chunks is displayed instead.
The third section displays information relating to memory pool1. pool1 is an area of memory broken up into fixed
partitions reserved for messages and buffers from the node.
Syntax:
+memory ?
history-48h Show 48h mem history
<cr>
+memory history-48h [<max_hour>] [<min_hour>]
Example:
+memory
SYSTEM MEMORY:
Total 536870912
Dynamically managed 502296576
Code 34574336
Caches ON Write Back
HEAP:
total 502296576
usable 501772288
free 377067688
block size 4096
8 bytes chunks: 39936 ( 319488 bytes) total, 345 ( 2760 bytes) free
16 bytes chunks: 5888 ( 94208 bytes) total, 244 ( 3904 bytes) free
32 bytes chunks: 35072 ( 1122304 bytes) total, 105 ( 3360 bytes) free
64 bytes chunks: 7168 ( 458752 bytes) total, 24 ( 1536 bytes) free
128 bytes chunks: 544 ( 69632 bytes) total, 11 ( 1408 bytes) free
256 bytes chunks: 80 ( 20480 bytes) total, 4 ( 1024 bytes) free
512 bytes chunks: 28968 ( 14831616 bytes) total, 1 ( 512 bytes) free
1024 bytes chunks: 56 ( 57344 bytes) total, 0 ( 0 bytes) free
2048 bytes chunks: 36934 ( 75640832 bytes) total, 0 ( 0 bytes) free
Chunk usage: 99.00%
4096 bytes chunks: 22638 ( 92725248 bytes) used ( 22638 max), 0 ( 0 bytes) free
8192 bytes chunks: 28 ( 229376 bytes) used ( 28 max), 0 ( 0 bytes) free
12288 bytes chunks: 85 ( 1044480 bytes) used ( 85 max), 0 ( 0 bytes) free
16384 bytes chunks: 45 ( 737280 bytes) used ( 45 max), 0 ( 0 bytes) free
20480 bytes chunks: 10 ( 204800 bytes) used ( 10 max), 0 ( 0 bytes) free
24576 bytes chunks: 1 ( 24576 bytes) used ( 1 max), 0 ( 0 bytes) free
32768 bytes chunks: 1 ( 32768 bytes) used ( 1 max), 0 ( 0 bytes) free
36864 bytes chunks: 13 ( 479232 bytes) used ( 13 max), 0 ( 0 bytes) free
POOLS:
POOL1 Sz:9631710 AllocPart:1 AvlPart:27917
Run the memory history-48h command to display a graph showing the status of free memory from the last 48
hours:
+memory history-48h
Free memory percentage during the last 48 hours (%):
666666666666666666666666666666666666666666666666666666666666
100_ 999999999999999999999999999999999999999999999999999999999999
95_|
90_|
85_|
80_|
75_|
70_|
65_|............................................................
60_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
55_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
50_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
45_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
40_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
35_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
30_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
25_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
20_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
15_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
10_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
5_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
0_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
48h. 36h 24h 12h 0h
In this example we can see that memory usage was stable during the last 48 hours, with 69% of the available free
memory used. The available command options enable you to select an hour range for which to graph data.
Important
The command's output may vary slightly according to your router model.
Command history:
Release Modification
11.01.08 The memory history-48h command option was introduced as of version 11.01.08.
3.2.19 NETWORK
Displays the monitoring prompt for the specified network interface (supported networks include Frame Relay, PPP,
X.25, etc.). From the prompt, you can display statistical information.
Syntax:
+network <interface>
• < interface > is the name of the network interface whose monitoring environment we want to access.
Type the device command at the plus prompt (+ ) for a list of the networks for which the router is configured.
Example:
+device
Auto-test Auto-test Maintenance
Interface CSR Vect valids failures failures
ethernet0/0 fa200e00 27 1 0 0
serial0/0 fa200a00 5E 0 373 0
serial0/1 fa200a20 5D 0 373 0
serial0/2 fa200a60 5B 0 10 0
bri0/0 fa200a40 5C 1 0 0
x25-node 0 0 1 0 0
+network serial0/0
Syntax:
+node <name>
X25
XOT
270
• < name > is the name of the node whose monitoring menu we want to access.
Allows you to access the X.25 node monitoring environment. Port parameters can be configured in the network port
(+networkport command).
Syntax:
+node x25
Example:
+node x25
-- X25 Monitor --
X25+
For more information on the X.25 node configuration environment, please see the following manual: Teldat Dm707-I
X.25.
Allows you to access the 270 node monitoring environment. You can also gain access from the 270 network (+ net-
work port command).
Syntax:
+node 270
Example:
+node 270
270 Monitoring
270>
3.2.21 PROTOCOL
Allows you to access the command environment of the software protocols installed on your router. Typing the pro-
tocol command followed by the desired protocol number, or short name, accesses a protocol's command environ-
ment. After you enter this command, the prompt of the specified protocol appears. From the prompt, you can enter
commands that are specific to that protocol.
Syntax:
+protocol <identifier>
• < identifier > is the name of the protocol whose monitoring menu we want to access.
Example:
+protocol ?
arp Access ARP protocol
asrt Access ASRT protocol
bfd Access BFD protocol
bgp Access BGP protocol
dhcp Access DHCP protocol
dhcpv6 Access DHCPv6 protocol
dls Access DLS protocol
dot1x Access 802.1X protocol
gw104 Access GW-104 protocol
h323 Access H323 protocol
igmp Access IGMP protocol
ip Access IP protocol
ipv6 Access IPv6 protocol
l2tp Access L2TP protocol
mgcp Access MGCP protocol
nhrp Access NHRP protocol
noe Access NOE protocol
ospf Access OSPF protocol
pim Access PIM protocol
rip Access RIP protocol
ripng Access RIPNG protocol
sccp Access SCCP protocol
sip Access SIP protocol
snmp Access SNMP protocol
+protocol ip
-- IP protocol monitor --
IP+
3.2.22 QUEUE
Shows statistics about the input and output queues on the specified interfaces. Information provided by the queue
command includes:
Syntax:
+queue <interface>
• < interface > is the name of the network interface whose monitoring environment we want to access.
Example:
+queue
Input Queue Output Queue
Interface Alloc Burst Low Curr Min Cur.Req Max.Req Fair Current Max
ethernet0/0 256 16 5 256 256 256 257 246 0 0
ethernet0/1 256 16 5 256 0 256 256 246 0 0
x25-node 0 --- 0 100 0 0 0 40 0 0
ethernet1/0 40 16 5 40 40 40 41 40 0 0
+
• Input Queue
• Output Queue
Fair Fair level for the length of the output queue on this device.
Current Number of packets currently waiting to be transmitted on this device.
Max Maximum number of buffers in the device's output queue. As of version 11.01.01, this field is no
longer available.
The router attempts to keep at least the Low value packets available for receiving over an interface. If a packet is re-
ceived and the value of Curr is less than Low, then the packet will be subject to flow control. If a buffer subject to flow
control is to be queued on this device and the Curr level is greater than Fair, the router drops the buffer instead of
placing it in the queue. The dropped buffer is displayed in the Output Discards column of the error command. It will
also generate ELS event GW.036 or GW.057.
Command history:
Release Modification
11.01.01 The Min and Max fields are obsolete as of version 11.01.01.
3.2.23 QUICK
To access the quick monitoring menu you must first access the general monitoring menu and type quick. This com-
mand accesses the quick monitoring menu.
Syntax:
+quick
Example:
+quick
Quick Monitor Menu
Quick Monitor+
Command history:
Release Modification
11.00.02 This command is obsolete as of version 11.00.02. The quick menu configuration is no
longer supported.
3.2.24 RUSH-ENGINE
Displays statistical information about the rush engine and the existing flows on each interface.
Syntax:
+rush-engine ?
all Monitor all interfaces
fragmentation-control Monitor Fragmentation control
interface Monitor interface information
ipsec Monitor IPSec interfaces
local Monitor local interfaces
state Display Rush Engine state
+
Command history:
Release Modification
11.01.00 This command was introduced as of version 11.01.00.
11.01.06 The "local" and "ipsec" command options were introduced as of version 11.01.06.
Displays global state and statistical information on all interfaces. You can set up a filter to display only the flows that
match that filter.
This command may also be used to display only a summary of the statistics, clear current counters and remove all
flows from the rush engine.
Using the verbose option, advanced statistics and status info on the Rush interfaces and flows are displayed, e.g.,
multi-CPU counters.
Syntax:
Example:
Command history:
Release Modification
11.01.00 This command option was introduced as of version 11.01.00.
Release Modification
11.01.04 A command option to filter via the IPv6 protocol was included. Information on the input
port in switches and input/output sub-interfaces is displayed.
11.01.06, New items have been added to the monitoring command's output: the time elapsed since
11.01.05.30.01 the last cache invalidation and flow statistics update bursts.
11.01.06 The "local" and "ipsec" command options were introduced as of version 11.01.06.
11.01.07 New items have been added to the monitoring command's output: hashed BRS class and
priority for forked flows, the interface output name and statistics on deleted flows usage.
11.01.09 The "summary" command option was introduced as of version 11.01.09.
11.02.01.20.01, New items have been added to the monitoring command's output: the status of the off-
11.02.02 loading capability and specific entries for offloaded flows (designated by prefix "O").
11.02.01.20.01 The verbose option was introduced as of version 11.02.01.20.1.
11.02.02 The verbose option was introduced as of version 11.02.02.
Displays status info and statistics on the fragmentation control feature in the Rush Engine. Fragmented IP packets
processed by the fragmentation control feature are tracked via control entries. Every control entry is a virtual entity
that is used to save the status of the processing of a IP fragmented packet, e.g., the number of fragments belonging
to a given packet that are currently being received.
Every interface that supports fragmentation control is provided with a finite number of control entries. Thus, Rush
Engine monitoring is able to save and display the status info and statistics on the fragmentation control entries with
interface granularity.
Syntax:
+rush-engine fragmentation-control ?
clear Clear statistics
dump Dump fragmentation control entries
verbose Show detailed information
<cr> Show status
+
Executing this command with no options displays a summary of the current status of the fragmentation control fea-
ture.
Example:
+rush-engine fragmentation-control
Fragmentation Control is Enabled
When some interface processes IP fragments, a table is shown with statistics related to the fragmentation-control
entries being used.
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Sets all statistics and counters related to the fragmentation-control feature to initial values.
Syntax:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Syntax:
The verbose option is used to display advanced info on the fragmentation control status for every interface, useful
for diagnosis and debugging.
Example:
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Displays advanced info on the fragmentation control status for every interface, useful for diagnosis and debugging.
Syntax:
Example:
Interface Ref Flags Limit Max Free Current Processed (dispatch, fallback, rec., age, del)
ipsec'VPN 2 ---E- 100 0 0 0 0 (0, 0, 0, 0, 0)
ipsec'main 2 ---E- 100 0 0 0 0 (0, 0, 0, 0, 0)
ethernet0/2 2 ---E- 100 0 0 0 0 (0, 0, 0, 0, 0)
ethernet0/1 2 ---E- 100 0 0 0 0 (0, 0, 0, 0, 0)
ethernet0/0 2 GATE- 100 62 62 0 557054 (555989, 20, 0, 1045, 0)
local'VPN 2 ----U 100 0 0 0 0 (0, 0, 0, 0, 0)
local'main 2 ----U 100 0 0 0 0 (0, 0, 0, 0, 0)
loopback2 2 GATE- 100 2 2 0 556009 (555993, 16, 0, 0, 0)
loopback1 2 ---E- 100 0 0 0 0 (0, 0, 0, 0, 0)
Command History:
Release Modification
11.02.01.20.01 This option was introduced as of version 11.02.01.20.1.
11.02.02 This option was introduced as of version 11.02.02.
Displays information on one interface. You can specify a filter to display only the flows that match that filter.
This command may also be used to display a summary of the statistics, clear current counters and remove all flows
in the interface from the rush engine.
Using the verbose option, advanced statistics and status info on the Rush interface and flows are displayed, e.g.,
multi-CPU counters.
Syntax:
Example:
Command history:
Release Modification
11.01.00 This command option was introduced as of version 11.01.00.
11.01.04 A command option to filter via the IPv6 protocol was included. Information on the input
port in switches and input/output sub-interfaces is displayed as of version 11.01.04.
11.01.09 The "summary" command option was introduced as of version 11.01.09.
11.02.01.20.01 The verbose option was introduced as of version 11.02.01.20.1.
11.02.02 The verbose option was introduced as of version 11.02.02.
Shows the rush engine status, offloading capability status, the time elapsed since the last cache invalidation, the cur-
rent idle flow timeout value, the burst length for flow statistics updates, information relating to the amount of memory
used by internal structures, and statistics about deleted flows usage.
Syntax:
+rush-engine state
Command history:
Release Modification
11.01.00 This command option was introduced as of version 11.01.00.
11.01.06, New items have been added to the monitoring command's output: the time elapsed since
11.01.05.30.01 the last cache invalidation and flow statistics update bursts.
11.01.07 Statistics on deleted flows usage have been added to the monitoring command's output.
11.02.01.20.01, The status of the offloading capability has been added to the monitoring command's out-
11.02.02 put.
3.2.25 STATISTICS
Displays statistical information related to the network software, such as the router's network configuration.
Syntax:
• < interface > is the name of the network interface whose monitoring environment we want to access.
• Use the verbose option to display statistics per-CPU in devices with multi-CPU capability.
To see the networks for which the router is configured, type the device command at the + prompt. If no network in-
terface is specified, information about the available networks on the device is displayed.
Example:
+statistics
Unicast Multicast Bytes Packets Bytes
Interface Pqts Rcv Pqts Rcv Received Transmitted Transmitted
ethernet0/0 0 5384 3090255 0 0
serial0/0 0 0 0 0 0
serial0/1 0 0 0 0 0
serial0/2 0 0 0 0 0
bri0/0 0 0 0 0 0
x25-node 0 0 0 0 0
+
Example:
+statistics verbose
Command History:
Release Modification
11.02.01.20.01 The verbose option was introduced as of version 11.02.01.20.1.
11.02.02 The verbose option was introduced as of version 11.02.02.
3.2.26 SYSTEM
Allows you to monitor system memory, stacks and CPU usage; configure the console port speed; display the firm-
ware needed for the proper functioning of the device; activate certain debugging information; display user login his-
tory; view open Telnet and SSH sessions; and exchange commands or messages between the terminals corres-
ponding to those open sessions.
Syntax:
+system <option>
ap-embedded Embedded AP control actions
console-speed Configure the console-serial port speed.
cpu-graph Display a system load measurement graph
cpu-history-48h Display the system load for the last 48 hours
cpu-text Display the average load in the system
dba-debug DBA subsystem debug level
disable-process-monitor Disable CPU load monitoring of processes
enable-process-monitor Enable CPU load monitoring of processes
firmwares-required Display the firmware required
health Display information about equipment status
http Display information on the users connected by HTTP
licence Show information about licences in the equipment
login Shows if the difference between upper and lower
case characters is activated
login-historic Display a list containing information on the users
who have accessed the management console
memory Display statistics on the system memory
pcmcia Access the PCMCIA interface status monitoring
power-off-status Display power off timers and ignition status
process-list Display the system processes status
ssh Display information on the users connected by SSH
stack-status Display the system stack status
telnet Display information on the users connected to the
device
telnet-clients Display information on open Telnet sessions to
remote devices
terminal Interchange commands or messages between terminals
usb Access the USB interface status monitoring
+
Performs actions over the embedded Wi-Fi access-point (only possible in devices where this is available).
Syntax:
+system ap-embedded ?
factory-reset Perform a factory reset
hard-reset Perform a hard reset
+system ap-embedded
Command history:
Release Modification
11.01.08 The "system ap-embedded" command option was introduced as of version 11.01.08.
The user must make sure the AP is not writing in its Flash memory. Otherwise, it can become corrupted.
Example:
Command history:
Release Modification
11.01.08 The "system ap-embedded factory-reset" suboption was introduced as of version
11.01.08.
The user must make sure the AP is not writing in its Flash memory. Otherwise, it can become corrupted.
Example:
Command history:
Release Modification
11.01.08 The "system ap-embedded hard-reset" suboption was introduced as of version 11.01.08.
Syntax:
< speed > is the speed in bits per second (bps) to set. Valid values are 9.600, 14.400, 19.200, 38.400, 57.600 and
115.200.
Example:
Displays a graph of the CPU used (as a percentage) over the last five minutes. The data runs from left to right, with
the oldest values to the left and the most recent to the right. Each column represents the load over 5 seconds and is
displayed both in graphical (a vertical bar of points that ascends to the corresponding percentage) and in numerical
format (written vertically from top to bottom).
Syntax:
Example:
+system cpu-graph
CPU usage during the last 5 minutes (%):
211122222211111111111111111111111111111111111111111111111111
100_ 588837877797797777777777777777777777777777777777777777777777
90_|
80_|
70_|
60_|
50_|
40_|
30_|
20_|. ..:...
10_|:::::::::::..:..............................................
0_|::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
5min. 1min. 0
In this example, we can see that five minutes ago (left column) there was a 25 % load (vertical reading at the top of
that column). This load changed over time (18 % in the next 15 seconds, 23 % in the following 5 seconds, etc.) be-
fore stabilizing at the current 17 % load (right column).
In devices with multi-CPU capability, use the verbose option to display CPU usage for every CPU in a separate
graph. Additionally, the total CPU usage is displayed in the last graph (calculated as the average of all the per-CPU
values).
Command History:
Release Modification
11.02.01.20.01 The verbose option was introduced as of version 11.02.01.20.1.
11.02.02 The verbose option was introduced as of version 11.02.02.
Provides a graph of the system's CPU usage over time (up to a maximum of 48 hours). The data runs from left to
right with the oldest values in time to the left and the most recent to the right. The CPU load values vary depending
on the time range displayed on the graph's horizontal axis. Thus, a 2-hour time range shows the maximum CPU us-
age percentages of each 2-minute interval, and a 48-hour time range shows the maximum percentages of each
48-minute interval. The numerical percentage values are at the top of the graph and are read vertically from top to
bottom. The command allows you to specify a time range in viewing hours within the available history.
Syntax:
Example 1:
+system cpu-history-48h
CPU usage during the last 48 hours (%):
21
100_ 225222222222222222222222222222229262222222222222222232422222
95_|
90_|
85_|
80_|
75_|
70_|
65_|
60_|
55_|
50_|
45_|
40_|
35_|
30_|
25_|
20_| .
15_| :
10_| ::
5_| :::
0_|..:.............................:::........................
48h. 36h 24h 12h 0h
In this example, all the available history up to the current time is displayed because no input parameters have been
specified. The time range shown is 3 to 0 hours because the device has not been in operation for more than three
hours. In this way, each percentage value in the graph represents the maximum CPU usage over a 3-minute interval.
The range of the horizontal axis will automatically increase while the device stays in operation, up to a maximum of
48 hours. After this time, the axis will remain in the range between 48 and 0 hours.
Example 2:
+system cpu-history-48h 12 3
CPU usage in range from 12 to 3 hours ago (%):
100_ 222222222322222222222222222222259222222222222222222223124222
95_|
90_|
85_|
80_|
75_|
70_|
65_|
60_|
55_|
50_|
45_|
40_|
35_|
30_|
25_|
20_|
15_|
10_|
5_| : :
0_|.........:.......................:.....................:.....
12h. 11h 7h 3
In this example, the max_hour and min_hour parameters have been specified. They determine that the display time
ranges from 12 to 3 hours prior.
In devices with multi-CPU capability, use the verbose option to display the CPU usage for every CPU in a separate
graph. Additionally, the total CPU usage is displayed in the last graph (calculated as the average of all the per-CPU
values).
Command History:
Release Modification
11.02.01.20.01 The verbose option was introduced as of version 11.02.01.20.1.
11.02.02 The verbose option was introduced as of version 11.02.02.
Syntax:
Example:
+system cpu-text
CPU Short-Term Usage (5 sec.): 24.5%
CPU Medium-Term Usage (1 min.): 19.2%
CPU Long-Term Usage (5 min.): 17.6%
+
In devices with multi-CPU capability, use the verbose option to display the CPU usage for every CPU in a table row.
Additionally, the total CPU usage is displayed in the last row (calculated as the average of all the per-CPU values).
Example:
Id Usage % (5s/1m/5m)
================================
main 18.7 18.7 18.7
aux1 0.1 0.1 0.1
--------------------------------
Total 9.4 9.4 9.4
Command History:
Release Modification
11.02.01.20.01 The verbose option was introduced as of version 11.02.01.20.1.
11.02.02 The verbose option was introduced as of version 11.02.02.
Disables system process monitoring, thus preventing you from obtaining CPU usage statistics by process. Process
monitoring is disabled when the device is booted.
Syntax:
+system disable-process-monitor
Example:
+system disable-process-monitor
Process monitoring disabled
+
Enables system process monitoring, allowing you to obtain CPU usage statistics by process. Process monitoring is
disabled when the device is booted.
Syntax:
+system enable-process-monitor
Example:
+system enable-process-monitor
Process monitoring enabled
Equipment performances can be affected while process monitoring is enabled.
+
Note
Syntax:
+system firmwares-required
Example:
+system firmwares-required
List of required firmwares for detected hardware
------------------------------------------------
Filename Description
-------------- ---------------------------------------------------
fw000000.bfw Alcatel-SGS Thomson DynaMiTe ADSL over POTS
+
Command history:
Release Modification
11.00.05 This command option was introduced as of version 11.00.05.
11.01.01 This command option was introduced as of version 11.01.01.
Note
This command is only available on devices designed to report this information (not all devices can do
so).
Syntax:
+system health ?
fan Print fan current speed
psu Print PSU voltage output value
temp Print temperature values
+system health
Note
This command is not available on devices without fans or on devices with fans that are unable to report
speed.
Example 1:
Shows the current PSU (Power Supply Unit) voltage measurements and the expected value range within which the
voltage of each PSU is considered normal.
Note
This command is not available on devices with PSUs that are unable to report voltage values.
Example 1:
Command history:
Release Modification
11.00.07 The command output has changed as of version 11.00.07. The value range within which
the voltage of each PSU is considered normal is shown.
11.01.05 The command output has changed as of version 11.01.05. The value range within which
the voltage of each PSU is considered normal is shown.
11.01.01.60.06 The command output has changed as of version 11.01.01.60.06. The value range within
which the voltage of each PSU is considered normal is shown.
Shows the temperature values of the various temperature probes. This command also shows the maximum value for
each probe where temperatures begin to be considered abnormal.
Note
Example 1:
Command history:
Release Modification
11.00.07 The command output has changed as of version 11.00.07. For each probe, the maximum
value from which the temperature is considered abnormal is shown.
11.01.05 The command output has changed as of version 11.01.05. For each probe, the maximum
value from which the temperature is considered abnormal is shown.
11.01.01.60.06 The command output has changed as of version 11.01.01.60.06. For each probe, the
maximum value from which the temperature is considered abnormal is shown.
Allows you to view information about the users currently connected to the Web.
Example:
+system http
Command history:
Release Modification
10.08.34.05.12 This command option was introduced as of version 10.08.34.05.12.
11.00.05 This command option was introduced as of version 11.00.05.
11.01.01 This command option was introduced as of version 11.01.01.
Syntax:
+system licence ?
check Check licence file previously loaded
create Create a licence file
files Show information about licence files loaded in the equipment
+system licence
Command history:
Release Modification
11.01.01 This command option was introduced as of version 11.01.01. This system is in use as of
version 11.01. It is not available on earlier devices.
Allows a user to check a created license file to find out whether it is valid or has any unsupported parameters (for the
current OS version).
Example 1:
Example 2:
Example 3:
Allows a user to create a license file. Once created, the file is checked to see whether it contains a valid license or
has any unsupported parameters for the current OS version.
Example 1:
Example 2:
382c2778e0989c6c1055fac7f3e9f0b7dd0a602cbd2b19d8ce47d878548744da
ddb5ebbba890c0d5920be99ce6422b1efff771e0d58e7e09779457d36fffa83a
0db39927c407592cd28401de53e87c6b8a5e174dfc5ccf503dbceca1556c29b6
02acae82650f4c033f3602419589f8286e8d1bca9ea98ccd76112294a44d804f
715a1650c1dd23ae1bede429f0996bcc044be7f6f3ed7983d5799e5f88288bc0
452d3d32e84cef7b6f49756f01cf72a354503b3d4c8405937eeca3a7330627b2
27c5f2ce4159b23de53d37acfba69e5cc5c9ba003a2e41e68af9dde526f31c63
327b1c5d2aa866fabc929d55bfdda7e07ad54545cb916a547642802e45821e90
1dd9374690fe8bf252629013c1f7b36d090a24d6deb2037ebffbb4e93848d2ae
971dad85f2c44855209d431208bca92603f0fe3716807be3406f5bdc135df0cd
e2bbf1afcb8b1a4984875d484bb69588f384acef044966f8997b161a67de6eac
ddd87acb4882162a16386deb59b51e78b9b7c9e7044346355511abba486dbed9
82cf7f652602ba1fbc1ab18c884c0ad9d4ed24ff8605e46956b7ae6cdeaf16f1
8fb08c8cb1034b6c436f2d98d151d1e1287ff809ce0b37d28205863f0dcdd241
77bce49a35a4c817c2c91230b561449de839f5cfc135deaf822bb33ee0f4dd76
f6ebb4fa92a76bd89b90749ea959404cdfdc1cd1ee48286af26874b810d52f0f
ad66164e56f2b65a9e804fd71ade72990a9d6cdbd66bac765794b249dc2559b9
d50de1a46a0f184b4b28e0c48cd62ed188a457bb6dac728cb3973f09fe1e20e4
d5f14daa6cac17c3106b495871ed508f318f1191fc79ace39eef646c31fd2c16
afdb69f4b71c1afce2038b98a8123495cbeca894ad27fd83682fc2be1e82c6de
7dc457df82d5af6964f9c7296ef7b5b9b6c2f152b16f52e3d97a7b47f2739e71
1a5b639ec0f0759d8b2edd06ad944b250d0940ad45ec4c57e10cb8752818ae3f
9f82e36c0cad869680d647674fa4254cb32df225e69e381b95b170ae4ac0221f
12d1ec0894ec795e3df85b0b262665588a8fcb43946995ecb64c8e95713c5ad4
ac12d4e1d2b4f51558efca686fdd5ff6fc041f1676972f801e5258ec625fef0d
4ac380a4f2afced23eec7971dcd1f4b46a54c9230052c851374c335f0a84d625
4c978f0fd1acb8f11771a8ee2dccf06b8abcfb4e7f2b4e900c59afdcdd078a39
ebf54439fe1d87bd6bd766aa2ade825ab86d2020206c6963656e63650a096261
73652d6465766963652058595a0a0966756e6374696f6e616c697479204d3547
0a09636865636b0a202020657869740a5836dc6b85dd442958ceb184c52430a3
File Successfully Saved
CLI Error: Error checking licence
Warning: possible errors in the configuration, at least these found:
line 4 -> check
CLI Error: Invalid functionality M5G.
Allows a user to check whether the device processed the license file properly on startup and whether the license is
applied or discarded (due to errors).
Example 1:
Example 2:
Shows whether case-sensitive authentication is enabled in the username authentication process when the device is
accessed. Then it shows a list of information about users who have accessed the Teldat console and asks whether
we want to delete the login history.
Syntax:
+system login
Example:
+system login
Case-sensitive login: enabled
Displays a list of information about users who have accessed the console and asks whether we want to delete the lo-
gin history.
Syntax:
+system login-historic
Example:
+system login-historic
Date Login Type
-------------- ---------- ------
01/03 10:41:01 root REMOTE
01/03 10:42:05 user1 REMOTE
02/04 16:58:06 LOCAL
02/04 16:58:19 user1 REMOTE
02/04 16:59:55 user1 REMOTE
03/07 10:09:49 omateo REMOTE
03/07 10:26:29 rsanchez LOCAL
03/07 10:27:06 user1 REMOTE
03/07 10:30:06 root REMOTE
Syntax:
+system memory
Example:
+system memory
Caller Second C. Third C. Address Size Age Hsh
-------------------------------------------------
xxxxxxx xxxxxxxx xxxxxxxx xxxxxx xxxx xxxxx xxxxxx
Note
Allows you to access the PCMCIA interface monitoring environment at the physical layer (controller and card).
Syntax:
• <option> specifies the action to be performed: enable/disable events [DEBUG] or dump controller and card status
information [DUMP].
• <parameters> are the necessary parameters for the different actions available.
Example:
For more information on how to monitor the PCMCIA interface, please refer to the following manual: Teldat Dm757-I
PCMCIA UMTS Interface.
Shows the current status of the ignition signal and the value programmed in the timer. If the ignition signal is dis-
abled, it also shows how much time has elapsed since it was switched off.
Syntax:
+system power-off-status
Example 1:
+system power-off-status
Ignition signal state ACTIVE
Programmed time to power off: 60 seconds
+
Example 2:
+system power-off-status
Ignition signal state INACTIVE
Programmed time to power off: 60 seconds
Time elapsed with ignition off: 10 seconds
+
Displays the percentage of CPU usage and stack status of each of the active processes in the system. The com-
mand displays three CPU usage percentages for the last 5 seconds, 1 minute and 5 minutes, respectively. You need
to enable process monitoring before you can use this command. There are three types of processes:
(a) Interrupts. This is the highest priority process and is responsible for attending to the requests of the different
hardware components, such as packet receipt or a change in an interface's physical layer.
(b) High level interrupt handler. These processes are responsible for attending to higher level (lower priority) inter-
ruptions captured by the Interrupts process.
(c) Task. These processes are responsible for the remaining tasks on the device, such as monitoring, configuration,
routing protocols, etc.
Syntax:
+system process-list
Example:
+system process-list
Process monitoring enabled.
Stack status and CPU load for each process.
Type: I (interrupts), H (high level interrupt handler), T (task)
Note
Enabling process monitoring can adversely affect the performance of the device.
Displays information on the users that are connected to the device by SSH.
For more information, please see the following manual: Teldat Dm787-I SSH Protocol .
Syntax:
+system ssh
Example:
+system ssh
Shows the stack status of each system process. Each system process has its own stack memory (where the current
process's state is stored). This command allows you to see the status of the stack of each of the active processes in
the system. There are four types of processes:
(1) Startup. These processes are run at the very beginning and are in charge of setting up the system, reading the
configuration, and carrying out other initialization tasks. The stacks used by the startup processes are deleted
later on, but the status is saved for future reference.
(2) Interrupts. This is the process with the highest priority and it answers the requests of different hardware com-
ponents, such as a packet reception request or a request to change an interface's physical layer.
(3) High level interrupt handler. These processes are responsible for attending to higher level (lower priority) inter-
ruptions captured by the Interrupts process.
(4) Task . These processes are responsible for the remaining tasks (such as monitoring, configuration, routing pro-
tocols, etc.).
Syntax:
+system stack-status
Example:
+system stack-status
Stack status for each process.
Type: S (startup) I (interrupts), H (high level interrupt handler), T (task)
Note
Command history:
Release Modification
11.01.05 The "startup" process under the "system-stack status" command was introduced.
Displays information about the users that are connected to the device.
Syntax:
+system telnet
Example:
+system telnet
parameter will be 0.
An asterisk next to the idle time field indicates the session from which you are accessing.
Displays information about open Telnet sessions between the router and the remote devices.
Syntax:
+system telnet-clients
Example:
+system telnet-clients
Session Local-user VRF Local-IP Remote-IP Session-start URL
------------------------------------------------------------------------------------
1 tel1 <main> 172.16.0.1 172.16.0.2 10/02/12 12:15:48 --
2 tel2 <main> 172.16.0.1 172.16.0.24 10/02/12 12:15:49 --
3 tel3 <main> 2001:db8:1::2 2001:db8:1::1 10/02/12 12:15:50 --
4 tel4 <main> 172.16.0.1 172.16.0.2 10/02/12 12:15:51 --
17 tel17 vrf2 172.17.0.1 172.17.0.2 10/02/12 12:16:04 --
Allows you to exchange messages and commands between the terminals of the different sessions established with
the monitored device.
Syntax:
Forces a session to close. Once this command is executed, no other data is taken into account. Instead, the user is
shown a list of active sessions and asked to select the one he wants to terminate. This command is only available to
users with ROOT privileges (access level 15).
Example:
Sends the escape character (Ctrl+p by default) to a particular terminal session. Once this command is executed, no
other information is taken into account. Instead, the user is shown a list of active sessions and asked to select the
one to which he wants to send the escape character; thus causing the user that initiated the other session to leave
the console menu. This command is only available to users with ROOT privileges (access level 15).
Example:
Allows a user to send a message to another terminal (i.e., to the user of another session established with the mon-
itored device). Once this command is executed, no other information is taken into account. Instead, the user is
shown a list of active sessions and asked to select the one to which he wants to send a message (-1 to send the
message to all sessions). He is then asked to type the message. This command is available to all users with MONIT-
OR-level access or above.
Example:
Allows you to access the USB monitoring environment at the physical layer (controller and card).
Syntax:
• <option> specifies the action to be performed: enables/disables events [DEBUG] or lists any available information
on the various options [LIST].
• <parameters> values that need to be entered to carry out the available actions.
Example:
3.2.27 TFTP
Accesses the device's Trivial File Transfer Protocol (TFTP) client.
Syntax:
+tftp
Example:
+tftp
TFTP manager
TFTP+
For more information on the TFTP client interface, please see the following manual: Teldat Dm765-I TFTP Protocol.
3.2.28 TELEPHONY
Provides access to the device's VoIP telephony monitoring environment.
Syntax:
+telephony
Example:
+telephony
Telephony Monitor
Telephony Mon+
For more information on this monitoring environment, please see manual: Teldat Dm722-I Telephony Over IP.
3.2.29 UCI
Allows you to configure the Teldat Router's encryption unit.
Syntax:
+uci <option>
HELP_STATISTICS
INIT_STATISTICS
LINE_X25
RESET_LINE_X25
STATISTICS
GENERAL_CRYP
CLEAR_STACRYP
Example:
+uci help_statistics
Statistics meanings
RECEIVED FRAMES REJECTED
TOO_LARGE: The received frame has, or has not, too large size
coincided with encryption header
FAILURE: Frame reception failure
WITHOUT.LINE: Frame received but impossible to be transmitted to
destination because the receiver was not ready
WRONG.ENCRYPT: Impossible to encrypt a received frame
WITHOUT.MEM: Not enough memory for the transmitted frame
PROCESSED FRAMES
ENCRYPTED: Frames encrypted correctly
DECRYPTED: Frames decrypted with DLCI key
DEC.KEY.DEF: Decrypted frames with the default key, not decrypted
with the DLCI key
3.2.30 UPTIME
Displays time statistics about the device, including the current date and time and the time elapsed since the last re-
start.
Syntax:
+uptime
Example:
+uptime
Command history:
Release Modification
11.00.03 New command added.
3.2.31 VERSION
Displays all the information related to hardware, license, boot ROM version, software version, cellular driver and
wireless LAN driver versions, and generic web version (if the device supports this functionality).
Syntax:
+version
Example:
+version
System Info:
PCB:0x13A GPPORCR:0x00000000 PVR:0x80212151 SVR:0x80F90110
CLKs: CCB=396000 CPU0/1=792000/0 DDR(clk)=330000 LBUS=99000 PCI0/1=0/0
Watchdog:Enabled
MMU Mode:Dynamic
ICache:ON DCache:ON Write-Back L2Cache:ON
Command history:
Release Modification
11.00.03 New command added.
11.02.03 Generic Web Version output added as of version 11.02.03.
3.2.32 WEB-PROBE
Accesses the web-probe monitoring menu.
Syntax:
+web-probe
Example:
+web-probe
-- Web Probe user monitoring --
PROBE+
3.2.33 LOG
Provides additional information on device operation. It is only useful when carrying out Teldat technical support
tasks. This information is shown as a hexadecimal dump per screen.
Syntax:
+log <number>
Example:
+log 5
0000 0000 0100 004A 0D0A 3031 2F30 312F
3030 2030 303A 3030 3A30 3020 392E 312E
3720 4D61 7220 3133 2032 3030 3220 3137
3A33 303A 3139 2062 7920 2020 6D62 6572
726F 6A6F 206F 6E20 204D 4245 5252 4F4A
4F32 007D
+
The output of this command varies for newer versions, where the actual log is contained between two tags. To prop-
erly read the log given, copy the BEGIN LOG and END LOG tags and the content itself. Here is an example of the
output given:
+log 100
-----BEGIN LOG-----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-----END LOG-----
+
Command history:
Release Modification
11.01.08 The "log" command's output format changed as of version 11.01.08.
4.1 Introduction
This chapter describes the Event Logging System (ELS). It also describes the VISEVEN process and how to get
messages from the Event Logging System. The VISEVEN process provides information on the internal operation of
the device and its interfaces.
• System activity.
• State changes.
• Service requests.
• Transmission and reception of data.
• Errors in internal system data.
The Event Logging System (ELS) is a monitoring mechanism that generates messages as a result of router activity.
When something happens, the ELS receives system data that identifies the source and nature of the event. A mes-
sage is then generated whereby the data received forms part of the message.
By using ELS commands properly, you can sort out which messages you feel are important to the user and then dis-
play them, send them as traps or through syslog messages.
The Event Logging System and the MONITOR process counters allow you to isolate problems in the device. A quick
scan of the messages will tell you whether the device has a problem and where to start looking if it does.
Commands entered at the ELS config> prompt create a default configuration that takes effect after you restart the
device.
Commands entered at the ELS config$ prompt create a configuration that takes effect immediately without having to
restart the device.
Occasionally, you may want to obtain messages using different parameters to the ones originally set up in the ELS
configuration process (ELS config> or ELS config$). You can do this in the ELS monitoring process ( ELS+ prompt),
without having to restart the router. The commands at this prompt allow you to temporarily change the selected
events to be displayed on screen or sent as traps or through syslog messages. These changes take effect immedi-
ately, and are not stored in the system configuration.
Running alongside the ELS, there is another system that stores logs in non-volatile memory. These logs record in-
formation about system access (by ftp or telnet), restarts, configuration changes, and so on. Unlike events, they are
stored in non-volatile memory, which means that they are stored even if the device restarts the application or shuts
down.
The process for accessing the ELS Config> prompt from the Config> prompt, the ELS config$ prompt from the Con-
fig$ prompt, and the ELS+ prompt from the + prompt, is summarized below:
*STATUS
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
(2) Type process and the PID, in this case number 4, to enter the CONFIG process.
*PROCESS 4
Config>
You can also access the configuration environment using the config command at the management console
prompt (*).
*CONFIG
Config>
Config>event
-- ELS Config --
ELS config>
Now you can use the ELS commands.
To leave the ELS configuration process, type exit to return to the Config> prompt.
ELS config>exit
Config>
Note
If the configuration was stored in the flash memory or a smart card, all changes made in this pro-
cess only take effect when the device is restarted.
If we want the updated settings to take effect dynamically (i.e., without having to restart the device), then we need to
access the Event Logging System's dynamic configuration environment.
(1) From the management console prompt (*), type process and the PID (in this case 5) to enter the dynamic con-
figuration process.
*PROCESS 5
Config$
You can also access the dynamic configuration process by typing the running-config command at the man-
agement console prompt (*):
*RUNNING-CONFIG
Config$
Config$event
-- ELS Config --
ELS config$
Now you can use the ELS commands.
To leave the ELS dynamic configuration process and return to the Config> prompt, type exit.
ELS config$exit
Config$
Note
All changes made in this process take effect immediately. As with the static configuration process
(config>), you need to save the changes in the flash memory or in a smart card to keep them after
the next restart.
*STATUS
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
(2) Type PROCESS and the PID, in this case 3, to enter the monitoring process.
PROCESS 3
Console operator
+
You can also enter the monitoring process using the MONITOR command at the management console
prompt (*).
*MONITOR
Console Operator
+
+event
-- ELS Monitor --
ELS+
Now you can use the ELS monitoring commands.
To leave ELS monitoring and return to the monitoring process prompt (+), type exit.
ELS+EXIT
+
An advantage of using VISEVEN to view events is that they are only displayed when the user needs to see them and
not as they occur. By viewing them from the active process, you see them as they occur and you can also run other
active process commands (meaning you can perform additional tasks or consult other information).
A disadvantage of using VISEVEN to view events is that you cannot perform any other tasks, and that events can get
easily lost if the event buffer is small. Viewing them from the active process may interfere with the information shown
by the process in progress and makes accomplishing tasks difficult.
To enter the VISEVEN process from the management console prompt (*), follow these steps:
(1) If you do not know the VISEVEN process identifier (PID), type status at the management console prompt (*).
*STATUS
System Processes:
PID NAME
1 Main console
2 Event viewer
3 Monitor console
4 Config console
5 Running config console
6 Telnet client
*
(2) At the management console prompt (*), type process and the PID ( in this case 2) to enter the VISEVEN pro-
cess.
*PROCESS 2
The VISEVEN process does not present a prompt or allow commands to be executed. However, it does show the
messages that have been saved.
To leave the VISEVEN process and return to the management console prompt ( *), type Ctrl + p.
If you want to ignore all the events stored so far without displaying them, use the flush command.
The hide and view commands are available when viewing events from the active process. These commands must
be written in full in order for them to take effect. If events are displayed in the active process, you will not be able to
enter the VISEVEN process. The view command allows you to view them, whereas the hide command allows you to
hide them.
ELS+LIST SUBSYSTEM GW
GW.019 C-INFO Slf tst ifc %s
Subsystem
Subsystem is a predefined abbreviated name for a router component or functionality, such as a protocol or interface.
The letters GW (which stand for Gateway) identify the subsystem through which this event occurs.
Other examples of subsystem may be ARP, IP, ETH. By running the list subsystem command, you can obtain a list
of the subsystems available on your router. This command is available in both the configuration (CONFIG or P4) and
monitoring processes (MONITOR or P3).
Enter the subsystem as a parameter to an ELS command when you want the command to affect the entire subsys-
tem. For example, the enable subsystem GW command causes all GW subsystem events to be picked up by the
VISEVEN process when they occur.
Event Number
The Event number is a predefined, unique, arbitrary number assigned to each message within a subsystem. It does
not indicate message priority. For example, in GW.019, 19 indicates the event number in the GW subsystem. By us-
ing the list subsystem <subsystem name> command, you can obtain a list of all the events in a subsystem. This
command is available in both the configuration (CONFIG or P 4) and monitoring processes (MONITOR or P 3).
The event number always appears next to the subsystem abbreviation separated by a period, e.g., GW.019. The
subsystem and event number together identify an individual event. They are typed as a parameter in certain ELS
commands. When you want a command to affect a specific event only, type the subsystem and event number as a
parameter for the command.
Type of Event
Event type or Filter Level is a predefined identifier that classifies each message according to the type of event that
generates it. This identifier appears when the list subsystem <name_subsystem> command is executed.
In this table, ERROR, INFO, TRACE, STANDARD and ALL are the result of combining different filter levels. STAND-
ARD is the recommended filter level by default.
Groups
Groups are collections of user-defined events that are given a group name. You can enter the group name as a para-
meter to the ELS command. There are no predefined groups. A group must be created before its name can be spe-
cified on the command line.
To create a group, use the add configuration command, specify the name you want to give the group, then specify
the events you want to include in the group. The events that are added to the group can be from different subsys-
tems and have different filter levels.
Example:
ELS config>add ?
<1..7 chars> Group name
ELS config>add MYGROUP ?
<1..11 chars> Event
ELS config>add MYGROUP GW.019 ?
<cr>
ELS config>add MYGROUP GW.019
ELS config>add MYGROUP PPP.001
ELS config>add MYGROUP PPP.002
ELS config>
After you create a group, you can use it to manage group events globally. For example, to enable the on-screen dis-
play of event messages for all events that have been added to a group named MYGROUP, include the group name
on the command line, as follows:
Example:
ELS config>delete ?
<1..7 chars> Group name
ELS config>delete MYGROUP ?
all The whole group
<1..11 chars> Event
ELS config>delete MYGROUP all ?
<cr>
ELS config>delete MYGROUP all
ELS config>
• You need to know what you want the system to analyze. Clearly define the problem or events that you want to view
before using the VISEVEN process.
• Run the clear command in the configuration process to delete all enabled events and existing groups from the con-
figuration, or, use the same command in the monitoring process to delete all enabled events running.
• Enable only those messages that are related to the problem that you want to identify.
• If working remotely, enable the events you think will help identify the problem to be sent as traps or through syslog
messages, or analyze device behavior in the specific situation that you want to study in depth.
When enabling events to be displayed as console traces, if these messages occur too frequently and are not dis-
played on the screen as they occur in the VISEVEN process, the circular message buffer may become full and the
initial messages can get lost. In the case of sending events as traps, if the storage buffer becomes saturated, the last
traps that have not been transmitted are lost. The same thing happens with syslog messages: the oldest are pre-
served and the newest discarded.
You can enable/disable the messages as you receive them based on the events you are interested in.
Console Traces
You can enable tracing to the console (visible from the VISEVEN process (P2), or from the active process using the
view command) for any individual event, group of events or subsystem. By using the hide command in the active
process, the traces will no longer be visible.
SNMP Traps
ELS can be configured so that event messages are sent to an SNMP management workstation in a company-specif-
ic trap. These traps send the actual message that would be shown on screen if the event was enabled for tracing. A
trap will be generated each time the selected event (enabled as an SNMP trap) occurs. For more information about
configuring SNMP, please see the following manual: Teldat Dm712-I SNMP Agent
Note
If you are at the ELS Config> prompt, the settings must be saved and the router restarted for the
changes to take effect.
Note
Settings must be saved and the device restarted for changes to take effect.
Syslog Messages
You can configure the Event Logging System to send a particular event in syslog message format to one or more re-
mote stations. Any event, regardless of whether it is individual or belongs to a group or subsystem, can be enabled
for this purpose.
Note
If you are in ELS Config>, the settings must be saved and the device restarted for the changes to
take effect.
(2) At the SYSLOG config> prompt, configure the IP address or domain name of the server(s) that is going to be
sent the notifications. For detailed information on the configuration parameters available with regard to this func-
tionality, please see the following manual: Teldat Dm753-I Syslog Client.
Note
Settings must be saved and the device restarted for changes to take effect.
If you ping the router from any system under these conditions, the message is received in the configured syslog serv-
er.
they are shown in the console. For example, if you know or think the problem is related to the IP protocol, enable all
IP subsystem events by typing:
Once you are familiar with the different messages that appear, you can enable/disable those events that contain the
information you want.
The Event Logging System allows you to specify which messages are to be displayed temporarily or permanently.
The Event Logging System configuration commands allow you to design a permanent message filter that takes effect
every time the system is turned on or reset.
Monitoring commands let you apply temporary filters that ignore a permanent filter. When the system is restarted or
reset, the system software removes this temporary filter.
• Configure access to the generic access list configuration environment. For more information about configuring gen-
eric access lists, please see the following manual: Teldat Dm752-I Access Control.
• Add the lists in which you want to enable inbound packet tagging so that all events associated with packet pro-
cessing are displayed in the console. To do this, use the enable trace condition access-list <1....1999> com-
mand.
• Enable all events to be displayed as console traces. To do this, use the enable trace all command from the config-
uration (CONFIG or P 4/ RUNNING-CONFIG or P 5) or monitoring process (MONITOR or P 3). This command
should only be used with a corresponding filter to only show those events associated with a specific packet. Other-
wise, the device shows all available events and consequently impacts the performance.
Example:
You are connected to the device via Telnet but you're not interested in seeing any telnet-related events. You can do
feature access-lists
; -- Access Lists user configuration --
access-list 100
entry 1 default
entry 1 deny
entry 1 source port-range 23 23
entry 1 protocol tcp
;
entry 2 default
entry 2 deny
entry 2 destination port-range 23 23
entry 2 protocol tcp
;
entry 3 default
entry 3 permit
;
exit
;
access-list 5000
entry 1 default
entry 1 permit
;
exit
;
exit
event
; -- ELS Config --
enable trace condition access-list 100
exit
;
• Add the interfaces in which you want to enable inbound packet tagging so that all events associated with packet
processing are displayed in the console. To do this, use the enable trace condition interface <interface name>
command. Please note that you can add any of the router's interfaces to the list, but it only makes sense to select
interfaces with an associated physical layer (i.e., base interfaces). You can also specify certain conditions, for ex-
ample, that the packet must come from the global free buffers list (usually locally sourced packets), or that it be
processed by a particular protocol using the enable trace conditional global-buffers and enable trace condition
protocol <protocol name> commands, respectively.
• Enable all events to be displayed as console traces. To do this, use the enable trace all command from the config-
uration (CONFIG or P 4 / RUNNING-CONFIG or P 5) or monitoring process (MONITOR or P 3). This command
should only be used with a corresponding filter so that it only shows events associated with a specific packet. Oth-
erwise, the device shows all available events and consequently impacts the performance.
The following example shows you the screen output when this feature is enabled on an ethernet0/0 interface that re-
ceives a packet encapsulated in IPSec:
Important
If several conditional events are enabled at the same time, any of the conditions can cause a trace to
be generated.
You can also configure the Event Logging System from the dynamic configuration process (at the ELS config$
prompt), which saves you from having to start the router again. Always remember to save the configuration if you
want to keep the changes after a reboot. To do this, enter the save command at the Config$ prompt.
4.4.1.1 ? (HELP)
Displays all the commands available for this prompt. You can also type a question mark (?) after a specific command
to list its options.
Syntax:
ELS config>?
Example 1:
ELS config>?
add Adds an event to a specific group or creates a new
group
apply-filter Applies dynamically the events filtering configuration
clear Erases all the event and group configuration from the
ELS
console Enters the specific Console (CNSL) events menu
delete Deletes an event from a specific group or the whole
group
disable Disables events
enable Enables events
environment-monitor Enables environment monitor
ev-buffer Sets the events buffer size
filter Adds a filter
list List configuration
no Negates a command or sets its defaults
number-events-log Number of events to be logged in case of fatal error
nvram-log-priority Sets the priority of logs saved
options Modify els subsystem behavior
ppp Enters the specific PPP events menu
print Configure els show options
stop-traces Stops saving traces
trace-level configures subsystem trace level
vrf Enters the specific VRF filter events menu
exit
ELS config>
Example 2:
ELS config>list ?
all Lists the configuration and all the subsystems
configuration Lists the status of the subsystems, groups and events
ev-buffer Lists the events buffer parameters
event Lists the filter level and the specified event message
filter Lists status of the filtering and the configured
filters
groups Lists the groups defined by the user and their content
nvram-log-priority Lists the minimum priority of logs saved
subsystem Lists all the events of a specified subsystem
ELS config>
Adds an individual event to an existing group or creates a new group. Group names must be composed of alphabet-
ical characters. Numbers and other types of ASCII characters are not allowed. Names can be no more than 7 char-
acters long. You can create a maximum of 10 groups with up to 20 events per group.
Syntax:
Example:
ELS config>add
CLI Error: Incomplete command
ELS config>add ?
<1..7 chars> Group name
ELS config>add MYGROUP ?
<1..11 chars> Event
ELS config>add MYGROUP IP.001 ?
<cr>generados en ese momento
ELS config>add MYGROUP IP.001
ELS config>
4.4.1.3 APPLY-FILTER
Dynamically applies the event filter settings to the events generated at the time.
Syntax:
ELS config>apply-filter
Clears all event and group settings form the Event Logging System (ELS).
All existing groups, events and subsystems enabled during configuration are deleted. Run this command, followed by
the save command at the Config> prompt, to clear the configuration from the flash memory or the smart card.
Syntax:
ELS config>clear
Example:
ELS config>clear ?
<cr>
ELS config>clear
ELS config>
4.4.1.5 CONSOLE
Example:
ELS config>console
-- Console Events Configuration --
Console Events config>
The console's event menu allows you to configure several parameters related to this type of events.
Syntax:
Allows you to include additional information in the messages linked to console events.
Syntax:
• < info > is the type of additional information to include in the event.
LOG PROMPT
Syntax:
Example:
LOG SOURCE-IP
Allows the device IP address and port used by the user to access the router through Telnet to be inserted in the user
information field (usr) of the console event. If user access is granted via the local console, the text Local Console will
appear next to the username.
Syntax:
Example:
Sets the time that the device waits before executing a command in order to give the system time to fully process all
the associated console events (including the sending of syslog messages or snmp traces).
• When running a command within the active configuration's editing process, with the exception of the show menu,
show config, show all-config and Ctrl+p (escape character sequence to return to the management console)
commands.
• When running the view command used to view the ELS messages.
Syntax:
Example:
4.4.1.5.3 NO
Allows you to set the configuration parameters of the console event subsystem to their default values.
Syntax:
NO LOG <info>
Stops additional information (prompt or source-ip) from being included in the console event messages.
Syntax:
• < info > is the type of additional information to exclude from the event.
Example:
NO WAIT-TIME
Sets the time (1 tenth of a second) the device waits by default before executing a command. This gives the system
time to fully process the associated console events (including the sending of syslog messages or snmp traces).
Example:
Deletes an event from an existing group or deletes the entire group. If the specified event is the group's last event, a
message will appear. If you specify all instead of subsystem.event_num, then the entire group is deleted.
Syntax:
Example 1:
ELS config>delete ?
<1..7 chars> Group name
ELS config>delete MYGROUP ?
all The whole group
<1..11 chars> Event
ELS config>delete MYGROUP IP.001
ELS config>
Example 2:
4.4.1.7 DISABLE
Selects and disables events so their messages are not displayed on screen or sent out as traps or via syslog mes-
sages. Groups, subsystems and all traces (provided you enable them beforehand with the enable trace all com-
mand) can be disabled. It also allows you to disable event filtering.
If you have selected an input interface to display all the traces associated with the processing and path of the pack-
ets received on that interface, you can use the disable trace condition interface <interface name> command to
disable packet tagging on that interface. You proceed in the same way to disable the global buffer and protocol con-
ditions with the disable trace condition global-buffers and disable trace condition protocol <protocol name>
commands, respectively.
Syntax:
ELS config>disable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
FILTER
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SYSLOG
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
TRACE
ALL
CONDITION INTERFACE <nom_interfaz>
CONDITION GLOBAL-BUFFERS
CONDITION PROTOCOL <nom_protocolo>
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SECURITY-TRACES
EVENT <subsystem.event_num>
GROUPS <nom_group>
TEM <subsy<fd_la<fd_layfd_layed_layer>
Example:
This example disables a single event (CMP.001) so that it is not displayed on screen.
Example:
This example disables MYGROUP events so that they are not sent as syslog messages.
Example:
This example disables IP subsystem INFO level events so that they are not displayed on screen or sent as SNMP
traps or syslog messages.
Note
The "security traces" feature has been disabled for devices with low flash memory (equal to or less
than 16 MBytes) and, with it, the corresponding commands.
Command History:
Release Modification
11.01.12 The "security-traces" command was introduced as of version 11.01.12.
11.02.01 The "security-traces" command was introduced as of version 11.02.01.
11.01.08.70.16 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.08.70.16.
11.01.12.00.06 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.12.00.06.
11.01.13 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.13.
11.02.01.00.11 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.01.00.11.
11.02.02 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.02.
4.4.1.8 ENABLE
Selects and enables events so their messages are displayed on screen, sent out as traps or transmitted via syslog
messages. Groups and subsystems can be enabled. It also allows you to enable event filtering.
Under the present chapter's Event Logging System user interface on page 190 section, we explained how to activate
the conditional events functionality. In brief: you use the enable trace condition interface <interface name> com-
mand to enable packet tagging for a given interface so that the events associated with the processing of packets re-
ceived on that interface are displayed as console traces.You can also filter events by IP access list using the enable
trace condition access-list <list> command.
We also indicated that you can enable all available events to be displayed as traces using the enable trace all com-
mand. We do not recommend using this command unless the conditional event functionality is used to restrict the
number of traces shown to only one packet. Otherwise, the device shows all of them and consequently impacts per-
formance.
In the same section we indicated that you can specify a trigger condition to enable tracing when the free global buf-
fers are used (usually locally sourced packets) or when a packet is processed by a particular protocol, using the en-
able trace condition global-buffers and enable trace condition protocol <protocol name> commands, respect-
ively.
If you want to debug the conditional event functionality, you can enable a special trace using the enable condition-de-
bug command, which is printed whenever a packet is unmarked.
Syntax:
ELS config>enable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
CONDITION-DEBUG
FILTER
SECURITY-TRACES
DEFAULT
VERBOSE
SUBSYSTEM <subsystem> <filtered_layer>
EVENT <subsystem.event_num>
GROUPS <nom_group>
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP1
EVENT <subsystem.event_num>
GROUPS <nom_grupo>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP2
EVENT <subsistema.num_evento>
GROUPS <nom_grupo>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP3
EVENT <subsystem.event_num>
GROUPS <nom_grupo>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP4
EVENT <subsystem.event_num>
GROUPS <nom_grupo>
SUBSYSTEM <subsystem> <filtered_layer>
SYSLOG
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
TRACE
ALL
CONDITION INTERFACE <nom_interfaz>
CONDITION GLOBAL-BUFFERS
CONDITION PROTOCOL <nom_protocolo>
EVENT <subsystem.event_num>
GROUPS <nom_group>
TEM <subd_layer>d_layer>d_layer>d_layer>
Note
Enabling an event as a trap using the snmp-trap command enables it for all trap groups.
Example 1:
Example 2:
This example enables MYGROUP events so that they are sent as syslog messages.
Example 3:
This example enables IP subsytem INFO filter level events to be displayed on screen, sent as SNMP traps and sys-
log messages.
Important
Do not run this command for long periods of time when the device is transferring packets because a
significant amount of time will be lost in communicating with the VISEVEN process. Running it when
communicating with the Teldat Router via a remote terminal may cause the device to spend most of its
time communicating with the remote terminal.
Note
The "security traces" feature has been disabled for devices with low flash memory (equal to or less
than 16 MBytes) and, with it, the corresponding commands.
Command History:
Release Modification
11.01.12 The "security-traces" option was introduced as of version 11.01.12
11.01.09.90.01 This "security-traces" option was introduced in version 11.01.09.90.01 with only the de-
fault suboption.
11.02.01 The "security-traces" option was introduced as of version 11.02.01.
11.01.08.70.16 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.08.70.16.
11.01.12.00.06 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.12.00.06.
11.01.13 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.13.
11.02.01.00.11 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.01.00.11.
11.02.02 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.02.
4.4.1.9 ENVIRONMENT-MONITOR
Allows you to monitor the temperature probes, fans and PSUs to detect when they fail. Regardless of whether any
errors are detected, this option also allows you to read these parameters and send their values to NSLA filters.
Syntax:
ELS config>environment-monitor ?
report Report info to NSLA system
periodic-event Sends periodic events when the sensors indicate a value that exceeds safe levels.
To check the thresholds, use the 'system health' command under monitoring.
Note
This command is only available on devices equipped with temperature probes and/or that have fan
and/or PSU monitoring capabilities.
Release Modification
11.00.05 The report option was introduced as of version 11.00.05.
Release Modification
11.01.01 The report option was introduced as of version 11.01.01
11.00.07 The help text of the periodic-event option has been changed.
11.01.05 The help text of the periodic-event option has been changed.
11.01.01.60.06 The help text of the periodic-event option has been changed.
Allows you to report the read values to a NSLA filter every so often, thus allowing further monitoring of environment
parameters.
Syntax:
Examples:
Note
Device performance may be affected if the interval is too low. This is because updating the reported
values requires a large number of internal requests.
In this example, the CASE3 fan speed values are reported to NSLA filter 3 every 60 seconds.
In this example, the PSU 1 voltage values are reported to NSLA filter 1 every 30 seconds.
In this example, the temperature value from the CPU_EXT thermal probe is reported to NSLA filter 2 every 10
seconds.
Additional information:
The limitations of the report system mean decimal values cannot be reported. Therefore, the psu-voltage value is
reported in mV (millivolt) units, the temperature in ºC, and fan-speed in rpm.
Configuration example:
Note
Adding an appropriate NSLA filter configuration is extremely important. There are many possible con-
figurations for different scenarios and requirements. In the end, it's down to the end user to choose the
configuration that best suits their needs.
This is the same command that was used in the previous example, but now in the NSLA configuration:
feature nsla
; -- Feature Network Service Level Advisor --
enable
;
filter 1 generic-input
filter 1 significant-samples 100
filter 1 activation threshold 12000
filter 1 activation sensibility 100
filter 1 activation stabilization-time 0
filter 1 deactivation threshold 11000
filter 1 deactivation sensibility 50
filter 1 deactivation stabilization-time 0
filter 1 initial-status inactive
filter 1 invert
Configuration explanation:
First, we have to set the filter input as generic-input. Then, we need to ensure that we select appropriate values in
relation to the reported value. In this example, a PSU failure occurs when 50 % or more of the reported values fall
below the configured threshold in the configured window of 100 samples. The filter output activates at that point.
When 100 % of the window samples reach 12 V, the filter output deactivates.
Since the invert option has to be set to achieve this behavior, initial-state is set to inactive to avoid filter output ac-
tivation before any samples are reported.
Allows you check the temperature probes, fans and PSUs and generate an event when they have a value which is
considered abnormal. This event can be of three types:
• ENV.001 Reports that one of the device's temperature probes is indicating a temperature above safe levels.
• ENV.002 Reports that one of the device's fans is indicating a failure.
• ENV.003 Reports that one of the device's PSUs is indicating a voltage abnormality.
These events must be enabled before they can be displayed or sent as traps or syslog messages.
Syntax:
The checks are performed periodically according to the specified time and the events can be triggered once (when
the monitored parameters fail the first time) or periodically (every time they fail).
Example:
In the example, parameter checks are carried out every two hours. In each check, an event is generated if there is a
failure.
In the example, parameter checks are made every hour and an event is generated only when they fail for the first
time.
This command also displays temperature sensor information when running the configuration command from the
monitoring process.
Example:
*monitor
Console Operator
+configuration
[…]
Watchdog timer Enabled
CASE 1 fan speed: 0 rpm (0 %)
CPU temperature: 51ºC
ADSL1 temperature: 50ºC
ADSL2 temperature: 53ºC […]
Note
Through the system health command, found under monitoring, you can obtain the normal value range
for the temperature probes and PSUs.
Release Modification
11.00.07 The unique option was introduced as of version 11.00.07.
Release Modification
11.01.05 The unique option was introduced as of version 11.01.05.
11.01.01.60.06 The unique option was introduced as of version 11.01.01.60.06.
Allows you to save an amount of memory for the event buffer. For this to work, you only need to configure two para-
meters: the number of lines (each event is stored in a line) and the size of each line saved in memory.
Syntax:
Example:
ELS config>ev-buffer ?
<2..10000> Number of lines
ELS config>ev-buffer 1000 ?
<28..200> Line size
ELS config>ev-buffer 1000 130
Please restart to take effect.
ELS config>
4.4.1.11 FILTER
Applies a filter.
Event filtering allows you to apply filters to a given event in order to highlight relevant information and filter out irrelev-
ant information. It also has the added advantage of not storing the discarded events, thus reducing the risk of events
being lost due to overflow.
The filters have an associated index that determines the order in which filters are applied, so that lower order filters
will be applied before higher order filters. The order must be between 1 and 10. At most, you can define 10 filters
simultaneously.
Another parameter associated with a filter is the application condition. If met, the filter is applied. Filters are checked
one after the other until none are left or until one of them is applied. The condition applies to the event text, not the
event identifier. The condition is given by a text string or by a regular expression to look for, as well as a position.
Whereas the text must be between double quotation marks, the position can be given explicitly or you can specify a
value of -1 to indicate any position.
The last parameter associated with a filter is the action to apply. This can be to exclude, highlight or accept the
event, or to start/stop storing events.
Event filtering can be turned on and off globally using the enable filter and disable filter commands, respectively.
Syntax:
ELS config>filter ?
<1..10> Entry
ELS config>filter 1 ?
default Create a event filter with action exclude and pos ignore
text Text to filter
position Position
action Action to be applied
ELS config>filter 1 text ?
<0..40 chars> Text
ELS config>filter 1 action ?
include includes the trace
exclude excludes the trace
red shows the trace in red
green shows the trace in green
yellow shows the trace in yellow
blue shows the trace in blue
magenta shows the trace in magenta
cyan shows the trace in cyan
stop-traces stops saving traces
start-traces starts saving traces
ELS config>
Example 1:
A simple example of event filtering is IP debugging on a device accessed via Telnet: if the IP events are enabled, the
events that you want will appear, but so too will the Telnet events. This means you will end up with a large number of
IP events. The way to get around this it to enable event filtering to exclude all events that carry the Telnet client's IP
address (172.24.78.94).
Example 2:
Shows the GW.019 event (an internal event which occurs when an interface performs a self-test) in red.
Shows the GW.019 event (an internal event which occurs when an interface performs a self-test) in red, but only for
the ethernet0/0 interface.
Example 4:
Stops storing events after the first event with IP address 192.168.212.116 is detected.
4.4.1.12 SECURITY-TRACES
Saves security events related to router functionality to a file. They can be accessed from the monitoring menu. Due
to the large number of events, only enabled traces are saved to the file.
The default command enables a limited number of security-traces and the verbose command adds all security-
traces.
Note
The "security traces" feature has been disabled for devices with low flash memory (equal to or less
than 16 MBytes) and, with it, the corresponding commands.
Command History:
Release Modification
11.01.12 The "security-traces" option was introduced as of version 11.01.12.
11.01.09.90.01 The "security-traces" option was introduced in version 11.01.09.90.01 with only the de-
fault suboption.
11.02.01 The "security-traces" option was introduced as of version 11.02.01.
11.01.08.70.16 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.08.70.16.
Release Modification
11.01.12.00.06 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.12.00.06.
11.01.13 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.13.
11.02.01.00.11 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.01.00.11.
11.02.02 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.02.
4.4.1.13 LIST
Lists information about enabled events, created groups, subsystems, security traces and settings.
From P 4:
Syntax:
ELS config>list ?
all Lists the configuration and all the subsystems
configuration Lists the status of the subsystems, groups and events
ev-buffer Lists the event buffer parameters
event Lists the filter level and the specified event message
groups Lists the groups defined by the user and their content
subsystem Lists all the events belonging to a specified subsystem
filter Lists the filtering status and the configured
filters
nvram-log-priority Lists the minimum priority of logs saved
ELS config>
From P 5:
Syntax:
ELS config$list ?
all Lists the configuration and all the subsystems
security-traces List the events enabled in security traces
configuration Lists the status of the subsystems, groups and events
ev-buffer Lists the events buffer parameters
event Lists the filter level and the specified event message
groups Lists the groups defined by the user and their content
subsystem Lists all the events belonging to a specified subsystem
filter Lists status of the filtering and the configured
filters
LIST ALL
This command lists: the defined groups and their events; the configuration status of each individual subsystem,
group and event; the configuration of the security traces; parameters relating to the size of the event buffer for events
waiting to be displayed on screen; possible event filters established and whether or not filtering is enabled; and lastly,
the minimum log priority for storing logs in non-volatile memory.
Example:
Group: MYGROUP
IP.002
IP.003
IP.004
Subsystem :IP
Trace :STANDARD
Syslog :none
Security-Traces:none
SNMP-Trap (all groups):none
Subsystem :GW
Trace :ALL
Syslog :ALL
Security-Traces:none
SNMP-Trap (all groups):ALL
Security-Traces:
Default: on
Verbose: off
EVENT FILTER
Events filtering DISABLE
ELS config>
LIST CONFIGURATION
Lists the status (enabled/disabled) of individual subsystems, groups and events that have been configured and that
will be used after the next reboot if they've been stored to memory. Also, it lits the configuration of the security traces.
Assuming that the GW subsystem has been enabled to send SNMP traps and syslog messages and for them to be
viewed from the VISEVEN process, that the IP subsystem has been enabled to display STANDARD filter level
events on screen, that the MYGROUP group has been enabled to accept syslog notifications, and that the user has
enabled the ICMP:001 event to be sent as a company-specific trap, then we would get the result below:
Example:
Security-Traces:
Default: off
Verbose: off
ELS config>
LIST EV-BUFFER
Lists parameters related to the size of the storage buffer, which holds the events waiting to be displayed on the
screen.
Example:
LIST EVENT
Example:
LIST FILTER
Lists information about event filtering: general filter status and configured filters.
Example:
LIST GROUPS
Example:
LIST SUBSYSTEM
Example:
If no subsystem name is entered, the system lists the name, number of events and description for all the subsys-
tems.
Example:
ADSL 8 ADSL
AFS 6 Advanced Filtering Subsystem
AINST 23 AutoInstall
ARP 10 Address Resolution Protocol
ASDP 11 Asynchronous Serial Device Proxy
ARLY 41 Alarm Relay
ASYN 5 Asynchronous Serial Line
AT 20 AT Commands Interface
ATM 15 Asynchronous Transfer Mode
BAN 29 Boundary Access Node
BGP 27 Border Gateway Protocol
BR 48 Bridge/Routing
BRS 9 Bandwidth Reservation
BSPF 10 Bridge Spoofing
CIF 34 Encryption
CNSL 4 Console
DEP 30 DEP Forwarder
DHCP 14 DHCP
DHCPC 23 DHCP Client
DLS 459 Data Link Switching
DNAT 12 Dynamic NAT
DNS 30 Domain Name System
EAP 6 EAP
ETH 54 Ethernet
FLT 7 Filter Library
FR 53 Frame Relay
FRBK 8 Frame Relay BACKUP
FTP 4 File Transfer Protocol
G703 25 G703 Digital Interface
GW 64 Router kernel
H323 19 H323
HDLC 11 HDLC Interface
HDSL 57 Symetric High Bitrate Digital Subscriber Line
HSSI 5 High Speed Serial Interface
HOTSPOT 39 HotSpot
HTTP 25 HyperText Transfer Protocol
ICMP 22 Internet Control Message Protocol
IGMP 26 Internet Group Management Protocol
IKE 51 Internet Key Exchange
IP 87 Internet Protocol
IP6 200 IPv6
IPHC 46 IP Header Compression
IPSEC 33 Ip Security
IPX 105 Internetwork Packet Exchange Protocol
ISDN 40 Integrated Services Digital Net
L2TP 56 Layer 2 Tunneling Protocol
LAPD 11 ISDN Layer 2
LDAP 16 Lightweight Directory Access Protocol
LLC 33 Logical Link Control
MCF 9 MAC Filtering
ELS config>
Command history:
Release Modification
11.00.05 The SMGT event was introduced as of version 11.00.05.
11.01.00 The SMGT event was introduced as of version 11.01.00.
LIST NVRAM-LOG-PRIORITY
Lists the minimum priority of the logs that are stored in the non-volatile memory.
Example:
LIST SECURITY-TRACES
Example:
DLS.049 off
DLS.050 off
DLS.051 off
ETH.050 off
ETH.051 off
GW.001 on
GW.008 on
GW.052 on
GW.053 on
GW.059 on
GW.062 on
GW.063 on
GW.073 on
GW.074 on
GW.075 on
GW.081 off
GW.082 off
GW.083 off
GW.084 off
GW.085 off
GW.086 off
HTTP.026 off
HTTP.027 off
HTTP.028 off
HTTP.029 off
IKE.011 off
IKE.012 off
IKE.036 off
IKE.037 off
IKE.038 off
IKE.039 off
IKE.040 off
IKE.041 off
IKE.048 off
IKE.049 off
IKE.083 off
IKE.085 off
IP6.069 off
IP6.070 off
IP.024 off
IP.025 off
IP.078 off
IP.079 off
IP.083 off
IP.084 off
IP.085 off
IP.086 off
IP.087 off
IPSEC.020 off
IPSEC.021 off
IPSEC.039 off
IPSEC.050 off
IPSEC.051 off
IPSEC.052 off
IPSEC.053 off
NTP.003 off
NTP.015 on
NTP.016 on
NTP.027 off
NTP.029 off
NTP.030 off
NTP.031 off
NTP.040 off
NTP.042 off
NTP.043 off
NTP.044 off
NTP.045 off
NTP.047 off
NTP.048 off
NTP.068 off
NTP.070 off
NTP.071 off
NTP.072 off
NTP.076 off
NTP.077 off
NTP.079 off
SFTP.001 off
SSH.006 off
SSH.007 off
SSH.008 off
SSH.015 off
SSH.016 off
SSH.017 off
SSH.018 off
SSH.033 off
SSH.035 off
SSH.038 off
SSH.043 off
SSH.044 off
SSH.045 on
SSH.046 on
SSH.049 on
SSH.050 on
SSH.078 off
SSH.081 off
SSH.082 off
SSH.083 off
SSH.084 off
SSH.085 off
SSH.086 off
SSL.002 off
SYSLOG.009 off
SYSLOG.010 off
SYSLOG.011 off
SYSLOG.012 off
SYSLOG.013 off
SYSLOG.014 off
SYSLOG.015 off
SYSLOG.016 off
SYSLOG.017 off
SYSLOG.018 off
TFTP.001 off
ELS config$
Note
The "security traces" feature has been disabled for devices with low flash memory (equal to, or less
than, 16 MBytes) and, with it, the corresponding commands.
Command history:
Release Modification
11.01.12 The command was introduced as of version 11.01.12.
11.02.01 The command was introduced as of version 11.02.01.
11.01.08.70.16 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to, or less than, 16 MBytes) as of version 11.01.08.70.16.
11.01.12.00.06 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to, or less than, 16 MBytes) as of version 11.01.12.00.06.
11.01.13 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to, or less than, 16 MBytes) as of version 11.01.13.
11.02.01.00.11 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to, or less than, 16 MBytes) as of version 11.02.01.00.11.
Release Modification
11.02.02 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to, or less than, 16 MBytes) as of version 11.02.02.
4.4.1.14 NO
Allows you to delete a given filter or reset the default storage buffer size for events waiting to be displayed on screen,
or the default minimum logging level for logs that will be stored in non-volatile memory.
It also allows you to delete and reset the configuration on the enabled or disabled events at any time.
Syntax:
ELS config>no ?
environment-monitor Enables environment monitor
disable Disables events
enable Enables events
ev-buffer Sets default events buffer size
filter Eliminates a given filter
number-events-log Number of events to be logged in case of fatal error
nvram-log-priority Sets the default priority of logs saved
print Configure els show options
stop-traces Stops saving traces
trace-level Configures subsystem trace level
ELS config>
NO ENVIRONMENT-MONITOR
Release Modification
11.00.05 The report option was introduced as of version 11.00.05.
11.01.01 The report option was introduced as of version 11.01.01
11.00.07 From now on, this functionality can not be disabled in general, now each option of this
command has its own 'no'.
11.01.05 From now on, this functionality can not be disabled in general, now each option of this
command has its own 'no'.
11.01.01.60.06 From now on, this functionality can not be disabled in general, now each option of this
command has its own 'no'.
Allows you to disable monitoring temperature probes, fans and PSUs to detect when they fail, and to disable reading
these parameters (to avoid sending their values to NSLA filters).
Syntax:
Example 1:
This example disables all temperature probe, fan and PSU checks that generate events if anomalous behavior is de-
tected.
Example 2:
This disables reading the POWER temperature probe (meaning its value will not be sent to an NSLA filter).
NO DISABLE
Selects and resets the default parameters for (disabled) events displayed on the screen, or sent as traps or syslog
messages. Groups and subsystems can be restored.
Example:
This example resets the miGrupo group's events to their default values so they are displayed on the screen, and
clears the corresponding entry from the configuration.
NO ENABLE
Selects and resets the default parameters for (enabled) events displayed on the screen, or sent out as traps or via
syslog messages. Groups and subsystems can be restored.
Example:
This example resets ARP subsystem events with the filter level ALL to their default values so they are sent out as
SNMP traps, and clears the corresponding entry from the configuration.
Example:
This example resets the single event IP.007 to its default value so that it is sent as a syslog message, and clears the
corresponding entry from the configuration.
NO EV-BUFFER
This resets the storage buffer parameters for events waiting to be displayed as console traces (VISEVEN process) to
their default values. These parameters allow you to choose the amount of reserved memory to use. These default
values are 50 lines or messages and 208 bytes per line.
Example:
NO FILTER
Example:
NO PRINT
Suppresses the printing of additional information with each previously configured event.
Example:
NO STOP TRACES
Example:
NO NUMBER-EVENTS-LOG
Sets the default value for the number of events that are stored in non-volatile memory when a device RESET occurs.
Example:
NO NVRAM-LOG-PRIORITY
Sets the default minimum logging level for logs that are stored in non-volatile memory (priority 5).
Example:
4.4.1.15 NUMBER-EVENTS-LOG
Configures the number of events that are logged in non-volatile memory when a device RESET occurs. The default
value is 3 and the configurable values range from 3 to 10,000. Knowing the last events generated before an error oc-
curs is very useful when it comes to detecting the cause of the error. Setting a higher value than the default value is
therefore advisable, as it will provide you with more information with which to diagnose the problem.
Example:
ELS config>number-events-log ?
<3..10000> value in the specified range
ELS config>number-events-log 100
ELS config>
4.4.1.16 NVRAM-LOG-PRIORITY
Sets the minimum priority logs must have to be stored. Each log is given a priority of 1 to 5 (1 being the highest prior-
ity and 5 the lowest). Given the limited capacity of non-volatile memory (logs are stored in a circular queue), you
might prefer to store only the highest priority logs and not the lowest priority ones.
Logs relating to device startups have priorities between 1 and 3. All other logs (device access, configuration
changes, etc.) are assigned priorities between 4 and 5.
Example:
ELS config>nvram-log-priority ?
<1..5> Minimum priority of logs saved
ELS config>nvram-log-priority 5
ELS config>
4.4.1.17 OPTIONS
Allows you to modify the behavior of the Event Logging System (ELS).
Syntax:
ELS config>options ?
circular-buffer Enable circular buffer
no Negate options
time-as-incremental Show time as incremental in milliseconds
time-as-ticks Show time as ticks
time-stamp Include time in events
usb-save Save events on external USB
ELS config>
CIRCULAR-BUFFER
Sets the default behavior of the Event Logging System for logging events to the circular buffer. New events are al-
ways added to the circular buffer and, if the buffer is already full, older events are discarded.
NO
Allows you to disable certain options that are enabled by default. These include:
The Event Logging System stops entering events in the circular display buffer when it is full. When events are not
displayed and the buffer is full, CPU time is not consumed, so the system can increase its performance. The side ef-
fect is that the most recent events are lost, not the oldest.
4.4.1.17.2 TIME-AS-INCREMENTAL
Removes milliseconds from the elapsed time since the arrival of the last event.
4.4.1.17.3 TIME-AS-TICKS
The date and time are not displayed, so the real-time clock is not queried, the probability of losing events decreases,
and performance improves.
Example:
4.4.1.17.5 USB-SAVE
Disables dumping events to an external USB mass storage device. Please see the usb-save command options.
TIME-AS-INCREMENTAL
Events are timestamped with the elapsed time (in milliseconds) between the arrival of the last event and the arrival of
the next event.
Example:
TIME-AS-TICKS
Events are timestamped with ticks instead of with the date and time, which provides greater accuracy.
Example:
TIME-STAMP
Sets the default behavior of the Event Logging System for displaying time stamps.
USB-SAVE
Allows you to store the device's active events in a mass storage device connected to an external USB. Events are
stored in a file called event.log in the root directory of the first detected partition. The partition must be formatted with
a FAT or VFAT file system. If the file exists, the new events are added to the end by inserting a session start mark.
Existing information is never deleted.
Example:
################################################################################
# New log session started #
################################################################################
01/01/00 00:00:16 GW.001 System restarted -- H1+ WAN IPSec router cold start
01/01/00 00:00:16 GW.002 Portable CGW H1+ WAN IPSec Rel 10.08.29-Alfa strtd
01/01/00 00:00:17 GW.005 Bffrs: 1471 avail 1441 idle fair 114 low 294
If this command is configured in the router's startup configuration, the USB device must be connected before starting
the router. If it does not detect a connected device, the dump operation will not take place even if you connect a
device later.
The command can be enabled/disabled (option no save-usb) dynamically. The USB device must be connected to
the external connector before enabling the command dynamically. If a mass storage device is not connected to the
USB connector, the dynamic command fails. If the event dump function is enabled on the external USB device, you
can disable the dump by running the no save-usb options in the dynamic configuration. You should always dynamic-
ally disable event dumps to USB before removing the external storage device. If it is extracted without first disabling
the dump, the most recent events are lost and you won’t be able to restart the dump dynamically. You will also have
to restart the device.
Example:
Note
4.4.1.18 PPP
Allows you to access the PPP event menu. For more information, please see the following manual: Teldat Dm710-I
PPP Interface.
Example:
ELS config>ppp
-- PPP Events Configuration --
PPP Events config>
4.4.1.19 PRINT
Allows you to print additional information with each event. This information is printed on a separate line from the main
event and does not include the date and time.
PRINT EXTRA-INFO
Example:
04/15/08 13:13:17 AFS.001 IP IN src 172.24.100.130 dst 172.24.100.129 prt TCP in ifc
ethernet0/0 -> ACCEPTED
AFS.001 [vrf: <main> inifc: ethernet0/0 outifc: ppp1]
PRINT IP-HEADER
Prints the IP header. Not all events will contain an IP header. In events where it is not available, no additional inform-
ation is displayed.
Example:
04/15/08 13:13:17 AFS.001 IP IN src 172.24.100.130 dst 172.24.100.129 prt TCP in ifc
ethernet0/0 -> ACCEPTED
PRINT MISMATCH
Prints additional information about an event only when there is a mismatch with the last printed one. This is useful to
avoid redundant information on related events and make them more readable.
Example:
Command History:
Release Modification
11.01.09 The "print mismatch" command was introduced as of version 11.01.09
4.4.1.20 STOP-TRACES
Stops the event log. Although events are not stored, they are analyzed to determine whether they match any of the
configured filters.
This can be useful if we want the Event Logging System (ELS) to start tracing when a certain event occurs. You
would boot the router with the ELS disabled and you would configure a filter to detect the desired event and asso-
ciate it with the start tracing action.
4.4.1.21 TRACE-LEVEL
Allows you to set the trace level that is displayed for a subsystem. The minimum level (fewest traces) is error and the
highest level (most traces) is excessive.
Event level is not available for all event subsystems, only for some.
• error: messages for serious errors that can cause the associated functionality to stop working.
• warning: messages for unexpected errors that occur when the associated functionality is running.
• info: traces about the normal operation of the associated functionality.
• debug: debugging traces.
• msg-dump: shows traces related to the messages exchanged during the operation of the associated functionality.
• excessive: shows all available traces.
Each level includes the previous ones. If, for example, the debug level traces are enabled, the info, warning and er-
ror level traces are also included.
Syntax:
Example:
4.4.1.22 VRF
Example:
ELS config>vrf
-- VRF Events Configuration --
VRF Filter Events Config>?
Within this menu, we can configure the VRFs for which we want to display events.
Syntax:
ELS config>vrf
Example:
4.4.1.23 EXIT
Exits the Event Logging System configuration and returns to the Config> prompt.
Syntax:
ELS config>exit
Example:
ELS config>exit
Config>
Changes made in this process run automatically and are lost when the device is restarted. These commands allow
you to enable events at runtime.
Command Function
? (HELP) Lists all the commands for monitoring the Event Logging System.
CLEAR-ACTIVES Disables all enabled events at a given time.
CONDITION-DEBUG Displays useful information for debugging the conditional events functionality.
DISABLE Allows you to disable event messages so that they are not shown on the screen,
sent as syslog messages or as company-specific traps.
ENABLE Allows you to enable event messages so that they are shown on the screen, sent
as syslog messages or company-specific traps.
EVENT-STORE Stores event messages in flash memory when CIT crashes.
FILTER Specifies filtering criteria so only currently relevant events are shown at that time.
HIDE Prevents events from being displayed in the active process. From this moment,
events can only be viewed from the VISEVEN process.
This command is available from any process, even though it does not appear
when requesting a list of all available commands. It must be written in full.
LIST Lists event information and messages.
NO Disables an option.
NVRLOG Allows you to view the logs stored in non-volatile memory, and to initialize the log.
RESTORE-CONFIGURATION Allows you to activate the configuration of the currently existing Event System
(previously entered in the corresponding menu of the configuration process)
without having to save and restart the device.
SECURITY-TRACES Displays stored trace information, generated when the security-traces option is en-
abled.
SHOW-STORED-LOG Displays stored log information, generated when CIT crashes and the event-store
option is enabled.
VIEW Allows events to be displayed in the active process. From this moment, they can
no longer be viewed from the VISEVEN process.
This command is available from any process, even though it does not appear
when requesting a list of all available commands. It must be written in full.
EXIT Exits event monitoring.
4.4.2.1 ? (HELP)
Lists available commands from the current prompt. You can also enter a question mark (?) after a specific command
to list its options.
Syntax:
ELS+?
Example 1:
ELS+?
clear-actives Disable all enabled events at a given time
condition-debug Monitoring options of condition events debugging
disable Disable event messages
enable Enable event messages
filter Configure the rules permitting events filtering
hide Prevent the events from being displayed
list List information on established events and messages
nvrlog View/Initialize the logs stored in the non-volatile
memory
Example 2:
ELS+LIST ?
active List the enabled events of the specified subsystem
condition List the interfaces where packet marking has been enabled
event List event information
groups List group information
subsystem List subsystem information
ELS+
4.4.2.2 CLEAR-ACTIVES
Syntax:
ELS+clear-actives
Example:
ELS+clear-activesdetain
Do you want to disable all active events?(Y/N)(N): y
All events disabled
ELS+
4.4.2.3 CONDITION-DEBUG
Provides useful information if you want to debug the conditional events functionality seen in Event Logging System
user interface on page 190. To exclude events generated by packets that have not been tagged, a semaphore object
is used to tell the system when a packet is tagged. The semaphore is blocked when a packet is tagged because one
of the enabled conditions is met, and its unlocked when the packet is no longer tagged.
Syntax:
ELS+condition-debug ?
semaphore-clear Clear the condition semaphore
semaphore-dump Dump information on the condition semaphore
The semaphore-clear option is used to manually unlock the semaphore, thus allowing another packet to be tagged
when one of the enabled conditions is met.
Using the semaphore-dump option will give you the following information on the state of the semaphore:
Example:
ELS+condition-debug semaphore-dump
==================================
..: Condition events semaphore :..
==================================
Semaphore state: 1
Buffer address: 0x01d1cd8c
Trigger condition: interface ethernet0/0
Calls sequence: 00640490<-0066AD14<-00B62830<-00D62E20<-00D63044<-
ELS+
4.4.2.4 DISABLE
Selects and disables events so that their messages are not displayed on the screen when using the VISEVEN pro-
cess, or sent out as SNMP traps or via syslog messages. Groups, subsystems, and all traces (provided they were
previously enabled with the enable trace all command) can be disabled. You can also use the command to disable
the use of event filters.
If you have selected an input interface to display all the traces associated with the processing and path the packets
received on that interface follow, the disable trace condition interface <interface name> command allows you to
disable packet tagging on that interface.
The same procedure is used to disable the global buffer and protocol conditions with the disable trace condition
global-buffers and disable trace condition protocol <protocol name> commands, respectively.
Syntax:
ELS+disable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SYSLOG
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
FILTER
TRACE
ALL
CONDITION INTERFACE <interface name>
CONDITION GLOBAL-BUFFERS
CONDITION PROTOCOL <nom_protocolo>
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
Example 1:
This example disables the individual event ICMP.001 so it is not displayed on the screen.
Example 2:
This example disables the MYGROUP group so that events belonging to the group are not sent as syslog messages.
Example 3:
This example disables INFO filter level events from the IP subsystem so that they are not displayed or sent as SNMP
traps or as syslog messages.
4.4.2.5 ENABLE
Selects and enables events so their messages are displayed on screen, sent out as traps or transmitted via syslog
messages. Groups and subsystems can be enabled. It also allows you to enable the use of event filters.
Under the present chapter's Event Logging System user interface on page 190section, we explained how to activate
the conditional events functionality. In brief: you use the enable trace condition interface <interface name> com-
mand to enable packet tagging for a given interface so that the events associated with the processing of packets re-
ceived on that interface are shown as traces. We also indicated that you can enable all available events to be dis-
played as traces using the enable trace all command. We do not recommend using this command unless the condi-
tional event functionality is used to restrict the number of traces shown to only one packet. Otherwise, the device
shows all of them and consequently impacts performance.
In the same section we indicated that you can specify a trigger condition to enable tracing when the free global buf-
fers are used (usually locally sourced packets) or when a packet is processed by a particular protocol, using the en-
able trace condition global-buffers and enable trace condition protocol <protocol name> commands, respect-
ively.
Syntax:
ELS+enable
ALL
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SYSLOG
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
FILTER
TRACE
ALL
CONDITION INTERFACE <interface name>
CONDITION GLOBAL-BUFFERS
CONDITION PROTOCOL <nom_protocolo>
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP1
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP2
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP3
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
SNMP-TRAP-GROUP4
EVENT <subsystem.event_num>
GROUPS <nom_group>
SUBSYSTEM <subsystem> <filtered_layer>
Note
Enabling an event as a trap using the snmp-trap command enables it for all trap groups.
Example 1:
Example 2:
This example enables the MYGROUP group so that events belonging to the group are sent via syslog messages.
Example 3:
ELS+
This example enables INFO filter level events from the IP subsystem so that they are displayed on screen, sent out
as SNMP traps, and via syslog messages.
Important
Do not run this command for long periods of time when the device is transferring packets, because a
significant amount of time will be lost in communicating with the VISEVEN process. Running it when
communicating with the Teldat Router via a remote terminal may cause the device to spend most of its
time communicating with the remote terminal.
4.4.2.6 EVENT-STORE
Stores the most recent event in the event buffer to flash if the OS crashes. It is used for debugging purposes. An in-
depth knowledge of Teldat Router software is required to use this command. Do not use this command unless in-
structed to do so by Teldat personnel.
Syntax:
ELS+event-store ?
<cr>
ELS+
When using this command, a message on possible operational risks will appear as warning. If the command is con-
firmed, the event store is enabled and the event buffer will be saved to flash if the OS crashes.
ELS+event-store
WARNING: This command may cause future performance or behaviour issues
Do you want to enable event-store?
Enable event-store(Yes/No)?yes
Event store is enabled. EVENTLOG.EV will be generated when CIT crashes
ELS+
If a previous log was generated, the command issues a warning and asks for confirmation.
ELS+event-store
WARNING: This command may cause future performance or behaviour issues
Do you want to enable event-store?
Enable event-store(Yes/No)?yes
Event store is enabled. EVENTLOG.EV will be generated when CIT crashes
There is a previous event log saved
Are you sure to enable it?(This action may delete the previous one)
Enable event-store(Yes/No)? yes
ELS+
Command History:
Release Modification
11.00.05 This command was introduced as of version 11.00.05
11.01.01 This command was introduced as of version 11.01.01.
4.4.2.7 FILTER
Allows you to add, change or remove individual filters. Use the enable filter command to enable a filter.
For more information, please see the filter command in the event configuration menu.
Syntax:
ELS+filter
add Add/Change filters individually
del Delete filters individually
list Display the status of events filtering
ELS+
FILTER ADD
Adds an entry to the filter table. If the entry already exists, it is replaced.
Syntax:
Example:
FILTER DEL
Syntax:
Example:
ELS+filter del 2
FILTER LIST
Syntax:
ELS+filter list
Example:
ELS+filter list
EVENT FILTER
State: disabled
1) 172.24.78.94 /-1 -> Excl
2) rx /1 -> Red
3) --- - ---
4) --- - ---
5) --- - ---
6) --- - ---
7) --- - ---
8) --- - ---
9) --- - ---
10) --- - ---
ELS+
4.4.2.8 HIDE
Prevents events from being displayed in the active process. From now on, events can only be viewed when using the
VISEVEN process.
This command is available from any process, even though it does not appear when requesting all available com-
mands. It must be written in full.
Syntax:
ELS+hide
Example:
ELS+hide
ELS+
4.4.2.9 LIST
Lists information about enabled events, created groups, and subsystems. It also shows the interfaces being used
with the conditional events functionality.
Syntax:
ELS+list ?
active List the enabled events of the specified subsystem
condition List the interfaces where packet marking has been enabled
event List event information
groups List group information
subsystem List subsystem information
ELS+
LIST ACTIVE
Example:
Lists the enabled events in the ARP subsystem, the number of times each event has occurred, and the enable vector
for each event.
Note
Events with the always filter level are always enabled to be displayed on the console screen (e.g.,
GW.001). Similarly, there are events enabled as traps that cannot be disabled because they are re-
sponsible for generating the generic SNMP traps (for example, GW.021® link up).
LIST CONDITION
Example:
ELS+list condition
Established conditions:
Traces for packets received on ethernet0/0
ELS+
Lists the interfaces in which packet tagging has been enabled to track packets and show the traces associated with
their processing. For more information, see section 3 (Event Logging System User Interface) or the explanation of
the enable/disable trace condition interface <interface name> and enable/disable trace all commands.
LIST EVENT
Example:
If we assume that the event is currently enabled to be displayed on the screen, sent as a syslog message and as a
company-specific trap, then we would get the information shown in the example:
LIST GROUP
Example:
ELS+list group
Group: MYGROUP
Event Trace Syslog Security-Traces Management Snmp-Trap
IP.002 on on off off off
IP.003 on on off off off
IP.004 on on off off off
Globally enable as: (Trace)
ELS+
Displays the name of the group and its events, the current enable status of each event, and the current global enable
status for the group.
If all of the events in the group are enabled to be displayed on the screen, and some are enabled to be sent out as a
trap and a syslog message, then we would get the information shown in the example:
LIST SUBSYSTEM
Example 1:
Example 2:
ELS>list subsystem
Name Events Description
ELS+
Command history:
Release Modification
11.00.05 The SMGT event was introduced as of version 11.00.05.
11.01.00 The SMGT event was introduced as of version 11.01.00.
4.4.2.10 NO
Syntax:
ELS+no ?
event-store Disable event store on flash
ELS+
Command History:
Release Modification
11.00.05 This command was introduced as of version 11.00.05.
11.01.01 This command was introduced as of version 11.01.01.
NO EVENT-STORE
When this command is executed, a warning message appears to alert the user about the potential consequences of
running the command.
ELS+no event-store
Event store disabled
ELS+
4.4.2.11 NVRLOG
Allows you to view the logs stored in the non-volatile memory and to initialize the log.
Syntax:
ELS+nvrlog ?
clear Initialize the bugs system, deleting all previous ones
list Select the number of logs to be displayed on the console
ELS+
NVRLOG LIST
Allows you to choose the number of logs that are displayed on the console screen.
Syntax:
Example:
ELS+nvrlog list 2
02/26/07 11:31:05 -1- RESET:(CODE 0xc0000000) EH ES
BIOS CODE VERSION: 01.09.09 START FROM FLASH L1
02/26/07 11:28:27 -3- Reload issued by the user
ELS+
For each log, you are shown the date and time the event took place, the associated priority level of the logged mes-
sage (between dashes) and a text with information about the event.
NVRLOG CLEAR
Example:
ELS+NVRLOG CLEAR 0
01/02/07 10:32:47 -1- Logging memory initialized.
ELS+
4.4.2.12 RESTORE-CONFIGURATION
Syntax:
ELS+restore
Example:
ELS+restore
Do you want to restore ELS configuration?(Y/N)(N): y
ELS+
4.4.2.13 SECURITY-TRACES
Allows you to see the event log generated by the security-traces command and clear the file. Events are displayed
with the date the event occurred. When the file size is exceeded, the oldest events are overwritten with newer ones.
Syntax:
ELS+security-traces ?
clear Clear security-traces file
show Show security-traces file
ELS+
Example:
ELS+security-traces show
10/12/00 00:00:00 GW.001 System restarted -- M1 1GEWAN 4GESW SLOT1 IPSec SNA VoIP T+ router cold start
10/12/00 00:00:00 GW.001 System restarted -- M1 1GEWAN 4GESW SLOT1 IPSec SNA VoIP T+ router cold start
10/12/00 00:00:00 GW.001 System restarted -- M1 1GEWAN 4GESW SLOT1 IPSec SNA VoIP T+ router cold start
10/12/00 00:00:00 GW.001 System restarted -- M1 1GEWAN 4GESW SLOT1 IPSec SNA VoIP T+ router cold start
10/12/00 00:00:00 GW.001 System restarted -- M1 1GEWAN 4GESW SLOT1 IPSec SNA VoIP T+ router cold start
10/12/00 00:00:00 CNSL.017 Security traces: Changes in local users and access privileges
Note
The "security traces" feature has been disabled for devices with low flash memory (equal to or less
than 16 MBytes) and, with it, the corresponding commands.
Command History:
Release Modification
11.01.12 This command was introduced as of version 11.01.12.
11.01.09.90.01 This command was introduced in version 11.01.09.90.01.
11.02.01 This command was introduced as of version 11.02.01.
11.01.08.70.16 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.08.70.16.
11.01.12.00.06 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.12.00.06.
11.01.13 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.01.13.
11.02.01.00.11 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.01.00.11.
11.02.02 The "security-traces" command has been obsoleted for devices with low flash memory
(equal to or less than 16 MBytes) as of version 11.02.02.
4.4.2.14 SHOW-STORED-LOG
Allows you to see the last event log generated by the event-store command if the OS crashes. Events are displayed
from most recent to least recent.
Syntax:
ELS+show-stored-log ?
<1..10000> Show a specific number of events stored
<cr>
ELS+
The system allows you to view a specified number of stored events or all of the events. If you choose the option to
view all of the events and you find that there are too many, type Ctrl+P to stop the command.
Example:
ELS+show-stored-log 2
Press (Control + P) if you want to finish operation
04/14/16 17:55:27 ethernet0/0: PHY: Link UP - 100Mbps - Full - Copper
04/14/16 17:55:26 ethernet0/0: PHY is Marvell 88E1011S (01410c67)
ELS+
ELS+show-stored-log
Press (Control + P) if you want to finish operation
04/14/16 17:55:27 ethernet0/0: PHY: Link UP - 100Mbps - Full - Copper
04/14/16 17:55:26 ethernet0/0: PHY is Marvell 88E1011S (01410c67)
04/14/16 17:55:26 GW.005 Bffrs: 25575 avail 25575 idle fair 1312 low 5063
04/14/16 17:55:26 GW.073 CIT Ver Chg: Ver: 11.01.01-Beta-f97b83d+
04/14/16 17:55:26 GW.002 Portable CGW ATLAS160Super Rel 11.01.01-Beta-f97b83d+ strtd
04/14/16 17:55:26 GW.001 System restarted -- ATLAS160Super router cold start
ELS+
Command History:
Release Modification
11.00.05 This command was introduced as of version 11.00.05.
11.01.01 This command was introduced as of version 11.01.01.
4.4.2.15 VIEW
This command is available from any process, even though it does not appear when requesting all available com-
Syntax:
ELS+view ?
history Display the events history
<cr>
ELS+view
Example:
ELS+view
ELS+
This history stores the same number of events configured with the evbuffer command, as long as it is greater than
1000. If it is lower, then 1000 are stored.
Syntax:
ELS+view history ?
flush Delete the events history
regex Apply a filter to the events history
<cr>
ELS+view history
Example:
ELS+view history
ELS+
Example:
Applies a filter, in the form of a regular expression, to the history of displayed events.
Syntax:
Example 1:
Example 2:
A filter is specified so that only the historical events containing the celluar1/1 text are displayed.
4.4.2.16 EXIT
Exits Event Logging System monitoring and returns to the plus ( +) prompt.
Syntax:
ELS+exit
Syntax:
ELS+exit
+
SRE_INT_FLAGS
This patch lets you modify Event Logging system behavior. Normally, you won't need to use this command, but it is a
useful parameter to have for debugging and development. The parameter value is the sum of the flags used.
Ve: 0 The Event Logging System is operating normally.
Flag: 1 The Event Logging System stops the registering of events in the circular display buffer when it is
full. This way, when the events are not displayed and the buffer is full, CPU time is not consumed
and the system can increase its performance. The side effect is that the most recent events (not
the oldest) are lost.
Flag: 2 The date and time are not displayed, so the real-time clock is not queried and performance im-
proves.
Example: