PGW Troubleshooting 01

Download as pdf or txt
Download as pdf or txt
You are on page 1of 530

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

May 19, 2006

Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100

Text Part Number: OL-0800-06

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R)

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide Copyright 20012006, Cisco Systems, Inc. All rights reserved.

CONTENTS
Preface
xix xix

Document Objective Audience Conventions


xx

Document Organization
xxii

xx

Documentation Suite xxiv Related Documentation

xxvi

Obtaining Documentation xxviii Cisco.com xxviii Product Documentation DVD xxviii Ordering Documentation xxviii Documentation Feedback
xxix

Cisco Product Security Overview xxix Reporting Security Problems in Cisco Products

xxx

Obtaining Technical Assistance xxx Cisco Technical Support & Documentation Website Submitting a Service Request xxxi Definitions of Service Request Severity xxxi Obtaining Additional Publications and Information Document Change History
1
xxxiii xxxii

xxx

CHA PTER

Cisco MGC System Overview

1-1

Cisco Media Gateway Controller Node 1-1 Cisco Media Gateway Controller Host 1-1 Sun Netra Hosts 1-2 Cisco SS7 Interfaces 1-2 Cisco SLTs 1-2 Cisco ITPs 1-2 Cisco Switches 1-3 Ethernet Connections 1-3 Cisco MGC Software Architecture 1-4 Input/Output Subsystem 1-6 Agent Management Subsystem 1-7 Fault Tolerance Subsystem 1-8
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

iii

Contents

Execution Environment Process Shell Call Engine Process 1-10 Call Instance Component 1-10 Cisco MGC Software Directory Structure
2

1-9

1-12

CHA PTER

Cisco MGC Node Component Startup and Shutdown Procedures Cisco Media Gateway Controller Startup Procedures 2-1 Starting the Cisco MGC Hardware 2-2 Starting the Cisco MGC Software 2-2 Starting up the Cisco MGC software manually 2-3 Cisco SS7 Interface Startup Procedure Cisco Switch Startup Procedure
2-3 2-3

2-1

Cisco Media Gateway Controller Shutdown Procedure 2-4 Shutting Down the Cisco MGC Software Manually 2-4 Shutting Down the Cisco MGC Hardware 2-5 Cisco SS7 Interface Shutdown Procedure Cisco Switch Shutdown Procedure
3
2-5 2-5

CHA PTER

Cisco MGC Node Operations

3-1

Daily Tasks 3-1 Starting an MML Session 3-2 Verifying the Platform State of the Cisco MGC Hosts 3-2 Verifying That Processes Are Running 3-3 Understanding Processes 3-4 Monitoring the Alarms Status 3-6 Understanding Alarms 3-7 Verifying the Status of all Signaling Services 3-8 Understanding the Signaling Service State Information Verifying State of all SS7 Routes 3-10 Understanding the SS7 Route State Information 3-11 Verifying CIC States 3-13 Understanding CIC States 3-14 Verifying System Statistics 3-16 Verifying the Number of Active Processes 3-18 Verifying the Number of Users 3-19 Verifying Available Virtual Memory 3-20 Verifying Available Memory on the Cisco SLTs 3-21 Periodic Maintenance Procedures
3-22

3-9

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

iv

OL-0800-06

Contents

Automatic Disk Space Monitoring 3-22 Configuring Disk Monitor 3-24 Automatic System Log Rotation 3-26 Rotating System Logs Manually 3-26 Creating a Disaster Recovery Plan 3-26 Backing Up System Software 3-27 Backup Procedures for Cisco MGC Software up to Release 9.1(4) 3-27 Backup Procedures for Cisco MGC Software from Release 9.1(5) and up Processing a Core Dump File 3-40 Regular Operations 3-40 Managing MML Sessions 3-41 Displaying Previously Entered MML Commands 3-41 Displaying Information About MML Commands 3-42 Reentering Previously Entered MML Commands 3-46 Retrieving Active MML Sessions 3-47 Ending an MML Session 3-47 Managing Signaling Channels 3-47 Retrieving Signaling Service States 3-50 Retrieving Service State of C7/SS7 Links or Linksets 3-50 Retrieving the Service State for IP Links 3-51 Retrieving the Service State for IP Routes 3-51 Retrieving the Service State of D-Channels 3-53 Retrieving the State of SS7 Signaling Services 3-54 Retrieving the State of SS7 Routes 3-54 Retrieving the State of All Local Subsystem Numbers 3-55 Retrieving the Service State for Associations 3-55 Retrieving TCAP Transactions 3-56 Clearing TCAP Transactions 3-56 Enabling Group Service Reset Messages 3-57 Managing Bearer Channels 3-57 Verifying Proper Replication of Calls 3-58 Retrieving the States of Bearers Held By a Media Gateway 3-59 Blocking CICs 3-60 Retrieving the Administrative State 3-61 Managing SIP Communications 3-65 Managing the DNS Cache 3-65 Retrieving SIP Call Information 3-66 Provisioning your Cisco MGC 3-68 Starting a Provisioning Session 3-68 Saving and Activating your Provisioning Changes 3-69

3-32

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

Contents

Ending a Provisioning Session Without Activating your Changes Invoking Dynamic Reconfiguration 3-70 Retrieving Provisioning Data 3-72 Provisioning a Dial Plan 3-78 Importing Provisioning Data 3-79 Exporting Provisioning Data 3-79 Managing Automatic Congestion Control 3-80 Managing your Cisco MGC Platform 3-99 Performing a Manual Switchover 3-99 Verifying Successful Completion of a Switchover 3-100 Verifying the Patch Level of the Cisco MGC 3-104 Retrieving Configuration Table Data 3-105 Retrieving the Logging Level of Software Processes 3-109 Retrieving System Statistics 3-109 Managing System Measurements 3-112 Retrieving Measurements 3-112 Clearing Measurements 3-113 Retrieving Link or Linkset Measurements 3-113 Retrieving SS7 Signaling Point Measurements 3-115 Retrieving Measurement Thresholds 3-124 Modifying Measurement Thresholds 3-125 Managing Call Detail Records 3-125 Converting Individual CDR Files to ASCII Format 3-126 Converting Individual CDR Files to a Readable Format 3-126 Using the Cisco MGC Viewer Toolkit 3-127 Launching the Cisco MGC Toolbar 3-128 Using the Alarm Viewer 3-128 Using the Call Detail Record Viewer 3-131 Using the Config-Lib Viewer 3-135 Using the Log Viewer 3-136 Using the Measurement Viewer 3-139 Using the Trace Viewer 3-142 Using the Translation Verification Viewer 3-142 Using the File Options Viewer 3-148 Using the MGC Backup Viewer 3-149 Using the MGC Restore Viewer 3-149
4

3-70

CHA PTER

Maintenance and Troubleshooting Overview Maintenance Strategy Overview


4-1

4-1

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

vi

OL-0800-06

Contents

Troubleshooting Strategy Overview 4-2 Symptoms, Problems, and Solutions 4-2 General Problem-Solving Model 4-2 System Troubleshooting Tools 4-4 Alarms 4-4 Call Traces 4-4 System Logs 4-4 MML Queries 4-5 Cisco Internetwork Management Tools 4-5 Cisco SS7 Interface Diagnostic Commands 4-7 Third-Party Troubleshooting Tools 4-9 Volt-Ohm Meters, Digital Multimeters, and Cable Testers Breakout Boxes, Fox Boxes, and BERTs/BLERTs 4-10 Network Monitors and Analyzers 4-10 TDRs and OTDRs 4-11
5

4-9

CHA PTER

Maintaining the Cisco MGC Checking Equipment Status Sun Netra LEDs 5-1

5-1 5-1

Maintaining Technical Support Staff 5-2 Skill Level of Personnel 5-2 Staff Software Troubleshooting Tools Maintaining Components 5-2 Software Upgrades 5-2
6

5-2

CHA PTER

Maintaining the Cisco Signaling Link Terminal

6-1

Checking Equipment Status 6-2 Cisco SLT LEDs 6-2 Front-Panel LEDs 6-2 Rear-Panel LEDs 6-3 WIC LEDs 6-3 VWIC LEDs 6-4 Using the Cisco SLT Operating System to Check Status Removing a Cisco SLT 6-5 Required Tools and Equipment Procedure 6-6
6-5

6-4

Replacing a Cisco SLT 6-6 Required Tools and Equipment 6-6 Mounting the Chassis in a Rack 6-6
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

vii

Contents

Attaching the Brackets 6-7 Installing the Cisco SLT in a Rack 6-9 Connecting the DC Power Supply 6-9 DC Power Specifications 6-9 Wiring the DC Power Supply 6-9 Connecting to a Network 6-11 Connecting the Console Terminal and Modem Identifying a Rollover Cable 6-11 Connecting to the Console Port 6-12 Cisco SLT Interface Numbering 6-12 Install the New Software 6-13 Replacing Hardware Components 6-13 Required Tools and Equipment 6-14 Installing a WAN Interface Card 6-14 WIC Filler Panels 6-15

6-11

Additional Maintenance Tasks 6-15 Upgrading DRAM 6-16 Cisco SLT DRAM 6-16 Opening the Chassis 6-16 Tools Required 6-17 Removing the Chassis Cover 6-17 DRAM DIMM Installation 6-18 Replacing the System-Code SIMM 6-19 Tools Required 6-20 Preparing to Install the System-Code SIMM 6-20 System-Code SIMM Replacement 6-20 Closing the Chassis 6-21 Replacing the Cover 6-21 Procedures for Recovering Boot and System Images 6-22
7

CHA PTER

Maintaining the Cisco Catalyst 5500 Multiswitch Router

7-1

Checking Equipment Status 7-1 Cisco Catalyst 5500 LEDs 7-1 Supervisor Engine Module LEDs 7-2 Ethernet Switching Module (10BaseT 24 Port) LEDs 7-3 10/100 Mbps Fast Ethernet Switching Module (10/100BaseTX 12 Port) LEDs Route Switch Module LEDs 7-4 Using the Command Line Interface to Check Status 7-5 Replacing Hardware Components
7-5

7-4

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

viii

OL-0800-06

Contents

Avoiding Problems When Inserting and Removing Modules 7-6 Tools Required 7-6 Removing the Supervisor Engine 7-6 Replacing the Supervisor Engine 7-7 Using Flash Memory (PCMCIA) Cards (Supervisor Engine III) 7-7 Removing and Replacing the Power Supply 7-8 Removing an AC-Input Power Supply 7-9 Installing an AC-Input Power Supply 7-10 Removing a DC-Input Power Supply 7-11 Installing a DC-Input Power Supply 7-13 Removing and Replacing the Chassis Fan Assembly 7-15 Removing the Fan Assembly 7-15 Installing the Fan Assembly 7-16 Checking the Installation 7-17
8

CHA PTER

Troubleshooting the Cisco MGC Node Troubleshooting Overview 8-1 Cisco SLT Failure 8-2 Cisco MGC Failure 8-2 Operating System Failure 8-2

8-1

Troubleshooting Using Cisco MGC Alarms 8-2 Retrieving All Active Alarms 8-3 Acknowledging Alarms 8-3 Clearing Alarms 8-4 Troubleshooting with System Logs 8-4 Viewing System Logs 8-4 Understanding System Log Messages 8-6 Changing the Log Level for Processes 8-6 Creating a Diagnostics Log File 8-8 Collecting System Data for Cisco TAC 8-8 Alarm Troubleshooting Procedures 8-9 All Conn Cntl Links Fail 8-9 All C7 IP Links Fail 8-10 All ISDN BRI IP Conn Fail 8-11 All ISDN IP Conn Fail 8-12 All M3UAKEY Ack Pending 8-13 All M3UA Assoc Fail 8-14 All SUAKEY Ack Pending 8-15 All SUA Assoc Fail 8-16

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

ix

Contents

ANAL: ALoopCtrExceeded 8-17 ANAL: ATableFail_GetDigMod 8-18 ANAL: ATableFail_GetResult 8-18 ANAL: ATableFlt_DgtRangeError 8-18 ANAL: BLoopCtrExceeded 8-19 ANAL: BNum_GetFail_SrvcTbl 8-20 ANAL: BNum_MdfyBFail_ AnnounceID 8-20 ANAL: BTableFail_GetDigTree 8-20 ANAL: BTableFail_GetDigMod 8-20 ANAL: BTableFail_GetResult 8-21 ANAL: BTableFlt_DgtRangeError 8-21 ANAL: Cause_GetFail_CauseTbl 8-22 ANAL:Cause_GetFail_DigModTbl 8-22 ANAL: Cause_GetFail_InvldRsltType 8-23 ANAL:Cause_GetFail_LocTbl 8-23 ANAL:Cause_GetFail_RsltTbl 8-23 ANAL:Cause_InvldRslts_CauseTbl 8-24 ANAL: Cause_MdfyBFail_AnnounceID 8-24 ANAL: Cause_MdfyBFail_AppPtInvld 8-25 ANAL: Cause_Rte_LoopDetected 8-25 ANAL: CustId/StartIdx Missing 8-25 ANAL:DataBaseAccessFail 8-26 ANAL: Data Failure Rcvd 8-27 ANAL:dpselection_table_fail 8-27 ANAL:getDialplanBase_fail 8-27 ANAL: InvalidtrkGrpType 8-28 ANAL: Prof_GetFail_DigModTbl 8-28 ANAL: Prof_GetFail_InvldRslt 8-28 ANAL: Prof_GetFail_NOATbl 8-28 ANAL: Prof_GetFail_NOATbl_A 8-29 ANAL: Prof_GetFail_NPITbl 8-29 ANAL: Prof_GetFail_NPITbl_A 8-30 ANAL: Prof_GetFail_RsltTbl 8-30 ANAL: Prof_InvldNPAValue 8-31 ANAL: Prof_InvRslts_NOATbl 8-31 ANAL: Prof_InvRslts_NOATbl_A 8-31 ANAL: Prof_MdfyBFail_AppPtInvld 8-32 ANAL: RteStartIndexInvalid 8-32 ANAL: Rte_TableHopCtrExceeded 8-33 ANAL: RteTableFail_GetRteList 8-33
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

OL-0800-06

Contents

ANAL: RteTableFail_GetTrkAttrdata 8-34 ANAL: RteTableFail_GetTrkGrpdata 8-34 ANAL: RteTableFail_GetTrunkList 8-34 ANAL: TableFail_BearerCapTable 8-34 ANAL: TableFail_CondRouteDescTable 8-35 ANAL: TableFail_CondRouteTable 8-35 ANAL: TableFail_CPCTable 8-35 ANAL: TableFail_RouteHolTable 8-36 ANAL: TableFail_PercRouteTable 8-36 ANAL: TableFail_TMRTable 8-36 ANAL: TableFail_TNSTable 8-37 ANAL: TrunkGrpRsltCtrExceeded 8-37 Association Degraded 8-37 Association Fail 8-38 C7LNK ALGNMT LOST 8-38 C7DPC CONGESTION 8-38 C7LNK CONGESTION 8-39 C7LNK INHIBIT 8-39 C7SLTLnkCong 8-39 Charge Table Access Failure 8-40 Charge Table Load Failure 8-40 Comm Srvc Creation Error 8-40 Config Fail 8-41 Dial Plan Loading Failed 8-42 DISK 8-42 EISUP: Unexpected Msg/Par 8-42 ENGINE CONFIG FAIL 8-42 FAIL 8-43 FailoverPeerLost 8-44 FailoverPeerOOS 8-44 FAIL REMOTE STANDBY 8-45 FORCE NODE RESTART 8-45 Gen Fail 8-46 Holiday Table Access Failure 8-47 Holiday Table Load Failure 8-47 INVALID M3UA RC 8-47 INVALID SUA RC 8-48 Invalid Virtual_IP_Addr 8-48 IP CONNECTION FAILED 8-49 IP RTE CONF FAIL 8-50
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xi

Contents

IP RTE FAIL 8-50 ISUP: COT Failure 8-51 LIF BER 8-51 LIF FAIL 8-51 LIF LOF 8-52 LIF LOS 8-53 LIF SES 8-53 LIF YELLOW 8-54 LIF: IDLE CHANGE 8-54 LIF: LOST CD 8-55 LIF: LOST CTS 8-55 M3UAKEY Ack Pending 8-56 MMDB: Database unavailable 8-56 MMDB: Database cause failover 8-57 MMDB: Database nearly full 8-57 NAS: AuditResponse Failure 8-57 NAS: CommsFailure 8-58 NAS: ResourceFailure 8-58 OLC: Leg1chanSeizedUnpackError 8-59 OLC: Leg1chanModifiedUnpackError 8-59 OLC: Leg1chanDeletedUnpackError 8-59 OLC: Leg1notifyUnpackError 8-60 OLC: Leg1deleteChanUnpackError 8-60 OLC: Leg1notifyRequestAckUnpackError 8-60 OLC: Leg1chanOpsFailed 8-61 OOS TRAFFIC RE-ROUTE 8-61 OverloadHeavy 8-62 OverloadMedium 8-62 OverloadLight 8-63 OverResIncomingThreshold 8-63 PC UNAVAIL 8-64 Peer IP Links Failure 8-64 PEER LINK A FAILURE 8-65 PEER LINK B FAILURE 8-65 PEER MODULE FAILURE 8-65 POM INACTIVITY TIMEOUT 8-66 POM SESSION TERMINATE 8-66 POM: DynamicReconfiguration 8-66 POM: PEER_SYNC_ERR 8-66 PRI: B-Channel not available 8-66
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xii

OL-0800-06

Contents

ProcM No Response 8-67 ProtocolFileMissing 8-67 REPL: all connections failure 8-68 RSET CONFIG FAIL 8-69 SC CONFIG FAIL 8-69 SC FAIL 8-70 SC M-OOS 8-70 SG Node Interface Fail 8-70 SG Pair Interface Fail 8-71 SIP: DNS CACHE NEARLY FULL 8-71 SIP: DNS SERVICE OOS 8-72 SIP: OOS 8-72 SIP Service Fail Over 8-72 Standby Warm Start 8-73 SS7 RTE KEY FAIL 8-74 SS7 SIG SRVC CONFIG FAIL 8-74 SS7 SIG SRVC UNAVAIL 8-75 SSN FAIL 8-76 SUAKEY Ack Pending 8-76 SUPPORT FAILED 8-77 SwitchoverFail 8-77 TALI: Invalid Protocol Version 8-77 TALI: Invalid State 8-78 Tariff Table Access Failure 8-78 Tariff Table Load Failure 8-78 TLC: Leg2chanSeizedUnpackError 8-79 TLC: Leg2chanModifiedUnpackError 8-79 TLC: Leg2chanDeletedUnpackError 8-79 TLC: Leg2notifyUnpackError 8-80 TLC: Leg2deleteChanUnpackError 8-80 TLC: Leg2notifyRequestAckUnpackError 8-80 TLC: Leg2chanOpFailed 8-81 UCM: CCodeModfailed 8-81 UCM: MGCPDIALAuthFail 8-83 Virtual_IP_Addr Mismatch 8-84 Wrong IP Path 8-84 XE Rsrc Fail 8-85 Resolving SS7 Network Related Problems Signaling Channel Problems 8-87 SS7 Link is Out-of-Service 8-88
8-86

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xiii

Contents

SS7 Load Sharing Malfunction 8-88 Physical Layer Failures 8-90 Configuration Errors 8-90 Supporting Entity Failures 8-90 Incomplete Signaling 8-90 Changing Service States 8-91 Signaling Destination Problems 8-91 Bouncing SS7 Links 8-92 Configuration Errors 8-93 Traffic Restart 8-93 SS7 Destination is Out of Service 8-93 SS7 Route is Out of Service 8-94 SS7 Destination is Unavailable 8-94 Signaling Channel Troubleshooting Procedures 8-94 Setting the Service State of a Signaling Service 8-95 Setting the Service State of a C7/SS7 Link or Linkset 8-96 Setting the Service State of an IP Link 8-97 Setting the Service State of an IP Route 8-97 Setting the Service State of a D-channel 8-98 Setting the Service State of a Local Subsystem Number 8-98 Setting the Service State of an Association 8-99 Verifying MTP Timer Settings 8-99 Modifying Configurable Timers 8-101 Managing Japanese SS7 Signaling Link Tests 8-110 Managing Japanese SS7 Signaling Route Tests 8-111 Verifying Proper Loading of a Dial Plan 8-112 Verifying Configuration to Support Multiple Versions of SS7 8-113 Resolving an Association Alarm 8-113 Converting Stored and Transmitted Point Code Values 8-114 Resolving Bearer Channel Connection Problems 8-115 Setting the Administrative State 8-116 Setting the Administrative State of a Cisco MGC 8-116 Setting the Administrative State of a Media Gateway 8-117 Setting the Administrative State of a Trunk Group 8-117 Setting the Administrative State of a Signaling Service 8-118 Setting the Administrative State of Spans 8-119 Setting the Administrative State of CICs 8-120 Querying Local and Remote CIC States 8-121 Resolving Local and Remote CIC State Mismatch 8-123 Performing CIC Validation Tests 8-123
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xiv

OL-0800-06

Contents

Resolving ISDN D-Channel Discrepancies 8-129 Unblocking CICs 8-131 Unblocking Locally Blocked CICs 8-131 Unblocking Remotely Blocked CICs 8-132 Resetting CICs 8-132 Resolving Stuck CICs 8-133 Manually Resolving Stuck CICs 8-134 Auditing Call States 8-137 Stopping Calls 8-137 Stopping Calls on a Cisco MGC 8-137 Stopping Calls on a Media Gateway 8-138 Stopping Calls on a Trunk Group 8-138 Stopping Calls on a Signaling Service 8-138 Stopping Calls on Spans 8-139 Stopping Calls on CICs 8-140 Auditing an MGCP Media Gateway 8-140 Starting an MGCP Media Gateway Audit 8-140 Retrieving an MGCP Media Gateway Audit 8-141 Running a Manual Continuity Test 8-142 Verifying Continuity Test Settings 8-142 Media Gateway IP Destination/Link Out-of-Service 8-143 Calls Fail at the Cisco MGC 8-145 3.1 KHz (ISDN Category 3) Calls are Failing 8-146 Calls are Misrouting 8-146 Resolving SIP Communication Problems Stopping SIP-to-SIP Calls 8-148
8-148

Tracing 8-148 Performing a Call Trace 8-148 Starting A Call Trace 8-149 Stopping A Call Trace 8-150 Retrieving Names of Open Call Trace Files 8-151 Viewing the Call Trace 8-151 Deleting Call Trace Files 8-152 Understanding the Call Trace 8-152 Alternatives to Call Tracing 8-154 Diagnosing Hung Calls 8-154 Performing an Abnormal Call Termination Trace 8-156 Performing a TCAP Trace 8-157 Platform Troubleshooting
8-158

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xv

Contents

Verifying Cisco MGC Ethernet Operation 8-158 Deleting Unnecessary Files to Increase Available Disk Space 8-158 Recovering from a Switchover Failure 8-159 Recovering from Cisco MGC Host(s) Failure 8-161 Recovering from a Cisco MGC Host Failure in a Simplex System 8-162 Recovering from a Single Cisco MGC Host Failure in a Continuous Service System 8-162 Recovering from a Dual Cisco MGC Host Failure in a Continuous Service System 8-163 Restoring Stored Configuration Data 8-164 Restoring Procedures for Cisco MGC Software up to Release 9.1(4) 8-164 Restoring Procedures for Cisco MGC Software Release 9.1(5) and up 8-168 Verifying Proper Configuration of Replication 8-170 Configuration Export Failed Due to MMDB 8-171 Measurements Are Not Being Generated 8-171 Call Detail Records Are Not Being Generated 8-172 Resolving a Failed Connection to a Peer 8-172 Rebooting Software to Modify Configuration Parameters 8-173 Diagnosing SNMP Failure 8-174 Correcting the System Time 8-176 NTP is Not Used and MGC is Not the Source of the CDRs 8-176 NTP is Not Used and MGC is the Source of the CDRs 8-177 NTP is Used and MGC is the Source of the CDRs 8-177 Securing your Network 8-177 Securing the Cisco PGW 2200 8-178 Securing BAMS 8-179 TIBCO Interface Not Working 8-186
A

APPENDIX

Configuring Cisco MGC Log Files Understanding Logging Files


A-1

A-1

Configuring the Data Dumper A-2 Configuring the Data Dumper to Support BAMS A-4 Understanding the Format of Log Files Archived Using Data Dumper
B

A-5

APPENDIX

Troubleshooting Cisco SLT Signaling Cisco SLT Signaling Overview B-2 IP Signaling Backhaul B-2 Types of Encapsulation B-2 PDU Verb Types B-2 Backhaul Message IDs B-2 Connection Management B-3

B-1

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xvi

OL-0800-06

Contents

Backhaul Statistics B-3 Backhaul Congestion B-4 Link Status B-4 Troubleshooting SS7 Link Problems B-5 Checking Link Configuration Files B-5 Checking UDP Traffic Flows B-5 Checking Connection between Cisco MGC and Cisco SLT Checking the T1/E1 Link State B-6 Verifying the Link Alignment Status B-6 Verifying Exchanged Point Codes B-7 Cross-Checking Configuration Files B-8 Troubleshooting Cisco SLT-to-STP Signaling Links B-10 MTP1 Communication Problems B-11 Identifying MTP1 Communication Problems B-11 Resolving MTP1 Communication Problems B-11 MTP2 Communication Problems B-12 Identifying MTP2 Communication Problems B-12 Resolving MTP2 Communication Problems B-12 Troubleshooting Cisco SLT to Cisco MGC Communications B-13 Identifying MTP3 and Higher Layer Problems B-13 Resolving MTP3 and Higher Layer SS7 Communication Problems Identifying Ethernet Connectivity Problems B-14 Identifying IP Communication Problems B-14 Identifying RUDP Communications Problems B-15 Cisco SLT Error Messages
C
B-15

B-6

B-14

APPENDIX

Troubleshooting Cisco Switch Signaling VLANs


C-1

C-1

Command Line Interface C-1 Command Line Interface Local Access C-3 Command Line Interface Remote Access C-3 Troubleshooting Virtual Pathways and ISLs
D
C-3

APPENDIX

Cisco MGC Measurements ANSI ISUP Measurements

D-1 D-29

INDEX

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xvii

Contents

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xviii

OL-0800-06

Preface
This preface describes the objectives, audience, organization, and conventions of this document, and explains how to find additional information on related products and services. It contains the following sections:

Document Objective, page xix Audience, page xx Document Organization, page xx Conventions, page xxii Documentation Suite, page xxiv Obtaining Documentation, page xxviii Documentation Feedback, page xxix Cisco Product Security Overview, page xxix Obtaining Technical Assistance, page xxx Obtaining Additional Publications and Information, page xxxii Document Change History, page xxxiii

Document Objective
This document provides instructions for operating, maintaining, and troubleshooting the core elements of the Cisco Media Gateway Controller (MGC) node, as listed below.

Cisco MGCs Cisco Signaling Link Terminals (SLTs) Cisco Catalyst Multiswitch Routers (MSRs)

This document covers such topics systems operation and management, signaling channel operation, alarm management, and problem identification and resolution. The procedures in this document are to be used when your Cisco MGC node is configured with two Cisco MGCs working in a continuous service mode, unless otherwise specified.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xix

Preface Audience

Note

The term media gateway controller used in this document is a generic term that applies to the Cisco PGW 2200 product. Some of the documentation for your telephony solution might use the terms signaling controller or configured for signaling and PSTN gateway or configured for call control to refer to features that are unique to different configurations of the Cisco PGW 2200.

Note

The Cisco PGW 2200 configured for signaling was formerly called the Cisco SC2200 Signaling Controller. The Cisco PGW 2200 configured for call control was formerly called the Cisco VSC3000 Virtual Switch Controller. Some documentation for your telephony solution may use these names.

Audience
This guide is intended for three audiences: the system administrators, the system operators, and the system technicians.

The system administrator manages the host administrative functions, including configuring and maintaining system parameters, granting group and user IDs, and managing all Cisco MGC files and directories. The system administrator should have an in-depth knowledge of UNIX and a basic knowledge of data and telecommunications networking. The system operator should be familiar with telecommunication protocols, basic computer software operations, computer terminology and concepts, hierarchical file systems, common UNIX shell commands, log files, and the configuration of telephony switching systems. The system technician should be familiar with telecommunication protocols, basic computer software operations, computer terminology and concepts, hierarchical file systems, common UNIX shell commands, log files, the configuration of telephony switching systems, the use of electrical and electronic telephony test equipment, and basic troubleshooting techniques.

Document Organization
The major sections of this guide are summarized in Table 1.
Table 1 Major Sections of This Guide

Chapter/ Appendix Chapter 1

Title Cisco MGC System Overview

Description Includes high-level descriptions of the operations, maintenance, and troubleshooting procedures contained in this guide. Contains the recommended startup and shutdown procedures for each component of the Cisco MGC node. Explains how to manage Cisco MGC operations, including starting and stopping the application, running the process manager, operating the switchover process, retrieving signal channel attributes, and changing signal service states.

Chapter 2

Cisco MGC Node Component Startup and Shutdown Procedures Cisco MGC Node Operations

Chapter 3

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xx

OL-0800-06

Preface Document Organization

Table 1

Major Sections of This Guide (continued)

Chapter/ Appendix Chapter 4 Chapter 5

Title Maintenance and Troubleshooting Overview Maintaining the Cisco MGC

Description Contains the overall maintenance strategies for the Cisco MGC node. Describes maintenance of the Cisco MGC hosts, including LED descriptions, shutdown and restart procedures, spare parts stocking levels, the log rotation utility, the diskmonitor program, and backup procedures. Describes maintenance of the Cisco SLT, including checking equipment status, replacing a complete signal processor, replacing hardware components, and performing other maintenance tasks. Describes maintenance of Cisco Catalyst MSRs, including checking equipment status, replacing a complete router, and replacing various components. Describes strategies for isolating problems, including the use of system alarms, indicators, and interfaces. Explains how to troubleshoot the Cisco MGC. Troubleshooting includes working with alarms and resolving signaling channel problems, signaling destination problems, and bearer connection problems. System logs are also described.

Chapter 6

Maintaining the Cisco Signaling Link Terminal

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Chapter 8

Troubleshooting the Cisco MGC Node

Appendix A

Configuring Cisco MGC Log Files Describes the Cisco MGC log files: how to view, print, and interpret log files. Also explains how to use the Cisco MGC software to retrieve network measurements and statistics, including call detail, measurement, and alarm records. Troubleshooting Cisco SLT Signaling Troubleshooting Cisco Switch Signaling Cisco MGC Measurements Explains how to troubleshoot the Cisco SLTs, including Cisco SLT to STP signaling links and Cisco SLT to Cisco MGC signaling links. Describes troubleshooting the Cisco MSR using the command line interface, as well as virtual pathways and links. Lists the measurements used by the Cisco MGC.

Appendix B

Appendix C

Appendix D

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxi

Preface Conventions

Conventions
Table 2 provides descriptions of the conventions used in this document.
Table 2 Document Conventions

Convention Boldface Italics

Description of usage Commands and keywords you enter literally as shown Variables for which you supply values

Comments offset-list command type interface You replace the variable with the type of interface. In contexts that do not allow italics, such as online help, arguments are enclosed in angle brackets (< >).

Square brackets ([ ]) Vertical bars ( | )

Optional elements Separated alternative elements

command [abc] abc is optional. command [ abc | def ] You can choose either abc or def, or neither, but not both.

Braces ({ })

Required choices

command { abc | def } You must use either abc or def, but not both.

Braces and vertical bars A required choice within an within square brackets optional element ([ { | } ]) Caret character (^) Control key

command [ abc { def | ghi } ] You have three options: nothing, abc def, or abc ghi. The key combinations ^D and Ctrl-D are equivalent: Both mean hold down the Control key while you press the D key. Keys are indicated in capital letters, but are not case-sensitive. For example, when your are setting an SNMP community string to public, do not use quotation marks around the string; otherwise, the string will include the quotation marks. The system prompt indicates the current command mode. For example, the prompt Router (config) # indicates global configuration mode.

A string

A nonquoted set of characters

System prompts

Denotes interactive sessions, indicates that the user enters commands at the prompt Terminal sessions and information the system displays

Screen

font

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxii

OL-0800-06

Preface Conventions

Table 2

Document Conventions (continued)

Convention Angle brackets (< >) Exclamation points (!) at the beginning of a line

Description of usage Nonprinting characters such as passwords A comment line

Comments

Comments are sometimes displayed by the Cisco IOS software.

Note

Means reader take note. Notes contain helpful suggestions or references to material not covered in the guide.

Caution

Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Warning

This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents. (To see translated versions of this warning, refer to the Regulatory Compliance and Safety Information that accompanied your equipment.)

Table 3 describes the various data type conventions used in this document.
Table 3 Data Type Conventions

Data Type Integer

Definition A series of decimal digits from the set of 0 through 9 that represents a positive integer. An integer might have one or more leading zero (0) digits padded on the left side to align the columns. Leading zeros are always valid as long as the number of digits is less than or equal to ten digits total. The range of values is 0 through 4294967295.

Example 123 000123 4200000000

Signed integer

This data type has the same basic format as the integer but can 123 be positive or negative. When negative, it is preceded by the 000123 minus sign () character. As with the integer data type, this can be as many as 10 digits in length, not including the sign 2100000000l character. The value of this type has a range of 2147483647 through 2147483647.

Hexadecimal A series of 16-based digits from the set of 0 to 9, a to f, or 1f3 A to F. The hexadecimal number might have one or more 0 01f3000 digits padded on the left side. For all hexadecimal values, the maximum size is 0xffffffff (8 hexadecimal digits). Text A series of alphanumeric characters from the ASCII character set. Tab, space, and double quote ( ) characters cannot be used. Text can be as many as 255 characters; however, it is recommended that you limit the characters to no more than 32 for readability. EntityID LineSES_Threshold99

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxiii

Preface Documentation Suite

Table 3

Data Type Conventions (continued)

Data Type String

Definition

Example

A series of alphanumeric characters and white-space This is a descriptive characters. A string is surrounded by double quotes on the string. left and right sides ( ). Text can be as many as 255 characters; however, it is recommended that you limit the characters to no more than 80 for readability. Hexadecimal and integer fields in files might have different widths (number of characters) for column alignment. The standard TCP/IP address expressed as four numbers, where each number is from 0 through 255 and consecutive numbers are separated by a period. 139.85.60.17 or 127.55.13.200

Note

IP address

Note

All known exceptions to these conventions are expressed in the specific format sections of this document.

Documentation Suite
The documents that make up the Cisco MGC documentation set are listed in Table 4. The grayed box in this table indicates the publication you are currently reading.
Table 4 Cisco MGC Documentation

Functional Area Hardware Installation

Publication

Description and Audience

Cisco Media Gateway Controller Describes how to install the hardware Hardware Installation Guide components of the Cisco MGC node. Includes detailed information on the environmental requirements for all the components and step-by-step hardware installation and operational verification procedures. Also provides a checklist of the hardware you should have before starting the installation and a checklist of all the connections for the components. The audience for these publications is the engineering personnel responsible for installing the components and verifying the hardware installation.

Software Installation

Cisco Media Gateway Controller Describe the steps necessary to install and Software Release 9 Installation upgrade the software components of the and Configuration Guide Cisco MGC. The audience for these publications is the engineering personnel responsible for installing, configuring, and upgrading software for the respective solutions.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxiv

OL-0800-06

Preface Documentation Suite

Table 4

Cisco MGC Documentation (continued)

Functional Area Software Release Notes

Publication Release Notes for the Cisco Media Gateway Controller Software Release 9

Description and Audience Provides information that is specific to a particular release of the Cisco MGC software. The audience for these publications is the engineering personnel responsible for installing, configuring, and upgrading software for the respective solutions.

Provisioning

Cisco Media Gateway Controller Provide step-by-step procedures for Software Release 9 Provisioning provisioning the Cisco MGC. Guide The audience for these publications is the Cisco Media Gateway Controller engineering personnel responsible for provisioning. Software Release 9 Dial Plan Guide Cisco Voice Services Provisioning Tool Users Guide

Operations, Maintenance, and Troubleshooting

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

Describes the procedures necessary to conduct day-to-day operations, to perform preventive and corrective maintenance, and to troubleshoot the various components of the solution. The audience for this publication is the system administrators, system operators, and service technicians responsible for operating, maintaining, and servicing the components of the respective solutions

Reference

Provide reference information for the Regulatory Compliance and Safety Information for the Cisco hardware and software of the Cisco MGC. Media Gateway Controller The audience for these publications is the Hardware engineering personnel responsible for Cisco Media Gateway Controller installing, configuring, operating and upgrading software for the respective Software Release 9 MML solutions. Command Reference Guide Cisco Media Gateway Controller Software Release 9 Messages Reference Guide Cisco Media Gateway Controller Software Release 9 Billing Interface Guide Cisco Media Gateway Controller Software Release 9 Management Information Base Guide

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxv

Preface Documentation Suite

Related Documentation
Other useful reference publications include

Overviews of the related telephony solutionsDescribe the Cisco telephony solutions with which the Cisco MGC node is associated Provisioning guides for the related telephony solutionsDescribe the provisioning steps for the Cisco telephony solutions with which the Cisco MGC node is associated Solution gateway installation and configuration guidesDescribe how to install and configure the media gateway for a particular Cisco telephony solution.

Figure 1 shows the sequence in which the various manuals documenting Cisco telephony solutions should be read.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxvi

OL-0800-06

Preface Documentation Suite

Figure 1

Documentation Roadmap

Start

Solution Overview

Is MGC host set up? No

Yes

Is gateway set up? No

Yes

Regulatory Compliance and Safety Information for Cisco MGC

Regulatory Compliance and Safety Information for Cisco Media Gateway

Cisco MGC Hardware Installation Guide

Solution Gateway Hardware Installation Guide

Release Notes for Cisco MGC Software Release 9

Solution Gateway Software Installation and Configuration Guide

Cisco MGC Software Release 9 Installation and Configuration Guide

Solution Gateway Provisioning Guide End Cisco MGC Software Release 9 Billing Interface Guide *

Cisco MGC Software Release 9 Provisioning Guide

Cisco MGC Software Release 9 Dial Plan Guide

Cisco MGC Software Release 9 MML Command Reference Guide * Cisco MGC Software Release 9 Messages Reference Guide * Cisco MGC Software Release 9 Management Information Base Guide *
57050

Cisco Voice Services Provisioning Tool Version 2.x

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

* This guide provides useful information that is not required during installation.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxvii

Preface Obtaining Documentation

Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.

Cisco.com
You can access the most current Cisco documentation at this URL: http://www.cisco.com/techsupport You can access the Cisco website at this URL: http://www.cisco.com You can access international Cisco websites at this URL: http://www.cisco.com/public/countries_languages.shtml

Product Documentation DVD


Cisco documentation and additional literature are available in the Product Documentation DVD package, which may have shipped with your product. The Product Documentation DVD is updated regularly and may be more current than printed documentation. The Product Documentation DVD is a comprehensive library of technical product documentation on portable media. The DVD enables you to access multiple versions of hardware and software installation, configuration, and command guides for Cisco products and to view technical documentation in HTML. With the DVD, you have access to the same documentation that is found on the Cisco website without being connected to the Internet. Certain products also have .pdf versions of the documentation available. The Product Documentation DVD is available as a single unit or as a subscription. Registered Cisco.com users (Cisco direct customers) can order a Product Documentation DVD (product number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace. Cisco Ordering tool: http://www.cisco.com/en/US/partner/ordering/ Cisco Marketplace: http://www.cisco.com/go/marketplace/

Ordering Documentation
Beginning June 30, 2005, registered Cisco.com users may order Cisco documentation at the Product Documentation Store in the Cisco Marketplace at this URL: http://www.cisco.com/go/marketplace/ Cisco will continue to support documentation orders using the Ordering tool:

Registered Cisco.com users (Cisco direct customers) can order documentation from the Ordering tool: http://www.cisco.com/en/US/partner/ordering/

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxviii

OL-0800-06

Preface Documentation Feedback

Instructions for ordering documentation using the Ordering tool are at this URL: http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm

Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387).

Documentation Feedback
You can rate and provide feedback about Cisco technical documents by completing the online feedback form that appears with the technical documents on Cisco.com. You can send comments about Cisco documentation to [email protected]. You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address: Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883 We appreciate your comments.

Cisco Product Security Overview


Cisco provides a free online Security Vulnerability Policy portal at this URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html From this site, you can perform these tasks:

Report security vulnerabilities in Cisco products. Obtain assistance with security incidents that involve Cisco products. Register to receive security information from Cisco.

A current list of security advisories and notices for Cisco products is available at this URL: http://www.cisco.com/go/psirt If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL: http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxix

Preface Obtaining Technical Assistance

Reporting Security Problems in Cisco Products


Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT:

Emergencies [email protected] An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.

Nonemergencies [email protected]

In an emergency, you can also reach PSIRT by telephone:


1 877 228-7302 1 408 525-6532

Tip

We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x. Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.htm The link on this page has the current PGP key ID in use.

Obtaining Technical Assistance


Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.

Cisco Technical Support & Documentation Website


The Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, at this URL: http://www.cisco.com/techsupport Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL: http://tools.cisco.com/RPF/register/register.do

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxx

OL-0800-06

Preface Obtaining Technical Assistance

Note

Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.

Submitting a Service Request


Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL: http://www.cisco.com/techsupport/servicerequest For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly. To open a service request by telephone, use one of the following numbers: Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227) EMEA: +32 2 704 55 55 USA: 1 800 553-2447 For a complete list of Cisco TAC contacts, go to this URL: http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity


To ensure that all service requests are reported in a standard format, Cisco has established severity definitions. Severity 1 (S1)Your network is down, or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation. Severity 2 (S2)Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation. Severity 3 (S3)Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels. Severity 4 (S4)You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxxi

Preface Obtaining Additional Publications and Information

Obtaining Additional Publications and Information


Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL: http://www.cisco.com/go/marketplace/

Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL: http://www.ciscopress.com

Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL: http://www.cisco.com/packet

iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL: http://www.cisco.com/go/iqmagazine or view the digital edition at this URL: http://ciscoiq.texterity.com/ciscoiq/sample/

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL: http://www.cisco.com/ipj

Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL: http://www.cisco.com/en/US/products/index.html

Networking Professionals Connection is an interactive website for networking professionals to share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL: http://www.cisco.com/discuss/networking

World-class networking training is available from Cisco. You can view current offerings at this URL: http://www.cisco.com/en/US/learning/index.html

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxxii

OL-0800-06

Preface Document Change History

Document Change History


Table 5 describes the document changes made after the initial release of the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
Table 5 Summary History of Document Changes

Subject Troubleshooting the Cisco MGC Node Troubleshooting the Cisco MGC Node

Document Number, Change Date OL-0800-06, May 19, 2006

Change Summary Added a note to All ISDN IP Conn Fail to indicate severity level can be modified as a result of a Release 9.5(2) patch. Added to the cause information for the ANAL:DataBaseAccessFail. Removed information related to SRCP, an interface that was never implemented.

OL-0800-06, November 18, 2005

Cisco MGC Node Operations

OL-0800-06, May 13, 2005

Corrected the definitions for the XECfgParm.dat parameters diskmonitor.CdrRmFinished and diskmonitor.OptFileSys. Added a definition for the XECfgParm.dat parameter diskmonitor.CoreRmDays.

Troubleshooting the Cisco MGC Node Cisco MGC System Overview

OL-0800-06, August 6, 2004 OL-0800-06, June 15, 2003

Added a procedure for converting point code values between SS7 variants. Modified software architecture information for the addition of the BRI interface. Added the TIBCO management system to the list of supported external clients.

Cisco MGC Node Operations

OL-0800-06, June 15, 2004

Added a note to the description of prov-cpy that provides a work around for link and call state synchronization problems. Updated description of rtrv-ovld command. Updated instructions to contact the Cisco TAC to include collecting system data.

Troubleshooting the Cisco MGC Node

OL-0800-06, June 15, 2004

Updated the procedure for resolving a peer disconnect that accounts for link and call state synchronization problems. Added a procedure for the collection of system data for the Cisco TAC. Updated instructions to contact the Cisco TAC to include collecting system data. Added procedures for alarms new for Release 9.5(2). Added a procedure for troubleshooting a faulty TIBCO interface.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxxiii

Preface Document Change History

Table 5

Summary History of Document Changes (continued)

Subject Cisco MGC Measurements

Document Number, Change Date OL-0800-06, June 15, 2004

Change Summary Added a note to SP measurements information to indicate two measurements are not currently supported. Added measurements new for Release 9.5(2). Corrected default value information for the diskmonitor.softlimit parameter. Updated Ethernet interface information for the addition of WANs and the Cisco ITP. Modified software architecture information for the addition of the M3UA/SUA and IUA interfaces.

Cisco MGC Node Operations Cisco MGC System Overview

OL-0800-05, December 28, 2003 OL-0800-05, November 5, 2003

Cisco MGC Node Startup and Shutdown Procedures Cisco MGC Node Operations

OL-0800-05, November 5, 2003

Updated startup and shutdown information for the addition of WANs and Cisco ITPs to the Cisco MGC node. Added maintenance procedures for retrieving the service states of an IP route and an association. Updated maintenance and troubleshooting information for the addition of WANs and Cisco ITPs to the Cisco MGC node. Added troubleshooting procedures for alarms added in Release 9.4(1). Modified troubleshooting procedures for alarms impacted by the introduction of the M3UA/SUA and IUA interfaces. Added signaling troubleshooting procedures for setting the service states of an IP route and an association and resolving an association alarm. Modified procedure for modifying configuration while system is in-service. Added procedure for implementing security enhancements.

OL-0800-05, November 5, 2003

Maintenance and Troubleshooting Overview Troubleshooting the Cisco MGC Node

OL-0800-05, November 5, 2003

OL-0800-05, November 5, 2003

Troubleshooting Cisco SLT Signaling Troubleshooting Switch Signaling Cisco MGC Measurements Cisco MGC Node Operations

OL-0800-05, November 5, 2003 OL-0800-05, November 5, 2003 OL-0800-05, November 5, 2003 OL-0800-04, September 10, 2003

Added a procedure for determining the error code for RUDP failures. Revised content for support of WANs. Added measurements new for Release 9.4(1). Updated description of the rtrv-ne-health command indicating that when an E1 interface connects to a PBX, CRM messages are identified as active calls, and are displayed in the command response.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxxiv

OL-0800-06

Preface Document Change History

Table 5

Summary History of Document Changes (continued)

Subject Troubleshooting the Cisco MGC Node

Document Number, Change Date OL-0800-04, September 10, 2003

Change Summary Added a note to the resolution procedure for the OverResIncomingThreshold alarm, indicating when new values for a modified trunk group property are activated. Added a procedure for modifying the system time through NTP.

Configuring Cisco MGC Log Files

OL-0800-04, September 10, 2003

Added a note indicating that empty alarm log files and CDR log files are no longer archived on both MGC hosts. Added a definition for the OFF_DUTY signaling channel service state. Added a recommendation to backup procedures as to the frequency and type of system backups. Modified the content of each switchover warning paragraph. Added an informational note for the section describing the prov-sta command.

Cisco MGC Node Operations

OL-0800-04, June 27, 2003

Troubleshooting the Cisco MGC Node

OL-0800-04, June 27, 2003

Revised the definition for the All C7 IP Links Fail alarm. Removed explicit protocol patch information and inserted a reference to the associated Release Notes. Removed an invalid alarm: ANAL: A_TableFail_GetDigTree Modified the content of each switchover warning paragraph.

Preface Cisco MGC Node Operations

OL-0800-04, April 10, 2003 OL-0800-04, April 10, 2003

Inserted modified Cisco documentation information. Revised statements for component type lookups using the prov-rtrv command to indicate the unsupported components. Added warning to all manual switchover operation calls, indicating that all messaging is lost for approximately three seconds. Revised the switchover sections, removing statements that indicate that in-progress calls are maintained during a switchover. Revised statements for component type lookups to use the prov-rtrv:all command.

Cisco MGC Node Operations

OL-0800-04, February 25, 2003

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxxv

Preface Document Change History

Table 5

Summary History of Document Changes (continued)

Subject Troubleshooting the Cisco MGC Node

Document Number, Change Date OL-0800-04, February 25, 2003

Change Summary Added warning to all manual switchover operation calls, indicating that all messaging is lost for approximately three seconds. Added a step in the All C7 IP Links Fail alarm section to verify the configuration of the system if multiple versions of SS7 are used. Corrected the procedure for resolving the ANAL: CustId/StartIdx Missing alarm. Corrected the procedure for resolving the OverResIncomingThreshold alarm. Added a procedure to verify the configuration of the system to support the use of multiple versions of SS7. Corrected the procedure for modifying the configuration data while the system is in-service. Revised statements for component type lookups to use the prov-rtrv:all command.

Configuring Cisco MGC Log Files

OL-0800-04, February 25, 2003

Added warning to all manual switchover operation calls, indicating that all messaging is lost for approximately three seconds. Modified CIC blocking procedure for the introduction of support for individual service messages. Added a section for managing SIP-specific functions.

Cisco MGC Node Operations

OL-0800-04, December 9, 2002

Troubleshooting the Cisco MGC Node

OL-0800-04, December 9, 2002

Added troubleshooting procedures for the alarms new for Release 9.3(2). Added a new procedure for verifying and modifying ISUP timers. Modified CIC unblocking, querying, and resetting procedures for the introduction of support for individual service messages. Added a section for resolving SIP-specific problems. Modified switchover failure procedure for new XECfgParm.dat parameters.

Cisco MGC Measurements

OL-0800-04, December 9, 2002

Added measurements new for Release 9.3(2).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxxvi

OL-0800-06

Preface Document Change History

Table 5

Summary History of Document Changes (continued)

Subject Cisco MGC Node Operations

Document Number, Change Date OL-0800-03, September 23, 2002

Change Summary Updated the Backups for Release 9.1(5) and higher section for changes to the main menu. Updated the procedure for Verifying the Patch Level of the Cisco MGC for changes in the check inventory utility. Modified the procedure for Blocking CICs

Troubleshooting the Cisco MGC Node

OL-0800-03, September 23, 2002

Added troubleshooting procedures for the alarms new for Release 9.3(1). Updated the Restoring for Release 9.1(5) and higher section for changes to the main menu. Modified the procedures for Unblocking and Resetting CICs. Added a new procedure for diagnosing SNMP failure.

Cisco MGC Measurements Cisco MGC Node Operations

OL-0800-03, September 23, 2002 OL-0800-02, August 16, 2002

Added measurements new for Release 9.3(1). Modified section on managing signaling channels to clarify that the service state of links are maintained only on the active host. Removed .tar extension from the example backup files listed in the Backups for Release 9.1(5) and higher section.

Troubleshooting the Cisco MGC Node Cisco MGC Node Operations

OL-0800-02, August 16, 2002

Removed .tar extension from the example backup files listed in the Restoring for Release 9.1(5) and higher section. Modified the procedure to verify system patch level. Modified the procedures to perform backup operations for Release 9.1(5) and up.

OL-0800-02, July 12, 2002

Cisco MGC Node Operations

OL-0800-02, June 21, 2002

Inserted new screen captures for the alarm and measurement viewers. Updated state information for the rtrv-cic command. Updated backup operation section. Added a procedure to verify the amount of available virtual memory. Removed procedure for the rtrv-eqpt command. Adjusted range settings for the blk-cic command.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxxvii

Preface Document Change History

Table 5

Summary History of Document Changes (continued)

Subject Troubleshooting the Cisco MGC Node

Document Number, Change Date OL-0800-02, June 21, 2002

Change Summary Updated content for the Standby Warm-Start and FAIL REMOTE STANDBY alarms. Updated descriptions of the commands to set the state of destinations and SPCs. Added a procedure to troubleshoot problems with 3.1 KHz calls. Removed procedure for the set-eqpt-state command. Updated state information for the query-cic command. Added note to indicate that the reset-cic command cannot be used in BTNUP environments.

Configuring Cisco MGC Log Files Cisco MGC Measurements All chapters

OL-0800-02, June 21, 2002 OL-0800-02, June 21, 2002 OL-0800-02, March 22, 2002

Clarified content to indicate that multiple CDBs can be created for each call. Added notes to indicate that the LIF, DL, and ASP measurements are now obsolete Updated each chapter with new product name rolled our for Release 9.2(x), the Cisco PGW 2200, configured either for signaling or call control. Updated the description of the Cisco SLT for the addition of the 4-link Cisco SLT. Updated description of the Measurement Viewer. Added information related to the introduction of the Cisco 2651 router for the Cisco SLT. Added information on the introduction of dual Ethernet links for the Cisco SLT.

Cisco MGC System Overview Cisco MGC Node Operations Operating the Cisco SLT

OL-0800-02, March 22, 2002 OL-0800-02, March 22, 2002 OL-0800-02, March 22, 2002

Troubleshooting the Cisco MGC Node

OL-0800-02, March 22, 2002

Added troubleshooting procedures for new alarms: Modified procedure for setting the service state of IP links. Added procedures for modifying MTP Level 3 and RLM timers.

Troubleshooting the Cisco MGC Node

OL-0800-01, February 20, 2002

Added a note to the Performing CIC Validation Tests Section indicating that these tests can only be performed on CICs associated with ANSI SS7-based DPCs. Modified the call stopping procedures to indicate that the confirm option must be used.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xxxviii

OL-0800-06

Preface Document Change History

Table 5

Summary History of Document Changes (continued)

Subject Configuring Cisco MGC Log Files Cisco MGC Node Operations

Document Number, Change Date OL-0800-01, February 12, 2002 OL-0800-01, February 4, 2002

Change Summary Updated the Configuring the Data Dumper Section with a newly tested procedure. Added content on MML commands to retrieve CDR data. Added content on the new backup and restore viewers in the Cisco MGC toolbar. Added new alarms. Added command descriptions to the Viewing the Call Trace section. Added the Rebooting Software to Modify Configuration Parameters section. Updated the Configuring the Data Dumper Section. Added the Understanding the Format of Log Files Archived Using Data Dumper section. Updated field definitions for the rtrv-cic command. Updated chapter for timestamp changes. Added new backup procedures. Updated chapter for timestamp changes. Added new restore procedures. Updated field definitions for the set-admin-state command. Initial version of the document.

Troubleshooting the Cisco MGC Node

OL-0800-01, February 4, 2002

Configuring Cisco MGC Log Files

OL-0800-01, February 4, 2002

Cisco MGC Node Operations

OL-0800-01, December 3, 2001

Troubleshooting the Cisco MGC Node Entire document

OL-0800-01, December 3, 2001

OL-0800-01, October 18, 2001

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

xxxix

Preface Document Change History

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

xl

OL-0800-06

C H A P T E R

Cisco MGC System Overview


This chapter provides an overview of the components of the Cisco Media Gateway Controller (MGC) node, and of the software architecture of the Cisco MGC software Release 9, which is used in the Cisco PGW 2200 product.

Note

The Cisco PGW 2200 configured for signaling was formerly called the Cisco SC2200 Signaling Controller. The Cisco PGW 2200 configured for call control was formerly called the VSC3000 Virtual Switch Controller. Some documentation for your telephony solution may use these names. This information is described in the following sections:

Cisco Media Gateway Controller Node, page 1-1 Cisco MGC Software Architecture, page 1-4 Cisco MGC Software Directory Structure, page 1-12

Cisco Media Gateway Controller Node


The following subsections briefly describe the components of the Cisco MGC node:

Cisco Media Gateway Controller Host, page 1-1 Cisco SS7 Interfaces, page 1-2 Cisco Switches, page 1-3

There are several optional elements of the Cisco MGC node, which are listed in the Agent Management Subsystem section on page 1-7. For more information on these optional elements, refer to the documentation for that element.

Cisco Media Gateway Controller Host


The Cisco MGC host is a Sun Netra UNIX box running Cisco MGC software Release 9. The Cisco MGC host performs real-time call-processing and SS7 layer functions; manages trunk resources, alarms, and call routing; and administers billing information.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

1-1

Chapter 1 Cisco Media Gateway Controller Node

Cisco MGC System Overview

Cisco MGC functionality includes:


Processing calls Originating call detail records (CDRs) Providing alarm initiation information Producing operational peg counts Receiving and processing craft user interface (CUI) data Providing Message Transfer Part (MTP) Level 3 (MTP3) functions Providing advanced intelligent network (AIN) capabilities

Sun Netra Hosts


Sun Netra UNIX hosts serve as the platform for the Cisco MGC software Release 9. The Sun Netra hosts meet or exceed Network Equipment Building System (NEBS) Level 3 standards. Information on which Sun Netra UNIX hosts can be used is found in the individual Release Notes for the Cisco Media Gateway Controller Software. Using two Sun Netra UNIX hosts in a continuous service configuration provides system redundancy and reliability. The call-processing application is active on one Cisco MGC host and automatically switches to the standby Cisco MGC host only under failure conditions.

Cisco SS7 Interfaces


The Cisco MGC node interfaces to the SS7 network using either Cisco Signaling Link Terminals (SLTs) or Cisco IP Transfer Points (ITPs).

Cisco SLTs
The Cisco SLTs terminate Message Transfer Part (MTP) levels 1 and 2 of the SS7 protocol. The remaining SS7 layers are backhauled across an IP network to the Cisco MGC host, using the Reliable User Datagram Protocol (RUDP) over an Ethernet interface (10BASE-T for Cisco 2611 routers, 100BASE-T for Cisco 2651, 5350, and 5400 routers). The number of signaling network connections on each Cisco SLT varies with the router used in the chassis. The Cisco 2611 router supports up to two signaling network connections per Cisco SLT chassis. The Cisco 2651, 5350, and 5400 routers support up to four signaling network connections per Cisco SLT chassis. Multiple Cisco SLTs (up to 16 per Cisco MGC node) can be used to support additional signaling channels. The Cisco SLT, regardless of the router used, can be configured with redundant connections to the control signaling network, to eliminate the Cisco SLT as a possible single point of failure in the Cisco MGC node. The Cisco SLTs support V.35, T1, and E1 interfaces to the SS7 network.

Cisco ITPs
The Cisco ITPs terminate all levels of MTP and the Service Connection Control Part (SCCP) layer of the SS7 protocol. The remaining SS7 layers are backhauled across an IP network to the Cisco MGC host, using the SIGTRAN standards, MTP Level 3 User Adaptation/SCCP User Adaptation (M3UA/SUA) using Stream Controlled Transmission Protocol (SCTP), over an Ethernet interface.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

1-2

OL-0800-06

Chapter 1

Cisco MGC System Overview Cisco Media Gateway Controller Node

The number of signaling network connections on each Cisco ITP varies with the router used. A list of the routers that support the Cisco ITP functionality and the number of signaling network connections they support can be found the Release Notes for the Cisco ITP software.

Cisco Switches
Cisco switches are used to create the Ethernet backbone for the Cisco MGC node. Local area network (LAN) and wide area network (WAN) implementations are supported. The switches that are supported for your implementation are detailed in the Release Notes for the Cisco MGC software. WAN implementations have the following limitations:
Table 1-1 Limitations on WAN switches within a Cisco MGC Node

Condition Software release version

Requirement Cisco MGC software 9.3(2) or later (with associated operating system and hardware requirements).

Total end-to-end delay, one way (length of Must be less than 150 milliseconds. time it takes to send a message from a source to a destination, such as from MGC to SLT) Packet loss (defined as missing packets with a message) Must not exceed 1 percent (preferably, less than 0.5 percent).
Note

For packet loss rates below 0.5 percent, increase the RUDP receive window size (*. rudpWindowSz) to 64 for increased performance.

If dual-VLAN SIP automatic switchover support is enabled...

Both MGC hosts should be part of the same IP subnet.

Ethernet Connections
Each Ethernet NIC for each Cisco MGC host is connected by a 100BASE-T interface to the switches. The switches connect to the SS7 interfaces using 10BASE-T or 100BASE-T interfaces. Figure 1-1 displays the Ethernet connections between the elements of the Cisco MGC node.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

1-3

Chapter 1 Cisco MGC Software Architecture

Cisco MGC System Overview

Figure 1-1

Cisco MGC Node Connectivity

Switch Fast Ethernet 100BT Active Cisco MGC 100Base T 100Base T Ethernet 10BT/100BT Supervisor engine Supervisor engine

Standby Cisco MGC Switch 100Base T 100Base T Supervisor engine Supervisor engine Fast Ethernet 100BT Ethernet 10BT/100BT
80156

Cisco ITP

SS7 links to STP SS7 links to STP

Cisco SLT

SS7 links to STP

Ethernet active Ethernet standby

Cisco SLT

SS7 links to STP

Cisco MGC Software Architecture


This section describes the major subsystems in the Cisco MGC software, which are illustrated in Figure 1-2. The major subsystems are

Input/Output Subsystem, page 1-6 Agent Management Subsystem, page 1-7 Fault Tolerance Subsystem, page 1-8 Execution Environment Process Shell, page 1-9 Call Engine Process, page 1-10

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

1-4

OL-0800-06

Chapter 1

Cisco MGC System Overview Cisco MGC Software Architecture

Figure 1-2

Cisco MGC Software System Diagram


Media Gateway Controller I/O subsystem Event dispatcher queue Replicator Failover daemon Fault tolerance Call Engine INAP TCAP/SCCP IOCM TCAP

SCCP XE/PXE Process Shell Data Timers Signals Manager IPC Log client Meas. client Alarm client IOCC SS7 IOCC SUA IOCC M3UA MML Fault Terminal MNM MNM-PT Meas. Config. Agent Management System (AMS) Alarm Mgr Meas. Mgr Provision Mgr Core applications IOCC ISDNL3 IPFAS Config. Mgr IOCC IUA SS7 BSMVO SUA M3UA IUA DUA SLT (MTP2) 2611/2651 5350/5400 ITP (SCCP) ITP (MTP) MGW 53xx/5400 MGW 2600/36xx MGW 2600/36xx 5xxx/72xx MGX 8260/8850 MGW 36xx/5xxx/7200 MGX 8260 MGW 26xx/36xx 5xxx/7200 MGX 8260/8850 SIP Endpoint Peer PGW HSI

Process Manager

Operations agent

Data dumpers Measurement agent Alarms

IOCC Q931+ IOCC MGCP

NAS

SNMP client (GUI) Other clients (FTP, APL and so on) Configuration Legend

MGCP

Master agent

CIAgent standard agents

IOCC SIP IOCC E-ISUP

SIP MGC H323

CDRs

Meas.

OS process MGC function

BAMS

Customer billing
45901

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

1-5

Chapter 1 Cisco MGC Software Architecture

Cisco MGC System Overview

Input/Output Subsystem
The Input/Output (I/O) subsystem consists of the I/O channel controllers (IOCC) and the I/O channel manager (IOCM), which manages them.

The IOCM manages all IOCCs. The IOCCs provide


A protocol-specific, message-based interface that allows nodes and platforms external to the

Cisco MGC to communicate with the Cisco MGC.


An interface that allows buffering of messages to the call engines event dispatcher queue.

The Cisco MGC I/O subsystem includes the following IOCCs:


Basic Rate Interface (BRI)Added in Release 9.5, this IOCC enables the backhaul of layer 3

QSIG and Q.931 messages in a TCP session. This IOCC is used between a Cisco MGC and voice gateways that support BRI signaling backhaul.
Digital Private Network Signaling System (DPNSS)Added in Release 9.4, this IOCC enables

the tranparent transport of DPNSS data over IP. This IOCC is used between media gateways that support DPNSS.
Extended ISDN User Part (E-ISUP)Cisco-proprietary protocol that enables the transport of

endpoint- and media gateway-specific information between two (or more) Cisco MGCs. This protocol uses an enhanced ISUP base to support all ANSI and ITU ISUP messaging and elements. It also has additional fields to support transport of service information (such as local number portability (LNP), 800 numbers, and so on).
ISDN Level 3Provides backhauling of ISDN (standard variants) to the Cisco MGC from a

media gateway.
ISDN Q.921 User Adaptation Layer (IUA)Added in Release 9.4, this IOCC enables

backhauling of ISDN Q.921 user messages over IP using Stream Controlled Transmission Protocol (SCTP). This IOCC is used between a Cisco MGC and media gateways.
Media Gateway Control Protocol (MGCP)Enables communication with media gateways and

trunking gateways, making possible the setting up of bearer channel connections used in Cisco MGC systems configured for call control environments.
Message Transfer Part Level 3 (MTP3) User Adaptation (M3UA)Added in Release 9.4, this

IOCC enables the transport of any SS7 MTP Level 3 User signaling (for example, ISUP and TUP messages) over IP using SCTP. This IOCC is used between a Cisco MGC and Cisco IP Transfer Point (ITP).
Q.931+A stateless IOCC, for a Cisco-proprietary protocol, which is a special version of

ISDN that enables forward hauling of Q931+ signaling to a media gateway used with a Cisco MGC configured for signaling environments.
Session Initiation Protocol (SIP)Enables the Cisco MGC to receive and send SIP messages

over the User Datagram Protocol (UDP).


Signaling Control Connection Part (SCCP) User Adaptation (SUA)Added in Release 9.4, this

IOCC enables the transport of any SCCP user signaling (for example, TCAP messages) over IP using SCTP. This IOCC is used between a Cisco MGC and Cisco ITP.
Signaling System 7 (SS7)Contains MTP3, which is used for backhauling SS7 signaling to the

Cisco MGC from a Cisco Signaling Link Terminal (SLT).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

1-6

OL-0800-06

Chapter 1

Cisco MGC System Overview Cisco MGC Software Architecture

Agent Management Subsystem


The agent management subsystem (AMS) allows external client software or terminals to gain access to the data in the Cisco MGC. The functions this subsystem supports are:

Configuration managementAdding, deleting, or modifying parameters and resources needed by the Cisco MGC to perform its switching function. This data is stored locally in data (.dat) files. This data is required to automate reconfiguration after a process failure. Alarm managementReporting and clearing alarms generated by Cisco MGC processes. Performance measurement managementReporting and clearing metrics generated by Cisco MGC processes. You can also define thresholds which, if exceeded, could produce alarms. Accounting managementDumping generated CDRs to locally persistent files or to remote databases through a standard or customized API.

The following types of external clients can access or manipulate data on the Cisco MGC:

Man-Machine Language (MML) terminalServes as a command-line interpreter where a craftsperson can manipulate data for fault detection, measurements, or configuration through a series of commands. MML is similar to TL/1 and is best suited for low-level system experts (such as operations personnel) for rapid system configuration or troubleshooting. SNMP-based terminalAllows any customer using SNMP to access network data for the purpose of managing system performance, measurements, and security. The Cisco MGC uses a master agent, EMANATE from SNMP Research, and the following related subagents to enable SNMP access to the system:
OperationsA custom subagent that provides access to fault data MeasurementA custom subagent that provides access to measurement data Critical application monitorA standard CIAgent subagent that is used to monitor the process

manager (procM) process


Host resources MIBA standard CIAgent subagent that is used to access data, such as the

number of processors, and memory usage on the Cisco MGC host platform
MIB-IIA standard CIAgent subagent that partially supports the MIB-II standard (RFC-1213) File system monitorA standard CIAgent subagent that monitors thresholds for five file

systems

TIBCO management systemIntroduced in Release 9.5(2), the Cisco MGC TIBCO interface enables you to use a TIBCO management system to add, modify, delete, and retrieve provisioning data on the Cisco MGC. The Cisco MGC supports TIBCO Version 6 daemons and libraries. When this interface is enabled, the Cisco MGC can communicate with one of two TIBCO daemons on your management system:
Rendezvous Daemon (RVD)Used when the management system is in the same network as the

Cisco MGC hosts. RVD is started automatically on the management system by the TIBCO adapter on the Cisco MGC, unless either the RVD or Routing Daemon (RVRD) is already running.
Routing Daemon (RVRD)Used when the management system and the Cisco MGC hosts are

not on the same network. You must configure the RVRD routing table and start RVRD manually before activating the interface on the Cisco MGC. Refer to the TIBCO user documentation for information on configuring the RVRD routing table.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

1-7

Chapter 1 Cisco MGC Software Architecture

Cisco MGC System Overview

Note

The TIBCO interface is typically activated during initial install or upgrade. For more information on activating the TIBCO interface, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.

Cisco MGC Node Manager (MNM)An optional application used for network element management. Cisco MNM Provisioning Tool (MNM-PT)An optional application used for provisioning the Cisco MGC. Formerly known as the Cisco Voice Services Provisioning Tool (VSPT). Billing and Measurements Server (BAMS)An optional application used for collection of CDRs and operational measurements. H.323 Signaling Interface (HSI)An optional application used to provide an interface to H.323 networks.

Fault Tolerance Subsystem


The goal of the fault tolerance subsystem is to ensure call preservation if the Cisco MGC encounters a fault condition. There are two processes that ensure this:

Failover daemonMonitors Cisco MGC processes using a heartbeat mechanism. If there is no response to its process polling in a fault-tolerant hardware configuration, the Cisco MGC switches control to the standby unit. ReplicatorAllows processes to checkpoint critical call information, such as signaling and bearer states, as well as call data across the active and standby processors. Its goal is to replicate enough information for established calls to survive a failover. Checkpointing events are generated at two points in a call:
When the call is answered, to update the full duplex path. When the call is released, after the physical resources are deallocated.

Connectionless (non-call) signaling may be generated by a craftsperson performing maintenance through an MML or SNMP client or by circuit supervision. Certain signaling can also generate checkpointing events:
Blocking or unblocking of circuits Circuit reset

Note

The replicator mechanism does not try to replicate program or data storage. Service features are not checkpointed across processors; there is just enough information to maintain the voice or data path between the call originator and the call terminator. If the switchover happens before the simplex path is established, call processing cannot proceed on the inactive side. Non-established calls in the process of being set up are lost.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

1-8

OL-0800-06

Chapter 1

Cisco MGC System Overview Cisco MGC Software Architecture

Execution Environment Process Shell


The execution environment provides an operating system process shell used by Cisco MGC processes to access lower-level functionality. Such functionality holds together the I/O, element management, and call engine subsystems in the Cisco MGC. The execution environment infrastructure provides the following functions to Cisco MGC processes:

Operating system interfaceSuch as the Sun Solaris operating system. Process managementPerforms startup order, shutdown order, and monitoring of processes. Also performs software upgrade compatibility checking with minimal service interruption. Alarm managementAllows processes to register, set, and clear alarms, which are then presented to the AMS for further processing. Log managementAllows MGC processes to log messages to locally persistent data files. Message codes (instead of strings) minimize the overhead of interprocess transport of long buffers. Log files use a facility (process type originating the log) and a logging level (severity). Measurement managementAllows processes to adjust counters or other metrics, which are subsequently presented to the AMS for Alarm and Measurement Report processing. Command managementAn interface that can be used by any active processes or by an EMS interface, such as MML or SNMP agents, to exchange commands or responses. Configuration managementNotifies processes and gets responses when configuration data changes. Handles reconfiguration management when multiple processes are affected by changes. Access controlAllows only authorized processes to access certain services or other processes. Interprocess communication (IPC)Allows processes to exchange messages. Event Processing ServiceThe XEProcShell facility allows applications to register, deregister, and exchange events (messages) through IPC. This service is critical to efficient real-time CPU usage and overall system performance. TimersAllow processes to set, clear, or monitor timers. Provide timeouts to processes.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

1-9

Chapter 1 Cisco MGC Software Architecture

Cisco MGC System Overview

Call Engine Process


The call engine is a process designed to provide the means and resources for call processing to take place. The call engine involves the following components:

Resource managerPerforms the following functions:


Tracks all bearer resources used. Proxies and tracks the bearer resources in the trunking

gateways within the Cisco MGCs service area.


Services all requests for allocation or deallocation of bearer resources from call instances. Executes bearer allocation algorithms (circuit selection). Manages echo cancellation on the calls behalf. Performs continuity tests. Checkpoints bearer states and modes to the standby Cisco MGC to guarantee that the bearer

channel is not lost during a manual or automatic switchover.

Connection managerInterfaces with the nodes and protocols external to the Cisco MGC that are necessary to establish an IP (TCP, UDP, or RUDP) or PSTN connection that is managed by the Cisco MGC. The type of node supported is
VoIP/VoATM trunking gateways using MGCP. Time Domain Multiplex (TDM) trunking gateways using MGCP.

Call managerContains and selects the appropriate protocol adapters. These are protocol-specific entities performing the following functions:
Communicates with the corresponding protocol-specific IOCC. Converts incoming protocol data units (PDUs) received from the IOCC to an internal, protocol

independent format.
Converts internal, protocol-independent PDUs to protocol-specific format. Communicates current circuit states to the IOCM using the IOCCs. Creates a call instance when an incoming MTP3 call establishment message is received. Destroys that instance and frees any associated memory when the call is terminated. Supports multiple call instances. It dequeues incoming messages from the event dispatcher

queue and routes them to the call instance for which they are destined.
Generates call detail blocks (CDBs), which are used to create CDRs. Operates as a standby entity, which is created when the call engine is created at system startup,

and waits to create a new call, destroy an existing call, or process an event for an existing call.
Checkpoints call information, such as call signaling state and data, to the standby Cisco MGC

to guarantee that the signaling link is not lost during a manual or automatic switchover.

Call Instance Component


A call instance is the dynamic component of the Cisco MGC that is created at run time and is the place where call processing takes place. The call instance is commonly referred to as the Message Definition Language (MDL) component, which is the language used to implement it. A call is instantiated when an incoming MTP3 call establishment message is received. There is always a one-to-one relationship between a call instance and a call switched by the Cisco MGC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

1-10

OL-0800-06

Chapter 1

Cisco MGC System Overview Cisco MGC Software Architecture

There are several significant subcomponents involved in a call instance:

Originating call control (OCC)Is the instance of the originating protocols state machine. In defining a protocol, two MDL modules are created:
A general declarations module, which contains protocol-specific types and definitions. A protocol definition module, which contains the state logic for two state machinesone for

call origination and one for call termination. This module produces an object file named protocolName.mdo.

Universal call model (UCM)Is a protocol-independent state machine that is used to


Provide protocol interworking between the originating and the terminating sides of the call. A UCM MDL module is used to define the UCM behavior and logic. The UCM module is

compiled into an object file, but can only be loaded by the Call Engine and cannot be used by any of the protocols.
Provide event-driven logic, which controls the following call-processing functions: linking the

OCC and the terminating call control (TCC), updating and retrieving the call context structures, interacting with other call engine components, such as the resource manager, connection manager, and call manager, managing bearer resources, such as trunking gateways, using the MGCP, and keeping the call processing state machine.
The UCM also triggers events to be processed by the following MDL modules: generic analysis

module, subscriber profile retrieval, a-number and b-number pre-analysis, a-number and b-number full analysis, route selection, and the IN trigger module.

Connection plane manager (CPM)Communicates with the call engines resource manager to make the bearer connections to a remote trunking gateway using MGCP. CDR ManagerGenerates CDRs and forwards them to the EMS to be locally persisted or forwarded for off-platform accounting applications. CDRs are generated when calls are answered and they can also be generated in the following situations:
End of call (standard) Long duration calls Mid-call CDRs (can generate CDBs at eight different points in a call)

Terminating call controlIs the instance of the terminating protocols state machine. Call contextThe following are the call context characteristics:
A persistent object in a call instance that serves as the placeholder for bearer and signaling

information. Such information is set and retrieved by the OCC, TCC, or UCM at various points in the life of the call.
An MDL context definition module is used to define the information elements, structures, and

fields. This module is compiled into an object file to be used by all protocols. The format of these structures is protocol-independent to minimize cross-protocol conversion permutations. Contains rules for data conversion to and from each protocol.
Collects the following call information in CDBs, which are assembled to build CDRs: calling

number, called number, answer time, disconnect time, originating trunk group and circuit identification code (CIC), terminating trunk group and CIC, address translation and route information, ISUP information, ISDN service information, database query information, call completion codes, and other information depending on the type of call.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

1-11

Chapter 1 Cisco MGC Software Directory Structure

Cisco MGC System Overview

Cisco MGC Software Directory Structure


This section shows an overview of the UNIX file directory tree for the Cisco MGC distribution, along with a brief description of the purpose for each directory. This section is to be used as a guide to finding files called out in the operational procedures. In the installation procedures, the installer is asked for a directory under which to install the Cisco MGC software. The default directory is /opt/CiscoMGC; however, this directory name is installer-definable, so do not assume that /opt/CiscoMGC is always used. This is the directory under which all files for the Cisco MGC reside. The sole exception is some temporary files that are created at run time. Table 1-2 utilizes the variable $BASEDIR to indicate the directory into which the Cisco MGC software was installed.
Table 1-2 Cisco MGC Software Directory Structure

Directory $BASEDIR/bin $BASEDIR/local

Description Cisco MGC executable programs that cannot be customized. Cisco MGC executable programs that can be modified by the customer for a site-specific reason. See the procedures for how to customize files. Generally the factory default values are sufficient. Network element configuration files. This includes all provisionable configuration files required for proper operation of the Cisco MGC. Cisco MGC configuration file library. This is a simple version control system for configuration file changes. Saved data from the Cisco MGC Toolkit applications is stored in this directory. Shared object files. These libraries are loaded at runtime by the executables. The three types of libraries are: (1) system/program shared objects, (2) MDL interpreted objects, and (3) MDL shared objects. Subsystem communication and persistent storage area. This directory contains files and devices providing communications between the various subsystems in the Cisco MGC. It also contains files providing persistent storage of data for the Cisco MGC. System logging area. This directory contains the platform logs. See the Understanding Logging Files section on page A-1 for more information. Dumper Spool Area. This directory contains historic reports. Refer to the Understanding Logging Files section on page A-1. Signal Path Trace area. This directory contains all MDL trace logs used for conversion analysis. MDL source files. MDL source files are generally not provided, but if they are purchased, they will appear here.

$BASEDIR/etc

$BASEDIR/etc/CONFIG_LIB $BASEDIR/etc/cust_specific/ toolkit $BASEDIR/lib

$BASEDIR/var

$BASEDIR/var/log

$BASEDIR/var/spool $BASEDIR/var/trace $BASEDIR/data

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

1-12

OL-0800-06

C H A P T E R

Cisco MGC Node Component Startup and Shutdown Procedures


This chapter describes the steps necessary to startup and shutdown the individual components of the Cisco Media Gateway Controller (MGC) node. The startup procedures for each component of the Cisco MGC node are included in the following sections:

Cisco Media Gateway Controller Startup Procedures, page 2-1 Cisco SS7 Interface Startup Procedure, page 2-3 Cisco Switch Startup Procedure, page 2-3

You might need to perform these tasks if you:


Have made changes to the system configuration Are upgrading the software Are testing the system Are troubleshooting alarms Are trying to resolve a problem

Note

In these procedures, it is assumed that the component has been correctly installed, configured, and provisioned in accordance with the instructions provided in the relevant documentation. Shutdown procedures for each component of the Cisco MGC node are included in the following sections:

Cisco Media Gateway Controller Shutdown Procedure, page 2-4 Cisco SS7 Interface Shutdown Procedure, page 2-5 Cisco Switch Shutdown Procedure, page 2-5

Cisco Media Gateway Controller Startup Procedures


This section contains the hardware and software startup procedures for the Cisco MGC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

2-1

Chapter 2 Cisco Media Gateway Controller Startup Procedures

Cisco MGC Node Component Startup and Shutdown Procedures

Starting the Cisco MGC Hardware


The system switch of the Cisco MGC is a rocker, momentary contact switch that functions as a standby device only, controlling the logic circuits that enable power module output.

Note

The system switch for each Sun Netra platform is unique. Refer to the documentation provided by Sun Microsystems for more information on your system. To power on the system, complete the following steps:

Step 1

Turn on the power to all connected peripherals.

Note

Peripheral power is activated prior to system power so that the system can recognize the peripherals when it is activated.

Step 2 Step 3

Apply power to the system inlet. Press the front panel ON/STBY system switch to the ON position and hold it until the system starts to power up.

Starting the Cisco MGC Software


Under normal conditions, simply powering up the system automatically launches the Cisco MGC software and the Simple Network Management Protocol (SNMP) daemon using system defaults. See the Configuring SNMP section in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide for more information about SNMP.

Note

In this section, it is assumed that the Cisco MGC software Release 9 has been correctly installed, configured, and provisioned on the host server and that you have the appropriate packages, or applications, for your system. If the Cisco MGC Release 9 software has been installed, configured, or provisioned incorrectly, or if you are having other problems, see Chapter 8, Troubleshooting the Cisco MGC Node, for more information.

Note

To perform the procedures in this section, you must have a user ID that is part of the Cisco MGC group (mgcgrp) and you must have the proper group privileges. To verify that your user ID is part of the Cisco MGC group and that you have the necessary privileges, refer to the Configuring Groups and Users section in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide for more information.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

2-2

OL-0800-06

Chapter 2

Cisco MGC Node Component Startup and Shutdown Procedures Cisco SS7 Interface Startup Procedure

Starting up the Cisco MGC software manually


Caution

Do not use the following commands unless specifically instructed to do so by Cisco Technical Assistance Center (TAC) personnel. To manually start the Cisco MGC software, log in to the active Cisco MGC as root and enter the following command:
/etc/init.d/CiscoMGC start

This action restores execution permission and enables the automated startup script.

Cisco SS7 Interface Startup Procedure


This section contains the recommended startup procedure for the Cisco SS7 interfaces, which can either be a Cisco Signaling Link Terminal (SLT) or Cisco IP Transfer Point (ITP).
Note

In this section, it is assumed that the SS7 interface has been correctly installed and configured and that the correct software version is installed. If you are experiencing problems, refer to the documentation for your SS7 interface for detailed information. To start up a Cisco SS7 interface, perform the following steps:

Step 1

Before you start the Cisco SS7 interface, verify the following:

All modules are installed correctly, and all interface cable connections are secure. The power cable is connected to both the rear panel power connector and the power source. A terminal is connected to the console port and is turned on.

Step 2

Turn the power on (|). During the boot process, observe the following:

The power LED on the front panel should be green. The activity LED should be blinking. You should hear the system fans operating. The console terminal displays a script and system banner.

Step 3

Press Return at the Enter Password prompt to access the console command line.

Cisco Switch Startup Procedure


This section contains the recommended startup procedure for the Cisco switches used to internetwork the elements of the Cisco MGC node.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

2-3

Chapter 2 Cisco Media Gateway Controller Shutdown Procedure

Cisco MGC Node Component Startup and Shutdown Procedures

Note

In this section, it is assumed that the switch has been correctly installed and configured and that the correct software version is installed. If you are experiencing problems, refer to the documentation for your switch for detailed information. To start a Cisco switch, complete the following steps:

Step 1

Before you start the switch, verify the following:


All modules are installed correctly, and all interface cable connections are secure. Each power supply is installed correctly and is connected to a grounded power source. If two power supplies are present, each power cord is connected to a different line. A terminal is connected to the supervisor module console port and is turned on.

Step 2

Turn the power supplies on (|). During the boot process, observe the following:

The LEDs on the power supplies should be green. The PS1, PS2, and fan LEDs on the supervisor engine should be green, and you should hear the system fans operating. The System Status LED on the supervisor engine should be green after the boot is complete. It flashes red, orange, and green during startup. The supervisor engine interface LEDs and module LEDs (such as the Link LEDs) might blink or stay lit continuously during the boot process. Many module LEDs do not go on until you configure the interfaces. Wait until the boot is complete before trying to verify the module LED indications. The console terminal displays a script and system banner. The supervisor engine begins to initialize the modules once the boot process is completed. Messages appear on the console as the modules come online.

Step 3

Press Return at the Enter Password prompt to access the console command line.

Cisco Media Gateway Controller Shutdown Procedure


This section contains the software and hardware shutdown procedures for the Cisco MGC.

Shutting Down the Cisco MGC Software Manually


Caution

Do not use the following commands unless specifically instructed to do so by Cisco Technical Assistance Center (TAC) personnel. To manually stop the Cisco MGC software, log into your active Cisco MGC as root and enter the following command:
/etc/init.d/CiscoMGC stop

This action disables the automated startup script.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

2-4

OL-0800-06

Chapter 2

Cisco MGC Node Component Startup and Shutdown Procedures Cisco SS7 Interface Shutdown Procedure

Shutting Down the Cisco MGC Hardware


To shut down the Cisco MGC, you remove power from the system. The power switch of the Cisco MGC is a rocker, a momentary contact switch that functions as a standby device only, controlling logic circuits that enable power module output.

Caution

Before you turn off the power, exit from the operating system. Failure to do so might result in data loss. To shut down the Cisco MGC, complete the following steps:

Step 1 Step 2 Step 3

Where necessary, notify users that the Cisco MGC is going down. Back up system files and data prior to shutdown. Refer to the Backing Up System Software section on page 3-27. Exit from the operating system. Refer to your Sun documentation for the appropriate commands to be used to exit from the operating system.

Note

Ensure that you use the UNIX command init 5 as part of exiting from the operating system. This command is described in the Sun documentation.

Step 4 Step 5 Step 6

Momentarily set the front panel power switch to the STBY position until the system powers down. Verify that the POWER LED is off. Remove the input power connector from the power inlet.

Caution

Regardless of the position of the ON/STBY switch, where an AC or DC power cord remains connected to the system, voltage may be present within the power supply.

Cisco SS7 Interface Shutdown Procedure


To shut down the Cisco SS7 interfaces, simply set the power switches to the OFF (0) position. When the power switches are in the OFF (0) position, the power LEDs on the front panels should be off and the fans should not be operating.

Cisco Switch Shutdown Procedure


To shut down the Cisco switches, simply set the power switches to the OFF (0) position. When the power switches are in the OFF (0) position, the LEDs on the power supplies should be off and the fan assembly should not be operating.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

2-5

Chapter 2 Cisco Switch Shutdown Procedure

Cisco MGC Node Component Startup and Shutdown Procedures

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

2-6

OL-0800-06

C H A P T E R

Cisco MGC Node Operations


This chapter contains recommended operating procedures for the Cisco Media Gateway Controller (MGC) node. In these procedures, the assumption is that all components have been correctly installed, configured, and provisioned in accordance with the instructions provided in the relevant documentation. All components are assumed to have been successfully started, as described in Chapter 2, Cisco MGC Node Component Startup and Shutdown Procedures.

Note

Operation of the Cisco MGC node should be performed by someone who has been trained in the complexities of the system, who has some experience administering the system, and who understands UNIX at the system administrator level. This chapter contains the following sections:

Daily Tasks, page 3-1 Periodic Maintenance Procedures, page 3-22 Regular Operations, page 3-40

Daily Tasks
The following section detail the procedures you should perform on a daily basis on the Cisco MGC. These procedures use Man-Machine Language (MML) and UNIX commands. These procedures can also be performed using the optional Cisco MGC Node Manager (MNM) application. For more information on using the Cisco MNM to operate the Cisco MGC, refer to the Cisco Media Gateway Controller Node Manager Users Guide. The tasks you should perform on a daily basis are found in the following sections:

Starting an MML Session, page 3-2 Verifying the Platform State of the Cisco MGC Hosts, page 3-2 Verifying That Processes Are Running, page 3-3 Monitoring the Alarms Status, page 3-6 Verifying the Status of all Signaling Services, page 3-8 Verifying State of all SS7 Routes, page 3-10 Verifying CIC States, page 3-13 Verifying System Statistics, page 3-16

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-1

Chapter 3 Daily Tasks

Cisco MGC Node Operations

Verifying the Number of Active Processes, page 3-18 Verifying the Number of Users, page 3-19 Verifying Available Virtual Memory, page 3-20 Verifying Available Memory on the Cisco SLTs, page 3-21

Starting an MML Session


When a procedure requires that you start an MML session, you must perform the following steps:

Note

We recommend that you run your MML sessions from the active Cisco MGC, unless the procedure indicates otherwise.

Step 1 Step 2

Log in to the active Cisco MGC. Enter the following command at the UNIX prompt:
mml

If you receive an error message indicating that sessions are already in use, enter the following command:
mml -s session number

Use any session number from 2 through 12 and repeat until you find a vacant session. Once you have successfully started an MML session, the prompt changes to:
machine_name mml>

Verifying the Platform State of the Cisco MGC Hosts


You can determine which of your Cisco MGC hosts is the active Cisco MGC and which is the standby Cisco MGC. If your system uses a Cisco MGC in a simplex configuration, the single Cisco MGC host is always active. To do this, complete the following steps:
Step 1

Log into one of the Cisco MGCs, start an MML session, and enter the following command to determine its platform state:
rtrv-ne

The system should return a message, similar to the following, if it is currently the active Cisco MGC:
M Media Gateway Controller 2000-03-29 14:15:22 RTRV "Type:"MGC "Hardware platform:sun4u sparc SUNW,Ultra-5_10" "Vendor:"Cisco Systems, Inc."" "Location:Media Gateway Controller" "Version:"9.1(5)"" "Platform State:ACTIVE"

The valid values for the Platform State field are ACTIVE, STANDBY, or OOS.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-2

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

Step 2

Log into the other Cisco MGC, start an MML session, and enter the following command to determine its platform state:
rtrv-ne

The system should return a message that indicates that it is in either the active or standby platform state. If the Cisco MGC hosts have changed their platform state, determine why the switchover occurred by searching the contents of the active system log file, as described in the Viewing System Logs section on page 8-4. Under normal operations, one Cisco MGC host should be active and the other Cisco MGC host should be standby. If the platform state of either Cisco MGC host is OOS, check the alarms as described in the Monitoring the Alarms Status section on page 3-6, and take the actions necessary to correct the condition that caused the associated alarm(s). The alarms that require you to take corrective action and their associated actions can be found in the Troubleshooting with System Logs section on page 8-4. A complete listing of alarms can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. If the platform state of both Cisco MGC hosts is active, proceed to Step 4.
Step 3

Verify that the active configuration has not changed by entering the following UNIX commands:
cd /opt/CiscoMGC/etc ls -l

The system returns a response similar to the following:


total 35350 -rw-r--r-1 mgcusr mgcgrp 38240 May 8 10:46 02.trigger -rw-rw-r-1 mgcusr mgcgrp 20488 Oct 10 2000 64eisup.bat lrwxrwxrwx 1 mgcusr mgcgrp 43 Aug 1 18:55 active_link -> /opt/CiscoMGC/etc/CONFIG_LIB/CFG_pol-addipl -rw-rw-rw1 mgcusr mgcgrp 30907 Jul 24 15:29 alarmCats.dat -rw-rw-rw1 mgcusr mgcgrp 2064 Jun 4 10:57 alarmTable.dat -rw-rw-rw1 mgcusr mgcgrp 0 Jun 4 10:57 auxSigPath.dat

Identify the active_link file. The listing indicates which configuration is currently active. The active configuration in the example is CFG_pol-addipl. If the configuration has changed, you may want to compare the active configuration to the previous configuration.
Step 4

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Verifying That Processes Are Running


To verify that the processes on your Cisco MGC are running, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-softw:all

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-3

Chapter 3 Daily Tasks

Cisco MGC Node Operations

The system returns a response similar to the following:


Media Gateway Controller - MGC-04 2000-04-05 08:06:03 M RTRV "CFM-01:RUNNING ACTIVE" "ALM-01:RUNNING ACTIVE" "MM-01:RUNNING ACTIVE" "AMDMPR-01:RUNNING ACTIVE" "CDRDMPR-01:RUNNING ACTIVE" "DSKM-01:RUNNING IN N/A STATE" "MMDB-01:RUNNING IN N/A STATE" "POM-01:RUNNING ACTIVE" "MEASAGT:RUNNING ACTIVE" "OPERSAGT:RUNNING ACTIVE" "PROVSAGT:RUNNING ACTIVE" "MGCP-1:RUNNING IN N/A STATE" "Replic-01:RUNNING ACTIVE" "ENG-01:RUNNING ACTIVE" "IOCM-01:RUNNING ACTIVE" "TCAP-01:RUNNING IN N/A STATE" "FOD-01:RUNNING IN N/A STATE" "EISUP-1:RUNNING IN N/A STATE" "SS7-A-1:RUNNING IN N/A STATE"

Note

If this MML command is entered on the standby Cisco MGC, the state of the processes is either RUNNING STANDBY or RUNNING IN N/A STATE.

Step 2

If any of the processes are initializing, wait a few moments and repeat Step 1. If that process is still initializing, contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If any of the processes are stopped, contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.

Understanding Processes
The Cisco MGC software contains processes and process groups that perform various functions. These functions include managing the I/O channels; generating alarms, call detail records (CDRs), and logs; and performing signal conversion. All these processes are managed by the process manager process of the Cisco MGC software. Three different monitoring levels are offered:

Active processControlled and monitored directly by the process manager. Passive processDoes not communicate with the process manager. Monitoring processPeriodically runs an executable or script and sets or clears an alarm based on the return code. This type of process can monitor other processes or tasks that can be checked programmatically. Some examples are the amount of available disk space, system daemon existence, and established process dependency.

Table 3-1 shows the system processes and process groups controlled by the process manager.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-4

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

Table 3-1

Processes Controlled by the Process Manager

Group
ENGG-01

Process Replic-01 ENG-01

Description
Engine Group

Replicator controller. It is an active process. If it should go down, it causes a critical out-of-service alarm. Call engine. It is an active process. If it should go down, the system cannot process calls. Its failure causes a critical out-of-service alarm.
I/O Subsystem Group

IOSG-01

IOCC-01 IOCC-02 IOCM-01 TCAP-01


XEG-01

I/O channel controller. It is a passive process. If it should go down, it causes a critical out-of-service alarm. I/O channel controller. It is a passive process. If it should go down, it causes a critical out-of-service alarm. I/O channel manager. It is a passive process. If it should go down, it causes a major out-of-service alarm. TCAP and SCCP protocol handler. It is a passive process. If it should go down, it causes a major out-of-service alarm.
Execution Environment Group

CFM-01 ALM-01 AMDMPR-01 MM-01

Configuration manager. It is an active process. If it should go down, it causes a major out-of-service alarm. Alarm manager. It is an active process. If it should go down, it causes a major out-of-service alarm. Alarm and measurement dumper. It is an active process. If it should go down, it causes a major out-of-service alarm. Measurement manager. It is an active process. If it should go down, it causes a major out-of-service alarm.

CDRDMPR-01 CDR dumper. It is an active process. If it should go down, it causes a major out-of-service alarm. MMDB-01 POM-01
FTG-01

TimesTen database. It is a passive process. If it should go down, it causes a minor out-of-service alarm. Provisioning object manager. It is an active process. If it should go down, it causes a major out-of-service alarm.
Failover Group

FOD-01
PFMG-01

Failover controller. It is a monitoring process. If it should go down, it causes a minor out-of-service alarm.
Platform Monitoring Group

DSKM-01

Disk space monitor. This shell script monitors disk space and trims back older files in case the current amount of free space is below a specified threshold. This is a monitoring process. If it should go down, it causes a minor out-of-service alarm.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-5

Chapter 3 Daily Tasks

Cisco MGC Node Operations

Table 3-1

Processes Controlled by the Process Manager (continued)

Group
SNMPG-01

Process MEASAGT OPERSAGT

Description
SNMP Group

Measurements SNMP agent. This is an active process. If it should go down, this is a major out-of-service alarm. Operational SNMP Agent. This is an active process. If it should go down, this is a major out-of-service alarm.

Monitoring the Alarms Status


If you monitor the alarm status of the Cisco MGC continuously, you can determine how often a particular alarm occurs in a specific period of time. To monitor the alarm status of the Cisco MGC on a continuous basis, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-alms::cont

The system returns a response that shows all active alarms:


MGC-01 - Media Gateway Controller 2001-11-16 11:57:54.949 EST M RTRV "AMDMPR-01: 2001-11-16 11:57:54.583 EST,ALM=\"MAJOR M-OOS\",SEV=MJ" "CDRDMPR-01: 2001-11-16 11:57:54.583 EST,ALM=\"MAJOR M-OOS\",SEV=MJ" "MMDB-01: 2001-11-16 11:57:54.583 EST,ALM=\"SOFTW NON\",SEV=MJ" "MMDB-01: 2001-11-16 11:57:54.583 EST,ALM=\"MINOR M-OOS\",SEV=MN" "MEASAGT: 2001-11-16 11:57:54.583 EST,ALM=\"SOFTW NON\",SEV=MJ" "MEASAGT: 2001-11-16 11:57:54.583 EST,ALM=\"MAJOR M-OOS\",SEV=MJ" "UNK: 2001-11-16 11:57:54.583 EST,ALM=\"CHAN BAD TOT 15\",SEV=MN" "UNK: 2001-11-16 11:57:54.583 EST,ALM=\"CHAN BAD TOT 60\",SEV=MN" "UNK: 2001-11-16 11:57:54.583 EST,ALM=\"CHAN BAD TOT 24\",SEV=MN" "UNK: 2001-11-16 11:57:54.583 EST,ALM=\"CHAN BAD TOT 15\",SEV=MN" "UNK: 2001-11-16 11:57:54.583 EST,ALM=\"CHAN BAD TOT 60\",SEV=MN" "UNK: 2001-11-16 11:57:54.583 EST,ALM=\"CHAN BAD TOT 24\",SEV=MN" ;

Step 2

If an alarm appears, you can determine the appropriate course of action by referring to the listing for that alarm in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. Detailed descriptions of the actions required to resolve the problems associated with the alarm are found in Alarm Troubleshooting Procedures section on page 8-9. You can also find additional information on the conditions that caused the alarms by viewing the system logs. The logs can be viewed using the log viewer, part of the Cisco MGC viewer toolkit. For information on using the log viewer, see the Using the Log Viewer section on page 3-136.

Note

Once you have begun monitoring alarms continuously, you will need to open another MML session to perform any additional tasks. Refer to the Starting an MML Session section on page 3-2 for more information on starting additional MML sessions.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-6

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

Understanding Alarms
The following subsections describe each of the message components for the typical alarm response shown below:
"LPC-01: 2001-02-26 09:16:07.806 EST,ALM=\"SCMGC MTP3 COMM FAIL\",SEV=MJ" "IOCM-01: 2001-02-26 09:17:00.690 EST,ALM=\"Config Fail\",SEV=MN" "MGC1alink2: 2001-02-26 09:17:47.224 EST,ALM=\"SC FAIL\",SEV=MJ" "MGC1alink3: 2001-02-26 09:17:47.225 EST,ALM=\"SC FAIL\",SEV=MJ"

Component ID
The first element of the alarm message identifies the system component that generated the alarm, using the customer-defined description of the component given during system provisioning. In our example, these are LPC-01, IOCM-01, MGC1alink2, and MGC1alink3. All system components are described in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.

Time Stamp
The second element of the alarm message identifies the time of the alarm by year, month, day, hour, minute, hundredths, thousandths of a second (milliseconds), and time zone. The time displayed is the system time. In the example, these would be 2001-02-26 09:16:07.806 EST, 2001-02-26 09:17:00.690 EST, 2001-02-26 09:17:47.224 EST, and 2001-02-26 09:17:47.225 EST.

Alarm Category
The third element of the alarm message identifies the alarm category. It indicates the MML description of the alarm/event. In our example:

ALM=\SCMGC MTP3 COMM FAIL\ indicates an SCMGC-MTP3 communications failure. ALM=\Config Fail\ indicates a configuration failure. ALM=\SC FAIL\ indicates a signal channel failure.

Severity Level
The last element of the alarm message identifies the severity level of the alarm. The four levels are

Critical (CR)A serious problem exists in the network. Critical alarms cause a switchover, where the active Cisco MGC switches processing to the standby Cisco MGC. Because critical alarms affect service, they should be cleared immediately.

Caution

Critical alarms cause the system to automatically switchover. While a switchover is in progress, new calls are dropped and in-progress calls are sustained.

Major (MJ)A problem exists that disrupts service. Major alarms should be cleared immediately. These alarms differ from critical alarms in that they do not cause a switchover from the active Cisco MGC to the standby Cisco MGC. Minor (MN)Minor alarms should be noted and cleared as soon as possible. You might also want to research how often this alarm is appearing, because it may be an indicator of a bigger problem.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-7

Chapter 3 Daily Tasks

Cisco MGC Node Operations

Informational (IN)This severity level applies to messages that provide information about typical events and conditions. Informational messages do not require corrective action. Examples are timer expirations, values that have exceeded preset thresholds, and unexpected responses from endpoints to signaling messages sent by the Cisco MGC. Events with a severity level of informational are retrieved only by the SNMP Manager.

Verifying the Status of all Signaling Services


To verify the status of all of the signaling services provisioned on your Cisco MGC, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-dest:all

The system returns a response similar to the following:


M Media Gateway Controller - MGC-04 2000-04-05 08:05:36 RTRV "sigsrv1:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "sigsrv2:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "sigsrv3:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "sigsrv4:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "sigsrv5:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "sigsrv6:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "eisupftsvc:PKG=EISUP,ASSOC=SWITCHED,PST=IS,SST=UND" "eisupsvc1:PKG=EISUP,ASSOC=SWITCHED,PST=IS,SST=UND"

Note

If the rtrv-dest:all MML command is entered after a switchover has occurred, the state of some of the signaling services might be listed as undefined (UND). UND is the default state for a signaling service when the system starts. In this instance, UND states indicate that the Cisco MGC has not received a service state message for the associated signaling service since the switchover occurred. No user action is required.

Step 2

If the primary service state is not IS for any of the signaling service, check your alarms retrieval MML session for signaling-related alarms. The method for setting up an alarms retrieval MML session is described in the Monitoring the Alarms Status section on page 3-6. If a signaling-related alarm appears, you can determine the appropriate course of action by searching for the corrective actions for that alarm in the Alarm Troubleshooting Procedures section on page 8-9. If the alarm is not in that section, corrective action is not required. More information on the alarm can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. You can also find additional information on the conditions that caused the alarms by viewing the system logs. The logs can be viewed using the log viewer, part of the Cisco MGC viewer toolkit. For information on using the log viewer, see the Using the Log Viewer section on page 3-136.

Note

You can use the also use the rtrv-dest MML command to retrieve information on individual signaling services using the procedure found in the Retrieving Signaling Service States section on page 3-50.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-8

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

Understanding the Signaling Service State Information


The following sections describe the information returned by the system when you enter the rtrv-dest command, as in the example below:
"sigsrv1:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "sigsrv2:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND" "sigsrv3:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=UND"

Destination
The first field lists the MML name of the associated signaling service. In the above example, this is sigsrv1, sigsrv2, and sigsrv3

Package
The PKG field lists the protocol package associated with the destination. In the example, the protocol is SS7-ANSI.

Association
The ASSOC field shows the type of association, either unknown, switched, or a specific channel for the signaling service. In the example, the association type is SWITCHED.

Primary Service State


The PST field shows the current primary service state of the signaling service. In the example, all of the signaling services have a primary service state of IS. Table 3-2 lists the valid primary service state values:
Table 3-2 Signaling Service Primary Service States

Link State ID AOOS INB

Link State Automatically out-of-service Install busy

Description The system has taken the signaling service out-of-service (OOS). When a system is first configured, all signaling links default to this state and must be manually set in-service (IS) through the use of the set-c7lnk, set-iplnk, or set-dchan MML commands. The link to the signaling service is IS and fully operational. This is its normal operating state. The link to the signaling service has been manually taken OOS. The link to the signaling service is OOS from the remote end. The system is actively trying to restore the link. The state of the link to the signaling service is currently being changed. The state of the link to the signaling service is not known.

IS MOOS OOS TRNS UNK

In-service Manually out-of-service Out-of-service Transient Unknown

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-9

Chapter 3 Daily Tasks

Cisco MGC Node Operations

Secondary Service State


The SST field shows the current secondary service state of the specified signaling service. In the example, all of the signaling services have a secondary service state of UND. The valid states are listed below:

CEACommanded into emergency alignment. CISCommanded in service. CONGCongestion. COOSCommanded out of service. CINHCommanded to the inhibited state. CRTECreated. CUINHCommanded to the uninhibited state. DLTDeleted.

Note

DLT is a transition state. It is seen when you are making provisioning changes to the associated signaling service.

EISEngine in service. EOOSEngine out of service. FLDFailed. FOOSForced out of service. RSTReset. RSTORestored. UNDUndefined.

Note

If the rtrv-dest MML command is entered after a switchover has occurred, the state of some of the signaling services might be listed as undefined (UND). UND is the default state for a signaling service when the system starts. In this instance, UND states indicate that the Cisco MGC has not received a service state message for the associated signaling service since the switchover occurred. No user action is required.

Verifying State of all SS7 Routes


To verify the status of all of the SS7 routes provisioned on your Cisco MGC, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-rte:all

The system returns a message similar to the following:


Media Gateway Controller - MGC-01 2002-05-22 15:19:51 M RTRV "ss7srv1:linkset1,APC=apc-1,OPC=opc-1,PRIO=1,PST=IS,SST=NA" "ss7srv1:linkset2,APC=apc-2,OPC=opc-1,PRIO=1,PST=IS,SST=NA" "ss7srv2:linkset1,APC=apc-3,OPC=opc-2,PRIO=1,PST=IS,SST=NA" "ss7srv2:linkset2,APC=apc-3,OPC=opc-2,PRIO=1,PST=IS,SST=NA"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-10

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

"ss7srv3:linkset1,APC=apc=4,OPC=opc-3,PRIO=1,PST=IS,SST=NA" "ss7srv3:linkset2,APC=apc=4,OPC=opc-4,PRIO=1,PST=IS,SST=NA"

Step 2

If the primary service state is not IS for any of the routes, check your alarms retrieval MML session for signaling-related alarms. The method for setting up an alarms retrieval MML session is described in the Monitoring the Alarms Status section on page 3-6. If a signaling-related alarm appears, you can determine the appropriate course of action by searching for the corrective actions for that alarm in the Alarm Troubleshooting Procedures section on page 8-9. If the alarm is not in that section, corrective action is not required. More information on the alarm can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. You can also find additional information on the conditions that caused the alarms by viewing the system logs. The logs can be viewed using the log viewer, part of the Cisco MGC viewer toolkit. For information on using the log viewer, see the Using the Log Viewer section on page 3-136.

Understanding the SS7 Route State Information


The following sections describe the information returned by the system when you enter the rtrv-rte command, as shown in the example below:
"ss7srv1:linkset1,APC=244.001.040,PRIO=1,PST=IS,SST=NA" ss7srv1:linkset2,APC=244.002.040,PRIO=1,PST=IS,SST=NA" "ss7srv2:linkset1,APC=244.001.041,PRIO=1,PST=IS,SST=NA" "ss7srv2:linkset2,APC=244.002.041,PRIO=1,PST=IS,SST=NA"

Signaling Service
The first field lists the MML name for the signaling service associated with the SS7 route. In the example, the signaling services are ss7srv1 and ss7srv2.

Linkset
The second field lists the MML name for the linkset associated with the SS7 route. In the example, the linksets are linkset1 and linkset 2.

Adjacent Point Code


The APC field lists the MML name for the adjacent point code (APC) associated with the SS7 route. In the example there are APCs:

apc-1 apc-2 apc-3 apc-4

Originating Point Code


The OPC field lists the MML name for the originating point code (OPC) associated with the SS7 route. In the example there are OPCs:

opc-1

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-11

Chapter 3 Daily Tasks

Cisco MGC Node Operations

opc-2 opc-3 opc-4

Priority
The PRIO field lists the priority provisioned for this SS7 route. In the example, all of the SS7 routes have a priority of 1.

Primary Service State


The PST field shows the current primary service state of the destination. In the example, all of the SS7 routes have a primary service state of IS. Table 3-2 lists the valid primary service state values:
Table 3-3 SS7 Route Primary Service States

Link State ID AOOS INB

Link State Automatically out-of-service Install busy

Description The system has taken the SS7 route out-of-service (OOS). When a system is first configured, all signaling links default to this state and must be manually set in-service (IS) through the use of the set-dest MML command. The SS7 route is IS and fully operational. This is its normal operating state. The SS7 route has been manually taken OOS. The SS7 route is OOS from the remote end. The system is actively trying to restore the link. The state of the link to the SS7 route is currently being changed. The state of the link to the SS7 route is not known.

IS MOOS OOS TRNS UNK

In-service Manually out-of-service Out-of-service Transient Unknown

Secondary Service State


The SST field shows the current secondary service state of the specified destination. In the example, all of the SS7 routes have a primary service state of NA. The valid states are listed below:

ACKDSS7 Acknowledgement delay BSNRSS7 backward sequence number received (BSNR) CISCommanded in service CONFConfiguration failure COOSCommanded out of service ENGRCall engine reset ISPENDIn service, pending LCNGCongestion, local LINELine failure LINHSS7 local inhibit

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-12

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

LINKLink failure LINSLinkset failure NACause not available OOSPENDOut of service, pending PRHBSS7 prohibited RBLKSS7 remote blocked RCNGCongestion, remote RINHSS7 remote inhibit RSTRSS7 restricted SERRSS7 signal error STBYCause standby SUPPENTSupporting entity TPATHTraffic path UNKCause unknown

Verifying CIC States


We recommend verifying the status of your circuit identification codes (CICs) in groups, to ensure that you have current state information. Retrieving the status of all of your CICs at once can take a while to obtain, and then a long time to page through. To verify the status of CICs provisioned on your Cisco MGC in groups, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cic:sig_srv:cic=number[,rng=range]

Where:

sig_srvMML name of the signaling service associated with the CICs to be displayed. numberA valid CIC number. rangeSpecifies a range of CICs to be retrieved. The status of all CICs between number and number+range are displayed.

For example, the following MML command retrieves bearer channel information for CICs 10 to 15 on signaling service c7s-1:
rtrv-cic:c7s-1:cic=10,rng=5

When the Cisco MGC software is configured for signaling, the system returns a response similar to the following:
M Media Gateway Controller - MGC-04 2000-04-05 08:05:54 RTRV "c7s-1:CIC=10,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=11,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=12,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=13,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=14,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=15,PST=IS,CALL=IDLE,BLK=NONE"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-13

Chapter 3 Daily Tasks

Cisco MGC Node Operations

When the Cisco MGC software is configured for call control, the system returns a response similar to the following:
M Media Gateway Controller - MGC-04 2000-04-05 08:05:54 RTRV "c7s-1:CIC=10,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=11,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=12,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=13,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=14,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=15,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"

Step 2

If the primary service state is not IS for any of the CICs, or a CIC is blocked, check your alarms retrieval MML session for bearer-related alarms. The method for setting up an alarms retrieval MML session is described in the Monitoring the Alarms Status section on page 3-6. If a bearer channel-related alarm appears, you can determine the appropriate course of action by searching for the corrective actions for that alarm in the Alarm Troubleshooting Procedures section on page 8-9. If the alarm is not in that section, corrective action is not required. More information on the alarm can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.

Understanding CIC States


The elements of the output from the rtrv-cic MML command is described in the paragraphs that follow.

Circuit Identification
The output of this command identifies the MML name of the associated signaling channel and the number for each CIC.

Primary Service State


The PST field shows the current primary service state of the CIC. Table 3-4 lists the valid primary service state values:
Table 3-4 CIC Primary Service States

Link State ID IS OOS

Link State In-service Out-of-service

Description The traffic channel or CIC is IS and fully operational. This is its normal operating state. The traffic channel or CIC is OOS from the remote end. The system is actively trying to restore the link. Individual CICs can be OOS even if the destination is IS, due to signaling events such as Q.931 service messages.

Call State
The CALL field identifies the current call state of each CIC. After a call is initiated, a circuit does not return to the Idle (available) state until all related release signaling is satisfactorily completed (the correct release sequence). In and Out call states indicate that the CIC is not available for new calls. Table 3-5 describes the various call states.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-14

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

Table 3-5

CIC Call States

State In Out Idle

Description Incoming call is in progress. Bearer channel is not available for new call. Outgoing call is in progress. Bearer channel is not available for new call. Circuit is available for use.

Media Gateway State


The GW_STAT field identifies the current state of the media gateway associated with each CIC. Table 3-6 describes the various media gateway states.
Table 3-6 Media Gateway States

State CARRIER_FAILURE

Description Individual CIC has failed. If this state is seen for all CICs associated with a T1 or E1, this indicates that the associated T1 or E1 has failed. This is the only media gateway state that is checkpointed to the standby Cisco MGC. The connection is in-service on the active Cisco MGC. The connection is out of service on the active Cisco MGC. The connection is out of service on the standby Cisco MGC. The connection is being held at the media gateway. This occurs due to a command timeout or an unexpected response. This state is only applicable to the active Cisco MGC.

CXN_IS CXN_OOS_ACTIVE CXN_OOS_STANDBY GW_HELD

Circuit Block Type


The BLK field identifies the type of circuit block that has been placed on the CIC. Blocked circuits are not available for calls. Table 3-7 describes the valid circuit block types.
Table 3-7 Circuit Block Types

Type COT_FAIL GATEWAY

Description Blocked because a continuity test failed on the CIC. Locally blocked on a switched system due to a media gateway event (for example, a media gateway interface fails causing an RSIP message to be sent, but the associated CICs remain in-service or when an RSIP message is not acted upon due to a mismatch between the MGCP host name in the RSIP string and the host name provisioned in the media gateway). If the associated switch is not responding to group unblock messages, the CICs stay in the GATEWAY circuit block state. Your CICs will be in this state when you bring up the Cisco MGC or media gateway. Once the associated switch acknowledges the unblock message, the CICs are taken out of this state. If the CICs stay in the GATEWAY circuit block state, troubleshoot the problem with the media gateway.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-15

Chapter 3 Daily Tasks

Cisco MGC Node Operations

Table 3-7

Circuit Block Types (continued)

Type INTERFACE_DISABLED

Description The interface is disabled because the system received a CGB message or a new service has been started which is still in the install busy (INB) state. Hardware blocking typethe CIC is blocked by an external message generated by a network element outside the media gateway. Blocked manually using an MML command, such as blk-cic. This is removable using the unblk-cic or reset-cic MML commands. Locally blocked for unknown reasons. This indicates a potential software problem whereby a CIC has become blocked but the software did not track the cause of the blocking. Locally blocked on a nailed-up system due to a media gateway event (for example, a group service message received from the media gateway or the media gateway is out of service). If the associated switch is not responding to group unblock messages, the CICs stay in the MATE_UNAVAIL circuit block state. Your CICs will be in this state when you bring up the Cisco MGC or media gateway. Once the associated switch acknowledges the unblock message, the CICs are taken out of this state. If the CICs stay in the MATE_UNAVAIL circuit block state, troubleshoot the problem with the media gateway. There is no block on the CIC. DS0 is available for use. Remotely automatically blocked. Remotely blocked manually.

LOCAUTO LOCMAN LOCUNK

MATE_UNAVAIL

NONE REMAUTO REMMAN

Note

Block types are additive: for example, LOCMAN (locally, manually blocked) and REMMAN (remotely, manually blocked) can both be active at the same time.

Verifying System Statistics


You should monitor the Cisco MGC system statistics on a daily basis. The system statistics provide you with the following information:

Platform state Number of active alarms Current congestion level Call success and failure rates CPU utilization level Amount of available memory Disk usage

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-16

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

You can retrieve all of the statistics for your system by entering the following MML command on the active Cisco MGC:
rtrv-ne-health::all

The system returns a message similar to the following:


MGC-01 - Media Gateway Controller 2002-03-21 15:09:54.795 EST M RTRV "Platform State:ACTIVE" "0 critical, 42 major, 3066 minor active alarms" "Machine Congestion Level = MCL 0 (No Congestion)" "Current in progress calls = 0, call attempts = 0 cps" "CPU 0 Utilization = 0 % CPU 1 Utilization = 0 %" "CPU 2 Utilization = 0 % CPU 3 Utilization = 0 %" "Memory (KB): 1866920 Free virtual, 6284064 Total virtual, 4194304 Total real" "Interval (minutes) 15 60 1440" "CALL: SuccCall TOT 0 0 0" "CALL: FailCall TOT 0 0 0" "Filesystem kbytes used avail capacity Mounted on" "/dev/dsk/c0t0d0s0 643323 19744 565680 4% /" "/dev/dsk/c0t0d0s4 11132976 8496741 2524906 78% /opt"

Note

In a particular instance, the number of in-progress calls does not reflect the actual number of active calls. When an E1 link in a PBX comes up, CRMs are sent to the PBX for each channel to ensure that there are no active calls present in the PBX. This is done to ensure that synchronization can be maintained after a link failure on the IP side. These CRMs are treated as active calls, therefore increasing the number of in-progress calls returned by this command. If over 80 percent of CPU resources are being used over an extended period of time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If the response indicates that your system has a small amount of available real memory (2 gigabytes in the above example), you may need to add additional memory to your Cisco MGC to handle your systems call processing load. Refer to your Sun Netra documentation for more information on how to add additional memory to a Cisco MGC host.

Note

Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.

The amount of free and swap memory listed in the response (186 and 2048 in the above example) should be greater than 10 percent of the known total swap space and the total memory. If this is not the case, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-17

Chapter 3 Daily Tasks

Cisco MGC Node Operations

Note

Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.

If the response to the command indicates a percentage of disk space capacity used 90 percent or higher, you must delete files from your disk drive, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

Verifying the Number of Active Processes


You should check the number of active processes on the Cisco MGC on a daily basis. To do this, log into the active Cisco MGC and enter the following UNIX command:
ps -ef

The system returns a response similar to the following:


UID PID PPID C STIME TTY TIME CMD root 0 0 0 10:28:20 ? 0:00 sched root 1 0 0 10:28:20 ? 0:27 /etc/init root 2 0 0 10:28:20 ? 0:00 pageout root 3 0 0 10:28:20 ? 1:01 fsflush root 174 173 0 10:29:03 ? 0:00 /usr/sbin/ntpdate -s -w 172.24.239.41 root 148 1 0 10:28:48 ? 0:00 /usr/lib/nfs/lockd root 617 1 0 10:29:23 console 0:00 /usr/lib/saf/ttymon -g -h -p va-hoover console login: -T sun -d /dev/console root 237 1 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestend root 116 1 0 10:28:36 ? 0:00 /usr/sbin/keyserv root 114 1 0 10:28:36 ? 0:00 /usr/sbin/rpcbind root 616 1 0 10:29:23 ? 0:00 /usr/lib/saf/sac -t 300 root 141 1 0 10:28:47 ? 0:00 /usr/sbin/inetd -s daemon 146 1 0 10:28:48 ? 0:00 /usr/lib/nfs/statd root 165 1 0 10:29:02 ? 0:11 /usr/lib/autofs/automountd root 317 1 0 10:29:13 ? 0:00 /usr/sbin/rpc.bootparamd root 169 1 0 10:29:02 ? 0:00 /usr/sbin/syslogd root 173 1 0 10:29:02 ? 0:00 /sbin/sh /etc/rc2.d/S74xntpd start root 2867 141 0 10:05:23 ? 0:00 in.telnetd root 182 1 0 10:29:03 ? 0:00 /usr/sbin/cron root 198 1 0 10:29:03 ? 0:00 /usr/lib/lpsched root 227 1 0 10:29:05 ? 0:00 /usr/lib/utmpd root 217 1 0 10:29:04 ? 0:00 /usr/lib/power/powerd root 618 1 0 10:29:23 ? 0:00 /opt/CiscoMGC/bin/critagt -d root 235 1 0 10:29:05 ? 0:00 /usr/lib/sendmail -bd -q15m root 238 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 0 root 239 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 1 root 240 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 2 root 241 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 3 root 242 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 4 root 243 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 5 root 244 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 6 root 245 237 0 10:29:06 ? 0:00 /opt/TimesTen32/32/bin/timestensubd -id 7 root 290 1 0 10:29:12 ? 0:00 /usr/sbin/vold root 620 616 0 10:29:23 ? 0:00 /usr/lib/saf/ttymon root 315 1 0 10:29:13 ? 0:01 /usr/sbin/in.rarpd -a

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-18

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

root 621 618 0 10:29:23 ? 0:05 /opt/CiscoMGC/bin/snmpdm -tcplocal -d root 622 618 0 10:29:24 ? 0:00 /opt/CiscoMGC/bin/mib2agt -d mgcusr 610 1 0 10:29:18 ? 0:02 procM root 623 618 0 10:29:24 ? 0:00 /opt/CiscoMGC/bin/hostagt root 624 618 0 10:29:24 ? 0:01 /opt/CiscoMGC/bin/fsagt mgcusr 774 610 0 10:31:18 ? 0:17 ../bin/mmdbd -X 30007 mgcusr 626 610 0 10:29:24 ? 0:19 ../bin/LogServerd -X 30013 root 627 610 0 10:29:24 ? 0:05 ../bin/almM -X 30002 mgcusr 669 610 0 10:29:24 ? 0:08 ../bin/cdrDmpr -X 30005 mgcusr 637 610 0 10:29:24 ? 6:11 ../bin/amDmpr -X 30004 mgcusr 681 610 0 10:29:25 ? 0:11 ../bin/pom -X 30008 mgcusr 690 610 0 10:29:42 ? 0:02 ../bin/replicator -X 3000d -C ../ etc/XECfgParm.dat -t mgcusr 670 610 0 10:29:24 ? 0:01 ../bin/cfgM -X 30001 mgcusr 673 610 0 10:29:25 ? 0:43 ../bin/measMgr -X 30003 mgcusr 689 610 0 10:29:42 ? 1:29 ../bin/engine -X 3000e mgcusr 776 610 0 10:31:19 ? 0:01 ../bin/TCAP -X 30010 root 691 610 0 10:29:42 ? 0:01 ../bin/mmSAgt -X 30009 root 692 610 0 10:29:43 ? 0:04 ../bin/sagt -X 3000a root 693 610 0 10:29:43 ? 0:01 ../bin/provSAgt -X 3000b root 775 610 1 10:31:18 ? 37:37 ../bin/ioChanMgr -X 3000f mgcusr 777 610 0 10:31:23 ? 0:12 ../bin/MGCP -X 30016 mgcusr 778 610 0 10:31:23 ? 0:27 ../bin/ISDNL3 -X 3000c mgcusr 779 610 0 10:31:23 ? 0:26 ../bin/ISDNL3 -X 30011 mgcusr 780 610 0 10:31:23 ? 0:30 ../bin/ISDNL3 -X 30014 mgcusr 781 610 0 10:31:23 ? 0:01 ../bin/ISDNL3 -X 30015 mgcusr 782 610 0 10:31:23 ? 0:42 ../bin/SS7 -X 30017 root 783 610 0 10:31:23 ? 0:05 ../bin/foverd -X 30012 mgcusr2 5458 5456 0 11:07:28 pts/0 0:00 -tcsh root 5456 141 0 11:07:28 ? 0:00 in.rlogind root 367 1 0 14:21:02 ? 0:00 /usr/sbin/nscd mgcusr 2869 2867 0 10:05:23 pts/1 0:00 -csh root 3101 2869 0 10:06:49 pts/1 0:00 ps -ef

The response should indicate that there are between 60 and 100 processes active. If the response indicates that there are more than 100 active processes, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.

Verifying the Number of Users


You should check the number of users on the Cisco MGC on a daily basis. To do this, log into the active Cisco MGC and enter the following UNIX command:
who

The system returns a response similar to the following:


mgcusr pts/0 mgcusr2 pts/1 May 29 11:07 May 30 10:05 (mgcusr-u5.somecompany.com) (mgcusr2-u6.somecompany.com)

Only known login IDs should be listed in the response. If the response indicates that there are unknown login IDs, or login sessions that have lasted a very long time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-19

Chapter 3 Daily Tasks

Cisco MGC Node Operations

Verifying Available Virtual Memory


The operating system used on the Cisco MGC hosts, Solaris (version 2.6 or 8), is a virtual memory system. A virtual memory system adds to the available memory by writing the contents of an unused block of memory to the disk drive, enabling that block of memory to be used for another purpose. The space on the disk drive dedicated to this function is known as the swap space. Once the data in that block of memory is needed again, the system reads the stored block from the swap space back into memory. In a typical Cisco MGC installation, the tmp directory (/tmp) is a temporary file system mount that coexists in the same physical disk partition as the swap space. The tmp directory is used to run a number of special files, such as FIFOs, that are required for the system to run properly. As the amount of space allocated to the tmp directory increases, the amount of space available for running Cisco MGC processes decreases, which can cause functional problems. You need to ensure that the amount of space consumed by the tmp directory is kept to a minimum.

Caution

Do not copy other files into the /tmp directory, such as patches or other software. Use of this directory for temporary storage or for downloading can cause functional problems with the Cisco MGC software. To determine the amount of available virtual memory, you must compare the amount of virtual memory in use to the maximum amount of virtual memory for your system. To do this, perform the following steps:

Note

Be aware that the time of day at which you enter these commands effects the overall accuracy of the response. If you enter these commands during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.

Step 1

The maximum amount of virtual memory is the sum of the physical memory and the size of the swap space. To determine the amount of physical memory on your system, log in to the active Cisco MGC and enter the following UNIX commands:
cd /usr/sbin prtconf | grep Memory

The system returns a response similar to the following:


Memory size: 512 Megabytes

Step 2

To determine the size of the swap space on the disk drive, enter the following UNIX command:
swap -s

The system returns a response similar to the following:


total: 57944k bytes allocated + 552816k reserved = 610760k used, 1359904k available

Step 3 Step 4

Add the amount of physical memory to the amount of swap space. This value is the maximum virtual memory for your system. To determine the amount of available virtual memory, enter the following UNIX command:
vmstat

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-20

OL-0800-06

Chapter 3

Cisco MGC Node Operations Daily Tasks

The system returns a response similar to the following:


procs r b w 0 0 0 memory swap free 3176 22320 re 0 page disk mf pi po fr de sr s0 s1 s6 -1 0 0 0 0 0 0 0 0 0 faults in sy 131 116 cpu cs us sy id 104 0 1 99

The amount of swap and free memory listed in the response (3176 and 22,320 in the above example) represents the total amount of available virtual memory. This amount should always be greater than 10 percent of the maximum virtual memory. If this is not the case, proceed to Step 5.

Note

You also can use this command to check the available virtual memory repeatedly. Enter it in the format vmstat n, where n is the number of seconds between checks. Refer to the man pages on the vmstat command for more information. When the vmstat command is used to check the available virtual memory repeatedly, you should ignore the first line of output.

Step 5

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Verifying Available Memory on the Cisco SLTs


You should check the amount of available memory on your Cisco Signaling Link Terminals (SLTs) on a daily basis. To do this, perform the following steps:
Step 1

Log in to a Cisco SLT, and enter the following IOS command to check the amount of available memory:
show mem

The system returns a response similar to the following:


Processor I/O Head 80CF71E0 1D00000 Total(b) 16813600 19922944 Used(b) 7885028 6975904 Free(b) 8928572 12947040 Lowest(b) Largest(b) 8900652 8891892 12938256 12937500

Ensure that the memory used is less than 90 percent of the total available memory. If this is the case, the procedure is complete. If the response indicates that the Cisco SLT has a small amount of available memory, you may need to add additional memory to the Cisco SLT to handle your systems call processing load.

Note

Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-21

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

Step 2

Refer to the Upgrading DRAM section on page 6-16 for more information on how to add additional memory to a Cisco SLT.

Periodic Maintenance Procedures


This section contains procedures that are either performed on automatically, on a scheduled basis, by the system or should be performed by you on a regular basis to keep the Cisco MGC node operating smoothly. You should schedule the procedures that are performed manually as you see fit. These maintenance procedures include

Automatic Disk Space Monitoring, page 3-22 Automatic System Log Rotation, page 3-26 Rotating System Logs Manually, page 3-26 Creating a Disaster Recovery Plan, page 3-26 Backing Up System Software, page 3-27 Processing a Core Dump File, page 3-40

Note

This section does not include information on maintaining the Sun host server hardware. You should routinely perform general maintenance tasks and diagnostic checks on the host hardware. See the documentation provided by Sun Microsystems, the hardware manufacturer, for detailed information on these types of procedures.

Automatic Disk Space Monitoring


The Cisco MGC software includes a script called disk monitor (diskmonitor.sh) that periodically checks the amount of disk space used within the configurable set of disk partitions. Disk monitor ensures that there is sufficient disk space available in each disk partition for the system to continue to operate at peak performance. To do this, disk monitor deletes (trims) the older log files in the /opt/CiscoMGC/var/log and /opt/CiscoMGC/var/spool directories until the disk space usage is within the specified threshold (set using the XECfgParm.dat parameter, diskmonitor.Threshold). The disk monitor can also track the number of configurations stored in the configuration library (which is found in the /opt/CiscoMGC/etc/CONFIB_LIB directory) and trim the older configurations when the number of configurations exceeds the maximum value you have set in the associated XECfgpParm.dat disk monitor parameter. The process manager runs the disk monitor script once every minute. In prior releases, it was recommended that the user ensure that there were never more than 64 configurations stored in the configuration library. This recommendation was made to ensure the proper functioning of switchovers and the prov-sync MML command. In instances where the system was storing more than 64 configurations, switchovers and the prov-sync command would time out and fail as the standby Cisco MGC attempts to copy over all of the configurations stored on the active Cisco MGC. Now the process of administering the configuration library is handled automatically by the Cisco MGC software. The user sets the disk monitor parameter to establish the maximum number of configurations allowed in the configuration library, and the system will trim the older configurations as necessary.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-22

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

Disk monitor is controlled using the following parameters in the XECfgParms.dat file:

diskmonitor.LimitSpecifies the number of days to preserve data before trimming is initiated. The default value is 7. diskmonitor.OptFileSysAllows for optional user-configurable file systems to be monitored. This utility monitors the /opt file system for threshold crossing. Using this parameter, you can monitor additional file systems (disk slices) by setting parameter to the preferred directory, such as /tmp, /usr or /var. The messages associated with this parameter are sent to the platform.log file. To retrieve these messages, you must scan the platform.log file for messages using the following format: Filesystem file_system_name has exceeded num percent full. For example:
Filesystem /var has exceeded 80 percent full

Note

The files in these file sytems are not trimmed by disk monitor.

diskmonitor.Threshold Specifies the percentage of disk usage at which alarming and disk trimming is initiated. The default value is 80. diskmonitor.CdrRmFinishedSpecifies how many days to keep finished (polled) call detail record (CDR) files. The default value is 0, which means that if the Cisco BAMS is polling the Cisco MGC, CDR.bin files remain in a user-configurable directory until they are renamed by the Cisco BAMS (using the format CDR_timestamp.finished) and/or the disk monitor trims the file from user-configurable directory. diskmonitor.SoftLimitSpecifies the action to be taken once the number of days threshold set in the diskmonitor.Limit parameter is reached. If this parameter is set to true, disk monitor decrements the value in the diskmonitor.Limit parameter one day at a time (that is, from 7 down to 6, and then down to 5, and so on) until the utilization level drops below the threshold. If this parameter is set to false, disk monitor closes and the system generates a DISK alarm. The files can then be deleted manually. The default value is false. diskmonitor.CoreRmDaysSpecifies how many days to keep core dump files. The default value is 1, which means that core dump files are kept for one day before disk monitor removes them automatically. diskmonitor.CfgRmDirsThis parameter specifies the maximum number of configurations that can be stored in the configuration library. The valid values are the range of integers from 3 through 64. The default value is 64. Entering a value outside of the range of valid values disables monitoring of the number of entries stored in the configuration library. If you want to change the value of this parameter, you may need to add it manually to the XECfgParm.dat file.

Disk monitor performs the following steps in its inspection of disk utilization levels:
1.

Verify that the standard and optional partitions, as defined in diskmonitor.OptFileSys, are not over the thresholds for disk utilization or the configuration library, as defined in diskmonitor.Threshold and diskmonitor.CfgRmDirs, respectively.
a. If neither threshold is exceeded, disk monitor exits. b. If the disk utilization threshold is exceeded, disk monitor attempts to trim the files based on the

number of days, as defined in diskmonitor.Limit.


c. If the configuration library threshold is exceeded, disk monitor trims the number of

configuration files to match the setting in the diskmonitor.CfgRmDirs parameter, starting with the oldest.
2.

Once files are trimmed, disk monitor verifies again that the standard and optional partitions are not over the thresholds for disk utilization and the configuration library.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-23

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

a. If neither threshold is exceeded, disk monitor exits. b. If the disk utilization threshold is exceeded, and diskmonitor.SoftLimit is set to false, the disk

monitor is exited and a DISK alarm is raised.


c. If the disk utilization threshold is exceeded, and diskmonitor.SoftLimit is set to true, disk

monitor begins decreasing the number of days that logs can be stored (the value defined in diskmonitor.Limit), stopping as soon as the disk is under the disk utilization threshold.
d. If the configuration library threshold is exceeded, disk monitor trims the number of

configuration files to match the setting in the diskmonitor.CfgRmDirs parameter, starting with the oldest. If any disk partition exceeds the configurable usage threshold, the Cisco MGC generates a DISK alarm (a major alarm), a warning of a disk partition overrun, and a warning of insufficient disk space. Refer to the DISK section on page 8-42 for information about the corrective actions required to resolve a DISK alarm. Some other files, such as call trace files, take up large amounts of disk space and are not trimmed by disk monitor. You may have to periodically delete call trace files. Call trace files are created when you perform call traces as part of troubleshooting a problem. These files can be rather large, and leaving them on your disk could cause problems. For more information about deleting call trace files, refer to the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

Configuring Disk Monitor


Configuration of the disk monitor can only be done while the Cisco MGC software is turned off. For this reason, disk monitor is typically configured only during the initial installation. For more information on configuring the disk monitor during initial installation, refer to the XECfgParms.dat section of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. You can perform the configuration after initial installation. To do this, perform the following steps:

Caution

Performing the following procedure requires that the Cisco MGC software be turned off. Do not attempt the following procedure without the guidance of the Cisco TAC. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If your system uses a single Cisco MGC in a simplex configuration, performing this procedure causes you to drop all calls.

Step 1

Determine whether any alarms are pending on the active Cisco MGC, as described in the Retrieving All Active Alarms section on page 8-3. If any alarms are pending, you can determine the appropriate courses of action by searching for the corrective actions for those alarms in the Alarm Troubleshooting Procedures section on page 8-9. If the alarms are not in that section, corrective action is not required. More information on those alarms can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.

Step 2 Step 3

Repeat Step 1 for the standby Cisco MGC. Modify the disk monitor parameters in the XECfgParm.dat files, which are listed below, on each host, using the procedure described in the Rebooting Software to Modify Configuration Parameters section on page 8-173.

diskmonitor.Limit parameterSets the number of days to preserve logged data before trimming is initiated. The default value is 7.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-24

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

diskmonitor.OptFileSysAllows for optional user-configurable file systems to be monitored. This utility monitors the /opt file system for threshold crossing. Using this parameter, you can monitor additional file systems (disk slices) by setting parameter to the preferred directory, such as /tmp, /usr or /var. The messages associated with this parameter are sent to the platform.log file. To retrieve these messages, you must scan the platform.log file for messages using the following format: Filesystem file_system_name has exceeded num percent full. For example:
Filesystem /var has exceeded 80 percent full

Note

The files in these file sytems are not trimmed by disk monitor.

diskmonitor.ThresholdSets the percentage of disk usage at which alarming and disk trimming is initiated. The default value is 80. diskmonitor.CdrRmFinishedSets the number of days that finished CDR files are kept in the log directory. The default value is 0, which means that if the Cisco BAMS is polling the Cisco MGC, CDR.bin files remain in a user-configurable directory until they are renamed by the Cisco BAMS (using the format CDR_timestamp.finished) and/or the disk monitor trims the file from user-configurable directory. diskmonitor.SoftLimitDetermines what action is taken once the number of days threshold set in the diskmonitor.Limit parameter is reached. If this parameter is set to true, disk monitor decrements the value in the diskmonitor.Limit parameter one day at a time (that is, from 7 down to 6 then down to 5 and so on), until the utilization level drops below the threshold. If this parameter is set to false, disk monitor exits and the system generates a DISK alarm. The default value is false. diskmonitor.CoreRmDaysSets the number of that core dump files are kept in the log directory. The default value is 1, which means that core dump files are kept for one day before disk monitor removes them automatically. diskmonitor.CfgRmDirsSets the maximum number of configurations that can be stored in the configuration library. The valid values are the range of integers from 3 through 64. The default value is 64. This parameter is not present in the XECfgParm.dat file initially. If you want to modify the value, you must enter the parameter manually into the file.

Caution

The Cisco MGC software is case-sensitive. Ensure that you enter the parameter name correctly, or the maximum number of configurations will not be modified.

Note

We recommend that you keep the latest configurations, store older configurations on system backups, and delete those older configurations from the library. For information on deleting configurations from the library, refer to the procedure in the Using the Config-Lib Viewer section on page 3-135.

Note

If you want to ensure the proper functioning of the prov-sync MML command, set the diskmonitor.CfgRmDirs parameter to a value between 50 and 60. Entering a value outside of the range of valid values (3 through 64) disables monitoring of the number of entries stored in the configuration library.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-25

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

Automatic System Log Rotation


As the system operates, the Cisco MGC software creates the system logs that are stored in a file stored in the /opt/CiscoMGC/var/log directory. The name of the system log file is set by the XECfgParm.dat file parameter, logFileNamePrefix (the default value is platform). The Cisco MGC software stops writing to the current system log file, archives the contents of that file, and commences writing to a new system log file. This process is referred to as log rotation. Log rotation occurs as a result of one of the following conditions:

Cisco MGC software startup (the log rotation script is run) Log rotation script (log_rotate.sh) is run manually The size of the active system log file has exceeded the value set in the XECfgParm.dat parameter, fileRotateSize. The time elapsed since the last log rotation has exceeded the value set in the XECfgParm.dat parameter, fileRotateInterval.

When the system rotates the system log file, the current system log file is archived and a new system log file is opened. The archived log file is stored in the /opt/CiscoMGC/var/spool directory. Once the Cisco MGC software is up and running, the log server takes over the actual file rotation responsibility of renaming the active file to a historical file with a new file name with the following format: logFileNamePrefix_yyyymmddhhmmss.log, where the time stamp indicates the system date/time at the time of log rotation.

Rotating System Logs Manually


You can also run the log rotation script manually to force the current system log file to be archived. To do this, log into the active Cisco MGC as root, and enter the following UNIX command:
/opt/CiscoMGC/bin/log_rotate.sh

The system creates a new current system log file and archived log file, as described in the Automatic System Log Rotation section on page 3-26.

Creating a Disaster Recovery Plan


You should formulate a disaster recovery plan for your Cisco MGC node to ensure that your system can be restored to service quickly after it has been taken out-of-service by a natural or man-made disaster. A key element in your disaster recovery plan should be ensuring that regular backups of your systems software are performed. Refer to the Backing Up System Software section on page 3-27 for more information about backup operations. We also recommend that the backup data for your system be stored in a secure location, in a site separate from the equipment, to ensure that they are not affected by the same disaster. For information on performing a disaster recovery, refer to the Recovering from Cisco MGC Host(s) Failure section on page 8-161.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-26

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

Backing Up System Software


You should perform regularly scheduled system software backups on both the active and standby Cisco MGCs to protect critical system data such as configuration files, which are irreplaceable if lost. If a catastrophic failure occurs, it is much easier to restore system information from backup data than to recreate it. Furthermore, such a failure could cause critical configuration information to be lost if it has not been backed up. We recommend that you create a backup schedule, ensuring that small or incremental backups are performed daily, and a large or full backup once a week.

Note

We recommend that you back up your system software during periods of low call volume to minimize the effect of the backup on your call processing. There are two backup methods available for the Cisco MGC software, one for software releases up to 9.1(4), and another for software releases from 9.1(5) and up. These backup methods are described in the following sections:

Backup Procedures for Cisco MGC Software up to Release 9.1(4), page 3-27 Backup Procedures for Cisco MGC Software from Release 9.1(5) and up, page 3-32

Backup Procedures for Cisco MGC Software up to Release 9.1(4)


This backup method uses a script to backup the configuration data for the Cisco MGC software on to either a local tape drive or on to a remote machine. This script also allows you to perform full or partial backups. Backup of the Main Memory Database (MMDB) is performed by a separate script. These scripts do not enable you to schedule automatic backup times. You must perform these backups manually.

Note

If your Cisco MGC is a continuous service system, ensure that you perform backup procedures on both Cisco MGC hosts. The following sections provide the backup procedures:

Storing a Full Backup Operation on a Local Tape, page 3-28 Storing a Partial Backup Operation on a Local Tape, page 3-28 Storing a Full Backup Operation on a Remote Machine, page 3-29 Storing a Partial Backup Operation on a Remote Machine, page 3-31 Performing a Backup Operation on the Main Memory Database, page 3-32

Note

The procedures for restoring system data can be found in the Restoring Procedures for Cisco MGC Software up to Release 9.1(4) section on page 8-164.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-27

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

Storing a Full Backup Operation on a Local Tape


Use this procedure to store the results of a full backup operation (everything under the base directory) to a tape inserted in the local tape drive. To do this, complete the following steps:
Step 1

Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory. For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local

Step 2

If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh

Step 3

The system returns a response similar to the following:


MGC backup utility ----------------------------Destination currently set to Local tape (/dev/rmt/0h) Enter: <N> set destination to remote NFS server <L> set destination to Local tape (/dev/rmt/0h) <F> for Full (everything you have) <P> for Partial (changable part of the system) <Q> to quit Select backup mode:

Step 4

Enter F and press Enter to start the full backup. The system returns a message similar to the following:
a ./ 0 tape blocks a ./var/ 0 tape blocks a ./var/log/ 0 tape blocks a ./var/log/platform.log 1 tape blocks a ./var/log/mml.log 1 tape blocks a ./var/spool/ 0 tape blocks a ./var/trace/ 0 tape blocks a ./var/audit_cron.log 1 tape blocks . . .#

Step 5

When the backup operation has finished, remove the tape, engage the write-protect tab, and label the tape "Full MGC Backup." Specify the machine name and the time and date.

Storing a Partial Backup Operation on a Local Tape


Use this procedure to store a partial backup operation (the contents of the etc, local, var, and dialPlan subdirectories under the MGC base directory) to a tape inserted in a local tape drive. To do this, complete the following steps:
Step 1

Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-28

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local

Step 2

If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh

Step 3

The system returns a response similar to the following:


MGC backup utility ----------------------------Destination currently set to Local tape (/dev/rmt/0h) Enter: <N> set destination to remote NFS server <L> set destination to Local tape (/dev/rmt/0h) <F> for Full (everything you have) <P> for Partial (changable part of the system) <Q> to quit Select backup mode:

Step 4

Select P and press Enter to start the partial backup. The system returns a response similar to the following:
a a a a a a a a . . . # ./ 0 tape blocks ./var/ 0 tape blocks ./var/log/ 0 tape blocks ./var/log/platform.log 1 tape blocksL ./var/log/mml.log 1 tape blocks ./var/spool/ 0 tape blocks ./var/trace/ 0 tape blocks ./var/audit_cron.log 1 tape blocks

Step 5

When the backup operation has finished, remove the tape, engage the write-protect tab, and label the tape "Partial MGC Backup." Specify the machine name and the time and date.

Storing a Full Backup Operation on a Remote Machine


Use this procedure to store a full backup operation (everything under the MGC software base directory) to an NFS mountable directory on a remote machine. The remote machine must be set up with an NFS mountable directory that can be written to by the machine being backed up. The NFS setup of the remote machine is beyond the scope of this procedure.

Note

The remote NFS server you select to store your back up data should be a system in your network that is not used as a Cisco MGC. Storing back up data on a Cisco MGC can negatively affect the performance of the system.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-29

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

To back up the entire Cisco MGC software directory to a remote machine, complete the following steps:
Step 1

Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory. For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local

Step 2

If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh

Step 3

The system returns a response similar to the following:


MGC backup utility ----------------------------Destination currently set to Local tape (/dev/rmt/0h) Enter: <N> set destination to remote NFS server <L> set destination to Local tape (/dev/rmt/0h) <F> for Full (everything you have) <P> for Partial (changable part of the system) <Q> to quit Select backup mode:

Step 4 Step 5

Select N and press Enter to define the remote NFS server. The system then prompts you for the name of the remote server. Enter the name of the remote NFS server.
Enter server name: remote_hostname

Where: remote_hostnameName of your desired remote server. The system then prompts you for the associated directory name on your remote server.
Step 6

Enter the directory name on the remote NFS server.


Enter remote directory : remote_directory

Where: remote_directoryName of the associated directory on your remote server. The system then prompts you to select a backup mode.
Step 7

Select F and press Enter to start the full backup. The system returns a response similar to the following:
a ./ 0 tape blocks a ./var/ 0 tape blocks a ./var/log/ 0 tape blocks . . . backup to va-panthers:/backup/va-blade20000317105337.tar complete #

The filename on the remote NFS server is the host name of the machine with the date in YYYYMMDDHHMMSS format and .tar appended.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-30

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

Storing a Partial Backup Operation on a Remote Machine


Use this procedure to store a partial backup operation (the contents of the etc, local, var, and dialPlan subdirectories under the MGC base directory) to an NFS mountable directory on a remote machine. The remote machine must be set up with an NFS mountable directory that can be written to by the machine being backed up. The NFS setup of the remote machine is beyond the scope of this procedure.

Note

The remote NFS server you select to store your back up data should be a system in your network that is not used as a Cisco MGC. Storing back up data on a Cisco MGC can negatively affect the performance of the system. To back up a portion of the Cisco MGC software directory to a remote machine, complete the following steps:

Step 1

Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory. For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local

Step 2

If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh

Step 3

The system returns a response similar to the following:


MGC backup utility ----------------------------Destination currently set to Local tape (/dev/rmt/0h) Enter: <N> set destination to remote NFS server <L> set destination to Local tape (/dev/rmt/0h) <F> for Full (everything you have) <P> for Partial (changable part of the system) <Q> to quit Select backup mode:

Step 4 Step 5

Select N and press Enter to define the remote NFS server. The system then prompts you for the name of the remote server. Enter the name of the remote NFS server.
Enter server name: remote_hostname

Where: remote_hostnameName of your desired remote server. The system then prompts you for the associated directory name on your remote server.
Step 6

Enter the directory name on the remote NFS server.


Enter remote directory : remote_directory

Where: remote_directoryName of the associated directory on your remote server. The system then prompts you to select a backup mode.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-31

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

Step 7

Select P and press Enter to start the partial backup. The system returns a response similar to the following:
Select backup mode: P a ./ 0 tape blocks a ./var/ 0 tape blocks a ./var/log/ 0 tape blocks . . . backup to va-panthers:/backup/va-blade20000317105337P.tar complete #

The filename on the remote NFS server is the host name of the machine with the date in YYYYMMDDHHMMSS format and P.tar appended.

Performing a Backup Operation on the Main Memory Database


Use this procedure to store your dial plan data, which is stored in the MMDB, in a single file.

Note

If your system is not configured with a dial plan, do not perform this procedure.

Step 1

Log in to the active Cisco MGC and change directories to a local subdirectory under the base directory. For example, enter the following UNIX command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local

Step 2

Run the MMDB backup script by entering the following UNIX command:
./backupDb.sh filename

Where filename is the name of the database backup file. For example, to backup the contents of the MMDB to a file called dplan, you would enter the following command:
./backupDb.sh dplan

The system returns a response similar to the following:


Exporting database contents for DSN=howdydb into dplan The Backup process is being initiated for the datastore howdydb Files for /opt/TimesTen32/datastore/howdydb are being backed up onto standard output Backup Complete

Backup Procedures for Cisco MGC Software from Release 9.1(5) and up
This backup method uses a script to backup the configuration data for the Cisco MGC software, select UNIX administrative files, and the Main Memory Database (MMDB). This script only performs full backups. This script enables you to perform manual backups, schedule and administer automatic backups, and view a history of the last 30 backup operations performed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-32

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

Note

This functionality is part of a patch to Release 9.1(5). If you want to use this functionality, you must be upgraded to the proper patch level. For more information on verifying the patch level of your system, refer to the Verifying the Patch Level of the Cisco MGC section on page 3-104.

Note

If your Cisco MGC is a continuous service system, ensure that you perform backup procedures on both Cisco MGC hosts.

Note

The various backup operations described in the following sections can only be run when you are logged in to your system as mgcusr. You cannot perform any backup operation while you are logged in as root.

Note

The procedures for restoring system data can be found in the Restoring Procedures for Cisco MGC Software Release 9.1(5) and up section on page 8-168. The following sections provide the backup procedures:

Performing a Manual Backup Operation, page 3-33 Scheduling an Automatic Backup Operation, page 3-34 Listing Scheduled Automatic Backup Operations, page 3-39 Removing an Automatic Backup Operation from the Schedule, page 3-37 Listing the Backup Operation History, page 3-39

Performing a Manual Backup Operation


To perform a manual backup operation, enter the following UNIX command on the Cisco MGC:
mgcbackup -d path [-r retries -t retry_time]

Where:

pathThe full path of the directory in which to store the backup file, for example a directory on a remote server that you have mounted on your system, or the local tape drive (the local tape drive is the default location).

Note

We recommend that you do not store backup files on your local Cisco MGC host, as storage of backup files on the local host reduces the amount of disk space available to process call data, and does not ensure that the data is safe in the event of a natural disaster.

Note

If the path you enter is for a tape device, be aware that a new tape must be entered into the device for each backup. The backup data on a used tape will be overwritten by this operation.

retriesThe number of times to check for an active provisioning session on the Cisco MGC, before aborting the backup operation. The default value is 0, and the maximum value is 100.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-33

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

Note

A backup operation cannot start while there is an active provisioning session on the Cisco MGC.

retry_timeThe number of seconds to wait between checks for an active provisioning session on the Cisco MGC. The default value is 30 seconds, and the maximum value is 3600 seconds.

For example, to perform a manual backup operation where the backup file is saved to a directory path called /dev/rmt/h0, with a maximum of three attempts, each 60 seconds apart, you would enter the following UNIX command:
mgcbackup -d /dev/rmt/h0 -r 3 -t 60

Note

You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The backup file is stored in the specified directory path in the following format:
mgc_hostname_yyyymmdd_hhmmss _backup

Where:

hostnameThe name of the Cisco MGC host, such as MGC-01. yyyymmddThe date the backup file is created, in a year-month-day format, such as 20011130. hhmmssThe time the backup file is created, in an hour-minute-second format, such as 115923.

Scheduling an Automatic Backup Operation


To schedule an automatic backup operation, perform the following steps:

Note

You can schedule an automatic backup operation only when you are logged in to your system as mgcusr. You cannot schedule an automatic backup operation while you are logged in as root.

Step 1

Enter the following UNIX command on the Cisco MGC:


mgcbackup -s

The system returns a response similar to the following:


Backup Schedule Menu -------------------Note: to exit the script at anytime use ctrl-c 1. 2. 3. 4. 5. 6. Add a scheduled backup Delete a scheduled backup Delete all scheduled backups List scheduled backups Return to Main Menu Exit

Selection:

Step 2

Enter 1 to add an automatic backup operation to the schedule. The system returns a response similar to the following:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-34

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

Add a Scheduled Backup ---------------------Enter the name of the backup:

Step 3

Enter the name of your backup.

Note

The name of the backup can only be between 1 and 10 alphanumeric characters in length.

After you enter the name of your automatic backup, the system returns a response similar to the following:
Enter the directory to place the backup file (default=/dev/rmt/0):

Step 4

Enter the directory path where you want the backup file stored.

Note

Your local tape drive is the default directory.

Note

We recommend that you do not store backup files on your local Cisco MGC host, as storage of backup files on the local host reduces the amount of available disk space to process call data, and does not ensure that the data is safe in the event of a natural disaster.

Note

If the path you enter is for a tape device, be aware that a new tape must be entered into the device for each backup. The backup data on a used tape will be overwritten by this operation.

After you enter your directory path, the system returns a response similar to the following:
Enter the number of retries (default=0):

Step 5

Enter the number of times to check for an active provisioning session on the Cisco MGC before aborting the backup operation.

Note

A backup operation cannot start while a provisioning session is active on the Cisco MGC.

Note

The maximum number of retries is 100.

After you enter the number of retries, the system returns a response similar to the following:
Enter the time between retries (default=30 seconds):

Step 6

Enter the number of seconds to wait between checks for an active provisioning session on the Cisco MGC.

Note

The maximum number of seconds between checks is 3600.

After you enter the time between attempts, the system returns a response similar to the following:
Enter the day of the week (default=everyday):

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-35

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

Step 7

Enter the day(s) of the week that you would like the backup operation performed. The following values are valid:

SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY WEEKDAYS WEEKENDS EVERYDAY

After you enter your day(s) of the week setting, the system returns a response similar to the following:
Enter the time (HH:MM):

Step 8

Enter the time to start your automatic backup operation, in hour:minute format.

Note

The range for hour is 00-23, and the range for minute is 00-59.

Note

We recommend that you schedule your automatic backup operation for a time when your system is likely to have a minimum amount of call volume to minimize the effect of the backup on your call processing. After you enter your time setting, the system returns a response similar to the following:
Save this scheduled backup (Y or N)?

Step 9

Enter Y if you want to add this automatic backup operation, or enter N if you do not want to add an automatic backup operation.

Note

You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The system returns a response similar to the following:
Press enter to continue:

Step 10

Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.

When the automatic backup operation is performed, the backup file is stored in the specified directory path in the following format:
mgc_hostname_yyyymmdd_hhmmss _backup

Where:

hostnameThe name of the Cisco MGC host, such as MGC-01.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-36

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

yyyymmddThe date the backup file is created, in a year-month-day format, such as 20011130. hhmmssThe time the backup file is created, in a hour-minute-second format, such as 115923.

Removing an Automatic Backup Operation from the Schedule


To remove an automatic backup operation from the schedule, perform the following steps:
Step 1

Enter the following UNIX command on the Cisco MGC:


mgcbackup -s

The system returns a response similar to the following:


Backup Schedule Menu -------------------Note: to exit the script at anytime use ctrl-c 1. 2. 3. 4. 5. 6. Add a scheduled backup Delete a scheduled backup Delete all scheduled backups List scheduled backups Return to Main Menu Exit

Selection:

Step 2

Enter 2 to remove an automatic backup operation from the schedule. The system returns a response similar to the following:
Delete a Scheduled Backup ------------------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Enter the name of the backup to be deleted:

Step 3

Enter the name of the automatic backup operation you want to remove from the schedule. The system returns a response similar to the following:
Delete this scheduled backup (Y or N)?

Step 4

Enter Y if you want to continue with deleting an automatic backup operation, or enter N if you do not want to delete an automatic backup operation.

Note

You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The system returns a response similar to the following:
Scheduled backup name deleted. Press enter to continue:

Where name is the name of the deleted scheduled backup, as specified in Step 3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-37

Chapter 3 Periodic Maintenance Procedures

Cisco MGC Node Operations

Step 5

Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.

Removing all Automatic Backup Operations from the Schedule


To remove all of the automatic backup operations from the schedule, perform the following steps:
Step 1

Enter the following UNIX command on the Cisco MGC:


mgcbackup -s

The system returns a response similar to the following:


Backup Schedule Menu -------------------Note: to exit the script at anytime use ctrl-c 1. 2. 3. 4. 5. 6. Add a scheduled backup Delete a scheduled backup Delete all scheduled backups List scheduled backups Return to Main Menu Exit

Selection:

Step 2

Enter 3 to remove all automatic backup operations from the schedule. The system returns a response similar to the following:
Delete all Scheduled Backups ----------------------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Delete all scheduled backups (Y or N)?

Step 3

Enter Y if you want to continue with deleting all automatic backup operations, or enter N if you do not want to delete all automatic backup operations.

Note

You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The system returns a response similar to the following:
All scheduled backups deleted. Press enter to continue:

Where name is the name of the deleted scheduled backup, as specified in Step 3.
Step 4

Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-38

OL-0800-06

Chapter 3

Cisco MGC Node Operations Periodic Maintenance Procedures

Listing Scheduled Automatic Backup Operations


To list the scheduled automatic backup operations, perform the following steps:
Step 1

Enter the following UNIX command on the Cisco MGC:


mgcbackup -s

The system returns a response similar to the following:


Backup Schedule Menu -------------------Note: to exit the script at anytime use ctrl-c 1. 2. 3. 4. 5. 6. Add a scheduled backup Delete a scheduled backup Delete all scheduled backups List scheduled backups Return to Main Menu Exit

Selection:

Step 2

Enter 4 to list the scheduled automatic backup operations. The system returns a response similar to the following:
Scheduled Backups ----------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Press enter to continue:

Step 3

Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.

Listing the Backup Operation History


To see a history of the last 30 backup operations, perform the following steps:
Step 1

Enter the following UNIX command on the Cisco MGC:


mgcbackup -l

The system returns a response similar to the following:


Status Success Success Success File /var/Cisco/mgc_venus_20011010_153003_backup /var/Cisco/mgc_venus_20011011_153003_backup /var/Cisco/mgc_venus_20011012_153003_backup

Press enter to continue:

Note

If a backup operation fails, the reason for the failure is listed below the file name.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-39

Chapter 3 Regular Operations

Cisco MGC Node Operations

Step 2

Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.

Processing a Core Dump File


If a system crash should occur on your Cisco MGC, the system might generate core dump file(s), which are stored in the $BASEDIR/var directory. You can use the core dump files as part of the diagnosis process, to determine what caused the system to crash. The system periodically searches the $BASEDIR/var directory for core dump files. When the system identifies a core dump file, it performs the following steps:

Determines which executable dumped the core. Finds the current time of the system. Renames the core dump file, inserting the executable that dumped the core and the date and time that the file was identified, using the following format: core.execname_yyyymmddhhmms For example, if the failover daemon process dumped the core on August 17, 2001 at 12:29:37, the core dump file is named as follows: core.foverd_20010817122937

Raises a crash information collected alarm.

Note

All of the processing of the core dump file(s) is performed by the process manager, after the process manager receives a signal from a failed child process. If the process manager should cause the core to be dumped, the steps listed above are not performed.

Regular Operations
This section contains procedures that you can perform on your Cisco MGC as needed. The regular operations are described in the following sections:

Managing MML Sessions, page 3-41 Managing Signaling Channels, page 3-47 Managing Bearer Channels, page 3-57 Managing SIP Communications, page 3-65 Provisioning your Cisco MGC, page 3-68 Managing your Cisco MGC Platform, page 3-99 Managing System Measurements, page 3-112 Managing Call Detail Records, page 3-125 Using the Cisco MGC Viewer Toolkit, page 3-127

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-40

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Managing MML Sessions


The operations you can use to manage an MML session are described in the following sections:

Displaying Previously Entered MML Commands, page 3-41 Displaying Information About MML Commands, page 3-42 Reentering Previously Entered MML Commands, page 3-46 Retrieving Active MML Sessions, page 3-47 Ending an MML Session, page 3-47

Displaying Previously Entered MML Commands


You can use the h MML command to redisplay an MML command or a series of MML commands, depending on the number or range that you enter. If you do not enter a number or range, the last MML command entered is displayed. To redisplay the last MML command entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
h

The system returns a response similar to the following:


Media Gateway Controller M RTRV "RTRV-TC:ALL" /* command 1 */ - MGC-01 2000-01-12 15:19:51

To redisplay a particular MML command that you entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
h::number

Where number is the number of the MML command you want to display. The last MML command you entered is equal to 1, the command you entered before that would be equal to 2, and so on. For example, to redisplay the tenth most recently entered MML command, you would enter the following command:
h::10

The system returns a response similar to the following:


Media Gateway Controller M RTRV "RTRV-C7LNK:ALL" /* command 10 */ - MGC-01 2000-01-12 15:19:51

To redisplay a range of MML command that you entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
h::start_num,end_num

Where:

start_numThe number of the first MML command you want to display. The last MML command you entered is equal to 1, the command you entered before that would be equal to 2, and so on. end_numThe number of the last MML command you want to display.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-41

Chapter 3 Regular Operations

Cisco MGC Node Operations

For example, to redisplay all of the commands from the second to the fifth most recently entered MML commands, you would enter the following command:
h::2,5

The system returns a response similar to the following:


Media Gateway Controller M RTRV "RTRV-C7LNK:ALL" /* command 5 */ "RTRV-SOFTW:ALL" /* command 4 */ "RTRV-TC:ALL" /* command 3 */ "STP-AUD" /* command 2 */ - MGC-01 2000-01-12 15:19:51

Displaying Information About MML Commands


You can use the help MML command to display information on all MML commands or detailed information on individual commands. To display information on a specific MML command, log in to the active Cisco MGC, start an MML session, and enter the following command:
help:command_name

Where command_name is the name of the MML command for which you want information. For example, if you wanted information on the set-log MML command, you would enter the following command:
help:set-log

The system would return a response similar to the following:


Media Gateway Controller - MGC-01 2000-01-12 15:19:51 M RTRV ack-alm:<comp>:"<alm cat>" Acknowledges an alarm category on a component, or on all components if comp=all ack-alm:<comp>:"<alm sev>" Acknowledges alarms with alarm sev = <alm sev> on a component, or on all components if comp=all ack-alm:<comp>:"all" Acknowledges all alarms on a component, or on all components if comp=all ack-alm:<comp> Acknowledges all alarms blk-cic:<sigpath>:CIC=<number>[,RNG=<slaves>] Blocks a circuit or a circuit range chg-log:<proc>:<log level> This command has been replaced by set-log. Please refer to help on set-log for further information clr-alm:<comp>:"<alm cat>" Clears an alarm category on a component clr-meas:<comp>:"<meas cat>" Resets a measurement category on a component clr-tcap-trans::T=<number> Clears all TCAP transactions older than value of T in seconds diaglog:<file name>:START|STOP Starts/stops diagnostics log h[::<number>[,<number>]] Displays a history of commands for a specified backward number or range; the last command by default help[:<command name>] Displays the list of MML commands or the help information on a specified command kill-call:<sig_srv>:cic=<cic>,confirm Forcefully releases a bearer channel

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-42

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

associated with a single call instance. numan-add:<comp>:custgrpid=<cust group ID>,<param name>=<param value>,... Adds an element to a dial plan table numan-dlt:<comp>:custgrpid=<cust group ID> Deletes an element from a dial plan table numan-ed:<comp>:custgrpid=<cust group ID>,<param name>=<param value>,... Edits an element in a dial plan table numan-rtrv:<comp>:custgrpid=<cust group ID> Retrieves an element from a dial plan table numan-rtrv:<comp>:custgrpid=<cust group ID>,"all" Retrieves all elements from a dial plan table prov-add:<comp>:name=<MML name>,<param name>=<param value>,... Adds the component prov-add:sippath:name=<MML name>,<param name>=<param value>,... Adds SIP signal path prov-add:siplnk:name=<MML name>,<param name>=<param value>,... Adds SIP signal chan prov-add:siprttrnkgrp:name=<MML name>,<param name>=<param value>,... Adds SIP route trunk group prov-cpy Commits provisioning data prov-dlt:<comp>:name=<MML name> Deletes the component prov-dply Deploys provisioning data prov-ed:<comp>:name=<MML name>,<param name>=<param value>,... Modifies the component attributes prov-exp:<tid>:dirname="<export directory name>" Exports provisioning data to the given export directory name tid can be one of the following: all config signal trkgrp trunk numan routing export directory name can be any directory name, in double quotes, which will be created under the cust_specific directory prov-rtrv:<comp>:name=<MML name> Retrieves the component attributes prov-rtrv:all Retrieves select components prov-rtrv:siprttrnkgrp:"all" Retrieves all SIP route trunk group information prov-rtrv:session Retrieves provisioning session information if one exists prov-rtrv:variants Retrieves all variants prov-rtrv:profiletypes Retrieves all profile types prov-sta::srcver=<version>,dstver=<version>,confirm Starts a provisioning session prov-stp Stops the current provisioning session prov-stp:<session name>:confirm Stops the specified provisioning session prov-sync Synchronizes provisioning data prt-call:<sig path>|<trk grp>:[CIC=<number>|SPAN=<number>[BC=<number>]] [,LOG=<logname>] [,EVT] Prints diagnostic information about an active call into the log file query-cic:<sigpath>:CIC=<number>[,RNG=<slaves>][,RSLV] Performs a circuit query for a circuit or a circuit range with an optional RESOLVE parameter quit Ends the session r[::<number>] Repeats a previously entered command with a specified backward number; the last command by default reset-cic:<sigpath>:CIC=<number>[,RNG=<slaves>] Resets a circuit or a circuit range

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-43

Chapter 3 Regular Operations

Cisco MGC Node Operations

rtrv-admin-state:<target>:<param> Retrieves the administrative state of the target; target can be a MGC or gateway or trunk group or signal path;param can be one of the following combinations: [span=number] or [span=number,]bc=number[,RNG=number] or cic=number[,RNG=number] rtrv-alms Displays all active alarms rtrv-alms::CONT Displays all active alarms and listens for alarm events until Ctrl-C rtrv-aud-gw:<sig path MGCP> Retrieves result of an auditing process of a gateway rtrv-aud-gw:all Retrieves results of auditing processes of all gateways rtrv-cic:<sigpath>:CIC=<number>[,RNG=<slaves>] Retrieves bearer channels of a signal path rtrv-ctr:<comp>:"<meas cat>" Retrieves a measurement of a component rtrv-dest:<sigpath> Retrieves state of a destination (signal path) rtrv-dest:all Retrieves state of all destinations (signal paths) rtrv-dns-info:<sig path SIP> Retrieves DNS cache info rtrv-iplnk:<IP link> Displays attributes of an IP link rtrv-iplnk:all Displays attributes of all IP links rtrv-lnk-ctr:<C7 link/set> Retrieves all measurements of a link or link set rtrv-lnk-ctr:all Retrieves all measurements of all links rtrv-log:all Displays logging level of all processes rtrv-log:<proc> Displays logging level of a process rtrv-lset:<C7 link set> Displays state of a link set rtrv-lssn:all Displays state of local SSN rtrv-mml Displays all active MML sessions rtrv-ne Displays attributes of the Network Element rtrv-ne-health Displays health of the Network Element (CPU/Memory utilization etc.) rtrv-ovld Displays congestion level and number of rejected calls due to far-end congestion rtrv-rssn:all Displays state of remote SSN rtrv-rte:<sig path> Retrieves all SS7 routes for a signaling service rtrv-rte:all Retrieves SS7 routes for all signaling services rtrv-dchan:<D channel | fas link> Displays attributes of a signal channel rtrv-dchan:all Displays attributes of all D channels rtrv-c7lnk:<C7 link set|C7 link> Displays attributes of a link(set) rtrv-c7lnk:all Displays attributes of all signal channels and link sets rtrv-sc-trc Displays the names of all files currently open for the various traces in progress rtrv-softw:<proc> Displays status of a process or process group rtrv-softw:all Displays status of all known processes rtrv-sp-ctr:<point code> Retrieves all measurements of a point code rtrv-sp-ctr:all Retrieves all measurements of all point codes rtrv-spc:<point code> Retrieves route set of a point code rtrv-spc:all Retrieves route sets of all point codes rtrv-ss7-slt:<C7 link> Retrieves result of an MTP SLT test on a link (Japanese SS7 only) rtrv-ss7-srt:<point code>:LSET="<C7 link/set>" Retrieves result of an MTP SRT test on a point code (Japanese SS7 only) rtrv-tc:<sig path>&<sig path>... Displays state of bearers per signal path(s) rtrv-tc:all Displays state of all bearers rtrv-tc-held:<sig path>&<sig path>... Displays state of bearers per signal path(s) held by gateway rtrv-tc-held:all Displays state of all bearers, held by gateway rtrv-tcap-trans Displays number of active TCAP transactions rtrv-thres::"<Meas Cat>" Displays the threshold settings for measurement category set-admin-state:<target>:<param>,LOCK|UNLOCK|RESET

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-44

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Sets the administrative state of the target; target can be a MGC or gateway or trunk group or signal path; param can be one of the following combinations: [span=number] or [span=number,]bc=number[,RNG=number] or cic=number[,RNG=number] set-dest-state:<sig path>:IS|OOS... replaced by set-dest set-dest:<sig path>:IS|OOS|FOOS Changes service state of signal path set-iplnk:<IP link>:IS:OOS:FOOS Changes the services state of an IP link This command is disabled for NAS links set-lnk-state:<C7 link/set>:IS|OOS|INH|UNH Changes service state of a link or a linkset set-log:<proc>:<log level> Sets logging level for process <proc> set-log:<proc>:DEBUG,CONFIRM Sets DEBUG logging level for <proc> set-log:all:<log level> Sets logging level for all processes. logLevel can be: DEBUG | TRACE | INFO | WARN | ERR | CRIT set-lssn-state::<SSN>,IS|OOS Changes service state of a local SSN set-c7lnk:<C7 IP or TDM SS7 link>:IS|OOS|FOOS|UNH|INH Changes service state of a SS7 link set-dchan:<FAS link|d-channel>:IS|OOS Changes service state of FAS related link set-spc-state:<point code>:IS|OOS... Changes service state of a point code set-thres::cat="<meas cat>",interval=<seconds>,thres=<value> Changes the threshold value of measurement category <meas cat> for interval to the new value snd:ext:<string> Sends a message to an external process snd:ext:"help" Displays a list of commands available for an external process (provided by external process, not MML) sta-aud Starts auditing process sta-aud-gw:<sig path MGCP> Starts auditing process of a gateway sta-aud-gw:all Starts auditing processes of all gateways sta-abn-trc:<sig path>|all:params Starts dumping diagnostic info for abnormally terminated calls on entire MGC or a specified signal path or a point code , optional params are: CONFIRM - confirms tracing over all or signal path or point code (not needed when using span or trunk - otherwise required) log="filename" output file name in the ../var/trace directory span=x, where x is the span number of interest trk=y, where y is the trunk number tc=c, where c is the traffic channel of interest rng=b, where b is the range of spans prd=n, where n is the period in seconds that this trace needs to be run for (default is half minutes or 30 seconds) sta-dns-info:<sig path SIP>:<param> Starts retrieve process of DNS cache sta-dns-purge:<sig path SIP> Starts purge of DNS cache sta-sc-trc:<sig path>|<trkgrp>:params Starts tracing on a signal path or a point code or a trunk group, optional params are: CONFIRM - confirms tracing over a signal path or point code or trunk group (not needed when using span or trunk - otherwise required)

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-45

Chapter 3 Regular Operations

Cisco MGC Node Operations

log="filename" output file name in the ../var/trace directory span=x, where x is the span number of interest trk=y, where y is the trunk number tc=c, where c is the traffic channel of interest rng=b, where b is the range of spans prd=n, where n is the period in seconds that this trace needs to be run for (default is 30 minutes or 1800 seconds) sta-ss7-slt:<C7 link> Starts an MTP SLT test on a link sta-ss7-srt:<point code>:LSET="<C7 link/set>" Starts an MTP SRT test on a point code sta-tcap-trc Starts TCAP tracing stp-abn-trc:<sig path>|<trkgrp> Stops abnormal tracing on a signal path stp-abn-trc:all Stops abnormal tracing on all signal paths stp-aud Stops auditing process stp-call:<target>:<param> Stops call(s) in progress for the given target; target can be a MGC or gateway or trunk group or signal path; param can be one of the following combinations: [span=number,]confirm or [span=number,]bc=number,[RNG=number,] confirm or cic=number,[RNG=number,]confirm stp-sc-trc:<sig path>|<trkgrp> Stops tracing on a signal path or trunk group stp-sc-trc:all Stops tracing on all signal paths stp-tcap-trc Stops TCAP tracing sw-over::CONFIRM Forces a switchover to a stand-by platform tst-cot:<sigpath>:CIC=<number> Performs a COT test on a circuit unblk-cic:<sigpath>:CIC=<number>[,RNG=<slaves>] Unblocks a circuit or a circuit range vld-cic:<sigpath>:CIC=<number> Performs a circuit validation

Reentering Previously Entered MML Commands


You can use the r MML command reenter an MML command, either a specific MML command or the last MML command you entered. To reenter the last MML command entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
r

The system returns a response appropriate to the previously entered command. For example, if the previously entered command was rtrv-spc:all, a response similar to the following would be returned:
MGC-01 - Media Gateway Controller 2001-06-08 10:20:38 M RTRV "sigsrv1:DPC=244.001.045,DNW=2:OPC=244.001.004:AOOS" "sigsrv2:DPC=244.018.030,DNW=2:OPC=244.001.004:AOOS" "sigsrv3:DPC=244.018.031,DNW=2:OPC=244.001.004:AOOS" "sigsrv4:DPC=244.018.032,DNW=2:OPC=244.001.004:AOOS" "sigsrv5:DPC=244.018.033,DNW=2:OPC=244.001.004:AOOS"

To reenter a particular MML command that you entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
r::number

Where number is the number of the MML command you want to reenter. The last MML command you entered is equal to 1, the command you entered before that would be equal to 2, and so on.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-46

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

For example, to reenter the tenth most recently entered MML command, you would enter the following command:
r::10

The system returns a response appropriate to the previously entered command.

Note

You can also use the up arrow key to re-execute a previously entered MML command.

Retrieving Active MML Sessions


To retrieve information on the active MML sessions, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-mml

The system returns a response similar to the following:


Media Gateway Controller M RTRV mml5:guest - MGC-01 2000-01-12 15:19:51

The response lists the session number (mml5 in the example) and the user ID of the session owner (guest in the example).

Ending an MML Session


You can use the quit MML command to end your current MML session.

Managing Signaling Channels


Signaling channels are bidirectional transport mechanisms for call-control signaling between the Cisco MGC and other devices, such as the Cisco SLTs, that provide necessary delivery reliability for higher-layer protocols. All types of signaling channels have basically the same functionality and are managed similarly. Unless otherwise noted, all commands, counters, and alarms apply to all types of signaling channels. The basic types of signaling channels on the Cisco MGC are

SS7 Message Transfer Part (MTP)Used for reliable delivery. MTP level 2 provides point-to-point delivery. MTP level 3 maintains multiple load-sharing links and multiple routes between SS7 point codes. SS7 MTP over IP (SS7/IP)MTP level 2 is terminated on the Cisco SLT. MTP level 3 is backhauled to the Cisco MGC by means of the Cisco-proprietary Reliable User Datagram Protocol (RUDP). Facility Associated Signaling (FAS)Found in ISDN PRI or DPNSS over a 64-Kbps channel. Reliable delivery is provided by some form of Link Access Protocol (LAP), for example Q.921. FAS over IP (FAS/IP)Same as FAS, but uses IP as its transport mechanism. Reliable delivery is provided by Q.921 LAP-D or RUDP/SM. Media Gateway Control Protocol (MGCP)Reliable delivery is also provided by the MGCP, which uses UDP/IP.

The following sections describe the information returned by the system when you retrieve signaling channel data using MML commands.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-47

Chapter 3 Regular Operations

Cisco MGC Node Operations

Signaling channel name


The first field lists the MML name of the signaling channel.

Parent Name
The second field lists the MML name of the parent of the signaling channel or linkset.

Link ID
The LID field lists the associated link identification number.

Subsystem Number
The SSN field lists the associated subsystem number.

Primary Service State


The PST field shows the current primary service state of the signaling channel on the local Cisco MGC host. Table 3-8 lists the valid primary service state values:
Table 3-8 Signaling Channel Primary Service States

Link State ID AOOS INB

Link State Automatically out-of-service Install busy

Description The system has taken the signaling channel out-of-service (OOS). When a system is first configured, all signaling links default to this state and must be manually set in-service (IS) through the use of the set MML commands. The signaling channel is IS and fully operational. This is its normal operating state. The signaling channel has been manually taken OOS. State of signaling channels when a retrieve command is entered on the standby Cisco MGC. The current service state is maintained only on the active Cisco MGC. The signaling channel is OOS from the remote end. The system is actively trying to restore the signaling channel. The links on the standby Cisco MGC are always OOS (with a secondary service state of STBY) because the current service state is maintained only on the active Cisco MGC. The state of the signaling channel is currently being changed. The state of the signaling channel is not known.

IS MOOS OFF_DUTY

In-service Manually out-of-service Off duty

OOS

Out-of-service

TRNS UNK

Transient Unknown

Secondary Service State


The SST field shows the current secondary service state of the specified signaling channel on the local Cisco MGC host. The valid states are listed below:

ACKDSS7 Acknowledgement delay BSNRSS7 backward sequence number received (BSNR)

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-48

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

CISCommanded in service CONFConfiguration failure COOSCommanded out of service ENGRCall engine reset ISPENDIn service, pending LCNGCongestion, local LINELine failure LINHSS7 local inhibit LINKLink failure LINSLinkset failure NACause not available OOSPENDOut of service, pending PRHBSS7 prohibited RBLKSS7 remote blocked RCNGCongestion, remote RINHSS7 remote inhibit RSTRSS7 restricted SERRSS7 signal error STBYHost is in the standby state SUPPENTSupporting entity TPATHTraffic path UNKCause unknown

The operations you can use to manage an signaling channels are described in the following sections:

Note

To ensure that you are retrieving the correct service states of the signaling channels, always perform the retrieval procedures below on the active Cisco MGC. The current service states of the signaling channels are maintained only on the active Cisco MGC. If you retrieve the service state of a signaling channel on the standby Cisco MGC, the system always returns a message that indicates that the links are out-of-service due to the host being in the standby state (i.e., "c7link1:ls01,LID=0:OOS,STBY" /* Link 1 in Linkset 1 */). Such a message does not indicate that the signaling channel itself is out-of-service. If a switchover occurs, the service state for each signaling channel remains the same as the standby Cisco MGC assumes the active role.

Retrieving Signaling Service States, page 3-50 Retrieving Service State of C7/SS7 Links or Linksets, page 3-50 Retrieving the Service State for IP Links, page 3-51 Retrieving the Service State for IP Routes, page 3-51 Retrieving the Service State of D-Channels, page 3-53 Retrieving the State of SS7 Signaling Services, page 3-54 Retrieving the State of SS7 Routes, page 3-54

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-49

Chapter 3 Regular Operations

Cisco MGC Node Operations

Retrieving the State of All Local Subsystem Numbers, page 3-55 Retrieving the Service State for Associations, page 3-55 Clearing TCAP Transactions, page 3-56 Enabling Group Service Reset Messages, page 3-57

Retrieving Signaling Service States


Retrieving state information about your signaling services is a task that performed daily. For more information about this and other daily task refer to the Daily Tasks section on page 3-1. To retrieve information about a specific signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-dest: sig_srv

Where sig_srv is the MML name of a signaling service. The system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 14:53:03 M RTRV "sigsrv1:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=RCNG"

For more information on the response to this command, refer to the Understanding the Signaling Service State Information section on page 3-9. If the destination is in a primary service state other than IS, attempt to bring it into service, as described in the Setting the Service State of a Signaling Service section on page 8-95.

Note

If the rtrv-dest MML command is entered after a switchover has occurred, the state of some of the signaling services might be listed as undefined (UND). UND is the default state for a signaling service when the system starts. In this instance, UND states indicate that the Cisco MGC has not received a service state message for the associated signaling service since the switchover occurred. No user action is required.

Retrieving Service State of C7/SS7 Links or Linksets


To retrieve the service state for an individual SS7 link, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-c7lnk:C7_linkname | c7_linksetname

For example, to retrieve the service state for an SS7 link called c7link1, enter the command:
rtrv-c7lnk:c7link1

The system returns a message similar to the following:


M Media Gateway Controller 2000-03-26 20:26:18 RTRV "c7link1:ls01,LID=0:IS" /* Link 1 in Linkset 1 */

To retrieve service state for all of the SS7 links, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-c7lnk:all

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-50

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

The system returns a message similar to the following:


M Media Gateway Controller RTRV "c7link1:ls01,LID=0:IS" "c7link2:ls01,LID=1:IS" "c7link3:ls02,LID=0:IS" "c7link4:ls02,LID=1:IS" 2000-03-26 19:23:23 /* /* /* /* Link Link Link Link 1 2 1 2 in in in in Linkset Linkset Linkset Linkset 1 1 2 2 */ */ */ */

The valid service states for a C7/SS7 link are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the link is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96.

Retrieving the Service State for IP Links


To retrieve the service state for an individual IP link, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-iplnk:iplink_name

For example, to retrieve the service state of an IP link called iplink1, enter the following command:
rtrv-iplnk:iplink1

The system returns a message similar to the following:


M Media Gateway Controller 2000-03-26 20:26:18 RTRV "iplink1:IS"

To retrieve attributes for all of the IP links, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-iplnk:all

The system returns a message similar to the following, which shows the IP links to and from the Cisco MGCs and the associated media gateways (different solutions might use different media gateways).
M Media Gateway Controller 2000-03-26 19:23:23 RTRV "iplink1:OOS "iplink2:OOS "iplink3:OOS "iplink4:OOS "iplink5:OOS "iplink6:OOS

The valid service states for an IP link are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the link is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of an IP Link section on page 8-97.

Retrieving the Service State for IP Routes


To retrieve the service state for an individual IP route, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>rtrv-iproute:iproute_name

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-51

Chapter 3 Regular Operations

Cisco MGC Node Operations

For example, to retrieve the service state of an IP route called iprte1, enter the following command:
mml>rtrv-iproute:iprte1

The system returns a message similar to the following:


M Media Gateway Controller 2000-03-26 20:26:18 RTRV "iprte1:IS"

To retrieve attributes for all of the IP routes, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>rtrv-iproute:all

The system returns a message similar to the following:


M Media Gateway Controller 2000-03-26 19:23:23 RTRV "iprte1:IS "iprte2:IS

The valid service states for an IP route are described in the following sections. If the route is in any other state than IS, attempt to bring it into service, as described in the Setting the Service State of an IP Route section on page 8-97.

IP Route Primary Service States


The PST field shows the current primary service state of the IP route. Table 9 lists the valid primary service state values:
Table 9 IP Route Primary Service States

Link State ID IS OOS

Link State In-service Out-of-service

Description Route is IS and fully operational. This is its normal operating state. Route is OOS. The system is actively trying to restore the link.

IP Route Secondary Service States


The SST field shows the current secondary service state of the specified IP route. Table 10 lists the valid secondary service state values:
Table 10 IP Route Secondary Service States

Link State ID CONF COOS OFF_DUTY STBY

Link State Configuration Commanded out-of-service Off duty Standby

Description Route is OOS due to a configuration failure. Route has been commanded OOS by the operator. Route is available for use, but not currently being used. Routes on the standby Cisco MGC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-52

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Retrieving the Service State of D-Channels


To retrieve the service state for an individual D-channel, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-dchan:dchan_name

For example, to retrieve the service state for D-channel called dchan-1, enter the following command:
rtrv-dchan:dchan-1

When the D-channel is associated with an FAS signaling path, the system returns a message similar to the following:
M Media Gateway Controller 2000-03-26 20:26:18 RTRV "dchan-1:fas1,LID=0:IS" ;

In this response, fas1 is the signaling path, or a logical grouping of D-channels (equivalent to a linkset). The LID is the line identifier, or the logical line ID of the D-channel within the signaling path (equivalent to the SLC in SS7). IS is the primary service state of the D-channel. When the D-channel is associated with an NFAS signaling path, the system returns a message similar to the following:
M Media Gateway Controller 2000-03-26 20:26:18 RTRV "dchan-1:nfas1,LID=0:PRI,backup=dchan-2:STBY" ;

In this response, nfas1 is the signaling path, or a logical grouping of D-channels (equivalent to a linkset). The LID is the line identifier, or the logical line ID of the D-channel within the signaling path (equivalent to the SLC in SS7). The next field indicates whether the specified D-channel is the primary (PRI) channel or the standby (STBY). Finally, the backup field specifies the MML name of the D-channel that is configured as the backup to the specified D-channel. This field is displayed only when a backup D-channel has been provisioned. For information on provisioning backup D-channels, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. To retrieve the service state for all of the D-channels, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-dchan:all

The system returns a message similar to the following, which shows the signaling links to and from the Cisco MGCs and the associated media gateways (different solutions might use different media gateways).
M Media Gateway Controller 2000-03-26 19:23:23 RTRV "dchan1:nfas1,LID=0:IS" "dchan2:nfas1,LID=1:IS" "dchan3:fas1,LID=0:IS"

The valid service states for a D-channel are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the link is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of a D-channel section on page 8-98.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-53

Chapter 3 Regular Operations

Cisco MGC Node Operations

Retrieving the State of SS7 Signaling Services


To retrieve the current state for an SS7 signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-spc:SS7_sig_srv

Where SS7_sig_srv is the MML name for the associated SS7 signaling service. The system returns a response similar to the following:
M MGC-01 - Media Gateway Controller 2001-06-12 16:10:21 RTRV "ss7sigsrv1:DPC=244.001.041,DNW=2:OPC=244.001.005:AOOS"

To retrieve the current state for all of your SS7 signaling services, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-spc:all

The system returns a response similar to the following:


MGC-01 - Media Gateway Controller 2001-06-12 16:04:59 M RTRV "ss7sigsrv1:DPC=244.001.045,DNW=2:OPC=244.001.004:IS" "ss7sigsrv2:DPC=244.018.030,DNW=2:OPC=244.001.004:IS" "ss7sigsrv3:DPC=244.018.031,DNW=2:OPC=244.001.004:IS" "ss7sigsrv4:DPC=244.018.032,DNW=2:OPC=244.001.004:IS" "ss7sigsrv5:DPC=244.018.033,DNW=2:OPC=244.001.004:IS"

The valid service states for a signaling service are found in the Understanding the Signaling Service State Information section on page 3-9. If the signaling service is in any other state than IS, attempt to bring it into service, as described in the Setting the Service State of an SS7 Signaling Service section on page 8-96.

Retrieving the State of SS7 Routes


To retrieve the current state for an SS7 route, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-rte:dpc

Where dpc is the MML name for the associated destination point code (DPC). The system returns a response similar to the following:
M MGC-01 - Media Gateway Controller 2001-06-12 16:17:55 RTRV "dpc1:linkset1,APC=244.001.040,PRIO=1,PST=AOOS,SST=NA"

To retrieve the current state for all of SS7 routes, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-rte:all

The system returns a response similar to the following:


M MGC-01 - Media Gateway Controller 2001-06-12 16:15:51 RTRV "dpc1:linkset1,APC=244.001.040,PRIO=1,PST=AOOS,SST=NA" "dpc2:linkset2,APC=244.001.041,PRIO=1,PST=AOOS,SST=NA" "dpc4:linkset4,APC=244.001.044,PRIO=1,PST=AOOS,SST=NA" "dpc5:linkset5,APC=244.001.045,PRIO=1,PST=AOOS,SST=NA"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-54

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

dpc8:linkset8,APC=244.018.030,PRIO=1,PST=AOOS,SST=NA" "dpc9:linkset9,APC=244.018.031,PRIO=1,PST=AOOS,SST=NA" "dpc10:linkset10,APC=244.018.032,PRIO=1,PST=AOOS,SST=NA" "dpc11:linkset11,APC=244.018.033,PRIO=1,PST=AOOS,SST=NA"

The valid service states for a linkset are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the linkset is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of a Signaling Service section on page 8-95.

Retrieving the State of All Local Subsystem Numbers


To retrieve the state of all local subsystem number (SSNs), log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-lssn:all

The system returns a response similar to the following:


Media Gateway Controller - MGC-01 2000-01-12 15:19:51 M RTRV "TCAP-01:SSN=1,PST=IS" "TCAP-01:SSN=2,PST=OOS"

The response indicates the name of the associated process, the SSN, and the state (either in-service or out-of-service). If any of the local SSNs are out of service, proceed to the Setting the Service State of a Local Subsystem Number section on page 8-98.

Retrieving the Service State for Associations


To retrieve the service state for an individual association, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>rtrv-association:assoc_name

For example, to retrieve the service state of an association called assoc1, enter the following command:
mml>rtrv-association:assoc1

The system returns a message similar to the following:


M Media Gateway Controller 2000-03-26 20:26:18 RTRV "assoc1:IS"

To retrieve attributes for all of the associations, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>rtrv-association:all

The system returns a message similar to the following:


M Media Gateway Controller 2000-03-26 19:23:23 RTRV "assoc1:OOS "assoc2:OOS "assoc3:OOS "assoc4:OOS

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-55

Chapter 3 Regular Operations

Cisco MGC Node Operations

The valid service states for an association are described in the following sections. If the association is in any other state than IS, attempt to bring it into service, as described in the Resolving an Association Alarm section on page 8-113.

Association Primary Service States


The PST field shows the current primary service state of the association. Table 11 lists the valid primary service state values:
Table 11 Association Primary Service States

Link State ID INB

Link State Install busy

Description When a system is first configured, all associations default to this state and must be manually set in-service (IS) through the use of the set-iplnk MML command. Association is IS and fully operational. This is its normal operating state. Association is OOS. The system is actively trying to restore the association.

IS OOS

In-service Out-of-service

Association Secondary Service States


The SST field shows the current secondary service state of the specified association. Table 12 lists the valid secondary service state values:
Table 12 Association Secondary Service States

Link State ID CONF COOS STBY

Link State Configuration Commanded out-of-service Standby

Description Association is OOS due to a configuration failure. Association has been commanded OOS by the operator. Association on the standby Cisco MGC.

Retrieving TCAP Transactions


To retrieve the number of active transaction capabilities application part (TCAP) transactions, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-tcap-trans

The system returns a response similar to the following:


M Media Gateway Controller RTRV "TCAP-01:TRANS=0" - MGC-01 2000-01-12 15:19:51

Clearing TCAP Transactions


To clear all TCAP transactions that are older than a period you specify, log in to the active Cisco MGC, start an MML session, and enter the following command:
clr-tcap-trans::t=number

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-56

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Where number is the time period, in seconds, after which you want to clear TCAP transactions. For example, to clear all TCAP transactions that are older than 60 seconds, you would enter the following command:
clr-tcap-trans::t=60

Enabling Group Service Reset Messages


You may want to modify the properties of an SS7 signaling service to enable your system to send SS7 group service reset (GSR) messages for all CICs during point code initialization, so that the Cisco MGC to synchronize its bearer channel blocking state with that of the end office. The process of modifying the properties of a signaling service is referred to as dynamic reconfiguration. For more information about dynamic reconfiguration, refer to the Understanding Dynamic Reconfiguration section on page 3-71.

Caution

We do not recommend enabling the sending of GSR messages on your Cisco MGC.

Note

You can use the CMM or the VSPT to enable the sending of GSR messages on your system. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information about using the CMM or VSPT to modify the properties of an SS7 signaling service. To enable the sending of GSR messages, perform the following steps:

Step 1 Step 2

Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to set the property that enables the sending of GRS messages for CICs during point code initialization:
prov-ed:ss7path:name="comp_name",GRSEnabled=true

Where: comp_nameMML name for the SS7 signaling service on which you are enabling the sending of GRS messages. For example, to enable the sending of GRS messages on an SS7 signaling service named ss7svc1, you would enter the following command:
prov-ed:ss7path:name=ss7svc1,GRSEnabled=true

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Managing Bearer Channels


The operations you can use to manage an MML session are described in the following sections:

Verifying Proper Replication of Calls, page 3-58 Retrieving the States of Bearers Held By a Media Gateway, page 3-59 Blocking CICs, page 3-60 Retrieving the Administrative State, page 3-61

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-57

Chapter 3 Regular Operations

Cisco MGC Node Operations

Verifying Proper Replication of Calls


Ensure that the standby Cisco MGC becomes fully operational and that the replication of calls in progress has been completed by performing the steps in the following procedure:

Caution

The following command retrieves the current status of all provisioned traffic channels. If you have a large number of traffic channels, you might want to limit the command to a subset of the provisioned channels, perhaps on a signaling-service-by-signaling-service basis. For example, to see just the provisioned channels for a signaling service named ss7svc2, you would enter the following command: rtrv-tc:name=ss7svc2.

Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-tc:all

The system returns a different set of responses, depending on which release of the MGC software you are running and the type of configuration you are using on the associated media gateway. When the Cisco MGC software is configured for signaling, the system returns a response similar to the following:
Media Gateway Controller - MGC-67 2000-04-05 08:08:12 M RTRV "c7s-1:CIC=1,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=2,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=3,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=4,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=5,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=6,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=7,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=8,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=9,PST=IS,CALL=IN,BLK=NONE"

When the Cisco MGC software is configured for call control, the system returns a response similar to the following:
M Media Gateway Controller - MGC-04 2000-04-05 08:05:54 RTRV "c7s-1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=2,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=3,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=4,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=5,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=6,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=7,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=8,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=9,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"

Note

An explanation of the fields in the response can be found in the Understanding CIC States section on page 3-14.

Step 2 Step 3

Repeat Step 1 on the standby Cisco MGC. Verify that the CICs in both systems are in sync and show the same status. Calls in progress should say CALL=IN for both systems.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-58

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

If necessary, you can force the active Cisco MGC to do a maintenance switchover (see the Performing a Manual Switchover section on page 3-99) and repeat the above procedure for that system.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Retrieving the States of Bearers Held By a Media Gateway


You can retrieve the states of bearer channels being held by a media gateway. To retrieve the state of a group bearer channels associated with one or more signaling destination(s) that are being held by a media gateway, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-tc-held:sig_dest| &sign_dest...

Where sig_dest is a logical signaling destination, such as an SS7 point code, FAS path, IP FAS path, or DPNSS path. You can display a complete list of configured components by performing the procedure in the Retrieving component data section on page 3-106. When none of the group of bearer channels associated with the specified signaling destination(s) are being held by a media gateway, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1" /* No bearer channels in held state */

When bearer channels associated with the specified signaling destination(s) are being held by a media gateway, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=2,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=3,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=4,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=5,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=6,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=7,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=8,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=9,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"

To retrieve the state of all bearer channels held by a media gateway, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-tc-held:all

When none of the bearer channels are being held by a media gateway, the system returns a response similar to the following:
Retrieving results. This could take a few moments... MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1" /* No bearer channels in held state */ "ss7svr2" /* No bearer channels in held state */

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-59

Chapter 3 Regular Operations

Cisco MGC Node Operations

When bearer channels are being held by a media gateway, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=2,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=3,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=4,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=5,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=6,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=7,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=8,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=9,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=10,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=11,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=12,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=13,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=14,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=15,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=16,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=17,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=18,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"

Blocking CICs
You may need to block a CIC or a range of CICs on your Cisco MGC. Blocking a single CIC causes a BLA message to be sent to the destination SSP. Blocking a range of CICs causes a CGB message to be sent to the destination SSP. The range option only can be used to block CICs within a given trunk (T1 or E1). To block a single CIC, log in to your active Cisco MGC, start an MML session and enter the following command:
blk-cic:sig_srv:CIC=number

Where:

sig_srvMML name of a signaling service associated with the CIC you want to block. numberThe number of the CIC you want to block.

For example, to block CIC number 1, which is associated with a signaling service called ss7svc1, you would enter the following command:
blk-cic:ss7svc1:cic=1

To block a range of CICs, log in to your active Cisco MGC, start an MML session, and enter the following command:
blk-cic:sig_srv:CIC=number,RNG= range

Where:

sig_srvMML name of a signaling service associated with the CICs you want to block. numberThe number of the first CIC in the range of CICs you want to block. rangeSpecifies the end of the range of CICs to be blocked.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-60

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Note

The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, use of the range option causes individual supervision messages to be issued for each CIC in the range, instead a single group supervision message. For example, to block CIC number 1 through 20, which are associated with a signaling service called ss7svc1, you would enter the following command:
blk-cic:ss7svc:cic=1,rng=20

To verify that the CIC(s) have been successfully blocked, retrieve the status of the affected CICs as described in the Verifying CIC States section on page 3-13. When you want to return the CIC(s) to service, you must unblock the CIC(s) as described in the Unblocking CICs section on page 8-131.

Retrieving the Administrative State


The administrative state refers to the state of CICs (on the Cisco MGC) and spans and bearer channels (on the associated media gateway). There are three possible states: locked, unlocked, and shutdown. You can use the rtrv-admin-state MML command to determine the administrative state of several objects in the Cisco SS7 solution environment, including the Cisco MGC, an associated MGCP media gateway, a trunk group, a signaling service, spans and bearer channels associated with a signaling service (for non-ISUP trunks), and CICs associated with a signaling service (for ISPU trunks). When you retrieve the administrative state of a object that consists of groups of CICs or spans and bearer channels, you receive an inferred target state, based on the following criteria:

If all circuits are in a locked state, the inferred target administrative state is locked. If at least one circuit is in an unlocked state, the inferred target administrative state is unlocked. If the circuits are in a mixture of the locked and shutdown states, the inferred target administrative state is shut down.

If you want to change the administrative state of a component, refer to the Setting the Administrative State section on page 8-116. The following procedures describe how you can use the rtrv-admin-state MML command:

Retrieving the Administrative State of a Cisco MGC, page 3-61 Retrieving the Administrative State of a Media Gateway, page 3-62 Retrieving the Administrative State of a Trunk Group, page 3-62 Retrieving the Administrative State of a Signaling Service, page 3-62 Retrieving the Administrative State of Spans, page 3-63 Retrieving the Administrative State of CICs, page 3-64

Retrieving the Administrative State of a Cisco MGC


To retrieve the administrative state of a Cisco MGC, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:mgc

Where mgc is the MML name of the Cisco MGC host.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-61

Chapter 3 Regular Operations

Cisco MGC Node Operations

The system returns a response similar to the following:


Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "mgca:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"

If you want to change the administrative state of the Cisco MGC, refer to the Setting the Administrative State of a Cisco MGC section on page 8-116.

Retrieving the Administrative State of a Media Gateway


To retrieve the administrative state of an associated media gateway, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:gateway

Where gateway is the MML name of the associated media gateway.

Note

Not all media gateway types are applicable. Supported types are CU, MUX, and MGW external nodes. The system returns a response similar to the following:
Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "mgw1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"

If you want to change the administrative state of the media gateway, refer to the Setting the Administrative State of a Media Gateway section on page 8-117.

Retrieving the Administrative State of a Trunk Group


To retrieve the administrative state of a trunk group, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:trkgrp

Where trkgrp is the MML name of the trunk group.

Note

This command can only be used for time-division multiplexing (TDM) trunk groups. Allow the corresponding MML name for component type "0020". The system returns a response similar to the following:
Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "trunkgrp1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"

If you want to change the administrative state of the trunk group, refer to the Setting the Administrative State of a Trunk Group section on page 8-117.

Retrieving the Administrative State of a Signaling Service


To retrieve the administrative state of a signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:sig_srv

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-62

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Where sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:

For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC). Signaling service or routeset associated with a DPC. EISUP signaling service.

The system returns a response similar to the following:


Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "ss7svc1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"

If you want to change the administrative state of the signaling service, refer to the Setting the Administrative State of a Signaling Service section on page 8-118.

Retrieving the Administrative State of Spans


To retrieve the administrative state of a single span, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:sig_srv,span= x

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

xA16-bit value that identifies an ISDN/PRI physical cable.

For example, to determine the administrative state of span number 2 associated with a signaling service called ss7svc1, you would enter the following command:
rtrv-admin-state:ss7svc1,span=2

The system returns a response similar to the following:


Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "ss7svc1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"

To retrieve the administrative state of a bearer channel or a range of bearer channels in a span, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:sig_srv,span= x,bc=y[,rng=range]

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-63

Chapter 3 Regular Operations

Cisco MGC Node Operations

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

xA16-bit value that identifies an ISDN/PRI physical cable. yA numeric value that identifies the non-ISUP bearer channel number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved.

For example, to determine the administrative state of bearer channels numbers 2 through 6, associated with a signaling service called ss7svc1, you would enter the following command:
rtrv-admin-state:ss7svc1,span=2,bc=2,rng=5

The system returns a response similar to the following:


Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "ss7svc1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"

If you want to change the administrative state of the spans, refer to the Setting the Administrative State of Spans section on page 8-119.

Retrieving the Administrative State of CICs


To retrieve the administrative state of a CIC or a range of CICs, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:sig_srv,cic= number[,rng=range]

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

numberA valid CIC number. rangeA value such that y+range is a valid CIC number. The administrative state for all CICs between y and y+range are retrieved.

For example, to determine the administrative state of CICs 2 through 11 associated with a signaling service called ss7svc1, you would enter the following command:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-64

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

rtrv-admin-state:ss7svc1,cic=2,rng=9

The system returns a response similar to the following:


Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "ss7svc1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"

If you want to change the administrative state of the CICs, refer to the Setting the Administrative State of CICs section on page 8-120.

Managing SIP Communications


The Cisco MGC software supports SIP call control. Many of the procedures defined for signaling channels and bearer channels can be used to manage SIP communications. The following procedures are strictly for use in managing SIP commnications:

Managing the DNS Cache, page 3-65 Retrieving SIP Call Information, page 3-66

Managing the DNS Cache


When you have provisioned the Cisco MGC to function as a Session Initiation Protocol (SIP) end point, you may need to manage the content of the DNS cache.

Displaying the Contents of the DNS Cache


To display the contents of the DNS cache, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-dns-info:sippath_name :URL | cache_entry_num | null_string

Where:

sippath_nameMML name of the SIP signaling service associated with the DNS cache. URLThe associated WWW address. If you enter the associated URL in this command, the command in Step 2 displays the IP address and the time to live (TTL) values. cache_entry_numThe DNS cache entry number. If you enter the associated cache entry number in this command, the command in Step 2 displays the URL, IP address and TTL values. null_stringAn empty string (entered as in the command line). If you enter a null string in this command, the command in Step 2 displays the DNS IP addresses, size of the cache, percentage of the cache being used, and the local TTL value.

For example, to start a DNS information request for the cache associated with the signaling service, sipsigpath, enter one of the following commands:
sta-dns-info:sipsigpath:sipphone1.cisco.com sta-dns-info:sipsigpath:10 sta-dns-info:sipsigpath:

Step 2

Request the contents of the specified DNS cache associated with a SIP signaling service. To do this, enter the following command:
rtrv-dns-info:sippath_name

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-65

Chapter 3 Regular Operations

Cisco MGC Node Operations

Where: sippath_nameMML name of the SIP signaling service you entered in Step 1. If you entered the associated URL along with name of the SIP signaling service in Step 1, the system returns a message similar to the following.
M Media Gateway Controller 2000-03-26 19:23:23 RTRV IP address = 193.12.174.56 TTL = 240

If you entered the associated cache entry number along with the name of the SIP signaling service, the system returns a message similar to the following.
M Media Gateway Controller 2000-03-26 19:23:23 RTRV URL = sipphone3.cisco.com IP address = 193.12.174.56 TTL = 240

If you entered a null string along with the name of the SIP signaling service, the system returns a message similar to the following.
M Media Gateway Controller 2000-03-26 19:23:23 RTRV DNS 1 DNS 2 Cache Cache Local address 193.12.77.2 address 193.21.9.76 size = 280 usage = 81 TTL = 240 ;

Purging the Contents of the DNS Cache


If you want to purge the DNS cache, log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-dns-purge:sippath_name

Where: sippath_nameMML name of the SIP signaling service associated with the DNS cache. For example, to purge the DNS cache associated with the signaling service, sipsigpath, enter the following command:
sta-dns-purge:sipsigpath

Retrieving SIP Call Information


Starting in Release 9.3(2), you can use the rtrv-sip MML command to retrieve call information data, such as SIP call identification number, and the originating and terminating numbers, for any call that uses SIP for at least one end of the call. The following sections describe how the command can be used to retrieve SIP call information.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-66

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

To retrieve information about calls that use SIP for at least one end of the call, log in to the active Cisco MGC, and enter the following command:
rtrv-sip:type [timerperiod=min | detail]

Where: typeThe signaling service type can be one of the following:


allDisplays all calls that use SIP for at least one end of a call. tdmDisplays calls that use SS7, ISDN, or other protocols of this type on the other end of a

call (one end of the call is always SIP).


ipDisplays calls that use EISUP or H.323 on the other end of a call (one end of the call is

always SIP).
sipDisplays calls that use SIP on both ends of a call (a SIP-to-SIP call)

minOptional parameter to limit the content of the response to calls that have durations over the specified amount, in minutes. For example if you entered the parameter as timerperiod=120, the response to this command would be limited to calls of the specified type that are over 120 minutes in duration.

Note

If you find that you have SIP-to-SIP calls that have excessive durations, you can cancel those calls using the procedure described in the Stopping SIP-to-SIP Calls, page 8-148.

detailOptional parameter to provide the calling (from) and the called (to) number for the specified type of calls.

The standard version of this command returns a response that indicates the SIP call identification name and the protocol type used on the other end of the call. The protocol type can be one of the following:

TDMUsed when the other end of the call is SS7, ISDN, or other protocols of this type IPUsed when the other end of the call is EISUP or H.323 SIPUsed when the other end of the call is SIP (a SIP-to-SIP call)

When the standard version of this command is entered, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2002-05-13 10:02:08.833 PST M RTRV sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=SIP "sip-sigpath:[email protected]," "sip-sigpath:CALL=IN,MATE_FAMILY=SIP "sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=SIP "sip-sigpath:[email protected]," "sip-sigpath:CALL=IN,MATE_FAMILY=IP "sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=IP

When this command is entered with the optional command to provide detailed call data, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2002-05-13 10:02:08.833 PST M RTRV "sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=SIP,FROM=2025553230,TO=4080000284" "sip-sigpath:[email protected]," "sip-sigpath:CALL=IN,MATE_FAMILY=SIP,FROM=2025553230,TO=4080000284"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-67

Chapter 3 Regular Operations

Cisco MGC Node Operations

"sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=SIP,FROM=2025555589,TO=4080000439""sip-sigpath:CID=1f [email protected]," "sip-sigpath:CALL=IN,MATE_FAMILY=IP,FROM=2025555589,TO=4080000439" "sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=IP,FROM=2025559602,TO=4080000205"

Provisioning your Cisco MGC


The operations you can use to provision your Cisco MGC are described in the following sections:

Starting a Provisioning Session, page 3-68 Saving and Activating your Provisioning Changes, page 3-69 Ending a Provisioning Session Without Activating your Changes, page 3-70 Invoking Dynamic Reconfiguration, page 3-70 Retrieving Provisioning Data, page 3-72 Provisioning a Dial Plan, page 3-78 Importing Provisioning Data, page 3-79 Exporting Provisioning Data, page 3-79 Managing Automatic Congestion Control, page 3-80

For more detailed information about provisioning your Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.

Starting a Provisioning Session


You may need to start a provisioning session as part of your system operations. To do this, log into the active Cisco MGC, start an MML session, and enter the following command:
prov-sta::srcver=curr_ver,dstver= mod_ver

Where:

curr_verThe name of the current configuration version. In place of the name of the current configuration version, you can also enter:
newA new default session configuration; no existing source configuration is available. activeSelects the active configuration as the source for configuration changes.

Note

You can use new as the source configuration only when there is no existing, active set of provisioning data in the configuration library. Therefore, new cannot be used as the source configuration once a provisioning session has been saved and activated by using prov-cpy or prov-dply. Once you have saved and activated a set of data, you must use either active or the name of the set of provisioning data as the source configuration.

Note

If you do not know the name of your current configuration session, you can use the CONFIG-LIB viewer in the MGC toolbar to determine that name. For more information on the CONFIG-LIB viewer, proceed to the Using the Config-Lib Viewer section on page 3-135.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-68

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

mod_verA new configuration version name that contains your provisioning changes.

For example, to use a configuration version called ver1 as the basis for a version to be called ver2, you would enter the following command:
prov-sta::srcver=ver1,dstver=ver2

Once a provisioning session is underway, you may use the prov-add, prov-ed, or prov-dlt MML commands to add, modify, and delete components on your system. If you want to add components to your system, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. If you want to modify or delete components on your system, refer to the Invoking Dynamic Reconfiguration section on page 3-70. There are two ways to close your provisioning session: save and activate your provisioning changes or end your provisioning session without saving and activating your changes. For more information on saving and activating your provisioning changes, refer to the Saving and Activating your Provisioning Changes section on page 3-69. For more information on ending your provisioning session without saving and activating your changes, refer to the Ending a Provisioning Session Without Activating your Changes section on page 3-70.

Saving and Activating your Provisioning Changes


When you have completed making provisioning changes in your session, you must enter a command to save and activate your changes. There are two different provisioning MML commands that do this: prov-cpy and prov-dply.

Caution

Using the prov-cpy and prov-dply MML commands can severely impact your systems call processing performance, depending on the extent of your provisioning changes. We recommend that these commands be issued during a maintenance window when traffic is minimal. The prov-cpy MML command is used to save and activate your changes on the active Cisco MGC. This command is typically used to save and activate changes on a Cisco MGC in a simplex configuration. However, you can use the prov-cpy MML command on Cisco MGCs in high-availability or continuous-service configurations, to save and activate your changes on the active Cisco MGC. If you choose to do this, you should enter the prov-sync MML command immediately afterwards, to have your changes saved and activated on the standby Cisco MGC.

Note

When you add new signaling links and/or CICs to your provisioning data using the prov-cpy command, and then save your new objects to the standby MGC host using the prov-sync command, the link and call state data are not synchronized. To ensure that the link and call state data are synchronized, reboot the MGC software on the standby MGC host once prov-sync has completed its synchronization.

Caution

Using the prov-sync MML command can severely impact your systems call processing performance. We recommend that this command be issued during a maintenance window when traffic is minimal.

Note

When the prov-sync MML command is used to synchronize the provisioning settings on the standby Cisco MGC host with current settings on the active Cisco MGC host, the system does not indicate when the synchronization process has failed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-69

Chapter 3 Regular Operations

Cisco MGC Node Operations

Note

When you enter the prov-cpy command, your provisioning session is also automatically ended. If you want to make additional provisioning changes, you must start a new provisioning session as described in the Starting a Provisioning Session section on page 3-68. The prov-dply MML command is used to save and activate your changes on the active and standby Cisco MGCs. This command is typically used to save and activate changes on Cisco MGCs in high-availability or continuous-service configurations. This command should not be used on a Cisco MGC in a simplex configuration.

Note

When you enter the prov-dply command, your provisioning session is also automatically ended, unless an error occurs during execution. If you want to make additional provisioning changes, you must start a new provisioning session as described in the Starting a Provisioning Session section on page 3-68.

Ending a Provisioning Session Without Activating your Changes


You may find that you want to end a provisioning session without saving and activating the changes you have entered during your session. If this is the case, you can enter the prov-stp MML command. This command ends your current provisioning session and your changes are not entered.

Invoking Dynamic Reconfiguration


You can dynamically reconfigure, that is modify or delete, select components that you have provisioned on your Cisco MGC. The following procedure lists the sequence of actions you must perform (actual steps to take depend on the provisioning tool you use):

Note

For more information on which components can be dynamically reconfigured, refer to the Understanding Dynamic Reconfiguration section on page 3-71.

Step 1 Step 2

Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Enter the prov-ed or prov-dlt MML commands to change or delete a component. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the specific structure of the command for the component type you want to dynamically reconfigure.

Note

To change or delete a component, you might have to meet certain preconditions, such as changing the service state of the component to OOS using MML commands (as mentioned in Table 3-13).

Step 3

Repeat Step 2 for each component that you want to modify or delete. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for provisioning guidelines. Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Step 4

After completing a dynamic reconfiguration operation on the Cisco MGC, you must issue a service message from the associated media gateway to invoke the changes throughout your SS7 solution.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-70

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Note

Refer to the documentation associated with your media gateway for more information on issuing service messages.

Understanding Dynamic Reconfiguration


Dynamic reconfiguration is a function in the Cisco MGC software that allows you to modify or delete Cisco MGC components while the Cisco MGC software is still in service. Dynamic reconfiguration can be performed without shutting down or restarting either the Cisco MGC software or the Sun host platform. The Cisco MGC component types that can be dynamically reconfigured are listed below. No other component types can be dynamically reconfigured.

CICs Point codes (DPC, originating point code [OPC], or APC) Physical interfaces (TDM, ATM, or Ethernet) Signaling links (TDM, ATM, or SS7) Signaling services SS7 subsystems SS7 routes Trunk groups Component properties (linksets, signaling services, and trunk groups)

Table 3-1 lists the preconditions that must be met for the component before any modification or deletion action can be performed as part of dynamic reconfiguration. There are no preconditions for adding components as part of dynamic reconfiguration.
Table 3-13 Dynamic Reconfiguration Preconditions

Component CICs

Preconditions Call state of the CIC must be IDLE (refer to the Verifying CIC States section on page 3-13) and the service state of the associated DPC must be set to OOS (refer to the Setting the Service State of a Signaling Service section on page 8-95). or Block type for the CIC must be set to locally blocked (refer to the Blocking CICs section on page 3-60) and the associated media gateway span and timeslot must be set to OOS (refer to the documentation for the media gateway).

Point codes (DPC, OPC, or APC) and SS7 routes Signaling links (TDM, ATM, or SS7)

Service state of the point code and SS7 route must be set to OOS (refer to the Setting the Service State of a Signaling Service section on page 8-95). Service state of the signaling link must be set to OOS (refer to the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-71

Chapter 3 Regular Operations

Cisco MGC Node Operations

Table 3-13 Dynamic Reconfiguration Preconditions (continued)

Component Signaling services

Preconditions Service state of the signaling service must be set to OOS (refer to the Setting the Service State of an SS7 Signaling Service section on page 8-96). Service state of the subsystems and routes must be set to OOS (refer to the Setting the Service State of a Local Subsystem Number section on page 8-98). None.

SS7 subsystems

Trunk groups Component properties (linksets, signaling services, and trunk groups)

For example, if you want to change the settings for a DPC or remove it altogether, you must first set the service state of the DPC to OOS, before attempting to make changes. If you do not set the service state to OOS, your dynamic reconfiguration request is rejected with an error message. During dynamic reconfiguration, the system goes through two phases. First, it validates the service states of all objects being changed. If any error is encountered, no reconfiguration takes place on any of the objects. Error messages indicate which components are in error. The format of the error message is Components MML name, process rejecting change, reason for rejecting the change, remedy. If no errors are encountered during the validation phase, the update phase proceeds. This is where the new configuration data is loaded by all of the processes. At the beginning of the update phase, an SNMP alarm is displayed to indicate update starting. At the end of the update phase, the alarm clears, and, if commit/deploy was initiated by MML, the MML response is returned. To change the current configuration of a component using dynamic reconfiguration, you can only use the provisioning tools provided with the Cisco MGC, MML provisioning commands or an SNMP provisioning agent (such as the Voice Services Provisioning Tool [VSPT]). Provisioning or configuring by using any other means can cause errors during the dynamic reconfiguration process. Using these tools is required because the dynamic reconfiguration process relies on the provisioning tools to validate the data values and, more importantly, to crosscheck the dependencies of the objects. For example, the provisioning tool ensures that adding a signal transfer point (STP) first requires the existence of the associated route.

Retrieving Provisioning Data


You can use the prov-rtrv MML command to retrieve information about your current provisioning settings. The ways in which you can use this command to retrieve provisioning data are described in the following sections:

Retrieving Data for an Individual Component, page 3-73 Retrieving Data for Select Components, page 3-74 Retrieving Data for All Components of a Particular Type, page 3-75 Retrieving Data on the Current Provisioning Session, page 3-76 Retrieving Data on Supported Signaling Protocols, page 3-77

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-72

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Retrieving Data for an Individual Component


You can retrieve provisioning data on any individual component on your system. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:component:name=MML_name

Where:

componentThe MML component type associated with the desired component. You can determine the MML names for select provisioned component types using the prov-rtrv:all MML command. MML_nameThe MML name for the desired component. You can determine the MML names for select components using the prov-rtrv:all MML command.

For example, to view the provisioning data for a point code called opc, you would enter the following command:
prov-rtrv:opc:name="opc"

The system returns a response similar to the following:


MGC-01 - Media Gateway Controller 2000-08-25 16:28:56 M RTRV ""session=active:ptcode" /* NAME = opc DESC = Originating Point Code NETADDR = 201.1.100 NETIND = 2 */

The response to the command is dependent upon the component type associated with the desired component. For example, to view the properties for an SS7 signaling service called ss7svc1, you would enter the following command:
prov-rtrv:sigsvcprop:name="ss7svc1"

The system returns a response similar to the following:


MGC-01 - Media Gateway Controller 2001-06-01 10:09:47 M RTRV "session=active:sigsvcprop" /* adjDestinations = 16 AlarmCarrier = 0 BOrigStartIndex = 0 BothwayWorking = 1 BTermStartIndex = 0 CctGrpCarrier = 2 CGBA2 = 0 CircHopCount = 0 CLIPEss = 0 CotInTone = 2010 CotOutTone = 2010 CotPercentage = 0 dialogRange = 0 ExtCOT = Loop ForwardCLIinIAM = 1 ForwardSegmentedNEED = 1 GLARE = 0 GRA2 = 0 GRSEnabled = false

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-73

Chapter 3 Regular Operations

Cisco MGC Node Operations

InternationalPrefix = 0 layerRetries = 2 layerTimer = 10 MaxACL = 3 maxMessageLength = 250 mtp3Queue = 1024 NationalPrefix = 0 NatureOfAddrHandling = 0 Normalization = 0 OMaxDigits = 24 OMinDigits = 0 OOverlap = 0 OwnClli = na RedirMax = 3 ReleaseMode = Async restartTimer = 10 RoutePref = 0 sendAfterRestart = 16 slsTimer = 300 srtTimer = 300 sstTimer = 300 standard = ANSI92 SwitchID = 0 TMaxDigits = 24 TMinDigits = 0 TOverlap = 0 variant = SS7-ANSI VOIPPrefix = 0 */

Retrieving Data for Select Components


You can retrieve data on select components provisioned on your system. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:all

Note

This command returns data on all signaling components, except for signaling service and linkset properties. The system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 17:12:49 M RTRV "session=active:all" /* NAME COMPID Parent Name ----------- ----------"ether1" 00050003 "MGC-01" "ether2" 00050004 "MGC-01" "enif1" 00060003 "ether1" "enif2" 00060004 "ether2" "ls1" 00080001 "dpc1" 2600-202-INET-6a" "ls2" 00080004 "dpc2" 2600-203-INET-6a" "ls-itu" 00080005 "stp1" "va-5300-202-1" 00100001 "va-5300-202" va-5300-202"

TID --CARD CARD ENETIF ENETIF LNKSET LNKSET LNKSET IPLNK

Description ----------"Ethernet Card 1" "Ethernet Card 2" "Ethernet IF 1" "Ethernet IF 2" "link set 1 to "link set 2 to "Lkset stp1,1-6-1" "link 1 to

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-74

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

"va-5300-202-2" va-5300-202" "va-5300-203-1" va-5300-203" "va-5300-203-2" va-5300-203" "va-5800-5-1" va-5300-202" "va-5800-5-2" va-5800-5" "route1" ls1" "rt3" "rt1" "rt2" "route2" ls2" "opc2" "dpc2" Pointcode" "opc1" "dpc1" Pointcode" "va-5300-202" "va-5300-203" "va-5800-5" "ss7svc2" dpc2" "ss7svc1" dpc1" "nas1" "nas2" "nas8" "ls1link1" va-2600-202" "ls2link1" va-2600-202" "ls1link2" va-2600-203" "ls2link2" va-2600-203" "lk-3" "stp1" "scp1" "scp2" "ss7subsys3" rte-ssn 254" "ss7subsys1" "ss7subsys2" cp1 rte-ssn 254" */

00100002 00100003 00100004 00100005 00100006 00110001 00110005 00110006 00110007 0011000a 00130002 00130004 00130006 00130007 00140001 00140002 00140003 00150002 00150005 00160001 00160002 00160003 001d0001 001d0002 001d0003 001d0004 001d0005 001e0001 001e0002 001e0003 001f0003 001f0004 001f0005

"va-5300-202" "va-5300-203" "va-5300-203" "va-5800-5" "va-5800-5" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "nas1" "nas2" "nas1" "dpc2" "dpc1" "MGC-01" "MGC-01" "MGC-01" "ls1" "ls2" "ls1" "ls2" "ls-itu" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01"

IPLNK IPLNK IPLNK IPLNK IPLNK SS7ROUTE SS7ROUTE SS7ROUTE SS7ROUTE SS7ROUTE PTCODE PTCODE PTCODE PTCODE NASPATH NASPATH NASPATH SS7PATH SS7PATH EXTNODE EXTNODE EXTNODE C7IPLNK C7IPLNK C7IPLNK C7IPLNK C7IPLNK APC APC APC SS7SUBSYS SS7SUBSYS SS7SUBSYS

"link 2 to "link 1 to "link 2 to "link 1 to "link 2 to "route to dpc1 via "SS7 Rte3-for scp2" "SS7 Rte1-stp1" "SS7 Rte2-for scp1" "route to dpc2 via "Own Pointcode" "TDM Switch dpc2 "Own Pointcode" "TDM Switch dpc1 "Serviceto nas1" "Serviceto nas2" "Serviceto nas1" "SS7 service to "SS7 service to "va-5300-202" "va-5300-203" "va-5800-5" "link 1 of ls1 to "link 1 of ls2 to "link 2 of ls1 to "link 2 of ls2 to "SS7ITU 2600-91" "STP 1" "SCP1 for PC/SSN" "SCP2 for PC/SSN" "pc_ssn scp2 "ssn 254(800)" "pc_ssn s

Retrieving Data for All Components of a Particular Type


You can retrieve provisioning data on all components of a particular type on your system. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:component:all

Where: component is the MML component type associated with the desired provisioned component group. You can find a complete list of MML component types in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-75

Chapter 3 Regular Operations

Cisco MGC Node Operations

Note

Components that are used to retrieve signaling or routing properties (that is sigsvcprop, lnksetprop, and trnkgrpprop) cannot use this command. The properties for only one signaling or routing component can be listed per command instance. Please use the following format:
prov-rtrv: propComp:name="compName " | name=ss7famName

Where: propCompMML component name appropriate to the property type you want to retrieve, as listed below: sigsvcpropProvides maintenance access to the properties of signaling services. trnkgrppropProvides maintenance access to the properties of trunk groups lnksetpropProvides maintenance access to the properties of linksets. compName - MML name of a previously provisioned signaling service or trunk group. ss7famName - MML name of the SS7 family associated with the desired linkset. For example, to view the provisioning data for all DPCs, you would enter the following command:
prov-rtrv:dpc:"all"

The system returns a response similar to the following:


MGC-01 - Media Gateway Controller 2001-06-12 17:16:42 M RTRV "session=active:dpc" /* NAME NETADDR NETIND --------------dpc2 2.2.2 2 dpc1 1.1.1 2 */

Retrieving Data on the Current Provisioning Session


You can retrieve provisioning data on the current provisioning session. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:session

The system returns a response similar to the following:


MGC-02 - Media Gateway Controller 2001-06-13 13:39:19 M RTRV "session=jtest:session" /* Session ID = mml1 SRCVER = active DSTVER = jtest */

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-76

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Retrieving Data on Supported Signaling Protocols


You can retrieve protocol data for the current provisioning session. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:variants

The system returns a response similar to the following:


MGC-01 - Media Gateway Controller 2001-06-12 17:18:25 M RTRV "session=active:variants" /* MDO File name Protcol Family Switch Type -----------------------------------ANSISS7_CLEAR SS7-ANSI 20 ANSISS7_MCI SS7-ANSI 0 ANSISS7_NOATPTX SS7-ANSI 0 ANSISS7_SPRINT SS7-ANSI 0 ANSISS7_STANDARD SS7-ANSI 0 ATT_41459 ISDNPRI 17 ATT_41459_C2 ISDNPRI 17 BELL_1268 ISDNPRI 22 BELL_1268_C3 ISDNPRI 22 BTNUP_BTNR167 SS7-UK 5 BTNUP_IUP SS7-UK 5 BTNUP_NRC SS7-UK 5 DPNSS_BTNR188 DPNSS 26 EISUP EISUP 0 ETS_300_102 ISDNPRI 27 ETS_300_102_C1 ISDNPRI 27 ETS_300_102_C6 ISDNPRI 27 ETS_300_121 SS7-ITU 0 ETS_300_172 ISDNPRI 29 ETS_300_356 SS7-ITU 0 HKTA_2202 SS7-ITU 0 ISUPV1_POLI SS7-ITU 0 ISUPV2_32DIG SS7-ITU 0 ISUPV2_CZECH SS7-ITU 0 ISUPV2_FINNISH96 SS7-ITU 0 ISUPV2_FRENCH SS7-ITU 0 ISUPV2_GERMAN SS7-ITU 0 ISUPV2_JAPAN SS7-Japan 10 ISUPV2_KPNPB SS7-ITU 0 ISUPV2_NTT SS7-Japan 0 ISUPV2_SPANISH SS7-ITU 0 ISUPV2_SWISS SS7-ITU 0 ISUPV2_TELEFONICA SS7-ITU 0 ISUPV2_VIETNAM SS7-ITU 0 ISUPV3_UK SS7-UK 0 ISUPV3_UK_AXE10 SS7-UK 15 ISUPV3_UK_AXE10_BTNETCHAT SS7-UK 15 ISUPV3_UK_BTNETCHAT SS7-UK 0 Q721_BASE SS7-ITU 5 Q721_BRAZILIAN SS7-ITU 5 Q721_CHINA SS7-China 5 Q721_FRENCH SS7-ITU 5 Q721_PHILLIPINE SS7-ITU 5 Q761_ARGENTINA SS7-ITU 0 Q761_ARGENTINA_C2 SS7-ITU 0 Q761_AUSTRL SS7-ITU 0 Q761_AUSTRL_C2 SS7-ITU 0 Q761_BASE SS7-ITU 0 Q761_BELG_BCOM SS7-ITU 0

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-77

Chapter 3 Regular Operations

Cisco MGC Node Operations

Q761_BELG_ISUP_CUJO SS7-ITU Q761_BELG_MOBI SS7-ITU Q761_CHILE SS7-ITU Q761_CHINA SS7-China Q761_CHINA_MOB SS7-China Q761_CHINA_MOB SS7-ITU Q761_DANISH SS7-ITU Q761_INDIA SS7-ITU Q761_KOREAN SS7-ITU Q761_NEWZEALAND SS7-ITU Q761_PERU SS7-ITU Q761_PORTUGAL SS7-ITU Q761_SIEMENS_MOBI SS7-ITU Q761_SINGAPORE SS7-ITU Q761_TAIWAN SS7-ITU Q761_THAILAND SS7-ITU Q767_BASE SS7-ITU Q767_BRAZIL SS7-ITU Q767_COLOMBIA SS7-ITU Q767_GUATEMALA SS7-ITU Q767_INDONESIA SS7-ITU Q767_ITAL SS7-ITU Q767_ITAL_INTERCONNECT SS7-ITU Q767_MEXICAN SS7-ITU Q767_RUSS SS7-ITU Q767_SPAN SS7-ITU Q767_SWED SS7-ITU Q767_TELSTRA SS7-ITU Q767_TURKISH SS7-ITU T113_BELL SS7-ANSI dummy AVM dummy MGCP dummy TCAPOverIP dummy VSI */

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

Provisioning a Dial Plan


You can provision dial plans on your Cisco MGC using the commands listed below. For more information on provisioning and maintaining dial plans, refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.

numan-addAdds an element to a dial plan. numan-dltDeletes an element from a dial plan. numan-edEdits an existing element in a dial plan. numan-rtrvDisplays information pertaining to an element or all elements in a dial plan.

Note

You can verify dial plans using the translation verification viewer on the Cisco MGC toolbar. For information on using the translation verification viewer, refer to the Verifying a Dial Plan Translation section on page 3-143.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-78

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Importing Provisioning Data


You can import provisioning data files (created using the prov-exp MML command) and execute the MML commands contained in those files in batch mode to copy the set up from another system, or return a system to a baseline configuration. Refer to the Exporting Provisioning Data section on page 3-79 for more information on exporting provisioning data. To import the provisioning data files and execute the MML commands in batch mode, log in to the active Cisco MGC, and enter the following UNIX command:
mml -b export_directory_path /filename

Where:

export_directory_pathThe directory path to the location of the exported provisioning data files. filenameThe name of the provisioning data file you want to import.

The provisioning data files must be provisioned in the following order:


config.mmlContains core configuration data (signaling services, SS7 nodes) export_trunks.dat (created only when trunks are configured on your system) export_trkgrp.dat (created only when trunk groups are configured on your system) routing.mmlContains routing plans custGrpID.mmlOne of these files is created for each existing dial plan, with the file being named with the associated customer group ID number.

For example, to import the provisioning data stored in the config.mml file, which is located in the /opt/ CiscoMGC/etc/cust_specific/saved_config directory, you would enter the following command:
mml -b /opt/CiscoMGC/etc/cust_specific/saved_config/config.mml

Exporting Provisioning Data


You can use the prov-exp MML command to export the current provisioning set up of your Cisco MGC in MML-command form to a file or files. This allows you to copy the provisioning data from one Cisco MGC and set up another Cisco MGC with that same provisioning data or to restored a Cisco MGC to a baseline provisioning environment. Refer to Importing Provisioning Data section on page 3-79 for information on importing the provisioning data created by the prov-exp MML command. To export part of the current configuration of your Cisco MGC to a file, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-exp:tid:dirname="export_directory_name "

Where:

tidTypes of data. These can be:


configCore configuration data (signaling services, SS7 nodes), including trunks and trunk

groups. This selection creates the following files: config.mml, export_trunks.dat (created only when trunks are configured on your system), and export_trkgrp.dat (created only when trunk groups are configured on your system).
routingRouting plans. This selection creates a file called routing.mml numanDial plans. This selection creates a file for each dial plan specified on your system.

The file name is dependent on the customer group ID for each dial plan, that is the names of the files follows the format custGrpID.mml.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-79

Chapter 3 Regular Operations

Cisco MGC Node Operations

export_directory_nameName of the directory to which the data is exported. This directory is a subdirectory within the /opt/CiscoMGC/etc/cust_specific directory established at installation.

For example, to export the core configuration data to a file stored in the /opt/CiscoMGC/etc/ cust_specific/saved_config directory, you would enter the following command:
prov-exp:config:dirname="saved_config"

To export all of the current configuration of your Cisco MGC to several files, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-exp:all:dirname="export_directory_name "

Where export_directory_name is the name of the directory to which the data is exported. This directory is a subdirectory within the /opt/CiscoMGC/etc/cust_specific directory established at installation. The system creates the following files in the specified directory when this command is entered:

config.mmlContains core configuration data (signaling services, SS7 nodes) export_trunks.dat (created only when trunks are configured on your system) export_trkgrp.dat (created only when trunk groups are configured on your system) routing.mmlContains routing plans custGrpID.mmlOne of these files is created for each existing dial plan, with the file being named with the associated customer group ID number. GLBL.awhiteContains global screening data for A-number white lists. Introduced in Release 9.4(1). GLBL.ablackContains global screening data for A-number black lists. Introduced in Release 9.4(1). GLBLbwhiteContains global screening data for B-number white lists. Introduced in Release 9.4(1). GLBLbblackContains global screening data for B-number black lists. Introduced in Release 9.4(1).

For example, to export all of the provisioning data into files stored in the /opt/CiscoMGC/etc/ cust_specific saved_config directory, you would enter the following command:
prov-exp:all:dirname="saved_config"

Managing Automatic Congestion Control


The Cisco MGC supports Automatic Congestion Control (ACC). ACC dynamically regulates incoming traffic on the Cisco MGC to levels that can be handled effectively by rejecting a percentage of new calls when the Cisco MGC is congested. ACC increases the throughput of completed calls through the telephone network during periods of overload. ACC provides three major functions:

Rejection of calls to prevent internal congestionWhen the Cisco MGC is congested, a user-defined percentage of calls (depending on internal overload level) are rejected and an ISUP release message is sent to the adjacent signaling point. That ISUP release message has a clear cause of Switch Equipment Congestion and contains an Automatic Congestion Level (ACL) value that indicates the overload level of the Cisco MGC. For a call that is in progress when overload occurs and the call clears normally, the ISUP release message has a clear cause of Normal Call Clearing and an ACL value associated with the current overload level of the Cisco MGC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-80

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Reception and response to congested statusWhen an adjacent signaling point is congested, the Cisco MGC can reduce the amount of traffic offered by re-routing calls or rejecting a percentage of the calls. This is referred to as outgoing load control (OLC). Detection and transmission of congested statusThe Cisco MGC can indicate its current level of congestion to adjacent signaling points using SS7 ISUP. Detection of congestion is based on dynamic measurements such as CPU occupancy, sizes of queues and buffers, or amounts of other resources needed for call processing. This is referred to as incoming load control (ILC).

ACC is described in the following sections:


Managing Call Rejection Percentages, page 3-81 Managing Outgoing Load Control, page 3-83 Managing Incoming Load Control, page 3-94

Managing Call Rejection Percentages


ACC enables the Cisco MGC to manage its internal congestion level through the rejection of calls. When call volume causes the Cisco MGC to reach one of its machine congestion levels (MCLs), ACL indications can be sent to the adjacent signaling points and a percentage of the calls, based on your definitions, are released. The valid values for MCL are shown in Table 3-14.
Table 3-14 Machine Congestion Level Values

Machine Congestion Level MCO MC1 MC2 MC3

Description No congestion present. Mild congestion. Moderate congestion. Severe congestion.

The procedures for managing call rejection percentages can be found in the following sections:

Modifying the MCL Call Reject Settings, page 3-82 Retrieving the MCL Call Reject Settings, page 3-83

The Cisco MGC has alarms associated with three of the MCLs. These alarms are issued as the Cisco MGC enters an MCL. These alarms are automatically cleared once the Cisco MGC exits an MCL. Table 3-15 shows which MCLs are associated with which alarms. For more information on these alarms, refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.
Table 3-15 Alarm Associations for MCLs

Machine Congestion Level MC1 MC2 MC3

Associated Alarm OverloadLight OverloadMedium OverloadHeavy

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-81

Chapter 3 Regular Operations

Cisco MGC Node Operations

For example, if, over several CPU timer interval periods, the Cisco MGC were to enter MC1, go up to MC2, and then return to MC1, the alarms would be set or cleared as follows:
1. 2. 3. 4. 5.

The OverloadLight alarm is set. The OverloadLight alarm is cleared. The OverloadMedium alarm is set. The OverloadMedium alarm is cleared. The OverloadLight alarm is set.

Note

The alarms associated with the Cisco MGCs MCLs create SNMP traps. To identify these alarms among the SNMP traps, look for the tpAlarmCatName object to contain the name of the alarm (OverloadLight, OverloadMedium, or OverloadHeavy) and the tpAlarmSet object to indicate whether the alarm is being set (2) or cleared (1). For more information on the MIBs for the Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Management Information Base Guide.

Modifying the MCL Call Reject Settings


To modify the percentage of calls rejected for a particular MCL, perform the following steps:

Note

You can also use the Cisco Voice Services Provisioning Tool (VSPT) to make the provisioning changes necessary to modify the MCL call release settings. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the percentage of calls released for a particular MCL:
prov-ed:mclcallreject:name="mcl_name",callreject=value

Where:

mcl_nameName of the MCL level for which you want to modify the call release percentage. The following names are valid:
mcl1Specifies the percentage of calls defined in value that are released when the Cisco MGC

enters MCL1. The default value is 25.


mcl2Specifies the percentage of calls defined in value that are released when the Cisco MGC

enters MCL2. The default value is 50.


mcl3Specifies the percentage of calls defined in value that are released when the Cisco MGC

enters MCL3. The default value is 100.

valuePercentage of calls that are released. The valid range is 0 through 100.

For example, to modify the percentage of MCL1 such that 30 percent of calls are released when the Cisco MGC meets the conditions necessary to enter MCL1, you would enter the following command:
prov-ed:mclcallreject:name=mcl1,callreject=30

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-82

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Retrieving the MCL Call Reject Settings


You can retrieve the settings for one or all of the MCLs on your Cisco MGC. To retrieve the settings for a single MCL, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:mclcallreject:name=mcl_name

Where: mcl_nameThe name of the MCL for which you want settings. The following names are valid:

mcl1 mcl2 mcl3

The system responds with a listing of the call release settings for that MCL. For example, to retrieve the settings for an MCL called mcl1, you would enter the following command:
prov-rtrv:mclcallreject:name=mcl1

The system returns a message similar to the following:


MGC-01 - Media Gateway Controller 2001-02-23 14:13:40 M RTRV "session=accstuff:mclcallreject" /* MCLNAME = mcl1 CALLREJECT = 25 */

To retrieve the settings for every MCL on your system, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:mclcallreject:all

The system responds with a listing of the call release settings for each MCL.
MGC-01 - Media Gateway Controller 2001-02-23 14:15:02 M RTRV "session=accstuff:mclcallreject" /* Name CallReject -------------------- ---------mcl1 25 mcl2 50 mcl3 100 */

Managing Outgoing Load Control


Outgoing load control (OLC) regulates outgoing traffic to reduce congestion on other signaling points that provide an ACL indication to the Cisco MGC. Traffic may be re-routed or released instead of being sent to congested signaling points. There are two types of outgoing load congestion controls:

Cancel-to (CANT)Causes a percentage of the traffic that would have been routed to an SS7 signaling path (systems configured for signaling) or trunk group (systems configured for call control) to be rejected due to congestion.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-83

Chapter 3 Regular Operations

Cisco MGC Node Operations

Note

The Cisco PGW 2200 configured for signaling was formerly called the Cisco SC2200 Signaling Controller. The Cisco PGW 2200 configured for call control was formerly called the VSC3000 Virtual Switch Controller. Some documentation for your telephony solution may use these names.

SkipCauses a percentage of the traffic that would have routed to a trunk group to overflow to alternate routes. If an alternate route is not available, calls are rejected due to congestion.

Note

Skip controls are available only on trunk groups (systems configured for call control). When applying congestion controls, the CANT control is given precedence over the skip control. Percentages assigned to CANT and skip for each ACL are independent. If both skip and CANT percentages are specified for a trunk group, these percentages are applied independently, based on the number of calls offered to a trunk group. The results are given in Table 3-16.
Table 3-16 CANT and Skip Results Matrix

CANT Yes No No Yes

Skip Yes Yes No No

Result CANT Skip None CANT

Depending on the type of traffic, there can be different CANT and skip percentages.

Direct routedThis trunk group is the first choice in a list of routes in a priority sequence coming from the adjacent signaling point. Alternate routedThis trunk group is an alternate route in a list of routes in priority sequence coming from the adjacent signaling point.

Note

The alternate routed control is available only on trunk groups (call control configurations). The outgoing load congestion controls are configured in sets referred to as ACC response categories (ACCRCs). The ACCRCs attach a label to a set of configuration data for each control that can be reused. Only one ACCRC can be configured per SS7 signaling path (signaling configurations) or trunk group (call control configurations) that supports outgoing traffic. If an ACCRC is not assigned to an SS7 signaling path or trunk group, the default ACC response procedures are performed. There is an ACCRC field for each control type combination of every ACL indication level (for example, there are three alternate routed skip control fields for ACL 1, 2, and 3: acl1arskip, acl2arskip, and acl3arskip). The Cisco MGC comes configured with a default ACCRC, which cannot be modified. The field values for the default ACCRC are listed below:

acl1drcant50 acl1drskip20 acl1arcant50 acl1arskip20 acl2drcant90

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-84

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

acl2drskip20 acl2arcant90 acl2arskip20 acl3drcant100 acl3drskip0 acl3arcant100 acl3arskip0

Once an ACL indication is received from a adjacent signaling point, the actions defined in the ACCRC are enabled for the amount of time defined in a configurable ACL timer (ACLDur). The following sections describe how to manage OCL:

Adding an ACC Response Category on System Configured for Signaling, page 3-85 Adding an ACC Response Category on a System Configured for Call Control, page 3-86 Modifying an ACC Response Category on a System Configured for Signaling, page 3-88 Modifying an ACC Response Category on a System Configured for Call Control, page 3-89 Deleting an ACC Response Category on a System Configured for Signaling, page 3-90 Deleting an ACC Response Category on a System Configured for Call Control, page 3-91 Retrieving ACC Response Category Settings, page 3-91 Modifying the SS7 Signaling Path Associated with an ACC Response Category, page 3-92 Modifying the Trunk Group Associated with an ACC Response Category, page 3-93 Modifying an ACL Timer, page 3-93

Adding an ACC Response Category on System Configured for Signaling


To add an ACCRC on your system when it is configured for signaling, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to add an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to configure the values for an ACCRC:
prov-add:accrespcat:name="cat_name "[,field_name=value,field_name=value...]

Where:

cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be configured:
acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 1 is received from an adjacent signaling point.


acl2drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 2 is received from an adjacent signaling point.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-85

Chapter 3 Regular Operations

Cisco MGC Node Operations

acl3drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 3 is received from an adjacent signaling point.

valuePercentage of calls that are released. The valid range is 0 through 100.

Note

Any ACCRC field that you do not enter a value for is set to 0. For example, to configure an ACCRC called cat1 such that 20 percent of calls are rejected when an ACL of 1 is received, 50 percent of calls are rejected when an ACL of 2 is received, and 98 percent of calls are rejected when an ACL of 3 is received, you would enter the following command:
prov-add:accrespact:name=cat1,acl1drcant=20,acl2drcant=50,acl3drcant=98

Step 3

Enter the following command to associate an ACCRC with an SS7 signaling path:
prov-ed:sigsvcprop:name="comp_name ",ACCRespCatName=cat_name

Where:

comp_nameMML name for the SS7 signaling path to be associated with an ACCRC.

Note

If you do not know the MML name of the SS7 signaling path, use the prov-rtrv:ss7path:all command to find the name.

cat_nameMML name for the ACCRC.

For example, to associate an ACCRC called cat1 with an SS7 signaling path named access1, you would enter the following command:
prov-ed:sigsvcprop:name=access1,ACCRespCatName=cat1

Step 4

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Adding an ACC Response Category on a System Configured for Call Control


To add an ACCRC on your system when it is configured for call control, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to add an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to configure the values for an ACCRC:
prov-add:accrespcat:name="cat_name "[,field_name=value,field_name=value...]

Where:

cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be configured:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-86

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 1 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl1drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl1arcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 1 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl1arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl2drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 2 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl2drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl2arcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 2 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl2arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl3drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 3 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl3drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 3 is received from an adjacent signaling point.
acl3arcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 3 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl3arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 3 is received from an adjacent signaling point.

valuePercentage of calls that are released. The valid range is 0 through 100.

Note

Any ACCRC field that you do not enter a value for is set to 0. For example, to configure an ACCRC on a trunk group called cat1 such that when an ACL indication of 1 is received, 20 percent of direct routed calls are rejected, 20 percent of direct routed calls are re-routed, 10 percent of alternate routed calls are rejected, and 10 percent of alternate routed calls are re-routed, you would enter the following command:
prov-add:accrespact:name=cat1,acl1drcant=20,acl1drskip=20,acl1arcant=10,acl1arskip=10

Step 3

Enter the following command to associate an ACCRC with a trunk group:


prov-ed:trnkgrpprop:name="comp_name ",ACCRespCatName=cat_name

Where:

comp_nameMML name for the trunk group on which you want to configure an ACCRC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-87

Chapter 3 Regular Operations

Cisco MGC Node Operations

Note

If you do not know the MML name of the trunk group, use the prov-rtrv:trnkgrp:all command to find the name.

cat_nameMML name for the ACCRC you want to configure.

For example, to create an ACCRC called cat1 on an trunk group named trunk, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk1,ACCRespCatName=cat1

Step 4

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Modifying an ACC Response Category on a System Configured for Signaling


To modify an ACCRC on your system when it is configured for signaling, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to modify an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the configuration of an ACCRC:
prov-ed:accrespcat:name="cat_name "[,field_name=value,field_name=value...]

Where:

cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be modified:
acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 1 is received from an adjacent signaling point.


acl2drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 2 is received from an adjacent signaling point.


acl3drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 3 is received from an adjacent signaling point.

valuePercentage of calls that are released. The valid range is 0 through 100.

For example, to modify the configuration of an ACCRC called cat1 such that 30 percent of calls are rejected when an ACL of 1 is received, you would enter the following command:
prov-ed:accrespact:name=cat1,acl1drcant=30

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-88

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Modifying an ACC Response Category on a System Configured for Call Control


To modify an ACCRC on your system when it is configured for call control, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to modify an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the configuration for an ACCRC:
prov-ed:accrespcat:name="cat_name "[,field_name=value,field_name=value...]

Where:

cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be modified:
acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 1 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl1drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl1arcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 1 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl1arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl2drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 2 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl2drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl2arcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 2 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl2arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl3drcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 3 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl3drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 3 is received from an adjacent signaling point.
acl3arcantSpecifies the percentage of calls defined in value that are released when an ACL

indication of 3 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-89

Chapter 3 Regular Operations

Cisco MGC Node Operations

acl3arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate

trunk group when an ACL indication of 3 is received from an adjacent signaling point.

valuePercentage of calls that are released. The valid range is 0 through 100.

For example, to modify the configuration an ACCRC on a trunk group called cat1 such that 30 percent of calls are rejected when an ACL of 1 is received, you would enter the following command:
prov-ed:accrespact:name=cat1,acl1drcant=30,acl1arcant=30

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Deleting an ACC Response Category on a System Configured for Signaling


To delete an ACCRC on your system when it is configured for signaling, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to delete an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Before you can delete an ACCRC, you must delete the associated SS7 signaling path. To do this, enter the following command:
prov-dlt:ss7path:name=comp_name

Where: comp_nameMML name for the SS7 signaling path you want to delete.

Note

If you do not know the MML name of the SS7 signaling path, use the prov-rtrv:ss7path:all command to find the name.

For example, to delete an SS7 signaling path named access1, you would enter the following command:
prov-dlt:ss7path:name=access1

Step 3

Enter the following command to delete an ACCRC:


prov-dlt:accrespcat:name="cat_name "

Where: cat_nameThe name of the ACCRC you want to delete. For example, to delete an ACCRC called cat1, you would enter the following command:
prov-dlt:accrespact:name=cat1

Step 4

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-90

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Deleting an ACC Response Category on a System Configured for Call Control


To delete an ACCRC on your system when it is configured for call control, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to delete an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Before you can delete an ACCRC, you must delete the associated trunk group. To do this, enter the following command:
prov-dlt:trnkgrp:name=comp_name

Where: comp_nameMML name for the trunk group you want to delete.

Note

If you do not know the MML name of the trunk group, use the prov-rtrv:trnkgrp:all command to find the name.

For example, to delete a trunk group named access1, you would enter the following command:
prov-dlt:trnkgrp:name=access1

Step 3

Enter the following command to delete an ACCRC:


prov-dlt:accrespcat:name="cat_name "

Where: cat_nameThe name of the ACCRC you want to delete. For example, to delete an ACCRC called cat1, you would enter the following command:
prov-dlt:accrespact:name=cat1

Step 4

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Retrieving ACC Response Category Settings


You can retrieve the settings for one or all of the ACCRCs configured on your Cisco MGC. To retrieve the settings for a single ACCRC, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:accrespcat:name=cat_name

Where: cat_nameThe name of the ACCRC for which you want settings. The system responds with a listing of the settings for each of the ACCRC fields. For example, to retrieve the settings for an ACCRC called cat1, you would enter the following command:
prov-rtrv:accrespact:name=cat1

The system responds with a message similar to the following:


MGC-01 - Media Gateway Controller 2001-02-23 12:23:20 M RTRV "session=jimacc:accrespcat"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-91

Chapter 3 Regular Operations

Cisco MGC Node Operations

/* NAME ACL1DRCANT ACL1DRSKIP ACL1ARCANT ACL1ARSKIP ACL2DRCANT ACL2DRSKIP ACL2ARCANT ACL2ARSKIP ACL3DRCANT ACL3DRSKIP ACL3ARCANT ACL3ARSKIP */

= = = = = = = = = = = =

= cat1 20 10 20 10 50 20 50 20 98 2 98 2

To retrieve the settings for every ACCRC on your system, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:accrespcat:all

The system responds with a message similar to the following.


MGC-01 - Media Gateway Controller 2001-02-23 11:15:32 M RTRV "session=migrated:accrespcat" /* Name Acl1DrCant Acl1DrSkip Acl1ArCant Acl1ArSkip Acl2DrCant Acl2ArCant Acl2ArSkip Acl3DrCant Acl3DrSkip Acl3ArCant Acl3ArSkip -------------------- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---- ---cat1 20 10 20 10 50 20 50 20 98 2 98 default 50 20 50 20 90 20 90 20 100 0 100 */

Acl2DrSkip ---2 0

Modifying the SS7 Signaling Path Associated with an ACC Response Category
To modify the SS7 signaling path associated with an ACCRC on your system when it configured for signaling, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to modify the SS7 signaling path associated with an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify which SS7 signaling path is associated with an ACCRC:
prov-ed:sigsvcprop:name="comp_name ",ACCRespCatName=cat_name

Where:

comp_nameMML name for the SS7 signaling path to be associated with an ACCRC.

Note

If you do not know the MML name of the SS7 signaling path, use the prov-rtrv:ss7path:all command to find the name.

cat_nameMML name for the ACCRC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-92

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

For example, to associate an ACCRC called cat1 with an SS7 signaling path named access2, you would enter the following command:
prov-ed:sigsvcprop:name=access2,ACCRespCatName=cat1

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Modifying the Trunk Group Associated with an ACC Response Category


To modify the trunk group associated with an ACCRC on your system when it is configured for call control, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to modify the trunk group associated with an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify which trunk group is associated with an ACCRC:
prov-ed:trnkgrpprop:name="comp_name ",ACCRespCatName=cat_name

Where:

comp_nameMML name for the trunk group to be associated with an ACCRC.

Note

If you do not know the MML name of the trunk group, use the prov-rtrv:trnkgrp:all command to find the name.

cat_nameMML name for the ACCRC.

For example, to associate an ACCRC called cat1 with an trunk group named trunk2, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk2,ACCRespCatName=cat1

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Modifying an ACL Timer


When the Cisco MGC receives ACL indication from an adjacent signaling point, it activates the controls specified for that congestion level on the trunk group or SS7 signaling path associated with the release message and starts an ACL timer (ACLDur). The duration of this timer can be configured on a trunk group or SS7 signaling path basis, with a default value of 5 seconds. When the ACL timer expires, the congestion controls on the trunk group or SS7 signaling path are deactivated.

Note

Timers may require adjustment depending on the size of your trunk group.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-93

Chapter 3 Regular Operations

Cisco MGC Node Operations

To modifying the settings for the ACL timer associated with a particular trunk group or SS7 signaling path, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to modify the settings for an ACL timer. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the property that sets the duration of the ACL timer:
prov-ed:component:name="comp_name ",ACLDur=num

Where:

componentMML component type name for the SS7 signaling path or trunk group properties. Depending on the type of system you have, enter one of the following:
sigsvcpropComponent type for signaling path properties, used to set the ACL timer duration

on systems configured for signaling.


trnkgrpropComponent type for trunk group properties, used to set the ACL timer duration on

systems configured for call control.


comp_nameMML name for the SS7 signaling path or trunk group on which you are modifying the duration of the ACL timer. numDuration of the ACL timer in seconds. The default value is 5 seconds.

For example, to change the duration of the ACL timer to 20 seconds on a trunk group named trunk1, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk1,ACLDur=20

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Managing Incoming Load Control


Incoming load control (ILC) is used to regulate incoming traffic to reduce congestion on the Cisco MGC when it is overloaded. When the Cisco MGC enters and abates the different MCLs, calls are re-routed or rejected, based on user-defined settings. Because ITU-based signaling points use a three-level congestion standard, a command is available that maps the MCL values to the ITU congestion standard. No modification is necessary for systems that use the ANSI congestion standard. The MCLs are determined by the measurement of five threshold values, as listed below:

Call rate (callrate)Measures the number of incoming call attempts per second. CPU utilization (cpu)Measures the percentage of CPU utilization. Engine input queue length (queuelen)Measures the number of messages waiting in the call engine input queue. Memory address utilization (memoryaddress)Measures the percentage of how much physical memory address space is in use.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-94

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Virtual memory address utilization (virtualmemory)Measures the percentage of how much virtual memory address space is in use.

You can configure the onset and abatement settings for each of these threshold values. You can also configure the percentage of calls that are released once the thresholds are met. Table 3-17 lists the default values for the MCL thresholds.
Table 3-17 Default Values for the MCL Thresholds

Threshold cpu virtualmemory memoryaddress queuelen callrate

MCL1 Onset 82 80 84 75 0

MCL1 Abate 75 75 80 60 0

MCL2 Onset 90 85 88 80 0

MCL2 Abate 77 80 82 70 0

MCL3 Onset 93 90 93 85 0

MCL3 Abate 85 80 85 75 0

ICL is described in the following sections:


Mapping Machine Congestion Level to the ANSI or ITU Congestion Standard, page 3-95 Modifying MCL Threshold Values, page 3-97 Retrieving MCL Threshold Values, page 3-98

Mapping Machine Congestion Level to the ANSI or ITU Congestion Standard


When the Cisco MGC is overloaded, an ACL value is sent to adjacent signaling points in an ISUP release message based on the MCL. Since ANSI- and ITU-based signaling points have different maximum ACL values, the Cisco MGC uses a property, MaxACL, associated with an SS7 signaling service or trunk group, to map the ACC maximum overload level value to the maximum ACL value used by the adjacent signaling point. ANSI-based signaling points have a maximum ACL value of 3, ITU-based signaling points have a maximum ACL value of 2, and the ACC maximum overload level value is 3. When MaxACL is set to 3, the maximum MCL value is mapped to the ANSI standard, (the default value for MaxACL is 3). When MaxACL is set to 2, the maximum MCL value is mapped to the ITU standard. MaxACL also has a third possible setting, 0, which disables the sending of ACL indications in the ISUP release message. Table 3-18 shows how the MaxACL settings map the MCL values to the ANSI and ITU congestion standards.

Note

Disabling the MaxACL parameter (setting it to 0) does not disable the ACC functionality. If the MaxACL parameter is set to 0 and the Cisco MGC becomes congested, the percentage of calls specified for that overload level are released, and the associated ISUP release message does not contain an ACL indication. The ISUP release message still indicates the proper clear cause.

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to map the MCL to the congestion standard used by the adjacent signaling points. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-95

Chapter 3 Regular Operations

Cisco MGC Node Operations

To map the MCL to the appropriate congestion standard for the associated signaling point, perform the following steps:
Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to set the property that maps the MCL to the congestion standard used by the adjacent signaling point:
prov-ed:component:name="comp_name",MaxACL=num

Where:

componentMML component type name for the SS7 signaling path or trunk group properties. Depending on the type of system you have, enter one of the following:
sigsvcpropComponent type for signaling paths properties, used to map MCL for systems

configured for signaling.


trnkgrpropComponent type for trunk group properties, used to map MCL for systems

configured for call control.


comp_nameMML name for the SS7 signaling path or trunk group on which you are mapping the MCL to the congestion standard used by the adjacent signaling point. numNumber that indicates how to map the MCL values. Table 3-18 lists the valid values for this parameter and their associated congestion levels.

Table 3-18 MCL Mapping Values

MaxACL Value 0 2

Congestion Standard N/A ITU

MCL Value

ACL Value in Release Message

MC0 through ACL is disabled MC3 MC0 MC1 MC2 MC3 MC0 MC1 MC2 MC3 ACL is not present 1 2 2 ACL is not present 1 2 3

ANSI

For example, to map the MCL on a trunk group named trunk1 which is adjacent to a signaling point that uses the ITU congestion standard, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk1,MaxACL=2

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-96

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Modifying MCL Threshold Values


To modify existing MCL threshold values on your Cisco MGC, perform the following steps:

Note

You can also use the Cisco VSPT to make the provisioning changes necessary to modify existing MCL threshold values. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.

Step 1 Step 2

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify existing MCL threshold values:
prov-ed:mclthreshold:name="thres_type"[,field_name=value,field_name=value,...]

Where:

thresh_typeMML name for the MCL threshold type for which you want to modify values. The following threshold types are valid.
callrateMeasures the number of incoming call attempts per second. cpuMeasures the percentage of CPU utilization. queuelenMeasures the number of processes waiting in the call engine input queue. memoryaddressMeasures the percentage of how much physical memory address space is in

use.
virtualmemoryMeasures the percentage of how much virtual memory address space is in use.

field_nameMCL threshold field that is used to specify the onset and abatement values for the selected threshold type. The following fields can be configured:
mcl1onsetSpecifies the threshold, as defined in value, at which the Cisco MGC enters MCL1. mcl1abateSpecifies the threshold, as defined in value, at which the Cisco MGC abates MCL1. mcl2onsetSpecifies the threshold, as defined in value, at which the Cisco MGC enters MCL2. mcl2abateSpecifies the threshold, as defined in value, at which the Cisco MGC abates MCL2. mcl3onsetSpecifies the threshold, as defined in value, at which the Cisco MGC enters MCL3. mcl3abateSpecifies the threshold, as defined in value, at which the Cisco MGC abates MCL3.

valueSpecifies the threshold value for the specified field. The valid value for fields associated with the cpu, memoryaddress, and virtualmemory threshold types is a percentage, ranging from 0 to 100. The valid value for fields associated with the callrate and queuelen threshold types is any nonnegative integer.

Note

Setting the thresholds for any of the fields to 0 disables the all of the MCL settings.

For example, you would enter the following command to modify the MCL threshold values for the cpu threshold type, such that the following values are set:

MCL1 is reached when CPU utilization reaches 75 percent MCL1 abates when CPU utilization reaches 65 percent

prov-add:mclthreshold:name=cpu,mcl1onset=75,mcl1abate=65

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-97

Chapter 3 Regular Operations

Cisco MGC Node Operations

Step 3

Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Retrieving MCL Threshold Values


You can retrieve the values for one or all of the MCL threshold types configured on your Cisco MGC. To retrieve the settings for a single MCL threshold type, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:mclthreshold:name="thres_type"

Where: thresh_typeMML name for the MCL threshold type. The following threshold types are valid.

callrateMeasures the number of incoming call attempts per second. cpuMeasures the percentage of CPU utilization. queuelenMeasures the number of processes waiting in the call engine input queue. memoryaddressMeasures the percentage of how much physical memory address space is in use. virtualmemoryMeasures the percentage of how much virtual memory address space is in use.

The system responds with a listing of the values for each of the fields associated with the MCL threshold type. For example, to retrieve the values for the queuelen MCL threshold type, you would enter the following command:
prov-rtrv:mclthreshold:name=queuelen

The system returns a message similar to the following:


MGC-01 - Media Gateway Controller 2001-02-23 14:09:42 M RTRV "session=accstuff:mclthreshold" /* NAME = queuelen MCL1ONSET = 75 MCL1ABATE = 60 MCL2ONSET = 80 MCL2ABATE = 70 MCL3ONSET = 85 MCL3ABATE = 75 */ ;

To retrieve the values for every MCL threshold type on your system, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:mclthreshold:all

The system responds with a listing of the settings for each field for all of the ACCRCs.
MGC-01 - Media Gateway Controller 2001-02-23 14:11:11 M RTRV "session=accstuff:mclthreshold" /* Name Mcl1Onset Mcl1Abate Mcl2Onset Mcl2Abate ------------- --------- --------- --------- --------callrate 0 0 0 0 cpu 82 75 90 77 memoryaddress 84 80 88 82 queuelen 75 60 80 70

Mcl3Onset --------0 95 93 85

Mcl3Abate --------0 85 85 75

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-98

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

virtualmemory 80 */

75

85

80

90

80

Managing your Cisco MGC Platform


The operations you can use to manage your Cisco MGC platform are described in the following sections:

Performing a Manual Switchover, page 3-99 Verifying Successful Completion of a Switchover, page 3-100 Verifying the Patch Level of the Cisco MGC, page 3-104 Retrieving Configuration Table Data, page 3-105 Retrieving the Logging Level of Software Processes, page 3-109 Retrieving System Statistics, page 3-109

Performing a Manual Switchover


In the continuous service configuration, you can swap the roles of the active Cisco MGC and the standby Cisco MGC by invoking the appropriate MML command from the management interface of the active Cisco MGC. A switchover can be done only from the active Cisco MGC, because only the active Cisco MGC can command the standby Cisco MGC to take over. If there is only one Cisco MGC processing all calls, a manual switchover request is rejected. Manual switchovers are typically performed for the following reasons:

To periodically switch the roles of the Cisco MGCs To upgrade the existing software to a new release To bring down a system for hardware maintenance

Caution

Performing a manual switchover can severely impact your systems call processing performance. All established calls are retained, but any calls in the process of being setup may be dropped. We recommend that this command be issued during a maintenance window when traffic is minimal. When you need to order a manual switchover to perform maintenance or upgrade procedures on one or both of the Cisco MGCs, use the following steps or all calls might be killed by the call engine. Starting with both the active and standby Cisco MGCs operating normally, you can invoke a manual switchover from one system to the other by completing the following steps:

Step 1 Step 2

Determine whether both the active and standby Cisco MGCs are operating normally, as described in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. Determine whether any alarms are pending on either system, as described in the Monitoring the Alarms Status section on page 3-6. If any alarms are pending, you must correct the situation that caused the alarms. Search for the corrective actions required to clear any alarms in the Alarm Troubleshooting Procedures section on page 8-9. If the alarms do not appear in that section, corrective action is not required for those alarms. Refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide for more information on those alarms.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-99

Chapter 3 Regular Operations

Cisco MGC Node Operations

Step 3 Step 4

Ensure that calls are being replicated from the active Cisco MGC to the standby Cisco MGC, as described in the Verifying Proper Replication of Calls section on page 3-58. Enter the following MML command to synchronize the provisioning data on the standby Cisco MGC with the data on the active Cisco MGC:
prov-sync

Caution

Using the prov-sync MML command can severely impact your systems call processing performance. We recommend that this command be issued during a maintenance window when traffic is minimal. Determine platform state of both Cisco MGCs, as described in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. Check that all the processes on the active Cisco MGC are in the running state, as described in the Verifying That Processes Are Running section on page 3-3.

Step 5 Step 6

Caution

The next step forces a manual switchover to the standby Cisco MGC. Ensure that the standby Cisco MGC is fully operational and that debugging is turned off before taking the active Cisco MGC OOS, or there might be a total interruption of service. Switchover can also cause call processing to fail if debugging is turned on.

Step 7

Log in to the active Cisco MGC, start an MML session, and enter the following command:
sw-over::confirm

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Site alarms are automatically set until the OOS Cisco MGC is returned to an IS state.
Step 8

Verify that the switchover has been successfully performed. To do this, follow the procedure described in the Verifying Successful Completion of a Switchover section on page 3-100.

Verifying Successful Completion of a Switchover


You can determine whether a switchover (automatic or manual) was successfully completed by retrieving the status of each Cisco MGC. Once all of the processes to come up (the time it takes for this to happen depends on the amount of traffic), determine the platform state of both Cisco MGCs, as described in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. If the platform state of both Cisco MGCs was as expected, the switchover was successfully completed. If one of the Cisco MGCs does not return the expected platform state, the switchover was not successfully completed. Refer to the Recovering from a Switchover Failure section on page 8-159.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-100

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Understanding Switchover
Cisco MGCs can be arranged in an Active-Standby configuration in which one MGC host runs active traffic while checkpointing information to the standby Cisco MGC. In the continuous service configuration, the active Cisco MGC is paired with an identical standby Cisco MGC that automatically takes over if a failure or switchover occurs. The continuous service architecture of the Cisco MGC increases the reliability, availability, and failure-aversion capabilities of the system. The primary goal of the Cisco MGC failover subsystem is call preservation when there is a system failure. This is achieved by interconnecting two Cisco MGCs while the system carries out the logical functions of call control. At any point, one Cisco MGC is in the active role and the other Cisco MGC is in the standby role. The active Cisco MGC carries out the call control function and updates the standby Cisco MGC about call-processing events. The standby Cisco MGC maintains the same system state (from the call-processing point of view) as the active Cisco MGC. In the event of a critical failure on the active Cisco MGC, the standby switches to the active role and takes over the call control function. There is a period of approximately three seconds in which all messaging is lost in the process of switching over call control.

Note

If your system is using a simplex configuration (a single Cisco MGC), or is functioning in standalone mode (the standby Cisco MGC is in the OOS service state), the system cannot perform a switchover. In these instances, the active Cisco MGC remains in the active service state when a critical failure occurs. Switchovers can occur automatically (also known as failovers) when a critical alarm is generated, or a switchover can be performed manually, typically as part of a maintenance or troubleshooting procedure. For more information on performing a manual switchover, refer to the Performing a Manual Switchover section on page 3-99.

Note

When an automatic switchover is caused by the temporary loss of all Cisco MGC/IP continuity, the newly standby Cisco MGC can take upwards of 6 minutes to come in-service.

Fault-Tolerant Components
The following component processes of the Cisco MGC are fault-tolerant. In other words, each of these processes knows its own state (Active/Standby/Out-of-Service) and the corresponding state of its peer process on the standby system.

Process manager (procM)Spawns and manages all processes in the system Failover daemon (foverd)Determines and switches platform states Call engineHandles call-processing functions ReplicatorReplicates call states from the active Cisco MGC to the standby Cisco MGC I/O channel controller (IOCC)Manages the signaling messages I/O channel manager (IOCM)Manages the protocol-specific IOCCs

Failover Daemon
The active Cisco MGC runs the procM process. ProcM automatically starts when the Cisco MGC is booted and, in turn, starts the alarm manager, configuration manager, call engine, IOCCs, and other processes, including foverd. The continuous service architecture is controlled by the failover daemon. The failover daemons on both Cisco MGC hosts coordinate the active, standby, and OOS states of those hosts.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-101

Chapter 3 Regular Operations

Cisco MGC Node Operations

The alarm manager process also plays a significant role in a continuous service system. The alarm manager raises the alarm when a critical event occurs and clears the alarm when the condition that caused the alarm is cleared. See the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide for detailed information regarding alarms, specifically which alarms are critical. The foverd process directs manual switchovers. The switchover configuration provides the following:

Minimal interruption of service in the event of failure of a single machine Maintenance of a consistent configuration on both the active and standby Cisco MGCs Avoidance of false switchovers that could cause disruption of service

A critical event is typically a critical process dying or the failure of a subsystem or component that can critically affect call processing. A forced failover occurs automatically when the conditions governing it are met; it is system-initiated and not user-initiated. When a critical event occurs, the alarm manager sends a specific message to the foverd process, indicating the occurrence of the critical event. When the failover daemon receives notification that a critical event has occurred on the active Cisco MGC, the failover daemon initiates a forced switchover to the standby Cisco MGC. The standby Cisco MGC transitions immediately to the active state. For approximately three seconds, all messaging is lost. This affects established and new calls. The occurrence of a critical event on system A results in its peer, system B, becoming active while system A goes to an OOS state. Until the critical event that triggered the failover on system A is cleared, its state remains OOS. When the critical event is cleared, the alarm manager sends another message, known as a Clear Alarm message, to the foverd process. The foverd process drives system A to a standby state (if the peer system (B) is still in the active state). When the critical event is cleared, the failed controller (A) comes back online. It can then become the standby for the currently active Cisco MGC (B). Initially, system A is still OOS. The platform state of system A continues to be OOS until the critical event is cleared. The Call Engine checkpoints call information from the active Cisco MGC to the standby Cisco MGC. In addition, the state of the SS7 network is checkpointed by the MTP3 IOCC. The MTP2 terminal functionality resides on the Cisco SLTs to enable the fault-tolerant MTP3 solution. The Cisco SLTs are responsible for SS7 MTP2 message processing. The Cisco SLTs communicate directly with the Cisco MGC hosts (active and standby) using RUDP, but they send SS7 traffic only to the active Cisco MGC.

Note

The number of Cisco SLTs is dependent on the SS7 network traffic load and on link and linkset requirements. It is generally recommended that a minimum of two links per linkset, one link per Cisco SLT, be used to provide SS7 reliability. To further enhance redundancy, it is recommended that the links in a linkset be spread across multiple Cisco SLTs so that any single unit can be removed, added, or serviced without disrupting the SS7 network.

Circuit Auditing
An auditing process discovers discrepancies in circuit states between the Cisco MGC and the media gateways it controls. During a switchover, discrepancies might exist as to the state of bearer circuits (CICs) between the newly active Cisco MGC and the bearer devices it controls. Discrepancies in circuit states between the active Cisco MGC and the bearer devices could also occur as the result of control messages to the bearer devices that get lost. The circuit auditing mechanism can be run periodically at configured intervals or after an automatic or manual switchover. It can also be initiated manually using the MML command, sw-over::confirm. The audit capability is always initiated automatically on indication of critical error conditions from solution

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-102

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

components, adjacent SS7 switches, or when critical Cisco MGC conditions occur. The circuit-auditing mechanism detects and resolves circuit state discrepancies that it discovers and resynchronizes the Cisco MGC and the bearer devices. The circuit auditing mechanism is a function of the call engine process in the active Cisco MGC. The call engine subsystem starts a thread to perform the circuit-auditing function upon notification of a switchover event from the fault manager. The circuit auditing mechanism commands the bearer devices to reflect the circuit state of the Cisco MGC. If a bearer device believes the circuit to be in use and the Cisco MGC does not, the Cisco MGC releases the circuit. However, if the Cisco MGC shows that a bearer circuit is in use and discovers that the bearer device does not show that circuit as in use, the Cisco MGC does not attempt to rebuild the call, but releases all associated resources. Even though the Cisco MGC is the controlling authority, the only course of action when a discrepancy is discovered during a circuit audit is to release all of the allocated resources, which means dropping the call.

Checkpointing
Checkpointing of calls ensures that established calls are preserved in the event of a switchover. The Call Engine sends checkpoint events to the local checkpoint process at one point during call setup and at one point in the call release phase. Checkpointing is also applied to the following protocol supervisory messages and MML commands that change the logical state of the bearer circuits:

Blocking and Unblocking Messages and Commands Circuit Reset Messages and Commands

The local checkpointing process is responsible for securing these events to disk if the standby Cisco MGC is unavailable and for forwarding those events to the remote checkpointing process once it does become available. If the standby Cisco MGC is running, checkpoint events are batched and forwarded to the remote checkpointing process. The remote checkpointing process is responsible for handling the checkpoint events from the active Cisco MGC, delivering only established calls to the remote call engine. The remote call engine process begins checkpointing events for calls when it begins active call processing. The following scenarios are supported:

Standalone (no standby Cisco MGC available)You can specify the activation or deactivation of checkpointing. If checkpointing is activated, all checkpoint events are secured to disk. Startup (standby Cisco MGC unavailable)The local checkpointing process retains or secures all events until the standby Cisco MGC is available and a request for synchronization is completed. SynchronizationYou can request synchronization of the configurations of the two Cisco MGCs. This is required after startup and transition from the standalone Cisco MGC to the standby available configuration. SwitchoverIn the event of a switchover (or failover), the standby Cisco MGC assumes the primary responsibility for processing calls and securing checkpoint events.

Checkpointing is also implemented to support forward Cisco MGC software migration by one release. You can manually take the standby Cisco MGC out of service, upgrade the software to the new release, and resynchronize calls with the active Cisco MGC. For detailed procedures on upgrading the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-103

Chapter 3 Regular Operations

Cisco MGC Node Operations

Verifying the Patch Level of the Cisco MGC


As of Release 9.2 of the Cisco MGC software, you can verify the patch level of your Cisco MGC software by performing the following steps:
Step 1

Display the current patch level of your system by logging into the active Cisco MGC as root and entering the following UNIX command:
pkginfo | grep Patch

The system returns a response similar to the following:


application application application system CSCOgp003 CSCOgp009 CSCOgs003 SUNWswmt Cisco Cisco Cisco Patch Media Gateway Controller Software Patch Package Media Gateway Controller Software Patch Package Media Gateway Controller Software Patch Package Utilities

Look for the Cisco MGC patch with the largest number to determine the current patch level. In the example, the current protocol patch level is patch 9 (CSCOgp009), while the system patch level is patch 3 (CSCOgs003).

Note

For more information on the patches to the release of the Cisco MGC software you are running, refer to the release notes associated with your release. To determine which release of the Cisco MGC software you are running, enter the rtrv-ne MML command, as described in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2.

Step 2

Determine the patches available for your version of Cisco MGC software by entering the following URL on an Internet browser: http://www.cisco.com/kobayashi/sw-center/sw-voice.shmtl Select your software version from the list and a list of currently available patches displays. If you find that your patch level matches the current patch level on the web page, the procedure is complete. Otherwise, proceed to Step 3.

Step 3 Step 4 Step 5

Download the latest patches and associated installation instruction files to your active Cisco MGC. Open the instruction files and follow the procedures within to install the patches. Once you have installed the new patches, run the check inventory utility to ensure that the patches have installed correctly by entering the following UNIX commands:

Caution

This utility should not be run while the system is actively processing calls, as it can reduce the call processing rate.

Note

This utility can only be run by a user with root permissions. If you are not logged in as root, you must enter the UNIX command sudo before the utility name to ensure proper execution.

cd /opt/CiscoMGC/bin chk_inv [>file_path]

Note

You must be in the /opt/CiscoMGC/bin directory to run the check inventory utility.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-104

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Where file_path is an optional parameter used when you want to redirect the output of the utility to a file. If you do not redirect the output to a file, the results are written to your screen. For example, to redirect the results of the check inventory utility to a file called inv.out, you would enter the following command:
chk_inv >/opt/CiscoMGC/local/inv.out

Step 6

Review the utility results, either on-screen or by opening the file. If the results indicate that there are no problems with the installation, the procedure is complete. Otherwise, proceed to Step 7.

Caution

The check inventory utility uses a 32-bit cyclic redundancy check (CRC) to verify your systems software. A 32-bit CRC can have a value anywhere from 1 to over 4 billion. However, there is a slight possibility that two sets of data can have the same CRC value. If this should occur, you will recieve a false positive from the utility.

Note

If the utility results indicate that there is a problem with a part of the software outside of the Cisoc MGC software patch(es), you should determine whether a problem truly exists. The utility compares the software on your system against a master list, and it is possible that your environment may not be using every piece of software on that master list. If the utility indicates that a piece of software is missing, and your system configuration does not use that software, you do not need to load that software. However, if the utility identifies a problem with other software, and your system is using that software, proceed to Step 8.

Step 7 Step 8

Re-install the patch(es), repeating steps 3 through 6. If your second attempt at downloading and installing the patch(es) succeeds, the procedure is complete. Otherwise, proceed to Step 8. Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Retrieving Configuration Table Data


You can use the rtrv-cfg MML command to retrieve data from the configuration tables. The procedures to retrieve data from the various configuration tables are found in the following sections:

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software.

Retrieving alarm category data, page 3-106 Retrieving component data, page 3-106 Retrieving component type data, page 3-106 Retrieving measurement category data, page 3-107 Retrieving services data, page 3-107 Retrieving tables data, page 3-108 Retrieving default configuration parameters data, page 3-108

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-105

Chapter 3 Regular Operations

Cisco MGC Node Operations

Retrieving alarm category data


You can retrieve data from the alarm categories configuration table. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cfg:alarmcategories

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the alarm categories for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:37:59 M RTRV "Config Fail" "XE Rsrc Fail" "Gen Fail" . . .

For a complete listing of the alarm categories for the Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.

Retrieving component data


You can retrieve data from the components configuration table. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cfg:components

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the configured components on the Cisco MGC, which begins as follows:
MGC-01 - Media Gateway Controller 2001-06-12 15:00:46 M RTRV "MGC-02: KEY=00010001, PARENT=00000000, DESCR=Media Gateway Controller" "CFGG-01: KEY=00020001, PARENT=00010001, DESCR=Config Mgr Subsystem" "ALGG-01: KEY=00020002, PARENT=00010001, DESCR=Alarm Mgr Subsystem" "MSGG-01: KEY=00020003, PARENT=00010001, DESCR=Measurement Mgr Subsystem" "ENGG-01: KEY=00020004, PARENT=00010001, DESCR=Engine Subsystem" "IOSG-01: KEY=00020005, PARENT=00010001, DESCR=IO Subsystem" . . .

Retrieving component type data


You can retrieve data from the component types configuration table. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cfg:componenttypes

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-106

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the component types for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:24:01 M RTRV "LPC" "Proc Group" "Proc" "Equipment" "IO Card" . . .

For a complete listing of the component types for the Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.

Retrieving measurement category data


You can retrieve data from the measurement categories configuration table. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cfg:meascategories

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the measurement categories for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:26:56 M RTRV "ALL-COUNTERS" "LIF-GROUP" "LIF: SES" "LIF: ES" "LIF: CODE VIOLATION" . . .

For a complete listing of the measurement categories for the Cisco MGC, refer to the Appendix D, Cisco MGC Measurements.

Retrieving services data


You can retrieve data from the services configuration table. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cfg:services

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-107

Chapter 3 Regular Operations

Cisco MGC Node Operations

The system returns a list of the services on the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:32:24 M RTRV "ProcessManagement" "ProcessManagement_hi_pri" . . .

Retrieving tables data


You can retrieve data from the tables configuration table. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cfg:tables

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the tables for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:33:47 M RTRV "alarmCategories" "componentTypes" "components" "measCategories" "services" . . .

Retrieving default configuration parameters data


You can retrieve data from the default configuration parameters table. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cfg:dfltcfgparms

Note

The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the default configuration parameters for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:34:49 M RTRV "*.disableMeas" "*.sm_meas_baseaddr" "*.platformId" "*.transpathId" "*.tempDir" . . .

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-108

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Retrieving the Logging Level of Software Processes


You can use the rtrv-log MML command to retrieve the current logging level of a single process or of all of the processes. For more information on processes, refer to Understanding Processes section on page 3-4. To retrieve the current logging level of a single process, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-log:process

Where process is the MML name of the desired process. For a list of valid process names, refer to the Understanding Processes section on page 3-4. For example, to retrieve the current logging level of the call engine process (eng-01), you would enter the following command:
rtrv-log:eng-01

The system returns a response similar to the following:


Media Gateway Controller M RTRV "ENG-01:INFO" - MGC-01 2000-01-16 09:38:03

To retrieve the current logging level of all of the processes, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-log:all

The system returns a response similar to the following:


Media Gateway Controller M RTRV "ENG-01:INFO" - MGC-01 2000-01-16 09:38:03

Note

The process manager (PM-01) is not included in the "all" parameter, because this is a special process. To retrieve the logging level of PM-01, it must be used individually, as in the example above.

Retrieving System Statistics


You can retrieve various system statistics for the Cisco MGC using the MML command, rtrv-ne-health, and its subcommands. The system statistics are described in the following paragraphs:

Retrieving System State and Alarm Statistics, page 3-109 Retrieving Calling Statistics, page 3-110 Retrieving System Usage Statistics, page 3-111

Retrieving System State and Alarm Statistics


To display the platform state and alarm statistics, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-ne-health::sys

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-109

Chapter 3 Regular Operations

Cisco MGC Node Operations

The system returns a message similar to the following:


Media Gateway Controller 2000-06-07 16:39:41 M RTRV "Platform State:ACTIVE" "2 critical, 4 major, 8 minor active alarms"

If the platform state is not the value you expected, enter the same command on the other Cisco MGC to determine if it is the active Cisco MGC. If the other Cisco MGC is also not the active Cisco MGC, contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If you find that alarms are active, you can determine the current alarms using the procedure in the Retrieving All Active Alarms section on page 8-3.

Retrieving Calling Statistics


Enter the following MML command on the active Cisco MGC to display the machine congestion level, calls in progress, CPU utilization, and call success and failure statistics:
rtrv-ne-health::callp

The system returns a message similar to the following:


Media Gateway Controller 2000-06-07 16:39:41 M RTRV "Machine Congestion Level = MCL0 (No Congestion)" "Current in progress calls = 3, current call attempts = 1 cps" CPU 0 Utilization = 2% Memory (KB): 1622616 Free virtual, 4187104 Total virtual, 2097152 Total real "Interval (minutes) 15 60 1440" CALL:SuccCall TOT 900 3600 86400 CALL:FailCall TOT 0 0 0

Note

In a particular instance, the number of in-progress calls does not reflect the actual number of active calls. When an E1 link in a PBX comes up, CRMs are sent to the PBX for each channel to ensure that there are no active calls present in the PBX. This is done to ensure that synchronization can be maintained after a link failure on the IP side. These CRMs are treated as active calls, therefore increasing the number of in-progress calls returned by this command. If a large amount of CPU resources are being used over an extended period of time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If the response indicates that your system has a small amount of available real memory (512 in the above example), you may need to add additional memory to your Cisco MGC to handle your systems call processing load. Refer to your Sun Netra documentation for more information on how to add additional memory to a Cisco MGC host.

Note

Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-110

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

The amount of free and swap memory listed in the response (186 and 2048 in the above example) should be greater than 10 percent of the known total swap space and the total memory. If this is not the case, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.

Note

Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.

Retrieving System Usage Statistics


Enter the following MML command on the active Cisco MGC to display the processor, memory, and file system usage statistics:
rtrv-ne-health::load

The system returns a message similar to the following:


M Media Gateway Controller 2000-06-07 16:39:41 RTRV Platform State:ACTIVE "Machine Congestion Level (MCL) = 0 (No Congestion)" Current in progress calls = 15, call attempts = 5 cps "CPU 0 Utilization = 1%" "CPU 1 Utilization = 0%" "Memory (KB): 3234496 Free virtual, 8374208 Total virtual, 4194304 Total real" "Filesystem kbytes used avail capacity Mounted on" "/dev/dsk/c0t0d0s0 643172 17930 567357 4% /" "/dev/dsk/c0t0d0s4 4417988 2479741 1938247 56% /opt"

Note

In a particular instance, the number of in-progress calls does not reflect the actual number of active calls. When an E1 link in a PBX comes up, CRMs are sent to the PBX for each channel to ensure that there are no active calls present in the PBX. This is done to ensure that synchronization can be maintained after a link failure on the IP side. These CRMs are treated as active calls, therefore increasing the number of in-progress calls returned by this command. If a large amount of CPU resources are being used over an extended period of time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If the response indicates that your system has a small amount of available real memory (512 in the above example), you may need to add additional memory to your Cisco MGC to handle your systems call processing load. Refer to your Sun Netra documentation for more information on how to add additional memory to a Cisco MGC host.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-111

Chapter 3 Regular Operations

Cisco MGC Node Operations

Note

Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.

The amount of free and swap memory listed in the response (186 and 2048 in the above example) should be greater than 10 percent of the known total swap space and the total memory. If this is not the case, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.

Note

Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.

If the response to the command indicates a percentage of disk space capacity used 90 percent or higher, you must delete files from your disk drive, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

Managing System Measurements


The operations you can use to manage the Cisco MGCs system measurements are described in the following sections:

Retrieving Measurements, page 3-112 Clearing Measurements, page 3-113 Retrieving Link or Linkset Measurements, page 3-113 Retrieving SS7 Signaling Point Measurements, page 3-115 Retrieving Measurement Thresholds, page 3-124 Modifying Measurement Thresholds, page 3-125

Retrieving Measurements
You can view and search the measurements results stored in the measurements log file using the measurement viewer included in the Cisco MGC viewer toolkit. For more information on viewing and searching measurement log files, refer to the Viewing and Searching System Measurement Files section on page 3-139. For more information on log files, refer to Appendix A, Configuring Cisco MGC Log Files..

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-112

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Each measurement (or counter) is uniquely defined by its measurement category and component identification number. You can retrieve individual measurements using the following MML command from the active Cisco MGC:
rtrv-ctr:comp :"meas_cat "

Where:

compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of select provisioned components by entering the prov-rtrv:all MML command. meas_catThe desired measurement category. A complete list of measurement categories can be found in Appendix D, Cisco MGC Measurements.

For example, to view the ISUP IAM transmission measurement totals for a component called dpc1, enter the following MML command:
rtrv-ctr:dpc1:ISUP: XMIT IAM TOT

The system returns a message similar to the following:


MGC-01 - Media Gateway Controller 2000-07-11 10:15:50 M RTRV "dpc1:CAT=\ISUP: XMIT IAM TOT\,INT=300,VAL=353" "dpc1:CAT=\ISUP: XMIT IAM TOT\,INT=1800,VAL=2501"

Clearing Measurements
Each measurement (or counter) is uniquely defined by its measurement category and component identification number. You can retrieve individual measurements using the following MML command from the active Cisco MGC:
clr-ctr:comp :"meas_cat "

Where:

compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of selected provisioned components by entering the prov-rtrv:all MML command. meas_catThe desired measurement category. A complete list of measurement categories can be found in Appendix D, Cisco MGC Measurements.

For example, to clear the ISUP IAM transmission measurement totals for a component called dpc1, enter the following MML command:
clr-ctr:dpc1:ISUP: XMIT IAM TOT

Retrieving Link or Linkset Measurements


You can use the rtrv-lnk-ctr MML command to retrieve the system measurements for a single link, all the links in a linkset, or all links. For a complete list of system measurements, refer to Appendix D, Cisco MGC Measurements. To retrieve a list of system measurements for a single link, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-lnk-ctr:link

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-113

Chapter 3 Regular Operations

Cisco MGC Node Operations

Where link is the MML name of the SS7 link. For example, to view the measurements for a link called ls1link1, you would enter the following command:
rtrv-lnk-ctr:ls1link1

The system returns a response similar to the following:


MGC-03 - Media Gateway Controller 2000-08-22 16:32:23 M RTRV "ls1link1:CAT=\"SC: RCV FRM TOT\",INT=900,VAL=0" "ls1link1:CAT=\"SC: RCV FRM TOT\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: RCV FRM TOT\",INT=86400,VAL=0" "ls1link1:CAT=\"SC: XMIT FRM TOT\",INT=900,VAL=0" "ls1link1:CAT=\"SC: XMIT FRM TOT\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: XMIT FRM TOT\",INT=86400,VAL=0" "ls1link1:CAT=\"SC: RCV BAD TOT\",INT=900,VAL=0" "ls1link1:CAT=\"SC: RCV BAD TOT\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: RCV BAD TOT\",INT=86400,VAL=0" "ls1link1:CAT=\"C7LNK: MSU DROP-CONG\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: DUR UNAVAIL\",INT=1800,VAL=0" "ls1link1:CAT=\"SC: RCV BAD CRC\",INT=900,VAL=0" "ls1link1:CAT=\"SC: RCV BAD CRC\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: RCV BAD CRC\",INT=86400,VAL=0" "ls1link1:CAT=\"C7LNK: DUR IS\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: RCV SIO TOT\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: XMIT SIO TOT\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: RCV SU ERR\",INT=1800,VAL=0"

To retrieve a list of system measurements for the links that make up a linkset, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-lnk-ctr:linkset

Where linkset is the MML name of the SS7 linkset. For example, to view the measurements for each link within a linkset called ls1, you would enter the following command:
rtrv-lnk-ctr:ls1link1

The system returns a response similar to the following:


MGC-03 - Media Gateway Controller 2000-08-22 16:32:23 M RTRV "ls1link1:CAT=\"SC: RCV FRM TOT\",INT=900,VAL=0" "ls1link1:CAT=\"SC: RCV FRM TOT\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: RCV FRM TOT\",INT=86400,VAL=0" "ls1link1:CAT=\"SC: XMIT FRM TOT\",INT=900,VAL=0" "ls1link1:CAT=\"SC: XMIT FRM TOT\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: XMIT FRM TOT\",INT=86400,VAL=0" "ls1link1:CAT=\"SC: RCV BAD TOT\",INT=900,VAL=0" "ls1link1:CAT=\"SC: RCV BAD TOT\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: RCV BAD TOT\",INT=86400,VAL=0" "ls1link1:CAT=\"C7LNK: MSU DROP-CONG\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: DUR UNAVAIL\",INT=1800,VAL=0" "ls1link1:CAT=\"SC: RCV BAD CRC\",INT=900,VAL=0" "ls1link1:CAT=\"SC: RCV BAD CRC\",INT=3600,VAL=0" "ls1link1:CAT=\"SC: RCV BAD CRC\",INT=86400,VAL=0" "ls1link1:CAT=\"C7LNK: DUR IS\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: RCV SIO TOT\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: XMIT SIO TOT\",INT=1800,VAL=0" "ls1link1:CAT=\"C7LNK: RCV SU ERR\",INT=1800,VAL=0" "ls1link2:CAT=\"SC: RCV FRM TOT\",INT=900,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-114

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

"ls1link2:CAT=\"SC: RCV FRM TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: RCV FRM TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"C7LNK: MSU DROP-CONG\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: DUR UNAVAIL\",INT=1800,VAL=0" "ls1link2:CAT=\"SC: RCV BAD CRC\",INT=900,VAL=0" "ls1link2:CAT=\"SC: RCV BAD CRC\",INT=3600,VAL=0" "ls1link2 CAT=\"SC: RCV BAD CRC\",INT=86400,VAL=0" "ls1link2:CAT=\"C7LNK: DUR IS\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: RCV SIO TOT\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: XMIT SIO TOT\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: RCV SU ERR\",INT=1800,VAL=0"

To retrieve a list of system measurements for all the links on your Cisco MGC, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-lnk-ctr:all

The system returns a response similar to the following:


MGC-03 - Media Gateway Controller 2000-08-22 16:32:23 M RTRV "ls1link1:CAT=\"SC: RCV FRM TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: RCV FRM TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: RCV FRM TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: RCV FRM TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=86400,VAL=0" "ls2link1:CAT=\"SC: RCV FRM TOT\",INT=900,VAL=0" "ls2link1:CAT=\"SC: RCV FRM TOT\",INT=3600,VAL=0" "ls2link1:CAT=\"SC: RCV FRM TOT\",INT=86400,VAL=0" "ls2link1:CAT=\"SC: XMIT FRM TOT\",INT=900,VAL=0" "ls2link1:CAT=\"SC: XMIT FRM TOT\",INT=3600,VAL=0" "ls2link1:CAT=\"SC: XMIT FRM TOT\",INT=86400,VAL=0" "ls2link1:CAT=\"C7LNK: RCV SU ERR\",INT=1800,VAL=0" "ls2link2:CAT=\"SC: RCV FRM TOT\",INT=900,VAL=0" "ls2link2:CAT=\"SC: RCV FRM TOT\",INT=3600,VAL=0" "ls2link2:CAT=\"SC: RCV FRM TOT\",INT=86400,VAL=0" "ls2link2:CAT=\"SC: XMIT FRM TOT\",INT=900,VAL=0" "ls2link2:CAT=\"SC: XMIT FRM TOT\",INT=3600,VAL=0" "ls2link2:CAT=\"SC: XMIT FRM TOT\",INT=86400,VAL=0" "ls2link2:CAT=\"SC: RCV BAD TOT\",INT=900,VAL=0" "ls2link2:CAT=\"SC: RCV BAD TOT\",INT=3600,VAL=0"

Retrieving SS7 Signaling Point Measurements


You can use the rtrv-sp-ctr MML command to retrieve the system measurements for a single SS7 signaling point or for all SS7 signaling points. For a complete list of system measurements, refer to Appendix D, Cisco MGC Measurements.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-115

Chapter 3 Regular Operations

Cisco MGC Node Operations

To retrieve a list of system measurements for a single SS7 signaling point, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-sp-ctr:point_code

Where point_code is the MML name of the SS7 signaling point. For example, to view the measurements for a point code called dpc2, you would enter the following command:
rtrv-sp-ctr:dpc2

The system returns a response similar to the following:


MGC-02 - Media Gateway Controller 2001-06-13 14:08:39 M RTRV "dpc2:CAT=\"ISUP: XMIT BLA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT BLA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=1800,VAL=0" "dpc2:CAT=\"SP: cInit out\",INT=900,VAL=0" "dpc2:CAT=\"SP: cInit out\",INT=3600,VAL=0" "dpc2:CAT=\"SP: cInit out\",INT=86400,VAL=8" "dpc2:CAT=\"SP: PDU in\",INT=900,VAL=0" "dpc2:CAT=\"SP: PDU in\",INT=3600,VAL=0" "dpc2:CAT=\"SP: PDU in\",INT=86400,VAL=50" "dpc2:CAT=\"ISUP: XMIT CGB TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGB TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV BLA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV BLA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CQM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CQM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CVR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CVR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV LPA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV LPA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RSC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RSC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT ACM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT ACM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT UBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT UBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CCR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CCR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV UBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV UBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: UNEX MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: UNEX MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT IAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT IAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV IAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV IAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: UNREC MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: UNREC MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CFN TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CFN TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CCR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CCR TOT\",INT=1800,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-116

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

"dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP:

XMIT ANM TOT\",INT=300,VAL=0" XMIT ANM TOT\",INT=1800,VAL=0" XMIT COT TOT\",INT=300,VAL=0" XMIT COT TOT\",INT=1800,VAL=0" RCV ANM TOT\",INT=300,VAL=0" RCV ANM TOT\",INT=1800,VAL=0" RCV INR TOT\",INT=300,VAL=0" RCV INR TOT\",INT=1800,VAL=0" RCV COT TOT\",INT=300,VAL=0" RCV COT TOT\",INT=1800,VAL=0" XMIT BLO TOT\",INT=300,VAL=0" XMIT BLO TOT\",INT=1800,VAL=0" ABN REL TOT\",INT=300,VAL=0" ABN REL TOT\",INT=1800,VAL=0" XMIT REL TOT\",INT=300,VAL=0" XMIT REL TOT\",INT=1800,VAL=0" RCV CVR TOT\",INT=300,VAL=0" RCV CVR TOT\",INT=1800,VAL=0" RCV CGU TOT\",INT=300,VAL=0" RCV CGU TOT\",INT=1800,VAL=0" XMIT SUS TOT\",INT=300,VAL=0" XMIT SUS TOT\",INT=1800,VAL=0" XMIT CVT TOT\",INT=300,VAL=0" XMIT CVT TOT\",INT=1800,VAL=0" XMIT GRA TOT\",INT=300,VAL=0" XMIT GRA TOT\",INT=1800,VAL=0" RCV SUS TOT\",INT=300,VAL=0" RCV SUS TOT\",INT=1800,VAL=0" RCV FOT TOT\",INT=300,VAL=0" RCV FOT TOT\",INT=1800,VAL=0" RCV GRS TOT\",INT=300,VAL=0" RCV GRS TOT\",INT=1800,VAL=0" XMIT CFN TOT\",INT=300,VAL=0" XMIT CFN TOT\",INT=1800,VAL=0" XMIT UBL TOT\",INT=300,VAL=0" XMIT UBL TOT\",INT=1800,VAL=0" RCV CVT TOT\",INT=300,VAL=0" RCV CVT TOT\",INT=1800,VAL=0" XMIT LPA TOT\",INT=300,VAL=0" XMIT LPA TOT\",INT=1800,VAL=0" XMIT FAC TOT\",INT=300,VAL=0" XMIT FAC TOT\",INT=1800,VAL=0" RCV FAC TOT\",INT=300,VAL=0" RCV FAC TOT\",INT=1800,VAL=0" RCV CGUA TOT\",INT=300,VAL=0" RCV CGUA TOT\",INT=1800,VAL=0" RCV UBL TOT\",INT=300,VAL=0" RCV UBL TOT\",INT=1800,VAL=0" XMIT USR TOT\",INT=300,VAL=0" XMIT USR TOT\",INT=1800,VAL=0" XMIT CGUA TOT\",INT=300,VAL=0" XMIT CGUA TOT\",INT=1800,VAL=0" RCV USR TOT\",INT=300,VAL=0" RCV USR TOT\",INT=1800,VAL=0" RCV ACM TOT\",INT=300,VAL=0" RCV ACM TOT\",INT=1800,VAL=0" XMIT FOT TOT\",INT=300,VAL=0" XMIT FOT TOT\",INT=1800,VAL=0" XMIT PAM TOT\",INT=300,VAL=0" XMIT PAM TOT\",INT=1800,VAL=0" RCV CGB TOT\",INT=300,VAL=0" RCV CGB TOT\",INT=1800,VAL=0" RCV RLC TOT\",INT=300,VAL=0" RCV RLC TOT\",INT=1800,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-117

Chapter 3 Regular Operations

Cisco MGC Node Operations

"dpc2:CAT=\"ISUP: RCV REL TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV REL TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CRM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CRM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=300,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: XMIT MSU DROP/RTE\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=900,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=3600,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=86400,VAL=17" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=900,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=3600,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=86400,VAL=99" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=1800,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-118

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

To retrieve a list of system measurements for all the SS7 signaling points on your Cisco MGC, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-sp-ctr:all

The system returns a response similar to the following:


MGC-02 - Media Gateway Controller 2001-06-13 14:08:39 M RTRV "opc2" /* No active counters found for this component/category */ "dpc2:CAT=\"ISUP: XMIT BLA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT BLA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=1800,VAL=0" "dpc2:CAT=\"SP: cInit out\",INT=900,VAL=0" "dpc2:CAT=\"SP: cInit out\",INT=3600,VAL=0" "dpc2:CAT=\"SP: cInit out\",INT=86400,VAL=8" "dpc2:CAT=\"SP: PDU in\",INT=900,VAL=0" "dpc2:CAT=\"SP: PDU in\",INT=3600,VAL=0" "dpc2:CAT=\"SP: PDU in\",INT=86400,VAL=50" "dpc2:CAT=\"ISUP: XMIT CGB TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGB TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV BLA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV BLA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CQM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CQM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CVR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CVR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV LPA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV LPA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RSC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RSC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT ACM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT ACM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT UBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT UBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CCR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CCR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV UBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV UBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: UNEX MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: UNEX MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT IAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT IAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV IAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV IAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: UNREC MSG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: UNREC MSG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CFN TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CFN TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CCR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CCR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT ANM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT ANM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT COT TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT COT TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV ANM TOT\",INT=300,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-119

Chapter 3 Regular Operations

Cisco MGC Node Operations

"dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP:

RCV ANM TOT\",INT=1800,VAL=0" RCV INR TOT\",INT=300,VAL=0" RCV INR TOT\",INT=1800,VAL=0" RCV COT TOT\",INT=300,VAL=0" RCV COT TOT\",INT=1800,VAL=0" XMIT BLO TOT\",INT=300,VAL=0" XMIT BLO TOT\",INT=1800,VAL=0" ABN REL TOT\",INT=300,VAL=0" ABN REL TOT\",INT=1800,VAL=0" XMIT REL TOT\",INT=300,VAL=0" XMIT REL TOT\",INT=1800,VAL=0" RCV CVR TOT\",INT=300,VAL=0" RCV CVR TOT\",INT=1800,VAL=0" RCV CGU TOT\",INT=300,VAL=0" RCV CGU TOT\",INT=1800,VAL=0" XMIT SUS TOT\",INT=300,VAL=0" XMIT SUS TOT\",INT=1800,VAL=0" XMIT CVT TOT\",INT=300,VAL=0" XMIT CVT TOT\",INT=1800,VAL=0" XMIT GRA TOT\",INT=300,VAL=0" XMIT GRA TOT\",INT=1800,VAL=0" RCV SUS TOT\",INT=300,VAL=0" RCV SUS TOT\",INT=1800,VAL=0" RCV FOT TOT\",INT=300,VAL=0" RCV FOT TOT\",INT=1800,VAL=0" RCV GRS TOT\",INT=300,VAL=0" RCV GRS TOT\",INT=1800,VAL=0" XMIT CFN TOT\",INT=300,VAL=0" XMIT CFN TOT\",INT=1800,VAL=0" XMIT UBL TOT\",INT=300,VAL=0" XMIT UBL TOT\",INT=1800,VAL=0" RCV CVT TOT\",INT=300,VAL=0" RCV CVT TOT\",INT=1800,VAL=0" XMIT LPA TOT\",INT=300,VAL=0" XMIT LPA TOT\",INT=1800,VAL=0" XMIT FAC TOT\",INT=300,VAL=0" XMIT FAC TOT\",INT=1800,VAL=0" RCV FAC TOT\",INT=300,VAL=0" RCV FAC TOT\",INT=1800,VAL=0" RCV CGUA TOT\",INT=300,VAL=0" RCV CGUA TOT\",INT=1800,VAL=0" RCV UBL TOT\",INT=300,VAL=0" RCV UBL TOT\",INT=1800,VAL=0" XMIT USR TOT\",INT=300,VAL=0" XMIT USR TOT\",INT=1800,VAL=0" XMIT CGUA TOT\",INT=300,VAL=0" XMIT CGUA TOT\",INT=1800,VAL=0" RCV USR TOT\",INT=300,VAL=0" RCV USR TOT\",INT=1800,VAL=0" RCV ACM TOT\",INT=300,VAL=0" RCV ACM TOT\",INT=1800,VAL=0" XMIT FOT TOT\",INT=300,VAL=0" XMIT FOT TOT\",INT=1800,VAL=0" XMIT PAM TOT\",INT=300,VAL=0" XMIT PAM TOT\",INT=1800,VAL=0" RCV CGB TOT\",INT=300,VAL=0" RCV CGB TOT\",INT=1800,VAL=0" RCV RLC TOT\",INT=300,VAL=0" RCV RLC TOT\",INT=1800,VAL=0" RCV REL TOT\",INT=300,VAL=0" RCV REL TOT\",INT=1800,VAL=0" RCV CRM TOT\",INT=300,VAL=0" RCV CRM TOT\",INT=1800,VAL=0" XMIT CGBA TOT\",INT=300,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-120

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

"dpc2:CAT=\"ISUP: XMIT CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=300,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: XMIT MSU DROP/RTE\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=900,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=3600,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=86400,VAL=17" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=900,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=3600,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=86400,VAL=99" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=1800,VAL=0" "opc1" /* No active counters found for this component/category */ "dpc1:CAT=\"ISUP: XMIT BLA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT BLA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=1800,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-121

Chapter 3 Regular Operations

Cisco MGC Node Operations

"dpc1:CAT=\"SP: cInit out\",INT=900,VAL=0" "dpc1:CAT=\"SP: cInit out\",INT=3600,VAL=0" "dpc1:CAT=\"SP: cInit out\",INT=86400,VAL=1" "dpc1:CAT=\"SP: PDU in\",INT=900,VAL=0" "dpc1:CAT=\"SP: PDU in\",INT=3600,VAL=0" "dpc1:CAT=\"SP: PDU in\",INT=86400,VAL=13" "dpc1:CAT=\"ISUP: XMIT CGB TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CGB TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV BLA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV BLA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CQM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CQM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CVR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CVR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV LPA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV LPA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT RSC TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT RSC TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT ACM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT ACM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT UBA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT UBA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CCR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CCR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV UBA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV UBA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: UNEX MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: UNEX MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT IAM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT IAM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: UNREC MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: UNREC MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV IAM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV IAM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CFN TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CFN TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CCR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CCR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT ANM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT ANM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT COT TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT COT TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV ANM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV ANM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV INR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV INR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV COT TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV COT TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT BLO TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT BLO TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: ABN REL TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: ABN REL TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT REL TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT REL TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CVR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CVR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CGU TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CGU TOT\",INT=1800,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-122

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

"dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"C7SP: "dpc1:CAT=\"C7SP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"C7SP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP:

XMIT SUS TOT\",INT=300,VAL=0" XMIT SUS TOT\",INT=1800,VAL=0" XMIT CVT TOT\",INT=300,VAL=0" XMIT CVT TOT\",INT=1800,VAL=0" XMIT GRA TOT\",INT=300,VAL=0" XMIT GRA TOT\",INT=1800,VAL=0" RCV SUS TOT\",INT=300,VAL=0" RCV SUS TOT\",INT=1800,VAL=0" RCV FOT TOT\",INT=300,VAL=0" RCV FOT TOT\",INT=1800,VAL=0" RCV GRS TOT\",INT=300,VAL=0" RCV GRS TOT\",INT=1800,VAL=0" XMIT CFN TOT\",INT=300,VAL=0" XMIT CFN TOT\",INT=1800,VAL=0" XMIT UBL TOT\",INT=300,VAL=0" XMIT UBL TOT\",INT=1800,VAL=0" RCV CVT TOT\",INT=300,VAL=0" RCV CVT TOT\",INT=1800,VAL=0" XMIT LPA TOT\",INT=300,VAL=0" XMIT LPA TOT\",INT=1800,VAL=0" XMIT FAC TOT\",INT=300,VAL=0" XMIT FAC TOT\",INT=1800,VAL=0" RCV FAC TOT\",INT=300,VAL=0" RCV FAC TOT\",INT=1800,VAL=0" RCV CGUA TOT\",INT=300,VAL=0" RCV CGUA TOT\",INT=1800,VAL=0" RCV UBL TOT\",INT=300,VAL=0" RCV UBL TOT\",INT=1800,VAL=0" XMIT USR TOT\",INT=300,VAL=0" XMIT USR TOT\",INT=1800,VAL=0" XMIT CGUA TOT\",INT=300,VAL=0" XMIT CGUA TOT\",INT=1800,VAL=0" RCV USR TOT\",INT=300,VAL=0" RCV USR TOT\",INT=1800,VAL=0" RCV ACM TOT\",INT=300,VAL=0" RCV ACM TOT\",INT=1800,VAL=0" XMIT FOT TOT\",INT=300,VAL=0" XMIT FOT TOT\",INT=1800,VAL=0" XMIT PAM TOT\",INT=300,VAL=0" XMIT PAM TOT\",INT=1800,VAL=0" RCV CGB TOT\",INT=300,VAL=0" RCV CGB TOT\",INT=1800,VAL=0" RCV RLC TOT\",INT=300,VAL=0" RCV RLC TOT\",INT=1800,VAL=0" RCV REL TOT\",INT=300,VAL=0" RCV REL TOT\",INT=1800,VAL=0" RCV CRM TOT\",INT=300,VAL=0" RCV CRM TOT\",INT=1800,VAL=0" XMIT CGBA TOT\",INT=300,VAL=0" XMIT CGBA TOT\",INT=1800,VAL=0" XMIT RLC TOT\",INT=300,VAL=0" XMIT RLC TOT\",INT=1800,VAL=0" SP DUR UNAVAIL\",INT=300,VAL=0" SP DUR UNAVAIL\",INT=1800,VAL=0" XMIT CRM TOT\",INT=300,VAL=0" XMIT CRM TOT\",INT=1800,VAL=0" RCV UCIC TOT\",INT=300,VAL=0" RCV UCIC TOT\",INT=1800,VAL=0" RCV CGBA TOT\",INT=300,VAL=0" RCV CGBA TOT\",INT=1800,VAL=0" XMIT MSU DROP/RTE\",INT=1800,VAL=0" XMIT GRS TOT\",INT=300,VAL=0" XMIT GRS TOT\",INT=1800,VAL=0" RCV RSC TOT\",INT=300,VAL=0"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-123

Chapter 3 Regular Operations

Cisco MGC Node Operations

"dpc1:CAT=\"ISUP: RCV RSC TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT RES TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT RES TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT UCIC TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT UCIC TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV RES TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV RES TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV PAM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV PAM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV GRA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV GRA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT EXM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT EXM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CGU TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CGU TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV EXM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV EXM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT INF TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT INF TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV INF TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV INF TOT\",INT=1800,VAL=0" "dpc1:CAT=\"SP: cInit in\",INT=900,VAL=0" "dpc1:CAT=\"SP: cInit in\",INT=3600,VAL=0" "dpc1:CAT=\"SP: cInit in\",INT=86400,VAL=5" "dpc1:CAT=\"ISUP: RCV BLO TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV BLO TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CPG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CPG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"SP: PDU out\",INT=900,VAL=0" "dpc1:CAT=\"SP: PDU out\",INT=3600,VAL=0" "dpc1:CAT=\"SP: PDU out\",INT=86400,VAL=19" "dpc1:CAT=\"ISUP: RCV CQR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CQR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CRA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CRA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CPG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CPG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT INR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT INR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CRA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CRA TOT\",INT=1800,VAL=0"

Retrieving Measurement Thresholds


Each measurement has a profile that contains information concerning the time intervals, or thresholds, for reporting measurements. A profile can have unique thresholds set for 15-minute, 60-minute, and 24-hour intervals. Thus, each measurement can have up to three thresholds in its profile. To retrieve the thresholds for a particular measurement, enter the following MML command:
rtrv-thres::meas_cat

Where meas_cat is the desired measurement category. For example, to display the threshold settings for the measurement category, LIF: SES, you would enter the following MML command:
rtrv-thres::LIF: SES

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-124

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

The system returns a message similar to the following:


MGC-01 - Media Gateway Controller 2000-07-26 12:39:12 M RTRV "LIF: SES" ":INT=900,type=upper,clrthres=12,almthres=15,alarmcat=\"LIF SES 15\"" ":INT=3600,type=upper,clrthres=48,almthres=60,alarmcat=\"LIF SES 60\"" ":INT=86400,type=upper,clrthres=160,almthres=200,alarmcat=\"LIF SES 24\""

The INT field lists the thresholds for the 15-minute (900 seconds), 60-minute (3600 seconds) and 24-hour (86400 seconds) intervals. The type field identifies the threshold type, in this case, upper. The type field has two possible values, upper or down. Upper indicates that the alarm is generated when the measurement value gets above the alarm threshold value. The alarm is cleared when the measurement value falls below the clear threshold value. Down indicates that the alarm is generated when the measurement value falls below the alarm threshold. The alarm is cleared when the measurement value gets above this value. The response also shows the clear threshold value (clrthres), the alarm threshold value (almthres), and the alarm category associated with the measurement (alarmcat).

Modifying Measurement Thresholds


You can modify the thresholds for the system measurements. To do this, enter the following MML command at the active Cisco MGC:
set-thres::cat=meas_cat,interval= seconds,THRES=value

Where:

meas_catThe measurement category you want to modify. secondsThe number of seconds in the interval. The valid values are 900 for the 15-minute, 3600 for the 60-minute, and 86400 for the 24-hour interval. valueThe desired threshold value.

For example, to set the threshold to a value of 12 in the 15-minute (900 seconds) interval for the LIF: SES measurement category, enter the following command:
set-thres::cat=LIF: SES,interval=900,thres=12

Managing Call Detail Records


CDRs contain call billing records for your system. The Cisco MGC stores the CDRs in log files. For more information on log files, refer to Appendix A, Configuring Cisco MGC Log Files. For more information on CDRs, refer to the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. Procedures for managing CDR log files are found in the following sections:

Converting Individual CDR Files to ASCII Format, page 3-126 Converting Individual CDR Files to a Readable Format, page 3-126

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-125

Chapter 3 Regular Operations

Cisco MGC Node Operations

Converting Individual CDR Files to ASCII Format


You can convert individual CDR log files from their binary storage format to a comma-separated-value (CSV) format by entering the following UNIX command at the active Cisco MGC:
MGC_Toolkit cdrconvert -input cdrlogfile -output filename -outformat 1 [-follow]

Where:

cdrlogfileName of the CDR log file to be converted, including the file path. filenameName for the file that is output by execution of this command, including the file path. -outformat 1Specifies that the output file should be in CSV format. -followUsed when you are converting the active CDR file. Processing of the active CDR file continues as CDR logs are created in the active file. Processing is stopped when you enter a Control C.

For example to convert an archived CDR log file from binary format to CSV format, you would enter the following UNIX command:
MGC_Toolkit cdrconvert -input /opt/CiscoMGC/var/spool/cdr_20011113100350_002172.bin -output /tmp/cdr.csv -outformat 1

The output file stores the CDR log file data in a manner similar to the following:
1090,,1,2001/Nov/13 EST 10:3:50,0X0000000000000000,2001/Nov/13 10:3:50 ,MGC-CDR-NODE-STRING 1100,,1,2001/Nov/13 EST 10:18:50,0X0000000000000000,2001/Nov/13 EST 10:18:50,2,MGC-CDR-NODE-STRING

Converting Individual CDR Files to a Readable Format


You can view the CDR results stored in the CDR log file using the CDR viewer included in the Cisco MGC viewer toolkit. For more information on viewing CDR log files using the CDR viewer, refer to the Using the Call Detail Record Viewer section on page 3-131. You can also convert the contents of individual CDR log files to a readable format using the following UNIX command entered at the active Cisco MGC:
MGC_Toolkit cdrconvert -input cdrlogfile -output filename -outformat 2 [-follow]

Where:

cdrlogfileName of the CDR log file to be converted, including the file path. filenameName for the file that is output by execution of this command, including the file path. -outformat 2Specifies that the output file should be in a readable format. -followUsed when you are converting the active CDR file. Processing of the active CDR file continues as CDR logs are created in the active file. Processing is stopped when you enter a Control C.

For example to convert an archived CDR log file from binary format to a readable format, you would enter the following UNIX command:
MGC_Toolkit cdrconvert -input /opt/CiscoMGC/var/spool/cdr_20011113100350_002172.bin -output /tmp/cdr.csv -outformat 2

The output file stores the CDR data in a manner similar to the following:
0X0000000000000000 ----------------------------------------0X0000000000000000 File_Header(1090)

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-126

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000

Unique_Call_ID(5000): Ver(4000): 1 Create_Tm(4001): 2001/Nov/13 10:3:50 EST Call_Ref_ID(4002): 0X0000000000000000 File_Start_Time(6001): 2001/Nov/13 10:3:50 EST Host_ID(6000): MGC-CDR-NODE-STRING MGC_Version(6004): "9.1(4.3)" --------------------------------------------------------------------------------File_Footer(1100) Unique_Call_ID(5000): Ver(4000): 1 Create_Tm(4001): 2001/Nov/13 10:18:50 EST Call_Ref_ID(4002): 0X0000000000000000 File_End_Time(6002): 2001/Nov/13 10:18:50 EST Total_CDBNum(6003): 2 Host_ID(6000): MGC-CDR-NODE-STRING MGC_Version(6004): "9.1(4.3)" -----------------------------------------

Using the Cisco MGC Viewer Toolkit


This section describes the various components of the Cisco MGC viewer toolkit. The Cisco MGC viewer toolkit is used to view different types of files on the Cisco MGC. This section describes the various components and the toolkit concept as a whole. The Cisco MGC viewer toolkit is a suite of viewing tools that were developed to run on the Cisco MGC to provide quick and efficient access to diagnostic and troubleshooting information. The following viewers are discussed in the following subsections:

Launching the Cisco MGC Toolbar, page 3-128 Using the Alarm Viewer, page 3-128 Using the Call Detail Record Viewer, page 3-131 Using the Config-Lib Viewer, page 3-135 Using the Log Viewer, page 3-136 Using the Measurement Viewer, page 3-139 Using the Trace Viewer, page 3-142 Using the Translation Verification Viewer, page 3-142 Using the File Options Viewer, page 3-148 Using the MGC Backup Viewer, page 3-149 Using the MGC Restore Viewer, page 3-149

The Cisco MGC toolbar (Figure 3-1) is a graphical user interface (GUI) application used to launch the various viewers in the toolkit. Each application runs independently of the others. The toolbar includes a button for launching each application in the toolkit.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-127

Chapter 3 Regular Operations

Cisco MGC Node Operations

Figure 3-1

Cisco MGC Toolbar

You can run multiple instances of the Cisco MGC toolbar at one time, but only one instance of each tool at a time. If the selected application is already running, a message is displayed stating that your user ID and the application are already running. However, different tools can be run simultaneously. There is also a Close button on the toolbar, which is used to close the toolbar; however, closing the toolbar does not stop toolkit applications that are already running.

Caution

The potential exists for foreground (text) and background (non-text) settings to conflict because your local display settings might conflict with the toolkits color settings, thus rendering the text within various fields in the toolkit applications unreadable. If you have problems reading text on any of the toolkit screens, please change the foreground color to a darker color on your display to see if that solves the problem.

Launching the Cisco MGC Toolbar


To launch the Cisco MGC toolbar, log in to the active Cisco MGC, and enter the following command at the UNIX prompt:
MGC_Toolkit

Note

For optimal performance, your display should be set to 1024 pixels. The MGC Toolbar window is displayed.

Using the Alarm Viewer


The alarm viewer helps you view and search records that reside in the current and archived alarm record logs. The formats of the various alarm records are specified in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. The alarm viewer includes a help file, which contains information about the viewer. To access this information, click the Help menu, select ReadMe, and the help text is displayed. You can also access a listing of the current alarm log files by clicking on the File menu and selecting the Alarm List option. You can exit the alarm viewer in one of two ways: in the Query Criteria portion of the window, click Exit; or from the File menu, select Exit.

Viewing and Searching Alarm Record Files


Complete the following steps to view and search various system alarm files:
Step 1

Open the alarm viewer. To do this, click Alarm Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The Alarm Viewer window loads and displays (as shown in Figure 3-2).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-128

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Figure 3-2

Alarm Viewer Window

Step 2

You can view current alarms as they happen. To do this, select the Alarm Continuous<ACTIVE, NEW>,Not Filtered check box. The current alarms are displayed in the field at the bottom of the viewer, and alarms are added to the field as they occur. To stop displaying current alarms, de-select the check box. You can search for alarms that occurred between a certain dates and times, specifying month, day, year, hour, and minute settings. To do this, select a starting date and time from the Start Date/Time drop-down list boxes and then select a stopping date and time from the Stop Date/Time drop-down list boxes. The current date and time are the default values for both the start and stop values for the time period; however, using these default values results in a null search (no records). The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to be performed up until the current date and time.

Step 3

Step 4

To search by a component, select a component type from the Component Type drop-down list box. If you do not want to search by a component or you want to view the entire contents of the file(s), select the ALL entry. Click the drop-down list box to the right of the Component Type list box to select subcomponents for the component you selected. If you do not want to specify an individual subcomponent, or you want to view the entire contents of the file(s), select the NO_SPECIFIC entry.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-129

Chapter 3 Regular Operations

Cisco MGC Node Operations

Step 5

To search by an alarm category, select a category type from the alarm category drop-down list box. If you want to select one or more alarm categories, click the Select check box and select your desired alarm categories (if you want to select multiple categories, you must hold down the Ctrl key while selecting). If you do not want to search by a category or you want to view the entire contents of the file(s), select the ALL check box. Click Execute to search the files within the selected time frame. The contents are displayed as multicolored text in the field at the bottom of the window.Alarm Record View Tab Window The following list describes the text colors associated with each alarm severity level

Step 6

CommentsWhite ClearedGreen InformationBlue WarningYellow ErrorOrange CriticalRed

Step 7

If you want to view the logs that may be associated with this alarm, click Log Viewer and the Log Record View tab window is displayed (see Figure 3-3). By default, the viewer searches the platform log files for related logs that occurred within 60 seconds before and after the alarm occurred. If you want to modify the criteria for the related logs search, click the LogView menu. This menu has two options, to modify the name of the log file to be searched (the log file prefix) and to modify the period the search occurs (the log time range). To modify the name of the log file to be searched, click the LogView menu and select the Log File Prefix option. The Log File Prefix window displays. Select the contents of the Log File Prefix field and enter the desired log file name. Click Set to close this window. To modify the period of the search, click the LogView menu and select the Log Time Range option. The Log Time Range window displays. Select the contents of the Time Before Alarm field and enter the desired period in seconds. Select the contents of the Time After Alarm field and enter the desired period in seconds. Click Set to close this window.

Step 8

If you want to perform additional searches, repeat steps 2 to 6. The color of the text from the old search changes from multicolored to blue, and the newly requested search data is inserted as multicolored text, appearing after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. You can also reset the search criteria by clicking Reset. If you want to save the displayed data, click Save. The contents of the field are saved to a file with the following directory path: /opt/CiscoMGC/etc/cust_specific/toolkit/alarmRec.log If you perform another search and save that content again, the contents of the field are added into the alarmRec.log file, after the previously saved data. If you do not want the new search data to be added onto the previous data, you must change the name of the alarmRec.log file before you save the new data. To change the name of a file, refer to the procedures in the Using the File Options Viewer section on page 3-148.

Step 9

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-130

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Figure 3-3

Log Record View Tab Window

Using the Call Detail Record Viewer


CDRs contain basic call billing information, such as date and time, duration, and the calling number and called number. CDRs are written into files that contain information about telephone activity. CDR files are saved in a binary format.

Note

For more information on CDRs, refer to the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. The CDR dumper (see Figure 1-2) provides logging capabilities on the Cisco MGC for all CDRs. Also, the CDR dumper supports external user application programming interfaces (APIs). The APIs allow users to get a real-time feed of CDRs and call detail blocks (CDBs) from the Cisco MGC that can be routed to a third-party mediation application for use in billing. The CDR dumper operates according to the configuration set up in the XECfgParm file. When certain thresholds are met, the CDR dumper closes and saves the generated CDB records into the $BASEDIR/var/spool directory.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-131

Chapter 3 Regular Operations

Cisco MGC Node Operations

The CDR viewer is designed to help you view and search call detail records that reside in the CDR logs. The formats of the CDBs and call data elements (CDEs) that comprise CDRs are specified in the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. These records are designed for database loading, not user reading. The CDR viewer can help you understand these records, and it also provides useful searching functions based on the search criteria you select.

Note

Your screen might be slightly different from this example, depending on which release of the software you are running. You can exit the CDR viewer in one of two ways: in the Query Criteria portion of the window, click Exit, or from the File menu, select Exit.

Configuring the CDR Viewer


Whenever you start the CDR viewer, you must choose several configuration settings before you can view or search the CDR files. To do this, complete the following steps:
Step 1

Open the CDR viewer. To do this, click CDR Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The CDR Viewer window loads and displays. Click the Configuration tab. The Configuration tab window displays (Figure 3-4). The first five fields in the window cannot be modified. These fields list the directory paths and file names for the related data files.

Step 2

Step 3 Step 4

You can modify the CDR source directory on your local host. To do this, click in the CDR Data Directory field and change the displayed information. You can specify the message type(s) to be queried. All message types are enabled for querying by default. If you want to filter out certain message types, select these message types from the All Possible Message Types field and click on the right arrow button. Your selected message types are displayed in the Selected filtering field. To remove a message type from the Selected filtering field, select that message type in that field and click the left arrow button.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-132

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Figure 3-4

Config Tab Window

Searching the CDR Files


You can search through the various CDR files by component and category. To do this, complete the following steps:
Step 1

Open the CDR viewer. To do this, click CDR Viewer on the Cisco MGC toolbar. A popup window displays, warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The CDR Viewer window loads and displays the Query tab window by default (Figure 3-5). If you have just opened the viewer, you must configure it before you can search the CDR files. Refer to the Configuring the CDR Viewer section on page 3-132.

Step 2

You can search for logs that occurred between a certain dates and times, specifying month, day, year, hour, and minute settings. To do this, select a starting date and time from the Start Date/Time drop-down list boxes and then select a stopping date and time from the Stop Date/Time drop-down list boxes.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-133

Chapter 3 Regular Operations

Cisco MGC Node Operations

Figure 3-5

Query Tab Window

The current date and time are the default values for both the start and stop values for the time period; however, using these values results in a null search (no records). The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to continue to the current date and time.
Step 3

If you want to view your selected CDR file(s) in their entirety, proceed to Step 7. If you want to search through your selected CDR file(s) for particular type(s) of CDRs, proceed to Step 4.

Step 4

You can search through your selected CDR files based on seven different field values. They are as follows:

Calling Party Number Dialed Party Number Originating Trunk Group Number Terminating Trunk Group Number Originating Trunk Number Terminating Trunk Number Call Reference ID

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-134

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

To select a field value, click the check box next to the name. You can select as few or as many field values as you require.
Step 5

Enter a search qualifier and related string for each of the field values you selected. To do this, choose a search qualifier, as defined below, for the search string from the drop-down list box to the right of a field value you have selected.

Equal toThe selected field in the CDB is equal to the value defined in the search string. HasAny substring of the selected field in the CDB has the value defined in the search string. Begins withThe selected field in the CDB begins with the value defined in the search string. Ends withThe selected field in the CDB ends with the value defined in the search string.

Enter a search string in the field to the right of the search qualifier you just chose. Repeat this step for all field values that you have selected for your search.
Step 6

Choose a query operator (AND or OR) for your search. You can search for CDBs that have all of the field values you selected (AND), or you can search for CDBs that have any of the field values you selected (OR). The default value is AND. Click the appropriate check box to specify your query operator. Click Execute to search the files within the selected time frame. A popup window displays while the contents load. The contents are displayed as multicolored text in the field at the bottom of the window. If you want to perform additional searches, repeat steps 2 to 13. The color of the text from the old search changes from multicolored to black, and the newly requested search data is inserted as multicolored text, appearing after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. You can also reset the search criteria by clicking Reset. If you want to save the displayed data, click Save. The contents of the field are saved to the file you specified in the Config tab window. If you perform another search and save that content again, the contents of the field are added to the same file, after the previously saved data. If you do not want the data to be added to the previous data, you must change the name of the file before you save again. To change the name of a file, refer to the procedures in the Using the File Options Viewer section on page 3-148.

Step 7 Step 8

Step 9

Using the Config-Lib Viewer


You can use the Config-Lib viewer (Figure 3-6) to manage the contents of the configuration library. The configuration library stores the various system configurations that you created while you provisioned your Cisco MGC. Click CONFIG-LIB on the Cisco MGC toolbar to open an xterm window and execute the config-lib script. To quit the Config-Lib viewer, enter q at the prompt. The Config-Lib Viewer enables you to do the following functions:

List Configuration Versions in LibraryReturns a listing of the configuration versions stored in the library and identifies the configuration that is currently being used (referred to as the production version). To activate this function, enter 1 at the prompt. Save Production to a new Library VersionSaves your current configuration settings to a new version file. When you select this function, the Cisco MGC software must not be running, or an error message is displayed. For more information on stopping the Cisco MGC software, refer to the Shutting Down the Cisco MGC Software Manually section on page 2-4. To activate this function, enter 2 at the prompt and then enter the name for the new library version.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-135

Chapter 3 Regular Operations

Cisco MGC Node Operations

Figure 3-6

Config-Lib Viewer

Copy Library Version to ProductionRestores your Cisco MGC to the settings in an old configuration version. When you select this function, the Cisco MGC software must not be running, or an error message is displayed. For more information on stopping the Cisco MGC software, refer to the Shutting Down the Cisco MGC Software Manually section on page 2-4. To activate this function, enter 3 at the prompt and then enter the number of the library version to be set as the production version.

Note

We recommend that you not attempt to restore an old configuration version without the assistance of the Cisco TAC.

Remove Configuration Library VersionDeletes a configuration version from the library. When you select this function, the Cisco MGC software must not be running, or an error message is displayed. For more information on stopping the Cisco MGC software, refer to the Shutting Down the Cisco MGC Software Manually section on page 2-4. To activate this function, enter 4 at the prompt and then enter the number of the library version to be deleted.

Using the Log Viewer


The log viewer allows you to search for, retrieve, and display log messages from the platform log files. For more information on platform log files refer to the Recovering from a Switchover Failure section on page 8-159. For a listing of the platform log messages, refer to the Cisco Media Gateway Controller Software Release 9 Software Messages Reference Guide. You can see a listing of the current log file names by clicking the File menu and selecting the Log List option. You can exit the log viewer in one of two ways: click Exit, or from the File menu, select Exit.

Searching Log Record Files


Complete the following steps to search through various platform log files:
Step 1

Open the log viewer. To do this, click Log Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The Log Viewer window loads and displays (Figure 3-7).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-136

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Figure 3-7

Log Viewer

Step 2

You can search for logs that occurred between certain dates and times, specifying month, day, year, hour, and minute settings. To do this, select a starting date and time from the Start Date/Time drop-down list boxes and then select a stopping date and time from the Stop Date/Time drop-down list boxes. The current date and time are the default values for both the start and stop values for the time period; however, using these values results in a null search (no records). The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to continue to the current date and time.

Note Step 3

You can clear the query options you select at any time by clicking Reset Query Options.

If you want to view all of the logs within the time range you have specified in Step 3, click the Show All check box. If you select this option, your search can be only based on a text string. Go to Step 6 for more information on performing text searches. If you do not want to view all of the logs within the time range you have specified, proceed to Step 4 to further refine your search criteria before displaying the logs.

Step 4

You can search for logs within certain log categories. To do this, select your desired category or categories by clicking one or more entries in the Category list box. To select multiple entries, hold down either the Ctrl or Shift key while clicking. The available categories are:

GEN

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-137

Chapter 3 Regular Operations

Cisco MGC Node Operations

Step 5

ENV TIOS CP PROT MGMT MML

You can search for logs of certain severities. To do this, select a severity or severities by clicking one or more entries in the Severity list box. To select multiple entries, hold down either the Ctrl or Shift key while clicking. The severity choices are cumulativeeach level selected also displays all levels below it. For example, the ERR selection displays both ERR (error) and CRIT (critical) messages. The severity levels are

TRACE INFO WARN ERR CRIT

Step 6

You can search for logs that contain certain text string(s). You can search for up to two text strings. To do this, enter the desired search string(s) in the Text String fields. The text is case-sensitive, and all characters are allowed. If you want to search by only one text string, enter that string in the upper Text String field, and do not enter a string in the lower Text String field. If you want to search using two text strings, enter your strings in the upper and lower Text String fields. If you want to search for logs that contain both of your text strings, select the And check box. If you want to search for logs that contain either of your text strings, select the Or check box. If you want the text search to match the case used in your text string(s), click the Match Case check box. If you do not want to search for text strings, click the None check box.

Step 7

You can also choose to display debug messages. Debug messages do not conform to the log message format. If you select this option, the debug messages are filtered only on the date/time and text strings. To display debug messages, click the Show Debug messages check box. The viewer displays debug messages similar to the following:
platform.log : currently active log Fri Apr 14 17:57:19:253 2000 | ProcessManager (PID 24929) <Debug> initialized process info for 'POM-01' Fri Apr 14 17:57:25:908 2000 | ProcessManager (PID 24929) <Debug> Received heartbeat response from process CFM-01

Caution Step 8

Displaying debug messages can seriously impact system performance. Click Execute Query to display the results of your search. The results are displayed in the field at the bottom of the window, in increments of 5 MB blocks. While the application is searching through the log files, a dialog box appears and shows the progression of the search. If you want to stop a search in progress, click Stop Query in the dialog box.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-138

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Note

Stopping the query can take several seconds.

Your results may run to several pages of information. You can use several buttons to navigate through your results. To go to the end of your results, click Bottom. To go to the next page of results, click More. To go to the beginning of your results, click Top.
Step 9

If you want to save the displayed data, click the File menu and select Save. A popup window lists the default save directory (/opt/CiscoMGC/etc/cust_specific/toolkit). Enter a file name for your data in the File Name field and click Save. If you want to perform additional searches, repeat steps 2 to 9. The old search data is appended to the new search data. You can clear the display field by clicking Clear before you click Execute Query.

Step 10

Using the Measurement Viewer


The measurement viewer helps you view and search records that reside in the measurement record logs. The formats of the various measurement records are specified in Appendix D, Cisco MGC Measurements. The measurement viewer includes a help file, which contains information about the viewer. To access this information, click the Help menu, select ReadMe, and the help text is displayed. You can also see a listing of the current measurement logs by clicking the File menu and selecting the Measurement List option. You can exit the measurement viewer in one of two ways: in the Query Criteria portion of the window, click Exit; or from the File menu, select Exit.

Viewing and Searching System Measurement Files


Complete the following steps to view and search various system measurement files:
Step 1

Open the measurement viewer. To do this, click Measurement Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The Measurement Viewer window is displayed (Figure 3-8). You can search for logs that occurred between certain dates and times, by specifying date, time, and counter interval settings. To do this, perform the following steps:
a.

Step 2

Select a starting date and time from the Start Date/Time drop-down list boxes.

Note

The current date and time are the default values for both the start and stop values for the time period; however, using these values results in a null search (no records).

b.

Select a stopping date and time from the Stop Date/Time drop-down list boxes.

Note

The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to continue to the current date and time.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-139

Chapter 3 Regular Operations

Cisco MGC Node Operations

Figure 3-8

Measurement Viewer Window

c.

If you want to further refine your search by specifying a counter interval, select an interval from the Counter Interval drop-down list box. The following intervals are valid for this field:
NO_SPECIFIC (default value) 5_Minute 15_Minute 30_Minute 60_Minute 24_Hours

d.

If you want to further refine your search by specifying a system component type, proceed to Step 3. If you want to further refine your search by specifying a measurement category type, proceed to Step 4. If you want to execute a search based on your current search criteria, proceed to Step 5.

Step 3

To search by a system component, perform the following steps:


a.

Select a system component type from the Component Type drop-down list box. If you do not want to search by a system component or you want to view the entire content of the file(s), select the ALL entry in the Component Type list box.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-140

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Note

When you select a system component type, the drop-down list box to the right of the Component Type list box fills with the names of the system components of that type configured on your system.

b.

If you want to further refine your search by specifying a particular system component, select a system component name from the drop-down list box to the right of the Component Type list box.

Note

The default value for this field is to search for all system components of the selected component type.

c.

If you want to further refine your search by specifying a measurement category type, proceed to Step 4. If you want to execute a search based on your current search criteria, proceed to Step 5.

Step 4

To search by a measurement category, perform the following steps:


a.

Select a measurement category type from the Category Type drop-down list box. If you do not want to search by a measurement category or you want to view the entire content of the file(s), select the ALL entry in the Category Type list box.

Note

When you select a measurement category type, the drop-down list box to the right of the the Category Type list box fills with the names of all of the measurements associated with that type.

b.

If you want to further refine your search by specifying a particular measurement, select a measurement from the drop-down list box to the right of the Category Type list box.

Note Step 5 Step 6

The default value for this field is to search for all measurements of the selected category.

Click Execute to search the files within the selected time frame. The results of the search are displayed as blue text in the field at the bottom of the window. If you want to perform additional searches, repeat steps 2 to 5. The color of the text from the old search changes from blue to black and the newly requested search data is inserted as blue text, appearing after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. You can also reset the search criteria by clicking Reset.

Step 7

If you want to save the displayed data, click Save. The contents of the field are saved to a file with the following directory path: /opt/CiscoMGC/etc/cust_specific/toolkit/measRec.log If you perform another search and save the resulting content, the contents of the field are added into the measRec.log file, after the previously saved data. If you do not want the new search data to be added to the previous data, you must change the name of the measRec.log file before you save the new data. To change the name of a file, refer to the procedures in the Using the File Options Viewer section on page 3-130.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-141

Chapter 3 Regular Operations

Cisco MGC Node Operations

Using the Trace Viewer


You can use the trace viewer as part of performing a call trace. Clicking Trace Viewer in the Cisco MGC toolbar opens the Traces Files window, which lists the call trace files from which you can choose (Figure 3-9). When you select a file, you can click View, which opens the Trace Viewer window (Figure 3-10), which allows you to perform a variety of call trace activities. For more information about call traces, refer to the Performing a Call Trace section on page 8-148.
Figure 3-9 Trace Viewer Window

Figure 3-10 Trace Viewer Window

Using the Translation Verification Viewer


The translation verification viewer allows you to interface with the translation verification tool. The translation verification tool provides you with a means to understand how calls are being processed based on your systems dial plan. This tool creates a simulation of a call being processed by the dial plan. This tool is meant for use in systems configured for call control.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-142

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Note

The translation verification viewer does not simulate the screening database and cause analysis dial plan functions. You can exit the translation verification viewer by clicking on the File menu and selecting Exit.

Verifying a Dial Plan Translation


Complete the following steps to verify a dial plan translation:
Step 1

Open the translation verification viewer. To do this, click Translation Verification on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes. The Translation Verification Viewer window loads and the DialPlan Translation tab window is displayed by default (Figure 3-11). Enter the incoming trunk group number for your simulated call in the trunk group number field. Specify an ISDN preference for the selecting of the outgoing trunk by choosing a value from the message specific ISDN preference drop-down list box. The following values are valid for this field.

Step 2 Step 3

ISDN_NOT_REQUIRED (default value) ISDN_PREFERRED ISDN_REQUIRED

Step 4

Specify the Nature Of Address (NOA) setting for the called party by selecting a value from the called partys Nature of Address drop-down list box. The following values are valid for this list.

NOA_NATIONAL (default value) NOA_NONE NOA_UNKNOWN NOA_SUBSCRIBER NOA_INTERNATIONAL NOA_NETWORK NOA_MERIDIAN NOA_ABBR NOA_UNIQUE_3DIG_NATL_NUM NOA_ANI NOA_NO_ANI_RECD NOA_NON_UNIQUE_SUBSCRIBER NOA_NON_UNIQUE_NATIONAL NOA_NON_UNIQUE_INTERNATIONAL NOA_OPRREQ_TREATED NOA_OPRREQ_SUBSCRIBER NOA_OPRREQ_NATIONAL NOA_OPRREQ_INTERNATIONAL NOA_OPRREQ_NO_NUM

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-143

Chapter 3 Regular Operations

Cisco MGC Node Operations

Figure 3-11 DialPlan Translation Tab Window

NOA_CARRIER_NO_NUM NOA_950_CALL NOA_TEST_LINE_CODE NOA_INT_INBOUND NOA_NAT_OR_INTL_CARRIER_ACC_CODE_INC NOA_CELL_GLOBAL_ID_GSM NOA_CELL_GLOBAL_ID_NMT_900 NOA_CELL_GLOBAL_ID_NMT_450 NOA_CELL_GLOBAL_ID_AUTONET NOA_PORTED_NUMBER NOA_PISN_SPECIFIC_NUMBER NOA_UK_SPECIFIC_ADDRESS NOA_SPARE NOA_SUBSCRIBER_OPERATOR_REQUESTED NOA_NATIONAL_OPERATOR_REQUESTED NOA_INTERNATIONAL_OPERATOR_REQUESTED

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-144

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Step 5

NOA_NO_NUMBER_PRESENT_OPERATOR_REQUESTED NOA_NO_NUMBER_CUT_THROUGH_TO_CARRIER NOA_950_PUBLIC_HOTEL_LINE NOA_TEST_CALL NOA_MCI_VNET NOA_INTERNATIONAL_OPERATOR_TO_OPERATOR_OUTSIDE_WZI NOA_INTERNATIONAL_OPERATOR_TO_OPERATOR_INSIDE_WZI NOA_DIRECT_TERMINATION_OVERFLOW NOA_ISN_EXTENDED_INTERNATIONAL_TERMINATION NOA_TRANSFER_ISN_TO_ISN NOA_CREDIT_CARD RESERVED

Specify the Numbering Plan Indicator (NPI) setting for the called party by selecting a value from the called partys Numbering Plan Indicator drop-down list box. The following values are valid for this field.

NPI_E164 (default value) NPI_NONE NPI_DATA NPI_TELEX NPI_PNP NPI_NATIONAL NPI_TELEPHONY NPI_MARITIME_MOBILE NPI_LAND_MOBILE NPI_ISDN_MOBILE

Step 6 Step 7 Step 8

Specify the called number in the called numbers field. Specify the calling number in the calling numbers field. Specify the level of the trace by selecting a value from the trace level drop-down list box. The following values are valid for this list.

result (default)Returns the originating trunk group number, called and calling party numbers, outgoing called and calling party numbers, and the resulting trunk group. This trace type is suited for quick call analysis. Here is an example result trace:
>simWriter -tgnum 7001 -isdnp 1 -cdnoa 4 -cdnpi 1 -cdpn 7075511234 -cgpn 7034843 368 >Result of Execution Originating side: A-number 7034843368 B-number 7075511234 Trunk group 7001 Outgoing side: A-number 7034843368 B-number 7075511234 No suitable trunk group found! *Internal errors/warnings were encountered during translation! >OK

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-145

Chapter 3 Regular Operations

Cisco MGC Node Operations

diagnosticReturns limited information about all of the stages of number and route analysis and messages and warnings about data files being read and whether or not default values are being used. This trace type is suited for determining which results were used to produce the outgoing numbers and trunk group. Here is an example diagnostic trace:
>simWriter -tgnum 7001 -isdnp 1 -cdnoa 4 -cdnpi 1 -cdpn 7075511234 -cgpn 7034843 368 -diag >Result of Execution ******************************************************** * START call translation verification diagnostic summary * ********************************************************** performing Dial Plan Base. performing Profile Analysis (NOA). *Internal errors/warnings were encountered during translation! ******************************************************** * END call translation verification diagnostic summary * ********************************************************** Analysing .dat files: used default Route Prefernce used default Terminating Max Digits used default Terminating Min Digits used default Originating Min Digits used default Originating Max Digits the Originating Start Index property for tg-7001 was not found in /opt/CiscoMGC/ etc/properties.dat Customer Group ID's do not match up in the sigPath and Properties files used default Carrier Screening property used default AOCEnabled field used the default field for default directory number used the default Database Access Error flag Analysis complete, writing message... Message completed, running simulator... >OK

fullReturns complete information about all of the stages of number and route analysis. It also includes all tables and parameters from flat files and internal errors generated during generic analysis. This trace type is suited for determining where in the dial plan or number analysis problems occurred. Here is an example full trace:
>simWriter -tgnum 7001 -isdnp 1 -cdnoa 4 -cdnpi 1 -cdpn 7075511234 -cgpn 7034843 368 -full >Result of Execution ******************************************** * START full call translation verification * ******************************************** Decoding generic analysis trace... the length of the trace is 82 bytes ( 1)entering Dial Plan Base. ( 2) tracing Dial plan, entering Dial Plan Base table with... ( 1) 0 parameter(s): ( 2) reading Dial Plan Base table... ( 1) 1 error/warning code read: *Internal Error:Table could not be read ( 1)ending Dial Plan Base... ( 1)entering Call Information Reception.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-146

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

(13) A Number:'7034843368' (13) B Number:'7075511234' ( 1)ending Call Information Reception... ( 1)entering Profile Analysis (NOA). (13) Tracing call number:'7075511234' (Called party number) ( 7) Trace for customer:'jst1' ( 5) TreeBase:'10' ( 2) tracing Dial plan, entering NOA table with... ( 1) 1 parameter(s): ( 4) NOA table index = 4. ( 2) reading NOA table... ( 1) 1 error/warning code read: *Internal Error:Table could not be read ( 1)ending Profile Analysis (NOA)... ( 1)end of trace reached ******************************************** * DONE full call translation verification * * with 0 bytes left untranslated * ******************************************** Analysing .dat files: used default Route Prefernce used default Terminating Max Digits used default Terminating Min Digits used default Originating Min Digits used default Originating Max Digits the Originating Start Index property for tg-7001 was not found in /opt/CiscoMGC/ etc/properties.dat Customer Group ID's do not match up in the sigPath and Properties files used default Carrier Screening property used default AOCEnabled field used the default field for default directory number used the default Database Access Error flag Analysis complete, writing message... Message completed, running simulator... >OK

The content of the field identifies for you which elements of your dial plan need to be modified, if necessary.
Step 9 Step 10

Click Execute to perform a dial plan translation verification. The results are displayed in the field at the bottom of the window. If you want to verify additional dial plan translations, repeat steps 2 to 9. The newly requested data is inserted after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. If you want to save the displayed data, click SaveinFile. The contents of the field are saved to a file specified in the XECfgParms.dat file.

Step 11

Viewing Dial Plan Translation Configuration Data


Complete the following steps to view the dial plan translation configuration data:
Step 1

Open the translation verification viewer. To do this, click Translation Verification on the Cisco MGC Toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes. The Translation Verification Viewer window loads and displays the DialPlan Translation tab window by default (Figure 3-11).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-147

Chapter 3 Regular Operations

Cisco MGC Node Operations

Step 2

Click the Config tab to display the Config tab window (Figure 3-12). The fields in this window display the directory paths to the files used by this viewer. The values in these fields cannot be modified.
Figure 3-12 Configuration Tab Window

Using the File Options Viewer


The file options viewer (Figure 3-13) enables you to manage (rename, delete) the files within the $BASEDIR/etc/cust_specific directory. This directory contains all files created by the various toolkit applications. These subdirectories are created through the MML export feature and contain configuration information in the form of MML commands.

Note

You cannot use the file options viewer to delete files within the $BASEDIR/etc/cust_specific/export directory.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-148

OL-0800-06

Chapter 3

Cisco MGC Node Operations Regular Operations

Figure 3-13 File Options Viewer Window

Using the MGC Backup Viewer


The MGC backup viewer enables you to backup the software configuration of your Cisco MGC host. For more information on using the MGC backup utility, refer to the Backup Procedures for Cisco MGC Software from Release 9.1(5) and up section on page 3-32. Figure 3-14 illustrates the main window for the MGC backup viewer.
Figure 3-14 MCG Backup Viewer Window

Using the MGC Restore Viewer


The MGC restore viewer enables you to restore a previously stored configuration to your Cisco MGC host. For more information on using the MGC restore utility, refer to the Restoring Procedures for Cisco MGC Software Release 9.1(5) and up section on page 8-168. Figure 3-15 illustrates the main window for the MGC backup viewer.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

3-149

Chapter 3 Regular Operations

Cisco MGC Node Operations

Figure 3-15 MCG Restore Viewer Window

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

3-150

OL-0800-06

C H A P T E R

Maintenance and Troubleshooting Overview


This chapter contains an overview of maintenance and troubleshooting concepts for the elements of the Cisco Media Gateway Controller (MGC) node. It includes overall maintenance and system troubleshooting strategies, and reviews available troubleshooting tools. Although maintenance and troubleshooting are described separately in this chapter, they are associated activities. Hence, several of the maintenance and troubleshooting chapters in this guide frequently refer to each other. This chapter includes the following sections:

Maintenance Strategy Overview, page 4-1 Troubleshooting Strategy Overview, page 4-2

Maintenance Strategy Overview


Maintenance usually consists of the following tasks for each element of the Cisco MGC node, performed in the order listed:

Checking equipment status. Determining the current status involves three basic activities:
Reading LEDsMost Cisco products include light-emitting diode (LED) indicators on the

front or rear panels and, in some cases, on both panels. These LEDs indicate the status of the equipment. The specific meaning of each LED on each product is described in the maintenance sections for the individual elements of the Cisco MGC node.
Issuing Status QueriesYou can query the status of the system using various commands. The

commands that can be used to determine the status of the devices in your system are described in the maintenance sections for the individual elements of the Cisco MGC node.
Using a GUI NMSUsing a network management system (NMS) with a graphical user

interface (GUI), such as CiscoWorks2000 or Cisco WAN Manager, to determine the operational status of system devices is described in detail in the maintenance sections for the individual elements of the Cisco MGC node.

Removing the device from the systemProcedures for removing defective devices from the system with as little impact on the system as possible are described in the maintenance sections for the individual elements of the Cisco MGC node. Replacing the complete deviceReinstating a device into the system using a new or repaired model, again with as little impact on the system as possible, is described in the maintenance sections for the individual elements of the Cisco MGC node.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

4-1

Chapter 4 Troubleshooting Strategy Overview

Maintenance and Troubleshooting Overview

Replacing hardware componentsSwapping out components of a device is a maintenance task used for replacing defective components and for upgrading hardware. The maintenance chapters for each element of the Cisco MGC node include sections describing how to replace the field-replaceable components of that device.

Troubleshooting Strategy Overview


The Cisco MGC node supports connections to external switches and to internal components, such as media gateway controllers, signal processors, and trunking gateways. Because the Cisco MGC node functions in a complex environment involving numerous connections, links, and signaling protocols, when connectivity and performance problems occur, they can be difficult to resolve. Troubleshooting usually consists of determining the nature of a problem and then isolating the problem to a particular device or component. When a problem has been isolated and identified, troubleshooting also consists of fixing the problem, usually by replacing the device or some component of the device. The goal of this is to provide you with a general troubleshooting strategy, as well as information about the tools available for isolating and resolving connectivity and performance problems.

Symptoms, Problems, and Solutions


Problems in a system are characterized by certain symptoms. These symptoms can be general (such as a Cisco SS7 interface being unable to access the SS7 network) or specific (routes not appearing in a routing table). You can determine the cause of a symptom by using specific troubleshooting tools and techniques. After identifying the cause, you can correct the problem by implementing a solution consisting of a series of actions.

General Problem-Solving Model


A systematic approach works best for troubleshooting. Define the specific symptoms, identify all potential problems that could be causing the symptoms, then systematically eliminate each potential problem (from the most likely to the least likely) until the symptoms are no longer present. Figure 4-1 illustrates the process flow for this general approach to problem-solving. This process is not a rigid outline for troubleshooting. It is a guide you can use to troubleshoot a problem successfully. The following steps describe the problem-solving process outlined in Figure 4-1 in more detail:

Note

You need to understand and/or determine the message flow for certain actions. You may have to use different tools for situations where messages are exchanged within the Cisco MGC software or the operating system (UNIX), and situations where messages flow between the Cisco MGC host(s) and the external nodes over IP.

Step 1

When analyzing a problem, draft a clear problem statement. Define the problem in terms of a set of symptoms and the potential causes behind those symptoms. For example, the symptom might be that the EQPT FAIL alarm has become active. Possible causes might be physical problems, a bad interface card, or the failure of some supporting entity (for example, layer 1 framing).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

4-2

OL-0800-06

Chapter 4

Maintenance and Troubleshooting Overview Troubleshooting Strategy Overview

Figure 4-1

General Problem-Solving Model


Define the problem.

Gather the facts.

Consider possibilities based on the facts.

Create an action plan.

Implement the action plan. (If symptoms stop)

Observe the results. (If symptoms persist) Repeat the process.

Problem resolved; terminate the process.

Step 2

Gather the facts you need to help isolate the symptoms and their possible causes. Ask questions of affected users, network administrators, managers, and other key people. Collect information from sources such as network management systems, protocol analyzer traces, output from router diagnostic commands, or software release notes.

Step 3

Consider possible causes based on the facts you have gathered. You can also use these facts to eliminate potential causes from your list. For example, depending on the data, you might be able to eliminate hardware as a cause, allowing you to focus on software. At every opportunity, try to narrow the number of potential causes so that you can create an efficient plan of action.

Step 4

Create an action plan based on the remaining potential causes. Begin with the most likely cause, and devise a plan in which only one variable at a time is manipulated. This approach allows you to reproduce the solution to a specific problem. If you alter more than one variable simultaneously, identifying the change that eliminated the symptom becomes more difficult.

Step 5 Step 6

Perform each step of the action plan carefully, and test to see if the symptom disappears. Whenever you change a variable, gather the results. You should use the same method of gathering facts that you used in Step 2. Analyze the results to determine if the problem has been resolved. If it has, then the process is complete.

Step 7

If the problem has not been resolved, you must create an action plan based on the next most likely problem in your list. Return to Step 2 and continue the process until the problem is solved. Before trying out a new cure, make sure to undo any "fixes" you made in implementing your previous action plan. Remember that you want to change only one variable at a time.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

S1228a

4-3

Chapter 4 Troubleshooting Strategy Overview

Maintenance and Troubleshooting Overview

Note

If you exhaust all of the common causes and actions (those outlined in this chapter and those that you have identified for your environment), your last recourse is to contact the Cisco Technical Assistance Center (TAC). Refer to the Obtaining Technical Assistance section on page xxx for more information about contacting the Cisco TAC.

System Troubleshooting Tools


This section presents information about the wide variety of tools you can use to troubleshoot the system.

Alarms
The Cisco MGC software generates alarms to indicate problems with processes, routes, linksets, signaling links, and bearer channels. For more information on troubleshooting using alarms, refer to Alarm Troubleshooting Procedures section on page 8-9. Refer to the Cisco Media Gateway Controller Software Release 9 Software Messages Reference Guide for detailed information on the system alarms.

Call Traces
The Cisco MGC generates call traces that capture call-processing activity by following the call from a specified destination through the Cisco MGC software engine to see where it fails. Call failure location is determined using the following information provided in the call trace:

The protocol data units (PDUs) that the Cisco MGC receives How the Cisco MGC decodes the PDU The PDUs that the Cisco MGC sends out

The results of call traces are signal flow diagrams that you can use for troubleshooting. Call traces are typically used to capture system activity as part of a procedure to clear an alarm. For more information on using call traces, refer to Tracing section on page 8-148.

System Logs
The Cisco MGC software continuously generates log files of various system information, including operational measurements (OMs) and alarm records. You can use these logs to obtain statistical information about the calls processed by the system and network events such as delays or service-affecting conditions. The Cisco MGC generates the following types of logs:

Platform logs containing information useful for tracking configuration errors and signaling link and call instantiation problems. Command/response logs containing Man-machine language (MML) command history. Alarm logs containing alarm information. Measurement logs containing system measurements data. Call record logs containing call-processing data.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

4-4

OL-0800-06

Chapter 4

Maintenance and Troubleshooting Overview Troubleshooting Strategy Overview

System logs can be read using the various viewers within the Cisco MGC viewer toolkit. For more information on the viewers that comprise the Cisco MGC toolkit, refer to Using the Cisco MGC Viewer Toolkit section on page 3-127. Refer to Appendix A, Configuring Cisco MGC Log Files, for more information on system log files.

MML Queries
MML is the command line interface method for configuring and managing the Cisco MGC. You can use it to retrieve information about system components, and to perform logging and tracing. Refer to the Cisco Media Gateway Controller Software Release 9 Software MML Command Reference Guide for more information.

Cisco Internetwork Management Tools


The following Cisco internetwork management products provide design, monitoring, and troubleshooting tools to help you manage your Cisco MGC node:

CiscoWorks2000 Cisco WAN Manager Cisco Media Gateway Controller Node Manager (CMNM)

CiscoWorks2000
CiscoWorks2000 is a series of SNMP-based internetwork management software applications. CiscoWorks applications are integrated on several popular network management platforms. The applications build on industry-standard platforms to provide tools for monitoring device status, maintaining configurations, and troubleshooting problems. Some of the applications included in CiscoWorks2000 that are useful for troubleshooting are:

Device MonitorMonitors specific devices for environmental and interface information. Health MonitorDisplays information about the status of a device, including buffers, CPU load, memory available, and protocols and interfaces being used. Show CommandsEnables you to view data similar to output from router show EXEC commands. Path ToolCollects path utilization and error data by displaying and analyzing the path between devices. Device PollingExtracts data about the condition of network devices. CiscoViewProvides dynamic monitoring and troubleshooting functions, including a graphical display of Cisco devices, statistics, and comprehensive configuration information. Offline Network AnalysisCollects historical network data for offline analysis of performance trends and traffic patterns. CiscoConnectAllows you to provide Cisco with debugging information, configurations, and topology information to speed resolution of network problems.

CiscoWorks2000 can be used to manage a variety of Cisco products. Within the Cisco MGC node, CiscoWorks2000 can be used for management of the Cisco SS7 interfaces and switches. Refer to the CiscoWorks2000 documentation for more information.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

4-5

Chapter 4 Troubleshooting Strategy Overview

Maintenance and Troubleshooting Overview

Cisco WAN Manager


Cisco WAN Manager is part of the Cisco Service Management System of provisioning and management tools for service provider and large enterprise networks. Working at the network and element management level, WAN Manager provides fault-management capabilities handled through the Event Browser, CiscoView, and Configuration Save and Restore features. You can use Cisco WAN Manager to perform search, sort, and filter operations and to tie events to extensible actions. For instance, Cisco WAN Manager can page someone upon receiving a certain type of SNMP trap. It supports alarm hierarchies that report the root cause of problems to operators and higher-level systems. Configuration Save and Restore saves a snapshot of the entire network configuration. For disaster recovery, operators can selectively restore configurations of any element, from a single node up to the entire network. This restoration ability significantly reduces recovery time when a catastrophic failure occurs. The Cisco WAN Manager Trivial File Transfer Protocol (TFTP) statistics collection facility offers the ability to obtain extensive usage and error data across machines and platforms. A wide range of statistics are available at the port and virtual channel level including:

Connection statistics Circuit line statistics Packet line statistics Frame Relay port statistics Network statistics Physical layer statistics Protocol layer statistics

The Cisco WAN Manager application can be used to manage a variety of Cisco products. Within the Cisco MGC node, the Cisco WAN Manager can be used for management of the Cisco SS7 interfaces and switches. Refer to the Cisco WAN Manager documentation for more information.

Cisco Media Gateway Controller Node Manager


The Cisco Media Gateway Controller Node Manager (MNM) is an element management system based on the Cisco Element Management Framework (CEMF). It is responsible for managing the Cisco MGC node, including Cisco MGC(s), switch(es), and Cisco SS7 interfaces. NMS design divides network management into five discrete areas: fault, configuration, accounting, performance, and security. The Cisco MNM provides fault and performance management of the Cisco MGC, as well as flow-through provisioning of the Cisco MGC and its subcomponents. In addition, MNM also provides fault and performance management of the Cisco SS7 interfaces and switches. MNM uses the Cisco MNM Provisioning Tool (MNM-PT) to provide configuration of the Cisco MGC and uses CiscoView for configuration of the Cisco SS7 interfaces and switches. Security and some accounting features are provided directly by the CEMF platform. MNM does not provide any security or accounting features beyond what is natively supported by the CEMF. MNM is designed to be used on a standalone basis with a customer operations support system or a Cisco-based NMS such as the Voice Network Manager (VNM). For more information on MNM, refer to the Cisco Media Gateway Controller Node Manager Users Guide.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

4-6

OL-0800-06

Chapter 4

Maintenance and Troubleshooting Overview Troubleshooting Strategy Overview

Cisco SS7 Interface Diagnostic Commands


Cisco SS7 interfaces provide the following integrated IOS command types to assist you in monitoring and troubleshooting systems:

show debug ping trace

Show Commands
The show commands are powerful monitoring and troubleshooting tools. You can use the show commands to perform a variety of functions:

Monitoring router behavior during initial installation Monitoring normal network operation Isolating problem interfaces, nodes, media, or applications Determining when a network is congested Determining the status of servers, clients, or other neighbors

Some of the most commonly used status commands include:

show interfacesDisplays statistics for network interfaces using the following commands:
show interfaces ethernet show interfaces fddi show interfaces atm show interfaces serial

show controller t1Displays statistics for T1 interface card controllers show running-configDisplays the router configuration currently running show startup-configDisplays the router configuration stored in nonvolatile RAM (NVRAM) show flashDisplays the layout and contents of Flash memory show buffersDisplays statistics for the buffer pools on the router show memoryShows statistics about the router's memory, including free pool statistics show processesDisplays information about the active processes on the router show stacksDisplays information about the stack utilization of processes and interrupt routines, as well as the reason for the last system reboot show versionDisplays the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images

For details on using and interpreting the output of specific show commands, refer to the Cisco IOS command reference for the release you are using.

Using Debug Commands


The debug privileged EXEC commands can provide a wealth of information about the traffic being seen (or not seen) on an interface, error messages generated by nodes on the network, protocol-specific diagnostic packets, and other useful troubleshooting data.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

4-7

Chapter 4 Troubleshooting Strategy Overview

Maintenance and Troubleshooting Overview

Caution

Exercise care when using debug commands. These commands are processor-intensive and can cause serious network problems (degraded performance or loss of connectivity) if they are enabled on an already heavily loaded router. When you finish using a debug command, remember to disable it with its specific no debug command, or use the no debug all command to turn off all debugging.

Note

Output formats vary among debug commands. Some generate a single line of output per packet, and others generate multiple lines of output per packet. Some generate large amounts of output, and others generate only occasional output. Some generate lines of text, and others generate information in field format. To minimize the negative impact of using debug commands, follow this procedure:

Step 1 Step 2 Step 3

Enter the no logging console global configuration command on your router. This command disables all logging to the console terminal. Telnet to a router port and enter the enable EXEC command. Enter the terminal monitor command on your router to copy debug command output and system error messages to your current terminal display. This permits you to view debug command output remotely, without being connected through the console port. Following this procedure minimizes the load created by using debug commands because the console port no longer has to generate character-by-character processor interrupts.

If you intend to keep the output of the debug command, spool the output to a file. The procedure for setting up such a debug output file, as well as complete details regarding the function and output of debug commands is provided in Chapter 10, Debug Command Reference, in the Troubleshooting Internetworking Systems manual.

Note

In many situations, third-party diagnostic tools can be more useful and less intrusive than the use of debug commands. For more information, see the Third-Party Troubleshooting Tools section on page 4-9.

Using the Ping Command


To check host accessibility and network connectivity, use the ping EXEC (user) or privileged EXEC command. For IP, the ping command sends ICMP Echo messages. If a station receives an ICMP Echo message, it sends an ICMP Echo Reply message back to the source. The extended command mode of the ping command permits you to specify the supported IP header options. This allows the router to perform a more extensive range of test options. It is a good idea to use the ping command when the network is functioning properly under normal conditions so that you have something to compare against when you are troubleshooting. For detailed information on using the ping and extended ping commands, refer to the Cisco IOS Configuration Fundamentals Command Reference.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

4-8

OL-0800-06

Chapter 4

Maintenance and Troubleshooting Overview Troubleshooting Strategy Overview

Using the Trace Command


The trace user EXEC command discovers the routes a router's packets follow when traveling to their destinations. The trace privileged EXEC command permits the supported IP header options to be specified, allowing the router to perform a more extensive range of test options. The trace command uses the error message generated by routers when a datagram exceeds its time-to-live (TTL) value. First, probe datagrams are sent with a TTL value of 1. This causes the first router to discard the probe datagrams and send back "time exceeded" error messages. The trace command then sends several probes and displays the round-trip time for each. After every third probe, the TTL is increased by 1. Each outgoing packet can result in one of two error messages. A "time exceeded" error message indicates that an intermediate router has seen and discarded the probe. A "port unreachable" error message indicates that the destination node has received the probe and discarded it, because it could not deliver the packet to an application. If the timer goes off before a response comes in, the trace command prints an asterisk (*). The trace command terminates when the destination responds, when the maximum TTL is exceeded, or when the user interrupts the trace with the escape sequence. It is a good idea to use the trace command when the network is functioning properly under normal conditions so that you have something to compare against when troubleshooting. For detailed information on using the trace and extended trace commands, refer to the Cisco IOS Configuration Fundamentals Command Reference.

Third-Party Troubleshooting Tools


In many situations, third-party diagnostic tools can be more useful than system commands that are integrated into the router. For example, the enabling of a processor-intensive debug command can contribute to the overloading of an environment that is already experiencing excessively high traffic levels. Attaching a network analyzer to the suspect network is less intrusive and is more likely to yield useful information without interrupting the operation of the router. Some useful third-party tools for troubleshooting internetworks include:

Volt-ohm meters, digital multimeters, and cable testers Breakout boxes, fox boxes, bit error rate testers (BERTs), and block error rate testers (BLERTs) Network analyzers and network monitors Time domain reflectometers (TDRs) and optical time domain reflectometers (ODTRs)

Volt-Ohm Meters, Digital Multimeters, and Cable Testers


Volt-ohm meters and digital multimeters are at the lower end of the spectrum of cable testing tools. These devices can measure basic parameters such as AC and DC voltage, current, resistance, capacitance, and cable continuity. They are used primarily to check physical connectivity. Cable testers (scanners) can also be used to check physical connectivity. Cable testers are available for shielded twisted-pair, unshielded twisted-pair, 10BASE-T, and coaxial and twinax cables. A given cable tester might be also able to perform any of the following functions:

Test and report on cable conditions, including near-end crosstalk, attenuation, and noise Perform TDR, traffic monitoring, and wire map functions

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

4-9

Chapter 4 Troubleshooting Strategy Overview

Maintenance and Troubleshooting Overview

Display media access control (MAC) layer information about network traffic, provide statistics such as network utilization and packet error rates, and perform limited protocol testing (for example, TCP/IP tests such as ping)

Similar testing equipment is available for fiber-optic cable. Due to the relatively high cost of fiber-optic cable and its installation, the cable should be tested both before installation (on-the-reel testing) and after installation. Continuity testing of fiber-optic cable requires either a visible light source or a reflectometer. Light sources capable of providing light at the three predominant wavelengths, 850 nanometers (nm), 1300 nm, and 1550 nm, are used with power meters that can measure the same wavelengths and test attenuation and return loss in the fiber-optic cable.

Breakout Boxes, Fox Boxes, and BERTs/BLERTs


Breakout boxes, fox boxes, and BERTs/BLERTs are digital interface testing tools used to measure the digital signals present at the interfaces of PCs, CSU/DSUs, and other devices. These testing tools can monitor data line conditions, analyze and trap data, and diagnose problems common to communications systems. Traffic from data terminal equipment (DTE) through data communications equipment (DCE) can be examined so that you can isolate problems, identify bit patterns, and ensure that the proper cabling has been installed. These devices cannot test media signals such as those for Ethernet, Token Ring, or FDDI.

Network Monitors and Analyzers


You can use network monitors to continuously track packets crossing a network, thus obtaining an accurate picture of network activity at any moment, or a historical record of network activity over a period of time. Network monitors do not decode the contents of frames. Monitors are useful for baselining, in which the activity on a network is sampled over a period of time to establish a normal performance profile or baseline. Monitors collect information such as packet sizes, numbers of packets, error packets, overall usage of a connection, the number of hosts and their MAC addresses, and details about communications between hosts and other devices. You can use the data to create profiles of network traffic as well locate traffic overloads, plan for network expansion, detect intruders, establish baseline performance, and distribute traffic more efficiently. A network analyzer (also called a protocol analyzer) decodes the various protocol layers in a recorded frame and presents them as readable abbreviations or summaries, detailing which layer is involved (physical, data link, and so forth) and what function each byte or byte content serves. Most network analyzers can perform many of the following functions:

Filtering traffic that meets certain criteria so that, for example, all traffic to and from a particular device can be captured Time-stamping captured data Presenting protocol layers in an easily readable form Generating frames and transmitting them onto the network Incorporating an "expert" system in which the analyzer uses a set of rules, combined with information about the network configuration and operation, to diagnose and solve, or offer potential solutions to, network problems

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

4-10

OL-0800-06

Chapter 4

Maintenance and Troubleshooting Overview Troubleshooting Strategy Overview

TDRs and OTDRs


TDRs are at the top end of the cable testing spectrum. These devices can quickly locate open and short circuits, crimps, kinks, sharp bends, impedance mismatches, and other defects in metallic cables. A TDR works by "bouncing" a signal off the end of the cable. Opens, shorts, and other problems reflect the signal back at different amplitudes, depending on the problem. A TDR measures how much time it takes for the signal to reflect and calculates the distance to a fault in the cable. TDRs can also be used to measure the length of a cable or calculate the propagation rate based on a configured cable length. Fiber-optic measurement is performed by an OTDR. OTDRs can accurately measure the length of the fiber, locate cable breaks, measure the fiber attenuation, and measure splice or connector losses. An OTDR can be used to ascertain the "signature" of a particular installation, noting attenuation and splice losses. This baseline measurement can then be compared with future signatures when a problem in the system is suspected.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

4-11

Chapter 4 Troubleshooting Strategy Overview

Maintenance and Troubleshooting Overview

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

4-12

OL-0800-06

C H A P T E R

Maintaining the Cisco MGC


This chapter contains the recommended hardware maintenance procedures for the Cisco Media Gateway Controller (MGC). The Cisco MGC performs call-processing, trunk resource management, alarm management, and routing. Cisco MGCs also provide various Cisco telephony solutions with Advanced Intelligent Network (AIN) capabilities, including the ability to detect conditions that cause the Cisco MGC to query service logic for further call-processing instructions. Cisco MGCs can be installed in simplex or continuous service configurations. In simplex configurations, only one Cisco MGC is equipped. In continuos service configurations, two Cisco MGCs are equipped. Only one Cisco MGC is active at any given time in a continuous service configuration, while the other Cisco MGC operates in standby mode. The Cisco MGC runs on a variety of Sun Netra UNIX systems. This chapter briefly describes hardware maintenance for the Cisco MGC. For more detailed information, refer to the documentation provided by Sun Microsystems for your hardware platform. For information on upgrading and maintaining Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. This chapter includes the following sections:

Checking Equipment Status, page 5-1 Maintaining Technical Support Staff, page 5-2 Maintaining Components, page 5-2

Checking Equipment Status


You can quickly determine the status of the Cisco MGC by using the following methods:

Reading the Cisco MGC LEDs Querying the system using UNIX and Man-Machine Language MML commands.

The UNIX and MML commands for querying the status of the system are found in Chapter 3, Cisco MGC Node Operations. Information about the LEDs on the Cisco MGC hosts is found in the sections that follow.

Sun Netra LEDs


The Sun Netra t 1120/1400 and Sun Netra t 1125/1405 have the following LEDs:

POWERGreen LED is illuminated at all times when the system is on.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

5-1

Chapter 5 Maintaining Technical Support Staff

Maintaining the Cisco MGC

SYSTEMGreen LED is off during power-up procedures and is illuminated when UNIX is running and the alarms driver is installed. This LED is reset by a hardware watchdog timeout, or when the user-defined Alarm 3 (spare) is asserted. ALARM1Amber LED is illuminated when the user-defined Alarm 1 is asserted. ALARM2Amber LED is illuminated when the user-defined Alarm 2 is asserted. SPAREAmber LED is reserved for future use.

The DC-powered Sun Netra t 1120/1400 displays the following additional LEDs:

SUPPLY AGreen LED is illuminated when DC input A is present and the system is powered on. SUPPLY BGreen LED is illuminated when DC input B is present and the system is powered on.

Maintaining Technical Support Staff


Skill Level of Personnel
The engineering staff must collectively have training specific to the Sun Netra to support the product in the field. To be classified as certified by Sun, support personnel must successfully complete the Sun certification training courses and pass the Solaris administrators certification examinations. All engineers must be able to perform the following tasks:

User assistance Problem diagnosis and duplication Hardware replacement Patch distribution

The technical profile portion of the Sun audit analyzes the technical ability of service personnel and determines if the number of support staff is sufficient for quality customer support.

Staff Software Troubleshooting Tools


The support engineers must have a current version of Sunsolve to assist in troubleshooting and resolving problems.

Maintaining Components
For more detailed information, see the Cisco Media Gateway Controller Hardware Installation Guide.

Software Upgrades
Refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide for a description of the procedures for software upgrades.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

5-2

OL-0800-06

C H A P T E R

Maintaining the Cisco Signaling Link Terminal


This chapter contains the recommended hardware maintenance procedures for the Cisco Signaling Link Terminal (SLT), which is designed to perform SS7 signal pre-processing for a Cisco Media Gateway Controller. The Cisco SLT consists of a custom Cisco IOS image running on a Cisco 2611 or 2651 router. For information on upgrading and maintaining Cisco SLT software, refer to the Cisco Signaling Link Terminal documentation. As part of an end-to-end telephony solution, the Cisco SLT provides reliable transport of Signaling System 7 (SS7) protocols across an IP network. The Cisco SLT uses the Cisco IOS SS7 Cisco SLT feature set, providing reliable interoperability with the Cisco Media Gateway Controller (MGC). The Cisco SLT uses Cisco's Reliable User Datagram Protocol (RUDP) to backhaul upper-layer SS7 protocols across an IP network. When used for Signal Link Terminal applications, the modular Cisco 2611 dual Ethernet port router can be configured with dual serial as well as Multiflex WAN interface cards with integrated E1 data service units (DSUs) or T1 channel service units (CSUs)/DSUs. For additional flexibility, the Multiflex WAN interface cards can also be ordered with a dual-port Drop and Insert capability. The following interface cards are supported:

1-port high-speed serial interface (WIC-1T) 2-port high-speed serial interface (WIC-2T) 1-port T1 multiflex trunk interface (VWIC-1MFT-T1) 1-port E1 multiflex trunk interface (VWIC-1MFT-E1) 2-port T1 multiflex trunk interface (VWIC-2MFT-T1) 2-port E1 multiflex trunk interface (VWIC-2MFT-E1) 2-port T1 multiflex trunk interface with Drop and Insert (VWIC-2MFT-T1-DI) 2-port E1 multiflex trunk interface with Drop and Insert (VWIC-2MFT-E1-DI)

Only SS7 serial interfaces and protocols are supported. There is no support for non-SS7 serial WAN protocols. Up to four SS7 signaling links are supported per Cisco SLT.

Note

You must use the Cisco 2651 routers to achieve four SS7 signaling links. Using the Cisco 2611, you can have a maximum of two SS7 signaling links.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

6-1

Chapter 6 Checking Equipment Status

Maintaining the Cisco Signaling Link Terminal

This chapter describes Cisco SLT hardware maintenance and includes the following sections:

Checking Equipment Status, page 6-2 Removing a Cisco SLT, page 6-5 Replacing a Cisco SLT, page 6-6 Replacing Hardware Components, page 6-13 Additional Maintenance Tasks, page 6-15

Checking Equipment Status


You can check the status of the Cisco SLT devices using the following methods:

Reading Cisco SLT LEDs Using Cisco IOS status queries Using CiscoWorks 2000, Cisco WAN Manager, or the Cisco MGC Node Manager (CMNM)

Cisco SLT LEDs


LEDs indicate the current operating condition of the Cisco SLT.

Front-Panel LEDs
Figure 6-1 shows the location of the LEDs on the Cisco SLT. Table 6-1 describes these LEDs.
Figure 6-1 Cisco SLT Front-Panel LEDs

POWER

RPS

ACTIVITY
H11660

Table 6-1

Cisco SLT Front-Panel LEDs

LED Power RPS

Description Indicates the Cisco SLT operating status. Goes on when power is supplied to the Cisco SLT and the Cisco SLT is operational. OFFNo RPS 1 is attached. ONRPS is attached and operational. BlinkRPS is attached, but has a failure.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-2

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Checking Equipment Status

Table 6-1

Cisco SLT Front-Panel LEDs (continued)

LED Activity

Description OFFIn the Cisco IOS software, but no network activity. Blink (500 ms ON, 500 ms OFF)In Remote Monitor (ROMMON), no errors. Blink (500 ms ON, 500 ms OFF, 2 sec. between codes)In ROMMON, error detected. Blink (less than 500 ms)In the Cisco IOS software, the blink rate reflects the level of activity.

1. RPS = Redundant Power System.

Rear-Panel LEDs
Figure 6-2 shows the location of the Cisco SLT rear-panel LEDs. Table 6-2 describes these LEDs.
Figure 6-2
Link LED ACT LED
SERIAL 1 SERIAL 1 SERIAL 0 SEE MANUAL BEFORE INSTALLA TION WIC CONN 2A/S SERIAL 0 SEE MANUAL BEFORE INSTALLA TION

Cisco SLT Rear-Panel LEDs


Link LED ACT LED
Cisco 2611
WIC CONN 2A/S

CONN

W0
LINK ETHERNET 0/1 ACT LINKETHERNET 0/0 ACT CONSOLE

AUX

Ethernet 0/0 10BASE-T port (RJ-45) Ethernet 0/1 10BASE-T port (RJ-45)

Auxiliary port (RJ-45) Console port (RJ-45)

Table 6-2

Cisco SLT Rear-Panel LEDs

LED Link ACT

Description When this LED is lit, a link has been established with the hub or switch at the other end of the cable. When this LED is lit, packets are being transmitted or received on the Ethernet interface.

WIC LEDs
Each serial card has one LED, labeled CONN for each port, which lights when the serial port is connected. When the port is in DTE mode, the CONN LED indicates that Data Set Ready (DSR), Data Carrier Detect (DCD), and Clear To Send (CTS) have been detected. When the port is in DCE mode, it indicates that Data Terminal Ready (DTR) and Request To Send (RTS) have been detected.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

H11584

6-3

Chapter 6 Checking Equipment Status

Maintaining the Cisco Signaling Link Terminal

Figure 6-3

1- and 2-Port Serial WAN Interface Card LEDs


Serial port CONN LED Serial ports

SERIAL 1 SERIAL 0 CONN SEE MANUAL BEFORE INSTALLATION WIC CONN 2A/S

CONN

SERIAL

CONN LEDs

VWIC LEDs
You can distinguish between T1 and E1 interface cards by the labeling on the faceplate, as shown in Figure 6-4. Each multiflex trunk interface card has three LEDs, which are shown in Figure 6-4 and described in Table 6-3.
Table 6-3 1-Port Multiflex Trunk Interface Card LEDs Description Color

LED LP LED

On means that a loopback or line state is detected or is manually set by the user. This LED is off during normal operation.

Yellow

AL LED CD LED

On means that there is a local or remote alarm state. This LED Yellow is off during normal operation. On means that a carrier has been detected and the internal DSU/CSU in the WAN interface card is communicating with another DSU/CSU. This LED is on during normal operation.
1- and 2-Port T1 and E1 Multiflex Trunk Interface Card LEDs
RJ-48C port
RJ-48C ports

Green

Figure 6-4

CTRLR T1 0

VWIC 2MFT-E1

CTRLR E1 1

CTRLR E1 0

Using the Cisco SLT Operating System to Check Status


The Cisco SLT operating system includes a series of commands that enable you to determine if the unit is functioning correctly or where problems have occurred. A few of the relevant commands for checking status are listed here. To learn how to find more information concerning these and other IOS commands, refer to the Cisco IOS Software Documentation Organization.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-4

OL-0800-06

17859

VWIC 1MFT-T1

17856

AL LP CD

SEE MANUAL BEFORE INSTALLATION

H11497

H7212

AL LP CD

SEE MANUAL BEFORE INSTALLATION

Chapter 6

Maintaining the Cisco Signaling Link Terminal Removing a Cisco SLT

Status commands that may help to monitor the health and state of your Cisco SLT at any given time include the following:

show c2600Shows complex troubleshooting information that does not pertain to a specific interface, but to the platforms shared resources. show contextDisplays information stored in nonvolatile random access memory (NVRAM) when an exception occurs. show flashShows information about the Flash memory device. show interfacesDisplays statistics for all interfaces configured on the Cisco SLT. show ip routeDisplays the entries in the routing table. show memShows statistics about the units memory, including memory free pool statistics. show processesDisplays information about the active processes. show protocolsDisplays the configured protocols. This command shows the status of any configured Layer 3 (network) protocol. show rudp failuresDisplays Reliable User Datagram Protocol (RUDP) failure statistics. show rudp statisticsDisplays RUDP internal statistics. show running-configDisplays the active configuration parameters. show SS7 mtp2Displays Message Transfer Part 2 (MTP 2) channel control-block data, MTP 2 link state information, MTP 2 statistics, MTP 2 timer information, protocol information for a channel, and the channel number. (The default is channel 0.) show SS7 smDisplays session manager session information. show startup-configDisplays the backup configuration file. show versionDisplays the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images.

Note

The SS7-related commands (show SS7 mtp2, show SS7 sm, show rudp failures, and show rudp statistics) are part of CiscoS RUDP session manager. They are not available on other Cisco equipment running IOS.

Removing a Cisco SLT


This section describes how to shut down a Cisco SLT and remove it. The assumption is that the system has been properly installed according to procedures described in the Cisco Media Gateway Controller Hardware Installation Guide, most notably the following procedures:

Safety recommendations General site requirements Preparations for connecting to the network

Required Tools and Equipment


Following are the tools and parts that might be required for removing a Cisco SLT:

Number 2 Phillips screwdriver

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

6-5

Chapter 6 Replacing a Cisco SLT

Maintaining the Cisco Signaling Link Terminal

Flat-blade screwdrivers: small, 3/16-inch (0.476 cm) and medium, 1/4-inch (0.625 cm) ESD-preventive wrist strap

It is also assumed that the cables and console terminal were installed during the original system installation.

Procedure
To remove the Cisco SLT, complete the following steps:
Step 1 Step 2 Step 3 Step 4

Power off the Cisco SLT. Attach the ESD-preventive wrist strap to the chassis of the Cisco SLT. Disconnect all cables from the rear panel of the Cisco SLT. Remove the front and rear mounting screws and remove the unit from the rack.

Replacing a Cisco SLT


This section describes how to install a new Cisco SLT or reinstall a repaired Cisco SLT.

Required Tools and Equipment


Following are the tools and parts that might be required for replacing a Cisco SLT:

Number 2 Phillips screwdriver Flat-blade screwdrivers: small, 3/16-inch (0.476 cm) and medium, 1/4-inch (0.625 cm) ESD-preventive wrist strap Screws to secure the rack-mount brackets to the Cisco SLT

It is assumed that cables, Ethernet hub, and the console terminal remain from the original installation.

Mounting the Chassis in a Rack


This section describes the procedures for rack-mounting the chassis. A new chassis comes with brackets for use with a 19-inch rack or, if specified in your order, optional larger brackets for use with a 24-inch rack. The brackets are shown in Figure 6-5.

Warning

To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions to ensure that the system remains stable. The following guidelines are provided to ensure your safety:

If the rack contains only one unit, mount the unit at the bottom of the rack. If the rack is a partially filled rack, load the rack from the bottom to the top, with the heaviest component at the bottom of the rack.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-6

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Replacing a Cisco SLT

If the rack contains stabilizing devices, install the stabilizers prior to mounting or servicing the unit in the rack.
Identifying the Brackets

Figure 6-5

Bracket for use with a 19-inch rack

Bracket for use with 23-inch and 24-inch racks

Attaching the Brackets


To install the chassis in a rack, attach the brackets in one of the following ways:

With the front panel forward (see Figure 6-6 and Figure 6-7) With the rear panel forward (see Figure 6-8 and Figure 6-9) In a center-mount rack, with the rear panel forward (see Figure 6-10)

Note

Use the Cisco-supplied screws for this installation.

Note

If you are installing a Cisco SLT in a 19-inch rack with a 17.5-inch opening, orient the rack-mount brackets so that, when installed, they do not increase the width of the chassis. (See Figure 6-6.) If you are installing a Cisco SLT in a 19-inch EIA-standard rack with a 17.75-inch opening or a 23- or 24-inch rack, orient the rack-mount brackets so that, when installed, they increase the width of the chassis. (See Figure 6-7.)

Note

The following illustrations show how to connect the bracket to one side of the chassis. The second bracket connects to the opposite side of the chassis.
Figure 6-6 Bracket InstallationFront Panel Forward (19-Inch Rack with a 17.5-Inch Opening)

H4201

Note: The second bracket attaches to the other side of the chassis.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

27712

6-7

Chapter 6 Replacing a Cisco SLT

Maintaining the Cisco Signaling Link Terminal

Note

When installed in a 19-inch rack with a 17.75-inch opening, the Cisco SLT protrudes beyond the front of the rack.
Figure 6-7 Bracket InstallationFront Panel Forward (19-Inch Rack with a 17.75-Inch Opening or a 23-inch or 24-Inch Rack)

23-inch and 24-inch brackets

Figure 6-8

Bracket InstallationRear Panel Forward (19-Inch Rack with a 17.5-Inch Opening)


27715

Figure 6-9

110V 60 Hz 1.6A MAX

Bracket InstallationRear Panel Forward (19-Inch Rack with a 17.75-Inch Opening or a 23-inch or 24-Inch Rack)

23-inch and 24-inch brackets


110V 60 Hz 1.6A MAX

Figure 6-10 Center-Mount Bracket InstallationRear Panel Forward

23-inch and 24-inch brackets

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-8

27716

19-inch brackets

27714

19-inch brackets

27713

19-inch brackets

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Replacing a Cisco SLT

Installing the Cisco SLT in a Rack


After the brackets are secured to the chassis, you can rack-mount the Cisco SLT. Using the screws you provide, attach the chassis to the rack as shown in Figure 6-11.
Figure 6-11 Attaching the Chassis to a RackRear Panel Forward

24 in. brackets

Connecting the DC Power Supply


This section describes the DC power supply specifications and wiring.

Warning

This unit is intended for installation in restricted access areas. A restricted access area is where access can only be gained by service personnel through the use of a special tool, lock and key, or other means of security, and is controlled by the authority responsible for the location.

DC Power Specifications
The DC power supply is intended for use in DC-operating environments. Table 6-4 lists the power supply specifications.
Table 6-4 Power Supply Specifications

Description Power (input) Wire gauge for power connections


1. AWG = American Wire Gauge.

Design Specification 40W, 38 to 75 VDC 14 AWG 1

Wiring the DC Power Supply


If you ordered a Cisco SLT with a DC power supply, follow the directions in this section to wire the terminal block.

Warning

Before performing any of the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

H6331

19 in. brackets

6-9

Chapter 6 Replacing a Cisco SLT

Maintaining the Cisco Signaling Link Terminal

Warning

Figure 6-12 shows the DC power supply terminal block. The proper wiring sequence is ground to ground, positive to positive (line to L), and negative to negative (neutral to N). Note that the ground wire should always be connected first and disconnected last.

Caution

Do not over torque the terminal block captive thumbscrew or terminal block contact screws. The recommended torque is 8.2 0.4 inch-lb.

Warning

After wiring the DC power supply, remove the tape from the circuit breaker switch handle and reinstate power by moving the handle of the circuit breaker to the ON position.

Warning

Secure all power cabling when installing this unit to avoid disturbing field-wiring connections.

Note

This product is intended for installation in restricted access areas and is approved for use with 14 AWG copper conductors only. The installation must comply with all applicable codes. To wire the terminal block, complete the following steps:

Step 1 Step 2

Attach the appropriate lugs at the wire end of the power supply cord. Wire the DC power supply to the terminal block, as shown in Figure 6-12.

Figure 6-12 DC Power Supply Connections

Input: 40 to 72V Current: 1.5 1.0A Watts: 40W

Terminal block

Ground

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-10

35260

On/off switch

Negative Positive

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Replacing a Cisco SLT

Connecting to a Network
This section explains how to connect the Cisco SLT to the control signaling LAN. It is assumed that the cables required to connect the Cisco SLT to the LAN are available from the Cisco SLT being replaced.

Warning

Do not work on the system, or connect or disconnect cables during periods of lightning activity.

Connect your cables from the Ethernet 100BaseT ports to Ethernet 100BaseT ports on the LAN switch.

Connecting the Console Terminal and Modem


Cisco SLTs include asynchronous serial console and auxiliary ports. These ports provide local administrative access to your Cisco SLT (with a console terminal) or remote access (with a modem).

Identifying a Rollover Cable


Use a rollover cable to connect to the asynchronous serial console and auxiliary ports. You can identify a rollover cable by comparing the two modular ends of the cable. When you hold the two cable ends side-by-side with the tab at the back, as shown in Figure 6-13, the wire connected to the pin on the outside of the left plug should be the same color as the wire connected to the pin on the outside of the right plug. If your cable came from Cisco Systems, pin 1 is white on one connector, and pin 8 is white on the other (a rollover cable reverses pins 1 and 8, 2 and 7, 3 and 6, and 4 and 5).
Figure 6-13 Identifying a Rollover Cable
Pin 1 and pin 8 should be the same color Pin 1 Pin 8

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

H3824

6-11

Chapter 6 Replacing a Cisco SLT

Maintaining the Cisco Signaling Link Terminal

Connecting to the Console Port


Take the following steps to connect a terminal (an ASCII terminal or a PC running terminal emulation software) to the console port on the Cisco SLT:
Step 1

Connect the terminal using the thin, flat, RJ-45-to-RJ-45 rollover cable (looks like a telephone cable) and an RJ-45-to-DB-9 or RJ-45-to-DB-25 adapter (labeled TERMINAL) included with the Cisco SLT. (See Figure 6-14.) Configure your terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, and 2 stop bits. For information on console port pinouts, see the online document Cisco Modular Access Router Cabling Specifications on the Documentation CD-ROM that accompanied your Cisco SLT package.

Step 2

Figure 6-14 Connecting a Console Terminal

SERIAL 1 SERIAL 1 CONN SERIAL 0 SEE MANUAL BEFORE INSTALLATION WIC CONN 2A/S SERIAL 0 SEE MANUAL BEFORE INSTALLATION

Cisco 2611
WIC CONN 2A/S

100-240V 1A 50/60 Hz 47 W

CONN

W0
LINK ETHERNET 1 ACT LINK ETHERNET 0 ACT CONSOLE

AUX

Console port (RJ-45)

RJ-45 to RJ-45 rollover cable

Laptop computer RJ-45 to DB-9 or RJ-45-to-DB-25 adapter


H11493

Cisco SLT Interface Numbering


Each individual network interface on a Cisco SLT is identified by a slot number and a unit number. The Cisco SLT chassis contains one slot in which you can install a network module. Figure 6-15 shows the slot location in the Cisco SLT chassis.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-12

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Replacing Hardware Components

Figure 6-15 Cisco SLT WAN Interface Card Chassis Slot Locations

SERIAL 1 SERIAL 1 CONN SERIAL 0 SEE MANUAL BEFORE INSTALLATION WIC CONN 2A/S SERIAL 0 CONN SEE MANUAL BEFORE INSTALLATION

Cisco 2612
WIC 2T

100-240V 1A 50/60 Hz 47 W

CONN

W1

W0
LINK TOKEN RING 1 ACT LINK ETHERNET 0 ACT

CONSOLE

AUX

Network module slot

WAN interface card slot W1 WAN interface card slot W0

Unit numbers identify the interfaces on the modules installed in the unit. Unit numbers begin at 0 for each interface type, and continue from right to left and from bottom to top. Modules are identified by interface type, slot number (always 0), a forward slash (/), then the unit number. For example:
Note

First Ethernet interface is referred to as Ethernet 0/0 Slot W0, serial interface 0 is referred to as serial 0/0 Slot W1, serial interface 1 is referred to as serial 0/1

WAN interface card slots (built into the chassis) are always numbered as slot 0, even if the interface card is installed in the slot labeled W1. For information about WAN interface slot and port numbering, see the Cisco WAN Interface Cards Hardware Installation Guide.

Install the New Software


After you have installed the Cisco SLT, power it on. (If the Cisco SLT does not power on, proceed to Appendix B, Troubleshooting Cisco SLT Signaling.) After the hardware has been installed and powered on, you must configure the Cisco SLT. Refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. After the Cisco SLT has been configured, you must install a special release of the Cisco IOS software on the Cisco SLT. The filename of the current Cisco SLT image is c2600-ipss7-mz.121-1.T.bin. To copy a system image from a Trivial File Transfer Protocol (TFTP) server to a Flash memory file system, use the following command in EXEC mode:
copy tftp:[[[//location]/directory ]/filename] flash-filesystem:[filename]

Replacing Hardware Components


Each Cisco SLT is equipped with at least one WAN interface card. This section describes how to replace the WAN interface cards in the Cisco SLTs, and contains the following subsections:

Required Tools and Equipment, page 6-14 Installing a WAN Interface Card, page 6-14

Figure 6-16 shows the WIC-2T WAN interface card.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

10344

6-13

Chapter 6 Replacing Hardware Components

Maintaining the Cisco Signaling Link Terminal

Figure 6-16 WIC-2T Dual Port Serial WAN Interface Card


Serial ports

SERIAL 1 SERIAL 0 CONN SEE MANUAL BEFORE INSTALLATION CONN WIC 2T

CONN LEDs

Required Tools and Equipment


In addition to the WIC and the Cisco SLT, you will need these items to install and connect your card:

Number 1 Phillips screwdriver. Appropriate connecting cableThe cables should already be available. For more information on cable types, see the online document Cisco Modular Router Cable Specifications on the Documentation CD-ROM that came with your Cisco SLT package, or on Cisco Connection Online. Synchronous modem, channel service unit/data service unit (CSU/DSU), or other data circuit-terminating equipment (DCE) (serial card only)Used to connect the WAN interface card to a digital WAN line.

Installing a WAN Interface Card


This section describes the procedure for installing a WIC-2T WAN interface card in a Cisco SLT slot. You can install the WIC-2T either before or after mounting the Cisco SLT, whichever is more convenient. Similarly, you can install the WIC-2T in the network module either before or after installing the network module in the Cisco SLT chassis.

Caution

WICs do not support online insertion and removal (hot-swapping). Before inserting a card into the network module or Cisco SLT chassis, you must turn off electrical power and disconnect network cables.

Warning

Before performing any of the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.

To install WAN interface cards in a Cisco SLT WIC chassis slot, complete the following procedure:
Step 1

Turn off power to the Cisco SLT. However, to channel ESD voltages to ground, do not unplug the power cable. Remove all network interface cables, including telephone cables, from the rear panel.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-14

H11496

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Additional Maintenance Tasks

Note

If you are installing a single WIC-2T, use slot W0 first (see Figure 6-15). The Cisco SLT checks slot W0 before it checks slot W1. If you fill slot W1 while leaving slot W0 vacant, your Cisco SLT configuration could be affected.

Step 2

Use a screwdriver to remove the blank filler panel from the chassis card slot where you plan to install the card. Save the filler panel for future use.
a. b. c. d.

Align the card with the guides in the WAN interface card slot and slide it gently into the slot. Push the card into place until you feel its edge connector mate securely with the connector in the WAN interface card slot. Fasten the cards captive mounting screws into the holes in the WAN interface card slot, using the screwdriver. Reinstall the network interface cables and turn on power to the Cisco SLT.

The following warning applies only to Cisco SLTs that use a DC power supply:

Warning

After wiring the DC power supply, remove the tape from the circuit breaker switch handle and reinstate power by moving the handle of the circuit breaker to the ON position.

WIC Filler Panels


If any interface card slot (on the network module or chassis) is unoccupied, install a filler panel to enable proper airflow. (See Figure 6-17.)
Figure 6-17 WIC Slot Filler Panel
DO NOT INSTALL WAN INTERFACE CARDS WITH POWER APPLIED
H6649

Additional Maintenance Tasks


This section contains selected maintenance procedures you might need to perform on a Cisco SLT as your internetworking needs change, including the following:

Upgrading DRAM, page 6-16 Opening the Chassis, page 6-16 Replacing the System-Code SIMM, page 6-19 Closing the Chassis, page 6-21 Procedures for Recovering Boot and System Images, page 6-22

Additional maintenance procedures are available on the Documentation CD-ROM that shipped with the Cisco SLT.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

6-15

Chapter 6 Additional Maintenance Tasks

Maintaining the Cisco Signaling Link Terminal

To see translated versions of warnings in this section, see the Regulatory Compliance and Safety Information document that accompanied your Cisco SLT.

Caution

Before opening the chassis, be sure that you have discharged all static electricity from your body and the power is off.

Warning

Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.

Upgrading DRAM
This section describes how to upgrade dynamic random-access memory (DRAM) on the system card. You might need to upgrade DRAM if you have loaded a new Cisco IOS software feature set or release. To see how much memory is currently installed in the Cisco SLT, enter the show version command. Near the middle of the resulting output, a message similar to the following appears:
Cisco 2611(MPC860) processor (revision 0x200) with 28672K/4096K bytes of memory.

This line shows how much memory is installed (in this example, 28672 K/4096 K). The first number represents primary memory, and the second number represents shared memory. For information about recommended DRAM part numbers for your Cisco SLT, refer to the Cisco 2600 Series Hardware Installation Guide.

Cisco SLT DRAM


Cisco SLTs contain two 100-pin dual in-line memory module (DIMM) sockets (or banks) for DRAM, numbered 0 and 1. (See Figure 6-20.) Each socket can be filled with a 100-pin DRAM DIMM. You can use the memory-size iomem software command to configure DRAM as a mixture of shared memory, which is used for data transmitted or received by network modules and WAN interface cards, and primary or main memory, which is reserved for the CPU. For further information about this command, see the Cisco IOS configuration guides and command references.

Opening the Chassis


This section describes the procedure for opening the chassis by removing the chassis cover.

Warning

Do not touch the power supply when the power cord is connected. For systems with a power switch, line voltages are present within the power supply even when the power switch is OFF and the power cord is connected. For systems without a power switch, line voltages are present within the power supply when the power cord is connected.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-16

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Additional Maintenance Tasks

Tools Required
You will need the following tools to remove and replace the DRAM DIMMs on the Cisco SLT:

Number 2 Phillips screwdriver ESD-preventive wrist strap DRAM DIMM required for your planned upgrade

Removing the Chassis Cover


You must open the chassis to access the internal components.

Warning

Before opening the chassis, disconnect the telephone-network cables to avoid contact with telephone-network voltages.

To remove the chassis cover, complete the following steps:


Step 1 Step 2 Step 3 Step 4 Step 5

Power off the Cisco SLT. Disconnect all cables from the rear panel of the Cisco SLT. Remove the screws located on the top of the chassis. Note that the chassis is composed of two sections, top and bottom. Holding the chassis with both hands, position it as shown in Figure 6-18. Slide the top section away from the bottom section as shown in Figure 6-19.
Figure 6-18 Holding Chassis for Cover Removal

Cisco 2600
POWER RPS ACTIVITY

SERIES

Figure 6-19 Removing Chassis Cover

Cisco 2600
POWER RPS ACTIVITY

SERIES

Step 6

When the top cover is off, set it aside. Figure 6-20 shows the layout of the system cards.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

H11659

H11658

6-17

Chapter 6 Additional Maintenance Tasks

Maintaining the Cisco Signaling Link Terminal

Figure 6-20 System Card Layout


Duart reset Reset Pin 1 Primary memory (DRAM DIMMs) Boot ROM System-code SIMM (Flash memory)

Advanced Interface Module (AIM)

Lattice U23

PCI connector

Ethernet Ethernet

AUX Console

DRAM DIMM Installation


Take the following steps to install the DRAM DIMMs:
Step 1 Step 2 Step 3 Step 4

Power off the Cisco SLT. Attach an ESD-preventive wrist strap. Open the cover following the instructions in the Opening the Chassis section on page 6-16. Remove the existing DRAM DIMM by pulling outward on the connectors to unlatch them, as shown in Figure 6-21. Be careful not to break the holders on the DIMM connector.

Caution Step 5

To prevent damage, do not press on the center of the DIMMs. Handle each DIMM carefully. Position the new DIMM so that the polarization notch is located at the left end of the DIMM socket as shown in Figure 6-21.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-18

H11599

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Additional Maintenance Tasks

Figure 6-21 Removing and Replacing the DRAM DIMM


1

2
10243

Step 6

Insert the new DRAM DIMM by sliding the end with the metal fingers into the DIMM connector socket at approximately a 90 angle to the system card. Gently rock the DIMM back into place until the latch on either side snaps into place. Do not use excessive force, because the connector might break. Replace the Cisco SLT cover. Follow the instructions in the Closing the Chassis section on page 6-21.

Step 7

Replacing the System-Code SIMM


The system code (Cisco SLT operating system software) is stored in a Flash memory 80-pin single in-line memory module (SIMM). For information about recommended SIMM part numbers for your Cisco SLT, refer to the Cisco 2600 Series Hardware Installation Guide.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

6-19

Chapter 6 Additional Maintenance Tasks

Maintaining the Cisco Signaling Link Terminal

Tools Required
You will need the following tools to remove and replace the system-code SIMM on the Cisco SLT:

Medium-size flat-blade screwdriver (1/4 inch [0.625 cm]) Electrostatic discharge (ESD)-preventive wrist strap System-code SIMM

Preparing to Install the System-Code SIMM


There is one system-code (Flash memory) SIMM socket on the system board. You can verify how much Flash memory is already installed in your Cisco SLT by entering the show flash EXEC command.

Caution

The system code is stored on the Flash memory SIMM, but new system-code SIMMs are shipped without preinstalled software. Before continuing with this procedure, use the copy flash tftp EXEC command to back up the system code to a Trivial File Transfer Protocol (TFTP) server.

Note

For more information about the copy flash tftp command and other related commands, refer to the Cisco IOS configuration and command reference publications. These publications are available on the Documentation CD-ROM that came with your Cisco SLT, and on Cisco.com.

System-Code SIMM Replacement


Take the following steps to upgrade the system-code Flash memory SIMM:
Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7

If you have not already done so, enter the copy flash tftp EXEC command to back up the system code. Power off the Cisco SLT. Remove all cables from the rear panel of the Cisco SLT. Attach an ESD-preventive wrist or ankle strap. Open the chassis cover, following the procedure in the Opening the Chassis section on page 6-16. Locate the system-code SIMM on the system card. (See Figure 6-20.) If necessary, remove the existing system-code SIMM by pulling outward on the connector holders to unlatch them. The connector holds the SIMM tightly, so be careful not to break the holders on the SIMM connector. (See Figure 6-22.) Position the new SIMM so that the polarization notch is located at the left end of the SIMM socket.

Step 8

Caution

To prevent damage, do not press on the center of the SIMM. Handle each SIMM carefully. Note that some Flash memory SIMMs have the components mounted on the rear side; therefore, when inserting the SIMM, always use the polarization notch as a reference and not the position of the components on the SIMM. Insert the new SIMM by sliding the end with the metal fingers into the SIMM connector socket at approximately a 90 angle to the system card. Gently rock the SIMM back into place until the latches on both sides snap into place. Do not use excessive force because the connector might break.

Step 9

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-20

OL-0800-06

Chapter 6

Maintaining the Cisco Signaling Link Terminal Additional Maintenance Tasks

Step 10

Replace the Cisco SLT cover following the procedure in the following section. Refer to the Procedures for Recovering Boot and System Images section on page 6-22 for instructions on how to place the Cisco IOS image on the new SIMM.

Figure 6-22 Removing and Replacing the System-Code SIMM

Tab

SIMM Tab

SIMM connector (on motherboard)

Closing the Chassis


This section describes the procedure for closing the chassis by replacing the chassis cover.

Replacing the Cover


To replace the cover, complete the following steps:
Step 1 Step 2

Position the two chassis sections, as shown in Figure 6-19. Referring to Figure 6-18, press the two chassis sections together and ensure that the top section fits into the rear of the bottom section, the bottom section fits into the front of the top section, and that the sides of the top and bottom sections fit together.

Caution

To fit the two sections together, it might be necessary to work them together at one end and then the other; however, use care to prevent bending the chassis edges. When the two sections fit together snugly, slide the chassis top until it fits into the front bezel.

Step 3

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

10244

6-21

Chapter 6 Additional Maintenance Tasks

Maintaining the Cisco Signaling Link Terminal

Step 4 Step 5 Step 6

Replace the cover screws. Tighten the screws to no more than 8 or 9 inch/pound of torque. Reinstall the chassis on the wall, rack, desktop, or table. Reconnect all cables.

Procedures for Recovering Boot and System Images


If your Cisco SLT experiences difficulties and no longer contains a valid Cisco IOS software image in Flash memory, you can recover the Cisco IOS image using the procedures described in the Cisco Signaling Link Controller documentation.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

6-22

OL-0800-06

C H A P T E R

Maintaining the Cisco Catalyst 5500 Multiswitch Router


This chapter contains recommended hardware maintenance procedures for the Cisco Catalyst 5500 Multiswitch Routers (MSRs), which provide an Ethernet backbone for connections between the Cisco Signaling Link Terminals (SLTs), Cisco Media Gateway Controllers (MGCs), and Cisco Media Gateways (MGWs). You can configure several virtual LANs (VLANs) on the Catalyst 5500s and the route switch modules (RSMs) provide inter-VLAN routing when necessary. If your solution includes two Catalyst 5500s, they are connected through an Inter-Switch Link (ISL) trunk, enabling them to share VLAN data and provide ensured availability. This chapter describes hardware maintenance; for information on upgrading and maintaining Catalyst 5500 software, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. This chapter includes the following sections:

Checking Equipment Status, page 7-1 Replacing Hardware Components, page 7-5

Checking Equipment Status


Check the status of the Cisco Catalyst 5500, using the following methods:

Reading the Cisco Catalyst 5500 LEDs Querying the status using the Catalyst command line interface (CLI) Querying the system using CiscoWorks 2000 and Cisco WAN Manager (CWM)

Cisco Catalyst 5500 LEDs


LEDs of the Catalyst 5500 may vary, depending on which components are installed. The LEDs described in this section are factory default.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

7-1

Chapter 7 Checking Equipment Status

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Supervisor Engine Module LEDs


The front panel of the supervisor engine III (product number WS X5530-E3) is shown in Figure 7-1.
Figure 7-1 Supervisor Engine III Front Panel

Console and Auxiliary ports


WS-x5530 WS-U5531-FETX

S ST YS AT TE U M S

100%
PS PS FA N 1 2 R ES ET

SL

10/100Mbps LINK PCMCIA


10/100 FAST ETHERCHANNEL

10/100Mbps LINK

SUPERVISOR ENGINE I I I

CONSOLE

AUX

Switch

Load

Status LEDs

Reset Switch button Load display

PCMCIA slots

Uplink ports

The LEDs on the supervisor engine front panel indicate the status of the system, which includes the supervisor engine, the power supplies, and the fan assembly. Table 7-1 describes LED operation.
Table 7-1 Supervisor Engine III and Uplink Module LED Descriptions

LED SYSTEM STATUS

State Green Red Orange

Description Indicates that a series of self-tests and diagnostic tests has been passed. System is being booted or is faulty (fails a test or module is disabled). Fan modules have failed or redundant power supply is installed, but not turned on. The fan is operational. The fan is not operational. Power supply in left bay is operational. Power supply in left bay is not operational, switched off, or not receiving power. Power supply in the left bay is off or not installed.
Note

FAN PS1

Green Red Green Red Off

The Catalyst 5500 power supply LED is red when no modules are installed.

PS2

Green Red Off

The power supply in the right bay is operational. The power supply in the right bay is not operational, is switched off, or is not receiving input power. The power supply in the right bay is off or is not installed.
Note

The Catalyst 5500 power supply LED is red when no modules are installed.

SWITCH LOAD ACTIVE

1100% Green Orange

If the switch is operational, the switch load display indicates (as an approximate percentage) the current traffic load over the backplane. The supervisor engine is operational and active. The supervisor engine module is in standby mode.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-2

H10965

AC TIV

SL

PORT 1

MDIX

PORT 2

MDIX

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Checking Equipment Status

Table 7-1

Supervisor Engine III and Uplink Module LED Descriptions (continued)

LED SLOT 1 and SLOT 0 100 Mbps LINK

State On

Description Supervisor Engine III only: The Flash PC Card SLOT 1 and SLOT 0 LEDs light when their respective slot 1 and slot 0 Flash PC Card devices are accessed. The port is operating at 100 Mbps. The port is operating at 1000 Mbps. The port is operational. The link has been disabled by software. The link is bad and has been disabled due to a hardware failure. No signal is detected.

Green Green Orange Flashing orange Off

1000 Mbps Green

Ethernet Switching Module (10BaseT 24 Port) LEDs


Each switching module (Prod # WS-X5013) contains a STATUS LED. When on, this LED indicates that the switching module is operational and is powered up. It does not necessarily mean that the interface ports are functional or enabled. The LEDs on the faceplate of the Ethernet switching module (10BaseT 24 Port) are described in Table 7-2 and shown in Figure 7-2.
Table 7-2 Ethernet Switching Module (10BaseT 24 Port) LED Descriptions

LED STATUS

Description The switch performs a series of self-tests and diagnostic tests. If it passes all the tests, the status LED is green. If it fails any test, the status LED is red (or orange for a minor fault or if manually disabled).

Link

If the port is operational (a signal is detected), the LED is green. If the link has been disabled by software, the LED is orange. If the link is bad and has been disabled due to a hardware failure, the LED flashes orange. If no signal is detected, the LED is off.

Figure 7-2

Ethernet Switching Module (10BaseT 24 Port) LEDs

ST AT US

3 2 1

6 5 4

9 8 7

12 11 10

15 14 13

18 17 16

21 20 19

24 23 22

ETHERNET SWITCHING MODULE

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

H3043

7-3

Chapter 7 Checking Equipment Status

Maintaining the Cisco Catalyst 5500 Multiswitch Router

10/100 Mbps Fast Ethernet Switching Module (10/100BaseTX 12 Port) LEDs


The faceplate of each 10/100 Mbps Fast Ethernet Switching Module (Prod # WS-X5203) contains a module STATUS LED, and two LEDs for each switching port. The LEDs provide status information for the module and individual Fast Ethernet interface connections. The LEDs are described in Table 7-3 and are shown in Figure 7-3.
Table 7-3 10/100 Mbps Fast Ethernet Switching Module (10/100BaseTX 12 Port) LEDs

LED STATUS

Description The switch performs a series of self-tests and diagnostic tests. If it passes all the tests, the LED is green. If it fails a test other than an individual port test fails, the LED is red. During system boot or if the module is disabled, the LED is orange. During self-test diagnostics, the LED is orange. If the module is disabled, the LED is orange.

100 Mbps LINK (bottom LED)

If the port is operating at 100 Mbps, the LED is green. If the port is operating at 10 Mbps, the LED is off. If the port is operational (a signal is detected), the LED is green. If the link has been disabled by software, the LED is orange. If the link is bad and has been disabled due to a hardware failure, the LED flashes orange. If no signal is detected, the LED is off.

Figure 7-3

10/100 Mbps Fast Ethernet Switching Module (10/100BaseTX 12 Port) LEDs


1 2
LI NK 10 0 M bp s

US

AT

ST

LI

NK

10

bp

10/100 Mbps FAST ETHERNET SWITCHING MODULE

Route Switch Module LEDs


The RSM (product number WS-X5302) LEDs, shown in Figure 7-4, are described in Table 7-3.
Figure 7-4 RSM (WS-X5302) LEDs
0 1 C H AN N EL

H5796
C H AN N EL PC M C IA

EN C AB PU LE HA LT D

ST AT U S

SL SL O O T T 0 1

R ES ET

TX

R X

R X

TX

AU X

ROUTE SWITCH MODULE

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-4

H10366

PC M IC A

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components

Table 7-4

RSM (WS-X5302) STATUS LED Descriptions

LED STATUS

State Green Red Orange

Description All the self-tests have been passed. A test other than an individual port test has been failed. System boot, self-test diagnostics running, or the module is disabled. Indicates normal RSM operation. The system detected a processor hardware failure. Indicates IP microcode is loaded and the RSM is operational. Indicates PCMCIA devices in slot 0 and 1 are being accessed by the RSM. The port is transmitting a packet (LED is lit for approximately 50 ms). The port is receiving a packet (LED is lit for approximately 50 ms3)

CPU HALT ENABLED

On Off On

PCMCIA On SLOTs 0 and 1 TX 1 RX


2

Green Green

1. TX = transmit 2. RX = receive 3. ms = milliseconds

Using the Command Line Interface to Check Status


The Cisco Catalyst 5500 command line interface includes a series of commands that enable you to determine if the MSR is functioning correctly or where problems have occurred. Relevant commands for checking status include ping, traceroute, test snmp trap, and show. There are more than 100 show commands, many of which can be used to check status. To learn how to find more information concerning these and other commands, refer to the Command Reference Manual that came with the Cisco Catalyst 5500 MSR.

Replacing Hardware Components


This section describes how to perform the following removal and replacement procedures for Cisco Catalyst 5000 series field-replaceable units (FRUs):

Removing the Supervisor Engine, page 7-6 Using Flash Memory (PCMCIA) Cards (Supervisor Engine III), page 7-7 Removing and Replacing the Power Supply, page 7-8 Removing and Replacing the Chassis Fan Assembly, page 7-15

For instructions on installing and replacing switching modules, refer to the Catalyst 5000 Series Module Installation Guide.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

7-5

Chapter 7 Replacing Hardware Components

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Avoiding Problems When Inserting and Removing Modules


The ejector levers on the supervisor engine and switching modules align and seat the module connectors in the backplane (see Figure 7-5). Failure to use the ejector levers to insert the module can disrupt the order in which the pins make contact with the backplane. Follow the installation and removal instructions carefully. When removing a module, use the ejector levers to ensure that the module connector pins disconnect from the backplane properly. Any supervisor engine or switching module that is only partially connected to the backplane can disrupt the system. Detailed instructions for removing and installing switching modules are described in the Catalyst 5000 Series Module Installation Guide.
Figure 7-5 Ejector Levers and Captive Installation Screws (Supervisor Engine II Shown)
SW IT LO C AD H

R ES ET

10 0%

1%

LIN 10 0 K M BP S

LIN 10 K 0M BP S

OL

PS PS FA 1 2 N AC TIV E

ST AT US

M DI X

A4 11

M DI X

A4 11

SUPERVISOR ENGINE

CO

PO RT

PO RT

NS

Ejector lever

Captive installation screws

Tools Required
Use a flat-blade screwdriver to remove any filler (blank) modules and to tighten the captive installation screws that secure the modules in their slots. When you handle modules, use an ESD-preventive wrist strap or other grounding device to prevent electrostatic discharge (ESD) damage.

Removing the Supervisor Engine


Before you remove a supervisor engine, you should first upload the current configuration to a server. This saves time when bringing the module back online. You can recover the configuration by downloading it from the server to the nonvolatile memory of the supervisor engine. To remove a supervisor engine, perform the following steps:
Step 1 Step 2 Step 3

If you do not plan to immediately reinstall the supervisor engine you are removing, disconnect any network interface cables attached to the module ports. Use a screwdriver to loosen the captive installation screws at the left and right sides of the module. Grasp the left and right ejector levers and simultaneously pull the left lever to the left and the right lever to the right to release the module from the backplane connector.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-6

H9170

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components

Step 4 Step 5 Step 6 Step 7

Grasp the handle of the module with one hand and place your other hand under the carrier to support and guide the module out of the slot. Avoid touching the module. Carefully pull the module straight out of the slot, keeping your other hand under the carrier to guide it. Keep the module at a 90-degree orientation to the backplane. Place the removed module on an antistatic mat or antistatic foam. If the slot is to remain empty, install a module filler plate to keep dust out of the chassis and to maintain proper airflow through the module compartment.

Caution

Always install a switching module filler plate in empty switching module slots to maintain the proper flow of cooling air across the modules.

Note

When you remove and replace the supervisor engine, the system provides status messages on the console screen. The messages are for information only. Enter the show system and show module commands to view specific information. For additional information, refer to the Catalyst 5000 Series Software Configuration Guide and the Catalyst 5000 Series Command Reference.

Replacing the Supervisor Engine


To replace the supervisor engine, perform the following steps. Note that the supervisor engine must go in slot 1 and the redundant supervisor engine in slot 2.
Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Remove the module filler plate, if any. Grasp the handle of the module with one hand and carefully align the module with the slot, keeping your other hand under the carrier to support it. Keep the module at a 90-degree orientation to the backplane. Carefully push the module straight into the slot, keeping one hand under the carrier to guide it. Avoid touching the module. Make sure that the ejector levers are pushed in, holding the module to the backplane connector. Use a screwdriver to tighten the captive installation screws at the left and right sides of the module. Reattach network interface cables to the module ports.

Using Flash Memory (PCMCIA) Cards (Supervisor Engine III)


The Flash memory (PCMCIA) card slots on the front panel of Supervisor Engine III are for additional PCMCIA-based Flash memory. You can use this Flash memory to store and run Cisco IOS images, or to serve as an I/O device. Occasionally, it might be necessary to remove and replace Flash memory cards; however, removing Flash memory cards is not required and is not recommended after the cards are installed in the slots. Supervisor Engine III has two PCMCIA slots: slot 0 (bottom) and slot 1 (top). The following procedure is generic and can be used for a Flash memory card in either slot position.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

7-7

Chapter 7 Replacing Hardware Components

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Note

You can insert and remove the Flash memory card with the power on. Before you install a card, verify that the Flash memory card is set with write protection off. The write-protect switch is located on the front edge of the card when oriented with the printing right side up and the edge connector end away from you. (See Figure 7-6.)
Figure 7-6 Locating the Flash Memory Card Write-Protection Switch

Flash PC card write protection

Flash PC card shown with write protection off

Flash PC card

Use the following procedure for installing and removing a Flash memory card:
Step 1

Face the front panel of the switch and hold the Flash memory card with the connector end of the card toward the slot. The connector end of the card is opposite the end with the write-protection switch, which is shown in Figure 7-6. Insert the card into the appropriate slot until the card completely seats in the connector at the back of the slot and the eject button pops out toward you. Note that the card does not insert all the way into the slot; a portion of the card remains outside the slot. Do not attempt to force the card past this point. To eject a card, press the appropriate ejector button until the card is free of the connector at the back of the slot. Remove the card from the slot and place it in an antistatic bag.

Step 2

Step 3 Step 4

Removing and Replacing the Power Supply


This section describes the procedure you use to remove and install power supplies for the Cisco Catalyst 5500 switches. Use a flat-blade screwdriver to perform these procedures.

Removing an AC-Input Power Supply, page 7-9 Installing an AC-Input Power Supply, page 7-10 Removing a DC-Input Power Supply, page 7-11 Installing a DC-Input Power Supply, page 7-13

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-8

H2352

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components

Removing an AC-Input Power Supply


Follow these steps to remove an AC-input power supply:

Note

In systems with redundant power supplies, the faulty supply can be replaced while the system is operating.

Step 1

Turn off the power switch on the power supply you are removing (see Figure 7-7).

Warning

Do not touch the power supply when the power cord is connected. For systems with a power switch, line voltages are present within the power supply even when the power switch is off and the power cord is connected. For systems without a power switch, line voltages are present within the power supply when the power cord is connected.

Caution

Failure to turn off the power supply could result in equipment damage.
Figure 7-7 AC-Input Power Supply Front Panels
Power connection
AC OK FAN OK OUTPUT FAIL

Metal prongs

Power switch

Captive screw

Step 2

Disconnect the power cord from the power source.

Warning

Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.

Step 3 Step 4

Disconnect the power cord from the power supply being removed. Using a flat-blade screwdriver, loosen and remove the captive installation screws (see Figure 7-7).

Caution Step 5

Use both hands to install and remove power supplies. Grasp the power supply handle with one hand and place your other hand underneath to support the bottom of the supply, as shown in Figure 7-8 (Cisco Catalyst 5000 supply shown).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

H11764

7-9

Chapter 7 Replacing Hardware Components

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Figure 7-8

Handling an AC-Input Power Supply

POWER 100-127/200-240 V~ 8.0/4.0 A 60/50 Hz

Warning

Keep your hands and fingers out of the power supply bays. High current is present on the power backplane when the system is operating.

Step 6 Step 7

Pull the supply out of the bay and put it aside. If the power supply bay is to remain empty, install a blank power supply filler plate over the opening; secure it with the mounting screws.

Caution

Always install a filler plate over an empty power supply bay, not only to protect the inner chassis and connectors from dust or other contamination, but to prevent possible contact with the high current levels of those connectors when the chassis is powered on.

Installing an AC-Input Power Supply


Warning

Before installing a Cisco Catalyst 5500 AC-input power supply, read the warning in the Removing an AC-Input Power Supply section.

Follow these steps to install an AC-input power supply:


Step 1

Turn off the power switch on the power supply you are installing (see Figure 7-9).

Caution

Failure to turn off the power supply could result in equipment damage.

Caution

Use both hands to install and remove power supplies. The Cisco Catalyst 5500 power supply weighs 22 lb. (9.9 kg).

Warning

Keep your hands and fingers out of the power supply bays. High current is present on the power backplane when the system is operating.

Step 2

Grasp the power supply handle with one hand and place your other hand underneath to support the bottom of the supply, as shown in Figure 7-11.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-10

H2751

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components

Step 3 Step 4 Step 5

Slide the power supply all the way into the power supply bay. Using a flat-blade screwdriver, tighten the captive installation screws (see Figure 7-10). Before connecting the power supply to a power source, ensure that all site power and grounding requirements described in the Cisco Media Gateway Controller Hardware Installation Guide have been met. Plug the power cord into the power supply. Connect the other end of the power cord to an AC-power input source.

Step 6 Step 7

Note

Each AC-input power supply operating at 120 VAC requires a dedicated 20A service and 20A plug and receptacle. It is not acceptable to power the Cisco Catalyst 5500 from a 15A line cord because of the safety ratings under which the Cisco Catalyst 5500 is certified.

Caution

In a system with dual power supplies, connect each power supply to a separate input source. In case of a power source failure, the second source will probably still be available and can maintain maximum overcurrent protection for each power connection. Turn the power switch to the ON position on the power supply. Verify that power supply operation and the front panel LEDs are in the following states: AC OK LED is green. FAN OK LED is green. OUTPUT FAIL LED is off.

Step 8 Step 9

Step 10 Step 11

Verify that the appropriate supervisor engine module PS1 and PS2 LEDs are on (green). Enter the show system command to display the power supply and system status. If the LEDs or show system command indicate a power or other system problem, refer to Appendix C, Troubleshooting Cisco Switch Signaling. for troubleshooting information.

Removing a DC-Input Power Supply


Follow these steps to remove a DC-input power supply (product number WS-C5568):
Step 1

Verify that power is off to the DC circuit on the power supply you are removing.

Warning

Before performing the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.

Warning

Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

7-11

Chapter 7 Replacing Hardware Components

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Step 2 Step 3

Turn the power switch to the OFF (0) position on the power supply you are removing (see Figure 7-9). Remove the two screws securing the terminal block cover and slide the cover straight off the terminal block (see Figure 7-9).
Figure 7-9 DC-Input Power Supply Front Panels
Remove
DC OK FAN OUTPUT OK FAIL

Terminal block cover

Remove Power switch


0

Captive screw

Step 4 Step 5

Disconnect the DC-input wires from the terminal block. Disconnect the ground wire last. Disconnect the central office (CO) ground from the CO ground connector (Figure 7-10).
Figure 7-10 DC-Input Power Supply CO Ground
FA N 2 1 RE SE T TX RX LIN K SLO Ene t PC MC SLO T2 T1 PS PS
SWITCH/PROCESSOR

IA EJE CT

o o

CO ground connector location


Step 6

Loosen and remove the captive screws on the power supply (see Figure 7-9).

Caution Step 7

Use both hands to remove and install power supplies. Grasp the power supply handle with one hand and place your other hand underneath as you slowly pull the power supply out of the bay (see Figure 7-11).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-12

28649

H8767

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components

Warning

Keep hands and fingers out of the power supply bays. High voltage is present on the power backplane when the system is operating.
Figure 7-11 Handling a DC Power Supply

INPUT 48/60 14.0/8.0 A

Step 8

If the bay is to remain empty, install a blank power supply filler plate (Cisco part number 700-00177-01) over the opening and secure it with the mounting screws. This protects the inner chassis from dust and prevents accidental contact with live voltage at rear of the bay.

Caution

Always install a filler plate over an empty power supply bay to protect the inner chassis and connectors from dust or other contamination and to prevent possible contact with the high current levels of those connectors when the chassis is powered on. Reinstall the power supply terminal block cover.

Step 9

Installing a DC-Input Power Supply


Follow these steps to install a DC-input power supply:
Step 1

Verify that power is off to the DC circuit on the power supply you are installing.

Warning

Before performing any of the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.

Warning

Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.

Step 2

Connect the switch to the CO ground through the CO ground connector shown in Figure 7-10. Remove the adhesive strip covering the CO ground connector on the switch. Use the following guidelines when connecting the switch to the CO ground:

The ground wire lug must be less than or equal to 0.320 in. (8.1 mm) to fit within the ground connector.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

H7805

7-13

Chapter 7 Replacing Hardware Components

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Step 3

The ground wire must be 10 to 12 AWG. Use the larger gauge ground wire when the switch is further away from the ground location.

Turn the power switch to the OFF (0) position on the power supply you are installing (see Figure 7-10).

Caution

Use both hands to remove and install power supplies.

Warning

Keep hands and fingers out of the power supply bays. High voltage is present on the power backplane when the system is operating.

Step 4 Step 5 Step 6 Step 7

Grasp the power supply handle with one hand and place your other hand underneath as you slowly insert the power supply into the bay (see Figure 7-11). Using a screwdriver, tighten the captive screws on the power supply (see Figure 7-9). Remove the terminal block cover (see Figure 7-9). Remove the two screws securing the terminal block cover and slide the cover straight off the terminal block. Attach the appropriate lugs to the DC-input wires. Maximum width of the lugs is 0.300 inch (7.6 mm). Suggested lugs are AMP 322985 or 52941. Suggested DC-input wires are 10 AWG.

Caution

When stranded wiring is required, use approved wiring terminations, such as closed-loop or spade-type with upturned lugs. These terminations must be the appropriate size for the wires and clamp both the insulation and conductor. Connect the DC-input wires to the terminal block. If not already done, route the DC-input power cable through the conduit from your power source, through the conduit bracket on the power supply, and make a sufficient length of wire available to attach to the three terminal block connections. Attach and tighten the conduit to the conduit bracket. How this conduit is attached depends on your site; its attachment is beyond the scope of this document.

Step 8

Caution Step 9

Connect the ground wire first. Connect the DC-input wires to the terminal block (see Figure 7-12). The proper wiring sequence is ground to ground, positive to positive (line to L), and negative to negative (neutral to N). Note that the ground wire should always be connected first and disconnected last. After ensuring that all wire connections are secure, reinstall the terminal block cover.

Step 10

Caution

To prevent a short-circuit or shock hazard after wiring the DC-input power supply, reinstall the terminal block cover.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-14

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components

Figure 7-12 DC-Input Power Supply Connectors

Terminal block connectors


INPUT 48/60 14.0/8.0 A

Terminal block connectors


INPUT 48/60 14.0/8.0 A

Power switch

Caution

In a system with dual power supplies, use the modular power cord to connect each power supply to a separate input line. In case of a line failure, the second source will most likely still be available and can maintain maximum overcurrent protection for each power connection. Remove the tape from the circuit breaker switch handle and restore power by moving the circuit breaker switch handle to the on position. Turn the power switch to the on position on the power supply. Verify power supply operation. Verify that the power supply front panel LEDs are in the following states: DC OK LED is green. FAN OK LED is green. OUTPUT FAIL LED is off. Verify that the appropriate supervisor engine module PS1 and PS2 LEDs are on and green. Enter the show system command to display the power supply and system status.

Step 11 Step 12 Step 13

Removing and Replacing the Chassis Fan Assembly


This section describes how to remove and install chassis fan assemblies. Use a flat-blade screwdriver to perform this procedure.

Removing the Fan Assembly


Perform the following steps to remove the existing chassis fan assembly:

Caution

Never operate the system if the fan assembly is removed or if it is not functioning properly. An overtemperature condition can result in severe equipment damage.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

H9325

7-15

Chapter 7 Replacing Hardware Components

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Note

The fan assembly is designed to be removed and replaced while the system is operating without presenting an electrical hazard or damage to the system.

Step 1 Step 2 Step 3

Locate the fan assembly to the left of the card cage (see Figure 7-13). Loosen the two captive installation screws by turning them counterclockwise. Grasp the fan assembly with both hands and pull it outward, joggling it if necessary to unseat it from the backplane. Pull it clear of the chassis and place it in a safe location.

Installing the Fan Assembly


Perform the following steps to install the new fan assembly:
Step 1 Step 2 Step 3 Step 4

Hold the fan assembly with the fans facing to the right. Place the fan assembly into the front chassis cavity so that it rests on the chassis, and then lift the fan assembly up slightly, aligning the top and bottom guides. Push the fan assembly into the chassis until the captive installation screws meet the chassis. Tighten the captive installation screws by turning them clockwise.

Figure 7-13 Cisco Catalyst 5500 Chassis Fan Assembly

SY ST ST AT EM US

AC TIV E

SW ITC LO H G

CO NS OL E

RE SE T

100 %

FA N

1%

LIN 100 K Mb ps

PO RT

PS PS 2 1

SUPERVISOR ENGINE

MD IX

MII

LIN 100 K Mb ps

MD IX

PO RT

SY ST ST AT EM US

TIV

ITC

SE

SW

100

AC

LO

1%

FA

RE

NS

OL

CO

ps

RT

PO

PS

Mb

ps

100

IX

MD

MII

LIN

SUPERVISOR ENGINE

LIN

100

PS

Mb

IX

PO

RT

MD

MII

MII

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-16

H10647

OL-0800-05

Chapter 7

Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components

Checking the Installation


Perform the following steps to verify that the new fan assembly is installed correctly:
Step 1

Listen for the fans; you should immediately hear them operating. If you do not hear them, ensure that the fan assembly is completely inserted in the chassis and that the faceplate is flush with the switch back panel. If after several attempts the fans do not operate, or if you experience trouble with the installation (for instance, if the captive installation screws do not align with the chassis holes), contact the Cisco Technical Assistance Center (TAC) for assistance. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC.

Step 2

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05

7-17

Chapter 7 Replacing Hardware Components

Maintaining the Cisco Catalyst 5500 Multiswitch Router

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-18

OL-0800-05

C H A P T E R

Troubleshooting the Cisco MGC Node


This chapter describes troubleshooting methods for the Cisco Media Gateway Controller (MGC) node. It includes the following sections to help you isolate system problems:

Troubleshooting Overview, page 8-1 Troubleshooting Using Cisco MGC Alarms, page 8-2 Resolving SS7 Network Related Problems, page 8-86 Resolving Bearer Channel Connection Problems, page 8-115 Resolving SIP Communication Problems, page 8-148 Tracing, page 8-148 Platform Troubleshooting, page 8-158

Troubleshooting Overview
This chapter uses the alarms and logs that appear at the Cisco MGC as the basis for isolating problems within the system. You can find a complete listing of alarms and logs in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. Typically, suggested corrective actions start with simple troubleshooting tasks and become increasingly more complex. It is easier, for example, to check LEDs and cabling than to perform a call trace. The suggested corrective actions point to other chapters in this manual, as well as to troubleshooting tools including the Cisco MGC software, the Cisco WAN Manager, and CiscoWorks. Additionally, you will find examples of troubleshooting typical problems. The examples provide a logical sequence for troubleshooting that you can use as a model.

Note

Troubleshooting of the Cisco MGC node should be performed by someone who has been trained in the complexities of the system, who has some experience administering the system, and who understands UNIX at the system administrator level. The following sections contain various equipment failure scenarios for the solution, including

Cisco SLT Failure Cisco MGC Failure Operating System Failure

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-1

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Cisco SLT Failure


Each Cisco Signaling Link Terminal (SLT) has an Reliable User Datagram Protocol (RUDP)/User Datagram Protocol (UDP)/IP connection to each Cisco MGC for the transfer of Message Transfer Part (MTP) Level 3 (MTP3), ISDN User Part (ISUP), and Transaction Capabilities Application Part (TCAP) information. A Cisco SLT platform failure results in the surviving Cisco SLT platforms taking over the distribution of messages to the active Cisco MGC. Cisco SLT platforms should be provisioned so that half of the platforms can support the entire signaling load. The result is that a Cisco SLT platform failure has no significant effect on call processing. There are several Cisco SLT failure scenarios to consider:

An IP link failure between the Cisco SLT and the Cisco MGC, which indicates that it is impossible to transfer MTP3 messages. In this case, MTP Level 2 (MTP2) transmits Status Indication Processor Outage (SIPO) messages to the signaling transfer point (STP) to initiate switchover to another Cisco SLT. In the case where MTP2 failed (equivalent to a Cisco SLT failure), no SIPO messages are sent because MTP2 is inoperable. Instead, the mated STP pair detects the failure because of timer expiration or link unavailability and initiates the switchover to another SS7 link. If a Cisco MGC fault is detected by a Cisco SLT timer, a coordination mechanism causes SS7 messaging to flow to the newly active (formerly standby) Cisco MGC. The standby Cisco MGC assumes control for all calls in progress and all new calls.

Cisco MGC Failure


Cisco MGC hosts run in active-standby mode. The call-processing application is active on only one Cisco MGC platform at a time, and the application switches to the standby platform when a critical alarm occurs. The result is that Cisco MGC failure and switchover events are invisible to the SS7 signaling network. Cisco MGC alarms can be configured as minor, major, or critical. Critical alarms are generated whenever any significant failure occurs. Any critical alarm causes a switchover to occur. For example, if the call engine or I/O channel controller (IOCC)-MTP in the active Cisco MGC should fail, there is a disconnection from the process manager and a switchover to the standby Cisco MGC.

Operating System Failure


An operating system (OS) or hardware failure in the active Cisco MGC can also cause a switchover to the standby Cisco MGC. The failover daemon in the standby Cisco MGC detects the failure of the active Cisco MGC and instructs the process manager to initiate a switchover. The standby Cisco MGC then takes over all call-processing functions. The switchover is transparent to all the Cisco SLTs.

Troubleshooting Using Cisco MGC Alarms


The Cisco MGC generates alarms to indicate problems with processes, routes, linksets, signaling links, and bearer channels. The Cisco Media Gateway Controller Software Release 9 Messages Reference Guide lists all of the Cisco MGC alarms and logs, and provides descriptions, possible causes, and suggested actions. You can find procedures for alarms that require you to take corrective action in the Alarm Troubleshooting Procedures section on page 8-9.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-2

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

The active alarm log files reside in the /opt/CiscoMGC/var/log directory. These alarm log files are archived based on the criteria set in the dmprSink.dat file. For more information on the dmprSink.dat file, refer to the Configuring the Data Dumper section on page A-2. Troubleshooting using Cisco MGC alarms is described in the following sections:

Retrieving All Active Alarms, page 8-3 Acknowledging Alarms, page 8-3 Clearing Alarms, page 8-4 Troubleshooting with System Logs, page 8-4 Alarm Troubleshooting Procedures, page 8-9

Retrieving All Active Alarms


To retrieve all active alarms, log in to the active Cisco MGC, start a Man-Machine Language (MML) session, and enter the following command:
rtrv-alms

The system returns a response that shows all active alarms, in a format similar to the following:
Media Gateway Controller 2000-02-26 11:41:01 M RTRV "LPC-01: 2000-02-26 09:16:07.806," "LPC-01:ALM=\"SCMGC MTP3 COMM FAIL\",SEV=MJ" "IOCM-01: 2000-02-26 09:17:00.690," "IOCM-01:ALM=\"Config Fail\",SEV=MN" "MGC1alink2: 2000-02-26 09:17:47.224,ALM=\"SC FAIL\",SEV=MJ" "MGC1alink3: 2000-02-26 09:17:47.225,ALM=\"SC FAIL\",SEV=MJ" "MGC1alink4: 2000-02-26 09:17:47.226,ALM=\"SC FAIL\",SEV=MJ" "MGC2alink1: 2000-02-26 09:17:47.227,ALM=\"SC FAIL\",SEV=MJ" "MGC2alink2: 2000-02-26 09:17:47.227,ALM=\"SC FAIL\",SEV=MJ" "MGC2alink4: 2000-02-26 09:17:47.229,ALM=\"SC FAIL\",SEV=MJ" "dpc5: 2000-02-26 09:17:47.271,ALM=\"PC UNAVAIL\",SEV=MJ" "ls3link1: 2000-02-26 09:16:28.174," "ls3link1:ALM=\"Config Fail\",SEV=MN" "ls3link1: 2000-02-26 09:18:59.844,ALM=\"SC FAIL\",SEV=MJ"

Acknowledging Alarms
Acknowledging an alarm does not clear the alarm. You can still retrieve it with the rtrv-alm MML command. To acknowledge an alarm, log in to the active Cisco MGC, start an MML session, and enter the following command:
ack-alm:comp :"alarmCategory "

Where:

compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of select provisioned components by entering the prov-rtrv:all MML command. alarmCategoryMML name of the associated alarm category. The entered name must match exactly the name of the alarm as it is displayed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-3

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

For example, to acknowledge a signaling channel fail alarm (SC FAIL) that occurred on the link MGC2alink1, enter the following command:
ack-alm:MGC2alink1:"SC FAIL"

Clearing Alarms
You can clear an alarm for a affected component. Clearing the alarm removes it and any associated alarms from the internal processes list maintained by the Cisco MGC. To clear an alarm, log in to the active Cisco MGC, start an MML session, and enter the following command:
clr-alm: comp :alarmCategory

Where:

compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of select provisioned components by entering the prov-rtrv:all MML command. alarmCategoryMML name of the associated alarm category. The entered name must match exactly the name of the alarm as it is displayed.

For example, to acknowledge a signaling channel fail alarm (SC FAIL) that occurred on the link MGC2alink1, enter the following command:
clr-alm:MGC2alink1:"SC FAIL"

Troubleshooting with System Logs


You can use system logs in conjunction with alarms to provide vital information that you can use in troubleshooting problems. A complete listing of system logs can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. The active system log files reside in the /opt/CiscoMGC/var/log directory. These system log files are archived based on the criteria set in the dmprSink.dat file. For more information on the dmprSink.dat file, refer to the Configuring the Data Dumper section on page A-2.

Note

Log level and destination can be controlled through settings in the XECfgParm.dat file. Refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide for more information.

Viewing System Logs


The best method to use to view logs is to use the log viewer, which is part of the Cisco MGC viewer toolkit. The log viewer enables you to search for specific log information, accounts for log rotations, and makes new logs available. The log server is responsible for log rotation. The log server closes the current file, and creates a new file for current logging. The log viewer also has an option for exporting the results of a log file search to a UNIX file. For more information on using the log viewer, refer to the Using the Log Viewer section on page 3-136.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-4

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

To view a log file when you do not have the Cisco MGC viewer toolkit installed on your system, complete the following steps:
Step 1

Log in to the active Cisco MGC enter the following UNIX command to change to the /opt/CiscoMGC/var/log directory:
cd /opt/CiscoMGC/var/log

Step 2

Enter the following UNIX command to list the available logs:


ls

The system returns a response similar to the following:


alm.csv cdr.bin meas.csv mml.log mml_20010516141831.log mml_20010517040508.log mml_20010518040508.log platform.log platform_20010516141831.log platform_20010517040508.log platform_20010518040508.log platform_20010519040508.log platform_20010520040508.log platform_20010521040508.log

Step 3

To view a specific system log file, enter the following command:


cat log_file_name | more

Where log_file_name is the name of the log file you want to view.

Note

Because the log files are very large, use the more parameter to scroll through the file. You might prefer to print the file to find the information you need. For example, you would enter the following command to view a specific platform log file:
cat platform_20010516141831.log | more

The system returns a response similar to the following:


Tue May 8 13:35:32:920 2001 EST | cdrDmpr (PID 15526) <Error> GEN_ERR_GETCFGPARM: cdrDmprSink::readObj: Failed to get MGC_CDR_NODE_ID for facility * Tue May 8 13:35:32:921 2001 EST | cdrDmpr (PID 15526) <Error> GEN_ERR_GETCFGPARM: cdrDmprSink::readObj: Failed to get MGC_CDR_NODE_ID for facility * Tue May 8 13:35:32:922 2001 EST | cdrDmpr (PID 15526) <Error> GEN_ERR_GETCFGPARM: cdrDmprSink::readObj: Failed to get MGC_CDR_NODE_ID for facility *Process id is 15517 and thead id is 1 in set the destination Tue May 8 13:37:13:201 2001 EST | unknown (PID 15663) <Info> /tmp/almM_input: installed time handler, hdlrId = 1 Tue May 8 13:37:31:786 2001 EST | engine (PID 15590) <Error> CP_ERR_START_GWAY_AUDIT: engProcEvtHdlr::handleGoActiveLocal Failed to start GWAY auditProcess id is 15508 and thead id is 1 in set the destination Process id is 15509 and thead id is 1 in set the destination --More--

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-5

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Understanding System Log Messages


Each system log message uses the following format:
Timestamp, Process Name, Process ID, <Log Level>, Log ID:<Message Text>

TimestampDisplays the date and time on the system when the log message was created, for example, May 8 01:35:23:047 2001 EST. The time displayed is down to the millisecond level. Process NameDisplays the name of the process that created the log message, for example, engine. Process IDDisplays the identification number of the process that created the log message, for example, (PID29974). Log LevelDisplays the severity level of the log message, for example, "Info". Log IDDisplays a short, symbolic name for the message, for example, GEN_ERR_GETCFGPARM:. Message TextDisplays the log message text, for example, installed time handler, hdlrId = 1. The message text can take up multiple lines, but is typically only a single line.

Changing the Log Level for Processes


In order to control the types of log messages being written to the system log file, you can use the set-log MML command to change the logging level for system processes. The Cisco MGC can generate a large number of logged events, which can result in large numbers of archived system log files in the opt/CiscoMGC/var/spool directory. For example, if the maxTime parameter in the dmprSink.dat file is set to 15 minutes, over 2000 files are created in the opt/CiscoMGC/var/spool directory daily. Therefore, you might want to limit the number of logs being created by changing the logging level of the Cisco MGC software processes. Table 8-1 lists the logging levels that can be selected for the Cisco MGC software processes without severely degrading system performance.
Table 8-1 Processes and their Lowest Possible Logging Levels

Process Engine All others

Lowest Logging Level Without Severe Performance Degradation Informational (the debug level causes major performance impactsdo not set). Debug, but only a single process can be in debug at any point in time.

Caution

Debug level logging provides extremely verbose output and, if misused, can cause severe system performance degradation. To change the log level of a single process, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-log:process_name :log_level [,confirm]

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-6

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Where:

process_nameName of the process for which you want to change the logging level. Processes are listed in the Understanding Processes section on page 3-4. log_levelDesired logging level. Valid log levels are as follows:
CRITCritical level messages WARNWarning condition messages ERRError condition messages TRACETrace messages INFOInformational messages DEBUGDebug-level messages (lowest level). Do not set the process to this logging level

unless directed to do so by the Cisco Technical Assistance Center (TAC).

confirmUsed when changing the logging level of a process to debug (DEBUG).

Note

Setting the logging level at a given level means that the information related to the levels above the selected level are included. In other words, setting a process to the INFO logging level means that information related to the TRACE, ERR, WARN, and CRIT levels are also displayed. The order of the levels shown above can also be viewed as a verbosity level, in that at CRIT, the least information is logged and at DEBUG the most information logged. For example, to change the log level of the engine, enter the following command:
set-log:eng-01:info

To change the log level of all processes, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-log:all:log_level

Where log_level is the desired logging level. Valid log levels are as follows:

CRITCritical level messages WARNWarning condition messages ERRError condition messages TRACETrace messages INFOInformational messages

Note

Setting the logging level at a given level means that the information related to the levels above the selected level are included. In other words, setting a process to the INFO logging level means that information related to the TRACE, ERR, WARN, and CRIT levels are also displayed. The order of the levels shown above can also be viewed as a verbosity level, in that at CRIT, the least information is logged and at DEBUG the most information logged. For example, to change the log level of all processes to warning, enter the command:
set-log:all:warn

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-7

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Note

The logging level of the process manager (PM-01) cannot be set using the set-log:all:log_level MML command. You can only change the logging level of the process manager using the set-log:pm-01:log_level MML command.

Note

The set-log:all:log_level MML command cannot be used to set all of the processes to the debug (DEBUG) logging level.

Note

The disk monitor (DSKM-01) process does not accept log-level change requests.

Creating a Diagnostics Log File


You can create a diagnostics log file that records the MML commands and responses that you execute. To do this, perform the following steps:
Step 1

Create a diagnostics log file by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
diaglog:filename:start

Where filename is the name of your diagnostics log file. Enter the name only, do not enter a suffix, such as .log.
Step 2 Step 3

Perform your troubleshooting procedures. When you have finished troubleshooting and you want to view your diagnostics file, enter the following command at the active Cisco MGC:
diaglog:filename:stop

The file, which is given the name you entered in Step 1, without a suffix, can be found in the $BASEDIR/var/log directory. You can view the file using a text editor, such as vi.

Collecting System Data for Cisco TAC


Release 9.4(1) introduces a data collection script for the Cisco MGC software. When you run this script, a data snapshot of your system is saved into a log file. You should run this script shortly after you discover a problem, and prior to taking any corrective action. This script collects the following information in the log file:

System name System boot messages Operating system patch level System patch level Processor information Disk usage

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-8

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Processor tables CPU utilization Number of users logged in Statistics for the Ethernet interfaces IP routing System setup Swap space Date and time of last system reboot Permissions for the configuration library (CONFIG_LIB) File permissions for the /opt/CiscoMGC/etc and /opt/CiscoMGC/bin directories Copy of the XECfgParm.dat file

To collect your system data snapshot, perform the following steps:


Step 1

Log in to your active Cisco MGC, and enter the following UNIX command to change directories:
cd /opt/CiscoMGC/local

Step 2

Enter the following to run the system data snapshot script:


collectdata

The system returns a response that indicates the name of the file and the data path to the file.

Note

The name of the log file contains the time stamp for file creation and the name of the MGC host. The file is always saved to the opt/CiscoMGC/var/log directory. Provide the log file to the Cisco TAC as instructed by TAC personnel.

Step 3

Alarm Troubleshooting Procedures


This section contains alarms that require you to take corrective action. A complete list of alarms, including those that do not require you to take corrective action, can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.

All Conn Cntl Links Fail


This alarm occurs when the MGCP session loses a heartbeat, indicating that the session is down.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-9

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces between the Cisco MGC and the associated media gateway working properly. are

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the media gateway can be found in its associated documentation.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step3.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the media gateway can be found in its associated documentation.

Step 3

Verify that the near-end and far-end MGCP sessions are operating normally. Refer to the documentation for the affected media gateway for more information on verifying the functioning of the MGCP sessions. If the MGCP sessions are not operating normally, return the MGCP sessions to normal operations, as described in the documentation for the affected media gateway. Otherwise, proceed to Step 3.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

All C7 IP Links Fail


This alarm occurs when communication is lost to all Cisco SLTs of every configured protocol family. This defaults to a critical alarm, and causes an automatic switchover, if a standby Cisco MGC is present.

Note

The ability to generate this alarm is changed in a patch (CSCOgs019) to Release 9.4(1) and for Release 9.5(2) and up. Generation of this alarm is now controlled by an XECfgParm.dat parameter, *.AllLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm is not generated when the alarm condition occurs. If you want this alarm to be generated, you must set the parameter to true, using the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If your Cisco MGC hosts are in separate geographic locations, we recommend that you set the value of *AllLinksFailCausesFailover to true. If you are running Release 9.4(1) with patch CSCOgs019 installed, and want to enable the generation of this alarm, you must enter the parameter manually in the XECfgParm.dat file. The XECfgParm.dat files in subsequent releases contain the parameter.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-10

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. If your system is provisioned with destinations that use more than one version of SS7, ensure that this alarm is configured correctly, as described in the Verifying Configuration to Support Multiple Versions of SS7 section on page 8-113. Verify that the Cisco SLTs are operating normally, as described in the Checking Equipment Status section on page 6-2 and the Using the Cisco SLT Operating System to Check Status section on page 6-4. Verify that the Ethernet interfaces between the Cisco MGC and the Cisco SLTs are working properly.

Step 3

Step 4

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 5.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an interface card on the Cisco SLT can be found in the Replacing a Cisco SLT section on page 6-6.

Step 5

Verify that the configuration for your system is correct. To verify the provisioning data for your Cisco MGC, use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. To verify the provisioning data for the Cisco SLTs, use show commands, as described in the Using the Cisco SLT Operating System to Check Status section on page 6-4. If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of your Cisco SLTs is incorrect, modify the provisioning data for your system. Refer to the Cisco Signaling Link Terminal document for more information. If the configuration of both the Cisco MGC and the Cisco SLTs are correct, then proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

All ISDN BRI IP Conn Fail


This alarm occurs when all IP connections supporting an ISDN BRI data pathway has failed.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-11

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 2

Determine the health of the associated media gateway using the procedures in the user documentation for the media gateway. If the media gateway is working correctly, proceed to Step 3. If the media gateway is not healthy, restore it using the procedures in the user documentation for the media gateway. If those procedures restore the media gateway and this alarm clears, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Verify the functioning of the cabling between the Cisco MGC and the switch. If the cables are functioning properly, proceed to Step 4. If you find bad cable(s), replace them. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 4.

Step 4

Verify the functioning of the associated switch. Refer to the documentation for your switch for the necessary steps. If the switch is functioning properly, proceed to Step 5. If the switch is not functioning properly, refer to the appropriate troubleshooting procedures in the documentation for the switch. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 5

Check the IP connectivity between the Cisco MGC and the associated Cisco BRI voice gateway. If the IP connectivity is good, proceed to Step 6. If the IP connectivity is bad, restore the IP connectivity. If the alarm clears after the IP connectivity is restored, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Verify that the provisioning data for your ISDN BRI backhaul connect is correct. To verify the provisioning data, use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. . If the provisioning data is correct, proceed to Step 7. If the provisioning data is not correct, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

All ISDN IP Conn Fail


This alarm occurs when communication is lost to all ISDN IP connections. The severity of this alarm is Critical, which causes an automatic switchover if a standby Cisco MGC is present.

Note

The ability to change the severity level of this alarm is implemented in a patch (CSCOgs059) for Release 9.5(2). The severity level of this alarm is now controlled by an XECfgParm.dat parameter, *.AllISDNLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm has a severity level of Major. If you set this parameter to true, this alarm has a severity level of Critical. This property should be set to true if your Cisco MGC hosts are in separate geographic locations. You can also set this parameter to true if your system is not processing SS7 calls and you want your system

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-12

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

to perform an automatic switchover should all of the ISDN IP connections fail. To change the value of this parameter, use the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected media gateways are operating normally, as described in the associated documentation. Verify that the Ethernet interfaces between the Cisco MGC and the media gateways are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on a media gateway can be found in its associated documentation.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 2.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the media gateway can be found in its associated documentation.

Step 4

Verify that the configuration for your system is correct. To verify the provisioning data for your Cisco MGC, use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. To verify the provisioning data for the media gateways, use show commands, as described in the associated documentation. If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of your media gateways is incorrect, modify the provisioning data for the media gateways. Refer to the documentation associated with the media gateway for more information. If the configuration of the Cisco MGC and the media gateways are correct, then proceed to Step 5.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

All M3UAKEY Ack Pending


This alarm occurs when the MGC cannot send or receive traffic for the identified SS7 signaling service associated with a Cisco ITP.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-13

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected M3UA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. The AS definitions should match the routing contexts of the M3UA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

All M3UA Assoc Fail


This alarm occurs when all M3UA associations transporting SS7 signaling have failed.

Note

This alarm is valid as of Release 9.4(1).

Note

The ability to generate this alarm is changed in a patch (CSCOgs019) to Release 9.4(1) and for Release 9.5(2) and up. Generation of this alarm is now controlled by an XECfgParm.dat parameter, *.AllLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm is not generated when the alarm condition occurs. If you want this alarm to be generated, you must set the parameter to true, using the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If your Cisco MGC hosts are in separate geographic locations, we recommend that you set the value of *AllLinksFailCausesFailover to true. If you are running Release 9.4(1) with patch CSCOgs019 installed, and want to enable the generation of this alarm, you must enter the parameter manually in the XECfgParm.dat file. The XECfgParm.dat files in subsequent releases contain the parameter.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-14

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Cisco ITPs are operating normally. Refer to the documentation for your Cisco ITP for more information. If you find that the Cisco ITPs are operating normally, proceed to Step 3. Otherwise, correct the problems. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Verify that the Ethernet interfaces between the Cisco MGC and the Cisco ITPs are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on a Cisco ITP can be found in its associated documentation.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the Cisco ITP can be found in its associated documentation.

Step 4

Verify that the M3UA provisioning data on your Cisco MGC is correct. If the provisioning data is correct, proceed to Step 6. Otherwise, proceed to Step 5.

Step 5

Open a dynamic reconfiguration session to modify the M3UA provisioning data, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

All SUAKEY Ack Pending


This alarm occurs when the MGC cannot send or receive traffic for the identified SS7 subsystem.

Note

This alarm is valid as of Release 9.4(1).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-15

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected SUA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. The AS definitions should match the routing contexts of the SUA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

All SUA Assoc Fail


This alarm occurs when all SUA associations transporting SS7 signaling have failed.

Note

This alarm is valid as of Release 9.4(1).

Note

The ability to generate this alarm is changed in a patch (CSCOgs019) to Release 9.4(1) and for Release 9.5(2) and up. Generation of this alarm is now controlled by an XECfgParm.dat parameter, *.AllLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm is not generated when the alarm condition occurs. If you want this alarm to be generated, you must set the parameter to true, using the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If your Cisco MGC hosts are in separate geographic locations, we recommend that you set the value of *AllLinksFailCausesFailover to true. If you are running Release 9.4(1) with patch CSCOgs019 installed, and want to enable the generation of this alarm, you must enter the parameter manually in the XECfgParm.dat file. The XECfgParm.dat files in subsequent releases contain the parameter.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-16

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Cisco ITPs are operating normally. Refer to the documentation for your Cisco ITP for more information. If you find that the Cisco ITPs are operating normally, proceed to Step 3. Otherwise, correct the problems. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Verify that the Ethernet interfaces between the Cisco MGC and the Cisco ITPs are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on a Cisco ITP can be found in its associated documentation.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the Cisco ITP can be found in its associated documentation.

Step 4

Verify that the SUA provisioning data on your Cisco MGC is correct. If the provisioning data is correct, proceed to Step 6. Otherwise, proceed to Step 5.

Step 5

Open a dynamic reconfiguration session to modify the SUA provisioning data, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: ALoopCtrExceeded
This alarm occurs when an A-number analysis operation has gone into an infinite loop. The purpose of the alarm is to limit the number of passes spent in the analysis tree to 30.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-17

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 2

Validate that there are no infinite loops in the A-number dial plan, as described in the Verifying a Dial Plan Translation section on page 3-143. If there are infinite loops in your A-number dial plan, modify the settings in your A-number dial plan to remove the infinite loops, using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. If their are no infinite loops in your A-number dial plan, then proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: ATableFail_GetDigMod
This alarm occurs when a retrieval of a modification string failed during A-number analysis. The problem occurs when the modification table is not loaded or a pointer to a nonexistent location in the modification table is given.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: ATableFail_GetResult
This alarm occurs when access to the result table failed during A-number analysis. The problem occurs if the result table is not loaded or a pointer to a nonexistent location in the result table is given.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: ATableFlt_DgtRangeError
This alarm occurs when the A-number analysis digit tree has been accessed with a digit that is out of range for the digit tree table. This alarm could occur if the system was incorrectly configured to support a base 10 dial plan, and an overdecadic digit was received from the line and passed to analysis.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the parameter, *.OverdecadicDigitsEnabled, is set correctly in the XECfgParm.dat file on each host.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-18

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Note

The setting of this parameter should reflect the dial plan restrictions for the protocol in use. If the configured protocol supports the use of overdecadic digits, the parameter should be set to true, and vice versa.

If the setting for the parameter is correct, proceed to Step 3. Otherwise, reboot your software using the procedure described in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Step 3

If the setting for the parameter is false, check the received digit string for presence of an overdecadic digit. If the digit string does not have an overdecadic digit, proceed to Step 5. If the digit string does have an overdecadic digit, proceed to Step 4. If the setting for the parameter is true, proceed to Step 5.

Step 4

Check the compliancy documentation for the configured protocol. If the documentation indicates that overdecadic digits are supported, change the setting for the *.OverdecadicDigitsEnabled XECfgParm.dat parameter to true on both hosts, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If the documentation indicates that overdecadic digits are not supported, proceed to Step 5.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: BLoopCtrExceeded
The alarm occurs when a B-number analysis operation has gone into an infinite loop. The purpose of the alarm is to limit the number of passes spent in the analysis tree to 30.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Validate that there are no infinite loops in the B-number dial plan, as described in the Verifying a Dial Plan Translation section on page 3-143. If there are infinite loops in your B-number dial plan, modify the settings in your B-number dial plan to remove the infinite loops, using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. If their are no infinite loops in your B-number dial plan, then proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-19

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

ANAL: BNum_GetFail_SrvcTbl
This alarm occurs during B-number analysis when a screening result is encountered and an attempt to read the service table to determine the name of the service performing the screening fails. This is due to corruption of either the result table or the service table.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: BNum_MdfyBFail_ AnnounceID


This alarm occurs during B-number analysis when an announcement result is encountered and analysis is unable to replace the last 4 digits of the B-number with the announcement ID. This is commonly caused by an out-of-range announcement Id (it should be 0-9999) or a B-number less than 4 digits long.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that all of the configured announcement IDs are within the range 0 through 9999, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If any of the announcement IDs are outside of the range, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: BTableFail_GetDigTree
This alarm occurs when an invalid path for B-number analysis has been given or that the B-number analysis table is not loaded. The problem occurs when an invalid path has been specified for B-number analysis or the B-number analysis table is not loaded.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: BTableFail_GetDigMod
This alarm occurs when retrieval of a modification string failed during B-number analysis. The problem occurs if the modification table is not loaded or a pointer to a nonexistent location in the modification table is given.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-20

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: BTableFail_GetResult
This alarm occurs when access to the result table failed during B-number analysis. The problem occurs if the result table is not loaded or a pointer to a nonexistent location in the result table is given.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: BTableFlt_DgtRangeError
This alarm occurs when the B-number analysis digit tree has been accessed with a digit that is out of range for the digit tree table. This alarm could occur if the system was incorrectly configured to support a base 10 dial plan, and an overdecadic digit was received from the line and passed to analysis.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the parameter, *.OverdecadicDigitsEnabled, is set correctly in the XECfgParm.dat file on each host.

Note

The setting of this parameter should reflect the dial plan restrictions for the protocol in use. If the configured protocol supports the use of overdecadic digits, the parameter should be set to true, and vice versa.

If the setting for the parameter is correct, proceed to Step 3. Otherwise, update the parameter settings in the XECfgParm.dat files using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Step 3

If the setting for the parameter is false, check the received digit string for presence of an overdecadic digit. If the digit string does not have an overdecadic digit, proceed to Step 5. If the digit string does have an overdecadic digit, proceed to Step 4. If the setting for the parameter is true, proceed to Step 5.

Step 4

Check the compliancy documentation for the configured protocol. If the documentation indicates that overdecadic digits are supported, change the setting for the *.OverdecadicDigitsEnabled XECfgParm.dat parameter to true on each host using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If the documentation indicates that overdecadic digits are not supported, proceed to Step 5.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-21

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: Cause_GetFail_CauseTbl
This alarm occurs during cause analysis when the cause table is unreadable. This can be due to the cause table being corrupted, a failure in the underlying software, or the cause table being built without all the existing call context cause values.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated cause table contains all of the existing call context cause values, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the cause table is incomplete, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL:Cause_GetFail_DigModTbl
This alarm occurs during cause analysis when a B-number modification result is encountered and the digit modification string is unreadable. This can be due to the digit modification table being corrupted or an incorrect digit modification index being stored in the B-number modification result's data.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated B-number digit modification table is correct, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the information in the B-number digit modification table is incorrect, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-22

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

ANAL: Cause_GetFail_InvldRsltType
This alarm occurs during cause analysis when a result is encountered that is not supported in cause analysis. This is due to corruption of the cause or location tables or the result table.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL:Cause_GetFail_LocTbl
This alarm occurs during cause analysis when the location table is unreadable. This can be due to the location table being corrupted, a failure in the underlying software, or the location table not being fully populated with all possible references from the cause table.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated location table contains all of the possible references from the cause table, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the location table does not contain all of the references, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL:Cause_GetFail_RsltTbl
This alarm occurs during cause analysis when the result table is unreadable. This can be due to the result table being corrupted, a failure in the underlying software, or the result table not being fully populated with all possible references from the cause and location tables.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated result table contains all of the possible references from the cause and location tables, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the result table does not contain all of the references, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-23

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL:Cause_InvldRslts_CauseTbl
This alarm occurs when cause analysis successfully reads the cause table but the value returned is logically invalid. Cause analysis gets two values from the cause table: an immediate result index and a location index. The immediate result index indicates that analysis should start reading results now, but the location index indicates that another table read is required to find the correct result table index. These results are logically incompatible. Most likely this results from a failure of the underlying software or a corruption of the cause table.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Cause_MdfyBFail_AnnounceID
This alarm occurs during cause analysis when an announcement result is encountered and analysis is unable to replace the last 4 digits of the B-number with the announcement ID. This is commonly caused by an out-of-range announcement ID (it should be 0 to 9999) or a B-number less than 4 digits long.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected announcement ID is within the range 0 through 9999, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the announcement ID is outside of the range, modify its value using the numan-ed MML command and proceed to Step 3. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Otherwise, proceed to Step 3.

Step 3

Verify that the affected B-number is at least 4 digits long, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the affected B-number is less than 4 digits long, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Otherwise, proceed to Step 4.

Step 4 Step 5

If you modified your dial plan, save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 5. Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-24

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

ANAL: Cause_MdfyBFail_AppPtInvld
This alarm occurs during cause analysis when a B-number modification result is encountered and the application point (where digits are inserted) specified is beyond the end of the digit string. This is caused by an incorrect application point being specified in the result data, a corrupt result table, or incorrectly constructed cause analysis values.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the specified application points in the result data is correct, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If any of the application points are incorrect, modify their value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Cause_Rte_LoopDetected
This alarm occurs during cause analysis when a route or announcement result is encountered. In these cases, the indicated route identifier is checked against a list of previously provided results. If a match is found, this alarm is raised and an error is returned to call processing. This is done to prevent calls from endlessly routing to a single route or series of routes infinitely due to cause analysis interactions.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: CustId/StartIdx Missing


This alarm occurs when the property CustGrpId is not present on the identified trunk group. This is required to find the correct place to begin analysis.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the value of the CustGrpId property for the associated trunk group is correct by logging in to the active Cisco MGC, starting an MML session, and entering he following command:
prov-rtrv:trnkgrpprop:name="comp_name"

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-25

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Where comp_name is the MML name for the affected trunk group. For example, if you wanted to verify the properties for an trunk group called 1001, you would enter the following command:
prov-rtrv:trnkgrpprop:name="1001"

If your system has been properly configured for dial plan use, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-01 10:09:47 M RTRV "session=active:trnkgrpprop" /* . . . CustGrpId=2222 . . .

Step 3 Step 4

If you need to modify your settings, start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. If the CustGrpId property is missing from the affected trunk group, enter the following command:

Note

If you are modifying the CustGrpId value for an SS7 signaling service, you must set that SS7 signaling service to the out-of-service administrative state, as described in the Setting the Administrative State section on page 8-116. Once you have entered the CustGrpId value, you can return the SS7 signaling service to the in-service administrative state.

prov-ed:trnkgrp:name="comp_name", CustGrpId=number

Where:
Step 5

comp_nameMML name for the affected trunk group. numberCustomer group ID number that is associated with your dial plan.

Save and activate your provisioning session as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the alarm clears, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL:DataBaseAccessFail
This alarm occurs when certain functions in generic analysis has failed. Failure of any of the following general analysis functions causes this alarm to be triggered:

ReadANumDpSelection ()Alarm is found in the Analysis MDL log. CheckEPortedHandling(VAR BNumRecd : BNumberElem, B_DgtBuff : Dgtbuff, VAR ResultsFromBnoForUpdate : AnalyseBnoResults ): GeneralActionRsltsAlarm is found in the B_Analysis MDL log.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-26

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

CheckERouteNumHandling(B_DgtBuff : Dgtbuff, VAR ResultsFromBnoForUpdate : AnalyseBnoResults ): GeneralActionRsltsAlarm is found in the B_Analysis MDL log. ANumberHandling()Alarm is found in either the B_Analysis or A_Analysis MDL log. BNumberHandling()Alarm is found in the MDL log as B-Analysis.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the parameter, engine.SysConnectDataAccess, is set to true in the XECfgParm.dat file on the active Cisco MGC. If the setting is correct, proceed to Step 4. Otherwise, update the value of the parameter for each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If correcting the setting does not clear the alarm, proceed to Step 4.

Step 3 Step 4

Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: Data Failure Rcvd


This alarm occurs when during analysis, a data failure is found in the external routing engine.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL:dpselection_table_fail
This alarm occurs when the correct dial plan selection could not be determined.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL:getDialplanBase_fail
This alarm occurs when the Cisco MGC could not load or generate the dial plan.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-27

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

ANAL: InvalidtrkGrpType
This alarm occurs when the analysis module has not provided a valid trunk group type. The problem occurs if the route analysis table specifies an invalid trunk group type.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Display the valid trunk group types using the prov-rtrv MML command as described in the Retrieving Provisioning Data section on page 3-72. Correct the invalid trunk group type in the route analysis table using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the alarm clears, the procedure is complete. Otherwise, proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: Prof_GetFail_DigModTbl
This alarm occurs during profile analysis when a B-number modification result is encountered and the digit modification string is unreadable. This can be due to the digit modification table being corrupted or an incorrect digit modification index being stored in the B-number modification result's data.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Prof_GetFail_InvldRslt
This alarm occurs during profile analysis when a result is encountered that is not supported in profile analysis. This is due to corruption of either the NOA or NPI tables or the result table.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Prof_GetFail_NOATbl
This alarm occurs during profile analysis when the NOA table is unreadable. This can be due to the NOA table being corrupted, a failure in the underlying software, or the NOA table being built without all the existing call context NOA values.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-28

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the NOA table uses all of the existing call context NOA values using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the NOA table is missing any of the existing call context NOA values, add them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Prof_GetFail_NOATbl_A
This alarm occurs during profile analysis when the NOA table is unreadable. This can be due either to the NOA table being corrupted, or to a failure in the underlying software.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: Prof_GetFail_NPITbl
This alarm occurs during profile analysis when the NPI table is unreadable. This can be due to the NPI table being corrupted, a failure in the underlying software, or the NPI table not being fully populated with all the possible references from the NOA table.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-29

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 2

Verify that the NPI table uses all of the possible references from the NOA table using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the NPI table is missing any of the references from the NOA table, add them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Prof_GetFail_NPITbl_A
This alarm occurs during profile analysis when the NPI table is unreadable. This can be due either to the NOA table being corrupted, or to a failure in the underlying software.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: Prof_GetFail_RsltTbl
This alarm occurs during profile analysis when the result table is unreadable. This can be due to the result table being corrupted, a failure in the underlying software, or the result table not being fully populated with all the possible references from the NOA or NPI tables.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the result table uses all of the possible references from the NOA and NPI tables using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the result table is missing any of the references from the NOA and NPI tables, add them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-30

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Prof_InvldNPAValue
This alarm occurs during profile analysis when a 7-digit B-number is encountered and the NPA property is set against the originating trunk group. An NPA string of more or less than 3 characters is invalid. This is most likely caused by data corruption.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the NPA values have been properly provisioned for the trunk group using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the NPA values are incorrect, modify them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Prof_InvRslts_NOATbl
This alarm occurs when profile analysis successfully reads the NOA table but the value returned is logically invalid. Profile analysis gets two values from the NOA table: an immediate result index and an NPI index. An immediate result index indicates that analysis should start reading results now but an NPI index indicates that another table read is required to find the correct result table index. These results are logically incompatible. Most likely this results from a failure of the underlying software or a corruption of the NOA table.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: Prof_InvRslts_NOATbl_A
This alarm occurs when profile analysis successfully reads the NOA table but the value returned is logically invalid. Profile analysis gets two values from the NOA table, an immediate result index and an NPI index. The immediate result index indicates that analysis should start reading results now but the NPI index indicates that another table read is required to find the correct result table index. These results are logically incompatible. Most likely, this alarm results from a failure of the underlying software or a corruption of the NOA table.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-31

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: Prof_MdfyBFail_AppPtInvld
This alarm occurs during profile analysis when a B-number modification result is encountered and the specified application point (where digits are inserted) is beyond the end of the digit string. This is caused by an incorrect application point being specified in the result data, a corrupt result table, or incorrectly constructed Profile analysis values.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the specified application points in the result data is correct, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If any of the application points are incorrect, modify their value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 2.

Step 3

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: RteStartIndexInvalid
This alarm occurs when the start index for the route analysis table is invalid.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-32

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 2

Verify that the data for the provisioned route lists is correct by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:rtlist:all

Step 3

If their is incorrect data for the route lists, correct it by using the prov-ed MML command. Otherwise, proceed to Step 4. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on provisioning route lists. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Step 4

ANAL: Rte_TableHopCtrExceeded
This alarm occurs when generic analysis fails due to excessive number of routing table changes.

Note

This alarm is valid as of Release 9.3(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Test for a loop in the routing configuration using the following steps:
a. b.

Export the routing configuration to a file, as described in the Exporting Provisioning Data section on page 3-79. Import the routing configuration file created in Step 2a, as described in the Importing Provisioning Data section on page 3-79. If the import fails, proceed to Step 3. Otherwise, proceed to Step 4.

Step 3 Step 4

Perform a call trace, as described in the Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: RteTableFail_GetRteList
This alarm occurs when access to the route list failed. The problem occurs if the index to the route list is not valid or if the route list is not loaded.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-33

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

ANAL: RteTableFail_GetTrkAttrdata
This alarm occurs when access to the trunk group attribute data table failed. The problem occurs if the index to the trunk group attribute data table is not valid or if the table is not loaded.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: RteTableFail_GetTrkGrpdata
This alarm occurs when access to the trunk group data failed. The problem occurs if the index to the trunk group data is not valid or if the trunk group data table is not loaded.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: RteTableFail_GetTrunkList
This alarm occurs when access to the trunk group list failed. The problem occurs if the index to the trunk group list is not valid or if the trunk group list is not loaded.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

ANAL: TableFail_BearerCapTable
This alarm occurs when the bearer capability table could not be read during generic analysis.

Note

This alarm is valid as of Release 9.3(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-34

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

ANAL: TableFail_CondRouteDescTable
This alarm occurs when the conditional route description table could not be read during generic analysis.

Note

This alarm is valid as of Release 9.3(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: TableFail_CondRouteTable
This alarm occurs when the conditional routing table could not be read during generic analysis.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112. If that procedure resolves the problem, the procedure is finished. Otherwise, proceed to Step 2.

Step 3 Step 4

Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: TableFail_CPCTable
This alarm occurs when the calling party category (CPC) table could not be read during generic analysis.

Note

This alarm is valid as of Release 9.3(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-35

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 2 Step 3

Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: TableFail_RouteHolTable
This alarm occurs when route holiday table could not be read during generic analysis.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: TableFail_PercRouteTable
This alarm occurs when the percentage route holiday table could not be read during generic analysis.

Note

This alarm is valid as of Release 9.3(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: TableFail_TMRTable
This alarm occurs when the transmission medium requirements (TMR) table could not be read during generic analysis.

Note

This alarm is valid as of Release 9.3(2).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-36

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: TableFail_TNSTable
This alarm occurs when the transit network selection (TNS) table could not be read during generic analysis.

Note

This alarm is valid as of Release 9.3(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ANAL: TrunkGrpRsltCtrExceeded
This alarm occurs when the analysis module has provided the maximum number of candidate trunk groups allowed. The maximum number is 20. The purpose of the alarm is to limit the time spent searching for candidate trunk groups.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

Association Degraded
This alarm occurs when one of the destination addresses for an SCTP association has failed, but the association is still in-service (IS).

Note

This alarm is valid as of Release 9.4(1).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-37

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving an Association Alarm section on page 8-113.

Association Fail
This alarm occurs when an SCTP association has failed due to an IP connectivity failure or an out-of-service (OOS) destination.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving an Association Alarm section on page 8-113.

C7LNK ALGNMT LOST


This alarm occurs when the MTP2 for the C7 link between a Cisco SLT and an associated APC has lost alignment.

Corrective Action
To correct the problem identified by this alarm, use the diagnostics on the affected Cisco SLT to determine why the link has lost alignment, as described in the Verifying the Link Alignment Status section on page B-6.

C7DPC CONGESTION
This alarm occurs when a link in a signaling route towards a given DPC becomes congested or when a DPC is congested and has sent a congestion indication to the Cisco MGC.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the status of the links associated with the affected DPC, as described in the Retrieving Service State of C7/SS7 Links or Linksets section on page 3-50. If none of the links are out-of-service, this alarm has occurred because the DPC is congested. In this instance, corrective action is not necessary, and you must wait for the congestion condition to clear. If any of the links are out-of-service, proceed to Step 2.

Step 3

Return the out-of-service links to service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96. If that does not resolve the problem, proceed to Step 3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-38

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

C7LNK CONGESTION
This alarm occurs when an SS7 MTP2 link becomes congested and it cannot receive any more messages.

Corrective Action
If this alarm occurs repeatedly, perform the following steps to correct the problem:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Reduce the amount of traffic from the far-end associated with the affected link. If that clears the alarm, the procedure is complete. Otherwise, proceed to Step 2.

Step 3

Add additional links to the linkset associated with the affected link. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information about adding links. If that does not resolve the problem, proceed to Step 3.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

C7LNK INHIBIT
This alarm occurs when a C7 link has been inhibited for maintenance.

Corrective Action
To correct the problem identified by this alarm, uninhibit the specified C7 link, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96, when the maintenance is complete.

C7SLTLnkCong
This alarm occurs when an SS7 link on a 4-link Cisco SLT is congested.

Corrective Action
If this alarm occurs repeatedly, perform the following steps to correct the problem:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Reroute the SS7 traffic to other links to reduce the congestion. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information about adding links. If that does not resolve the problem, proceed to Step 3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-39

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Charge Table Access Failure


This alarm occurs when the Cisco MGC could not access the charge table.

Corrective Action
To correct the problem identified by this alarm, check for the presence of the Charge Table Load Failure alarm, using the procedure in Retrieving All Active Alarms section on page 8-3. If this alarm is present, perform the corrective action for that alarm. Otherwise, the procedure is complete.

Charge Table Load Failure


This alarm occurs when a Cisco MGC process is unable to load the charge table.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify whether a charge table is present on your system by logging in to your active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:charge:all

The system responds with a list of elements in the charge table, or with an error indicating that a charge table does not exist. If a charge table is not present, provision a charge table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide. If a charge table is present, verify that the information returned is correct. If the information is correct, proceed to Step 3. Otherwise, correct the contents of the charge table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.
Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Comm Srvc Creation Error


This alarm occurs when an error occurred while creating or opening a communication service.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Shutdown the Cisco MGC software on the standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-40

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 3 Step 4

Restart the Cisco MGC software on the standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover operation, as described in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 5 Step 6 Step 7

Shutdown the Cisco MGC software on the newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover operation, as described in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

If this does not resolve the alarm, proceed to Step 7.


Step 8

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Config Fail
This alarm occurs when the configuration has failed.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate errors in the content of your provisioning data. If there are no logs that indicate errors in the content of your provisioning data, proceed to Step 3. If there are logs that indicate errors in the content of your provisioning data, start a dynamic reconfiguration session to change the settings for the component(s) identified in the log message(s), as described in the Invoking Dynamic Reconfiguration section on page 3-70. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-41

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Dial Plan Loading Failed


This alarm occurs when a dial plan has not loaded properly.

Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.

DISK
This alarm occurs when the system disk is running out of space.

Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

EISUP: Unexpected Msg/Par


This alarm occurs when the EISUP module has received an unsupported message or parameter. This alarm is most likely to occur when the local EISUP version is older than the EISUP version used by the Cisco PGW 2200 or Cisco H.323 Signaling Interface (HSI) on the other end.

Note

This alarm is valid as of Release 9.3(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. To upgrade the version of EISUP locally, you must either upgrade the Cisco MGC software to same release as the other Cisco PGW 2200, or to the release supported by your current version of the Cisco HSI software. The steps required to upgrade your Cisco MGC software are found in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. If upgrading the Cisco MGC software clears the alarm, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ENGINE CONFIG FAIL


This alarm occurs when a component in the engine configuration has failed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-42

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file for log messages indicating which component is raising this alarm, using the procedure described in the Viewing System Logs section on page 8-4. If there are logs that indicate a failed component, proceed to Step 2. If there are no logs that indicate a failed component, proceed to Step 3.

Step 3

Begin a dynamic reconfiguration session to reprovision the failed component, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 3.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

FAIL
This alarm occurs when the component referenced in the alarm has failed. The failure may be service affecting, in which case other alarms are raised.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. If the component identified in the alarm text is in the system software, contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx. If the component identified in the alarm text is a piece of system hardware, proceed to Step 3.

Step 3 Step 4 Step 5

Shut down the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 6 Step 7

Shut down the Cisco MGC software on your newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-43

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 8.
Step 8

Replace the component identified in the alarm text. Procedures for replacing Cisco MGC host hardware can be found in the associated Sun Microsystems documentation. Procedures for replacing Cisco SLT hardware can be found in Replacing a Cisco SLT section on page 6-6. Procedures for replacing Cisco switch can be found in the documentation for your switch. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Step 9

FailoverPeerLost
This alarm occurs when the failover daemon on the standby Cisco MGC is not reachable.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces between the active and standby Cisco MGCs and the Cisco switches are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the Cisco switches can be found in the documentation for your switch.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 3.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the Cisco switch can be found in the documentation for your switch.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

FailoverPeerOOS
This alarm occurs when the failover daemon goes out-of-service in the standby Cisco MGC.

Corrective Action
To correct the problem identified by this alarm, check the alarms on the standby Cisco MGC, using the procedure in the Retrieving All Active Alarms section on page 8-3, and resolve those alarms.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-44

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

FAIL REMOTE STANDBY


This alarm occurs on the active Cisco MGC when a synchronization operation between the active and standby Cisco MGCs fails. This alarm is automatically cleared if a successful synchronization operation occurs after the failure. As a result, the Standby Warm Start alarm is triggered. Refer to the Standby Warm Start section on page 8-73 for more information.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the standby Cisco MGC is in the standby platform state, using the procedure defined in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. If the standby Cisco MGC is in the standby platform state, proceed to Step 3. Otherwise, proceed to Step 4.

Step 3 Step 4 Step 5

Synchronize the standby Cisco MGC with the active Cisco MGC by entering the prov-sync MML command. Shut down the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

FORCE NODE RESTART


This alarm occurs on the standby Cisco MGC when a new SS7 IOCC is added to the configuration of the system. This alarm causes the Cisco MGC software on the standby Cisco MGC to be rebooted. This alarm does not affect the active Cisco MGC.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Once the Cisco MGC software has restarted on the standby Cisco MGC, collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the standby Cisco MGC is in the standby platform state, using the procedure defined in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. If the standby Cisco MGC is in the standby platform state, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-45

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Gen Fail
This alarm occurs when a failure has occurred due to resource exhaustion or configuration problems, including:

Memory exhaustion. Queue overflow. Message congestion. IPC file cannot be opened. A timer has expired.

Log messages in the active system log file indicate the nature of the failure. For the majority of the failures, this alarm is informational and no user action is required. When this alarm is generated because an IPC file cannot be opened, you must take corrective action.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate that an IPC file cannot be opened. If there are no logs that indicate that an IPC file cannot be opened, no further action is required. If there are logs that indicate that an IPC file cannot be opened, proceed to Step 3.

Step 3 Step 4 Step 5

Shut down the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 6 Step 7

Shut down the Cisco MGC software on your newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 8.

Step 8

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-46

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Holiday Table Access Failure


This alarm occurs when the Cisco MGC could not access the holiday table.

Corrective Action
To correct the problem identified by this alarm, check for the presence of the Holiday Table Load Failure alarm, using the procedure in Retrieving All Active Alarms section on page 8-3. If this alarm is present, perform the corrective action for that alarm. Otherwise, the procedure is complete.

Holiday Table Load Failure


This alarm occurs when a Cisco MGC process is unable to load the holiday table.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify whether a holiday table is present on your system by logging in to your active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:holiday:all

The system responds with a list of elements in the holiday table, or with an error indicating that a holiday table does not exist. If a holiday table is not present, provision a holiday table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide. If a holiday table is present, verify that the information returned is correct. If the information is correct, proceed to Step 2. Otherwise, correct the contents of the holiday table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.
Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

INVALID M3UA RC
This alarm occurs when an M3UA message is received from the identified Cisco ITP with a routing context that has not been provisioned on the MGC.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-47

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 3 Step 4 Step 5

Retrieve the settings for the affected M3UA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. Identify the AS defined on the Cisco ITP that is not provisioned as a routing context on the MGC. Open a dynamic reconfiguration session to add the routing context to the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

INVALID SUA RC
This alarm occurs when there is a mismatch between SUA routing keys defined on the MGC and the Signaling Gateway.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected SUA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. Identify the AS defined on the Cisco ITP that is not provisioned as a routing context on the MGC. Open a dynamic reconfiguration session to add the routing context to the SUA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 5.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Invalid Virtual_IP_Addr
This alarm occurs when the configured virtual IP address is not part of the networks associated with the IP addresses set for the IP_Addr1 or IP_Addr2 parameters in the XECfgParm.dat file.

Note

This alarm is valid as of Release 9.4(1).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-48

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the IP address defined for the XECfgParm.dat parameter, *.Virtual_IP_Addr, is set correctly in the XECfgParm.dat file on each host.

Note

The IP address defined for this parameter should be a part of the networks associated with the IP addresses defined for the XECfgParm.dat parameters IP_Addr1 or IP_Addr2.

If the setting for the parameter is correct, proceed to Step 3. Otherwise, reboot your software using the procedure described in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

IP CONNECTION FAILED
This alarm occurs when the Cisco MGC loses network (IP) connectivity to a Cisco SLT. This alarm is generated for each SS7 link associated with the affected Cisco SLT.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected Cisco SLT is up and running by performing the procedures in the Checking Equipment Status section on page 6-2. If the affected Cisco SLT is not up and running, start it using the procedure in the Cisco SS7 Interface Startup Procedure section on page 2-3. If this does not resolve the problem, replace the affected Cisco SLT as described in the Replacing a Cisco SLT section on page 6-6. If the affected Cisco SLT is up and running, proceed to Step 3.

Step 3

Verify that the Ethernet interfaces between the Cisco MGC and the affected Cisco SLT are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the Cisco SLT can be found in the Checking Equipment Status section on page 6-2.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-49

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing components on the Cisco SLT can be found in the Replacing Hardware Components section on page 6-13.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

IP RTE CONF FAIL


This alarm occurs when an IP route cannot access the local interface defined by its IP address parameter.

Corrective Action
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

IP RTE FAIL
This alarm occurs when an IP route is in the OOS state with a cause other than off-duty or commanded out-of-service.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the IP addresses of the local interfaces on the standby Cisco MGC using the following UNIX command:
ifconfig -a

The system returns a response indicating the IP addresses of your local interfaces.
Step 3

Verify that the IP addresses obtained in Step 2 match the values set for the IP_Addr1 through IP_Addr4 parameters in the XECfgParm.dat file. If the settings for the local IP addresses are not the same, proceed to Step 4. If the settings for the local IP addresses are the same, proceed to Step 12.

Step 4

Log in to your active Cisco MGC and change directories to the /opt/CiscoMGC/etc directory using the following UNIX command:
cd /opt/CiscoMGC/etc

Step 5 Step 6 Step 7

Open the XECfgParm.dat file in a text editor, such as vi. Search for the IP_Addr properties and change those that are not configured correctly. Save the file and exit the text editor.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-50

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 8

Shut down the Cisco MGC software on your standby Cisco MGC by entering the following UNIX command:
/etc/init.d/CiscoMGC stop

Note

Shutting down the Cisco MGC software on the active Cisco MGC causes the currently standby Cisco MGC to become the active Cisco MGC.

Step 9

Restart the Cisco MGC software on this Cisco MGC by entering the following command:
/etc/init.d/CiscoMGC start

Step 10

Once the Cisco MGC software is fully activated, log in to the active Cisco MGC and perform a manual switchover, using the following MML command:
mml>sw-over::confirm

Step 11

Repeat steps 2 through 9 on the newly standby Cisco MGC. If the problem has not been resolved after you have completed those steps, proceed to Step 12.

Step 12

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ISUP: COT Failure


This alarm occurs when a COT message was received indicating a failed continuity test.

Corrective Action
To correct the problem identified by this alarm, run a manual COT test, as described in the Running a Manual Continuity Test section on page 8-142.

LIF BER
This alarm occurs when an excessive bit error ratio is detected from a frame alignment signal. This might be caused by any source of electrical noise; for example, degraded transmission line, degraded line connectors, high-voltage electrical source located in proximity of line.

Corrective Action
To correct the problem identified by this alarm, isolate the source by testing the connections and transmission line for the identified component. When you have identified the source, resolve as necessary.

LIF FAIL
This alarm occurs when a local Ethernet interface has failed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-51

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, perform the following steps:

Note

If the Association Degraded or Association Failed alarms occur along with this alarm, follow the procedure defined in the Resolving an Association Alarm section on page 8-113.

Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Use the Log viewer in the MGC Viewer toolkit to search the system log file from the same time period as this alarm for a GEN_ERR_IPINTF_FAIL log message.

Note

For more information on using the Log viewer, refer to the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.

If a GEN_ERR_IPINTF_FAIL log message is found, proceed to Step 3. Otherwise, proceed to Step 7.


Step 3

Identify the cause of the failure from the information in the log message. If the cause in the log message is Admin Down, the interface was taken down using an administrative command. Proceed to Step 4. If the cause in the log message is Link Down, the Ethernet path has failed. Proceed to Step 5.

Step 4

Enter the following UNIX command to restore the link to service:


ifconfig interface up

Where interface is the IP address of the affected interface. If the interface is restored and is working fine, the procedure is complete. Otherwise, proceed to Step 7.
Step 5

Verify that the cable connected between the interface and the associated Ethernet switch is working properly. If the cable is working correctly, proceed to Step 6. If the cable is not working correctly, replace it. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Verify that the associated Ethernet switch is working properly. If the Ethernet switch is working correctly, proceed to Step 7. If the Ethernet switch is not working correctly, trouble shoot the problem as indicated in the documentation for your switch. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

LIF LOF
This alarm occurs when a loss of T1/E1 framing has been detected on the LIF. The physical line has a signal but has lost the framing pattern.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-52

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the framing format used on the port matches the framing format used on the line. If the framing formats are different, change the framing format on the port to the other framing format. Otherwise, proceed to Step 3. If the alarm does not clear, proceed to Step 3.

Step 3 Step 4

Change the line build-out setting. If the alarm does not clear, proceed to Step 4. Open the statistics report for the port and look for evidence of a bad line. Bursts of Latvia could indicate a timing problem. If you find evidence of a bad line, perform loopback tests on the line to isolate the problem. Otherwise, proceed to Step 5. Once you have isolated the problem, resolve as necessary. If the alarm does not clear, proceed to Step 5.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

LIF LOS
This alarm occurs when the transmitted signal is lost in the T1/E1. The receiving end does not receive the signal. The physical line might have a break in it.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the cable connections are correct between the interface port and your service providers equipment or T1/E1 terminal equipment. If the cable was built on-site, check the cable connectors. A reversal of transmit and receive pairs or an open receive pair can cause this condition. If the cable connections appear correct, then proceed to Step 3.

Step 3

Check your T1/E1 equipment, or ask your service provider to test your T1/E1 line and correct any errors found. If the alarm does not clear, then proceed to Step 3.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

LIF SES
This alarm occurs when the LIF is automatically set to the out-of-service state because of severely errored seconds. The TDM line has a large amount of noise, causing an error rate greater than 10-3. Framing and signal are within tolerance. This indicates a degraded but functioning line.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-53

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the terminations and cabling for the LIF are working. If you can identify the source of the problem, resolve as necessary. Otherwise, proceed to Step 3. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

LIF YELLOW
This alarm occurs when the receiving end is reporting a loss of the transmitted signal. This is reported for T1/E1 facilities only.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Connect an external loopback cable to the affected port. If no alarms are produced, proceed to Step 3. If alarms are produced, the port is causing the error. Replace the hardware component associated with the port. Refer to the associated media gateway documentation for more information on replacing the component.

Step 3

Check for an open, short, or wiring error in the cable between the network interface port and your service providers network interface unit T1/E1 terminal equipment. An open transmit pair can cause this condition. If you find a wiring problem, replace the cable. If that does not clear the alarm, proceed to Step 4. If you do not find a wiring problem, then proceed to Step 4.

Step 4

If your port is configured to use D4 framing, the port may intermittently detect yellow alarms because the packet data may contain the pattern that is used to signal yellow alarm in D4 framing. If it is possible, switch to ESF framing in both the terminal equipment and the line equipment. If that does not clear the alarm, proceed to Step 5.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

LIF: IDLE CHANGE


This alarm occurs when the physical line has failed because its cable is broken or not plugged in. This is reported for V.35 facilities only.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-54

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the V.35 cables between the port and the far-end are working correctly. If you find a problem with a V.35 cable, replace the cable. If that does not correct the problem, proceed to Step 3. If you do not find a problem with the V.35 cables, proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

LIF: LOST CD
This alarm occurs when the physical line has failed because its cable is broken or not plugged in. This is reported for V.35 facilities only.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the V.35 cables between the port and the far-end are working correctly. If you find a problem with a V.35 cable, replace the cable. If that does not correct the problem, proceed to Step 3. If you do not find a problem with the V.35 cables, proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

LIF: LOST CTS


This alarm occurs when the physical line has failed because its cable is broken or not plugged in. This is reported for V.35 facilities only.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the V.35 cables between the port and the far-end are working correctly. If you find a problem with a V.35 cable, replace the cable. If that does not correct the problem, proceed to Step 3. If you do not find a problem with the V.35 cables, proceed to Step 3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-55

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

M3UAKEY Ack Pending


This alarm occurs when the MGC cannot send or receive traffic for the identified SS7 signaling service via the Cisco ITP that has not acknowledged the M3UAKEY.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected M3UA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. The AS definitions should match the routing contexts of the M3UA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

MMDB: Database unavailable


This alarm occurs when the main memory database is currently unavailable to provide any services. Recovery is attempted and the alarm clears when or if the database becomes available.

Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-56

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

MMDB: Database cause failover


This alarm occurs when the main memory database is currently unavailable on a redundant system and is indicating that the system should failover. Recovery is attempted and the alarm clears when or if the database becomes available.

Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your standby Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

MMDB: Database nearly full


This alarm occurs when the main memory database has detected that allocated resources for data storage are nearly all utilized.

Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

NAS: AuditResponse Failure


This alarm occurs when the identified media gateway fails to send a RESYNC RESP message back to the Cisco MGC within the audit time interval.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected media gateway is in the in-service state, as described in the Verifying the Status of all Signaling Services section on page 3-8. If the affected media gateway is in-service, proceed to Step 3. Otherwise, proceed to Step 4.

Step 3

Verify that the configuration of the affected media gateway is correct. Refer to the documentation for the media gateway for more information. If that does not resolve the problem, proceed to Step 4.

Step 4

Verify that the Ethernet interfaces between the Cisco MGC and the associated media gateway are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the media gateway can be found in its associated documentation.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 5.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-57

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the media gateway can be found in its associated documentation.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

NAS: CommsFailure
This alarm occurs when the Cisco MGC cannot communicate with the identified media gateway.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine whether the affected media gateway is up and running. Refer to the documentation for the media gateway for more information. If the affected media gateway is not up and running, restore it to service. Refer to the documentation for the media gateway for more information. If the affected media gateway is up and running, proceed to Step 3.

Step 3

Verify that the IP configuration parameters for the Cisco MGC and the affected media gateway are correct.

Note

Use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72, to retrieve the IP configuration information for the Cisco MGC. Refer to the documentation for the media gateway for information on retrieving the IP configuration data.

If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of the affected media gateway is incorrect, modify the provisioning data for your system. Refer to the documentation for the media gateway for more information. If the configuration of both the Cisco MGC and the affected media gateway are correct, then proceed to Step 3.
Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

NAS: ResourceFailure
This alarm occurs when a continuity test (COT) has not been acknowledged by the indicated media gateway.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-58

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, run a manual COT on the indicated media gateway, as described in the Running a Manual Continuity Test, page 8-142.

OLC: Leg1chanSeizedUnpackError
This alarm occurs when an Seized Channel (CRCX) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OLC: Leg1chanModifiedUnpackError
This alarm occurs when an Modify Channel (MDCX) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OLC: Leg1chanDeletedUnpackError
This alarm occurs when a Delete Channel (DLCX) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-59

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OLC: Leg1notifyUnpackError
This alarm occurs when a Notify (NTFY) message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OLC: Leg1deleteChanUnpackError
This alarm occurs when a Delete Channel (DLCX) message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OLC: Leg1notifyRequestAckUnpackError
This alarm occurs when an Request Notify (RQNT) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-60

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OLC: Leg1chanOpsFailed
This alarm occurs when the Cisco MGC has detected an internal error or a media gateway related problem.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OOS TRAFFIC RE-ROUTE


This alarm occurs when the traffic channels (bearer channels, IP network) on one side of the Cisco MGC have been lost, causing the Cisco MGC to reroute channels away from the affected component. This is generally due to a network or equipment failure, but might be due to a provisioning failure.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Other alarms associated with the affected component should also be displayed. Resolve those alarms first. If resolving those alarms does not clear this alarm, proceed to Step 3.

Step 3

Verify that the traffic channel provisioning settings for the Cisco MGC and the affected media gateway are correct.

Note

Use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72, to retrieve the traffic channel provisioning data for the Cisco MGC. Refer to the documentation for the media gateway for information on retrieving the traffic channel data.

If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of the affected media gateway is incorrect, modify the provisioning data for your system. Refer to the documentation for the media gateway for more information. If the configuration of both the Cisco MGC and the affected media gateway are correct, then proceed to Step 4.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-61

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

OverloadHeavy
This alarm occurs when the system has reached the threshold for overload level 3. The system performs an automatic switchover operation. If the call rejection percentage setting for overload level 3 is unchanged from its default value, all new calls are rejected until the abate threshold for overload level 3 is reached. This alarm is automatically cleared at that time. For more information, refer to the Managing Automatic Congestion Control section on page 3-80.

Corrective Action
If this alarm is caused by a rare spike in traffic, corrective action is not necessary. If this alarm occurs regularly, you should ensure that your links and routes are properly configured for load sharing, as described in the SS7 Load Sharing Malfunction section on page 8-88, and re-route some of your traffic to other Cisco MGCs.

Note

This alarm can occur when a provisioning session is active during peak busy hours. If this should happen, the alarm can be cleared by stopping the provisioning session. For more information on the MML commands to manage a provisioning session, refer to the Provisioning your Cisco MGC section on page 3-68.

OverloadMedium
This alarm occurs when the system has reached the threshold for overload level 2. A percentage of new calls, based on the call rejection percentage setting for overload level 2, are rejected until the abate threshold for overload level 2 is reached. This alarm is automatically cleared at that time. For more information, refer to the Managing Automatic Congestion Control section on page 3-80.

Corrective Action
If this alarm is caused by a rare spike in traffic, corrective action is not necessary. If this alarm occurs regularly, you should ensure that your links and routes are properly configured for load sharing, as described in the SS7 Load Sharing Malfunction section on page 8-88, and re-route some of your traffic to other Cisco MGCs.

Note

This alarm can occur when a provisioning session is active during peak busy hours. If this should happen, the alarm can be cleared by stopping the provisioning session. For more information on the MML commands to manage a provisioning session, refer to the Provisioning your Cisco MGC section on page 3-68.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-62

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

OverloadLight
This alarm occurs when the system has reached the threshold for overload level 1. A percentage of new calls, based on the call rejection percentage setting for overload level 1, are rejected until the abate threshold for overload level 1 is reached. This alarm is automatically cleared at that time. For more information, refer to the Managing Automatic Congestion Control section on page 3-80.

Corrective Action
If this alarm is caused by a rare spike in traffic, corrective action is not necessary. If this alarm occurs regularly, you should ensure that your links and routes are properly configured for load sharing, as described in the SS7 Load Sharing Malfunction section on page 8-88, and re-route some of your traffic to other Cisco MGCs.

Note

This alarm can occur when a provisioning session is active during peak busy hours. If this should happen, the alarm can be cleared by stopping the provisioning session. For more information on the MML commands to manage a provisioning session, refer to the Provisioning your Cisco MGC section on page 3-68.

OverResIncomingThreshold
This alarm occurs when the percentage of idle CICs in a trunk group is less than or equal to the configured threshold.

Note

This alarm is valid as of Release 9.3(1).

Corrective Action
This alarm may occur occasionally during periods of congestion. However, if this alarm occurs repeatedly, you may need to adjust the value of the parameter that controls the percentage of idle CICs for the affected trunk group. To do this, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current settings for the affected trunk group using the following MML command:
prov-rtrv:rttrnkgrp:name=trnkgrp_name

Where trnkgrp_name is the name of the affected trunk group. The system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2002-09-20 15:38:02.892 EST M RTRV "session=NOA_SPAIN:rttrnkgrp" /* name type reattempts queuing cutThrough resIncomingPerc ---------- ---- ---------- ------- ---------- ---------111 1 2 120 2 0 */

The parameter, ResIncomingPerc, controls the percentage of idle CICs for the trunk group. In the above example the value is 0.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-63

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 3 Step 4

Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Use the prov-ed MML command to modify the setting of the resIncomingPerc parameter. For example, to change the percentage of idle CICs to 30 percent in a trunk group called 1000, you would enter the following command:
prov-ed:rttrnkgrp:name=1000, resIncomingPerc=30

Note

The new value for resIncomingPerc takes effect after your provisioning session is activated. Once the new value is activated, the OverResIncomingThreshold alarm is set or cleared after an outgoing call routed is over the affected trunk group.

Step 5

Save and activate your provisioning session, as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the alarm clears, the procedure is complete. Otherwse, proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

PC UNAVAIL
This alarm occurs when a destination point code (DPC) is unavailable. This can be due to a network failure causing the DPC to become isolated, a local failure equipment failure causing a loss of connectivity, or a local provisioning failure causing the DPC or routes to it to be configured improperly.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Other alarms associated indicating problems with hardware, the SS7 links, or the network should also be displayed. Resolve those alarms first. If resolving those alarms does not clear this alarm, proceed to Step 3.

Step 3

Ensure that the provisioning settings for the DPC and for all routes to the DPC and adjacent STPs match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the DPC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data associated with the DPC is correct, then proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Peer IP Links Failure


This alarm occurs when the IP links to the peer Cisco MGC are removed or down.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-64

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces for the active and standby Cisco MGCs are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 3.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

PEER LINK A FAILURE


This alarm occurs either because a communication path between peer modules was lost or a peer module has stopped communicating.

Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving a Failed Connection to a Peer section on page 8-172.

PEER LINK B FAILURE


This alarm occurs either because a communication path between peer modules was lost or a peer module has stopped communicating.

Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving a Failed Connection to a Peer section on page 8-172.

PEER MODULE FAILURE


This alarm occurs when communications to a peer module are lost, indicating failure.

Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving a Failed Connection to a Peer section on page 8-172.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-65

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

POM INACTIVITY TIMEOUT


This alarm occurs when the current provisioning session had been idle for 20 minutes without input any provisioning commands. If there is still no provisioning activity within the next five minutes, the session is terminated.

Corrective Action
To correct the problem identified by this alarm, enter some provisioning MML commands, or stop the provisioning session as described in the Saving and Activating your Provisioning Changes section on page 3-69. For more information about provisioning your Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.

POM SESSION TERMINATE


This alarm occurs when a provisioning session is terminated. Any additional provisioning commands are not accepted.

Corrective Action
If you want to restart your provisioning session, perform the steps listed in the Starting a Provisioning Session section on page 3-68, using the same source version set equal to the destination version name.

POM: DynamicReconfiguration
This alarm occurs when a dynamic reconfiguration procedure is started. It is cleared once the dynamic reconfiguration is successfully completed. Refer to the Invoking Dynamic Reconfiguration section on page 3-70 for more information.

Corrective Action
If necessary, you can clear the alarm, as described in the Clearing Alarms section on page 8-4, or you can complete the dynamic reconfiguration procedure, as described in the Invoking Dynamic Reconfiguration section on page 3-70.

POM: PEER_SYNC_ERR
This alarm occurs when the standby Cisco MGC attempts to synchronize the contents of its configuration library while a provisioning session is in progress on the active Cisco MGC.

Corrective Action
To correct the problem identified by this alarm, either stop the provisioning session as described in the Ending a Provisioning Session Without Activating your Changes section on page 3-70, or save and activate your changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.

PRI: B-Channel not available


This alarm occurs when the Cisco MGC has received a PRI setup message, and the requested B channel is not available or cannot be allocated to the call.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-66

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
If necessary, you can clear the alarm, as described in the Clearing Alarms section on page 8-4, or you can save and activate your provisioning session, as described in the Saving and Activating your Provisioning Changes section on page 3-69.

ProcM No Response
The process manager is not responding to state information changes from the failover daemon.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Stop the Cisco MGC software on the standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 5 Step 6

Stop the Cisco MGC software on the newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If this does not resolve the problem, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

ProtocolFileMissing
This alarm occurs when the protocol file(s) associated with your system configuration have not been installed.

Note

This alarm is valid as of Release 9.2(2).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-67

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate that a *.mdo or *.so file cannot be found. If there are logs that indicate that a *.mdo or *.so file cannot be found, proceed to Step 3. If there are no logs that indicate that an IPC file cannot be opened, proceed to Step 5.

Step 3 Step 4

Determine which protocol patch contains the missing file. To do this, consult the Release Notes for your particular release of the Cisco MGC software. Once you have determined the protocol patch that contains your missing file(s), go to the following URL to down load this patch for your version of the Cisco MGC software: http://www.cisco.com/kobayashi/sw-center/sw-voice.shmtl

Step 5 Step 6

Install the patch as instructed in its associated text file. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

REPL: all connections failure


This alarm occurs when the Cisco MGC cannot establish communication to the peer Cisco MGC.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces for the Cisco MGC are working properly.

Note

Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.

If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 3.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.

Step 3

Verify the replicator configuration on the Cisco MGCs, as described in the Restoring a Backup File from a Device section on page 8-169. If that does not resolve the alarm, proceed to Step 4.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-68

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

RSET CONFIG FAIL


This alarm occurs when the provisioning data for the SS7 route set to a DPC has invalid or incompatible parameter values. This does not occur due to a mismatch between the network topology and the DPC data.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the provisioning settings for the DPC and for all routes to the DPC match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the DPC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data associated with the DPC is correct, then proceed to Step 3.

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SC CONFIG FAIL
This alarm occurs when the provisioning parameters for the data link layer of a signaling channel are inconsistent or invalid. The signaling channel may already be provisioned. The configuration file might be corrupted and cannot be read by the system.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Place the affected signaling channel in the out-of-service state. Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Remove the affected signaling channel from your configuration using the prov-dlt MML command. Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for more information. Referring to your local provisioning parameters, re-provision the signaling channel using the prov-add MML command. Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for more information. Save and activate your provisioning session, as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Step 5

Step 6

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-69

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 7

Place the signaling channel in the in-service state. If that does not resolve the problem, proceed to Step 8.

Step 8

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SC FAIL
This alarm occurs when the signaling channel is down and unable to process traffic. As a result, the signaling channel is failing to negotiate a D-channel session, automatic restarts are not able to recover the session, and the data link-layer has failed. This can occur when SS7 SLTM/SLTA fails or when a PRI D-channel fails.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the near-end and far-end data link terminations are operating. If the near-end or far-end data link terminations are not operating, fix as necessary. If the near-end and far-end data link terminations are operating, proceed to Step 3.

Step 3

Ensure that the provisioning settings for the signaling channel match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data for the signaling channel is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data for the signaling channel is correct, then proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SC M-OOS
This alarm occurs when a signaling channel has been manually taken out of service.

Corrective Action
To correct the problem identified by this alarm, restore the affected signaling channel to the in-service state, using the appropriate procedure. Procedure for modifying the state of signaling channels are described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96, the Setting the Service State of an IP Link section on page 8-97, and the Setting the Service State of a D-channel section on page 8-98.

SG Node Interface Fail


This alarm occurs when all IP connections to a signaling gateway (SG) node are out of service.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-70

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, check the configuration of the SG node and, if necessary, configure it to connect to the Cisco MGC. Refer to the Tekelec documentation for more information.

SG Pair Interface Fail


This alarm occurs when all IP connections to both SGs of a pair or a single non-paired SG are out of service.

Corrective Action
To correct the problem identified by this alarm, check the configuration of the affected SG and, if necessary, configure it to connect to the peer SG. Refer to the Tekelec documentation for more information.

SIP: DNS CACHE NEARLY FULL


This alarm occurs when the domain name service (DNS) cache is nearly full.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current DNS properties by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:dnsparam:all

The system returns a response similar to the following:


MGC-01 - Media Gateway Controller 1999-12-30 14:27:48 M RTRV "session=test:dnsparam" /* *.DnsCacheSize = 500 *.DnsKeepAlive = 30 *.DnsPolicy = HIERARCHY *.DnsQueryTimeout = 1000 *.DnsServer1 = 172.22.1.1 *.DnsServer2 = 143.83.1.1 *DnsTTL = 3600 */

Make note of the value of the *.DnsCacheSize parameter.


Step 3

Begin a dynamic reconfiguration session to increase the value of the *.DnsCacheSize parameter, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this alarm occurs repeatedly despite increasing the size of the cache, then proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-71

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

SIP: DNS SERVICE OOS


This alarm occurs when the DNS servers are not responding to queries. The DNS servers may be out of service or the access to them is lost.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current DNS properties by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:dnsparam:all

The system returns a response similar to the following:


MGC-01 - Media Gateway Controller 1999-12-30 14:27:48 M RTRV "session=test:dnsparam" /* *.DnsCacheSize = 500 *.DnsKeepAlive = 30 *.DnsPolicy = HIERARCHY *.DnsQueryTimeout = 1000 *.DnsServer1 = 172.22.1.1 *.DnsServer2 = 143.83.1.1 *DnsTTL = 3600 */

Make note of the value of the *.DnsServer1 and *.DnsServer2 parameters.


Step 3

Begin a dynamic reconfiguration session to select new DNS servers for your system, entering their IP addresses in the *.DnsServer1 and *.DnsServer2 parameters, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If this alarm occurs repeatedly despite selecting new DNS servers, then proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SIP: OOS
This alarm occurs when an IP link used by the SIP is out of service.

Corrective Action
To correct the problem identified by this alarm, attempt to restore the IP link to service using the procedure described in the Setting the Service State of an IP Link section on page 8-97.

SIP Service Fail Over


This alarm is caused by the failure of switch interfaces, due to either physical failure or administrative shut down.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-72

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine whether the failure is caused by a physical failure or an administrative shutdown. If the failure is caused by a physical failure, proceed to Step 2. If the failure is caused by an administrative shutdown, check for this alarm again once the interface has been restored. If this alarm is still active, proceed to Step 3.

Step 3

Verify that the switch interfaces between the Cisco MGC and the affected SIP element are working properly.

Note

Information on verifying the proper operation of a switch interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of a switch interface on other devices can be found in the user documentation that came with that device.

If an element of the switch connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.

Note

Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing components on other devices can be found in the user documentation that came with that device.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Standby Warm Start


This alarm occurs on the active Cisco MGC when a synchronization operation between the active and standby Cisco MGCs begins. This alarm clears automatically when the synchronization operation is completed. This alarm also occurs on the standby Cisco MGC when the prov-sync MML command is entered on the active Cisco MGC. In that case, the alarm clears automatically when the synchronization of provisioning data is complete. If a synchronization operation should fail, this alarm is automatically cleared and a FAIL REMOTE STANDBY alarm is generated. Refer to the FAIL REMOTE STANDBY section on page 8-45 for more information.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-73

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
Corrective action is only required when the alarm does not clear automatically. If this alarm does not clear automatically, verify that the pom.dataSync parameter in the XECfgParm.dat is set to true on each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173.

SS7 RTE KEY FAIL


This alarm occurs when one or more routing keys for an SS7 signaling service associated with an SG has failed; the signaling service cannot receive some ISUP messages. The maximum number of routing keys supported by the associated SG might have been exceeded.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the provisioning settings for the bearer channels associated with this SG are correct, using the procedure described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the bearer channels is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this clears the alarm, the procedure is complete. Otherwise, proceed to Step 3. If the configuration data associated with the bearer channels is correct, then proceed to Step 3.

Step 3 Step 4

Determine the maximum number of dynamic routing keys that are allowed on the associated SG. Refer to the Tekelec documentation for more information. Determine how many routing keys are being used by the Cisco MGC by adding the number of CICs associated with the SS7 signaling service(s) (ss7sgpath) and the number of SS7 subsystems (ss7sgsubsys) for the affected SG. For example, if 990 CICs and 10 SS7 subsystems were associated with the SG, then 1000 routing keys would be in use by the Cisco MGC.

Step 5 Step 6

Compare the maximum number of routing keys allowed to the number of routing keys being used. If the number of routing keys being used is greater, proceed to Step 6. Otherwise, proceed to Step 7. Begin a dynamic reconfiguration session to delete the excess routing keys by removing either CICs or SS7 subsystems from your configuration, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If this clears the alarm, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SS7 SIG SRVC CONFIG FAIL


This alarm occurs when the identified SS7 signaling service associated with an SG is not configured correctly.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-74

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current DNS properties by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:SS7SGPath:name=sig_srv

Where sig_srv is the MML name of the identified SS7 signaling service. The system returns a response that lists all of the properties associated with the selected SS7 signaling service.
Step 3

Verify that the information displayed for the SS7 signaling service is correct. If it is correct, proceed to Step 5. Otherwise, proceed to Step 4.

Step 4

Begin a dynamic reconfiguration session to correct the settings for the SS7 signaling service, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If this clears the alarm, the procedure is complete. Otherwise, proceed to Step 5.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SS7 SIG SRVC UNAVAIL


The identified SS7 signaling service is unavailable.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform the MML command rtrv-dest on the SS7PATH or SS7SUBSYS object. If the state is OOS,FLD, the signaling service is out of service due to failure of the MTP3 transport. Perform a prov-rtrv:SS7PATH or a prov-rtrv:SS7SUBSYS on the signaling service object.
a.

If the object has an OPC attribute defined, the signaling service is using SLTs for SS7 communication. The MTP3 layer is on the MGC. The SS7ROUTEs and LINKSETs need to be examined to determine the cause of the failure. If the object doesn't have an OPC attribute defined, the signaling service is using ITPs for SS7 communication. The MTP3 layer is one the ITPs. Examine the M3UAROUTEs that have the same OPC and DPC as SS7PATH or the SUAROUTEs that have the same OPC, APC, and REMOTE SSN to determine which ITP EXTNODEs are being uses by the signaling service. Consult the ITP documentation and debug the problem on the ITPs.

b.

If the state is OOS,FLD&UPU, the signaling service is out of service due to failure of the user part layer at the destination. This remote destination should be examined to determine the cause of the failure.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-75

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SSN FAIL
This alarm occurs when the SCP located by subsystem number (SSN) is not available.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the provisioning settings for the SSN and the associated routes match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the SSN is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data associated with the SSN is correct, then proceed to Step 3.

Step 3

Verify the network configuration to confirm that the SCP identified with the SSN is reachable. If the SCP is not reachable, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70, and reprovision your data for an SCP that is reachable, or remove the SSN and its associated data. If the SCP is reachable, proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SUAKEY Ack Pending


This alarm occurs when the MGC cannot send or receive traffic for the identified SS7 subsystem via the Cisco ITP that has not acknowledged the SUAKEY.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected SUA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-76

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

Step 4 Step 5

The AS definitions should match the routing contexts of the SUA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SUPPORT FAILED
This alarm occurs when the identified entity cannot provide service because a supporting entity is not providing service. The supporting entity may be hardware or software.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Check for other alarms, as described in the Retrieving All Active Alarms section on page 8-3, that further identify the failed entity. Once you have identified the failed entity, replace it and restore it to service. If the entity is hardware, refer to the appropriate documentation for replacement. If it is software, attempt to reboot the software. If the alarms clear, the procedure is complete. Otherwise, proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SwitchoverFail
This alarm occurs when a switchover operation from the active Cisco MGC to the standby Cisco MGC has failed.

Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Recovering from a Switchover Failure section on page 8-159.

TALI: Invalid Protocol Version


This alarm occurs when the software on the associated SG does not support TALI version 3.0.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-77

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, you must upgrade the software on the identified SG to support TALI version 3.0. Refer to your Tekelec documentation for information on upgrading your SG software.

TALI: Invalid State


This alarm occurs when the associated SG is not in the allowed connection state.

Corrective Action
To correct the problem identified by this alarm, you must set the connection state of the identified SG to allowed. Refer to your Tekelec documentation for more information.

Tariff Table Access Failure


This alarm occurs when the Cisco MGC could not access the tariff table.

Corrective Action
To correct the problem identified by this alarm, check for the presence of the Tariff Table Load Failure alarm, using the procedure in Retrieving All Active Alarms section on page 8-3. If this alarm is present, perform the corrective action for that alarm. Otherwise, the procedure is complete.

Tariff Table Load Failure


This alarm occurs when a Cisco MGC process is unable to load the tariff table.

Corrective Action
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify whether a tariff table is present on your system by logging in to your active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:tariff:all

The system responds with a list of elements in the tariff table, or with an error indicating that a tariff table does not exist. If a tariff table is not present, provision a tariff table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide. If a tariff table is present, verify that the information returned is correct. If the information is correct, proceed to Step 3. Otherwise, correct the contents of the tariff table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.
Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-78

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

TLC: Leg2chanSeizedUnpackError
This alarm occurs when a Seize Channel (CRCX) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

TLC: Leg2chanModifiedUnpackError
This alarm occurs when a Modify Channel (MDCX) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

TLC: Leg2chanDeletedUnpackError
This alarm occurs when a Delete Channel (DLCX) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-79

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

TLC: Leg2notifyUnpackError
This alarm occurs when a Notify (NTFY) message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

TLC: Leg2deleteChanUnpackError
This alarm occurs when a Delete Channel (DLCX) message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

TLC: Leg2notifyRequestAckUnpackError
This alarm occurs when an Request Notify (RQNT) acknowledge message received from the media gateway could not be unpacked.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-80

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

TLC: Leg2chanOpFailed
This alarm occurs when the Cisco MGC has detected an internal error or a media gateway related problem.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

UCM: CCodeModfailed
This alarm occurs when the country code prefix could not be applied or removed.

Note

This alarm is valid as of Release 9.2(2).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine whether the country code prefix could not be applied or removed by viewing the active system log file, using the procedure described in the Viewing System Logs section on page 8-4. There should be a log present that uses the same text as the alarm. That log indicates whether the country code prefix could not be applied or removed and lists the affected B-number. Determine whether country code prefix application or removal should be performed for the affected B-number. If country code prefix processing should not be performed, proceed to Step 4. If country code prefix processing should be performed, proceed to Step 8.

Step 3

Step 4

Verify whether the result set associated with the affected B-number has a result type of CC_DIG configured, using the numan-rtrv MML command. For example:
numan-rtrv:resulttable:custgrpid=T002

If the result set does have a result type of CC_DIG configured, use the numan-dlt MML command to remove the CC_DIG result set. For example:
numan-dlt:resulttable:custgrpid=T002, name=result46, resulttype=CC_DIG

Otherwise, proceed to Step 5.


Step 5

Verify that the BDigitCCPrefix property for the associated trunk group is set to 0 (disabled) using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-81

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

If the BDigitCCPrefix property in the associated trunk group is not set to 0, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCPrefix=0

Otherwise, proceed to Step 6.


Step 6

Verify that the BDigitCCrm property for the associated trunk group is set to NULL (disabled) using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1

If the BDigitCCrm property in the associated trunk group is not set to NULL, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCrm=null

Otherwise, proceed to Step 7.


Step 7

Verify that the associated B-number analysis configuration does not allow for country code digit removal using the numan-rtrv MML command. For example:
numan-rtrv:digmodstring:custgrpid=T002

If the associated B-number analysis configuration allows country code digit removal, use the numan-dlt MML command to remove the digit string. For example:
numan-dlt:digmodstring:custgrpid=T002, name=ccspain

Otherwise, proceed to Step 13.


Step 8

Select a step based on the country code prefix information found in the log identified in Step 2. If the log indicates that the country code prefix could not be applied, proceed to Step 9. If the log indicates that the country code prefix could not be removed, proceed to Step 11.

Step 9

Verify whether the result set associated with the affected B-number has a result type of CC_DIG configured, using the numan-rtrv MML command. If the result set does not have a result type of CC_DIG configured, use the numan-ed MML command to add the CC_DIG result set. For example:
numan-ed:resulttable:custgrpid=T002, name=result46, resulttype=CC_DIG, dw1=ccspain, setname=setname1

Otherwise, proceed to Step 10.


Step 10

Verify that the BDigitCCPrefix property for the associated trunk group is set to 1 (enabled) using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1

If the BDigitCCPrefix property in the associated trunk group is not set to 1, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCPrefix=1

Otherwise, proceed to Step 13.


Step 11

Verify that the BDigitCCrm property for the associated trunk group is set to the correct number string using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-82

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

If the BDigitCCrm property in the associated trunk group is not set to the correct number string, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCrm=34

Otherwise, proceed to Step 12.


Step 12

Verify that the associated B-number analysis configuration allows for country code digit removal using the numan-rtrv MML command. For example:
numan-rtrv:digmodstring:custgrpid=T002

If the associated B-number analysis configuration does not allow for country code digit removal, use the numan-ed MML command to modify of the setting. For example:
numan-ed:digmodstring:custgrpid=T002, name=ccspain, digstring=34

Otherwise, proceed to Step 13.


Step 13

Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112. If that procedure resolves the problem, the procedure is finished. Otherwise, proceed to Step 13.

Step 14 Step 15

Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

UCM: MGCPDIALAuthFail
This alarm occurs when an MGCP dial call fails after an automatic switchover takes place, due to the expiration of a timer waiting for a Notify message from the associated media gateway.

Note

This alarm is valid as of Release 9.3(1).

Note

There is a patch for Release 9.3(2) that retires this alarm.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the configuration of the associated media gateway. If there are no configuration problems, proceed to Step 2. Otherwise, fix the identified configuration problems. Verify that the IP path between the media gateway and the Cisco MGC is working properly. If you find no problems in the IP path between the media gateway and the Cisco MGC, proceed to Step 4. Otherwise, fix the identified IP path problems. Verify that the IP path between the media gateway and the authentication server is working properly. If you find no problems in the IP path between the media gateway and the authentication, proceed to Step 5. Otherwise, fix the identified IP path problems.

Step 4

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-83

Chapter 8 Troubleshooting Using Cisco MGC Alarms

Troubleshooting the Cisco MGC Node

Step 5 Step 6

Verify that the authentication server is working properly. If you find no problems in the authentication server, proceed to Step 6. Otherwise, fix the identified problems in the authentication server. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Virtual_IP_Addr Mismatch
This alarm occurs when the virtual IP addresses configured in XECfgParm.dat files on the active and the standby Cisco MGCs do not match.

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the value set for the XECfgParm.dat parameter, *.Virtual_IP_Addr, on the active Cisco MGC. Verify the value set for the XECfgParm.dat parameter, *.Virtual_IP_Addr, on the standby Cisco MGC. If the parameter values match, proceed to Step 10. Otherwise, proceed to Step 4.

Step 4

Log in to the standby Cisco MGC and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc

Step 5 Step 6 Step 7 Step 8 Step 9

Open the XECfgParm.dat using a text editor, such as vi. Set the value of the *.Virtual_IP_Addr parameter to match the value on the active Cisco MGC. Save your changes and close the text editor. Stop the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 10.

Step 10

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Wrong IP Path
This alarm occurs when an IP route or local interface associated with the identified component cannot be used. This can happen when one of the following occurs:

A route has been overridden by another route in the operating system routing table. A route configured on your system has been deleted by someone using the UNIX command route delete. An IP link or route has been provisioned incorrectly.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-84

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms

This alarm can also occur if an IP signaling channel has been misconfigured. Use the netstat -rnv UNIX command to retrieve the current operating system routing table.

Note

This alarm is valid as of Release 9.4(1).

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC and retrieve the current operating system routing table using the following UNIX command:
netstat -rnv

The system returns a response similar to the following:


IRE Table: IPv4 Destination ----------------10.82.80.0 10.82.81.0 10.82.82.0 10.82.83.0 default 224.0.0.0 127.0.0.1 Mask ---------------255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 0.0.0.0 240.0.0.0 255.255.255.255 Gateway -------------10.82.82.1 10.82.83.1 10.82.82.112 10.82.83.112 10.82.82.1 10.82.82.112 127.0.0.1 Device Flags ------ ----UGH UGH hme0 U hme1 U UG hme0 U lo0 UH

Step 3 Step 4 Step 5 Step 6

If the response does not contain the route identified in the alarm, open the operating system routing table file using a text editor such as vi. Otherwise, proceed to Step 6. Add the route to the routing table using the appropriate text editor command. Save the file and exit the editing session. If this resolves the problem, the procedure is complete. Otherwise, proceed to Step 6. Verify that the provisioned settings for the identified IP link are correct, using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. If the provisioned settings for your IP link are correct, proceed to Step 8. If the provisioned settings for your IP link are incorrect, proceed to Step 7.

Step 7

Start a dynamic reconfiguration session to change the settings, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this resolves the problem, the procedure is complete. Otherwise, proceed to Step 8. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Step 8

XE Rsrc Fail
This alarm occurs when memory resources have been exhausted on the active Cisco MGC host. If this alarm occurs frequently you may need to add additional memory to your Cisco MGC. Refer to the Sun Microsystems documentation for your Cisco MGC host for more information about adding additional memory.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-85

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2

Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 3 Step 4

Stop the Cisco MGC software on the newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If this resolves the problem, the procedure is complete. Otherwise, proceed to Step 5.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Resolving SS7 Network Related Problems


The Cisco MGC node is considered to be a standard Service Switching Point (SSP) in an SS7 network. The SS7 network carries two types of signals:

Circuit-related Noncircuit-related

The signals involved in the setup and teardown of bearer circuits are circuit-related. Non-circuit-related signals are used for all the ancillary services provided by the SS7 network, including database access and network management. The SS7 protocol is composed of several levels or parts, including the following:

Message Transfer Part (MTP)Levels 1 (MTP1) through 3 (MTP3) Signaling Connection Control (SCCP) Application Service Part (ASP) Transaction Capabilities Application Part (TCAP) Telephony User Part (TUP) ISDN User Part (ISUP) Broadband ISUP (BISUP)

There are many variations of different parts of the SS7 protocol stack. MTP has ANSI, ITU, Bellcore, and a number of national variations. Each country and each major carrier may have slightly different variations of a part to fit its particular needs.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-86

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

The SS7 network needs to have the highest degree of reliability. Each switch with access to the SS7 network must be configured to a preconceived set of network parameters. There is some risk that the person configuring a switch will not use the correct set of parameters or values. This is the root cause of most SS7 problems at both the MTP layers and upper layers of the SS7 protocol. A single parameter value, such as an incorrect timer value, can cause SS7 connectivity to act improperly or fail completely. The first, and most important, step in troubleshooting SS7 related problems is to understand, and fully document, the SS7 network topology and protocols. The protocol documents are used as a reference over the months and years of maintenance on the SS7 network. Troubleshooting SS7 network problems is described in the following sections:

Signaling Channel Problems, page 8-87 Signaling Destination Problems, page 8-91 Signaling Channel Troubleshooting Procedures, page 8-94

Signaling Channel Problems


The Cisco MGC software generates signaling alarms if it detects problems with the transportation of data on a signaling channel or at a signaling destination. Signaling alarms have four classifications of severity:

Critical Major Minor Informational

Note

Multiple alarms are likely to occur for severe failures. For example, SUPPORT FAIL and SC FAIL would typically occur with LIF LOS. Signaling links are the dedicated communication channels that the Cisco MGC uses to transfer signaling information among itself, the Cisco SLTs, and the Signal Transfer Points (STPs). Signaling links provide the necessary delivery reliability for higher-layer SS7 signaling protocols. You can use the Cisco MGC software and MML commands to manage signaling channels and lines. You can retrieve signaling channel attributes, change the states of signaling channels, and change the state of signaling lines. See Chapter 3, Cisco MGC Node Operations, for detailed information.

Note

For more information on MML commands, refer to the Cisco Media Gateway Controller Software Release 9 MML Reference Guide. Because all types of signaling channels have basically the same functionality, they are managed similarly. Unless otherwise noted, all commands, counters, and alarms mentioned here are applicable to all types of signaling channels. Signaling channel problems are described in the following sections:

SS7 Link is Out-of-Service, page 8-88 SS7 Load Sharing Malfunction, page 8-88 Physical Layer Failures, page 8-90

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-87

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Configuration Errors, page 8-90 Supporting Entity Failures, page 8-90 Incomplete Signaling, page 8-90 Changing Service States, page 8-91

SS7 Link is Out-of-Service


If an SS7 link is out-of-service on your system, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Change the service state of the SS7 link to in-service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96. If the SS7 link returns to service, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Verify that MTP1 is working correctly on the affected Cisco SLT, as described in the Identifying MTP1 Communication Problems section on page B-11. If MTP1 is working correctly on the affected Cisco SLT, proceed to Step 3. Otherwise, correct the MTP1 problems as described in the Resolving MTP1 Communication Problems section on page B-11. Repeat Step 2. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 7.

Step 4

Searching for excessive SUREM/AERM errors and link failure messages in the active system log file, as described in the Viewing System Logs section on page 8-4. If MTP2 is working correctly on the Cisco MGC, proceed to Step 8. Otherwise, correct the MTP2 problems as described in the Resolving MTP2 Communication Problems section on page B-12. Repeat Step 1. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 5.

Step 5

Verify that MTP2 is working correctly on the affected Cisco SLT, as described in the Identifying MTP2 Communication Problems section on page B-12. If MTP2 is working correctly on the affected Cisco SLT, proceed to Step 8. Otherwise, correct the MTP2 problems as described in the Resolving MTP2 Communication Problems section on page B-12. Repeat Step 1. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Troubleshoot the SS7 link by performing the procedures found in the Troubleshooting SS7 Link Problems section on page B-5. If no problems can be found, proceed to Step 7. Otherwise, repeat Step 2. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SS7 Load Sharing Malfunction


If load sharing on your SS7 links and/or routes is not working properly, perform the following steps:
Step 1

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-88

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

Step 2

Log in to the active Cisco MGC, start an MML session, and enter the following command to verify the priority settings of your SS7 links:
prov-rtrv:c7iplnk:"all"

The system returns a response similar to the following:


M MGC-02 - Media Gateway Controller 2001-07-24 12:11:44 RTRV "session=active:c7iplnk" /* NAME LNKSET PRI SLC TIMESLOT -------------------ls1link1 ls1 1 0 0 ls1link2 ls1 1 1 0

SESSIONSET ----------c7-slt1 c7-slt2

The PRI field in the response shows the priority settings for your SS7 links. For load sharing to work properly, the priority settings for all of your links should be set to 1.
Step 3

Enter the following command to verify the priority settings of your SS7 routes:
prov-rtrv:ss7route:"all"

The system returns a response similar to the following:


MGC-02 - Media Gateway Controller 2001-07-24 12:25:05 M RTRV "session=active:ss7route" /* NAME OPC DPC -------route1 opc1 dpc1 rout2 opc1 dpc2 rt3 opc2 scp2 rt1 opc2 stp1 rt2 opc2 scp1 */

LNKSET -----ls1 ls2 ls-itu ls-itu ls-itu

PRI --1 1 1 1 1

The PRI field in the response shows the priority settings for your SS7 routes. For load sharing to work properly, the priority settings for all of your routes should be set to 1.
Step 4 Step 5

Start a provisioning session, as described in Starting a Provisioning Session section on page 3-68. If any of the SS7 links show a priority other than 1, you must change the priority settings to ensure proper link load sharing. Before you can change the priority settings for the link, you must take the link out-of-service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96. Modify the priority settings of the link by entering the following command:
prov-ed:c7iplnk:name=lnkname,pri=1

Step 6

Where lnkname is the name of an SS7 link that does not have a priority of 1. Repeat this step for each link that does not have a priority of 1.
Step 7

If any of the SS7 routes show a priority other than 1, you must change the priority settings to ensure proper route load sharing. Before you can change the priority settings for the route, you must take the route out-of-service, as described in the Setting the Service State of an SS7 Signaling Service section on page 8-96. Modify the priority settings of the link by entering the following command:
prov-ed:ss7route:name=rtname,pri=1

Step 8

Where rtname is the name of an SS7 route that does not have a priority of 1.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-89

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Repeat this step for each route that does not have a priority of 1.
Step 9

Save and activate your provisioning changes, as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 10.

Step 10

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Physical Layer Failures


The major issues with the physical layer of an SS7 signaling link are related to cabling, clock source, and connector pinouts. The cable should be of high quality (shielded) and the connectors should be attached and crimped solidly. Since SS7 links are synchronous, one side of the link must provide the clock source and the other side must use this clock signal to read the bits. Finally, the most common mistake is to use the wrong cable pinouts for a specific physical configuration. Make sure that the connector has the correct number of pins (RJ-45, DB-25) and that each pin maps to the correct signal. A number of different physical layers are supported, including ANSI T1, CEPT E1, and V.35. Make sure that the cable complies with the connector and the physical protocol being used. If the configuration appears to be valid and the cable pinout is good, check that the signal is being sent and received correctly. Use a Bit Error Rate Tester (BERT) or perform a signal loopback on the interface. It is possible that the cable is bad, so try to replace it. Finally, it is possible that the line card is bad, so you might try replacing it too.

Configuration Errors
The most common mistake in SS7 signal link configuration is to misconfigure the Signal Link Code (SLC) for the SS7 link. This is a preconfigured code on both ends of the link. If the SLC or the point codes do not match, the link does not align and no transmission can take place. For T1 and E1 connectors, an SS7 signaling link is carried in a single 56- or 64-kbps time slot. The time slot that is used must also agree on both sides of the link. Make sure the MTP2 timers and thresholds agree with the network defaults. Confirm that the far-end switch or STP has the same values as your system. When a Cisco SLT is used to terminate MTP2, confirm that the RUDP parameters agree on both sides and are consistent with the documentation.

Supporting Entity Failures


An SS7 signaling link has a hierarchy of network element entities that must be functioning before the link can function. These include the physical interface (discussed above) and the control software for the link. If any of these fail, the link also fails.

Incomplete Signaling
Link failures between the Cisco SLT and the Cisco MGC can be caused by

Ethernet card failure on the Cisco SLT Ethernet card failure on the Cisco switch

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-90

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

Cisco switch failure Fast Ethernet interface card failure on the Cisco MGC

In each of the above cases, it is impossible to transfer MTP3 signaling messages from the Cisco SLT to the Cisco MGC. Cisco SLT platform failure (which is equivalent to MTP2 failure) causes signaling messages to be unable to go to MTP3. The MTP2 layer on the Cisco SLT is supposed to transmit SIPO messages to the STP mated pair to initiate the changeover procedure. Cisco SLT platform failure on the SS7 network is detected by the mated STP pair, which detects timer expiration and link unavailability.

Changing Service States


Signal channels comply with the Generic Service State model defined in the Physical Layer Failures section on page 8-90. You can change the desired service state of a signaling channel using the following transition requests. Note that there is a difference between a desired service state and an actual service state, and the Cisco MGC might not be able to honor the request. For example, a signal channel that is out-of-service due to an equipment failure cannot transition to an in-service state upon request. The Cisco MGC attempts to bring the channel in-service, but it fails. The failure must be fixed before the transition can succeed.

In-service (IS)The signaling channel is requested to start providing service. Out-of-service (OOS)The signaling channel is requested to stop providing service. For some protocols, this request is accepted, but not granted until after all calls have been released. During the interim period, the channels service state appears as OOS, PEND.

Forced out-of-service (FOOS)The signaling channel is requested to stop providing service immediately regardless of related call states, and to drop currently active calls. Inhibit (INH)The signaling channel is requested to be put into an inhibit state. This state is for SS7 signaling channels only and fails on other types of signaling channels. In this state, the channel is active but does not provide service for call processing. If the signaling channel is the last one in the signal path, the inhibit request is denied and an error is returned.

Un-inhibit (UNH)The signaling channel is requested to be removed from an INH state and to provide service for call processing. This state is for SS7 signaling channels only and fails on other types of signaling channels. Use this option (UNH), rather than the IS option, to return an inhibited signaling channel to service.

Note

Changing the state of a signaling channel generates an alarm. For more information on retrieving and clearing alarms, see Troubleshooting Using Cisco MGC Alarms section on page 8-2.

Signaling Destination Problems


Signaling destinations refer to the endpoints of a network. Typically, if signaling links are in service, the signaling destinations should also be in service. For ISDN signaling, the signaling channel is in service if the Cisco MGC can talk to the media gateway and ISDN backhaul is configured. The destination is in service if the signaling channel is in service and the remote ISDN device is up. Apparent mismatches can occur due to

SS7 traffic restart handling (TRW/TRA) SS7 STP problems

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-91

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Configuration problems Software problems

An SS7 STP is treated as an adjacent point code (APC) to the Cisco MGC. SS7 MTP uses a message exchange called Signaling Link Test Message (SLTM)/Signaling Link Test Acknowledgment (SLTA) to confirm that the far-end point code is the one configured. The SLTM consists of the originating point code (OPC) of the Cisco MGC, an APC number, and an SS7 network indicator. If the values for these parameters match with the values used for these at the far-end switch, an SLTA is returned. If the value for any of these parameters do not match, the far-end switch does not send an SLTA. The Cisco MGC drops the link and tries to realign it. This process continues until the SLTM parameters match on both sides. The problem is manifested by the SS7 links dropping and recovering in roughly 30-second cycles (this is referred to as bouncing). The following sections describe signaling destination problems:

Bouncing SS7 Links, page 8-92 Configuration Errors, page 8-93 Traffic Restart, page 8-93 SS7 Destination is Out of Service, page 8-93 SS7 Route is Out of Service, page 8-94 SS7 Destination is Unavailable, page 8-94

Bouncing SS7 Links


Usually, this condition is caused by mismatched signaling link codes (SLCs) or DPCs/OPCs between the Cisco MGC and the far end. To resolve a bouncing SS7 condition, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the SLC, OPC, and DPC provisioning settings match with those used on the far end. To do this, enter the prov-rtrv MML command for the SS7 link, OPC, and DPC components, as described in the Retrieving Provisioning Data section on page 3-72, and compare the values found there with those used by the far end. If the provisioning settings for the SLC, OPC, and DPC match with those used on the far end, proceed to Step 3. Otherwise, modify the settings to match with those used on the far end. Refer to the Invoking Dynamic Reconfiguration section on page 3-70 for more information about modifying the settings of a provisioned component. If that clears the problem, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Ensure that the local MTP3 timer settings match the network defaults by performing the Verifying MTP3 Timers section on page 8-100. If the local MTP3 timer settings match the network defaults, proceed to Step 4. Otherwise, contact the far-end to determine whether their timer settings can be changed to match your settings. If that clears the problem, the procedure is complete. Otherwise, proceed to Step 4.

Step 4

View the system logs, as described in the Viewing System Logs section on page 8-4, looking for excessive alignment error monitoring (AERM) logs. If large numbers of AERM logs are present, proceed to Step 5. If no AERM logs are present, proceed to Step 6.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-92

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

Step 5

Determine why the link is not aligning properly by checking the alignment status on the Cisco SLT associated with the affected link, as described in the Verifying the Link Alignment Status section on page B-6. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Configuration Errors
If the SS7 DPC is fully associated, it can have the same SLTM/SLTA problems as described above. If the SS7 DPC is quasi-associated, the most common cause for failure is a route misconfiguration. Review the route information between the Cisco MGC and the DPC to make sure that the APCs are valid, the route priorities are set correctly, and the route uses the appropriate linkset.

Traffic Restart
Make sure that the MTP3 traffic restart timers and thresholds agree with the network defaults. Confirm that the far-end switch or STP also has the same values.

SS7 Destination is Out of Service


A signaling destination is typically out of service when all of the SS7 links from the Cisco MGC to the destination or APC are out of service, or when all of the SS7 links from the destination to the APC are out of service. To restore an SS7 destination to service, perform the following steps:
Step 1 Step 2 Step 3

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Contact your SS7 provider and have them verify the links from the DPC to the associated STP. Verify the state of the signaling channels, as described in the Verifying the Status of all Signaling Services section on page 3-8. If any of the SS7 links are out-of-service, restore the links as described in the SS7 Link is Out-of-Service section on page 8-88. If all of the SS7 links to a destination are out-of-service, restore the destination as described in the SS7 Destination is Out of Service section on page 8-93. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 4.

Step 4

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-93

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

SS7 Route is Out of Service


To restore an SS7 route to service, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Change the service state of the destination to in-service, as described in the Setting the Service State of a Signaling Service section on page 8-95. If the destination goes into service, the procedure is complete. Otherwise, proceed to Step 3.

Step 3

Verify the state of the signaling channels, as described in the Verifying the Status of all Signaling Services section on page 3-8. If none of the SS7 links are in-service, proceed to Step 4. If all or at least one of the SS7 links to the destination are in-service, then contact your SS7 provider and have them verify the links from the DPC to the associated STP.

Step 4

Determine why the link is not aligning properly by checking the alignment status on the Cisco SLT associated with the affected link, as described in the Verifying the Link Alignment Status section on page B-6. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 5.

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

SS7 Destination is Unavailable


An SS7 destination is unavailable when all of the routes to the destination are out-of-service. Perform the procedure defined in the SS7 Route is Out of Service section on page 8-94.

Signaling Channel Troubleshooting Procedures


The following sections are procedures used to resolve problems associated with the Cisco MGC nodes signaling connections to other networks:

Setting the Service State of a Signaling Service, page 8-95 Setting the Service State of an SS7 Signaling Service, page 8-96 Setting the Service State of a C7/SS7 Link or Linkset, page 8-96 Setting the Service State of an IP Link, page 8-97 Setting the Service State of an IP Route, page 8-97 Setting the Service State of a D-channel, page 8-98 Setting the Service State of a Local Subsystem Number, page 8-98 Setting the Service State of an Association, page 8-99 Verifying MTP Timer Settings, page 8-99 Modifying Configurable Timers, page 8-101 Managing Japanese SS7 Signaling Link Tests, page 8-110

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-94

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

Managing Japanese SS7 Signaling Route Tests, page 8-111 Verifying Proper Loading of a Dial Plan, page 8-112 Verifying Configuration to Support Multiple Versions of SS7, page 8-113 Resolving an Association Alarm, page 8-113 Converting Stored and Transmitted Point Code Values, page 8-114

Setting the Service State of a Signaling Service


To set the service state of a signaling service, perform the following steps:

Caution

The set-dest command should only be used while you are dynamically reconfiguring the system. Do not use the set-dest command to take a signaling service out-of-service during a maintenance session, as all calls associated with the specified signaling service will be dropped. You should instead use the blk-cic command to block the CICs associated with the signaling service when you need to perform maintenance.

Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-dest:sig_srv:serv_state

Where:

sig_srvThe MML name of the desired signaling service. serv_stateThe desired service state. The valid states are listed below:
ISPlaces a signaling service in service. OOSTakes a signaling service out of service.

Note

Before you can take a NAS signaling service out of service, you must shut down the D-channel on the associated media gateway. Refer to the documentation for the media gateway for more information on shutting down D-channels. For example, to set the service state of a signaling service called sigsrv1 to IS, enter the following command:
set-dest:sigsrv1:IS

Step 2

Verify that the state of the destination has changed by entering the rtrv-dest command, as described in the Retrieving Signaling Service States, page 3-50.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-95

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Setting the Service State of an SS7 Signaling Service


To set the service state of an SS7 signaling service, perform the following steps:

Caution

The set-spc command should only be used while you are dynamically reconfiguring the system. Do not use the set-spc command to take an SS7 signaling service out-of-service during a maintenance session, as all calls associated with the specified SS7 signaling service will be dropped. You should instead use the blk-cic command to block the CICs associated with the SS7 signaling service when you need to perform maintenance.

Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-spc:ss7_srv:serv_state

Where:

ss7_srvThe MML name of the desired SS7 signaling service. serv_stateThe desired service state. The valid states are listed below:
ISPlaces the SS7 signaling service in service. OOSTakes the SS7 signaling service out of service.

For example, to set the service state of an SS7 signaling service called ss7srv1 to IS, enter the following command:
set-spc:ss7srv11:IS

Step 2

Verify that the state of the SS7 signaling service has changed by entering the rtrv-spc command, as described in the Retrieving the State of SS7 Signaling Services, page 3-54.

Setting the Service State of a C7/SS7 Link or Linkset


To change the service state of an SS7 link, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-c7lnk:c7link_name:serv_state

Where:

c7link_nameMML name of the SS7 link you want to modify. serv_stateservice state to which you want to change. Valid values for SS7 links are IS, OOS, FOOS, INH, and UNH.

Note

To set the last link in a linkset out of service, you must enter the FOOS service state in the command.

For example, to set the service state of the SS7 link, c7link1, to IS, enter the following command:
set-c7lnk:c7link1:IS

You can verify that the selected SS7 link is in the proper service state by performing the procedure in the Retrieving Service State of C7/SS7 Links or Linksets, page 3-50.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-96

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

Note

To modify the service state of the backhaul link for the Cisco SLT, you must set the state of all link types associated with that Cisco SLT. The possible link types are S77 links (c7lnk), D-channels, (dchan), and IP links (iplnk).

Setting the Service State of an IP Link


To change the service state of an IP link, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-iplnk:iplink_name:serv_state[::confirm]

Where:

iplink_nameMML name of the IP link you want to modify. serv_stateService state to which you want to change. Valid values for IP links are IS, OOS, and FOOS. confirmAs of Release 9.2(1)T, this parameter is required when you are setting the service state of an MGCP link. Other types of IP links do not require this parameter.

For example, to set the service state of the IP link, iplink1, to IS, enter the following command:
set-iplnk:iplink1:IS

In another example, you would enter the following command to set the service state of an MGCP link called mgcplnk1 to IS:
set-iplnk:mgcplnk1:IS::confirm

You can verify that the selected IP link is in the proper service state by performing the procedure in the Retrieving the Service State for IP Links section on page 3-51.

Note

To modify the service state of the backhaul link for the Cisco SLT, you must set the state of all link types associated with that Cisco SLT. The possible link types are S77 links (c7lnk), D-channels, (dchan), and IP links (iplnk).

Setting the Service State of an IP Route


To change the service state of an IP route, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>set-iproute:iproute_name:serv_state[,confirm]

Where:

iproute_nameMML name of the IP route you want to modify. serv_stateService state to which you want to change. Valid values for IP links are IS, OOS, and FOOS. confirmThis parameter is required when you are setting the service state to OOS or FOOS.

Note

This command cannot be used on the standby Cisco MGC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-97

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

An IP route in any of the following combinations of primary and secondary service states can be set to OOS or FOOS:

IS OOS, CONF OOS, OFF_DUTY OOS, STDBY

For an IP route to be set to IS, it must have a primary service state of OOS and secondary service state of COOS. For example, you would enter the following command to set the service state of an IP route called iprte1 to OOS:
mml>set-iproute:iprte1:OOS,confirm

Note

You can verify that the selected IP route is in the proper service state by performing the procedure in the Retrieving the Service State for IP Routes section on page 3-51.

Setting the Service State of a D-channel


To change the service state of a D-channel, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-dchan:dchan_name:serv_state

Where:

dchan_nameMML name of the D-channel you want to modify. serv_stateservice state to which you want to change. Valid values for D-channels are IS and OOS.

For example, to set the service state of the D-channel, dchan-1, to IS, enter the following command:
set-dchan:dchan-1:IS

You can verify that the selected D-channel is in the proper service state by performing the procedure in the Retrieving the Service State of D-Channels section on page 3-53.

Note

To modify the service state of the backhaul link for the Cisco SLT, you must set the state of all link types associated with that Cisco SLT. The possible link types are S77 links (c7lnk), D-channels, (dchan), and IP links (iplnk).

Setting the Service State of a Local Subsystem Number


To set the service state of a local subsystem number (LSSN), perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-lssn-state:ssn:serv_state

Where:

ssnThe MML name of the desired LSSN.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-98

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

serv_stateThe desired service state. The valid states are listed below:
ISPlaces an LSSN in service. OOSTakes an LSSN out of service.

For example, to set the service state of an LSSN called lnp to IS, enter the following command:
set-lssn-state:lnp:IS

Step 2

Verify that the state of the LSSN has changed by entering the rtrv-lssn command, as described in the Retrieving the State of All Local Subsystem Numbers section on page 3-55.

Setting the Service State of an Association


To change the service state of an association, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>set-association:assoc_name:serv_state[,confirm]

Where:

assoc_nameMML name of the association you want to modify. serv_stateService state to which you want to change. Valid values for IP links are IS, OOS, and FOOS. confirmThis parameter is required when you are setting the service state to OOS or FOOS.

Note

This command cannot be used on the standby Cisco MGC. For example, to set the service state of the association, assoc1, to OOS, enter the following command:
mml>set-association:assoc1:OOS,confirm

You can verify that the selected association is in the proper service state by performing the procedure in the Retrieving the Service State for Associations section on page 3-55.

Verifying MTP Timer Settings


When resolving signaling problems between the Cisco MGC and an associated SS7 network element (such as an STP), you may need to verify that the MTP2 and MTP3 timer settings used by the Cisco MGC conform to settings used by the associated SS7 network element. MML commands are used to retrieve the settings for the MTP2 and MTP3 timers on the Cisco MGC. The following subsections describe methods for verifying the MTP timer settings on the Cisco MGC.

Note

Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the MTP timers.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-99

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Verifying MTP2 Timers


To verify the values used for the MTP2 timers on the Cisco SLTs, complete the following steps:
Step 1

Enter the following command at the Cisco SLT to display the settings for the MTP2 timers:
Router #show SS7 mtp2 timer channel

Where: channel specifies a channel, 0 through 3. The system returns a message similar to the following:
SS7 MTP2 Timers for channel 0 in milliseconds Protocol version for channel 0 is Japan NTT Q.703 Version 1-1 T1 aligned/ready = 15000 T2 not aligned = 5000 T3 aligned = 3000 T4 Emergency Proving = 3000 T4 Normal Proving = 3000 T5 sending SIB = 200 T6 remote cong = 3000 T7 excess ack delay = 2000 T8 errored int mon = 0 TA SIE timer = 20 TF FISU timer = 20 TO SIO timer = 20 TS SIOS timer = 20

Step 2

Verify the MTP2 timers settings listed for the Cisco SLTs against the MTP2 timers used at the associated destination. If the MTP2 timers settings match, your signaling problem has different cause. Continue troubleshooting the problem. If the MTP2 timers settings do not match, perform the procedure in the Modifying MTP2 Timers section on page 8-101.

Verifying MTP3 Timers


To verify the values used for the MTP3 timers, complete the following steps:
Step 1

Log on to active Cisco MGC, start an MML session, and enter the following command to display the settings for the MTP3 timers:
prov-rtrv:lnksetprop:name=MML_name

Where MML_name is the MML name for the linkset associated with the MTP3 timers you want to verify. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2000-07-27 18:33:56 M RTRV "session=nsite04:sigsvcprop" /* mtp3ApcMtpRstrtT28 = 50 mtp3DlnkConnAckT7 = 10 mtp3FrcUnhT13 = 10 mtp3InhAckT14 = 20 mtp3LocInhTstT20 = 900 mtp3MaxSltTries = 2

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-100

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

mtp3MsgPriority = 2 mtp3MtpRstrtT24 = 60 mtp3RepeatRstrtT26 = 150 mtp3TfrUsed = false mtp3TraSnT29 = 600 mtp3tstSltmT1 = 60 mtp3tstSltmT2 = 600 mtp3UnhAckTl2 = 10 reference = ANSI96

Step 2

Verify the MTP3 timers settings listed against the MTP3 timers used at the associated destination. If the MTP3 timers settings match, your signaling problem has different cause. Continue troubleshooting the problem.

Modifying Configurable Timers


In prior releases of the Cisco MGC software, you could not modify the settings of the message transfer part level 3 (MTP3) and redundant link manager (RLM) timers. Starting with Release 9.2, you can modify the settings of these timers. The procedures for verifying and modifying these timers are described in the following sections:

Modifying MTP2 Timers, page 8-101 Verifying and Modifying MTP3 Timer Settings, page 8-102 Verifying and Modifying RLM Timers, page 8-103 Verifying and Modifying ISUP Timer Settings, page 8-105 Rebooting Your System to Modify Properties, page 8-109

Modifying MTP2 Timers


Use the following MML commands at the Cisco SLT to modify the settings for the MTP2 timers:
Router (config)#ss7 mtp-variant standard channel Router(config-standard)# parameters

Where:

standardName of the SS7 standards used for your links. Valid values are Bellcore, ITU, NTT, and TTC channelSpecifies a channel, 0 through 3 parametersThe timer number and the new value for the timer

Note

Refer to the Cisco Signaling Link Terminal documentation for more information on the parameters for this command. In the following example, the aligned/ready timer duration on channel 0 is set to 30,000 milliseconds:
Router(config)# ss7 mtp2-variant Bellcore 0 Router(config-Bellcore)# T1 30000

In the following example, the aligned/ready timer is restored to its default value of 13,000 milliseconds:
Router(config)# ss7 mtp2-variant Bellcore 0 Router(config-Bellcore)# no T1

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-101

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

You might want to verify the new settings after the modification is complete. To do this, refer to the procedure in the Verifying MTP2 Timers section on page 8-100.

Verifying and Modifying MTP3 Timer Settings


When resolving signaling problems between the Cisco MGC and an associated SS7 network element (such as an STP), you may need to verify that the MTP3 timer settings used by the Cisco MGC conform to settings used by the associated SS7 network element. If the settings do not match, you need to modify the settings for the MTP3 timers.

Note

Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the MTP timers. To verify and modify the values used for the MTP3 timers, complete the following steps:

Step 1

Log on to active Cisco MGC, start an MML session, and enter the following command to display the settings for the MTP3 timers:
prov-rtrv:sigsvcprop:name=protocol

Where protocol is the MML name for the SS7 protocol family being used, such as SS7-ANSI or SS7-ITU. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2001-06-01 10:31:00 M RTRV "session=active:lnksetprop" /* mtp2AermEmgThr = 1 mtp2AermNrmThr = 4 mtp2CongDiscard = false mtp2LssuLen = 1 mtp2MaxAlignRetries = 5 mtp2MaxMsuFrmLen = 272 mtp2MaxOutsFrames = 127 mtp2ProvingEmgT4 = 6 mtp2ProvingNormalT4 = 23 mtp2SuermThr = 64 mtp2T1 = 130 mtp2T2 = 115 mtp2T3 = 115 mtp2T5 = 1 mtp2T6 = 30 mtp2T7 = 10 mtp3ApcMtpRstrtT28 = 30 mtp3DlnkConnAckT7 = 10 mtp3FrcUnhT13 = 10 mtp3InhAckT14 = 20 mtp3LocInhTstT20 = 900 mtp3MaxSltTries = 2 mtp3MsgPriority = 2 mtp3MtpRstrtT24 = 100 mtp3RepeatRstrtT26 = 150 mtp3TfrUsed = false mtp3TraSntT29 = 600

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-102

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

mtp3tstSltmT1 = 60 mtp3tstSltmT2 = 600 mtp3UnhAckT12 = 10 reference = ANSI92 rudpAck = enable rudpKeepAlives = enable rudpNumRetx = 2 rudpRetxTimer = 6 rudpSdm = enable rudpWindowSz = 32

Step 2

Verify the MTP3 timers settings listed against the MTP3 timers used at the associated destination. If the MTP3 timers settings match, your signaling problem has different cause. Check for alarms on your system and resolve them using the procedures in the Alarm Troubleshooting Procedures section on page 8-9. If the MTP3 timers settings do not match, proceed to Step 3.

Step 3 Step 4

Start a provisioning session, using the procedure in the Starting a Provisioning Session section on page 3-68. Modify the parameters for the desired MTP3 timers by entering the following command:
prov-ed:lnkset:name=protocol,param_name=param_value

Where:

protocolMML name for the SS7 protocol family being used, such as SS7-ANSI or SS7-ITU. param_nameName of the MTP timer you want to change param_valueNew value for the MTP timer

Note

Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the parameters for this command. In the following example, the MTP3 T1 timer, waiting for signaling link test acknowledgment message, is set to 65 tenths of a second:
prov-ed:lnkset:name=SS7-ANSI,mtp3tstSltmT1=65

Step 5 Step 6

Save and activate your provisioning session, using the procedure in the Saving and Activating your Provisioning Changes section on page 3-69. Reboot your system as described in the Rebooting Your System to Modify Properties section on page 8-109.

Verifying and Modifying RLM Timers


If you want to change the values for these timers, you must change them on the Cisco MGC and on the associated media gateway(s). Refer to the documentation for your media gateway for more information on changing the RLM timers on the media gateway. To change the RLM timers on the Cisco MGC, perform the following steps:

Note

RLM keepalives are sent only when traffic has not been transmitted for some time, that is, when a signaling message is received, the RLM keepalive timer is reset. RLM keep a lives are sent by the media gateway to the Cisco MGC. If the RLM keepalive timer on the Cisco MGC expires, the system

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-103

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

sets the IP link out-of-service. Increasing the RLM keepalive timer values on both sides can ensure that the IP link is not reset during transient conditions in the IP network, when the default values might be too stringent. However, if your system is in a continuous service configuration, increasing the values of the RLM keepalive timers reduces the systems ability to quickly detect a link failure. Systems in a simplex configuration would not be affected.

Step 1

Verify the current settings of your RLM timers on the Cisco MGC by logging in to the standby Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:lnksetprop:name="protocol_fam"

Where protocol_fam is the MML name for the associated protocol family. For example, to retrieve the values of RLM timers for an ANSI signaling environment, you would enter the following command:
prov-rtrv:lnksetprop:name="SS7-ANSI"

The system returns a response similar to the following:


M MGC-01 - Media Gateway Controller 2001-07-27 11:00:06 RTRV "session=active:lnksetprop" /* linkEchoRetry = 3 linkLatencyTest = 600 linkOpenWait = 30 linkRecovery = 120 linkSwitch = 50 linkUpRecoveredMin = 600 port = 3000 PropagateSvcMsgBlock = false timerCmdAck = 10 timerLinkDownMin = 100 timerLinkEcho = 10 unstableLink = 10 */

All of the properties listed, except for port and PropagateSvcMsgBlock, are RLM timer properties.
Step 2 Step 3

Start a provisioning session, using the procedure in the Starting a Provisioning Session section on page 3-68. Modify the RLM timer properties, as needed, using the following command:
prov-ed:lnksetprop:name="protocol_fam",prop_name=value,prop_name=value,...

Where:

protocol_famThe MML name of the associated protocol family. prop_nameThe name of the RLM timer property you want to modify. valueThe value you want for the specified RLM timer property.

For example, to change the values of RLM timers for an ANSI signaling environment, you would enter the following command:
prov-ed:lnksetprop:name="SS7-ANSI",timerLinkDownMin=120,timerLinkEcho=15

Step 4

Save and activate your provisioning session, using the procedure in the Saving and Activating your Provisioning Changes section on page 3-69.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-104

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

Step 5

Reboot your system as described in the Rebooting Your System to Modify Properties section on page 8-109.

Verifying and Modifying ISUP Timer Settings


When resolving signaling problems you may need to verify that the ISUP timer settings used by the Cisco MGC conform to settings used by the associated network elements. If the settings do not match, you need to modify the settings for the ISUP timers. As of Release 9.3(2), you can modify the settings of the local ISUP timers. The configurable ISUP timers are listed in the table below, grouped according to the associated ISUP protocol(s) for each. Other ISUP timers cannot be changed.
Table 8-2 Configurable ISUP Timer Protocol Listings

Timers

Associated Protocol Files


T1

ANSISS7_STANDARD Q761_BASE Q767_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN ANSISS7_STANDARD Q761_BASE Q767_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_SPANISH ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN

T2, T5, T6 T7, T8, T9 T12, T13, T14 T15, T16, T17 T18, T19, T20 T21, T22, T23 T24, T25, T26 T27, T33, T36

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-105

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Table 8-2

Configurable ISUP Timer Protocol Listings

Timers

Associated Protocol Files


T28 T34

ANSISS7_STANDARD Q761_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_SPANISH ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN Q761_BASE Q767_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_SPANISH ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN

T35

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-106

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

Table 8-2

Configurable ISUP Timer Protocol Listings

Timers

Associated Protocol Files


T38

Q761_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_SPANISH ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_BELG_C2 ISUPV2_JAPAN

T_CCR T_CCRR T_CGB T_CGBA T_CRA T_GRS T_CVT

ANSISS7_STANDARD

Note

The default values and valid ranges for each of these timers within the supported protocols can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. To verify and modify the values used for the ISUP timers, complete the following steps:

Step 1

Unless you have previously created a profile for the associated signaling service or trunk group with modified values for these ISUP timers, the values for these eight timers match the default values listed in the tables above. If you have previously created a profile with modified ISUP timer values for the associated signaling service or trunk group, proceed to Step 2 to retrieve the current values set in the profile. Otherwise, proceed to Step 3. Log on to active Cisco MGC, start an MML session, and enter the following command to display the settings for the modified ISUP timers:
prov-rtrv:profile:name=profile_name

Step 2

Where profile_name is the MML name for the profile that contains the modified values for the configurable ISUP timers. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2002-10-07 15:47:39.928 EST M RTRV "session=NOA_SPAIN:profile" /* ProfileType PropertyName ProfileValue -------------------- -------------------- ----------isuptmrprofileT15000

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-107

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

*/

Step 3

Verify the ISUP timers settings listed against the ISUP timers used at the associated destination. If the ISUP timers settings match, your signaling problem has different cause. Check for alarms on your system and resolve them using the procedures in the Alarm Troubleshooting Procedures section on page 8-9. If the ISUP timers settings do not match, proceed to Step 4.

Step 4 Step 5 Step 6

Start a provisioning session, using the procedure in the Starting a Provisioning Session section on page 3-68. If you have already defined a profile that modifies the configurable ISUP timers, proceed to Step 8. Otherwise, proceed to Step 6. Enter your new ISUP timer values using the following command:
prov-add:profile:name=profile_name,type=isuptmrprofile, timer_number=timer_value, timer_number=timer_value, timer_number=timer_value...

Where:

profile_nameMML name for the profile that contains the set of ISUP measurements being used. timer_numbernumber of the timer to be modified. timer_valueNew value for the selected ISUP timer.

Note

Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the valid ranges for the ISUP timers. If you enter a number outside the valid range, the default value is used. In the following example, the values of the T6, T8, and T35 ISUP timers are modified:
prov-add:profile:name=set1,type=isuptmrprofile,T6=30000,T8=12000,T35=18000

Step 7

Create a profile for your new ISUP timer values using the following command:
prov-add:component:name=comp_name, isuptmrprofile=profile_name

Where:

componentMML component type name for signaling service or trunk group profiles. Enter one of the following:
sigpathprofComponent type for signaling service profiles. trnkgrpprofComponent type for trunk group profiles.

comp_nameMML name for the signaling service or trunk group profile to be associated with the set of new ISUP timer values, as set in Step 6. profile_nameMML name for the profile that contains the customized set of ISUP measurements, as set in Step 6.

Once the new ISUP timer values have been set, proceed to Step 9.
Step 8

Modify the parameters for the desired ISUP timers by entering the following command:
prov-ed:profile:name=profile_name,type=isuptmrprofile, timer_number=timer_value, timer_number=timer_value, timer_number=timer_value...

Where:

profile_nameMML name for the profile that contains the set of ISUP measurements being used.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-108

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

timer_numbernumber of the timer to be modified. timer_valueNew value for the selected ISUP timer.

Note

Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the valid ranges for the ISUP timers. If you enter a number outside the valid range, the default value is used. In the following example, the values of the T6, T8, and T33 ISUP timers are modified:
prov-ed:profile:name=set1,type=isuptmrprofile,T6=180,T8=12,T33=14

Once the new ISUP timer values have been set, proceed to Step 9.
Step 9

Save and activate your provisioning session, using the procedure in the Saving and Activating your Provisioning Changes section on page 3-69.

Rebooting Your System to Modify Properties


When you are modifying MTP3 and RLM timers on the Cisco MGC, it is required that you reboot your system as part of the modification process. To do this, perform the following steps:
Step 1

Log in to your active Cisco MGC and change directories to the /opt/CiscoMGC/etc directory using the following UNIX command:
cd /opt/CiscoMGC/etc

Step 2 Step 3 Step 4 Step 5

Open the XECfgParm.dat file in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to false. Save the file and exit the text editor. Shut down the Cisco MGC software on your active Cisco MGC, using the procedure in the Shutting Down the Cisco MGC Software Manually section on page 2-4.

Note

Shutting down the Cisco MGC software on the active Cisco MGC causes the currently standby Cisco MGC to become the active Cisco MGC.

Step 6 Step 7

Restart the Cisco MGC software on this Cisco MGC, using the procedure in the Starting the Cisco MGC Software section on page 2-2. Once the Cisco MGC software is fully activated, log in to the active Cisco MGC and perform a manual switchover, using the procedure in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 8

Once the manual switchover is complete, log in to the newly active Cisco MGC, start an MML session and enter the following command to synchronize the Cisco MGCs:
prov-sync

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-109

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Step 9

Once the synchronization is complete, perform a manual switchover using the procedure in the Performing a Manual Switchover section on page 3-99.

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 10

Once the manual switchover is complete, log in to your newly standby Cisco MGC and change directories to the /opt/CiscoMGC/etc directory using the following UNIX command:
cd /opt/CiscoMGC/etc

Step 11 Step 12 Step 13 Step 14

Open the XECfgParm.dat file in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to true. Save the file and exit the text editor. Shut down the Cisco MGC software on your standby Cisco MGC by entering the following UNIX command:
/etc/init.d/CiscoMGC stop

Step 15

Restart the Cisco MGC software on this Cisco MGC by entering the following command:
/etc/init.d/CiscoMGC start

Managing Japanese SS7 Signaling Link Tests


The following subsections detail the procedures used to manage the tests that can be run on a signaling link configured for Japanese SS7:

Starting an Japanese SS7 Signaling Link Test, page 8-110 Retrieving Results for a Japanese SS7 Signaling Link Test, page 8-110

Starting an Japanese SS7 Signaling Link Test


To start a signaling link test on a link configured for Japanese SS7, log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-ss7-slt:link

Where link is the MML name of a link configured for Japanese SS7. For example, to start a signaling link test on a link called ls1-link1, you would enter the following command:
sta-ss7-slt:ls1-link1

Retrieving Results for a Japanese SS7 Signaling Link Test


To retrieves the results of a Japanese SS7 signaling link test, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-ss7-slt:link

Where link is the MML name of a link configured for Japanese SS7.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-110

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

For example, to retrieve the results of a signaling link test run on a link called ls1-link1, you would enter the following command:
rtrv-ss7-slt:ls1-link1

The system returns a result that indicates the name of the link and the status of the signaling link test. The valid status responses are listed below:

TEST PASSED TEST FAILED (reasons for failure may be any of the following:)
TEST TIMEOUT LINK INACTIVE LINKSET INACTIVE ROUTE UNAVAILABLE INVALID TEST PATTERN INVALID SLC FLOW CONTROL ON UNKNOWN REASON

COMPLETED hh:mm:ss TEST RUNNING

For example, here is a sample response to a signaling link test run on a link called ls1-link1:
Media Gateway Controller - MGC-01 2000-01-12 15:18:41 M RTRV "ls1link1:TEST PASSED; COMPLETED 15:18:34"

Managing Japanese SS7 Signaling Route Tests


The following subsections detail the procedures used to manage the tests that can be run on a signaling route configured for Japanese SS7:

Starting a Japanese SS7 Signaling Route Test, page 8-111 Retrieving Results for a Japanese SS7 Signaling Route Test, page 8-112

Starting a Japanese SS7 Signaling Route Test


To start a signaling route test on a route configured for Japanese SS7, log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-ss7-srt:pt_code:lset=linkset

Where:

pt_codeMML name of an adjacent point code (APC) or destination point code (DPC) configured for Japanese SS7. linksetMML name of a linkset associated with the specified destination.

For example, to start a signaling route test on a point code called dpc1 associated with a linkset called ls1, you would enter the following command:
sta-ss7-srt:dpc1:lset=ls1

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-111

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

Retrieving Results for a Japanese SS7 Signaling Route Test


To retrieves the result of a Japanese SS7 signaling route test, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-ss7-srt:pt_code:lset=linkset

Where:

pt_codeMML name of an adjacent point code (APC) or destination point code (DPC) configured for Japanese SS7. linksetMML name of a linkset associated with the specified destination.

For example, to retrieve the results of a signaling route test run on a point code called dpc1 associated with a linkset called ls1, you would enter the following command:
rtrv-ss7-srt:dpc1:lset=ls1

The system returns a result that indicates the name of the link and the status of the signaling route test. The valid status responses are listed below:

TEST PASSED TEST FAILED (reasons for failure may be any of the following:)
TEST TIMEOUT LINK INACTIVE LINKSET INACTIVE ROUTE UNAVAILABLE INVALID TEST PATTERN INVALID SLC FLOW CONTROL ON UNKNOWN REASON

COMPLETED hh:mm:ss TEST RUNNING

For example, here is a sample response to a signaling route test run on a point code called dpc1 associated with a linkset called ls1:
Media Gateway Controller - MGC-01 2000-01-12 15:20:09 M RTRV "dpc1:TEST FAILED; TEST TIMEOUT; COMPLETED 15:20:01"

Verifying Proper Loading of a Dial Plan


Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate that the dial plan was loaded incorrectly. If the dial plan was not loaded correctly, reload the dial plan by saving and activate your dial plan again as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-112

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems

If there are no logs that indicate that the dial plan was loaded incorrectly, then proceed to Step 3.
Step 3

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Verifying Configuration to Support Multiple Versions of SS7


Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc

Step 3 Step 4

Open the alarmCats.dat using a text editor, such as vi. The third column in the file indicates the severity level for each alarm. Verify that the severity level for the All C7 IP Links Fail alarm is set to 2. If it is set correctly, the procedure is complete. Otherwise, proceed to Step 5 to begin the process of correcting your configuration. Set the the severity level of the All C7 IP Links Fail alarm to 2. Save your changes and close the text editor. Repeat steps 2 through 6 on the standby Cisco MGC. Stop the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover from the active Cisco MGC, as described in the Performing a Manual Switchover section on page 3-99.

Step 5 Step 6 Step 7 Step 8 Step 9 Step 10

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Resolving an Association Alarm


When referred here by an alarm indicating a failure on an association, perform the following steps:
Step 1 Step 2 Step 3

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. If this alarm occurs along with the LIF FAIL alarm on the failed destination address, proceed to Step 3. Otherwise, proceed to Step 5. Verify the functioning of the cabling between the Cisco MGC and the destination address. If the cables are functioning properly, proceed to Step 4.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-113

Chapter 8 Resolving SS7 Network Related Problems

Troubleshooting the Cisco MGC Node

If bad cable(s) are found, replace them. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 4.
Step 4

Verify the functioning of the associated Cisco switch. If the switch is functioning properly, proceed to Step 5. If the switch is not functioning properly, refer to the documentation for your switch for troubleshooting information. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 5

Debug the IP connectivity between the Cisco MGC and the associated external node. If the IP connectivity is working correctly, proceed to Step 6. If the IP connectivity is not working correctly, refer to the documentation for the external node to determine a method to identify and fix the IP connectivity problem. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.

Step 6

Determine the health of the associated external node. If the external node is working correctly, proceed to Step 7. If the external node is not healthy, refer to the documentation for the external node for troubleshooting information. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Converting Stored and Transmitted Point Code Values


If you are troubleshooting signaling problems, you may encounter point code values displayed in hexidecimal or decimal. You must convert these values to understand which point code is affected, or the value being transmitted by the Cisco MGC. You can follow these basic steps:
Step 1

Convert the hexidecimal or decimal value to binary code. For example, if you found a log message indicating a problem with a point code in a ITU SS7 connection, identified with a hexidecimal value of 00:00:36:33, the converted binary value is 00000000000000000011011000110011.

Step 2

Remove the padding, based upon which point code address type applies to the point code (14, 16, or 24-bit).

Note

You can find an explanation of the point code address types in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.

Continuing with the example, since the problem is with an ITU SS7 connection, the address should be 14 bits in length, resulting in a binary value 11011000110011.

Note

If you are troubleshooting signaling problems for a Japanese ISUP connection, remember that the Cisco MGC transmits the higher order bits first for those point codes. The fields for any transmitted point code value you retrieve for a Japanese ISUP connection must be reversed while in its binary value for you to correctly identify the associated point code on the Cisco MGC.

Step 3

Convert the binary code into decimal, using the correct point code format.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-114

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

Note

You can find an explanation of the point code formats in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.

Concluding the example, since the problem is with an ITU SS7 connection and the value came from a Cisco MGC log message, the address should use the ITU International point code format (3-bits/8-bits/3-bits, or 3-8-3), the resulting point code is 6.198.3.

Resolving Bearer Channel Connection Problems


Bearer channels are the focus of everything that the Cisco MGC does. The main function of the Cisco MGC is to ensure that an ingress bearer channel at one endpoint can be successfully connected to an egress bearer channel at another endpoint. The state of the bearer channels is often a good indicator of the overall health of the system. Procedures for determining the state of your bearer channels can be found in the Verifying CIC States section on page 3-13. The following sections contains procedures that are related to resolving problems associated with the Cisco MGC nodes bearer channel connections:

Setting the Administrative State, page 8-116 Querying Local and Remote CIC States, page 8-121 Performing CIC Validation Tests, page 8-123 Resolving ISDN D-Channel Discrepancies, page 8-129 Unblocking CICs, page 8-131 Resetting CICs, page 8-132 Resolving Stuck CICs, page 8-133 Auditing Call States, page 8-137 Stopping Calls, page 8-137 Auditing an MGCP Media Gateway, page 8-140 Running a Manual Continuity Test, page 8-142 Verifying Continuity Test Settings, page 8-142 Media Gateway IP Destination/Link Out-of-Service, page 8-143 Calls Fail at the Cisco MGC, page 8-145 3.1 KHz (ISDN Category 3) Calls are Failing, page 8-146 Calls are Misrouting, page 8-146

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-115

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Setting the Administrative State


You can use the set-admin-state MML command to change the administrative state of various components. A log message is generated every time the set-admin-state MML command is entered. An alarm is generated every time the set-admin-state MML command is entered at either the Cisco MGC, media gateway, signaling service, or trunk group level. The procedures that describe how to use this command are listed below:

Setting the Administrative State of a Cisco MGC, page 8-116 Setting the Administrative State of a Media Gateway, page 8-117 Setting the Administrative State of a Trunk Group, page 8-117 Setting the Administrative State of a Signaling Service, page 8-118 Setting the Administrative State of Spans, page 8-119 Setting the Administrative State of CICs, page 8-120

Setting the Administrative State of a Cisco MGC


To set the administrative state of a Cisco MGC, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:mgc:state

Where:

mgcThe MML name of the desired Cisco MGC. stateThe desired administrative state. The valid states are listed below:
lockMakes all bearer channels unavailable for call processing. If the state is set to lock, active

calls go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed.
unlockMakes all bearer channels available for call processing. If the state is set to unlock, the

Cisco MGC becomes available. New calls are allowed to use the unlocked bearer channels.
resetClears local and remote blocking on all bearer channels and they take on the blocking

view of remote side. For example, to set the administrative state of a Cisco MGC called mgc1 to unlock, enter the following command:
set-admin-state:mgc1:unlock

Step 2

Verify that the state of the Cisco MGC has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Cisco MGC section on page 3-61.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-116

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

Setting the Administrative State of a Media Gateway


To set the administrative state of an associated media gateway, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:gway:state

Where:

gwayThe MML name of the desired media gateway.

Note

Not all media gateway types are applicable. Supported types are CU, MUX, MGW, and AVM external nodes.

stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the media gateway unavailable for call

processing. If the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the media gateway available for call

processing. If the state is set to unlock, the media gateway becomes available. New calls are allowed to use the affected bearer channels.
resetClears local and remote blocking on the bearer channels associated with the media

gateway and these bearer channels take on the blocking view of remote side. For example, to set the administrative state of a media gateway called sfgway to lock, enter the following command:
set-admin-state:sfgway:lock

Step 2

Verify that the state of the media gateway has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Media Gateway section on page 3-62.

Setting the Administrative State of a Trunk Group


To set the administrative state of an trunk group, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:trkgrp:state

Where:

trkgrpThe MML name of the desired trunk group.

Note

This command can only be used for time-division multiplexing (TDM) trunk groups. Allow the corresponding MML name for component type "0020".

stateThe desired administrative state. The valid states are listed below:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-117

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

lock Makes all bearer channels associated with the trunk group unavailable for call

processing. If the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the trunk group available for call

processing. If the state is set to unlock, the media gateway becomes available. New calls are allowed to use the affected bearer channels.
resetClears local and remote blocking on the bearer channels associated with the trunk group

and these bearer channels take on the blocking view of remote side. For example, to set the administrative state of a trunk group called trunkgrp1 to lock, enter the following command:
set-admin-state:trunkgrp1:lock

Step 2

Verify that the state of the trunk group has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Trunk Group section on page 3-62.

Setting the Administrative State of a Signaling Service


To set the administrative state of a signaling service, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:sig_srv:state

Where:

sig_srvThe MML name of the desired signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the signaling service unavailable for call

processing. If the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the signaling service available for call

processing. If the state is set to unlock, the media gateway becomes available. New calls are allowed to use the affected bearer channels. For example, to set the administrative state of a signaling service called nassrv1 to lock, enter the following command:
set-admin-state:nassrv1:lock

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-118

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

Step 2

Verify that the state of the Cisco MGC has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Signaling Service section on page 3-62.

Setting the Administrative State of Spans


To set the administrative state of a single span, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:sig_srv:span=x:state

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

xA16-bit value that identifies an ISDN/PRI physical cable. stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the span unavailable for call processing. If the

state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the span available for call processing. If the

state is set to unlock, the span becomes available. New calls are allowed to use the affected bearer channels. For example, to set the administrative state of span number 2 associated with a signaling service called ss7svc1 to unlock, you would enter the following command:
set-admin-state:ss7svc1:span=2:lock

Step 2

Verify that the state of the bearer channels have changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of Spans section on page 3-63.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-119

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

To set the administrative state of a bearer channel or a range of bearer channels in a span, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:sig_srv:span=x,bc=y[,rng=range]:state

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

xA16-bit value that identifies an ISDN/PRI physical cable. yA numeric value that identifies the non-ISUP bearer channel number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved. stateThe desired administrative state. The valid states are listed below:
lockMakes the specified bearer channels unavailable for call processing. If the state is set to

lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes the specified bearer channels available for call processing. If the state is set to

unlock, the bearer channels become available. New calls are allowed to use the affected bearer channels. For example, to set the administrative state of bearer channels numbers 2 through 6, associated with a signaling service called ss7svc1, to unlock, you would enter the following command:
rtrv-admin-state:ss7svc1:span=2,bc=2,rng=5:unlock

Step 2

Verify that the state of the bearer channels have changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of Spans section on page 3-63.

Setting the Administrative State of CICs


To set the administrative state of a CIC or a range of CICs, perform the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:sig_srv:cic=number[,rng=range]:state

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-120

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

numberA valid CIC number. rangeA value such that y+range is a valid CIC number. The administrative state for all CICs between y and y+range are retrieved. stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the CICs unavailable for call processing. If

the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the CICs available for call processing. If the

state is set to unlock, the CICs become available. New calls are allowed to use the affected bearer channels.
resetClears local and remote blocking on the bearer channels associated with the CICs and

these bearer channels take on the blocking view of remote side. For example, to set the administrative state of CICs 2 through 11, associated with a signaling service called ss7svc1, to lock, you would enter the following command:
set-admin-state:ss7svc1:cic=2,rng=9:lock

Step 2

Verify that the state of the Cisco MGC has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of CICs section on page 3-64.

Querying Local and Remote CIC States


In the course of troubleshooting problems with your bearer channels, you may need to query the local and remote states of the related CICs, to verify that they match. To query the local and remote states of a single CIC or a range of CICs, log in to the active Cisco MGC, start an MML session, and enter the following command:
query-cic:sig_srv:cic=number[,rng=range]

Where:

sig_srvThe MML name for the signaling service associated with the affected CICs. numberThe number of the first CIC in the range of affected CICs. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. All CICs between number and number+range are displayed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-121

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Note

Not all SS7 variants support the querying of CICs. If this command is executed on a signaling service that is configured for an SS7 variant that does not support the querying of CICs, an error code, SABT, is returned once the query operation times out. Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for more information on the SABT error code.

Note

The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, the range option cannot be used with this command. Querying of CICs can only be done one CIC number at a time for point codes associated with an ISUP signaling service configured to issue individual supervision messages. For example, to query the state of CICs 20 through 24, associated with a signaling service called ss7svc1, you would enter the following command:
query-cic:ss7svc1:cic=20,rng=4

The system responds with a message similar to the following:


Media Gateway Controller - MGC-01 2000-01-12 15:19:51 M RTRV "ss7svc1:CIC=20;LPST=IS;LSST=IDLE;RPST=IS;RSST=IDLE" "ss7svc1:CIC=21;LPST=IS;LSST=IDLE;RPST=IS;RSST=IDLE" "ss7svc1:CIC=22;LPST=IS;LSST=IDLE;RPST=IS;RSST=IDLE" "ss7svc1:CIC=23;LPST=IS;LSST=IDLE;RPST=IS;RSST=IDLE" "ss7svc1:CIC=24;LPST=OOS;LSST=IDLE_LOC_BLOC;RPST=IS;RSST=IDLE"

The response lists the local and remote primary and secondary states of the requested CICs. If the response indicates that the mismatch is due to a problem on the local side, you can attempt to resolve the state mismatch using the instructions in the Resolving Local and Remote CIC State Mismatch section on page 8-123. If the response indicates that the mismatch is due to a problem on the remote side, you must contact the personnel at the remote site to resolve the problem. The valid values for the fields found in the response to this command are as follows:

LPST and RPSTLocal primary state and remote primary state


ISIn-Service OOSOut-of-Service TRNSTransient; the state is currently being changed

LSST and RSSTLocal secondary state and remote secondary state


N/ANot available UNEQUIPPEDUnequipped IC_BUSYIncoming is busy IC_BUSY_LOC_BLOCIncoming is busy, blocked locally IC_BUSY_REM_BLOCIncoming is busy, blocked remotely IC_BUSY_BOTH_BLOCIncoming is busy, blocked both remotely and locally OG_BUSYOutgoing is busy OG_BUSY_LOC_BLOCOutgoing is busy, blocked locally

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-122

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

OG_BUSY_REM_BLOCOutgoing is busy, blocked remotely OG_BUSY_BOTH_BLOCOutgoing is busy, blocked both remotely and locally IDLEThe circuit is idle, available for use IDLE_LOC_BLOCIdle, blocked locally IDLE_REM_BLOCIdle, blocked locally IDLE_BOTH_BLOCIdle, blocked both locally and remotely

Resolving Local and Remote CIC State Mismatch


When the local and remote states for CICs do not match and the problem lies with the local CIC states, you can attempt to resolve the mismatch using an MML command, if your CICs are using ANSI SS7 signaling. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
query-cic:sig_srv:cic=number[,rng=range],rslv

Where:

sig_srvThe MML name for the signaling service associated with the affected CICs. numberThe number of the first CIC in the range of affected CICs. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. The system attempts to resolve state mismatches for all CICs between number and number+range.

Note

The rslv option can only be used if your system used ANSI SS7 signaling. If your system uses ITU SS7 signaling and you use this command, the rslv option is ignored and a regular query-cic operation is performed.

Note

The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, the range option cannot be used with this command. Resolving CIC state mismatches can only be done one CIC number at a time for point codes associated with an ISUP signaling service configured to issue individual supervision messages. If the command fails in its attempt to resolve the local and remote CIC state mismatch, collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Performing CIC Validation Tests


When performing initial turn-up of circuits or in troubleshooting certain problems with your bearer channels, you may want to perform a circuit validation test to verify that the properties defined in the Cisco MGC for the affected bearer channels match the associated properties defined in the far-end exchange.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-123

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Note

CIC validation tests can only be performed on CICs associated with ANSI SS7-based DPCs. To perform a circuit validation test, complete the following steps:

Step 1

Start an MML session on the active Cisco MGC and validate the properties for a particular circuit identification code (CIC) using the following command:
vld-cic:dest_pc:cic=number

Where:

dest_pcThe MML name for the DPC associated with the affected CIC. numberThe trunk identification number for the affected CIC.

If the circuit validation test is passed, the system returns a message similar to the following:
Media Gateway Controller - MGC-01 2000-03-07 09:35:19 M RTRV "dms100-pc:CIC=105,PASSED"

If the circuit validation test is failed, the system returns a message similar to the following:
Media Gateway Controller - MGC-01 2000-03-07 09:35:19 M RTRV "dms100-pc:CIC=105,FAIL" LOC: GRP=DIG,SEIZ=EVEN,ALM=UNK,COT=NONE LOC: TRK=1003,A_CLLI=dms1003****,Z_CLLI=na********* REM: GRP=DIG,SEIZ=ODD,ALM=SOFT,COT=STAT

The fields in the LOC line are values associated with the Cisco MGC. The fields in the REM line are values associated with the far-end exchange. The valid values for those fields are described below.

GRPCircuit group carrier indicator. The values in these fields should be the same in the LOC and REM lines. The valid values for this field are:
UNKUnknown circuit group carrier type ANLAnalog circuit group carrier type DIGDigital circuit group carrier type ANDAnalog and digital circuit group carrier type

SIEZDouble seizing indicator. The values for this field in the LOC line should be logically opposite to the value for the REM line. The valid values for this field are:
NONENo circuit control. When one line is set to NONE, the other should be set to ALL. ALLAll circuit control. When one line is set to ALL, the other should be set to NONE. EVENEven circuit control. When one line is set to EVEN, the other should be set to ODD. ODDOdd circuit control. When one line is set to ODD, the other should be set to EVEN.

ALMAlarm carrier indicator. The values in these fields should be the same in the LOC and REM lines. The valid values for this field are:
UNKUnknown alarm carrier SOFTSoftware alarm carrier HARDHardware alarm carrier

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-124

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

COTContinuity check requirements indicator. The values in these fields should be the same in the LOC and REM lines. The valid values for this field are:
UNKUnknown continuity check requirements NONENo continuity check requirements STATStatistical continuity check requirements PERCPer call continuity check requirements

TRKTrunk number. This field is always displayed in the LOC line. It is only displayed in the REM line when the circuit identification names for the Cisco MGC and the far-end exchange do not match. A_CLLICommon language location identifier (CLLI) code for either the far-end exchange or the Cisco MGC. The CLLIs for each are sorted alphabetically, and the A_CLLI field is populated with the CLLI that is found to be first. This field is always displayed in the LOC line. It is displayed in the REM line only when the CLLIs for the Cisco MGC and the far-end exchange do not match. Z_CLLICLLI code for either the far-end exchange or the Cisco MGC. The CLLIs for each are sorted alphabetically, and the Z_CLLI field is populated with the CLLI that is found to be second. This field is always displayed in the LOC line. It is displayed in the REM line only when the CLLIs for the Cisco MGC and the far-end exchange do not match.

If the circuit validation test passes, proceed to Step 14. If the circuit validation test fails, proceed to Step 2.
Step 2

Determine which settings are not correct by comparing the values displayed in the LOC field (from the Cisco MGC) to those in the REM field (from the associated far-end exchange), based on the field descriptions found above. Consult your provisioning records to determine whether the settings on the Cisco MGC and/or the associated far-end exchange need to be modified to resolve the error. If the settings on the Cisco MGC need to be modified to resolve the error, proceed to Step 4. If the settings on the associated far-end exchange need to be modified to resolve the error, contact the provider that operates the switch and work with them to resolve the configuration error.

Step 3

Step 4

Identify the signaling service associated with the affected DPC using the following command:
prov-rtrv:ss7path:"all"

The system returns a message similar to the following:


mgc-01 - Media Gateway Controller 2000-09-26 15:55:17 M RTRV "session=active:ss7path" /* NAME DPC MDO CUSTGRPIDCUSTGRPTBLSIDE ---- --- --- ----------------------ss7am401aam401a-pcANSISS7_STANDARD00000101network ss7am702bam702b-pcANSISS7_STANDARD00000101network ss7inet1inetsp1-pcANSISS7_STANDARD00000101network ss7am408aam408a-pcANSISS7_STANDARD00000101network ss7am408bam408b-pcANSISS7_STANDARD00000101network ss7inet2inetsp2-pcANSISS7_STANDARD00000101network ss7dmsdms100-pcANSISS7_STANDARD00000101network ss7am401bam401b-pcANSISS7_STANDARD00000101network ss7am608bam608b-pcANSISS7_STANDARD00000101network ss7sc2200sc2200-pcANSISS7_STANDARD00000101network

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-125

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

The response lists the SS7 signaling services and their associated DPCs. Search for the DPC associated with the trunk to identify the name of the SS7 signaling service. In the example, dms100-pc is the name of the DPC associated with the trunk. The SS7 signaling service names are in the column to the immediate left of the DPCs, so the name of the associated SS7 signaling service in the example is ss7dms.
Step 5

Identify the MML names of the mismatched settings for the affected signaling service found in Step 4 using the following command:
prov-rtrv:sigsvcprop:name="sig_serv"

Where sig_serv is the MML name of the affected signaling service. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2000-09-26 15:57:29 M RTRV "session=active:sigsvcprop" /* adjDestinations = 16 AlarmCarrier = 0 BothwayWorking = 1 CctGrpCarrier = 2 CGBA2 = 0 CircHopCount = 0 CLIPEss = 0 CotInTone = 2010 CotOutTone = 2010 CotPercentage = 0 dialogRange = 0 ExtCOT = Loop ForwardCLIinIAM = 1 ForwardSegmentedNEED = 1 GLARE = 0 GRA2 = 0 GRSEnabled = false InternationalPrefix = 0 layerRetries = 2 layerTimer = 10 maxMessageLength = 250 mtp3Queue = 1024 NationalPrefix = 0 NatureOfAddrHandling = 0 Normalization = 0 OMaxDigits = 24 OMinDigits = 0 OOverlap = 0 OwnClli = na RedirMax = 3 restartTimer = 10 RoutePref = 0 sendAfterRestart = 16 slsTimer = 300 srtTimer = 300 sstTimer = 300 standard = ANSI92 SwitchID = 0 TMaxDigits = 24 TMinDigits = 0 TOverlap = 0 variant = SS7-ANSI VOIPPrefix = 0

The response above can be mapped to the response to the circuit validation test in Step 1, as listed below:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-126

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

CctGrpCarrierThe value in this field maps to the value in the GRP field, as follows:
0Equal to UNK (unknown carrier) in the GRP field. 1Equal to ANL (analog carrier) in the GRP field. 2Equal to DIG (digital carrier) in the GRP field. 3Equal to AND (analog and diglossia carrier) in the GRP field.

GlareThe value in this field maps to the value in the SEIZ field, as follows:
0 or 3Equal to NONE (no circuit control) in the SEIZ field. 1Equal to ALL (all circuit control) in the SEIZ field. 2Equal to ODD (odd circuit control) in the SEIZ field when the OPC is less than the

associated DPC. Equal to EVEN (even circuit control) in the SEIZ field when the OPC is greater than the associated DPC.

AlarmCarrierThe value in this field maps to the value in the ALM field, as follows:
0Equal to UNK (unknown) in the ALM field. 1Equal to SOFT (software handling) in the ALM field. 2Equal to HARD (hardware handling) in the ALM field.

CotPercentage and ExtCOTThe values in these field maps to the value in the COT field, as follows:
CotPercentage is undefined and ExtCOT is not set to Loop or TransponderEqual to UNK

(unknown continuity check requirements) in the COT field.


CotPercentage is set to any value and ExtCOT is not set to Loop or TransponderEqual to

NONE (no continuity check requirements) in the COT field.


CotPercentage is greater than 0 and less than 100 and ExtCOT is set to Loop or Transponder

Equal to STAT (statistical continuity check requirements) in the COT field.


CotPercentage is set to 100 and ExtCOT is set to Loop or TransponderEqual to PERC (per

call continuity check requirements) in the COT field.


Step 6 Step 7

Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Modify the appropriate signaling service settings using the following command:
prov-ed:sigsvcprop:name=sig_svc,param_name=param_value,param_name=param_value,...

Where:

sig_svcThe MML name for the affected signaling service. param_nameThe MML name for a mismatched setting. param_valueThe correct value for a mismatched setting.

For example, to change the settings for the COT to per call and seizing (glare) to no circuit control for the ss7dms signaling service, you would enter the following command:
prov-ed:sigsvcprop:name="ss7dms",ExtCOT="Loop", CotPercentage=100,GLARE="0"

Step 8

If your Cisco MGC is provisioned for a switched environment and you need to modify the COT and/or seizing (glare) properties, the trunk group properties need to be modified. If you need to modify the trunk group properties, proceed to Step 9. If you do not need to modify the trunk group properties, proceed to Step 12.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-127

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Step 9

Identify the trunk group associated with the affected DPC using the following command:
prov-rtrv:trnkgrp:svc=sig_serv

Where: sig_servThe MML name of the SS7 signaling service identified in Step 4. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2000-09-26 15:55:17 M RTRV "session=active:trnkgrp" /* NAME CLLI SVCTYPESELSEQQABLE ---- --- --- ----------------1003DMS100CLLIss7dmsTDM_ISUPASCN

The response lists the trunk group associated with the affected SS7 signaling service. The MML name of the trunk group is found in the NAME column. In the example, ss7dms is the name of the SS7 signaling service associated with the trunk. The trunk group names are in the first column, so the name of the associated trunk group in the example is 1003.
Step 10

Identify the MML names of the mismatched settings for the affected trunk group found in Step 9 using the following command:
prov-rtrv:trnkgrpprop:name="trnk_grp"

Where: trnk_grpThe MML name of the affected trunk group. The system returns a message similar to the following:
mgc-01 - Media Gateway Controller 2000-09-26 15:57:29 M RTRV "session=active:trnkgrpprop" /* CarrierIdentity = 0333 CLLI = GR31764KB5 CompressionType = 1 CotPercentage = 1 CustGrpId = V123 EchoCanRequired = 0 ExtCOT = Loop GLARE = 2 Npa = 919 RingNoAnswer = 100000 SatelliteInd = 0 ScreenFailAction = 0 */

Step 11

Modify the appropriate trunk group settings using the following command:
prov-ed:trnkgrp:name=trnk_grp,param_name=param_value,param_name=param_value,...

Where:

trnk_grpThe MML name for the affected trunk group. param_nameThe MML name for a mismatched setting. param_valueThe correct value for a mismatched setting.

Note

The values for the COT and/or seizing properties entered here should match the values set in Step 7.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-128

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

For example, to change the settings for the COT to per call and seizing (glare) to no circuit control for the trnkgrpdms trunk group, you would enter the following command:
prov-ed:ztrnkgrp:name="trnkgrpdms",ExtCOT="Loop", CotPercentage=100,GLARE="0"

Step 12 Step 13

Activate your new configuration as described in the Saving and Activating your Provisioning Changes section on page 3-69. Return to Step 1 and enter the vld-cic command again. If the response indicates that the test has passed, proceed to Step 14. If the response indicates that the test has failed, resume performing this procedure from Step 2 and modify the mismatched settings identified in the latest command response.

Step 14

Repeat Steps 1 through 13 for each additional CIC you want to test.

Resolving ISDN D-Channel Discrepancies


When there is a mismatch between the D-channels configured on the Cisco MGC and those configured on the associated media gateway, an ISDN log message is generated. To resolve the log message, complete the following steps:
Step 1

Enter the following command at the active Cisco MGC to change directories:
cd $BASEDIR/etc

Step 2

Determine the component IDs associated with the D-channel number identified in the log text by searching for the D-channel number in the data files. For example, if the log message contains the following text:
PROT_ERR_ISDN:Error message from ISDN:Receive MGMT_ERROR_IND for set 1, channel 2854

The D-channel number in the example is 2854. Therefore, you would search for occurrences of D-channel 2854 in the data files. Enter the following command to search the data files for the identified D-channel number:
grep d_num *.dat

Where d_num is the D-channel number identified in the alarm message. The system returns a message similar to the following:
sigChanDev.dat:001002bd sigChanDev.dat:001002be

00160002 00160002

1 1

0034015e 0034015e

00030011 00030011

00060001 00060002

2854 2854

The response lists the data file(s) in which the D-channel number found, along with the associated properties. In the example above, the D-channel number, 2854, is found twice in the sigChanDev.dat file. The component IDs are in the column immediately following the data file name. So, in this example, the component IDs are 001002bd and 001002be.
Step 3

Determine the MML name of an IP link associated with one of the component IDs you identified in Step 2 using the following command:
grep comp_ID components.dat

Where: comp_ID A component ID identified in Step 2.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-129

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

The system returns a message similar to the following:


001002bd 0034015e
"bh531-31"

"IP link-backhaul svc mgx8260 EAST"

The response lists the properties associated with your selected component ID. The MML name for the IP link is in the third column in the response. In the above example, bh531-31 is the MML name for the IP link.
Step 4 Step 5

Repeat Step 3 for each component ID identified in Step 2. Start an MML session from the active Cisco MGC and enter the following command to determine the MML name for the signaling service associated with the IP link(s) identified in Step 3:
prov-rtrv:iplnk:name="ip_link"

Where: ip_link The MML name for an IP link(s) identified in Step 3. The system returns a message similar to the following:
Media Gateway Controller 2000-06-08 13:49:53 M RTRV "session=active:iplnk" /* NAME = bh531-31 DESC = IP link-backhaul svc mgx8260 EAST SVC = bh531-3 IF = enif1 IPADDR = IP_Addr1 PORT = 7007 PEERADDR = 10.15.26.20 PEERPORT = 7007 PRI = 1 SIGSLOT = 11 SIGPORT = 38 */

The response lists the properties associated with your selected IP link. The MML name for the signaling service associated with the link is in the SVC field. In the above example, bh531-3 is the MML name for the signaling service. Note the values in the SIGSLOT and SIGPORT fields. These values are used later to determine whether the D-channel is defined on the media gateway.
Step 6

Enter the following command to retrieve the properties for the signaling service identified in Step 5:
rtrv-dest:sig_serv

Where sig_serv is the MML name for a signaling service identified in Step 5. The system returns a message similar to the following:
Media Gateway Controller 2000-06-08 13:50:26 M RTRV "bh531-3:PKG=ISDNPRI,ASSOC=SWITCHED,PST=OOS,SST=UND"

Step 7

Log into the associated media gateway and determine whether the D-channel is defined. Refer to the documentation for the media gateway for information on how to verify whether the D-channel is defined. For example, to determine whether a D-channel is defined for a Cisco MGX8260 media gateway, you would enter the following command:
lsdchan 12.39

The values, 12.39, specify the D-channel. These numbers are determined by adding 1 to the SIGSLOT and SIGPORT values identified in Step 5. The media gateway responds with a message that indicates whether the D-channel is defined.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-130

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

Step 8

Consult your provisioning records and determine whether the identified D-channel should exist. If your provisioning records indicate that the D-channel should exist, proceed to Step 9. If your provisioning records indicate that the D-channel should not exist, proceed to Step 10.

Step 9

Define the D-channel on the associated media gateway. Refer to the documentation for the media gateway for information on how to define a D-channel. The procedure is finished.

Step 10 Step 11

Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Delete the appropriate D-channel(s) using the following command:
prov-dlt:iplnk:name=ip_link,...

Where ip_link is the MML name(s) for an IP link identified in Step 3. For example, to delete a D-channel named bh531-31, you would enter the following command:
prov-dlt:iplink:name="bh531-31"

Step 12

Delete the signaling service associated with the D-channel(s) using the following command:
prov-dlt:ipfaspath:name=sig_serv

Where sig_serv is the MML name for a signaling service identified in Step 5. For example, to delete a signaling service named bh531-3, you would enter the following command:
prov-dlt:ipfaspath:name="bh531-3"

Step 13

Activate your new configuration as described in the Saving and Activating your Provisioning Changes section on page 3-69.

Unblocking CICs
You may need to unblock a CIC or a range of CICs on your Cisco MGC. There are two types of blocking on a CIC, local and remote.

Unblocking Locally Blocked CICs


To unblock a single CIC, log in to your active Cisco MGC, start an MML session and enter the following command:
unblk-cic:sig_svc:CIC=number

Where:

sig_svcThe MML name of the signaling service associated with the CICs to be unblocked. numberThe number of the affected CIC.

For example, to unblock CIC number 2, which is associated with a signaling service called ss7svc1, you would enter the following command:
unblk-cic:ss7svc1:CIC=2

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-131

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

To unblock a range of CICs, log in to your active Cisco MGC, start an MML session, and enter the following command:
unblk-cic:sig_svc:CIC=number,RNG=range

Where:

sig_svcThe MML name of a signaling service associated with the CICs you want to unblock. numberThe number of the first CIC in the range of CICs you want to unblock. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. All CICs between number and number+range are displayed.

Note

The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, use of the range option causes individual supervision messages to be issued for each CIC in the range, instead a single group supervision message. For example, to unblock CIC number 1 through 20, which are associated with a signaling service called ss7svc1, you would enter the following command:
unblk-cic:ss7svc1:cic=1,rng=19

To verify that the CIC(s) have been successfully unblocked, retrieve the status of the affected CICs as described in the Verifying CIC States section on page 3-13. If the CIC(s) are still blocked, proceed to the Resetting CICs section on page 8-132.

Unblocking Remotely Blocked CICs


Generally, you cannot unblock a CIC that has been blocked remotely, because the block was set on the far-end. However, in some instances, a remotely blocked CIC is misreported, and you can fix this by resetting the CIC as described in the Resetting CICs section on page 8-132.

Resetting CICs
When trying to clear a blocked CIC or range of CICs, you may need to perform a reset on the affected CIC(s) using the reset-cic MML command.

Note

The reset-cic MML command is not supported for signaling services that use variants of the BTNUP protocol. To reset a single CIC, log in to your active Cisco MGC, start an MML session and enter the following command:
reset-cic:sig_srv:CIC=number

Where:

sig_srvThe MML name of the signaling service associated with the CICs to be reset. numberThe number of the affected CIC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-132

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

For example, to reset CIC number 2, which is associated with a signaling service called ss7svc1, you would enter the following command:
reset-cic:ss7svc1:CIC=2

To reset a range of CICs, log in to your active Cisco MGC, start an MML session, and enter the following command:
reset-cic:sig_srv:CIC=number,RNG=range

Where:

sig_srvThe MML name of a signaling service associated with the CICs you want to reset. numberThe number of the first CIC in the range of CICs you want to reset. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. All CICs between number and number+range are displayed.

Note

The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, use of the range option causes individual supervision messages to be issued for each CIC in the range, instead a single group supervision message. For example, to reset CICs number 1 through 20, which are associated with a signaling service called ss7svc1, you would enter the following command:
reset-cic:ss7svc1:cic=1,rng=19

To verify that the CIC(s) have been successfully reset, retrieve the status of the affected CICs as described in the Verifying CIC States section on page 3-13. If the CIC(s) are still blocked, proceed to the Resolving Stuck CICs section on page 8-133.

Resolving Stuck CICs


A stuck or hung CIC is a condition that occurs when one or more bearer channels associated with a single call instance refuses to return to the idle call state, despite attempts to manually clear it down using the reset-cic MML command. Stuck CICs are generally caused when transient network glitches or configuration errors trigger protocol state machine errors. Typically these conditions result in a mismatch between the CICs call state on the Cisco MGC and the call state for the associated span and bearer channel (also known as timeslot) on the media gateway. The Cisco MGC is capable of automatically detecting and terminating stuck CICs. The system runs an audit cron job once a day that verifies, using the sta-aud MML command, that the call states for the CICs on the Cisco MGC match the associated states for the spans and bearer channels on the media gateway. If the audit finds that the Cisco MGC call states on a CIC show that a call is in progress while the associated media gateway span and bearer channel states are idle, the system attempts to release the identified CIC using the stp-call MML command. The stp-call MML command monitors for the release of the CIC. If the CIC is not released within 1 to 2 minutes, the CIC is forcefully released. When a CIC is forcefully released, a minimal CDR is written, with a cause of Temporary Failure.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-133

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Note

If you suspect that you have stuck CICs, and you do not want to wait for the audit cron job to be performed, or if the audit cron job appears to be unable to clear your stuck CICs, perform the steps identified in the Manually Resolving Stuck CICs section on page 8-134.

Note

The format of the CDR is dependent upon how you have configured the associated XECfgParm.dat configuration parameters. For more information on XECfgParm.dat configuration, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. For more information on CDRs, refer to the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. If you want to run the audit cron job more than once a day, increase the frequency of the audit in the mgcusr crontab entry. You must have system administration authority to use crontab. For more information on crontab, enter the UNIX command, man crontab, on your Cisco MGC.

Note

The audit cron job is not run by the system when the call engines CPU load is greater than the limit set in the XECfgParm.dat file. For more information on XECfgParm.dat configuration, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.

Manually Resolving Stuck CICs


If you want to manually resolve stuck CICs, perform the follow steps:
Step 1 Step 2 Step 3

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Set the logging level of the call engine process (eng-01) to info, using the procedure described in the Changing the Log Level for Processes section on page 8-6. Perform a call state audit, using the procedure described in the Auditing Call States section on page 8-137. When you search the active system log file, look for a CP_INFO_CHAN_STATE message containing the following text:
NAS is idle, SC is busy

An example of this log message appears below:


Fri May 25 13:27:45:384 2001 | engine (PID 14217) <Info> CP_INFO_CHAN_STATE:Mismatch in channel state, NAS is idle, SC is busy, span 0, channel 2

If you find this kind of CP_INFO_CHAN_STATE message in the active system log file, proceed to Step 4. Otherwise, proceed to Step 16.
Step 4

There should be two associated CP_ERR_AUEP messages, one containing information on the affected span and bearer channel and another containing information on the affected CIC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-134

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

Search the active system log file for a CP_ERR_AUEP message containing the following text:
Audit:failed to audit end point

An example of these messages appears below:


Fri May 25 13:27:45:384 2001 | engine (PID 14217) <Error> CP_ERR_AUEP:Audit:failed to audit end point nassvc1[00140001]/0/2 Fri May 25 13:27:45:384 2001 | engine (PID 14217) <Error> CP_ERR_AUEP:Audit:failed to audit end point sigsrv1[00130002]/ffff/2

In the first message, which contains information on the affected span and bearer channel, the text that immediately follows the word point identifies the following:

The MML name of the media gateway destination associated with the affected span and bearer channel (nasssvc1 in the example). The internal hexadecimal code associated with the identified media gateway destination (00140001 in the example). This number appears in brackets. The affected span number, in hexadecimal (0 in the example). The affected bearer channel number, in hexadecimal (2 in the example).

In the second message, which contains information on the affected CIC, the text that immediately follows the word point identifies the following:
Step 5 Step 6 Step 7

The MML name of the signaling service associated with the affected CIC (sigsrv1 in the example). The internal hexadecimal code associated with the identified signaling service (00130002 in the example). This number appears in brackets. The affected span number, in hexadecimal (ffff in the example). This field for this type of message is always set to ffff, because there is no correlation to span in SS7 networks. The affected CIC number, in hexadecimal (2 in the example).

Convert the hexadecimal values for the span, bearer channel, and CIC into decimal values. Using the information gathered in steps 4 and 5, stop the call on an affected CIC for its associated signaling service, using the procedure described in the Stopping Calls on CICs section on page 8-140. Using the information gathered in steps 4 and 5, stop the call on an affected span and bearer channel for its associated media gateway destination, using the procedure described in the Stopping Calls on Spans section on page 8-139. Reset the affected CIC using the procedure in the Resetting CICs section on page 8-132. Repeat steps 3 through 8, searching for additional sets of affected CICs, spans, and bearer channels, until you have addressed all of the stuck CICs identified by the call state audit. Repeat steps 3 and 4, performing a second call state audit and searching the active system log file to determine whether the previously identified CICs are still stuck. If the previously identified CICs are still stuck, proceed to Step 11. Otherwise, proceed to Step 14.

Step 8 Step 9 Step 10

Step 11

Forcefully end the call on the signaling services and CICs identified in Step 4 by entering the following command:
kill-call:sig_srv:cic=num,confirm

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-135

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Caution

The kill-call MML command forcibly ends calls locally. It does not send any SS7 messages to the far-end. Kill-call should only be used when you are attempting to clear stuck CICs that cannot be cleared using the reset-cic or stp-call MML commands. Where:

sig_srvMML name of the signaling service identified in Step 4. numNumber of the stuck CIC identified in Step 4.

For example, to forcefully stop a call on CIC 215, which is associated with a signaling service called sigsrv1, you would enter the following command:
kill-call:sigsrv1:cic=215,confirm

Repeat this step for each CIC you have identified as being stuck.
Step 12

Forcefully end the call on the signaling service, spans, and bearer channels identified in Step 4 by entering the following command:
kill-call:sig_srv:span=span_num,bc=bear_chan,confirm

Caution

The kill-call MML command forcibly ends calls locally. It does not send any SS7 messages to the far-end. Kill-call should only be used when you are attempting to clear stuck CICs that cannot be cleared using the reset-cic or stp-call MML commands. Where:

sig_srvMML name of the signaling service identified in Step 4. span_numNumber of the span identified in Step 4. bear_chanNumber of the stuck bearer channel identified in Step 4.

For example, to forcefully stop a call on bearer channel 2, which is on span 2, and is associated with a signaling service called nassvc1, you would enter the following command:
kill-call:nassvc1:span=2,bc=2,confirm

Repeat this step for each bearer channel you have identified as being stuck.
Step 13

Repeat steps 3 and 4, performing a third call state audit and searching the active system log file to determine whether the previously identified CICs are still stuck. If the previously identified CICs are no longer stuck, proceed to Step 14. If these CICs are still stuck, proceed to Step 15.

Step 14 Step 15 Step 16

Set the logging level of the call engine (eng-01) to err, using the procedure described in the Changing the Log Level for Processes section on page 8-6. Perform a call trace as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-136

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

Auditing Call States


To run a call state audit, which compares the call states of the CICs on the Cisco MGC with the associated states of the spans and bearer channels on the media gateway, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-aud

Note

The Cisco MGC does not indicate when the sta-aud MML command has completed its call state audit process. Wait a few minutes before proceeding to the next step.

The results of the call state audit are sent to the active system log file.
Step 3

View the active system log file as described in the Viewing System Logs section on page 8-4. If you see any call state mismatch logs in the active system log file, contact the Cisco TAC for assistance in resolving the call state mismatch. Refer to the Obtaining Technical Assistance section on page xxx for more information about contacting the Cisco TAC. Once you have finished audit the call states, enter the following command:
stp-aud

Step 4

Stopping Calls
You can use the stp-call MML command to stop calls gracefully on all traffic channels associated with a specified system resource. The stp-call MML command is described in the following sections:

Stopping Calls on a Cisco MGC, page 8-137 Stopping Calls on a Media Gateway, page 8-138 Stopping Calls on a Trunk Group, page 8-138 Stopping Calls on a Signaling Service, page 8-138 Stopping Calls on Spans, page 8-139 Stopping Calls on CICs, page 8-140

Stopping Calls on a Cisco MGC


To stop all active calls on all traffic channels on a Cisco MGC, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:mgc,confirm

Where mgc is the MML name of the desired Cisco MGC. For example, to stop all active calls on all traffic channels on a Cisco MGC called mgc1, enter the following command:
stp-call:mgc1,confirm

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-137

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Stopping Calls on a Media Gateway


To stop all active calls on all traffic channels on a media gateway, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:gway,confirm

Where gway is the MML name of the desired media gateway.

Note

Not all media gateway types are applicable. Supported types are CU, MUX, MGW, and AVM external nodes. For example, to stop all active calls on all traffic channels on a media gateway called sfgway, enter the following command:
stp-call:sfgway,confirm

Stopping Calls on a Trunk Group


To stop all active calls on all traffic channels associated with a trunk group, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:trkgrp,confirm

Where trkgrp is the MML name of the desired trunk group.

Note

This command can only be used for TDM trunk groups. For example, to stop all active calls on all traffic channels associated with a trunk group called trunkgrp1, enter the following command:
stp-call:trunkgrp1,confirm

Stopping Calls on a Signaling Service


To stop all active calls on all traffic channels associated with a signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:sig_srv,confirm

Where sig_srv is the MML name of the desired signaling service. The following signaling service types are valid for this command:

For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC). Signaling service or routeset associated with a DPC. EISUP signaling service.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-138

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

For example, to stop all active calls on all traffic channels associated with a signaling service called nassrv1, enter the following command:
stp-call:nassrv1,confirm

Stopping Calls on Spans


To stop all active calls on all bearer channels associated with a single span, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:sig_srv:span=x,confirm

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

xA16-bit value that identifies an ISDN/PRI physical cable.

For example, to stop all active calls on all bearer channels on a signaling service called ss7svc1 associated with span number 1, enter the following command:
stp-call:ss7svc1:span=1,confirm

To stop all active calls on a bearer channel, or a range of bearer channels, for a span associated with a signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:sig_srv:span=x,bc=y[,rng=range],confirm

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

xA16-bit value that identifies an ISDN/PRI physical cable. yA numeric value that identifies the non-ISUP bearer channel number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-139

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

For example, to stop all active calls on all bearer channel numbers 2 through 6, associated with a signaling service called ss7svc1, enter the following command:
stp-call:ss7svc1:span=2,bc=2,rng=5,confirm

Stopping Calls on CICs


To stop all active calls on a CIC, or a range of CICs, associated with a signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:sig_srv:cic=number[,rng=range],confirm

Where:

sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC).


Signaling service or routeset associated with a DPC. EISUP signaling service.

numberA valid CIC number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved.

For example, to stop all active calls on CICs 2 through 11, associated with a signaling service called ss7svc1, enter the following command:
stp-call:ss7svc1:cic=2,rng=9,confirm

Auditing an MGCP Media Gateway


You can audit an MGCP media gateway from the Cisco MGC. The procedure to audit an MGCP media gateway is described in the following sections:

Starting an MGCP Media Gateway Audit, page 8-140 Retrieving an MGCP Media Gateway Audit, page 8-141

Starting an MGCP Media Gateway Audit


You can run an audit on a single MGCP media gateway, or on all of your provisioned MGCP media gateways. The Cisco MGC does not prompt you to indicate when the audit is complete. Please wait a few moments before retrieving the audit results as described in the Retrieving an MGCP Media Gateway Audit section on page 8-141. To run an audit on a single MGCP media gateway, log on to the active Cisco MGC, start an MML session, and enter the following command:
sta-aud-gw:MGCP_sig_srv

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-140

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

Where MGCP_sig_srv is the MML name of the MGCP signaling service associated with the MGCP media gateway. For example, to start an audit on an MGCP media gateway associated with an MGCP signaling service called T-1-16, you would enter the following command:
sta-aud-gw:T-1-16

To run an audit all of your MGCP media gateways, log on to the active Cisco MGC, start an MML session, and enter the following command:
sta-aud-gw:all

Retrieving an MGCP Media Gateway Audit


You can retrieve an audit for a single MGCP media gateway, or for audits on all of your MGCP media gateways. To retrieve an audit for a single MGCP media gateway, log on to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-aud-gw:MGCP_sig_srv

Where MGCP_sig_srv is the MML name of the MGCP signaling service associated with the MGCP media gateway. For example, to retrieve an audit on an MGCP media gateway associated with an MGCP signaling service called T-1-16, you would enter the following command:
rtrv-aud-gw:T-1-16

The system returns a response similar to the following:


Media Gateway Controller - MGC-01 2000-01-12 15:19:51 M COMPLD "SP1-MGCP1:Audit gw received at 2000-01-12 15:19:51 Audit GW PASSED pass pn pass pt - not alarmed pass sl - not alarmed pass nl pass bp pass cp pass rp pass nb pass uc pass ic pass us pass is"

The response indicates whether the audit has passed or failed. If the audit has failed, refer to the documentation for the associated MGCP media gateway for more information on troubleshooting the identified problem. To retrieve audits run on all of your MGCP media gateways, log on to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-aud-gw:all

The system returns a response similar to the one shown above, with a set of data for every MGCP media gateway associated with your system.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-141

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Running a Manual Continuity Test


To run a manual continuity test (COT) on a specified remote switch CIC, log in to the active Cisco MGC, start an MML session, and enter the following command:
tst-cot:sig_srv:cic=number

Where:

sig_srvThe MML name of the signaling service associated with the CIC to be tested. numberThe identification number of the CIC to be tested.

For example, to run a manual COT on CIC number 5 of a signaling service named sigsrv1, you would enter the following command:
tst-cot:sigsrv1:cic=5

If the manual COT test should fail, verify the COT settings for the Cisco MGC and the associated media gateway, as described in the Verifying Continuity Test Settings section on page 8-142.

Verifying Continuity Test Settings


Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the COT properties for the associated SS7 signaling service or trunk group are correct by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:component:name="comp_name"

Where:

componentMML component type name for the SS7 signaling service or trunk group properties. Enter one of the following:
sigsvcpropComponent type for SS7 signaling service properties. trnkgrppropComponent type for trunk group properties.

comp_nameMML name for the affected SS7 signaling service or trunk group.

For example, if you wanted to verify the properties for an SS7 signaling service called ss7svc1, you would enter the following command:
prov-rtrv:sigsvcprop:name="ss7svc1"

If your system has been properly configured for dial plan use, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-01 10:09:47 M RTRV "session=active:sigsvcprop" /* adjDestinations = 16 AlarmCarrier = 0 BothwayWorking = 1 CctGrpCarrier = 2 CGBA2 = 0 CircHopCount = 0 CLIPEss = 0 CotInTone = 2010

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-142

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

CotOutTone = 2010 CotPercentage = 0 CustGrpId=2222 dialogRange = 0 ExtCOT = Loop ForwardCLIinIAM = 1 ForwardSegmentedNEED = 1 . . .

Step 3

If your settings for the highlighted properties match what is displayed above, proceed to Step 6. Otherwise, you must modify the COT settings on your Cisco MGC. To begin modifying the COT settings, start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the COT settings on your Cisco MGC:
prov-ed:component:name="comp_name",cot_prop=value,cot_prop=value,...

Step 4

Where:

componentMML component type name for the SS7 signaling service or trunk group properties. Enter one of the following:
ss7pathComponent type for SS7 signaling services. trnkgrpComponent type for trunk groups.

Step 5 Step 6

comp_nameMML name for the affected SS7 signaling service or trunk group. cot_propName of the COT property you want to modify. valueValue for the specified COT property.

Save and activate your changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Debug the COT settings on the associated media gateway using the show cot dsp, show cot request, show cot summary, and debug cot detail commands. Refer to the documentation for the associated media gateway for more information on these commands. If debugging the COT settings on the media gateway does not reveal any problems, or does not fix the COT failure, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Media Gateway IP Destination/Link Out-of-Service


If an IP link or destination to a media gateway is out-of-service, perform the following steps:

Note

An IP destination to a media gateway is out-of-service when both IP links associated with the destination are out-of-service.

Step 1

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-143

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

Step 2

Ping the affected MGC link from the associated media gateway, using the following UNIX command:
ping link_addr

Where link_addr is the IP address of the affected MGC link. Repeat this step if the second link for the destination is also out-of-service. If the links are unreachable, proceed to Step 10. Otherwise, proceed to Step 3.
Step 3

If the path between the Cisco MGC and the media gateway is defined using an MGCP signaling service, proceed to Step 4. If the path between the Cisco MGC and the media gateway is defined using a NAS signaling service, proceed to Step 5. Verify the MGCP interface on your media gateway is working properly. Refer to the documentation associated with the media gateway for more information. If the MGCP interface on your media gateway is working properly, proceed to Step 10. Otherwise, correct the problems with the MGCP interface as described in the documentation associated with the media gateway.

Step 4

Step 5

Identify which Redundant Link Manager (RLM) group is configured on the media gateway by entering the sh run command. For more information on this command, refer to the documentation associated with the media gateway. Verify that the RLM group identified in Step 5 is defined under the D-channel serial interface. Refer to the documentation associated with the media gateway for more information. If the RLM group is defined, proceed to Step 7. Otherwise, add the RLM group to the D-channel serial interface. Refer to the documentation associated with the media gateway for more information. If the link(s) returns to service, the procedure is complete. Otherwise, proceed to Step 7.

Step 6

Step 7

Reset the RLM group using the shut/no shut commands. Refer to the documentation associated with the media gateway for more information. If the link(s) return to service, the procedure is complete. Otherwise, proceed to Step 8.

Step 8

Verify that RLM messages are being acknowledged by the Cisco MGC using the debug command. Refer to the documentation associated with the media gateway for more information. If RLM messages are being acknowledged by the Cisco MGC, proceed to Step 10. Otherwise, proceed to Step 9.

Step 9

Verify that the configuration for RLM on the Cisco MGC matches the configuration on the media gateway. To display the configuration of the IP links on the Cisco MGC, enter the following MML command at the active Cisco MGC:
prov-rtrv:iplnk:"all"

The system returns a response similar to the following:


M MGC-02 - Media Gateway Controller 2001-07-26 12:57:48 RTRV "session=active:iplnk" /* NAME SVC IF PEERADDR PEERPORT PRI SIGSLOT SIGPORT ---------------------------------va-5300-202-1 va-5300-202 enif1 172.24.200.19 3001 1 0 0 va-5300-202-2 va-5300-202 enif1 172.24.200.19 3001 1 0 0 va-5300-203-1 va-5300-203 enif1 172.24.200.20 3001 1 0 0

IPADDR PORT NEXTHOP NETMASK --------------------IP_Addr1 3001 0.0.0.0 255.255.255.255 IP_Addr1 3001 0.0.0.0 255.255.255.255 IP_Addr1 3001 0.0.0.0 255.255.255.255

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-144

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

va-5300-203-2 172.24.200.20 */

3001

va-5300-203 1

enif1 0 0

IP_Addr1 3001 0.0.0.0 255.255.255.255

Ensure that the IP addresses (IPADDR and PEERADDR) and the ports (PORT and PEERPORT) match the values used by the media gateway. If the values match, proceed to Step 10. Otherwise, if the changes need to be made on the media gateway, refer to the documentation for your media gateway for more information. If the changes need to be made on the Cisco MGC, start a dynamic reconfiguration session to make your changes, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the changes resolve the problem, the procedure is complete. Otherwise, proceed to Step 10.
Step 10

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Calls Fail at the Cisco MGC


If calls appear to be failing at the Cisco MGC, and the calls are not appearing on the associated media gateway, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Debug the interface on the media gateway associated with the Cisco MGC. If your system is configured for signaling, the interface is Q.931. If your system is configured for call control, the interface is MGCP. Refer to the documentation for the associated media gateway for more information on debugging the interface. If the calls in question do not appear on the media gateway, proceed to Step 3. Otherwise, resolve the problems with the interface as described in the documentation for the associated media gateway.

Step 3

Verify that the signaling channels are in-service, as described in the Verifying the Status of all Signaling Services section on page 3-8. If any of the signaling channels are out-of-service, attempt to bring them into service using the appropriate procedures. Otherwise, proceed to Step 4.

Step 4 Step 5

Run a call trace as described in the Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-145

Chapter 8 Resolving Bearer Channel Connection Problems

Troubleshooting the Cisco MGC Node

3.1 KHz (ISDN Category 3) Calls are Failing


If 3.1 KHz calls (also known as ISDN category 3 calls) are failing, perform the following steps:

Note

The following procedure is valid only if your Cisco PGW 2200 is using the BTNUP protocol.

Step 1 Step 2 Step 3

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. If your system is configured for the BTNUP protocol, proceed to Step 3. Otherwise, proceed to Step 7. Verify the setting for the defaultBC property on the trunk group associated with the failed calls by entering the following MML command at the active Cisco MGC:
prov-rtrv:trnkgrpprop:name="trnkgrpname"

Where trnkgrpname is the MML name of the trunk group associated with the failed calls. The system returns a response listing the values of all of the properties for the specified trunk group. The defaultBC property should be set to 3_1_KHZ to ensure proper processing of 3.1 KHz calls. If the defaultBC property is set to 3_1_KHZ, proceed to Step 7. Otherwise, proceed to Step 4.

Note

Setting the defaultBC property changes the identifying information for incoming 3.1 KHz (ISDN category 3) calls to match the settings for speech (ISDN category 2) calls. This change allows these calls to be processed by far-end switches that ordinarily reject 3.1 KHz calls.

Step 4 Step 5

Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Modify the appropriate signaling service settings using the following command:
prov-ed:trnkgrpprop:name=trnkgrpname,defaultBC=3_1_KHZ

Where trnkgrpname is the MML name for the affected trunk group.
Step 6

Save and activate your new configuration as described in the Saving and Activating your Provisioning Changes section on page 3-69. If your system now completes 3.1 KHz calls, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Calls are Misrouting


If your calls are misrouting, you may have a problem with your dial plan or routing data. To identify the source of the problem and resolve it, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a diagnostic trace of your dial plan and routing data using the translation verification viewer, as described in the Using the Translation Verification Viewer section on page 3-142.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-146

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems

If the diagnostic trace does not reveal any configuration errors in your dial plan or routing data, proceed to Step 8. Otherwise, proceed to Step 3 to correct the configuration errors.
Step 3

Correct your dial plan and/or routing data as indicated in the output of the translation verification viewer and proceed to Step 7.

Note

The MML commands to be used to correct the data differ based on the elements of the configuration to be changed. For more information on the appropriate MML commands for changing the configuration of individual dial plan and routing data elements, refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.

If the call that is misrouting is an MGCP dial call, the value for the MGCPDIALPKG result type could be incorrect. To correct the value of the MGCPDIALPKG result type, proceed to Step 4.
Step 4

Verify the current setting of the MGCPDIALPKG result type using the following MML command:
numan-rtrv:resulttable:custgrpid=group_number,name=result_name,resulttype=MGCPDIALPKG ,SETNAME=set_name

Where:

group_numberCustomer group identification number associated with the affected dial plan. result_nameResult name associated with the affected dial plan. set_nameName of the set associated with the affected MGCP dial plan.

If the setting is not correct, proceed to Step 5. Otherwise, proceed to Step 8.


Step 5

Change the MGCPDIALPKG settings using the following MML command:


numan-ed:resulttable:custgrpid=group_number,name=result_name,resulttype=MGCPDIALPKG, SETNAME=set_name DW1=call_type DW2=x

Where:
Step 6

group_numberCustomer group identification number associated with the affected dial plan. result_nameResult name associated with the affected dial plan. set_nameName of the set associated with the affected MGCP dial plan. call_typeCall type for the MGCP calls. Valid values are digital, analog, and dynamic. xValue for data word 2. Valid values are 0 and 1.

Deploy the updated dial plan using the following MML command:
chg-dpl:custgrpid=group_number

Where group_number is the customer group identification number associated with the affected dial plan.
Step 7

Re-run the diagnostic trace on your dial plan as described in Step 1. If no errors are found, the procedure is complete. Otherwise, return to Step 3 and continue to modify your dial plan.

Note

If you have repeatedly modified your dial plan and routing data and errors are still appearing in the diagnostic trace, proceed to Step 8.

Step 8

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-147

Chapter 8 Resolving SIP Communication Problems

Troubleshooting the Cisco MGC Node

Resolving SIP Communication Problems


The Cisco MGC software can be used for SIP communications. The procedures dealing with resolving problems on signaling channels and bearer channels cover most of the steps you would need to take to resolve a SIP communication problem. The section below is a SIP-specific procedure.

Stopping SIP-to-SIP Calls


As of Release 9.3(2), the Cisco MGC software can control SIP-to-SIP calls. To stop a particular SIP-to-SIP call, log in to the active Cisco MGC, start an MML session, and enter the following command:
kill-call:sip_sig_srv:cid=name,confirm

Where:

sip_sig_srvThe MML name for the SIP signaling service associated with the SIP-to-SIP call. nameThe SIP call identification name. This can be obtained using the rtrv-sip MML command, as described in the Retrieving SIP Call Information section on page 3-66.

For example, the following MML command stops a SIP-to-SIP call on a SIP signaling service called sip_svc1:
kill-call:sip_svc1:[email protected],confirm

Tracing
Tracing on the Cisco MGC is described in the following sections:

Performing a Call Trace, page 8-148 Alternatives to Call Tracing, page 8-154 Performing a TCAP Trace, page 8-157

Performing a Call Trace


After checking all physical connections, signal links, bearer channels, and destinations, the person who is troubleshooting the Cisco MGC begins to suspect that the call engine is part of the problem. Performing a call trace while making a call provides details about what is occurring inside the call engine and indicates where the breakdown is occurring (if it is occurring within the call engine). Call tracing is described in the following sections:

Starting A Call Trace, page 8-149 Stopping A Call Trace, page 8-150 Retrieving Names of Open Call Trace Files, page 8-151 Viewing the Call Trace, page 8-151 Deleting Call Trace Files, page 8-152 Understanding the Call Trace, page 8-152

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-148

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Tracing

Starting A Call Trace


To start the call trace, perform the following steps:
Step 1

Log in to the active CiscoMGC, start an MML session, and enter the command. This command can be entered in any one of five different formats:
1. 2. 3. 4. 5.
sta-sc-trc:sig_path: [log=filenameprefix ][ ,prd=n] , confirm sta-sc-trc:sig_path:span=x[ ,rng=y][,log=filenameprefix][,prd=n ] sta-sc-trc:sig_path:span=x[[,tc=z],rng=y][,log=filenameprefix][,prd=n] sta-sc-trc:trkgrp: [log=filenameprefix][ ,prd=n] , confirm sta-sc-trc:trkgrp:trk=w[,rng=y][ ,log=filenameprefix][ ,prd=n ]

Where:

sig_pathThe logical signaling destination, such as an SS7 point code, an FAS path, an IP FAS path, or a DPNSS path, trkgrpThe logical trunk group of interest. filenameprefixTrace files are created and written to a file whose name can vary, depending on how the command is invoked. (A system log message is generated for each trace started. The filenames created as part of the sta-sc-trc command are contained in the log messages.) If the log= parameter is used, the value of this parameter is treated as a prefix to the filename. If no log= parameter is used, default filenameprefix values are used for each sta-sc-trc command. For example:
For sta-sc-trc:sig_path:confirm the filename is:

sig_path_yyyymmddhhmmss.btr
For sta-sc-trc:trkgrp:confirm the filename is:

trkgrp_sig_path_yyyymmddhhmmss.btr Where the filename (yyyymmddhhmmss) is a time stamp, organized as follows:


yyyyIs the four-digit designation for the year, such as 2000, 2001, or 2002. mmIs the two-digit designation for the month (01 through 12). ddIs the two-digit designation for the day of the month (01 through 31). hhIs the two-digit designation for the hour of the day (00 through 23). mmIs the two-digit designation for the minutes (00 through 59).

ssIs the two-digit designation for the seconds (00 through 59).

nThe duration for which call trace information is collected, in seconds. At the expiration of this period, the system discontinues PDU collection on the signaling path and closes the log file. In the absence of this parameter, the default period is set to 1800 seconds (30 minutes), after which time the trace is stopped automatically. confirmAn option that is required to confirm a sig_path level trace or a trkgrp level trace command. This is required due to the large volume of data that can be generated and the potential performance impact of generating a large trace file. If the confirm option is not entered, the command is rejected, and you receive a message regarding the potential performance impact of this command. xThe span ID, an integer value denoting the traffic channel for the sig_path (NFAS only).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-149

Chapter 8 Tracing

Troubleshooting the Cisco MGC Node

yThe range. When used with span=x, y is an optional range of spans beginning with span x and continuing for y spans. When used with tc=z, y is an optional range of traffic channels beginning with z and continuing for y traffic channels. When used with trk=w, y is an optional range of contiguous trunks to be traced starting with trunk w and ending with trunk y. yThe traffic channel of interest in integer form. wThe trunk of interest in integer form.

The following paragraphs present examples of each of the five possible command variations:
1.

A signaling path level trace traces all calls occurring on the signaling path. Use this format if the specific traffic channel the call uses is unknown.
sta-sc-trc:sig_path:log=filenameprefix, prd=600, confirm

In this form of the command, the confirm parameter is required.


2.

A signaling path/span level trace traces calls at the span level. Use this format to reduce the amount of trace information if you know the span on which the call will be placed.
sta-sc-trc:sig_path:span=x

The confirm parameter is not needed in this form of the command because the volume of the trace file should not be an issue, nor should system performance.
3.

A signaling path/span/traffic channel level trace traces calls at the TC or CIC level. Use this format if the traffic channel on which the call will be placed is known.
sta-sc-trc:sig_path:span=x,tc= y

4.

A trunk group level trace traces all calls at a trunk group level. Use this format if the trunk group on which the call will be placed is known.
sta-sc-trc:trkgrp:confirm

This form of the command requires the confirm parameter.


5.

A trunk group/trunk level trace traces only calls for a given trunk (or CIC). Use this format if the trunk group and trunk on which the call will be placed is known.
sta-sc-trc:trkgrp:trk=w

Note

Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for detailed information on using the sta-sc-trc command.

Step 2

Make the call.

Stopping A Call Trace


You can stop a call trace session using the stp-sc-trc MML command. To stop a call trace session on a particular signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-sc-trc:sig_srv|trkgrp

Where:

sig_srvMML name for the signaling service on which you are running a call trace. trkgrpMML name for the trunk group on which you are running a call trace.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-150

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Tracing

For example, to stop a call trace session on a trunk group called T-1-1, you would enter the following command:
stp-sc-trc:T-1-1

To stop all call trace sessions, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-sc-trc:all

The system returns a response similar to the following:


Media Gateway Controller 2000-03-21 15:28:03 M COMPLD "ALL:Trace stopped for the following files: ../var/trace/_dpc1_20000321152752.btr "

Retrieving Names of Open Call Trace Files


To retrieve the names of call trace files for sessions that are in progress, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-sc-trc

The system returns a response similar to the following:


Media Gateway Controller 2000-03-21 15:28:03 M RTRV "RTRV-SC-TRC:Trace in progress for the following files: ../var/trace/_dpc1_19991221131108.btr ../var/trace/sigtest_dpc2_19991221131109.btr "

Viewing the Call Trace


The MML command sta-sc-trc produces .btr (binary trace) files, which cannot be viewed with a text editor. The main part of the file name is set up in the sta-sc-trc command, as explained in the Starting A Call Trace section on page 8-149, and the Cisco MGC adds the .btr extension to these files. The .btr files can contain tracings from many calls all mixed together. Each tracing record in the file has a specific record type and records information of the type that relates to that record. Each record has a unique call ID that relates it to a specific call and is a recording of the external events that the MDL call model was exposed to while the recording was made. Each tracing record is not a recording of the actual MDL. You can use the trace viewer to view and navigate through call trace outputs. For more information on using the trace viewer, refer to the Using the Trace Viewer section on page 3-142. You can also view the call trace output data using the get_trc.sh UNIX script. Get_trc.sh uses the Conversion Analyzer and SimPrint utilities in combination to give a single common interface to all the trace tools. Get_trc.sh makes considerable use of the UNIX less utility for displaying file output and it is assumed that less is available on the system. For more information on the less utility, enter the UNIX command man less on your system. You can start the script by entering the following UNIX command:
get_trc.sh filename

Where filename is the name of the call trace output data file (.btr) you want to view.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-151

Chapter 8 Tracing

Troubleshooting the Cisco MGC Node

The script then displays a list of commands and prompts you to enter a command. The following commands are listed:

SDisplays the call trace data using the SimPrint utility. For more information on SimPrint, refer to the Understanding SimPrint section on page 8-154. FDisplays the call trace data using the SimPrint utility, and a listing of the sent and received fields. DDisplays the data in the .trc file associated with this call trace. For more information on .trc files, refer to the Understanding Trace Files section on page 8-153. CConverts the file created by this script to a .trc file. ADisplays the data in the .ca file associated with this call trace. For more information on .ca files, refer to the Understanding the Conversion Analyzer section on page 8-153. NDisplays the information for the next call ID in the list. PDisplays the information for the previous call ID in the list. LLists all of the call IDs in the data for this call trace. HProvides help on displaying call trace data. QCloses the script. idDisplays the information for a call ID that you specify.

Deleting Call Trace Files


Call trace files can be rather large, and leaving these files on your disk after you no longer require them could raise capacity issues. Call trace files are deleted using UNIX commands, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.

Understanding the Call Trace


Call traces record information in a trace file that shows how the Cisco MGC processed a specific call. Traces are most useful when you can be sure that a problem call is reaching the call engine and starting an instance of a Message Definition Language (MDL) state machine. You can determine whether the problem call is reaching the call engine by looking for the presence of non-idle circuits (rtrv-cic) or new cmgCall entries in the debug logs. After you start a trace, all call-processing activity for calls originating from the specified destination is captured. This allows you to follow the call through the Cisco MGC to see where it fails. The trace output is in binary format. It shows:

The PDU that the Cisco MGC receives How the Cisco MGC decodes the PDU The PDU that the Cisco MGC sends out

Using call trace logs is easy if you remember how to locate the record of a call:

You can easily locate incoming signal messages that cause instances of engine call objects to be started by searching backwards in the call trace for new cmgCall. Similarly, you can find the end of a call by searching forward from the new cmgCall message for the next end cmgCall message.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-152

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Tracing

If you are experiencing problems with call processing and need to contact Cisco for support, you should run a call trace before contacting Cisco's TAC. The trace file helps the Cisco TAC troubleshoot the problem more effectively. For some problems, the Cisco TAC cannot begin troubleshooting the problem until you supply the trace file, so it is a good practice to create this file before contacting them.

Understanding the Conversion Analyzer


The Conversion Analyzer is a viewer utility for .btr trace files. The Conversion Analyzer displays each record from a .btr file in a readable form (ASCII text) that can be viewed with any text editor; however, some useful sorting and display options are also available. The .btr files serve as source files for .ca files. The .ca files are ASCII text output from the Conversion Analyzer obtained by redirection of the standard output to a file. There are two main sections in a .ca file. The header section contains a list of every signaling path defined on the Cisco MGC and a list of the message definition object (MDO) modules that are loaded. The main body contains a printout of every record. Each record has a record number, a timestamp, a call ID, and the print data that the record contains.

Understanding the Simulator Utility


The Simulator is a powerful MDO file processing utility that uses .mdo files to replay the events recorded in a .btr file. The front end of the Simulator reads the .btr file. The interpreter in the Simulator utility that loads the .mdo files and replays the events (.btr files) through the MDO, is the same interpreter used by the call engine in the Cisco MGC when .mdo files are used. As the interpreter steps through each line of object code (and the action of each object is interpreted) in the .mdo file, each object's print method is activated, which forms the next line of text in the .trc file. The print method for each object contains text that directly relates to the appearance of the .mdl source code that produced the object in the .mdo file (through compilation of the .mdl source code with the MDL compiler). The .mdo files used with the Simulator when it is processing a .btr file to create a .trc file, must be the same .mdo files that were in use when the .btr file was originally recorded on the Cisco MGC. This is why the conversion from a .btr file to a .trc file is usually done on the Cisco MGC that originated the .btr file. The interpreter is not used with .so files because those files interact directly with the call engine in the Cisco MGC, but the tracer can record a .btr file regardless of whether .mdo or .so files were used to process the call. The Simulator can, however, replay .btr files using .so files in place of .mdo files. This is a way of checking that the .so and .mdo files perform in exactly the same way, although .so is faster. Because .so files do not contain MDO objects, there are no print methods available to the Simulator, so no .trc output is possible. When a .btr file is produced by a Cisco MGC using .so files, the replay in the Simulator must be done with the .mdo files that were used to produce the .so files in order to produce an accurate .trc file.

Understanding Trace Files


Trace files (.trc files) are text files that are produced by the Simulator utility. They contain detailed line by line trace information from the MDO code that was run in the simulation replay that produced the file, thus they contain MDL traces. The .trc extension is added by the get_trc.sh script if the source of the trace is a .btr file. Trace files are source files for the SimPrint (SP) utility. They are text files and can be viewed with a text editor. The .trc file should be sent to Cisco TAC if expert analysis is required.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-153

Chapter 8 Tracing

Troubleshooting the Cisco MGC Node

Understanding SimPrint
SimPrint (SP) is a viewing utility for .trc files. SP converts a .trc file into a sequence diagram that shows all of the external and internal events that occur in a .trc file. This is useful for getting an overview of what is occurring in the trace. The following list defines the terms used in the call flow printouts generated by the SimPrint tool:

LINERefers generically to the incoming and outgoing interfaces of the Cisco MGC. OCCOriginating Call Control state machine. The call is passed from the incoming interface to a protocol adapter, where it is converted into a generic message signaling unit (MSU) and sent to the OCC for parsing of MSU data to memory. LCMLightspeed Call Model state machine. The LCM is a generic call model containing event handlers to process generic call event data. This processing includes generic call analysis, requests for bearer channels, and transfer of the MSU to the appropriate TCC state machine. The LCM is also known as the Universal Call Model (UCM). ANALYSISThe LCM can perform generic call analysis, based on the content of the MSU. The LCM exchanges data with the call processing engine to analyze the MSU. After analysis is complete, an available circuit is identified and the LCM sends a bearer channel seizure request message to the CPM state machine. CPMConnection Plane Manager state machine. The CPM exchanges data with the call processing engine to seize and prepare a bearer channel for routing of the call data. CDRCall Detail Record. CDR information is created as a result of LCM processing of the MSU. TRIGGERIntelligent Network (IN) Trigger state machine. This state machine is used to send and receive IN trigger events to the Transfer Capabilities Application Part (TCAP) interface in the I/O channel controller (IOCC). This enables IN messages to be sent to a service control point (SCP). ENGINEThe call processing engine exchanges data with the LCM as generic call analysis is performed on the MSU and a bearer channel is seized and prepared for routing of the call data. TCCTerminating Call Control state machine. The TCC changes the call data into a protocol-specific protocol data unit (PDU) and passes the PDU to the terminating IOCC for routing to the outgoing interface.

Alternatives to Call Tracing


Performing call traces to identify problems can be difficult due to the large amount of data the trace may gather before the error occurs, and the negative impact performing call traces has on system performance. The Cisco MGC software has MML commands that can be used to diagnose problems with hung calls and abnormal call termination. The following sections describe those commands.

Diagnosing Hung Calls


You can print the diagnostic information about hung calls to a file using the prt-call MML command. The contents of the file include all of the previous states of the call and a history of occurrences leading up to the call being stuck in its current state. To print diagnostic information on a hung call, complete the following steps:
Step 1 Step 2

If the hung call is a SIP-to-SIP call, proceed to Step 3. Otherwise, proceed to Step 2. Log in to the active Cisco MGC and enter the following command:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-154

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Tracing

prt-call:sig_path:cic=number [,log=xyz]

or
prt-call:sig_path:span=phys, bc=bchan [,log=xyz]

Where:

sig_pathCorresponding MML name for any of the following component types:


Signaling path of in-band TDM up to MUX and then time switched to TDM media and sent to

the Cisco MGC.


Signaling path of in-band TDM signaling up to CU and then encapsulated and sent over IP to

the Cisco MGC.


Signaling path of in-band TDM signaling up to NAS and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->NAS<-NI2/IP->Cisco MGC).


Signaling path or routeset associated with an SS7 destination point code. Signaling path for EISUP.

Note

This command allows for the use of wildcards for the sig_path parameter. numberA numeric value that identifies the ISUP circuit identification code (CIC) number. physA 16-bit value that identifies an ISDN/PRI physical cable. bchanA numeric value that identifies the non-ISUP bearer channel number. BC is used for non-ISUP trunks.; otherwise use CIC. xyzAn optional parameter that names the ASCII log file to which the output of this command is written. The name given in this parameter is used as a prefix to the actual name of the file, which includes the sig_path name, date, and time. If no log file name is provided, a default name consisting of the sig_path name, date, and time is created. The extension of these log files is .prt, and they are located in the $BASEDIR/var/trace directory.

For example, the following MML command prints call data for a signaling service called dms100-pc using a CIC of 124:
prt-call:dms100-pc:cic=124

Proceed to Step 4.
Step 3

Log in to the active Cisco MGC and enter the following command:
prt-call:sig_path:cid=name [,log=xyz]

Where:

sig_pathThe MML name for the signaling service associated with the SIP-to-SIP call. nameThe SIP call identification name. This can be obtained using the rtrv-sip MML command, as described in the Retrieving SIP Call Information section on page 3-66. xyzAn optional parameter that names the ASCII log file to which the output of this command is written. The name given in this parameter is used as a prefix to the actual name of the file, which includes the sig_path name, date, and time. If no log file name is provided, a default name consisting of the sig_path name, date, and time is created. The extension of these log files is .prt, and they are located in the $BASEDIR/var/trace directory.

For example, the following MML command prints call data for a particular call on a SIP signaling service called sip_svc1:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-155

Chapter 8 Tracing

Troubleshooting the Cisco MGC Node

prt-call:sip_svc1:[email protected]

Step 4

Change directories to access the log file by entering the following command:
cd /opt/CiscoMGC/var/trace

Step 5

Use a text file viewer, such as vi, to view the contents of the log file.

Performing an Abnormal Call Termination Trace


You can print the global variable information from the state machine and external event information for a call to a file using the sta-abn-trc MML command. To print this information, complete the following steps:
Step 1

Log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-abn-trc:sig_path|all[,log=xyz] [,prd=n],confirm

Where:

sig_pathCorresponding MML name for any of the following component types:


Signaling path of in-band TDM up to MUX and then time switched to TDM media and sent to

Cisco MGC.
Signaling path of in-band TDM signaling up to CU and then encapsulated and sent over IP to

the Cisco MGC.


Signaling path of in-band TDM signaling up to NAS and then converted to NI2 and sent to the

Cisco MGC over IP (that is, FE box<-sig/tdm->NAS<-NI2/IP->Cisco MGC).


Signaling path or routeset associated with SS7 DPC. Signaling path for EISUP.

Note

This command allows for the use of wildcards for the sig_path parameter. allIndicates that the start trace command needs to be applied to the whole Cisco MGC, in which case only one trace file is generated. xyzThe name of an ASCII log file to which the output of this command is written. The name given in this parameter is used as a prefix to the actual name of the file, which includes the sig_path name, date, and time. If no log file name is provided, a default name consisting of the sig_path name, date, and time is created. The extension of these log files is .prt, and they are located in the $BASEDIR/var/trace directory. nThe period, in seconds, for which this trace is enabled, during which time any abnormal calls are traced. If this optional parameter is not used, the period defaults to 30 seconds.

For example, the following MML command prints call data for a signaling path called dms100-pc to a file named trace1 (since the period parameter, n, is not entered, the trace lasts for the default period, 30 seconds):
sta-abn-trc:dms100-pc,log=trace1,confirm

Step 2

To change directories, enter the following UNIX command:


cd /opt/CiscoMGC/var/trace

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-156

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Tracing

Step 3

Use a text file viewer, such as vi, to view the contents of the log file.

Stopping an Abnormal Call Termination Trace


You can stop an in-progress abnormal call termination trace using the stp-abn-trc MML command. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-abn-trc:sig_srv

Where sig_srv is the MML name for a signaling service on which an abnormal call termination trace is being run. For example, to stop an abnormal call termination trace being run on a signaling service called ss7srv1, you would enter the following command:
stp-abn-trc:ss7srv1

The system responds with a response similar to the following:


Media Gateway Controller 2000-05-26 07:02:11 M COMPLD "Trace stopped for the following file: ../var/trace/_20000526070211.abn "

To stop all in-progress abnormal call termination traces, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-abn-trc:all

The system returns a response similar to the following:


Media Gateway Controller 2000-05-26 07:02:11 M COMPLD "ALL:Trace stopped for the following files: ../var/trace/_20000526070211.abn "

Performing a TCAP Trace


To run a TCAP trace on your system, perform the following steps:
Step 1

Start the TCAP trace by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
sta-tcap-trc

The system begins sending TCAP trace messages to the active system logs file.
Step 2 Step 3

View the active system logs file, as described in the Viewing System Logs section on page 8-4. Make note of any TCAP trace messages, such as hex dumps of messages sent to the SCCP layer. When your TCAP trace is complete, enter the following command to stop the TCAP trace:
stp-tcap-trc

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-157

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Platform Troubleshooting
The following sections contain procedures related to resolving problems with the Cisco MGC platform:

Verifying Cisco MGC Ethernet Operation, page 8-158 Deleting Unnecessary Files to Increase Available Disk Space, page 8-158 Recovering from a Switchover Failure, page 8-159 Recovering from Cisco MGC Host(s) Failure, page 8-161 Restoring Stored Configuration Data, page 8-164 Restoring a Backup File from a Device, page 8-169 Configuration Export Failed Due to MMDB, page 8-171 Measurements Are Not Being Generated, page 8-171 Call Detail Records Are Not Being Generated, page 8-172 Resolving a Failed Connection to a Peer, page 8-172 Rebooting Software to Modify Configuration Parameters, page 8-173 Diagnosing SNMP Failure, page 8-174 Correcting the System Time, page 8-176 Securing your Network, page 8-177 TIBCO Interface Not Working, page 8-186

Verifying Cisco MGC Ethernet Operation


Refer to the documentation provided by Sun Microsystems for more information on verifying the proper functioning of the Ethernet connections on your Cisco MGC host.

Deleting Unnecessary Files to Increase Available Disk Space


You may need to delete call trace files, archived log files, or configurations from your system to create more available disk space on your Cisco MGC. The following procedure steps you through the process of deleting all three file types.
Step 1

Log in to the active Cisco MGC and enter the following UNIX commands to determine whether the affected disk drive contains any call trace files in the /opt/CiscoMGC/var/trace directory:
cd /opt/CiscoMGC/var/trace ls

The system responds with a list of files in the directory. If the command response indicates that there are *.btr and *.trc files stored in this directory, then proceed to Step 2. Otherwise, proceed to Step 4.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-158

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Note Step 2

Do not delete any call trace files related to troubleshooting any current system problems.

Delete the identified call trace files using the following UNIX command:
rm -i filename

Where filename is the name of the call trace file (either *.btr or *.trc) you have identified for deletion.
Step 3 Step 4

Repeat Step 2 for each additional call trace file identified for deletion. Enter the following UNIX commands to view the archived logs in the /opt/CiscoMGC/var/spool directory on the affected disk drive:
cd /opt/CiscoMGC/var/spool ls

The system responds with a list of files in the directory. Review the listed files. If there are archived log files listed that are no longer required, proceed to Step 5. Otherwise, proceed to Step 7.

Note

If you are backing up your system software on a regular basis, you can retrieve any files that you choose to delete from your backup files, if the need arises. For more information on backing up your system software, refer to the Backing Up System Software section on page 3-27.

Step 5

Delete the identified archived log files using the following UNIX command:
rm -i filename

Where filename is the name of the archived log file you have identified for deletion.
Step 6 Step 7

Repeat Step 5 for each additional identified archived log file. Use the config-lib viewer to view the contents of the configuration library, using the information in the Using the Config-Lib Viewer section on page 3-135. Determine whether any of the configurations listed are no longer necessary for the operation of your system. If any of the configurations can be deleted, delete them using the information in the Using the Config-Lib Viewer section on page 3-135.

Recovering from a Switchover Failure


Use the procedure in this section to recover from a failed switchover operation. You would typically use this procedure when the standby Cisco MGC is unavailable to process calls and a critical alarm occurs on the active Cisco MGC. To recover from a switchover failure, complete the following steps:
Step 1 Step 2 Step 3

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC, start an MML session, and view the current alarms, as described in the Retrieving All Active Alarms section on page 8-3. Identify the critical alarm that caused the switchover attempt. To do this, review the alarm(s) that are listed in the response. There should be at least one critical alarm, and an alarm indicating that a switchover began and another alarm indicating that the switchover failed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-159

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

If there is only one critical alarm listed, that alarm caused the switchover attempt. If there is more than one critical alarm listed, compare the timestamp of the critical alarms with the timestamp of the alarm indicating that a switchover began. The critical alarm that occurred before the switchover was begun is the alarm that caused the switchover attempt.
Step 4 Step 5 Step 6

Refer to the Alarm Troubleshooting Procedures section on page 8-9 for descriptions of the steps necessary to resolve the critical alarm that caused the switchover attempt. Log in to the standby Cisco MGC, start an MML session, and view the current alarms, as described in the Retrieving All Active Alarms section on page 8-3. Resolve the listed alarm(s). Refer to the Alarm Troubleshooting Procedures section on page 8-9 for descriptions of the steps necessary to resolve the alarm(s). If resolving the alarms does not stabilize the standby Cisco MGC, proceed to Step 7.

Step 7

Generate a ping from the active Cisco MGC to the standby Cisco MGC by entering the following UNIX command at the active Cisco MGC:
ping standby_addr

Where standby_addr is the IP address of the standby Cisco MGC. If the ping fails, proceed to Step 8. Otherwise, proceed to Step 9.
Step 8

Verify the Ethernet interfaces between the active Cisco MGC and the standby Cisco MGC. Refer to the Sun Microsystems documentation that came with your system for more information. If an element of the Ethernet interfaces between the active Cisco MGC and the standby Cisco MGC is found to be faulty, replace it. Otherwise, proceed to Step 9. Refer to the Sun Microsystems documentation that came with your system for more information. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 9.

Step 9

Verify that the host name for each Cisco MGC host is unique. To do this, log on as root to each Cisco MGC host and view the contents of the host file in the /etc directory. If a Cisco MGC host does not have a unique host name, enter the following UNIX command:
# echo host_name > /etc/host

Where host_name is a unique name for the Cisco MGC host.


Step 10

Verify that the IP address parameters in the XECfgParm.dat file, which are listed below, are set correctly on each host.

*.ipAddrLocalA *.ipAddrLocalB *.ipAddrPeerB *.IP_Addr1 *.IP_Addr2 *.IP_Addr3 *.IP_Addr4 *.Virtual_IP_Addr

Note

The *.Virtual_IP_Addr parameter is valid as of Release 9.3(2).

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-160

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

If the IP address settings are correct, proceed to Step 11. Otherwise, update the IP address parameters for each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 11.
Step 11

Verify that the settings for the foverd parameters are set correctly in the XECfgParm.dat file, which are listed below, on each host.
foverd.conn1Type foverd.ipLocalPortA foverd.ipPeerPortA foverd.conn2Type foverd.ipLocalPortB foverd.ipPeerPortB foverd.conn3Type foverd.conn3Addr foverd.abswitchPort foverd.heartbeatInterval = = = = = = = = = = socket 1051 1052 socket 1053 1054 serial /dev/null (/dev/null) 1000

Note

Prior to Release 9.2, the correct value for foverd.heartbeatInterval is 4000.

If the foverd settings are correct, proceed to Step 12. Otherwise, update the foverd settings in the XECfgParm.dat files using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 12.
Step 12

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Recovering from Cisco MGC Host(s) Failure


There are situations, such as a replacement of a failed disk drive, natural or man-made disaster, or software corruption, that make it necessary for you to recover the software configuration data for a failed Cisco MGC host or hosts. (for example, if the Cisco MGC software has become corrupted or you have replaced a failed disk drive).

Note

In these procedures, it is assumed that backup operations have been performed regularly on your Cisco MGC. For more information on backing up your Cisco MGC, refer to the Backing Up System Software section on page 3-27.

Note

Successful recovery from a natural or man-made disaster depends upon your planning in advance for a possible disaster. Refer to the Creating a Disaster Recovery Plan section on page 3-26 for more information. The following sections contain the procedures that describe how to recover from Cisco MGC host(s) failure:

Recovering from a Cisco MGC Host Failure in a Simplex System, page 8-162 Recovering from a Single Cisco MGC Host Failure in a Continuous Service System, page 8-162

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-161

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Recovering from a Dual Cisco MGC Host Failure in a Continuous Service System, page 8-163

Recovering from a Cisco MGC Host Failure in a Simplex System


To recover from a Cisco MGC host failure in a system equipped with only one Cisco MGC, perform the following steps:
Step 1

Reload the Solaris 2.6 operating system on the Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of your Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.

Step 2

Step 3

Note

If your backup files are stored on a remote server, have your network administrator re-establish the path between the Cisco MGC and the server that stores your backups.

Note Step 4

Any changes you made to the Cisco MGC system subsequent to your last backup are lost.

Start the Cisco MGC software, as described in the Starting the Cisco MGC Software section on page 2-2.

Recovering from a Single Cisco MGC Host Failure in a Continuous Service System
To recover from a single Cisco MGC host failure in a system equipped with two Cisco MGCs, perform the following steps:
Step 1

Reload the Solaris 2.6 operating system on the affected Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the affected Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of the affected Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.

Step 2

Step 3

Note

If your backup files are stored on a remote server, have your network administrator re-establish the path between the affected Cisco MGC and the server that stores your backups.

Step 4 Step 5

Open the XECfgParm.dat file on the affected Cisco MGC in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to true.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-162

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Step 6 Step 7 Step 8

Save the file and exit the text editor. Start the Cisco MGC software, as described in the Starting the Cisco MGC Software section on page 2-2. Synchronize the databases of the active and standby Cisco MGCs, using the procedure described in the Synchronizing Databases section of the Configuring the Cisco Media Gateway Controller Software Release 9 chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.

Recovering from a Dual Cisco MGC Host Failure in a Continuous Service System
To recover from a dual Cisco MGC host failure in a system equipped with two Cisco MGCs, perform the following steps:
Step 1 Step 2

Select one of the Cisco MGC hosts to be your active system, and the other to be your standby system. Reload the Solaris 2.6 operating system on the active Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the active Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of the active Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.

Step 3

Step 4

Note

If your backup files are stored on a remote server, have your network administrator re-establish the path between the active Cisco MGC and the server that stores your backups.

Step 5 Step 6 Step 7 Step 8 Step 9

Open the XECfgParm.dat file on the active Cisco MGC in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to true. Save the file and exit the text editor. Start the Cisco MGC software on the active Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Reload the Solaris 2.6 operating system on the standby Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the standby Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of the standby Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.

Step 10

Step 11

Note

If your backup files are stored on a remote server, have your network administrator re-establish the path between the standby Cisco MGC and the server that stores your backups.

Step 12

Open the XECfgParm.dat file on the standby Cisco MGC in a text editor, such as vi.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-163

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Step 13 Step 14 Step 15 Step 16

Search for the pom.dataSync property and ensure that it is set to true. Save the file and exit the text editor. Start the Cisco MGC software, as described in the Starting the Cisco MGC Software section on page 2-2. Synchronize the databases of the active and standby Cisco MGCs, using the procedure described in the Synchronizing Databases section of the Configuring the Cisco Media Gateway Controller Software Release 9 chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.

Restoring Stored Configuration Data


Typically, restoration of stored configuration data is performed in severe troubleshooting situations where the Cisco MGC is not functioning properly, due to hardware failure, natural disaster, or software corruption. The procedures in this section describe how to restore the Cisco MGC configuration data stored either on a tape drive or on a remote network server. There are two restoration methods available for the Cisco MGC software, one for software releases up to 9.1(4), and another for software releases from 9.1(5) and above. These restoration procedures are mutually exclusive. You cannot use the restoration procedures for one software release to restore files backed up using the procedures specific to the other release. These restoration methods are described in the following sections:

Restoring Procedures for Cisco MGC Software up to Release 9.1(4), page 8-164 Restoring Procedures for Cisco MGC Software Release 9.1(5) and up, page 8-168

Restoring Procedures for Cisco MGC Software up to Release 9.1(4)


This restoration method uses a script to restore the configuration data for the Cisco MGC software from either a local tape drive or on to a remote machine. Restoration of the Main Memory Database (MMDB) is performed by a separate script. The following sections provide the restoration procedures:

Restoring Data from a Local Tape Drive, page 8-165 Restoring Data from a Remote Machine over the Network, page 8-166 Restoring Data to the Main Memory Database, page 8-167

Note

These procedures assume that you have backed up your system configuration data regularly. The procedures for system configuration backup can be found in the Backup Procedures for Cisco MGC Software up to Release 9.1(4) section on page 3-27.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-164

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Restoring Data from a Local Tape Drive


This procedure restores everything on a tape in a local tape drive to the Cisco MGC base directory.

Caution

This procedure overwrites existing files under the Cisco MGC base directory. Current content in the overwritten files will be lost! To restore the contents of the entire Cisco MGC software directory from a local tape, complete the following steps:

Step 1

Enter the following UNIX command at the affected Cisco MGC to run the restore script:
./restore.sh

The system returns a response similar to the following:


MGC restore utility ----------------------------Source currently set to Local tape (/dev/rmt/0h) Enter: <N> set source to remote NFS server <L> set source to Local tape (/dev/rmt/0h) <R> for Restore <Q> to quit Select restore mode:

Step 2

Select R and press Enter to start the restore. The system then prompts you as listed below:
Are you sure you want to restore a backup. Current data in the MGC directory will be overwritten and lost. Answer(Y/N):

Step 3

Select y and press Enter if you are sure you want to restore from the tape. The system begins the restoration and returns a response similar to the following:
Answer(Y/N): y x ., 0 bytes, 0 tape blocks x ./var, 0 bytes, 0 tape blocks x ./var/log, 0 bytes, 0 tape blocks x ./var/log/platform.log, 117 bytes, 1 tape blocks x ./var/log/mml.log, 187 bytes, 1 tape blocks. . . . #

Step 4 Step 5

When the restore has finished, remove the tape from the tape drive. If you have performed any partial backups since the creation of the full backup tape you have just restored, retrieve the most recent partial backup tape and repeat steps 1 to 4 with that tape in the tape drive. If your system does not have a dial plan configured, the procedure is complete. Otherwise, restore the contents of your dial plan as described in the Restoring Data to the Main Memory Database section on page 8-167.

Step 6

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-165

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Restoring Data from a Remote Machine over the Network


This procedure restores files to the Cisco MGC software base directory from a file on an NFS mountable directory on a remote machine. The remote machine must be set up with an NFS mountable directory that can be written to by the machine being backed up. The NFS setup of the remote machine is beyond the scope of this procedure. To restore the contents of the Cisco MGC software directory from a remote machine, complete the following steps:
Step 1

Enter the following UNIX command on the affected Cisco MGC to run the restore script:
./restore.sh

The system returns a response similar to the following:


MGC restore utility ----------------------------Source currently set to Local tape (/dev/rmt/0h) Enter: <N> set source to remote NFS server <L> set source to Local tape (/dev/rmt/0h) <R> for Restore <Q> to quit Select restore mode:

Step 2 Step 3

Select N and press Enter to define the remote NFS server. The system then prompts you to provide the name of the remote server. Enter the name of the remote NFS server:
Enter server name: remote_hostname

Where: remote_hostnameName of the remote server where the backups are stored. The system then prompts you to enter the name of the associated directory on the remote server.
Step 4

Enter the directory name on the remote NFS server:


Enter remote directory : remote_directory_name

Where: remote_directory_nameName of the directory path on the remote server where the backups are stored. The system returns a response similar to the following:
Enter server name: va-panthers Enter remote directory : /backup MGC restore utility ----------------------------Source currently set to remote NFS server (va-panthers:/backup) Enter: <N> <L> <R> <Q> set source to remote NFS server set source to Local tape (/dev/rmt/0h) for Restore to quit

The system then prompts you to select the restore mode.


Select restore mode:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-166

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Step 5

Select R and press Enter to start the restore. The system returns a response similar to the following:
mount -F nfs -o retry=3 va-panthers:/backup /mnt Available files: va-blade20000317105201P.tar va-blade20000317105337.tar

The system then prompts you to enter the filename to be restored.


Enter filename to restore from:

Step 6

Enter the filename for the most recent full backup performed on your system.

Note

Full backups have a file name consisting of the name of the host and the timestamp with a .tar designation. Partial backups have a file name consisting of the name of the host, timestamp, and the letter P with a .tar designation.

The system then asks you if you really want to restore a backup:
Are you sure you want to restore a backup. Current data in the MGC directory will be overwritten and lost. Answer(Y/N):

Step 7

Enter y and press Enter if you are sure that you want to restore the Cisco MGC directory. The system returns a response similar to the following:
x etc, 0 bytes, 0 tape blocks x etc/Copyright, 545 bytes, 2 tape blocks x etc/CONFIG_LIB, 0 bytes, 0 tape blocks x etc/CONFIG_LIB/new, 0 bytes, 0 tape blocks . . restore from va-panthers:/backup/va-blade20000317105337.tar complete #

Step 8 Step 9

If you have performed any partial backups since the creation of the full backup you have just restored, repeat Steps 1 to 7 and restore the most recent partial backup. If your system does not have a dial plan configured, the procedure is complete. Otherwise, restore the contents of your dial plan as described in the Restoring Data to the Main Memory Database section on page 8-167.

Restoring Data to the Main Memory Database


Use this procedure to restore dial plan data, which was stored in the MMDB, in a single file as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32.
Step 1

Log in to the active Cisco MGC and change directories to a local subdirectory under the base directory. For example, enter the following UNIX command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local

Step 2

Stop the MMDB by entering the following UNIX command:


ttreplic

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-167

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Step 3

Run the MMDB restore script by entering the following UNIX command:
./restoreDb.sh filename

Where filename is the name of the database backup file. For example, to restore the contents of a file called dplan to the MMDB, you would enter the following command:
./restoreDb.sh dplan

The system returns a response similar to the following:


Restoring database contents for DSN=howdydb into dplan The Restore process is being initiated for the datastore howdydb Files for /opt/TimesTen32/datastore/howdydb are being restored up onto standard output Restore Complete

Step 4

Restore the MMDB by entering the following UNIX command:


ttreplic

Restoring Procedures for Cisco MGC Software Release 9.1(5) and up


This restoration method uses a script to restore the configuration data for the Cisco MGC software, select UNIX administrative files, and the Main Memory Database (MMDB).

Note

This functionality is part of a patch to Release 9.1(5). If you want to use this functionality, you must be upgraded to the proper patch level. For more information on verifying the patch level of your system, refer to Verifying the Patch Level of the Cisco MGC section on page 3-104. The following sections provide the restoration procedures:

Listing Backup Files, page 8-168 Restoring a Backup File from a Directory, page 8-169 Restoring a Backup File from a Device, page 8-169

Note

These procedures assume that you have backed up your system configuration data regularly. The procedures for system configuration backup can be found in the Backup Procedures for Cisco MGC Software from Release 9.1(5) and up section on page 3-32.

Listing Backup Files


To list the backup files in a particular directory path, enter the following UNIX command on the Cisco MGC:
mgcrestore -d path -l

Where path is the directory path in which you have stored backup files, such as a directory on a remote server or a local tape drive. The system returns a response similar to the following:
Backup files in /var/cisco --------------------------------------------------

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-168

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

mgc_venus_20011010_153003_backup mgc_venus_20011011_153003_backup mgc_venus_20011012_153003_backup

Restoring a Backup File from a Directory


To restore the configuration data stored in a particular backup file stored in a directory, enter the following UNIX command on the affected Cisco MGC to run the restore script:

Note

You can restore a backup file only when you are logged in to your system as mgcusr. You cannot restore a backup file while you are logged in as root.
mgcrestore -d path -f filename

Where:

pathThe directory path to the location where your backup files are stored. filenameThe file name of the backup file you want to restore.

For example, to restore a backup file called mgc_venus_20011012_153003_backup stored in a directory path called /var/cisco, you would enter the following command:
mgcrestore -d /var/cisco -f mgc_venus_20011012_153003_backup

Restoring a Backup File from a Device


To restore the configuration data stored in a particular backup file stored on a device, such as a tape drive, enter the following UNIX command on the affected Cisco MGC to run the restore script:

Note

You can restore a backup file only when you are logged in to your system as mgcusr. You cannot restore a backup file while you are logged in as root.
mgcrestore -d device

Where device is the device where your backup files are stored. For example, to restore a backup file stored on a tape drive called /dev/rmt/0, you would enter the following command:
mgcrestore -d /dev/rmt/0

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-169

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Restoring a Backup File Using the Mgcrestore Script


You can also restore a configuration by running the mgcrestore script. To restore the configuration data stored in a particular backup file stored in a directory, perform the following steps:

Note

You can restore a backup file only when you are logged in to your system as mgcusr. You cannot restore a backup file while you are logged in as root.

Step 1

Enter the following UNIX command on the Cisco MGC:


mgcrestore

The system returns a response similar to the following:


Restore Main Menu -------------------Note: to exit the script at anytime use ctrl-c 1. Restore a backup 2. List Backup Files 3. Exit Selection:

Step 2

Enter 1 to restore a backup file. The system returns a response similar to the following:
Restore a Backup -----------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Enter the name of the backup to be restored:

Step 3

Enter the name of the automatic backup operation you want to restore. The system returns a response similar to the following:
Restore this backup (Y or N)?

Step 4

Enter Y if you want to continue with restoring a backup, or enter N if you do not want to restore a backup.

Note

You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcrestore script.

Verifying Proper Configuration of Replication


If calls are not being preserved when your system performs a switchover, you should verify that your system is properly configured for replication of call data. To do this, verify that the value of the *.desiredPlatformState parameter in the XECfgParm.dat file on each host is either master or slave, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-170

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Configuration Export Failed Due to MMDB


If you attempt to export your configuration settings using the prov-exp:all MML command and the MMDB is not running, the system returns a failure message. The MMDB must be running for the prov-exp:all MML command to function. To resolve this problem, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC and determine whether the MMDB is running by entering the following UNIX command:
ps -ef | grep timesten

If the system returns a list of running timesten processes such as those listed below, the MMDB is running.
root 234 1 0 Dec 21 ? root 235 234 0 Dec 21 ? root 236 234 0 Dec 21 ? root 237 234 0 Dec 21 ? root 238 234 0 Dec 21 ? root 239 234 0 Dec 21 ? root 240 234 0 Dec 21 ? root 241 234 0 Dec 21 ? root 242 234 0 Dec 21 ? mgcusr 14246 14127 0 09:19:38 pts/1 root 23327 234 0 Dec 26 ? -datastore /opt/TimesTen32/datastore/ 0:04 0:03 0:00 0:00 0:00 0:00 0:00 0:00 0:00 0:00 9:44 /opt/TimesTen32/32/bin/timestend /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd grep timesten /opt/TimesTen32/32/bin/timestenrepd -id -id -id -id -id -id -id -id 0 1 2 3 4 5 6 7

-id 8

If the MMDB is running, proceed to Step 5. Otherwise, proceed to Step 3.


Step 3

Log in to the active Cisco MGC as root and enter the following UNIX command:
/etc/init.d/tt4.1_32bit start

If the system response indicates that the database has started, proceed to Step 4. Otherwise, proceed to Step 5.
Step 4

Re-attempt to export your system configuration using the following MML command:
prov-exp:all

If the export is successful, the procedure is complete. Otherwise, proceed to Step 5.


Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Measurements Are Not Being Generated


If your Cisco MGC is not generating system measurements, perform the following procedure:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the amdmpr process is running, as described in the Verifying That Processes Are Running section on page 3-3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-171

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

If the amdmpr process is not running, proceed to Step 3. Otherwise, proceed to Step 4.
Step 3 Step 4

Verify that the *.disableMeas parameter in the XECfgParm.dat file is set to false on each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Call Detail Records Are Not Being Generated


If call detail records are not being generated on your Cisco MGC, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the dmpr-01 process is running, as described in the Verifying That Processes Are Running section on page 3-3. If the dmpr-01 process is not running, proceed to Step 3. Otherwise, proceed to Step 5.

Step 3

Verify that the settings for the dmprSink.dat file are correct, using the procedure in the Configuring the Data Dumper section on page A-2. If that clears the alarm, the procedure is finished. Otherwise, proceed to Step 4.

Step 4

Verify that the settings for the CDR parameters in the XECfgParm.dat file on each host match those listed below, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
cdrDmpr.openCDR = true cdrDmpr.callDetail = /opt/CiscoMGC/local/cdbscript.sh cdrDmpr.seqFile = ../var/.cdr.seq diskmonitor.CdrRmFinished = 0 # remove "finished" cdrs after X days (0 = immediate) engine.CDRencodingFormat = AnsiCDB engine.CDRtimeStamp = S engine.CDRmessageTypes = "1010,1020,1030,1040,1050,1060,1070"

Step 5

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Resolving a Failed Connection to a Peer


If you have lost connection to a peer component in your network, perform the following procedure to resolve the problem:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. If your system is provisioned to control Voice over IP (VoIP) calls that do not originate or terminate on SS7 or PRI (such as SIP-to-SIP or SIP-to-EISUP/H.323 calls), you must synchronize the system state data before continuing. To do this, proceed to Step 3.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-172

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

If your system is provisioned to control VoIP calls in which at least one call leg is SS7 or PRI, proceed to Step 4.
Step 3

To synchronize the system state data, you must resart the MGC software on the standby Cisco MGC. To restart the MGC software, stop the software, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4 and then start the software, as described in the Starting the Cisco MGC Software section on page 2-2. Verify that the path to the affected peer is out-of-service, as described in the Verifying the Status of all Signaling Services section on page 8. If the destination is in-service, or there is no destination associated with the peer, proceed to Step 5. If the destination associated with the peer is out-of-service, bring the destination back into service, as described in the SS7 Destination is Out of Service section on page 8-93.

Step 4

Note

If the out-of-service destination is IP destination, perform the procedure described in Media Gateway IP Destination/Link Out-of-Service section on page 8-143.

If that resolves the problem, this procedure is complete. Otherwise, proceed to Step 5.
Step 5

Trace the route to the peer by entering the following UNIX command on your active Cisco MGC:
traceroute ip_addr

Where ip_addr is the IP address of the affected peer. The system responds with a listing of the peers that are passed through on route to the identified peer. If the system response indicates that the identified peer was reached with no problems, proceed to Step 7. If the system response indicates that you were unable to reach the identified peer, proceed to Step 6.
Step 6

Log in to the peer identified in Step 4 and verify that the Ethernet interfaces for this peer are working correctly. Refer to the documentation for the peer for more information. If the Ethernet interfaces are working properly, proceed to Step 7. If the Ethernet interfaces are not working properly, replace the element that is not working properly. Refer to the documentation of the peer for more information. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 7.

Step 7

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Rebooting Software to Modify Configuration Parameters


Sometimes you may need to change your configuration settings in the XECfgParm.dat file while the system is in-service. To do this, perform the following procedure:

Caution

Performing this procedure stops the functioning of the Cisco MGC software. Perform this step only while in contact with Cisco Technical Assistance Center (TAC) personnel. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-173

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the standby Cisco MGC and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc

Step 3 Step 4

Open the XECfgParm.dat using a text editor, such as vi. Search for the parameters specified in the referring procedure and verify that it is set to the correct value. If they are set correctly, proceed to Step 11. Otherwise, proceed to Step 5 to begin the process of correcting your configuration. Modify the incorrect parameters identified in Step 4 to match their correct values. Save your changes and close the text editor. Stop the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover from the active Cisco MGC, as described in the Performing a Manual Switchover section on page 3-99.

Step 5 Step 6 Step 7 Step 8 Step 9

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.

Step 10

Repeat steps 2 through 9 for the newly standby Cisco MGC. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 10.

Step 11

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Diagnosing SNMP Failure


Failure of the Cisco MGC to respond to SNMP requests can be caused by a variety of problems. Starting with Release 9.2 of the Cisco MGC software, the Cisco MGC uses Sun Microsystems Solaris 8 as its operating system. Solaris 8 is a 64-bit operating system, and some older hardware platforms cannot support it. SNMP failure can occur in your Cisco MGC system if your system hardware does not meet the requirements of the Cisco MGC software. Another possibility is that when the Solaris 8 operating system was installed on your system, the 32-bit kernel was selected instead of the 64-bit kernel. In such situations, the application that handles SNMP functions on the Cisco MGC, CIAgent, may fail and be unable to restart. To diagnose the source of the SNMP failure, perform the following procedure:
Step 1

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-174

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Step 2

Determine whether the SNMP daemon (snmpdm) is running on your system by entering the following command:
ps -ef | grep snmp

The system should return a response similar to the following:


root root root root root root root 12061 12072 5233 12143 12144 12145 12068 1 12061 5231 12061 12061 12061 12061 0 Aug 27 ? 0 Aug 27 ? 0 20:06:25 pts/2 0 Aug 27 ? 0 Aug 27 ? 0 Aug 27 ? 0 Aug 27 ? 0:03 0:00 0:00 8:13 5:54 0:00 13:38 /opt/CiscoMGC/snmp/critagt -d /opt/CiscoMGC/snmp/brassagt -d grep snmp /opt/CiscoMGC/snmp/mib2agt -d /opt/CiscoMGC/snmp/hostagt -d /opt/CiscoMGC/snmp/fsagt -d /opt/CiscoMGC/snmp/snmpdm -tcplocal -d

If the response from your system does not include snmpdm, the SNMP daemon is not running. If the SNMP daemon is not running, proceed to Step 3. Otherwise, proceed to Step 11.
Step 3

Verify that the host name and IP address information for your Cisco MGC system configured on your SNMP server is correct. If the host name and IP address information are incorrect, proceed to Step 4. Otherwise, proceed to Step 4.

Step 4

Modify the host name and IP address information for your Cisco MGC system on your SNMP server. If this resolves the problem, proceed to Step 10. Otherwise, proceed to Step 5.

Step 5

Verify that the 64-bit kernel instruction sets are installed in your system by entering the following UNIX command:
isalist

The system should return a response similar to the following:


sparcv9+vis sparcv9 sparcv8plus+vis sparcv8plus sparcv8 sparcv8-fsmuld sparcv7 sparc

If the response from your system does not include the sparcv9+vis and sparcv9 instruction sets, the 64-bit kernel is not installed on your system. If the response indicates that the 64-bit kernel is installed in your system, proceed to Step 11. Otherwise, proceed to Step 6.
Step 6

Re-install the operating system as described in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Ensure that the 64-bit kernel is selected during installation. If the operating system installs successfully, proceed to Step 7. Otherwise, proceed to Step 9.

Step 7

Repeat Step 5 to ensure that the 64-bit kernel has been installed. If the 64-bit kernel is installed, proceed to Step 8. Otherwise, proceed to Step 9.

Step 8

Re-install the Cisco MGC software as described in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. If the Cisco MGC software installs successfully, proceed to Step 10. Otherwise, proceed to Step 11.

Step 9

Your system hardware is unable to support the 64-bit kernel. To operate the Cisco MGC software for Release 9.2 and later, the 64-bit kernel must be installed. You must upgrade your hardware to enable your system to support the 64-bit operating system. Instructions for upgrading your hardware can be found in the Sun Microsystems documentation for the host platform. Once the upgrade is complete, repeat this procedure starting from Step 6. If the hardware upgrade resolves the problem, proceed to Step 10. Otherwise, proceed to Step 11.

Step 10

Repeat the above steps on the other Cisco MGC host in your system.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-175

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

If the problem is resolved after fixing both Cisco MGC hosts, the procedure is complete. Otherwise, proceed to Step 11.
Step 11

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Correcting the System Time


Note

Cisco recommends that you configure your MGC hosts to use NTP to maintain system time as described in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. In instances where the system time is incorrect, there are procedures you can use to correct the system time, which vary based on how system time is set on your system, and whether the MGC is being used to record your call detail records (CDRs). These procedures are as follows:

NTP is Not Used and MGC is Not the Source of the CDRs, page 8-176 NTP is Not Used and MGC is the Source of the CDRs, page 8-177 NTP is Used and MGC is the Source of the CDRs, page 8-177

Caution

Cisco strongly recommends that the synchronization of the host system clock be done in a manner that does not adversely impact operating system or application processes. A rapid change of the system clock can have adverse effects on call processing, system logs, and CDRs.

Caution

Correcting the system time on your MGC host(s) requires that the user be logged in as root. We recommend that you closely control the use of the super-user (root) password and privileges.

NTP is Not Used and MGC is Not the Source of the CDRs
To correct the system time when NTP is not used to maintain system time and the MGC is not the source of the CDRs, perform the procedure below. This procedure is not service impacting, if performed during a maintenance window.
Step 1 Step 2

If the time on one MGC host is correct, proceed to Step 2. If the time is incorrect on both MGC hosts, proceed to Step 3. If the MGC host with the incorrect time is the active Cisco MGC, perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99. If the MGC host with the incorrect time is the standby Cisco MGC, proceed to Step 3.

Step 3 Step 4 Step 5

Stop the Cisco MGC software on your standby Cisco MGC (which has the incorrect time), as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Correct the time on the standby Cisco MGC using the UNIX command date. For more information about the date command, refer to man page for date. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-176

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

If the time was incorrect on only one of the MGC hosts, the procedure is complete. Otherwise, repeat steps 1 through 5 for the other MGC host with the incorrect time.

NTP is Not Used and MGC is the Source of the CDRs


To correct the system time when NTP is not used to maintain system time and the MGC is the source of the CDRs, perform the procedure below.

Caution

This procedure is service impacting and should be performed during a maintenance window.

Step 1 Step 2 Step 3

Stop the Cisco MGC software on both MGC hosts, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Correct the time on both MGC hosts using the UNIX command date. For more information about the date command, refer to man page for date. Restart the Cisco MGC software on both MGC hosts, as described in the Starting the Cisco MGC Software section on page 2-2.

NTP is Used and MGC is the Source of the CDRs


In this situation the system time can only get out of synchronization with the NTP server if a user with root access (which should be strictly controlled) modifies the time on an MGC host. The time on the NTP server cannot be modified. To correct the system time when an NTP server is used to maintain system time, and the MGC is the source of your CDRs, perform the following steps:

Caution

This procedure is service impacting and should be performed during a maintenance window.

Step 1 Step 2

Stop the Cisco MGC software on both MGC hosts, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Reboot your MGC hosts, as described in Sun Microsystems documentation that came with your system. Rebooting the MGC hosts restarts the Xntp demon, which synchronizes the system time with the time on the NTP server. Restart the Cisco MGC software on both MGC hosts, as described in the Starting the Cisco MGC Software section on page 2-2.

Step 3

Securing your Network


Release 9.4(1) introduces a security enhancement for your network. To enable this enhancement, you must have completed installing the CSCOhk9000 security package on your network (which can consist of Cisco PGW 2200, BAMS, and HSI). The procedure for installing this security package can be found in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-177

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

The process of securing your network is defined in the following sections:


Securing the Cisco PGW 2200, page 8-178 Securing BAMS, page 8-179

Securing the Cisco PGW 2200


Perform the following steps to secure the Cisco PGW 2200:
Step 1

Before you begin the securing process you must identify the last CDR that has been pulled into BAMS. Log in to the active Cisco MGC as root and enter the following UNIX command to change directories:
/opt/CiscoMGC/var/spool

Step 2

Enter the following UNIX command to verify the CDR:


ls -l cdr_yyyymmdd

Where yyyymmdd represents the current date, entered in the following format:

yyyyyear mmmonth ddday

A list of files is displayed when you enter this command.


Step 3 Step 4

Check the list of files that is displayed for the last finished filename preceded by a period (.) and write down the file nameyou will need this information later. Log in to the standby Cisco MGC as root and enter the following command to change directory:
cd /opt/sun_install

Step 5

Enter the following command to toggle FTP off:


toggle_ftp.sh disable filename

Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file

Step 6

Enter the following command to toggle Telnet off:


toggle_telnet.sh disable filename

Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file

Step 7

Log in to the active Cisco MGC as root and enter the following command to change directory:
cd /opt/sun_install

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-178

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Step 8

Enter the following command to toggle FTP off:


toggle_ftp.sh disable filename

Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file

Step 9

Enter the following command to toggle Telnet off:


toggle_telnet.sh disable filename

Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file

Step 10

Verify that Telnet and FTP are off. Telnet or FTP to your active Cisco MGC. If Telnet and FTP are turned off, you will get the following error message:
Connection refused.

This completes the procedures for securing your Cisco PGW 2200. If you have BAMS on your network, continue to the Securing BAMS section on page 8-179.

Securing BAMS
To secure BAMS on your network:
Step 1

Log in to the standby BAMS by enter the following command:


bams

Step 2

The following steps require you to use MML commands. To use MML commands, enter the following command:
mml

Step 3

Enter the node of the Cisco PGW 2200 that is being changed. At the MML command line type the following and press Enter:
set-mode:<x>:

Where <x> is a number between 1 through 8.

Note Step 4

In this example, the node number is 2.

Check for alarms by entering the following command:


rtrv-alms

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-179

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

The system returns a response similar to the following:


Billing and Measurements Server - BAMS-00 2003-02-12 15:12:05 B RTRV 02/12/03 14:58:14 *C POL402: Cannot connect to unit va-hoover 02/12/03 15:00:15 *C POL401: Max FTP failures for one file reached 02/12/03 15:00:25 *C POL402: Cannot connect to unit va-hoover_b 02/12/03 15:02:36 *C POL402: Cannot connect to unit va-fish 02/12/03 15:04:46 *C POL402: Cannot connect to unit va-fish_b ; B COMPLD ;

Note

Look for the line containing POL402. POL402 indicates the presence of an alarm. Proceed to Step 5. In this text display, va-hoover and va-fish are Cisco PGW 2200 and BAMS host name examples.

Step 5 Step 6

Log in as root. Type the following command and press Enter to change directory:
cd /opt/sun_install

Step 7

Type the following command to toggle FTP off:


toggle_ftp.sh disable <filename>

Note

<filename> is a name that you selected.

Text similar to the following is displayed:


You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file Done!

Step 8

Type the following command and press Enter to toggle Telnet off:
toggle_telnet.sh disable <filename>

Note

<filename> is a name that you selected.

Text similar to the following is displayed:


You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file Done!

Step 9 Step 10 Step 11

On the active host (BAMS 1), log in as bams. Repeat Step 2 through Step 8. On the standby BAMS, while logged in as root, type the following command and press Enter to change the directory:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-180

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

cd /opt/sun_install

Step 12

As root, enter the following command to set up the SSH process:


setupSSH.sh

Text similar to the following is displayed:


BAMS is installed, proceeding with SSH configuration Warning: Before running this script, SSH must be installed on all PGW and BAMS hosts This script will disable the standard FTP client on BAMS and set up SSH connections from BAMS to PGW and from BAMS to BAMS. If you want to use the standard FTP client, it is still available in the file /usr/bin/ftp.orig Do you want to continue [y/n]:

Step 13

Type y (yes) to continue and press Enter. Text similar to the following is displayed:
Sun Microsystems Inc. SunOS 5.6 Generic August 1997 Warning: Before running this script, SSH must be installed on all PGW and BAMS hosts. This script will reset the existing known hostkeys and user keys for bams user for each host entered during this session. You need to run this script every time the PGW or BAMS is re-installed. You also need to run this script if SSH is re-installed on PGW or BAMS. Do you want to continue [y/n]:

Step 14

Type y (yes) to continue and press Enter. Text similar to the following is displayed:
Generating security keys, this will take a couple of minutes... Generating public/private rsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa.pub. The key fingerprint is: 32:8e:10:10:98:2a:35:8a:18:bb:e6:3e:a1:54:d9:27 bams@va-pine Generating public/private dsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa.pub. The key fingerprint is: 32:dd:2d:51:e3:b4:9b:41:29:49:1a:f2:49:6f:e4:29 bams@va-pine You will be prompted for the user name and password for each PGW or BAMS host. Please remember to enter both PGW host names for a failover pair. You also need to enter the other BAMS host if this is a redundant setup. Please enter a PGW or BAMS host name, or q to quit Enter a host name now:

Step 15

Type host name PGW1 and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit Enter a host name now:

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-181

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Step 16

Type the host name mgcusr (the login name of PGW1) and press Enter. Text similar to the following is displayed:
Are you sure you want to continue connecting (yes/no)? yes

Step 17

Type y (yes) and press Enter. Text similar to the following is displayed:
mgcusr@<hostname>'s password: id_dsa.pub 100% |*****************************| 602 00:00

Step 18

Type the password and press Enter. Text similar to the following is displayed:
mgcusr@<BAMS 1>'s password:

Step 19

Type y (yes) again and press Enter. Text similar to the following is displayed:
mgcusr on <BAMS> successfully configured Do you want to configure second interface for <BAMS>? n

Step 20

You can answer either y (yes) or n (no):


a. b.

Yes (configuring a second interface) is optional. If you answer y, repeat Step 1 through Step 19. If you answer no, proceed to Step 21.

Step 21

Repeat Step 15 through Step 19 for additional Cisco PGW 2200 nodes. Text similar to the following is displayed:
mgcusr on <BAMS1> successfully configured Do you want to configure second interface for <BAMS1>? n

Step 22

Type n (no) and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit Enter a host name now:

Step 23 Step 24

While still on the standby BAMS, type the active BAMS unit information (BAMS name, BAMS login password). When all the BAMS interfaces have been configured, type q to quit and press Enter. Text similar to the following is displayed:
Done

Note

Look out for the following error message. If some hosts were not configured, follow the recommendation in this message. Failed to configure some hosts. Please check for SSH installation on these hosts and/or the user name and password for these hosts.

Step 25

Log in to the active BAMS as root.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-182

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Step 26

Change the directory. Type the following command and press Enter:
cd /opt/install

Step 27

Type the following command and press Enter:


setupSSH.sh

Text similar to the following is displayed:


BAMS is installed, proceeding with SSH configuration Warning: Before running this script, SSH must be installed on all PGW and BAMS hosts This script will disable the standard FTP client on BAMS and set up SSH connections from BAMS to PGW and from BAMS to BAMS. If you want to use the standard FTP client, it is still available in the file /usr/bin/ftp.orig Do you want to continue [y/n]:

Step 28

Type y to continue and press Enter. Text similar to the following is displayed:
Sun Microsystems Inc. SunOS 5.6 Generic August 1997 Warning: Before running this script, SSH must be installed on all PGW and BAMS hosts. This script will reset the existing known hostkeys and user keys for bams user for each host entered during this session. You need to run this script every time the PGW or BAMS is re-installed. You also need to run this script if SSH is re-installed on PGW or BAMS. Do you want to continue [y/n]:

Step 29

Type y (yes) to continue and press Enter. Text similar to the following is displayed:
Generating security keys, this will take a couple of minutes... Generating public/private rsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa.pub. The key fingerprint is: 32:8e:10:10:98:2a:35:8a:18:bb:e6:3e:a1:54:d9:27 bams@va-pine Generating public/private dsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa.pub. The key fingerprint is: 32:dd:2d:51:e3:b4:9b:41:29:49:1a:f2:49:6f:e4:29 bams@va-pine You will be prompted for the user name and password for each PGW or BAMS host. Please remember to enter both PGW host names for a failover pair. You also need to enter the other BAMS host if this is a redundant setup. Please enter a PGW or BAMS host name, or q to quit Enter a host name now:

Step 30

Type host name PGW1 and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-183

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Enter a host name now:

Step 31

Type the host name mgcusr (the login name of PGW1) and press Enter. Text similar to the following is displayed:
Are you sure you want to continue connecting (yes/no)? yes

Step 32

Type y (yes) and press Enter. Text similar to the following is displayed:
mgcusr@<hostname>s password: id_dsa.pub 100% |*****************************| 602 00:00

Type the password and press Enter. Text similar to the following is displayed:
mgcusr@<BAMS 1>'s password:

Step 33

Type y (yes) again and press Enter. Text similar to the following is displayed:
mgcusr on <BAMS> successfully configured Do you want to configure second interface for <BAMS>? n

Step 34

You can answer either y (yes) or n (no):


a. b.

Yes (configuring a second interface) is optional. If you answer y, repeat Step 1 through Step 19. If you answer no, proceed to Step 21.

Step 35

Repeat Step 15 through Step 19 for additional Cisco PGW 2200 nodes. Text similar to the following is displayed:
mgcusr on <BAMS1> successfully configured Do you want to configure second interface for <BAMS1>? n

Step 36

Type n (no) and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit Enter a host name now:

Step 37 Step 38

While still on the active BAMS, type the standby BAMS unit information (BAMS name, BAMS login password). When all the BAMS interfaces have been configured, type q to quit and press Enter. Text similar to the following is displayed:
Done

Step 39

Go to the active Cisco PGW 2200 (Host A) in the Securing the Cisco PGW 2200 section on page 8-178 and repeat Step 1 and Step 2. Text similar to the following is displayed:
-rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r-1 1 1 1 1 mgcusr mgcusr mgcusr mgcusr mgcusr mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp 182 182 182 182 182 Feb Feb Feb Feb Feb 12 12 12 12 12 14:29 14:34 14:39 14:44 14:49 cdr_20030212142403_037281.finished cdr_20030212142903_037282.finished cdr_20030212143403_037283.finished cdr_20030212143903_037284.finished cdr_20030212144403_037285.finished

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-184

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

-rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--

1 1 1 1 1 1 1 1 1 1 1 1 1

mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr

mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp

182 182 182 182 182 182 182 182 182 182 182 182 182

Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb

12 12 12 12 12 12 12 12 12 12 12 12 12

14:54 14:59 15:04 15:09 15:14 15:19 15:24 15:30 15:35 15:40 15:45 15:50 15:55

cdr_20030212144903_037286.finished cdr_20030212145403_037287.finished cdr_20030212145903_037288.finished cdr_20030212150403_037289.finished cdr_20030212150903_037290.finished cdr_20030212151403_037291.bin cdr_20030212151904_037292.bin cdr_20030212152434_037293.bin cdr_20030212153004_037294.bin cdr_20030212153504_037295.bin cdr_20030212154004_037296.bin cdr_20030212154504_037297.bin cdr_20030212155004_037298.bin

Step 40 Step 41

Make sure that the CDR file number you noted down in Step 3 has changed from .bin to .finished. Check for alarms on BAMS. Type the following command and press Enter:
<bams hostname> rtrv-alms

Text similar to the following is displayed:


Billing and Measurements Server - BAMS-00 2003-02-12 16:02:08 B RTRV 02/12/03 15:02:36 *C POL402: Cannot connect to unit <bams1 hostname> 02/12/03 15:04:46 *C POL402: Cannot connect to unit <bams2 hostname> ; B COMPLD

Note

The CDR file POL402 (which indicates the presence of an alarm, shown in Step 4) for the active Cisco PGW 2200 and standby BAMS should be gone.

Step 42

Verify that both BAMS 1 and BAMS 2 are communicating with each other. CDR file POL329 indicates that the active BAMS (BAMS 1) is sending information to the standby BAMS (BAMS 2).

Note

Since BAMS polls the Cisco PGW 2200 at regular intervals, you may still see an alarm for a while. When you do, wait a few minutes and check the logs (see Step 43).

Step 43

To check the logs for alarms (the log name within this directory is syslog), change directory to the following:
cd /opt/CiscoBAMS/files/s0x

Note

x in s0x is the node you are in.

The process for securing your network is now complete.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-185

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

TIBCO Interface Not Working


Introduced in Release 9.5(2), the TIBCO interface enable s you to use a TIBCO management system to add, modify, delete, and retrieve provisioning data from the Cisco MGC. If you are experiencing difficulties with your TIBCO interface, perform the following steps:
Step 1 Step 2

If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the TIBCO adapter daemon is running by entering the following UNIX command on the active Cisco MGC:
ps -ef

The system returns a response similar to the following:


UID PID PPID C STIME TTY root 0 0 0 10:28:20 ? root 1 0 0 10:28:20 ? mgcusr 14437 14427 0 13:57:19 ? /opt/CiscoMGC/local/tibAdapter.pl mgcusr 14427 1 0 13:57:18 ? TIME CMD 0:00 sched 0:27 /etc/init 0:00 /opt/CiscoMGC/bin/perl 0:00 -csh -c /opt/CiscoMGC/local/tibAdapter.pl

If the daemon is running, proceed to Step 9. Otherwise, proceed to Step 3.

Note

If your system is also equipped with an SNMP interface, a trap is generated when the MGC software cannot start the TIBCO daemon. Log in to the standby Cisco MGC as root and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc

Step 3

Step 4 Step 5 Step 6 Step 7

Open the XECfgParm.dat using a text editor, such as vi. Search for the *.tibcoSupport parameter and verify that it is set to enable. If it is set properly, exit the text editor and proceed to Step 9. Otherwise proceed to Step 6. Change the *.tibcoSupport parameter to enable using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. Verify that the TIBCO adapter daemon is running by entering the following UNIX command on the active Cisco MGC:
ps -ef

The system returns a response similar to the following:


UID PID PPID C STIME TTY root 0 0 0 10:28:20 ? root 1 0 0 10:28:20 ? mgcusr 14437 14427 0 13:57:19 ? /opt/CiscoMGC/local/tibAdapter.pl mgcusr 14427 1 0 13:57:18 ? TIME CMD 0:00 sched 0:27 /etc/init 0:00 /opt/CiscoMGC/bin/perl 0:00 -csh -c /opt/CiscoMGC/local/tibAdapter.pl

If the daemon is running, proceed to Step 8. Otherwise, proceed to Step 9.


Step 8

Repeat steps 3 through 7 for the newly standby Cisco MGC host. If that resolves the problem, the procedure is finished. Otherwise, proceed to Step 9.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-186

OL-0800-06

Chapter 8

Troubleshooting the Cisco MGC Node Platform Troubleshooting

Step 9

Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

8-187

Chapter 8 Platform Troubleshooting

Troubleshooting the Cisco MGC Node

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

8-188

OL-0800-06

A P P E N D I X

Configuring Cisco MGC Log Files


This appendix contains descriptions of the Cisco Media Gateway Controller (MGC) log files and the associated procedures for setting up the data dumper that controls how files are handled for three of those those log file types. You can use these log records to obtain statistical information about the calls processed by the system and network events, such as delays or service-affecting conditions.

Understanding Logging Files


A log message consists of several fields. Refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide for detailed information on specific fields and valid values in log files. Table A-1 lists the log file types for the Cisco MGC software. The Cisco MGC creates these log files and stores them in the $BASEDIR/var/log directory, unless otherwise noted.
Table A-1 Log File Types

Log File Type System Command Alarms

Active Name platform.log mml.log alm.csv

Archived Name platform_yyyymm ddhhmmss.log

Description Contains log messages of varying severity created by system.

MML_yyyymmddh Man-Machine Language (MML) command hmmss.log category log messages. alm_yyyymmddhh mmss_seq#.csv meas_yyyymmddh hmmss_seq#.csv cdr_yyyymmddhh mmss_seq#.bin Alarm category log messages. Archived files are stored in the $BASEDIR/var/spool directory. Measurement category log messages. Archived files are stored in the $BASEDIR/var/spool directory. CDRs rotated on a regular basis. Archived files are stored in the $BASEDIR/var/spool directory.

Measurements

meas.csv

Call detail records (CDRs)

cdr.bin

Note

The time stamps used on the archived file names (yyyymmddhhmmss) are in system time.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

A-1

Appendix A Configuring the Data Dumper

Configuring Cisco MGC Log Files

Configuring the Data Dumper


The Cisco MGC software contains a function called the data dumper that controls the destinations for active and archived log files for CDRs, measurements, and alarms, and controls when the active files are archived. The data dumper runs automatically and works correctly with a default configuration. However, you can customize the dumper settings by editing the dmprSink.dat file. Here is an example of the contents of the dmprSink.dat file:
callDetail bin cdr ../var/log ../var/spool 1000 0 15 measReport csv meas ../var/log ../var/spool 500 0 15 almState csv alm ../var/log ../var/spool 500 0 15

The contents of the file displays the log file setup data for each of these three log file types. There are eight fields for each log file type in the file. The last three fields in each line can be modified to administer log file creation for these three log file types.

Caution

Do not modify any of the first five fields in each line. The first field in each line identifies the log file type, such as callDetail for the CDR log files. The second field in each line identifies the storage format used in the log files. The storage format is either bin for binary, or csv for comma-separated-value. The third field identifies the file name used to identify the file type, such as meas for system measurements. The fourth field identifies the directory in which the active log files are stored, and the fifth field identifies the directory in which the archived log files are stored. Table A-2 describes the last three fields in each line, which you can be modify, depending on your needs.

Note

At least one of the last three fields in each line must be set to a value other than zero (0) for logging to function properly.
Table A-2 Dumper Sink Log File Parameters

Field Number Default Value 6 1000

Description Defines the maximum number of records a file can contain before it is flushed or moved to the spool directory. If this value is set to 0, the number of records is unlimited. You can improve system performance by increasing the value of this field to a larger value, such as 50000. This results in fewer log files being generated during periods of high call volume.
Note

In the case of CDRs, the value in this field refers to the maximum number of call detail blocks (CDBs), which make up CDRs. Multiple CDBs can be created for each call. For more information on individual CDBs, refer to the Cisco Media Gateway Controller Release 9 Billing Interface Guide.

Defines the maximum size of the log file in bytes before it is moved to the spool directory. If this value is set to 0, the size of the file is limited only by the disk space available. Defines the maximum time, in minutes, the file is allowed to remain open, before it is flushed or moved to the spool directory. If there is no data in the file, it is not flushed when the time limit expires. If this value is set to 0, there is no time limit.

15

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

A-2

OL-0800-06

Appendix A

Configuring Cisco MGC Log Files Configuring the Data Dumper

Note

Starting with Release 9.3(2), empty alarm log files are no longer archived, and CDR log files are not archived to the standby Cisco MGC. In prior releases, empty alarm log files and CDR log files would be archived on both MGC hosts.

To configure the dmprSink.dat file fields, use this procedure:


Step 1

Log in to the active Cisco MGC and change to the /opt/CiscoMGC/etc directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc

Step 2

Use a text editor, such as vi, to open and edit the dmprSink.dat file fields you want to change.

Note

If you are going to use the BAMS to collect CDRs, proceed to the Configuring the Data Dumper to Support BAMS section on page A-4, for information on how to configure the data dumper to support BAMS.

Step 3 Step 4

Save your changes and exit the text editor. Change to the /opt/CiscoMGC/etc/active_link directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc/active_link/

Step 5 Step 6

Repeat steps 2 and 3 for the version of dmprSink.dat stored in this directory. If your system uses a continuous service configuration (active and standby Cisco MGC hosts), perform steps 9, 10, and 11 to update the settings on the standby Cisco MGC and load the new dmprSink.dat settings. If your system uses a simplex configuration (a single Cisco MGC host), perform steps 7 and 8 to load the new dmprSink.dat settings.

Step 7

Stop the Cisco MGC software using the procedure described in the Shutting Down the Cisco MGC Software Manually section on page 2-4.

Caution

Stopping the Cisco MGC software should only be performed while in contact with Cisco Technical Assistance Center (TAC) personnel. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC. Restart the Cisco MGC software using the procedure described in the Starting the Cisco MGC Software section on page 2-2. The procedure is complete. Repeat steps 1 through 5 on your standby Cisco MGC. Log on to the active Cisco MGC, start an MML session and perform a manual switchover as described in the Performing a Manual Switchover section on page 3-99.

Step 8 Step 9 Step 10

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects in-progress as well as new calls.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

A-3

Appendix A Configuring the Data Dumper

Configuring Cisco MGC Log Files

Step 11

Once the manual switchover is complete, repeat Step 10 on the newly active Cisco MGC. The procedure is complete.

Configuring the Data Dumper to Support BAMS


If your system is going to be using the Billing and Measurements Server (BAMS) to retrieve CDRs from the Cisco MGC, perform the following procedure to configure the data dumper to support the BAMS:
Step 1

Log into the active Cisco MGC and change to the /opt/CiscoMGC/etc directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc

Step 2 Step 3

Use a text editor, such as vi, to open the dmprSink.dat file. In the callDetail line of the file, find the following directory path:
../var/spool

Step 4

Modify that directory path to point to the /opt/CiscoMGC/var/bam directory, as shown below:
../var/bam

Step 5 Step 6

Save your changes and exit the text editor. Change to the /opt/CiscoMGC/etc/active_link directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc/active_link/

Step 7 Step 8

Repeat steps 2 through 5 for the version of dmprSink.dat stored in this directory. If your system uses a continuous service configuration (active and standby Cisco MGC hosts), perform steps 11, 12, and 13 to update the settings on the standby Cisco MGC and load the new dmprSink.dat settings. If your system uses a simplex configuration (a single Cisco MGC host), perform steps 9 and 10 to load the new dmprSink.dat settings.

Step 9

Stop the Cisco MGC software using the procedure described in the Shutting Down the Cisco MGC Software Manually section on page 2-4.

Caution

Stopping the Cisco MGC software should only be performed while in contact with Cisco Technical Assistance Center (TAC) personnel. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC. Restart the Cisco MGC software using the procedure described in the Starting the Cisco MGC Software section on page 2-2. The procedure is complete. Repeat steps 1 through 7 on your standby Cisco MGC. Log on to the active Cisco MGC, start an MML session and perform a manual switchover as described in the Performing a Manual Switchover section on page 3-99.

Step 10 Step 11 Step 12

Warning

Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects in-progress as well as new calls.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

A-4

OL-0800-06

Appendix A

Configuring Cisco MGC Log Files Configuring the Data Dumper

Step 13

Once the manual switchover is complete, repeat Step 10 on the newly active Cisco MGC. The procedure is complete.

Understanding the Format of Log Files Archived Using Data Dumper


Three log file types are archived in the $BASEDIR/var/spool directory using the data dumper: alarms, measurements, and CDRs. The archive files for alarms and measurements are stored as ASCII text files, and the format of these files is discussed in this section. CDRs are stored as binary files and are not discussed here. The elements of CDR files are discussed in the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. Here is an example of the appearance of the content of an archived alarm file:
0,1012522984,761,1,0,"Failover daemon in INIT state","FOD-01","unknown" 0,1012522989,880,1,0,"Failover daemon in SLAVE state","FOD-01","unknown" 0,1012522991,893,1,1,"Warm Start Initiated","IOCM-01","IosChanMgr" 0,1012522992,932,0,0,"Excessive bit error ratio detected from frame alignment signal","enif1","IosChanMgr" 0,1012522992,936,0,0,"Excessive bit error ratio detected from frame alignment signal","enif2","IosChanMgr" 0,1012522992,939,0,0,"Reset Config Failed","dpc1","IosChanMgr" 0,1012522992,939,1,2,"Point Code Unavailable","dpc1","IosChanMgr" 0,1012522992,958,0,0,"Reset Config Failed","dpc2","IosChanMgr" 0,1012522992,958,1,2,"Point Code Unavailable","dpc2","IosChanMgr" 0,1012522992,975,0,0,"Reset Config Failed","dpc-11","IosChanMgr" 0,1012522992,975,1,2,"Point Code Unavailable","dpc-11","IosChanMgr" 0,1012522993,37,0,0,"Reset Config Failed","dpc-12","IosChanMgr" 0,1012522993,38,1,2,"Point Code Unavailable","dpc-12","IosChanMgr" 0,1012522993,83,0,0,"Reset Config Failed","dpc-13","IosChanMgr" 0,1012522993,83,1,2,"Point Code Unavailable","dpc-13","IosChanMgr" 0,1012522993,99,0,0,"Reset Config Failed","dpc-14","IosChanMgr" 0,1012522993,123,1,2,"Point Code Unavailable","dpc-14","IosChanMgr" 0,1012522993,139,0,0,"Reset Config Failed","dpc-15","IosChanMgr" 0,1012522993,139,1,2,"Point Code Unavailable","dpc-15","IosChanMgr" 0,1012522993,155,0,0,"Reset Config Failed","dpc-16","IosChanMgr" 0,1012522993,156,1,2,"Point Code Unavailable","dpc-16","IosChanMgr"

Each field is separated by a comma. The content of each field is described in Table A-3.
Table A-3 Archived Alarm File Fields

Field Name Release level Timestamp (seconds) Timestamp (milliseconds) State

Data Type Integer Integer Integer Integer

Maximum Length 3 10 5 1

Comments Format of records (should be set to 0) Indicates the time, in seconds, since the start of the UNIX internal timer, time of epoch. Indicates the time, in milliseconds, since the start of the UNIX internal timer, time of epoch. Used for informational alarms, either 0 for reset or 1 for set.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

A-5

Appendix A Configuring the Data Dumper

Configuring Cisco MGC Log Files

Table A-3

Archived Alarm File Fields (continued)

Field Name Severity

Data Type Integer

Maximum Length 1

Comments Indicates the severity of the alarm, using four levels:


0Informational 1Minor 2Major 3Critical

Alarm category

String

80

Text that describes the nature of the alarm. For a list and description of the available alarms, refer to the Cisco Media Gateway Controller Software Release 9 System Messages Guide. Identifies the component associated with the alarm. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on components. Identifies the service that set or cleared this alarm.

Component name String

32

Originator

String

32

Here is an example of the appearance of the content of an archived measurement file:


0,1012013100,900,0,"messages","SP: cInit out","ss7svc11" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss3-118" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss3-119" 0,1012013100,900,0,"messages","SP: cInit out","ss7svc5" 0,1012013100,900,0,"messages","SP: cInit out","ss7svc8" 0,1012013100,900,0,"messages","SP: cInit out","ss7svc9" 0,1012013100,900,0,"messages","SP: cInit out","ss7svc10" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-2" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","tg-4166" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-3" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","tg-4165" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-4" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-5" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","tg-4164" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","tg-4162" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-6" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","tg-4163" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-7" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-8" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-9" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-10" 0,1012013100,900,0,"occurrances","ACC: CALL REJ","hcss4-11" 0,1012013100,300,0,"occurrances","ISUP: CHAN MATE UNAVAILABLE","ss7svc4"

Each field is separated by a comma. The content of each field is described in Table A-4.
Table A-4 Archived Measurement File Fields

Field Name Release level Timestamp (seconds)

Data Type Integer Integer

Maximum Length 3 10

Comments Format of records (should be set to 0). Indicates the time, in seconds, since the start of the UNIX internal timer, time of epoch.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

A-6

OL-0800-06

Appendix A

Configuring Cisco MGC Log Files Configuring the Data Dumper

Table A-4

Archived Measurement File Fields (continued)

Field Name Time interval (seconds) Measurement value Measurement units Measurement category

Data Type Integer Integer String String

Maximum Length 5 10 32 32

Comments Duration of the collection interval. Value of the measurement. Units for which the measurement is recorded. Text that describes the nature of the measurement. For a list and description of the available measurement, refer to Appendix D, Cisco MGC Measurements. Identifies the component associated with the alarm. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on components.

Component name String

32

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

A-7

Appendix A Configuring the Data Dumper

Configuring Cisco MGC Log Files

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

A-8

OL-0800-06

A P P E N D I X

Troubleshooting Cisco SLT Signaling


Cisco SLTs function as signaling link interfaces to SS7 Signal Transfer Point (STP) mated pairs on the SS7 network side. On the network side, Cisco SLTs function as IP interfaces to the Cisco Media Gateway Controllers (MGCs). A number of different SS7 messages pass between the Cisco SLTs and STPs and between the Cisco SLTs and Cisco MGCs through Cisco switches. Each STP in a mated pair is constantly active under normal operating conditions. SS7 message traffic normally flows between both STPs of the mated pair and the Cisco SLTs, as shown in Figure B-1.
Figure B-1 Cisco SLT Hardware and I/O Signaling

Mated STP pair V.35

SP subsystem 10BaseT

Switches

100BaseT SLT-0

SLT-1

Cisco MGCs SLT-3

This chapter includes the following sections:


Cisco SLT Signaling Overview, page B-2 Troubleshooting SS7 Link Problems, page B-5 Troubleshooting Cisco SLT-to-STP Signaling Links, page B-10 Troubleshooting Cisco SLT to Cisco MGC Communications, page B-13 Cisco SLT Error Messages, page B-15.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

26672

SLT-2

B-1

Appendix B Cisco SLT Signaling Overview

Troubleshooting Cisco SLT Signaling

Cisco SLT Signaling Overview


This section contains the following subsections:

IP Signaling Backhaul, page B-2 Connection Management, page B-3

IP Signaling Backhaul
IP signaling backhaul is accomplished by means of the Cisco-proprietary Reliable User Datagram Protocol (RUDP) for communication between the Cisco SLT and the Cisco MGC. Backhaul messages can be traced from the Cisco SLT command line interface (CLI) by means of the command
debug ss7 mtp2 backhaul channel

IP signaling backhaul is described in the following sections:


Types of Encapsulation, page B-2 PDU Verb Types, page B-2 Backhaul Message IDs, page B-2

Types of Encapsulation
There are two different types of data encapsulation associated with IP signaling backhaul messages:

Non-PDU messagesDefined as session manager control messages. These are used to control active and standby sessions with the respective Cisco MGCs. PDU messagesMessages the Session Manager delivers to the Message Transfer Part (MTP) Level 2 (MTP2). These messages are used to control MTP2 and to send and receive MSU messages.

PDU Verb Types


There are three different PDU verb types associated with IP signaling backhaul commands and messages:

RequestsMessages sent only from the Cisco MGC to the Cisco SLT requesting that the Cisco SLT take some action, such as connect the link (align link), disconnect the link, or return its statistics. ConfirmationsMessages sent from the Cisco SLT to the Cisco MGC in response to requests indicating that the requested action has been completed with success or failure. IndicationsAsynchronous messages sent from the Cisco SLT to the Cisco MGC, indicating that the Cisco SLT has detected a state change, such as link alignment lost.

Backhaul Message IDs


There are five types of IP signaling backhaul message IDs:

Backhaul reset commands Connection management commands Backhaul statistics messages

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-2

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Cisco SLT Signaling Overview

Flow control Link status

Backhaul Reset
There are two types of IP signaling backhaul reset commands:

SoftReset (Link reset)Command is sent from the Cisco MGC to the Cisco SLT to put the backhaul signaling link in the Out-Of-Service (OOS) state. If the command succeeds, there is no response from the Cisco SLT because the backhaul link is out of service. Sample message trace:
00:10:18: SoftResetRequest

HardReset (CPU reset)Command is sent from the Cisco MGC to the Cisco SLT to cause a CPU reset on the Cisco SLT. Sample message trace:
00:10:18: HardResetRequest

Connection Management
There are two IP signaling backhaul connection commands; a connection request and a disconnect request. Each command has a corresponding confirmation message.

Connection requestCommand sent from the Cisco MGC to the Cisco SLT to request link alignment. The request indicates if the alignment is in a normal or emergency state. Connection confirmationReply sent from the Cisco SLT to the Cisco MGC in response to a connection request command to indicate its success or failure. Sample message trace:
4d10h: MTP2: rcvd Conn Req - Emergency ch=0 Statistics

Disconnect requestCommand sent from the Cisco MGC to the Cisco SLT to request that an In-Service (IS) link be taken OOS. The request is always processed. The Cisco SLT transmits a status indicator, an Out-of-Service (SIOS) message on the SS7 link.

Disconnect confirmationReply sent from the Cisco SLT to the Cisco MGC in response to a disconnect request command to indicate its success or failure. Disconnect indicationAn asynchronous message sent from the Cisco SLT to the Cisco MGC, indicating that the Cisco SLT has detected a state change that calls for a disconnect request command, such as link alignment lost. Sample message trace:
4d10h: MTP2: send Disc Ind ch=0 reason=0x7-LSSU condition

The following sections describe connections management:


Backhaul Statistics, page B-3 Backhaul Congestion, page B-4 Link Status, page B-4

Backhaul Statistics
There are two IP signaling backhaul statistics messages:

Stats requestCommand sent from the Cisco MGC to the Cisco SLT to request that the Cisco SLT return its MTP Level 1 (MTP1) and MTP2 statistics. The request is always processed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-3

Appendix B Cisco SLT Signaling Overview

Troubleshooting Cisco SLT Signaling

An action value is provided to accomplish one of three options: (1) return the statistics and reset the statistics collection, (2) just return the statistics, or (3) just reset the statistics collection.

Stats confirmationReply sent from the Cisco SLT to the Cisco MGC in response to the stats request command. Sample message trace:
4d10h: MTP2: rcvd Statistics Req-Send&Reset ch=0

Backhaul Congestion
The Cisco SLT uses the congestion indication, an asynchronous message sent from the Cisco SLT to the Cisco MGC to indicate that its backhaul signaling link is entering (Onset) or exiting (Abate) congestion. Sample message trace:
Mar 1 005616.707 MTP2 send Flow Ind ch=0 status=0x0 start congestion

The Cisco SLT has two types of possible congestion. Both are determined in the same manner, but control flow in different directions.

MTP2 signaling congestionSS7 congestion deals with each individual SS7 link. Backhaul congestionDeals with the active Session Manager session.

Congestion onset and abatement are determined by the percentage of free receive buffers.

Congestion onsetAn indication that the signaling node is congested. When the number of free receive buffers drops below 20 percent, a backhaul congestion onset message is sent from the Cisco SLT to the Cisco MGC. At this point, the Cisco MGC holds all backhaul traffic destined for the Cisco SLT.

Congestion abateAn indication that congestion has cleared. When the number of free receive buffers rises above 40 percent, a backhaul congestion abate message is sent from the Cisco SLT to the Cisco MGC. At this point, the Cisco MGC resumes sending backhaul traffic destined for the Cisco SLT.

Link Status
Congestion status is maintained for backhaul. Example of a congestion status message:
Nomad-C#sho ss7 mtp2 state SS7 MTP2 states for channel 0 Protocol version for channel 0 is Bellcore GR-246-Core Issue 2, Dec 1997 MTP2LSC_INSERVICE MTP2IAC_IDLE MTP2TXC_INSERVICE MTP2RC_INSERVICE MTP2SUERM_MONITORING MTP2AERM_IDLE MTP2CONGESTION_IDLE Congestion Backhaul = Abate Remote Processor Outage = FALSE

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-4

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Troubleshooting SS7 Link Problems

Troubleshooting SS7 Link Problems


The following sections describe methods of troubleshooting SS7 link problems:

Checking Link Configuration Files, page B-5 Checking UDP Traffic Flows, page B-5 Checking Connection between Cisco MGC and Cisco SLT, page B-6 Checking the T1/E1 Link State, page B-6 Verifying the Link Alignment Status, page B-6 Verifying Exchanged Point Codes, page B-7 Cross-Checking Configuration Files, page B-8

Checking Link Configuration Files


Check the configuration files on the Cisco MGC and the Cisco SLT. The IP addresses and UPD ports must match.

MTP2 Configuration:
Is the channel configured to the proper MTP2 variant? Do the MTP2 variant protocol parameters match the remote configuration?

Session Manager Configuration:


Are the proper number of sessions defined, session-0 and session-1? Do the session configurations match the Cisco MGC session configurations? Do the RUDP parameters match the Cisco MGC RUDP configuration?

Checking UDP Traffic Flows


Check UDP traffic flows between the Cisco MGC and the Cisco SLT by entering the following commands:
log on 2600, enable debug ip udp

The response should look like the following, again depending on your configuration:
2600-1#debug ip udp UDP packet debugging is on 2600-1# 15:06:53: UDP: rcvd src=10.15.13.6(7000), 15:06:53: UDP: rcvd src=10.15.13.6(7000), 15:06:53: UDP: sent src=10.15.13.2(7000), 15:06:53: UDP: sent src=10.15.13.2(7000), 15:06:53: UDP: rcvd src=10.15.13.6(7000), 15:06:55: UDP: sent src=10.15.13.2(7000), 15:06:55: UDP: rcvd src=10.15.13.6(7000),

dst=10.15.13.2(7000), dst=10.15.13.2(7000), dst=10.15.13.6(7000), dst=10.15.13.6(7000), dst=10.15.13.2(7000), dst=10.15.13.6(7000), dst=10.15.13.2(7000),

length=32 length=32 length=164 length=164 length=12 length=32 length=12

Check for traffic in both directions. If there is traffic, go to the Checking Connection between Cisco MGC and Cisco SLT section on page B-6.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-5

Appendix B Troubleshooting SS7 Link Problems

Troubleshooting Cisco SLT Signaling

Otherwise, verify IP addresses, try to ping in both directions, reload the Cisco SLT software, check subnets, and check the VLANs on the LAN switches.

Checking Connection between Cisco MGC and Cisco SLT


Check that the Cisco MGC connects to the Cisco SLT:
debug ss7 mtp2 backhaul ip upd N

Where N identifies the specific MTP link. Valid values are from 0 through 3. The Cisco SLT does not attempt to align the link until it has received an MTP3 Connect Indication from the Cisco MGC. The MTP3 primitives between the Cisco SLT and the Cisco MGC can be seen with this debug command.

Checking the T1/E1 Link State


Check the T1 or E1 link state by observing the LEDs on the Cisco SLT. Make sure that the framing options match on both sides of the physical link.

Verifying the Link Alignment Status


Check alignment status of a link by entering the following debug command:
debug ss7 mtp2 iac N

Where N identifies the specific MTP link. Valid values are from 0 through 3. Table B-1 describes various debug outputs from the previous command, the probable cause, and the recommended recovery. This traffic is exchanged only when the link is initially brought up. If the link is already In-Service, nothing is displayed.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-6

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Troubleshooting SS7 Link Problems

Table B-1

Debug Outputs, Probable Causes, and Recovery Actions

Debug Output No output.

Probable Cause Link is already aligned. MTP2 is not started.

Recovery Action 1. Check that term monitor is on. 2. Reload Cisco SLT. 3. Cross-check configuration files.

15:12:33: 15:12:34: 15:12:39: 15:12:51: 15:12:56: 15:13:07: 15:13:12:

itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_Stop chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_T2_TMO chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_T2_TMO chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Start chnl=0 MTP2IAC_IDLE

MTP2 does not flow across the link.

Check DS0 assignment (should use the same time slot on both sides of the physical link) and the DS0 speed (defaults to 56 kbps on T1 and 64 kbps on E1). The DS0 speed can be changed by conf t contr E1 0/0 channel-group 0 timeslot 1 speed 56

15:14:32: 15:14:33: 15:14:33: 15:14:37: 15:14:38: Interface 15:14:45: 15:14:46: Interface 15:14:50: 15:14:50: 15:14:50: 15:14:54: 15:14:55: Interface

itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_ALIGNED itu2IAC_T4_TMO chnl=0 MTP2IAC_PROVING %LINEPROTO-5-UPDOWN: Line protocol on Serial0/0:0, changed state to up itu2IAC_Rcvd_SIOS chnl=0 MTP2IAC_IDLE %LINEPROTO-5-UPDOWN: Line protocol on Serial0/0:0, changed state to down itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_ALIGNED itu2IAC_T4_TMO chnl=0 MTP2IAC_PROVING %LINEPROTO-5-UPDOWN: Line protocol on Serial0/0:0, changed state to up

The link is able to align, but Check the provisioning fails in the PROVING settings for the SLC, OPC, sequence. and DPC in the Cisco MGC, as described in the It is generally a mismatch in Bouncing SS7 Links point codes. section on page 8-92. You can use an SS7 sniffer tool to look at the exchanged point codes. The procedure in Verifying Exchanged Point Codes section on page B-7 allows you to get them using Cisco SLT debug tools.

Verifying Exchanged Point Codes


Check exchanged point codes by entering the following command:
debug ss7 mtp2 pac N

Where N identifies the specific MTP link. Valid values are from 0 through 3. Table B-2 describes various debug outputs from this command, the probable cause, and the recommended recovery.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-7

Appendix B Troubleshooting SS7 Link Problems

Troubleshooting Cisco SLT Signaling

Table B-2

Debug Outputs, Probable Causes, and Recovery Actions

Debug Output No output

Probable Cause MTP2 is not started.

Recovery Action 1. Check that term monitor is on. 2. Reload the Cisco SLT. 3. Cross check configuration files.

15:08:31: MTP2 incoming trace enabled on channel 0. 15:08:31: MTP2 outgoing trace enabled on channel 0. 15:08:34: ---- Outgoing Rudp msg (41 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0000 msg_type 0x0011 channel_ID 0x0000 bearer_ID 0x0000 length 0x0019 data 0xB2236ED6 0x006FD600 0x11F01122 0x33445566 0x778899AA 0xBBCCDDEE 15:08:34: ---- Incoming Rudp msg (41 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0000 msg_type 0x0010 channel_ID 0x0000 bearer_ID 0x0000 length 0x0019 data 0xB2006FD6 0x236ED600 0x21F01122 0x33445566 0x778899AA 0xBBCCDDEE

Cisco MGC is exchanging messages with remote SP. Exchanged point codes must match before communication can be successfully established.

Check point codes: in data 0xB2236ED6 0x006FD6: 1. 236ED6 should be read D6-6E-23 and converted in decimal: 214-110-035, which is the point code of the Cisco MGC. 2. 006FD6 should be read D6-6F-00 and converted in decimal: 214-111-000, which is the point code of the STP in this example. The values in the incoming and outgoing messages must match.

Cross-Checking Configuration Files


Cross-check the configuration files by entering the following command:
debugb ss7 mtp2 iac 0

You should see a response similar to the following Cisco MGC sample configuration file:
File: XECfgParm.dat (extract) *.ipAddrLocalA = 10.15.13.6 # Should be same as *.IP_Addr1 *.ipAddrLocalB = 10.15.13.22 *.ipAddrPeerA = 0.0.0.0 # Failover peer's address *.ipAddrPeerB = 0.0.0.0 *.IP_Addr1 *.IP_Addr2 *.IP_Addr3 *.IP_Addr4 *.stPort = = = = = 0 10.15.13.6 # Address of interface on motherboard 10.15.13.22 0.0.0.0 0.0.0.0

This file defines the Cisco MGC IP addresses used to communicate with the Cisco SLT. To check if they match with the Solaris configuration, you can use ifconfig -a Solaris command.
File: sigChanDev.dat

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-8

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Troubleshooting SS7 Link Problems

001d0001 001d0002 001d0003 001d0004 001d0005 001d0006 001d0007 001d0008

0 0 1 1 2 2 3 3

1 1 1 1 1 1 1 1

00080002 00080001 00080001 00080002 00080002 00080001 00080001 00080002

00030014 00030014 00030014 00030014 00030014 00030014 00030014 00030014

00060001 00060001 00060002 00060002 00060001 00060001 00060002 00060002

0 1 1 0 0 1 1 0

Note

The last digit in each line (0 or 1 in this example) identifies the link ID on the Cisco SLT. It can take the value 0, 1, 2, or 3 and is misleadingly identified as a timeslot in Cisco MGC provisioning. Only two STP links can be used on the Cisco SLT.
File: sigChanDevIp.dat 001d0001 001d0002 001d0003 001d0004 001d0005 001d0006 001d0007 001d0008 IP_Addr1 IP_Addr1 IP_Addr2 IP_Addr2 IP_Addr1 IP_Addr1 IP_Addr2 IP_Addr2 7000 7000 7000 7000 7000 7000 7000 7000 10.15.13.2 7000 10.15.13.2 7000 10.15.13.19 7000 10.15.13.19 7000 10.15.13.4 7000 10.15.13.4 7000 10.15.13.21 7000 10.15.13.21 7000

This file associates the Cisco MGC IP address/UDP port to the Cisco SLT IP address/UDP port. IP_Addr1 and IP_Addr2 are defined in XECfgParm.dat. These files should not be edited using vi. Any change is lost when provisioning tools are used. The only exception is XECfgParm.dat (and changes can be lost anyway). Cisco SLT sample configuration:
controller T1 0/0 framing esf linecode b8zs channel-group 0 timeslots 1 ! controller T1 0/1 framing esf linecode b8zs channel-group 0 timeslots 1 ! interface Ethernet0/0 ip address 10.15.13.2 255.255.255.240 no ip directed-broadcast ! interface Serial0/0:0 no ip address no ip directed-broadcast ! interface Ethernet0/1 ip address 10.15.13.18 255.255.255.240 no ip directed-broadcast ! interface Serial0/1:0 no ip address no ip directed-broadcast !

ip classless ip route 172.18.0.0 255.255.0.0 10.15.13.1

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-9

Appendix B Troubleshooting Cisco SLT-to-STP Signaling Links

Troubleshooting Cisco SLT Signaling

no ip http server ! ss7 set failover-timer 3 ss7 session-0 address 10.15.13.6 7000 10.15.13.2 7000 ss7 session-0 retrans_t 600 ss7 session-0 cumack_t 300 ss7 session-0 kp_t 2000 ss7 session-0 m_retrans 2 ss7 session-0 m_cumack 3 ss7 session-0 m_outseq 3 ss7 session-0 m_rcvnum 32 ! line con 0 transport input none line aux 0 line vty 0 4 login ! end

Troubleshooting Cisco SLT-to-STP Signaling Links


Cisco SLTs interface with STPs through linksets. STP linksets can support a maximum of 16 individual SS7 signaling links. Each Cisco SLT can be configured to interface with as many as two individual SS7 signaling links. Cisco SLTs support SS7 Message Transfer Part Levels 1 and 2 (MTP1 and MTP2) in the Cisco SLT-to-STP signaling link interfaces. When a Cisco SLT is replaced with a new unit, complete the following steps to determine whether the original Cisco SLT was the cause of the SS7 communication problem:
Step 1 Step 2 Step 3

Connect an SS7 protocol analyzer to a patch panel monitor port to monitor the SS7 message traffic entering or leaving the Cisco SLT-to-STP link. Monitor the SS7 message traffic (if any) between the STP and the Cisco SLT. If SS7 traffic is being received from the STP, continue with the next step. If no SS7 message traffic is being received, go to the MTP1 Communication Problems section on page B-11.

Step 4 Step 5

Ensure that SS7 Message Signaling Units (MSUs), Fill-in Signaling Units (FISUs), or Link Status Signaling Units (LSSUs) are being transceived by the Cisco SLT. If SS7 LSSU messages are being transceived, go to the MTP2 Communication Problems section on page B-12. If SS7 LSSU messages are not being transceived, go to the next step.

Step 6 Step 7

If SS7 MSU and FISU messages are being transceived by the Cisco SLT go to the Troubleshooting Cisco SLT to Cisco MGC Communications section on page B-13. If SS7 MSU and FISU messages are not being transceived, replace the faulty Cisco SLT with a backup unit, if one is available. If the problem is no longer present with the replacement unit, you can test the faulty unit offline to determine the cause of the problem.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-10

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Troubleshooting Cisco SLT-to-STP Signaling Links

MTP1 Communication Problems


The next two sections describe the procedures for identifying and solving MTP1 communication problems. The initial indication of signaling problems may change in T1 (or E1) status. Check for alarms on the T1 (or E1) interface before performing any of the following procedures.

Identifying MTP1 Communication Problems


MTP1 standardizes SS7 signaling link physical connectivity. When an MTP1 problem occurs, there is a physical connection break or a virtual break (something that causes the symptoms of a physical connection break, such as no power to a card slot) in the signaling link path. A break is identified when no Message Signaling Unit (MSU), Fill-In Signaling Unit (FISU), or Link Status Signaling Unit (LSSU) traffic can be sent or received over the SS7 link. MTP1 communication problems are normally the result of either a hardware failure, a cabling problem, or a physical interface problem.
Figure B-2 Physical Layer, MTP1 Communication Problems

Physical Layer MTP1 communications problem STP Physically/virtually broken signaling path SLT1

MSUs FISUs LSSUs

MSUs FISUs LSSUs


27329

Resolving MTP1 Communication Problems


If monitoring the SS7 link with a protocol analyzer reveals no MSU, FISU, or LSSU message traffic, complete the following steps:
Step 1 Step 2 Step 3

Ensure that power is on to the Cisco SLT. Check to ensure that the STP signal link cabling is correctly connected to the Cisco SLT. Disconnect the Cisco SLT from both the STP and the LAN switch for offline testing. Connect two recommended SS7 protocol analyzers, one to the STP interface the other to the IP interface. One SS7 protocol analyzer must be equipped to send/receive SS7 test messages to the Cisco SLT over the V.35 interface, and the other to send/receive messages to the Cisco SLT over the IP interface.

Caution

Do not leave the Cisco SLT connected to the LAN switch, and thus the Cisco MGC, while injecting SS7 test messages into the Cisco SLT. The Cisco MGC might not properly recognize the SS7 test messages generated by your protocol analyzer, which could cause error conditions between the Cisco MGC and the Cisco Media Gateway. Test Cisco SLT ports and hardware by conducting a loop test of the signal link, excluding connectivity to the distant end SS7 node and the LAN switch.

Step 4

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-11

Appendix B Troubleshooting Cisco SLT-to-STP Signaling Links

Troubleshooting Cisco SLT Signaling

Step 5

If no MTP1 problem is discovered by the test, then the MTP1 problem more than likely resides within the STP node or the connection to the STP node. If the problem is within the Cisco SLT, replace the unit.

MTP2 Communication Problems


The next two sections describe the procedures for identifying and solving MTP2 communication problems.

Identifying MTP2 Communication Problems


MTP2 standardizes SS7 signaling link alignment. MTP2 communication problems occur when Cisco SLTs cannot establish data link alignment with STPs. When this happens the FISUs and MSUs cease to be transmitted. FISUs and MSUs are replaced by LSSUs whenever an SS7 link has good physical connectivity (MTP1), but cannot align to send and receive either FISU or MSU traffic.
Figure B-3 Data Link Layer, MTP2 Communication Problem

Data Link Layer MTP2 communications problem

STP

SS7 signaling link out of alignment LSSUs

SLT1

MSUs FISUs

MSUs FISUs
27328

Resolving MTP2 Communication Problems


If monitoring of the SS7 link with a protocol analyzer reveals no MSU or FISU message traffic (only LSSU traffic), complete the following steps:
Step 1 Step 2

Check to ensure that the signal link cabling is correctly connected to the Cisco SLT. Disconnect the Cisco SLT from both the STP and the LAN switch for offline testing. Connect two recommended SS7 protocol analyzers. One SS7 protocol analyzer must be equipped to send/receive SS7 test messages to the Cisco SLT over the V.35 interface, and the other to send/receive messages to the Cisco SLT over the IP interface.

Step 3 Step 4

Test router ports and hardware by conducting a loop test of the signal link, excluding connectivity to the distant end SS7 node. If no MTP2 (link alignment) problem is discovered by the test, then the problem more than likely resides within the distant end STP node. If a problem is discovered with the Cisco SLT, replace the unit.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-12

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Troubleshooting Cisco SLT to Cisco MGC Communications

Troubleshooting Cisco SLT to Cisco MGC Communications


Cisco SLTs communicate with Cisco MGCs through a Cisco Catalyst MSR used as a LAN switch. Under normal conditions all Cisco SLTs actively process SS7 message traffic from the STPs. However, only one of the two Cisco MGCs actively processes traffic at any one time. One Cisco MGC always stays in a hot-standby mode while the other actively processes message traffic. Routing, call control, network management, and all other SS7 application data is framed within SS7 protocol layers MTP3 and higher. The Cisco SLTs, which terminate the MTP1 and MTP2 layers, pass MTP3 and higher-layer SS7 protocol data between the Cisco MGCs and STP mated pairs. Cisco SLT to Cisco MGC communication comprises multiple Cisco SLTs, which pass SS7 message traffic on to the Cisco MGCs through the LAN switches. Each STP linkset coming into a Cisco SLT normally has links connected to at least two Cisco SLTs to ensure network survivability. The Cisco-proprietary Reliable User Datagram Protocol (RUDP) is used for Cisco SLT to Cisco MGC communication. In a fault-tolerant configuration, for example, Ethernet 10BaseT links each Cisco SLT to two LAN switches, and 100BaseT links each LAN switch to both the active Cisco MGC and the standby Cisco MGC. Troubleshooting of Cisco MGC and Cisco SLT communications is described in the following sections:

Identifying MTP3 and Higher Layer Problems, page B-13 Identifying Ethernet Connectivity Problems, page B-14 Identifying IP Communication Problems, page B-14 Identifying RUDP Communications Problems, page B-15

Identifying MTP3 and Higher Layer Problems


Although the Cisco SLTs normally pass MTP3 and higher-layer data directly to the Cisco MGCs, Cisco SLT hardware could also be the cause of MTP3 and higher layer SS7 communication problems. Cisco SLT-originated MTP3 or higher layer SS7 problems can affect message traffic over a certain link, or just the links that transceive through a certain Cisco SLT. Cisco SLTs package received SS7 message data into RUDP datagrams that are transmitted through the LAN switches onto the Cisco MGC. This process is reversed (Cisco SLT strips RUDP datagrams) and standard SS7 message framing is added by the Cisco SLTs when the Cisco MGCs send SS7 messages to the Cisco SLTs. If a tested SS7 link has connectivity (MTP1) and alignment (MTP2), but SS7 error messages are reported by network management tools, then there is probably an MTP3 or higher layer SS7 communication problem. This problem requires testing to verify Cisco SLT operation.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-13

Appendix B Troubleshooting Cisco SLT to Cisco MGC Communications

Troubleshooting Cisco SLT Signaling

Figure B-4

MTP3 and Higher-Layer SS7 Protocol Processing

STP to SLT to Cisco MGC MTP3 and higher layer SS7 protocol data processing

SLT1 SS7 network MTP1 MTP2 MTP3 ISUP MTP1 MTP2

Cisco MGC

MTP3 ISUP
44251

Resolving MTP3 and Higher Layer SS7 Communication Problems


Coordinate a signaling link test of the SS7 transceive path within the system, excluding connectivity to distant end SS7 nodes. Use a recommended SS7 protocol analyzer to send SS7 messages to the suspected Cisco SLT while monitoring the output of the Cisco SLT with a recommended protocol analyzer. If no MTP1 (connectivity), MTP2 (link alignment), or MTP3 or higher layer problem is discovered by the test, then the problem probably is not the Cisco SLT under test.

Caution

Do not leave the Cisco SLT connected to the LAN switch, and thus the Cisco MGC, while injecting SS7 test messages into the Cisco SLT. The Cisco MGC might not properly recognize the SS7 test messages generated by your protocol analyzer, which could cause error conditions between the Cisco MGC and the media gateway.

Identifying Ethernet Connectivity Problems


SS7 message components are Ethernet framed and transceived through one of the Cisco SLTs two Ethernet 10BaseT ports. A physical break or a virtual break will result in a percentage of message traffic not being received along the Cisco MGC path (Cisco SLT-to-switch-to-Cisco MGC). Utilization of a Packet Internet Groper (PING) utility program to perform echo response tests should suffice to identify Ethernet connectivity problems within these components.

Identifying IP Communication Problems


SLT traffic is routed, rerouted, and, if necessary, retransmitted to the Cisco MGCs through the LAN switches. Monitoring for the following Internet Control Message Protocol (ICMP) error-reporting datagrams assists in identifying IP communication problems:

Destination Not Reachable/No Echo Reply Source Quench/Receiving Buffer Congestion Redirection Required Time to Live Exceeded Parameter Problems Timestamp Request/Reply

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-14

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Cisco SLT Error Messages

Echo Request/Reply

If IP communication is good, then the RUDP application layer software could be the cause of the problem. Utilizing echo and timestamp request messages and monitoring response messages should be sufficient to identify RUDP/IP/Ethernet communication problems within the system.

Identifying RUDP Communications Problems


You can use the following command to establish a reason for RUDP communication problems:
debug ss7 sm session ses_num

Where ses_num is the number of the affected session. The system returns a response similar to the following:
SM: Failed to open session[0], return code = x

Where x is the RUDP return code. The valid value is an integer from 1 through 14. These return codes are defined as follows:

1RUDP_OPTION_NOT_SUPPORTED 2RUDP_NOT_READY 3RUDP_CONNREC_RESOURCE_UNAV 4RUDP_BUFFER_RESOURCE_UNAVAIL 5RUDP_EVENT_RESOURCE_UNAVAIL 6RUDP_EVENT_ENQUEUE_FAILED 7RUDP_INVALID_CONN_HANDLE 8RUDP_BUFFER_TOO_LARGE 9RUDP_EMPTY_SEND_BUFFER 10RUDP_CONNECTION_NOT_OPEN 11RUDP_SEND_WINDOW_FULL 12RUDP_REMOTE_PORT_REQUIRED 13RUDP_REMOTE_ADDRESS_REQUIRED 14RUDP_LOCAL_PORT_IN_USE

Cisco SLT Error Messages


Table B-3 lists the Cisco SLT error messages broadcast by the Cisco MGC.
Table B-3 Cisco SLT Error Messages

Message Name
OWNERR, PQUICC, LOG_ERR, MSG_TRACEBACK| MSG_PROCESS INITFAIL, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), SCC%d init failed

Definition An internal software error has occurred. The software failed to initialize/restart a 1T serial card.

Recommended Action Call your technical support representative for a software upgrade for the Cisco SLT. Clear the serial interface. If the message recurs, call your technical support representative for assistance.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-15

Appendix B Cisco SLT Error Messages

Troubleshooting Cisco SLT Signaling

Table B-3

Cisco SLT Error Messages (continued)

Message Name
CTSLOST, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), Clear to Send Lost

Definition The Clear To Send (CTS) input signal on a data terminal equipment (DTE) serial interface became inactive while transmitting a frame. This is the result of a communication line failure or cable disconnection.

Recommended Action Check the serial interface cable and/or communication equipment, such as the channel service unit/data service unit (CSU/DSU).

UNDERFLO, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), Transmit Underflow

The system should recover; no action is While transmitting a frame, the serial required. controller chips local buffer received insufficient data, because data could not be transferred to the chip fast enough to keep pace with its output rate. Normally, such a problem is temporary, depending on transient peak loads within the system. The system received too many modem control signal interrupts. Modem control signals are hardware handshake signals between data terminal equipment (DTE) and data communications equipment (DCE). The signals include either a data carrier detect (DCD) or a data set ready (DSR), or both. Check the serial interface cable. The error can occur if the cable is disconnected or has come loose and is picking up noise. If the cable appears to be connected correctly, check the equipment connected to the cable.

LINEFLAP, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), Excessive modem control changes

BADHDXFSM, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), Unexpected HDX state %d, event %d TOOSMALL, PQUICC, LOG_ALERT, 0, "PQUICC(%d/%d), packet was less than 2 bytes"

A bad event was detected in the state machine Copy the error message exactly as it for half duplex transmission/reception. appears, and report it to your Cisco technical support representative. A small packet (less than 2 bytes) was queued The system should recover. No action is up for transmission.The interface cannot required. If the message recurs, it might handle such small packets for transmission. indicate a hardware error related to data traffic patterns. Copy the error message exactly as it appears, and report it to your Cisco technical support representative. A packet greater than the assigned MTU of this serial interface was queued up for transmission. The system should recover. No action is required. If the message recurs, it might indicate an error related to data traffic patterns. Copy the error message exactly as it appears, and report it to your Cisco technical support representative. Check part number on the WIC card to verify it is supported in the Cisco IOS release operational on the router, or contact your Cisco technical support representative.

TOOBIG, PQUICC, LOG_ALERT, 0, "PQUICC(%d/%d), packet too big";

UNKNOWN_WIC, PQUICC, LOG_ALERT, 0,"PQUICC(%d), WIC card has an unknown ID of 0x%x"

The software does not recognize the WAN Interface Card (WIC) plugged into the port module.

If you need to contact your technical support representative for assistance, be prepared to provide the Cisco SLT and Cisco MGC debug trace information captured while the problem was occurring. In most cases, the backhaul trace and the LSC trace from the Cisco SLT would be required. If the problem is associated with link alignment, you should also include the IAC trace output. Trace information can help the investigator delineate the problem to the Cisco SLT or to the Cisco MGC.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-16

OL-0800-06

Appendix B

Troubleshooting Cisco SLT Signaling Cisco SLT Error Messages

To enable MTP2 traces, enter the following commands:


debug ss7 mtp2 back channel debug ss7 mtp2 lsc channel debug ss7 mtp2 iac channel

To turn debug trace off, enter the command un all. The output from a show version command provides explicit details about the image and branch info. This information tells specifically which branch of code to investigate. The output from a show run command indicates what Cisco SLT configuration is in use. This is important because many problems can be caused by improper configurations, such as timer durations. Provide any information from show commands that you used to identify the problem; for example:
show ss7 sm stats

Include any other information that might be useful in understanding or reproducing the problem. This information will help your technical support representative verify the fix.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

B-17

Appendix B Cisco SLT Error Messages

Troubleshooting Cisco SLT Signaling

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

B-18

OL-0800-06

A P P E N D I X

Troubleshooting Cisco Switch Signaling


Two Cisco switches are used in fault-tolerant Cisco telephony solutions. Both switches are active. Virtual local area networks (VLANs) are set up within these switches. These VLANs are used by system components to route message traffic to other system components. Normally, at least two Cisco SS7 interfaces are connected to each switch for redundancy. SS7 call messages travel from the interfaces through the VLANs and on to the Cisco Media Gateway Controllers (MGCs). These VLANs can also be used to link the Cisco MGCs to the media gateways. This chapter includes the following sections:

VLANs, page C-1 Command Line Interface, page C-1 Troubleshooting Virtual Pathways and ISLs, page C-3

VLANs
VLANs are configured within each switch, and help to simplify management. All intrasystem Ethernet message traffic is partitioned and routed over VLANs according to component origination and destination. The active VLAN configuration is exactly the same as that of the standby VLANs.

Command Line Interface


Access to the Command Line Interface (CLI) can be gained either locally through a console terminal connected to an EIA/TIA-232 port or remotely through a Telnet session. Telnet session access requires a previously set IP address for the switch. Telnet sessions are automatically disconnected after remaining idle for a configurable time period. There are two modes of operationnormal and privilegedboth password protected. Normal-mode commands are used for everyday system monitoring. Privileged commands are used for system configuration and basic troubleshooting. After you log in successfully, the system automatically enters normal mode, which gives you access to normal-mode commands only. You can enter privileged mode by entering the enable command followed by a second password. Privileged mode is indicated by the appearance of the word "enable" immediately after the system prompt. To return to normal mode, enter the disable command at the prompt.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

C-1

Appendix C Command Line Interface

Troubleshooting Cisco Switch Signaling

Commands entered from the CLI can apply to the entire system or to a specific module, port, or virtual local area network (VLAN). Modules (module slots), ports, and VLANs are numbered starting with 1. For example, if you are using a Catalyst 5500 with a redundant supervisor engine, the supervisor modules reside in slots 1 and 2. On each module, port 1 is the leftmost port. To reference a specific port on a specific module, the command syntax is mod_num/port_num. For example, 3/1 denotes module 3, port 1. In some commands, such as set trunk, set cam, and set VLAN commands, you can enter lists of ports and VLANs. Designate ports by entering the module and port number pairs, separated by commas. To specify a range of ports, use a dash (-) between the module number and port number pairs. Dashes take precedence over commas. The following examples show several ways of designating ports: Example 1: 2/1,2/3 denotes module 2, port 1 and module 2, port 3 Example 2: 2/1-12 denotes module 2, ports 1 through 12 Example 3: 2/1-2/12 is the same as Example 2 Each VLAN is designated by a single number. You specify lists of VLANs in the same way that you do for ports. Individual VLANs are separated by commas (,); ranges are separated by dashes (-). In the following example, VLAN numbers 1 through 10 and VLAN 1000 are specified:
1-10,1000

Some commands require a Media Access Control (MAC) address, IP address, or IP alias, which must be designated in a standard format. The MAC address format must be six hexadecimal numbers separated by hyphens, as shown in this example:
00-00-0c-24-d2-fe

The IP address format is 32 bits, written as four octets separated by periods (dotted decimal format) that are made up of a network section, an optional subnet section, and a host section, as shown in this example:
126.2.54.1

If the IP alias table is configured, you can use IP aliases in place of the dotted decimal IP address. This is true for most commands that use an IP address, except commands that define the IP address or IP alias. For more information about the set interface and set IP alias commands, refer to the command reference for your switch.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

C-2

OL-0800-06

Appendix C

Troubleshooting Cisco Switch Signaling Troubleshooting Virtual Pathways and ISLs

Command Line Interface Local Access


To obtain local access to the CLI, complete the following steps:
Step 1 Step 2 Step 3 Step 4

At the Console> prompt, press Return (or Enter). At the Enter Password: prompt, enter the system password. The Console> prompt appears indicating that you have successfully accessed the CLI in normal operation mode. Enter the necessary commands to complete the required task. Enter quit and press Return (or Enter) to exit the session.

Command Line Interface Remote Access


To obtain remote access to the CLI, complete the following steps:
Step 1 Step 2 Step 3 Step 4

From the remote host, enter the Telnet command and designate the name or IP address of the switch you wish to access (Telnet hostname | IP address). At the Enter Password: prompt, enter the password for the CLI. There is no default password (just press Return or Enter) unless a password was previously established using the set password command. Enter the necessary commands to complete the required task. Enter quit and press Return (or Enter) to exit the Telnet session.

Troubleshooting Virtual Pathways and ISLs


Use of a recommended protocol analyzer (locally or remotely) equipped with a recommended Packet Internet Groper (PING) utility program to perform Ethernet echo response tests should identify switch hardware, VLAN, and ISL connectivity problems. Echo is used to detect if another host is active on the network. The sender initializes the identifier and sequence number (which is used if multiple echo requests are sent), adds some data to the data field, and sends the ICMP echo to the destination host. The ICMP header code field is zero. The recipient changes the type to Echo Reply and returns the datagram to the sender. This mechanism is used to determine if a destination host is reachable. To use the PING command, complete the following steps:
Step 1

Log in to the CLI and enter the command:


Console> show port status

A response, similar to the following, is displayed:


Port Name ----- -----------------1/1 1/2 2/1 3/1 5/1 Status ---------connected notconnect connected notconnect notconnect Vlan ---------523 1 trunk trunk 1 Level Duplex Speed Type ------ ------ ----- -----------normal half 100 100BaseTX normal half 100 100BaseTX normal half 400 Route Switch normal full 155 OC3 MMF ATM normal half 100 FDDI

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

C-3

Appendix C Troubleshooting Virtual Pathways and ISLs

Troubleshooting Cisco Switch Signaling

5/2

notconnect 1

normal

half

100 FDDI

Step 2

Enter the CLI command show vlan.


Console> (enable) show vlan 998

A response, similar to the following, is displayed:


VLAN Name Status IfIndex Mod/Ports, Vlans ---- -------------------------------- --------- ------- -----------------------998 VLAN0998 active 357

VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ -----998 trcrf 100998 4472 999 0xff srb 0 0

VLAN AREHops STEHops Backup CRF ---- ------- ------- ---------998 10 10 off

Step 3

Enter (for ISLs) the command show trunk.


Console> (enable) show trunk

A response, similar to the following, is displayed:


Port -------2/1 2/2 Mode ----------desirable desirable Encapsulation ------------dot1q dot1q Status -----------trunking trunking Native vlan ----------1 1

Port Vlans allowed on trunk -------- -----------------------------------------------------2/1 1-1005 2/2 1-1005 Port -------2/1 2/2 Port -------2/1 2/2 Vlans allowed and active in management domain ------------------------------------------------------1,10,20,30,40,50,60 1,10,20,30,40,50,60 Vlans in spanning tree forwarding state and not pruned ------------------------------------------------------1,10,20,30,40,50,60 1,10,20,30,40,50,60

Step 4 Step 5

Use a PING utility program to echo response test the desired ports, VLANs, and ISLs. Check the switch equipment status, as described in the associated documentation. Replace suspected hardware, then return to Step 1 to verify switch operation.

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

C-4

OL-0800-06

A P P E N D I X

Cisco MGC Measurements


This appendix describes the ITU and ANSI measurements available from the Cisco Media Gateway Controller (MGC) software. Table D-1 provides a list of the ITU measurements available from the Cisco MGC software. The logging intervals in this table are all measured in minutes, with the exception of an interval of 24. A logging interval of 24 indicates a 24-hour time period. Table D-2 provides a list of the ANSI ISDN user part (ISUP) measurements available from the Cisco MGC software. The Management Information Bases (MIBs) for the measurements can be found in the Cisco Media Gateway Controller Software Release 9 Management Information Base Guide.
Table D-1 Operational Measurements Supported

MML Counter Group:Name ACC-GROUP ACC: CALL REJ ACC: CALL RE-RTE

Description Automatic congestion control (ACC) statistics Number of calls rejected by ACC Number of calls rerouted by ACC

Related Components SS7 Signaling Service Trunk Groups: ISUP IPFAS MGCP NAS n/a Auxiliary Signaling Service

Logging Interval 15, 60, 24 15, 60, 24

ALL-COUNTERS ASP-GROUP ASP: XMIT MSG ASP: RCV MSG ASP: RCV CONN REQ
Note

Lists all of the measurements Auxiliary signal path statistics Number of messages transmitted Number of messages received Number of call initiate messages received Calling statistics Number of successful calls Number of failed calls Number of failed calls due to a resource being unavailable Number of failed calls due to other reasons

n/a 15, 60, 24 15, 60, 24 15, 60, 24

The ASP-GROUP measurements are obsolete as of Release 9.2 of the Cisco MGC software MGC Network Element 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

CALL-GROUP CALL: SuccCall TOT CALL: FailCall TOT CALL: RUFailCall TOT CALL: ORFailCall TOT

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-1

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name CALL-GROUP (continued) CALL: OLFailCall TOT CALL: ACC REJ TOT CALL: ACC RE-RTE TOT CALL: PrepaidAccess CALL: PrepaidComplet CALL: RLFailCall TOT CALL: IncT38FaxReq CALL: IncT38FaxUsed CALL: OtgT38FaxReq CALL: OtgT38FaxUsed CAS-GROUP CAS: IN CALL ATMPT TOT CAS: IN CALL SUCC TOT CAS: OUT CALL ATMPT TOT CAS: OUT CALL SUCC TOT CAS: IN SZR ATMPT TOT CAS: IN SZR SUCC TOT CAS: OUT SZR ATMPT TOT CAS: OUT SZR SUCC TOT CAS: IN UNEXPECTED MSG

Description Calling statistics Number of failed calls due to overload Number of calls rejected by automatic congestion control (ACC) Number of calls re-routed by ACC Number of times the Prepaid Calling Card IN service is invoked Number of times a Prepaid Calling Card call reaches the connected state Number of times a call failed due to the route list being exhausted Number of times a T.38 fax tone is detected on incoming calls Number of times a T.38 fax is successfully completed on incoming calls Number of times a T.38 fax tone is detected on outgoing calls Number of times a T.38 fax is successfully completed on outgoing calls CAS traffic statistics Number of incoming call attempts Number of successful incoming calls Number of outgoing call attempts Number of successful outgoing calls Number of incoming seizure attempts Number of successful incoming seizures Number of outgoing seizure attempts Number of successful outgoing seizures Number of incoming unexpected messages

Related Components MGC Network Element

Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

CAS Signaling Service

15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-2

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name C7LNK-GROUP C7LNK: RCV SU ERR C7LNK: XMIT SIO TOT C7LNK: RCV SIO TOT C7LNK: DUR IS C7LNK: DUR UNAVAIL C7LNK: MSU DROP-CONG C7SP-GROUP C7SP: SP DUR UNAVAIL C7SP: XMIT MSU DROP/RTE DL-GROUP DL: RCV UNSOL DL: RCV SABME DL-GROUP DL: XMIT T200 DL: RCV SEQ DL: RCV FRMR RESP DL: RCV SIZE DL: RCV SABMR
Note

Description SS7 link statistics Number of signaling units received Number of link realignment (SIF/SIO) messages transmitted Number of link realignment (SIF/SIO) messages received Number of seconds C7 link in-service Number of seconds C7 link unavailable Number of messages dropped due to congestion SS7 Signaling path statistics Number of seconds SP unavailable Number of transmitted messages dropped due to routing failure Data link statistics Number of unsolicited frames received Number of SABMEs received Data link statistics Number of T200 expires transmitted Number of bad N(R) frames received Number of bad frame responses Number of bad frame sizes received Number of DPNSS SABMR received H.323 calling statistics Number of successful calls terminated in an H.323 network Number of successful calls originated in an H.323 network Number of failed calls terminated in an H.323 network Number of failed calls originated in an H.323 network

Related Components SS7 Link

Logging Interval 30 30 30 30 30 30

SS7 Signaling Service SS7 Subsystem

5, 30 30

Adapter/Card (TDM Only)

15, 60, 24 15, 60, 24

Adapter/Card (TDM Only)

15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

The DL-GROUP measurements are obsolete as of Release 9.2 of the Cisco MGC software EISUP Signaling Service 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

H323-GROUP H323: SUCC H323 TERM H323: SUCC H323 ORIG H323: FAIL H323 TERM H323: FAIL H323 ORIG

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-3

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name ISUP-GROUP ISUP: XMIT MSG TOT ISUP: RCV MSG TOT ISUP: XMIT ACM TOT ISUP: RCV ACM TOT ISUP: XMIT ANM TOT ISUP: RCV ANM TOT ISUP: XMIT BLO TOT ISUP: RCV BLO TOT ISUP: XMIT BLA TOT ISUP: RCV BLA TOT ISUP: XMIT CPG TOT ISUP: RCV CPG TOT ISUP: XMIT CGB TOT ISUP: RCV CGB TOT ISUP: XMIT CGBA TOT ISUP: RCV CGBA TOT ISUP: XMIT GRS TOT ISUP: RCV GRS TOT ISUP: XMIT GRA TOT ISUP: RCV GRA TOT ISUP: XMIT CGU TOT ISUP: RCV CGU TOT ISUP: XMIT CGUA TOT ISUP: RCV CGUA TOT ISUP: XMIT CFN TOT ISUP: RCV CFN TOT ISUP: XMIT CON TOT ISUP: RCV CON TOT ISUP: XMIT IAM TOT ISUP: RCV IAM TOT ISUP: XMIT INR TOT ISUP: RCV INR TOT ISUP: XMIT REL TOT

Description ISUP Signaling Service Statistics Number of messages transmitted, total Number of messages received, total Number of ACM messages transmitted Number of ACM messages received Number of ANM messages transmitted Number of ANM messages received Number of BLO messages transmitted Number of BLO messages received Number of BLA messages transmitted Number of BLA messages received Number of CPG messages transmitted Number of CPG messages received Number of CGB messages transmitted Number of CGB messages received Number of CGBA messages transmitted Number of CGBA messages received Number of GRS messages transmitted Number of GRS messages received Number of GRA messages transmitted Number of GRA messages received Number of CGU messages transmitted Number of CGU messages received Number of CGUA messages transmitted Number of CGUA messages received Number of CFN messages transmitted Number of CFN messages received Number of CON messages transmitted Number of CON messages received Number of IAM messages transmitted Number of IAM messages received Number of INR messages transmitted Number of INR messages received Number of REL messages transmitted

Related Components SS7 Point Code or SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-4

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name ISUP-GROUP (continued) ISUP: RCV REL TOT ISUP: XMIT INF TOT ISUP: RCV INF TOT ISUP: XMIT RLC TOT ISUP: RCV RLC TOT ISUP: XMIT RSC TOT ISUP: RCV RSC TOT ISUP: XMIT RES TOT ISUP: RCV RES TOT ISUP: XMIT SAM TOT ISUP: RCV SAM TOT ISUP: XMIT SUS TOT ISUP: RCV SUS TOT ISUP: XMIT UBL TOT ISUP: RCV UBL TOT ISUP: XMIT UBA TOT ISUP: RCV UBA TOT ISUP: XMIT USR TOT ISUP: RCV USR TOT ISUP: XMIT CCR TOT ISUP: RCV CCR TOT ISUP: XMIT COT TOT ISUP: RCV COT TOT ISUP: XMIT CQM TOT ISUP: RCV CQM TOT ISUP: XMIT CQR TOT ISUP: RCV CQR TOT ISUP: XMIT CRA TOT ISUP: RCV CRA TOT ISUP: XMIT CRM TOT ISUP: RCV CRM TOT ISUP: XMIT CVR TOT ISUP: RCV CVR TOT

Description ISUP Signaling Service Statistics (continued) Number of REL messages received Number of INF messages transmitted Number of INF messages received Number of RLC messages transmitted Number of RLC messages received Number of RSC messages transmitted Number of RSC messages received Number of RES messages transmitted Number of RES messages received Number of SAM messages transmitted Number of SAM messages received Number of SUS messages transmitted Number of SUS messages received Number of UBL messages transmitted Number of UBL messages received Number of UBA messages transmitted Number of UBA messages received Number of USR messages transmitted Number of USR messages received Number of CCR messages transmitted Number of CCR messages received Number of COT messages transmitted Number of COT messages received Number of CQM messages transmitted Number of CQM messages received Number of CQR messages transmitted Number of CQR messages received Number of CRA messages transmitted Number of CRA messages received Number of CRM messages transmitted Number of CRM messages received Number of CVR messages transmitted Number of CVR messages received

Related Components SS7 Point Code or SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-5

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name ISUP-GROUP (continued) ISUP: XMIT CVT TOT ISUP: RCV CVT TOT ISUP: XMIT EXM TOT ISUP: RCV EXM TOT ISUP: XMIT FAC TOT ISUP: RCV FAC TOT ISUP: XMIT FOT TOT ISUP: RCV FOT TOT ISUP: XMIT LPA TOT ISUP: RCV LPA TOT ISUP: XMIT PAM TOT ISUP: RCV PAM TOT ISUP: XMIT UCIC TOT ISUP: RCV UCIC TOT ISUP: XMIT FAA TOT ISUP: RCV FAA TOT ISUP: XMIT FAD TOT ISUP: RCV FAD TOT ISUP: XMIT FAR TOT ISUP: RCV FAR TOT ISUP: XMIT FRJ TOT ISUP: RCV FRJ TOT ISUP: XMIT SGM TOT ISUP: RCV SGM TOT ISUP: XMIT MPM TOT ISUP: RCV MPM TOT ISUP: ABN REL TOT ISUP: UNEX MSG TOT ISUP: UNREC MSG TOT ISUP: CHAN MATE UNAVAILABLE ISUP: AOC TOT ISUP: XMIT UPA TOT

Description ISUP Signaling Service Statistics (continued) Number of CVT messages transmitted Number of CVT messages received Number of EXM messages transmitted Number of EXM messages received Number of FAC messages transmitted Number of FAC messages received Number of FOT messages transmitted Number of FOT messages received Number of LPA messages transmitted Number of LPA messages received Number of PAM messages transmitted Number of PAM messages received Number of UCIC messages transmitted Number of UCIC messages received Number of FAA messages transmitted Number of FAA messages received Number of FAD messages transmitted Number of FAD messages received Number of FAR messages transmitted Number of FAR messages received Number of FRJ messages transmitted Number of FRJ messages received Number of SGM messages transmitted Number of SGM messages received Number of MPM messages transmitted Number of MPM messages received Number of abnormal clear messages received Number of unexpected messages received Number of unrecognized messages received Number of Channel Mate Unavailable messages received Number of calls that invoked the advice of charge (AOC) feature Number of UPA messages sent

Related Components SS7 Point Code or SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-6

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name ISUP-GROUP (continued) ISUP: RCV UPA TOT ISUP: XMIT UPT TOT ISUP: RCV UPT TOT ISUP: XMIT BELGACOM1 TOT ISUP: RCV BELGACOM1 TOT ISUP: XMIT BELGACOM2 TOT ISUP: RCV BELGACOM2 TOT ISUP: XMIT EOH TOT ISUP: RCV EOH TOT ISUP: XMIT EOHA TOT ISUP: RCV EOHA TOT ISUP: XMIT NRM TOT ISUP: RCV NRM TOT ISUP: XMIT PRI TOT ISUP: RCV PRI TOT ISUP: XMIT OPR TOT ISUP: RCV OPR TOT ISUP: XMIT CHG TOT ISUP: RCV CHG TOT ISUP: XMIT FWT TOT ISUP: RCV FWT TOT ISUP: XMIT IDR TOT ISUP: RCV IDR TOT ISUP: XMIT IRS TOT ISUP: RCV IRS TOT ISUP: XMIT LPM TOT ISUP: RCV LPM TOT ISUP: XMIT MCID TOT ISUP: RCV MCID TOT ISUP: XMIT BELGACOM1 TOT ISUP: RCV BELGACOM1 TOT ISUP: XMIT BELGACOM2 TOT ISUP: RCV BELGACOM2 TOT

Description ISUP message traffic statistics Number of UPA messages received Number of UPT messages sent Number of UPT messages received Number of BELGACOM1 messages transmitted Number of BELGACOM1 messages received Number of BELGACOM2 messages transmitted Number of BELGACOM2 messages received Number of EOH messages transmitted Number of EOH messages received Number of EOHA messages transmitted Number of EOHA messages received Number of NRM messages transmitted Number of NRM messages received Number of PRI messages transmitted Number of PRI messages received Number of OPR messages transmitted Number of OPR messages received Number of CHG messages transmitted Number of CHG messages received Number of FWT messages transmitted Number of FWT messages received Number of IDR messages transmitted Number of IDR messages received Number of PRI messages transmitted Number of PRI messages received Number of LPM messages transmitted Number of LPM messages received Number of MCID messages transmitted Number of MCID messages received Number of BELGACOM1 messages transmitted Number of BELGACOM1 messages received Number of BELGACOM2 messages transmitted Number of BELGACOM2 messages received

Related Components SS7 Point Code or SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-7

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name ISUP-GROUP (continued) ISUP: XMIT EOH TOT ISUP: RCV EOH TOT ISUP: XMIT EOHA TOT ISUP: RCV EOHA TOT ISUP: XMIT NRM TOT ISUP: RCV NRM TOT ISUP: XMIT PRI TOT ISUP: RCV PRI TOT ISUP: XMIT OPR TOT ISUP: RCV OPR TOT ISUP: XMIT CHG TOT ISUP: RCV CHG TOT ISUP: XMIT FWT TOT ISUP: RCV FWT TOT ISUP: XMIT IDR TOT ISUP: RCV IDR TOT ISUP: XMIT IRS TOT ISUP: RCV IRS TOT ISUP: XMIT LPM TOT ISUP: RCV LPM TOT ISUP: XMIT MCID TOT ISUP: RCV MCID TOT IUA GROUP IUA: ASPUpTx

Description ISUP message traffic statistics Number of EOH messages sent Number of EOH messages received Number of EOHA messages sent Number of EOHA messages received Number of NRM messages sent Number of NRM messages received Number of PRI messages sent Number of PRI messages received Number of OPR messages sent Number of OPR messages received Number of CHG messages sent Number of CHG messages received Number of FWT messages sent Number of FWT messages received Number of IDR messages sent Number of IDR messages received Number of IRS messages sent Number of IRS messages received Number of LPM messages sent Number of LPM messages received Number of MCID messages sent Number of MCID messages received IUA message statistics Number of application server process (ASP) Up messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is ready to receive traffic or maintenance messages. Number of ASP Up Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of ASP Down messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is not ready to receive traffic or maintenance messages.

Related Components SS7 Point Code or SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Association 15, 60, 24

IUA: ASPUpAckRx

15, 60, 24

IUA: ASPDnTx

15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-8

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name IUA GROUP IUA: ASPDnAckRx

Description IUA message statistics Number of ASP Up Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of ASP Active messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is active. Number of ASP Active Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of ASP Inactive messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is inactive. Number of ASP Inactive Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of Error messages received by the Cisco MGC from the media gateway on this SCTP association. Number of Notify messages received by the Cisco MGC from the media gateway on this SCTP association. These messages provide autonomous indications of IUA events on the media gateway. Number of Data messages sent from the Cisco MGC to the media gateway on this SCTP association. Each messages is transmitted through the use of the Q.921 acknowledged information transfer service. Number of Data messages received by the Cisco MGC from the media gateway on this SCTP association. Each message is received through the use of the Q.921 acknowledged information transfer service. Number of Data messages sent from the Cisco MGC to the media gateway on this SCTP association. Each message is transmitted through the use of the Q.21 unacknowledged information transfer service.

Related Components Association

Logging Interval 15, 60, 24

IUA: ASPActTx

15, 60, 24

IUA: ASPActAckRx

15, 60, 24

IUA: ASPInactTx

15, 60, 24

IUA: ASPInactAckRx

15, 60, 24

IUA: ErrorRx

15, 60, 24

IUA: NotifyRx

15, 60, 24

IUA: DataRqt

15, 60, 24

IUA: DataInd

15, 60, 24

IUA: UnitDataRqt

15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-9

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name IUA GROUP (continued) IUA: UnitDataInd

Description IUA message statistics (continued) Number of Data messages received by the Cisco MGC from the media gateway on this SCTP association. Each message is received through the user of the Q.21 unacknowledged information transfer service. Number of requests that an SCTP association be established. Number of confirmations that IUA has established an SCTP association with the media gateway. Number of times that the media gateway has informed Link Management that the Cisco MGC has established an SCTP association.

Related Components Association

Logging Interval 15, 60, 24

IUA: EstRqt IUA: EstConf IUA: EstInd

15, 60, 24 15, 60, 24 15, 60, 24

IUA: RelRqt IUA: RelConf IUA: RelInd

Number of requests for the release of an SCTP association with a media gateway. Number of confirmations that IUA has released an SCTP association with the media gateway. Number of times that the media gateway has informed Link Management that the Cisco MGC has released an SCTP association. Line interface statistics Number of severely errored seconds Number of errored seconds Number of code violations Number of frame slips M3UA message statistics Number of error messages transmitted. Number of error messages received Number of notify messages transmitted Number of notify messages received Number of DUNA messages received Number of DAVA messages received Number of DAUD messages transmitted Number of SCON messages received Number of DRST messages received Number of DUPU messages transmitted Association TDM Link SS7 Link

15, 60, 24 15, 60, 24 15, 60, 24

LIF GROUP LIF: SES, 15/10, 60/30, 24/200 LIF: ES LIF: CODE VIOLATION LIF: FRAME SLIP
Note

15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

The LIF GROUP measurements are obsolete as of Release 9.2 of the Cisco MGC software 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

M3UA GROUP M3UA: ErrorTx M3UA: ErrorRx M3UA: NotifyTx M3UA: NotifyRx M3UA: DunaRx M3UA: DavaRx M3UA: DaudTx M3UA: SconRx M3UA: DrstRx M3UA: DupuRx

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-10

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name M3UA GROUP (continued) M3UA: ASPUpTx M3UA: ASPDnTx M3UA: ASPUpAckRx M3UA: ASPDnAckRx M3UA: ASPActTx M3UA: ASPInactTx M3UA: AspActAckRx M3UA: AspInactAckRx M3UA: DataXferTx M3UA: DataXferRx M3UA: DataBytesTx M3UA: DataBytesRx M3UA: InvSctpSig M3UA: AssocFail M3UA: AssocTxFail M3UA: RxVersionErr M3UA: RxMsgClassErr M3UA: RxMsgTypeErr M3UA: RxMsgLenErr M3UA: RxStrmIdErr

Description M3UA message statistics Number of ASP UP messages transmitted Number of ASP DOWN messages transmitted Number of ASP UP acknowledgements received Number of ASP DOWN acknowledge messages received Number of ASP ACTIVE messages transmitted Number of ASP INACTIVE messages transmitted Number of ASP ACTIVE ACK messages received Number of ASP INACTIVE ACK messages received Number of DATA transfer messages transmitted Number of DATA transfer messages received Number of M3UA data bytes transmitted Number of M3UA data bytes received Number of invalid SCTP signals received by M3UA Number of SCTP association failures Number of transmit SCTP failures Number of messages received with an invalid version Number of received messages with an unexpected or unsupported Message Class Number of messages received with an unexpected or unsupported Message Type Number of messages received with length error Number of messages received with stream ID error, when a message is received on an unexpected SCTP stream (for example, a Management message was received on a stream other than "0") Number of unexpected messages received - a defined and recognized message is received that is not expected in the current state

Related Components Association

Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

M3UA: RxUnexpMsgErr

15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-11

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name M3UA GROUP (continued) M3UA: RxProtErr

Description M3UA message statistics Number of messages received with protocol errors, for any protocol anomaly (that is, reception of a parameter that is syntactically correct but unexpected in the current state). Number of messages received with parameter value errors Number of messages received with a parameter having a wrong length field Number of messages received that contain one or more invalid parameters Number of messages received with an invalid (unconfigured) Network Appearance. Number of messages received with an invalid (unconfigured) Routing Context. Number of messages that were dumped because memory ran out (buffer overflow). National User Part Statistics Number of messages transmitted, total Number of messages received, total Number of unexpected messages received Overload Statistics Number of minutes in level 1 overload condition Number of minutes in level 2 overload condition Number of minutes in level 3 overload condition Number of minutes in level 0 overload condition Number of transitions from level 0 to level 1 overload condition Number of transitions from level 0 to level 2 overload condition Number of transitions from level 0 to level 3 overload condition ISDN PRI Link statistics

Related Components Association

Logging Interval 15, 60, 24

M3UA: RxParmValErr M3UA: RxParmFieldErr M3UA: RxUnexpParmErr M3UA: RxNtwkAppErr M3UA: RouteCntxErr M3UA: RxNoMemErr NUP-GROUP NUP: XMIT MSG TOT NUP: RCV MSG TOT NUP: UNEX MSG TOT OVL-GROUP OVL: LVL1 Duration OVL: LVL2 Duration OVL: LVL3 Duration OVL: LVL0 Duration OVL: LVL0-LVL1 TOT OVL: LVL0-LVL2 TOT OVL: LVL0-LVL3 TOT PRI-GROUP

15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 SS7 Signaling Service

5, 30 5, 30 5, 30

MGC Network Element

15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

PRI: CHAN MATE UNAVAILABLE Number of times ISDN PRI link channel mate unavailable

IPFAS Signaling Service

15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-12

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SC-GROUP SC: XMIT FRM TOT SC: RCV FRM TOT SC: RCV BAD CRC SC: RCV BAD TOT SC: RCV FRMR SC: RCV RESET SCCP-GROUP SCCP:ROUTING FAILURE SCCP: UDT XMIT SCCP: UDTS XMIT SCCP: UDT RCV SCCP: UDTS RCV SCCP: TOTAL MSG SCTP-GROUP SCTP: OOTB SCTP: InvalidChksum SCTP: CtrlTx SCTP: OrdDataTx SCTP: UnordDataTx SCTP: CtrlRx SCTP: OrdDataRx SCTP: UnordDataRx SCTP: DataSegTx SCTP: DataSegRx SCTP: AssocFailures SCTP: DestFailures SCTP: PeerRestarted SIP-GROUP SIP: XMIT MSG TOT SIP: RCV MSG TOT SIP: RETX INV TOT SIP: RETX BYE TOT SIP: RETX CAN TOT

Description Signaling link statistics Total number of frames transmitted Total number of frames received Number of bad CRCs received Total number of bad frames received Number of bad FRMRs received Number of RESETs received Signaling Connection Control Part statistics Total number of routing failures Number of unit data messages transmitted Number of unit data service messages transmitted Number of unit data messages received Number of unit data service messages received Total number of messages handled SCTP traffic statistics Number of out of the blue packets received. Number of checksum error packets received. Number of control chunks sent. Number of ordered data chunks sent. Number of unordered data chunks sent. Number of control chunks received. Number of ordered data chunks received. Number of unordered data chunks received. Number of SCTP data segments sent. Number of SCTP data segments received. Number of association failures. Number of destination failures. Number of peer restarts. SIP traffic statistics Number of messages transmitted Number of messages received Number of INVITE messages retransmitted Number of BYE messages retransmitted Number of CANCEL messages retransmitted

Related Components SS7 Link

Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

MGC Network Element

5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Association 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 MGC Network Element 30 30 30 30 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-13

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SIP-GROUP (continued) SIP: RETX REG TOT SIP: RETX RESP TOT SIP: RETX MSG TOT SIP: RCV INVALID MSG TOT SIP: XMIT INV TOT SIP: RCV INV TOT SIP: XMIT ACK TOT

Description SIP traffic statistics Number of REGISTER messages retransmitted Number of RESPONSE messages retransmitted Number of retransmitted messages Number of invalid messages received Number of INVITE messages transmitted Number of INVITE messages received Number of ACKnowledgement messages transmitted Number of ACKnowledgement messages received Number of BYE messages transmitted Number of BYE messages received Number of CANCEL messages transmitted Number of CANCEL messages received Number of REGISTER messages transmitted Number of REGISTER messages received Number of OPTION messages transmitted Number of OPTION messages received Number of TRYING messages transmitted Number of TRYING messages received Number of RINGING messages transmitted Number of RINGING messages received Number of CALL IS BEING FORWARDED messages transmitted Number of CALL IS BEING FORWARDED messages received Number of QUEUED messages transmitted Number of QUEUED messages received Number of SESSION PROGRESS messages transmitted Number of SESSION PROGRESS messages received Number of OK messages transmitted Number of OK messages received

Related Components MGC Network Element

Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30

SIP: RCV ACK TOT SIP: XMIT BYE TOT SIP: RCV BYE TOT SIP: XMIT CAN TOT SIP: RCV CAN TOT SIP: XMIT REG TOT SIP: RCV REG TOT SIP: XMIT OPT TOT SIP: RCV OPT TOT SIP: XMIT 100 TOT SIP: RCV 100 TOT SIP: XMIT 180 TOT SIP: RCV 180 TOT SIP: XMIT 181 TOT SIP: RCV 181 TOT SIP: XMIT 182 TOT SIP: RCV 182 TOT SIP: XMIT 183 TOT SIP: RCV 183 TOT SIP: XMIT 200 TOT SIP: RCV 200 TOT

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-14

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SIP-GROUP (continued) SIP: XMIT 300 TOT SIP: RCV 300 TOT SIP: XMIT 301 TOT SIP: RCV 301 TOT SIP: XMIT 302 TOT SIP: RCV 302 TOT SIP: XMIT 305 TOT SIP: RCV 305 TOT SIP: XMIT 380 TOT SIP: RCV 380 TOT SIP: XMIT 400 TOT SIP: RCV 400 TOT SIP: XMIT 401 TOT SIP: RCV 401 TOT SIP: XMIT 402 TOT SIP: RCV 402 TOT SIP: XMIT 403 TOT SIP: RCV 403 TOT SIP: XMIT 404 TOT SIP: RCV 404 TOT SIP: XMIT 405 TOT SIP: RCV 405 TOT

Description SIP traffic statistics (continued) Number of MULTIPLE CHOICES messages transmitted Number of MULTIPLE CHOICES messages received Number of MOVED PERMANENTLY messages transmitted Number of MOVED PERMANENTLY messages received Number of MOVED TEMPORARILY messages transmitted Number of MOVED TEMPORARILY messages received Number of USE PROXY messages transmitted Number of USE PROXY messages received Number of ALTERNATIVE SERVICE messages transmitted Number of ALTERNATIVE SERVICE messages received Number of BAD REQUEST messages transmitted Number of BAD REQUEST messages received Number of UNAUTHORIZED messages transmitted Number of UNAUTHORIZED messages received Number of PAYMENT REQUIRED messages transmitted Number of PAYMENT REQUIRED messages received Number of FORBIDDEN messages transmitted Number of FORBIDDEN messages received Number of NOT FOUND messages transmitted Number of NOT FOUND messages received Number of METHOD NOT ALLOWED messages transmitted Number of METHOD NOT ALLOWED messages received

Related Components MGC Network Element

Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-15

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SIP-GROUP (continued) SIP: XMIT 406 TOT SIP: RCV 406 TOT SIP: XMIT 407 TOT SIP: RCV 407 TOT SIP: XMIT 408 TOT SIP: RCV 408 TOT SIP: XMIT 409 TOT SIP: RCV 409 TOT SIP: XMIT 410 TOT SIP: RCV 410 TOT SIP: XMIT 411 TOT SIP: RCV 411 TOT SIP: XMIT 413 TOT SIP: RCV 413 TOT SIP: XMIT 414 TOT SIP: RCV 414 TOT SIP: XMIT 415 TOT SIP: RCV 415 TOT SIP: XMIT 420 TOT SIP: RCV 420 TOT SIP: XMIT 480 TOT

Description SIP traffic statistics (continued) Number of NOT ACCEPTABLE messages transmitted Number of NOT ACCEPTABLE messages received Number of PROXY AUTHENTICATION REQUIRED messages transmitted Number of PROXY AUTHENTICATION REQUIRED messages received Number of REQUEST TIMEOUT messages transmitted Number of REQUEST TIMEOUT messages received Number of CONFLICT messages transmitted Number of CONFLICT messages received Number of GONE messages transmitted Number of GONE messages received Number of LENGTH REQUIRED messages transmitted Number of LENGTH REQUIRED messages received Number of REQUEST ENTITY TOO LARGE messages transmitted Number of REQUEST ENTITY TOO LARGE messages received Number of REQUEST-URI TOO LONG messages transmitted Number of REQUEST-URI TOO LONG messages received Number of UNSUPPORTED MEDIA TYPE messages transmitted Number of UNSUPPORTED MEDIA TYPE messages received Number of BAD EXTENSION messages transmitted Number of BAD EXTENSION messages received Number of TEMPORARILY NOT AVAILABLE messages transmitted

Related Components MGC Network Element

Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-16

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SIP-GROUP (continued) SIP: RCV 480 TOT SIP: XMIT 481 TOT SIP: RCV 481 TOT SIP: XMIT 482 TOT SIP: RCV 482 TOT SIP: XMIT 483 TOT SIP: RCV 483 TOT SIP: XMIT 484 TOT SIP: RCV 484 TOT SIP: XMIT 485 TOT SIP: RCV 485 TOT SIP: XMIT 486 TOT SIP: RCV 486 TOT SIP: XMIT 487 TOT SIP: RCV 487 TOT SIP: XMIT 500 TOT SIP:RCV 500 TOT SIP: XMIT 501 TOT SIP: RCV 501 TOT SIP: XMIT 502 TOT

Description SIP traffic statistics (continued) Number of TEMPORARILY NOT AVAILABLE messages received Number of CALL LEG/ TRANSACTION DOES NOT EXIST messages transmitted Number of CALL LEG/ TRANSACTION DOES NOT EXIST messages received Number of LOOP DETECTED messages transmitted Number of LOOP DETECTED messages received Number of TOO MANY HOPS messages transmitted Number of TOO MANY HOPS messages received Number of ADDRESS INCOMPLETE messages transmitted Number of ADDRESS INCOMPLETE messages received Number of AMBIGUOUS messages transmitted Number of AMBIGUOUS messages received Number of BUSY HERE messages transmitted Number of BUSY HERE messages received Number of REQUEST CANCELLED messages transmitted Number of REQUEST CANCELLED messages received Number of INTERNAL SERVER ERROR messages transmitted Number of INTERNAL SERVER ERROR messages transmitted Number of NOT IMPLEMENTED messages transmitted Number of NOT IMPLEMENTED messages received Number of BAD GATEWAY messages transmitted

Related Components MGC Network Element

Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-17

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SIP-GROUP (continued) SIP: RCV 502 TOT SIP: XMIT 503 TOT SIP: RCV 503 TOT SIP: XMIT 504 TOT

Description SIP traffic statistics (continued) Number of BAD GATEWAY messages received Number of SERVICE UNAVAILABLE messages transmitted Number of SERVICE UNAVAILABLE messages received Number of GATEWAY TIMEOUT messages transmitted Number of GATEWAY TIMEOUT messages received Number of SIP VERSION NOT SUPPORTED messages transmitted Number of SIP VERSION NOT SUPPORTED messages received Number of BUSY EVERYWHERE messages transmitted Number of BUSY EVERYWHERE messages received Number of DECLINE messages transmitted Number of DECLINE messages received Number of DOES NOT EXIST ANYWHERE messages transmitted Number of DOES NOT EXIST ANYWHERE messages received Number of NOT ACCEPTABLE messages transmitted Number of NOT ACCEPTABLE messages received Number of PRACK messages retransmitted Number of PRACK messages transmitted Number of PRACK messages received Number of SIP to SIP calls attempted Number of SIP to SIP calls completed

Related Components MGC Network Element

Logging Interval

30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30

SIP: RCV 504 TOT SIP: XMIT 505 TOT SIP: RCV 505 TOT SIP: XMIT 600 TOT SIP: RCV 600 TOT SIP: XMIT 603 TOT SIP: RCV 603 TOT SIP: XMIT 604 TOT SIP: RCV 604 TOT SIP: XMIT 606 TOT SIP: RCV 606 TOT SIP: RETX PRACK TOT SIP: XMIT PRACK TOT SIP: RCV PRACK TOT SIP: SIP2SIP CALLS ATTEMPT SIP: SIP2SIP CALLS COMPL

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-18

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SIPLINK-GROUP SIPLINK: XMIT MSG TOT SIPLINK: RCV MSG TOT SIPLINK: XMIT FAIL TOT SIPLINK: RCV FAIL TOT SIPLINK: DNS QUERY TOT SIPLINK: DNS TIMEOUT TOT SIPLINK: BAD URL TOT SIPLINK: DNS CACHE NEW TOT SIPLINK: DNS CACHE PURGE TOT SIPLINK: DNS CACHE REFRESHED TOT SIPLINK: ICMP ERR TOT SP-GROUP SP: cInit in SP: cInit out SP: PDU in SP: PDU out SP: Blacklist Call Ctr SP: COT Failure
Note

Description SIP link statistics Number of messages transmitted Number of messages received Number of UPD transmitted failed Number of UPD received failed Number of DNS queries Number of DNS timeouts Number of unresolved URLs Number of new entries in the DNS cache Number of entries purged from the DNS cache Number of entries refreshed in the DNS cache Number of ICMP errors Signaling service statistics Number of call init messages received Number of call init messages sent Number of messages received Number of messages sent Number of blacklist calls counter Number of COT failures User Defined Statistics Number of CDBs transmitted User defined count 1 User defined count 2 User defined count 3 User defined count 4 User defined count 5 User defined count 6 User defined count 7 User defined count 8 User defined count 9 User defined count 10

Related Components MGC Network Element

Logging Interval 30 30 30 30 30 30 30 30 30 30 30

Signaling Services: SS7 EISUP IPFAS MGCP

15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

The SP: Blacklist Call Ctr and SP: COT Failure measurements are not currently supported. MGC Network Element 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

STATE-GROUP STATE: CDB ReCord Xmit STATE: User Count1 STATE: User Count2 STATE: User Count3 STATE: User Count4 STATE: User Count5 STATE: User Count6 STATE: User Count7 STATE: User Count8 STATE:User Count 9 STATE: User Count10

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-19

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name STATE-GROUP (continued) STATE: User Count11 STATE: User Count12 STATE: User Count13 STATE: User Count14 STATE: User Count15 STATE: User Count16 STATE: User Count17 STATE: User Count18 STATE: User Count19 STATE: User Count20 STATE: User Count21 STATE: User Count22 STATE: User Count23 STATE: User Count24 STATE: User Count25 SUA GROUP SUA: ErrorTx SUA: ErrorRx SUA: NotifyTx SUA: NotifyRx SUA: DunaRx SUA: DavaRx SUA: DaudTx SUA: SconRx SUA: DrstRx SUA: DupuRx SUA: ASPUpTx SUA: ASPDnTx SUA: ASPUpAckRx SUA: ASPDnAckRx SUA: ASPActTx SUA: ASPInactTx

Description User Defined Statistics User defined count 11 User defined count 12 User defined count 13 User defined count 14 User defined count 15 User defined count 16 User defined count 17 User defined count 18 User defined count 19 User defined count 20 User defined count 21 User defined count 22 User defined count 23 User defined count 24 User defined count 25 SUA message statistics Number of error messages transmitted Number of error messages received Number of notify messages transmitted Number of notify messages received Number of DUNA messages received Number of DAVA messages received Number of DAUD messages transmitted Number of SCON messages received Number of DRST messages received Number of DUPU messages transmitted Number of ASP UP messages transmitted Number of ASP DOWN messages transmitted Number of ASP UP acknowledgements received Number of ASP DOWN acknowledge messages received Number of ASP ACTIVE messages transmitted Number of ASP INACTIVE messages transmitted

Related Components MGC Network Element

Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

Association 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-20

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SUA GROUP (continued) SUA: AspActAckRx SUA: AspInactAckRx SUA: CldtTx SUA: CldrRx SUA: DataBytesTx SUA: DataBytesRx SUA: InvSctpSig SUA: AssocFail SUA: AssocTxFail SUA: RxVersionErr SUA: RxMsgClassErr

Description SUA message statistics Number of ASP ACTIVE ACK messages received Number of ASP INACTIVE ACK messages received Number of Connectionless Data Transfers sent Number of Connectionless Data Responses received Number of SUA data bytes transmitted Number of SUA data bytes received Number of invalid SCTP signals received by SUA Number of SCTP association failures Number of transmit SCTP failures Number of messages received with an invalid version. Number of received messages with an unexpected or unsupported Message Class. Number of messages received with an unexpected or unsupported Message Type Number of messages received with length error Number of messages received with stream ID error, when a message is received on an unexpected SCTP stream (that is, a Management message was received on a stream other than "0") Number of unexpected messages received, a defined and recognized message is received that is not expected in the current state Number of messages received with protocol errors, for any protocol anomaly (that is, reception of a parameter that is syntactically correct but unexpected in the current state). Number of messages received with parameter value errors Number of messages received with a parameter having a wrong length field Number of messages received that contain one or more invalid parameters

Related Components Association

Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

SUA: RxMsgTypeErr SUA: RxMsgLenErr SUA: RxStrmIdErr

15, 60, 24 15, 60, 24 15, 60, 24

SUA: RxUnexpMsgErr

15, 60, 24

SUA: RxProtErr

15, 60, 24

SUA: RxParmValErr SUA: RxParmFieldErr SUA: RxUnexpParmErr

15, 60, 24 15, 60, 24 15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-21

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name SUA GROUP (continued) SUA: RxNtwkAppErr SUA: RouteCntxErr SUA: RxNoMemErr TALI-GROUP TALI: XMIT SCCP TOT TALI: RCV SCCP TOT TALI: XMIT ISUP TOT TALI: RCV ISUP TOT TALI: XMIT MTP3 TOT TALI: RCV MTP3 TOT TALI: XMIT TEST TOT TALI: RCV TEST TOT TALI: XMIT ALLO TOT TALI: RCV ALLO TOT TALI: XMIT PROH TOT TALI: RCV PROH TOT TALI: XMIT PROA TOT TALI: RCV PROA TOT TALI: XMIT MONI TOT TALI: RCV MONI TOT TALI: XMIT MONA TOT TALI: RCV MONA TOT TALI: XMIT RKRP TOT TALI: RCV RKRP TOT TALI: XMIT MGMT TOT TALI: RCV MGMT TOT

Description SUA message statistics Number of messages received with an invalid (unconfigured) Network Appearance. Number of messages received with an invalid (unconfigured) Routing Context. Number of messages that were dumped because memory ran out (buffer overflow). TALI traffic statistics Number of SCCP service messages sent Number of SCCP service messages received Number of ISUP service messages sent Number of ISUP service messages received Number of MTP Level 3 service messages sent Number of MTP Level 3 service messages received Number of Test service messages sent Number of Test service messages received Number of Allow messages sent Number of Allow messages received Number of Prohibit messages sent Number of Prohibit messages received Number of Prohibit Acknowledge messages sent Number of Prohibit Acknowledge messages received Number of Monitor messages sent Number of Monitor messages received Number of Monitor Acknowledge messages sent Number of Monitor Acknowledge messages received Number of Routing Key Registration messages sent Number of Routing Key Registration messages received Number of Management messages sent Number of Management messages received

Related Components Association

Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24

SS7 Signaling Gateway IP Link

15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-22

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name TALI-GROUP (continued) TALI: XMIT TOT TALI: RCV VALID TOT TALI: RCV INVALID TOT TALI-RSP-GROUP TALI: MIN RSP TIME TALI: AVG RSP TIME TALI: MAX RSP TIME TCAP-GROUP TCAP: MSG XMIT TCAP: QWP XMIT TCAP: RSP XMIT TCAP: UNI XMIT TCAP: ABT XMIT TCAP: MSG RCV TCAP: QWP RCV TCAP: RSP RCV TCAP: UNI RCV TCAP: ABT RCV TCAP: MSG DROP TCAP: MSG UNREC TCAP: BEGIN XMIT

Description TALI traffic statistics (continued) Number of messages sent Number of valid messages received Number of invalid messages received TALI Response statistics Minimum response time in milliseconds Average response time in milliseconds Maximum response time in milliseconds Transaction Capabilities Application Part statistics Total number of messages transmitted Number of Query with permission messages transmitted Number of Response messages transmitted Number of Unidirectional messages transmitted Number of Abort messages transmitted Total number of messages received Number of Query with permission messages received Number of Response messages received Number of Unidirectional messages received Number of Abort messages received Number of messages dropped Number of unrecognized messages received Number of Begin messages transmitted. This measurement is valid only for ETSI and ITU TCAP. Number of Begin messages received. This measurement is valid only for ETSI and ITU TCAP. Number of End messages transmitted. This measurement is valid only for ETSI and ITU TCAP. Number of End messages received. This measurement is valid only for ETSI and ITU TCAP.

Related Components SS7 Signaling Gateway IP Link

Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24

SS7 Signaling Gateway IP Link

5 5 5

MGC Network Element 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

TCAP: BEGIN RCV

5, 30

TCAP: END XMIT

5, 30

TCAP: END RCV

5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-23

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name TCAP-GROUP (continued) TCAP: CONTINUE XMIT

Description Transaction Capabilities Application Part statistics (continued) Number of Continue messages transmitted. This measurement is valid only for ETSI and ITU TCAP. Number of Continue messages received. This measurement is valid only for ETSI and ITU TCAP. Number of Conversation messages transmitted. This measurement is valid only for ANSI TCAP. Number of Conversation messages received. This measurement is valid only for ANSI TCAP. Telephone User Part statistics Number of messages transmitted, total Number of messages received, total Number of ACB messages transmitted Number of ACB messages received Number of ACC messages transmitted Number of ACC messages received Number of ACM messages transmitted Number of ACM messages received Number of ADI messages transmitted Number of ADI messages transmitted Number of ANC messages received Number of ANC messages transmitted Number of ANN messages received Number of ANN messages transmitted Number of ANU messages received Number of ANU messages transmitted Number of BLO messages received Number of BLO messages transmitted Number of BLA messages received Number of BLA messages transmitted Number of CBK messages received Number of CBK messages transmitted

Related Components MGC Network Element

Logging Interval

5, 30

TCAP: CONTINUE RCV

5, 30

TCAP: CONV XMIT

5, 30

TCAP: CONV RCV TUP-GROUP TUP: XMIT MSG TOT TUP: RCV MSG TOT TUP: XMIT ACB TOT TUP: RCV ACB TOT TUP: XMIT ACC TOT TUP: RCV ACC TOT TUP: XMIT ACM TOT TUP: RCV ACM TOT TUP: XMIT ADI TOT TUP: RCV ADI TOT TUP: XMIT ANC TOT TUP: RCV ANC TOT TUP: XMIT ANN TOT TUP: RCV ANN TOT TUP: XMIT ANU TOT TUP: RCV ANU TOT TUP: XMIT BLO TOT TUP: RCV BLO TOT TUP: XMIT BLA TOT TUP: RCV BLA TOT TUP: XMIT CBK TOT TUP: RCV CBK TOT

5, 30 SS7 Signaling Service

5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5,30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-24

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name TUP-GROUP (continued) TUP: XMIT CCF TOT TUP: RCV CCF TOT TUP: XMIT CCL TOT TUP: RCV CCL TOT TUP: XMIT CCR TOT TUP: RCV CCR TOT TUP: XMIT CFL TOT TUP: RCV CFL TOT TUP: XMIT CGC TOT TUP: RCV CGC TOT TUP: XMIT CHG TOT TUP: RCV CHG TOT TUP: XMITCLF TOT TUP: RCV CLF TOT TUP: XMIT COT TOT TUP: RCV COT TOT TUP: XMIT DPN TOT TUP: RCV DPN TOT TUP: XMIT EUM TOT TUP: RCV EUM TOT TUP: XMIT FOT TOT TUP: RCV FOT TOT TUP: XMIT GRA TOT TUP: RCV GRA TOT TUP: XMIT GRQ TOT TUP: RCV GRQ TOT TUP: XMIT GRS TOT TUP: RCV GRS TOT TUP: XMIT GSM TOT TUP: RCV GSM TOT TUP: XMIT HBA TOT TUP: RCV HBA TOT TUP: XMIT HGB TOT

Description Telephone User Part statistics (continued) Number of CCF messages received Number of CCF messages transmitted Number of CCL messages received Number of CCL messages transmitted Number of CCR messages received Number of CCR messages transmitted Number of CFL messages received Number of CFL messages transmitted Number of CGC messages received Number of CGC messages transmitted Number of CHG messages transmitted Number of CHG messages received Number of CLF messages transmitted Number of CLF messages received Number of COT messages transmitted Number of COT messages received Number of DPN messages transmitted Number of DPN messages received Number of EUM messages transmitted Number of EUM messages received Number of FOT messages transmitted Number of FOT messages received Number of GRA messages transmitted Number of GRA messages received Number of GRQ messages transmitted Number of GRQ messages received Number of GRS messages transmitted Number of GRS messages received Number of GSM messages transmitted Number of GSM messages received Number of HBA messages transmitted Number of HBA messages received Number of HGB messages transmitted

Related Components SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-25

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name TUP-GROUP (continued) TUP: RCV HGB TOT TUP: XMIT HGU TOT TUP: RCV HGU TOT TUP: XMIT HUA TOT TUP: RCV HUA TOT TUP: XMIT IAI TOT TUP: RCV IAI TOT TUP: XMIT IAM TOT TUP: RCV IAM TOT TUP: XMIT LOS TOT TUP: RCV LOS TOT TUP: XMIT MAL TOT TUP: RCV MAL TOT TUP: XMIT MBA TOT TUP: RCV MBA TOT TUP: XMIT MGB TOT TUP: RCV MGB TOT TUP: XMIT MGU TOT TUP: RCV MGU TOT TUP: XMIT MPM TOT TUP: RCV MPM TOT TUP: XMIT MUA TOT TUP: RCV MUA TOT TUP: XMIT NNC TOT TUP: RCV NNC TOT TUP: XMIT OPR TOT TUP: RCV OPR TOT TUP: XMIT RAN TOT TUP: RCV RAN TOT TUP: XMIT RLG TOT TUP: RCV RLG TOT TUP: XMIT RSC TOT TUP: RCV RSC TOT

Description Telephone User Part statistics (continued) Number of HGB messages received Number of HGU messages transmitted Number of HGU messages received Number of HUA messages transmitted Number of HUA messages received Number of IAI messages transmitted Number of IAI messages received Number of IAM messages transmitted Number of IAM messages received Number of LOS messages transmitted Number of LOS messages received Number of MAL messages transmitted Number of MAL messages received Number of MBA messages transmitted Number of MBA messages received Number of MGB messages transmitted Number of MGB messages received Number of MGU messages transmitted Number of MGU messages received Number of MPM messages transmitted Number of MPM messages received Number of MUA messages transmitted Number of MUA messages received Number of NNC messages transmitted Number of NNC messages received Number of OPR messages transmitted Number of OPR messages received Number of RAN messages transmitted Number of RAN messages received Number of RLG messages transmitted Number of RLG messages received Number of RSC messages transmitted Number of RSC messages received

Related Components SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-26

OL-0800-06

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name TUP-GROUP (continued) TUP: XMIT SAM TOT TUP: RCV SAM TOT TUP: XMIT SAO TOT TUP: RCV SAO TOT TUP: XMIT SBA TOT TUP: RCV SBA TOT TUP: XMIT SEC TOT TUP: RCV SEC TOT TUP: XMIT SGB TOT TUP: RCV SGB TOT TUP: XMIT SGU TOT TUP: RCV SGU TOT TUP: XMIT SLB TOT TUP: RCV SLB TOT TUP: XMIT SSB TOT TUP: RCV SSB TOT TUP: XMIT SST TOT TUP: RCV SST TOT TUP: XMIT STB TOT TUP: RCV STB TOT TUP: XMIT SUA TOT TUP: RCV SUA TOT TUP: XMIT UBA TOT TUP: RCV UBA TOT TUP: XMIT UBL TOT TUP: RCV UBL TOT TUP: XMIT UNN TOT TUP: RCV UNN TOT TUP: ABN REL TOT TUP: UNEX MSG TOT TUP: UNREC MSG TOT TUP: CHAN MATE UNAVILABLE TUP: XMIT ACF TOT

Description Telephone User Part statistics (continued) Number of SAM messages transmitted Number of SAM messages received Number of SAO messages transmitted Number of SAO messages received Number of SBA messages transmitted Number of SBA messages received Number of SEC messages transmitted Number of SEC messages received Number of SGB messages transmitted Number of SGB messages received Number of SGU messages transmitted Number of SGU messages received Number of SLB messages transmitted Number of SLB messages received Number of SSB messages transmitted Number of SSB messages received Number of SST messages transmitted Number of SST messages received Number of STB messages transmitted Number of STB messages received Number of SUA messages transmitted Number of SUA messages received Number of UBA messages transmitted Number of UBA messages received Number of UBL messages transmitted Number of UBL messages received Number of UNN messages transmitted Number of UNN messages received Number of abnormal clear messages received Number of unexpected messages received Number of unrecognized messages received Number of Channel Mate Unavailable messages received Number of ACF messages transmitted

Related Components SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-27

Appendix D

Cisco MGC Measurements

Table D-1

Operational Measurements Supported (continued)

MML Counter Group:Name TUP-GROUP (continued) TUP: RCV ACF TOT TUP: XMIT AUU TOT TUP: RCV AUU TOT TUP: XMIT CBU TOT TUP: RCV CBU TOT TUP: XMIT CHA TOT TUP: RCV CHA TOT TUP: XMIT CHP TOT TUP: RCV CHP TOT TUP: XMIT CHT TOT TUP: RCV CHT TOT TUP: XMIT CLU TOT TUP: RCV CLU TOT TUP: XMIT GSE TOT TUP: RCV GSE TOT TUP: XMIT IAF TOT TUP: RCV IAF TOT TUP: XMIT ICF TOT TUP: RCV ICF TOT TUP: XMIT SNA TOT TUP: RCV SNA TOT TUP: XMIT MPR TOT TUP: RCV MPR TOT

Description Telephone User Part statistics (continued) Number of ACF messages received Number of AUU messages transmitted Number of AUU messages received Number of CBU messages transmitted Number of CBU messages received Number of CHA messages transmitted Number of CHA messages received Number of CHP messages transmitted Number of CHP messages received Number of CHT messages transmitted Number of CHT messages received Number of CLU messages transmitted Number of CLU messages received Number of GSE messages transmitted Number of GSE messages received Number of IAF messages transmitted Number of IAF messages received Number of ICF messages transmitted Number of ICF messages received Number of SNA messages transmitted Number of SNA messages received Number of MPR messages transmitted Number of MPR messages received

Related Components SS7 Signaling Service

Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-28

OL-0800-06

Appendix D

Cisco MGC Measurements ANSI ISUP Measurements

ANSI ISUP Measurements


Table D-2 provides a list of the ANSI ISUP measurements available from the Cisco MGC.
Table D-2 Cisco Media Gateway Controller ANSI ISUP Measurements

ANSI Measurement Name CountSentMessages CountReceivedMessages CountSentACM

MML Counter Group:Name ISUP: XMIT MSG TOT ISUP: RCV MSG TOT ISUP: XMIT ACM TOT

Description count of every message sent count of every message received count of every Address Complete Message (ACM) received count of every ACM sent count of every Answer Message (ANM) received count of every ANM sent count of every Blocking (BLO) message received count of every BLO message sent count of every Blocking Acknowledgement (BLA) message received count of every BLA message sent count of every Current Cell Rate (CCR) message received count of every CCR message sent count of every Confusion (CFN) message received count of every CFN message sent count of every Circuit Group Blocking (CGB) message received count of every CGB message sent count of every Circuit Group Blocking Acknowledgement (CGBA) message received count of every CGBA message sent count of every Circuit Group Unblocking (CGU) message received

CountReceivedACM CountSentANM CountReceivedANM CountSentBLO CountReceivedBLO CountSentBLA

ISUP: RCV ACM TOT ISUP: XMIT ANM TOT ISUP: RCV ANM TOT ISUP: XMIT BLO TOT ISUP: RCV BLO TOT ISUP: XMIT BLA TOT

CountReceivedBLA CountSentCCR CountReceivedCCR CountSentCFN CountReceivedCFN CountSentCGB

ISUP: RCV BLA TOT ISUP: XMIT CCR TOT ISUP: RCV CCR TOT ISUP: XMIT CFN TOT ISUP: RCV CFN TOT ISUP: XMIT CGB TOT

CountReceivedCGB CountSentCGBA

ISUP: RCV CGB TOT ISUP: XMIT CGBA TOT

CountReceivedCGBA CountSentCGU

ISUP: RCV CGBA TOT ISUP: XMIT CGU TOT

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-29

Appendix D ANSI ISUP Measurements

Cisco MGC Measurements

Table D-2

Cisco Media Gateway Controller ANSI ISUP Measurements (continued)

ANSI Measurement Name CountReceivedCGU CountSentCGUA

MML Counter Group:Name ISUP: RCV CGU TOT ISUP: XMIT CGUA TOT

Description count of every CGU message sent count of every Circuit Group Unblocking Acknowledgement (CGUA) message received count of every CGUA sent count of every Continuity Check (COT) message received count of every COT message sent count of every Call Progress (CPG) message received count of every CPG message sent count of every Circuit Group Query Message (CQM) received count of every CQM sent count of every Circuit Group Query Response (CQR) message received count of every CQR message sent count of every Circuit Reservation Acknowledgement (CRA) message received count of every CRA message sent count of every Cell Rate Margin (CRM) message received count of every CRM message sent count of every Circuit Validation Response (CVR) message received count of every CVR message sent count of every Circuit Validation Test (CVT) message received count of every CVT message sent count of every Exit Message (EXM) received count of every EXM sent

CountReceivedCGUA CountSentCOT CountReceivedCOT CountSentCPG CountReceivedCPG CountSentCQM CountReceivedCQM CountSentCQR

ISUP: RCV CGUA TOT ISUP: XMIT COT TOT ISUP: RCV COT TOT ISUP: XMIT CPG TOT ISUP: RCV CPG TOT ISUP: XMIT CQM TOT ISUP: RCV CQM TOT ISUP: XMIT CQR TOT

CountReceivedCQR CountSentCRA

ISUP: RCV CQR TOT ISUP: XMIT CRA TOT

CountReceivedCRA CountSentCRM CountReceivedCRM CountSentCVR

ISUP: RCV CRA TOT ISUP: XMIT CRM TOT ISUP: RCV CRM TOT ISUP: XMIT CVR TOT

CountReceivedCVR CountSentCVT CountReceivedCVT CountSentEXM CountReceivedEXM

ISUP: RCV CVR TOT ISUP: XMIT CVT TOT ISUP: RCV CVT TOT ISUP: XMIT EXM TOT ISUP: RCV EXM TOT

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-30

OL-0800-06

Appendix D

Cisco MGC Measurements ANSI ISUP Measurements

Table D-2

Cisco Media Gateway Controller ANSI ISUP Measurements (continued)

ANSI Measurement Name CountSentFAC CountReceivedFAC CountSentFOT CountReceivedFOT CountSentGRS CountReceivedGRS CountSentGRA

MML Counter Group:Name ISUP: XMIT FAC TOT ISUP: RCV FAC TOT ISUP: XMIT FOT TOT ISUP: RCV FOT TOT ISUP: XMIT GRS TOT ISUP: RCV GRS TOT ISUP: XMIT GRA TOT

Description count of every Facility (FAC) message received count of every FAC message sent count of every Forward Transfer (FOT) message received count of every FOT message sent count of every Circuit Group Reset (GRS) message received count of every GRS message sent count of every Circuit Group Reset Acknowledgment (GRA) message received count of every GRA message sent count of every Initial Address Message (IAM) received count of every IAM sent count of every INF received count of every INF sent count of every INR received count of every INR sent count of every Loop Back Acknowledgement (LPA) message received count of every LPA message sent count of every Pass Along Message (PAM) received count of every PAM sent count of every Release (REL) message received count of every REL message sent count of every Release Complete (RLC) received count of every RLC message sent count of every Reset Circuit (RSC) message received count of every RSC message sent count of every Resume (RES) message received count of every RES message sent

CountReceivedGRA CountSentIAM CountReceivedIAM CountSentINF CountReceivedINF CountSentINR CountReceivedINR CountSentLPA

ISUP: RCV GRA TOT ISUP: XMIT IAM TOT ISUP: RCV IAM TOT ISUP: XMIT INF TOT ISUP: RCV INF TOT ISUP: XMIT INR TOT ISUP: RCV INR TOT ISUP: XMIT LPA TOT

CountReceivedLPA CountSentPAM CountReceivedPAM CountSentREL CountReceivedREL CountSentRLC CountReceivedRLC CountSentRSC CountReceivedRSC CountSentRES CountReceivedRES

ISUP: RCV LPA TOT ISUP: XMIT PAM TOT ISUP: RCV PAM TOT ISUP: XMIT REL TOT ISUP: RCV REL TOT ISUP: XMIT RLC TOT ISUP: RCV RLC TOT ISUP: XMIT RSC TOT ISUP: RCV RSC TOT ISUP: XMIT RES TOT ISUP: RCV RES TOT

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

D-31

Appendix D ANSI ISUP Measurements

Cisco MGC Measurements

Table D-2

Cisco Media Gateway Controller ANSI ISUP Measurements (continued)

ANSI Measurement Name CountSentSUS CountReceivedSUS CountSentUBL CountReceivedUBL CountSentUBA

MML Counter Group:Name ISUP: XMIT SUS TOT ISUP: RCV SUS TOT ISUP: XMIT UBL TOT ISUP: RCV UBL TOT ISUP: XMIT UBA TOT

Description count of every Suspend (SUS) message received count of every SUS message sent count of every Unblocking (UBL) message received count of every UBL message sent count of every Unblocking Acknowledgement (UBA) message received count of every UBA message received count of every Unequipped Carrier Identification Code (UCIC) message sent count of every UCIC message received count of every User-to-User Information (USR) message sent count of every USR message received count of release messages not normal clearing count of unexpected messages count of unrecognized messages count of when B mate not there

CountReceivedUBA CountSentUCIC

ISUP: RCV UBA TOT ISUP: XMIT UCIC TOT

CountReceivedUCIC CountSentUSR CountReceivedUSR CountAbnormalReleases CountUnexpectedMsg CountUnrecognizedMsg CountMatedChanUnavailable

ISUP: RCV UCIC TOT ISUP: XMIT USR TOT ISUP: RCV USR TOT ISUP: ABN REL TOT ISUP: UNEX MSG TOT ISUP: UNREC MSG TOT ISUP: CHAN MATE UNAVAILABLE

Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide

D-32

OL-0800-06

INDEX

A
ACC ACL timer, modifying
3-93 3-81

removing CICs retrieving setting


3-81 3-84 3-95

7-9

administrative state
3-64

alarm associations for ACC MCLs (table) call rejection percentages, managing CANT and skip results matrix (table) deleting a response category call control signaling managing MCL call reject settings, modifying mapping values (table)
3-96 3-97 3-98 3-82 3-91 3-90 3-94

8-120

Cisco MGC retrieving setting


3-61 8-116

default values for MCL thresholds (table)

media gateway retrieving setting retrieving retrieving setting spans retrieving setting trunk group retrieving setting alarm SS7 RTE KEY FAIL resolution
3-83 8-74 3-62 8-117 1-7 3-63 8-119 3-62 8-117 3-61

incoming load control, managing


3-80

signaling service
3-62 8-118

threshold values,modifying threshold values,retrieving values (table)


3-81

MCL to ANSI or ITU congestion standard, mapping 3-95 modifying a response category call control signaling
3-89 3-88

agent management subsystem

outgoing load control, managing response categories

alarm and measurement viewer Alarm Record View tab window (figure)
3-86 3-130

adding on a call control configuration adding on signaling configurations AC power supply front panels (figure) handling (figure) installing
7-10 7-8 7-9 7-10

using alarms

3-128

3-85

acknowledging

8-3 8-10 8-9 8-11

All C7 IP Links Fail resolution

All Conn Cntl Links Fail resolution All ISDN IP Conn Fail resolution

All ISDN BRI IP Conn Fail resolution


8-12

removal and replacement

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-1

Index

All M3UA Assoc Fail resolution All SUA Assoc Fail resolution ANAL ALoopCtrExceeded
8-17

8-14 8-13

Prof_MdfyBFail_AppPtInvld resolution RteStartIndexInvalid resolution


8-32 8-33

8-32

All M3UAKEY Ack Pending resolution


8-16

RteTableFail_GetRteList resolution
8-15

All SUAKEY Ack Pending resolution

RteTableFail_GetTrkAttrdata resolution RteTableFail_GetTrkGrpdata resolution RteTableFail_GetTrunkList resolution

8-34 8-34 8-34 8-35

ATableFail_GetDigMod resolution ATableFail_GetResult resolution BLoopCtrExceeded resolution ATableFlt_DgtRangeError resolution


8-19

8-18 8-18 8-18

TableFail_CondRouteTable resolution TableFail_RouteHolTable resolution TrunkGrpRsltCtrExceeded resolution ANAL/ Rte_TableHopCtrExceeded resolution


8-20

8-36 8-37

BNum_GetFail_SrvcTbl resolution BTableFail_GetDigMod resolution BTableFail_GetDigTree resolution BTableFail_GetResult resolution Cause_GetFail_CauseTbl resolution

8-20

8-33 8-35

BNum_MdfyBFail_AnnounceID resolution
8-20 8-20 8-21 8-22 8-22

TableFail_CondRouteDescTable resolution TableFail_CPCTable resolution TableFail_TMRTable resolution TableFail_TNSTable resolution archived, field descriptions (table) Association Degraded resolution Association Fail resolution
8-38 3-81 8-38 8-38 8-39 8-35 8-36

TableFail_PercRouteTable resolution
8-37 A-5 8-37

8-34, 8-36

Cause_GetFail_DigModTbl resolution Cause_GetFail_LocTbl resolution Cause_GetFail_RsltTbl resolution


8-23 8-23

Cause_GetFail_InvldRsltType resolution

8-23

associations for ACC MCLs (table)


8-24 8-24 8-25

Cause_InvldRslts_CauseTbl resolution

C7DPC CONGESTION resolution C7LNK ALGNMT LOST resolution C7LNK CONGESTION resolution C7LNK INHIBIT resolution C7SLTLnkCong resolution category data, retrieving
8-39 8-39

Cause_MdfyBFail_AnnounceID resolution Cause_MdfyBFail_AppPtInvld resolution Cause_Rte_LoopDetected resolution CustId/StartIdx Missing resolution DataBaseAccessFail resolution Data Failure Rcvd resolution InvalidtrkGrpType resolution dpselection_table_fail resolution
8-27 8-27 8-26 8-25 8-25

3-106 8-40 8-40

Charge Table Access Failure resolution Charge Table Load Failure resolution clearing
8-28 8-28 8-29 8-4

8-28

Prof_GetFail_DigModTbl resolution Prof_GetFail_InvldRslt resolution Prof_GetFail_NOATbl_A resolution Prof_GetFail_NOATbl resolution Prof_GetFail_NPITbl_A resolution Prof_GetFail_NPITbl resolution Prof_GetFail_RsltTbl resolution Prof_InvldNPAValue resolution Prof_InvRslts_NOATbl resolution

Comm Srvc Creation Error resolution Config Fail resolution


8-41 A-2

8-40

data dumper, configuring DISK resolution EISUP/


8-42

8-28 8-30

Dial Plan Loading Failed resolution

8-42

8-29 8-30 8-31 8-31

dumper sink log file parameters (table) Unexpected Msg//Par resolution ENGINE CONFIG FAIL resolution FailoverPeerLost resolution
8-44 8-42

A-2

Prof_InvRslts_NOATbl_A resolution

8-42

8-31

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-2

OL-0800-06

Index

FailoverPeerOOS resolution FAIL resolution


8-43

8-44 8-45

Leg1notifyUnpackError resolution OOS TRAFFIC RE-ROUTE resolution OverloadHeavy resolution


8-45 8-62 8-63 8-62

8-60 8-61

FAIL REMOTE STANDBY resolution FORCE NODE RESTART resolution Gen Fail resolution
8-46

OverloadLight resolution

OverloadMedium resolution
8-47 8-47

Holiday Table Access Failure resolution Holiday Table Load Failure resolution INVALID M3UA RC resolution INVALID SUA RC resolution
8-47 8-48 8-48

OverResIncoming Threshold resolution PC UNAVAIL resolution


8-64 8-64

8-63

Peer IP Links Failure resolution

PEER LINK A FAILURE resolution PEER LINK B FAILURE resolution


8-49

8-65 8-65 8-65

Invalid Virtual_IP_Addr resolution IP RTE CONF FAIL resolution IP RTE FAIL resolution
8-50 8-51 8-50

IP CONNECTION FAILED resolution

PEER MODULE FAILURE resolution POM DynamicReconfiguration resolution INACTIVITY TIMEOUT resolution PEER_SYNC_ERR resolution
8-66

8-66 8-66

ISUP: COT Failure resolution LIF: IDLE CHANGE resolution LIF: LOST CD resolution LIF: LOST CTS resolution LIF BER resolution LIF FAIL resolution LIF LOF resolution LIF LOS resolution LIF SES resolution
8-51 8-51 8-52 8-53 8-53 8-54 8-55

8-54

SESSION TERMINATE resolution PRI:B-Channel not available resolution ProcM No Response resolution ProtocolFileMissing resolution retrieving all
8-3 8-69 8-67 8-67

8-66 8-66

8-55

REPL: all connections failure resolution RSET CONFIG FAIL resolution SC CONFIG FAIL resolution
8-56

8-68

LIF YELLOW resolution MMDB

8-69

M3UA Ack Pending resolution

SC FAIL resolution SC M-OOS resolution


8-57

8-70 8-70 8-70 8-71

Database cause failover resolution Database nearly full resolution Database unavailable resolution NAS AuditResponse Failure resolution CommsFailure resolution ResourceFailure resolution OLC
8-58 8-58

SG Node Interface Fail resolution SG Pair Interface Fail resolution SIP

8-57 8-56

DNS CACHE NEARLY FULL resolution


8-57

8-71

DNS SERVICE OOS resolution OOS resolution


8-72

8-72

SIP Service Fail Over resolution


8-59 8-59

8-72 8-74

SS7 SIG SRVC CONFIG FAIL resolution SS7 SIG SRVC UNAVAIL resolution SSN FAIL resolution status monitoring
8-60 3-6 8-76 8-76 8-73 8-75

Leg1chanDeletedUnpackError resolution Leg1chanModifiedUnpackError resolution Leg1chanOpsFailed resolution


8-61

Standby Warm Start resolution


8-59 8-60

Leg1chanSeizedUnpackError resolution Leg1deleteChanUnpackError resolution

SUAKEY Ack Pending resolution SUPPORT FAILED resolution

Leg1notifyRequestAckUnpackError resolution

8-77

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-3

Index

SwitchoverFail resolution TALI

8-77

automatic congestion control See ACC automatic system log rotation


8-77 3-26

Invalid Protocol Version resolution Invalid State resolution


8-78

Tariff Table Access Failure resolution Tariff Table Load Failure resolution TLC

8-78 8-78

B
backing up system software Cisco MGC software
8-79 8-79 3-27

Leg2chanDeletedUnpackError resolution Leg2chanModifiedUnpackError resolution Leg2chanOpFailed resolution


8-81

MMDB BAMS

3-32

data dumper, configuring


8-79 8-80 8-80

A-4

Leg2chanSeizedUnpackError resolution Leg2deleteChanUnpackError resolution Leg2notifyUnpackError resolution tools for troubleshooting troubleshooting procedures troubleshooting using alarms UCM CCodeModfailed resolution understanding
3-7 3-128 8-84 8-81 8-83 4-4 8-9 8-2 8-80

bearer channels 3.1 KHz calls fail calls, stopping call state audit CIC state mismatch, resolving states, querying CICs blocking
3-60 8-134 8-121 8-123 8-146 3-61

Leg2notifyRequestAckUnpackError resolution

administrative state, retrieving


8-137 8-137

MGCPDIALAuthFail resolution viewing and searching

hung, manually resolving hung, resolving resetting


8-132 8-133

Virtual_IP_Addr Mismatch resolution Wrong IP Path resolution XE Rsrc Fail resolution alarm viewer (figure)
3-129 8-84 8-85

stuck, manually resolving stuck, resolving unblocking


3-131 8-131 8-133

8-134

Cisco MGC, calls fail at


3-128

8-145 8-137

log record view tab window (figure) viewing and searching association alarm resolution associations primary service states (table) secondary service states (table) state, changing state, retrieving
8-99 3-55 3-56 3-56 8-113

Cisco MGC, stopping calls on continuity test, manual


8-142

continuity test, verifying settings ISDN category 3 calls fail managing


3-57 8-146

8-142

ISDN D-channel discrepancies

8-129

media gateway, retrieving states held by media gateway IP destination is OOS media gateway IP links are OOS MGCP media gateway, auditing
8-143 8-140

3-59

8-143

automatic congestion control managing incoming load control managing outgoing load control
3-94 3-109

replication of calls, verifying RLM, modifying timers


8-103

3-58

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-4

OL-0800-06

Index

spans, stopping calls on board layout, SLT brackets


6-18

8-139

viewing

3-142

call trace viewer trace actions


6-8 6-9 6-7, 6-8 3-142 8-151

center mount, installing (figure) chassis, attaching to rack (figure) identifying (figure)
6-7

trace selection 1000 Mbps LED 100 Mbps LED


6-8

Catalyst 5500 MSR


7-3 7-3

front panel, installing forward (figure) rear panel, installing forward (figure)

AC power supply front panel (figure)


7-9 7-10

C
call detail records See CDRs call detail record viewer Config tab window (figure) Query tab window (figure) call engine process calls abnormal termination trace bearer channels, stopping on CICs, stopping on Cisco MGC, fails at hung, diagnosing
8-140 8-145 8-137 8-156 8-137 1-10 1-10 3-133 3-134

handling (figure) installing removing active LED


7-10 7-9 7-2

chassis fan assembly (figure) components, replacing DC power supply CO ground (figure) connectors (figure) front panel (figure) handling (figure) installing removing
7-13 7-11 7-12 7-15 7-12 7-13 7-5

7-16 7-15

chassis fan assembly, removing and replacing

call instance component

Cisco MGC, stopping on


8-154

ejector levers, using (figure)


8-138 8-138

7-6 7-1 7-4

media gateway, stopping on signaling service, stopping on SIP-to-SIP, stopping state audit call trace alternatives deleting files performing starting stopping
8-154 8-152 8-137 8-148

equipment status, checking

Fast Ethernet switching module LEDs (figure)

spans, stopping calls on trunk groups, stopping on

8-139

flash memory card, locating write-protection switch (figure) 7-8 flash memory cards, using with supervisor engine
7-7

8-138

LEDs

7-1 7-3 7-3 7-4 7-4

Ethernet switching module (figure) Ethernet switching module (table)

Fast Ethernet switching module (figure)


8-151

names of open traces, retrieving


8-148 8-149 8-150 4-4

Fast Ethernet switching module (table) route switch module


7-4

supervisor engine III and uplink module (table) modules, avoiding problems when inserting or removing 7-6 PCMCIA card
8-152
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

7-2

tools for troubleshooting understanding

OL-0800-06

IN-5

Index

installation replacement PS1 LED


7-2

7-7 7-7 7-8

administrative state, retrieving administrative state, setting blocking


3-60 8-140 8-137 3-15 3-15 8-134

3-64

8-120

power supply, removing and replacing route switch module (table) slot 1 LED slot 2 LED status LED
7-3 7-3 7-5 7-5 7-4

calls, stopping call state audit call states (table)

route switch module LEDs (figure)

circuit block types (table) hung, manually resolving hung, resolving


7-6 7-7 7-2 8-133

status, checking
7-3

media gateway states (table) primary service states (table) querying states resetting
8-132 7-2 8-121

3-15 3-14

supervisor engine, removing supervisor engine, replacing

supervisor engine III front panel (figure) supervisor engine module LEDs switch load LED system status LED caution chassis-cover replacement DIMM handling
6-18 6-20 6-21 7-2 7-2

resolving state mismatch states, understanding states, verifying


7-6 3-13 3-14

8-123

tools, removal and replacement procedures

stuck, manually resolving stuck, resolving unblocking Cisco MGC checking equipment status viewer toolkit toolbar (figure) Cisco MGC log file
3-128 8-131 8-133

8-134

flash memory SIMM replacement hot swapping not supported SIMM handling CDRs ASCII format, converting files data dumper, configuring
A-2 6-20 6-14

5-1

3-126

alm.csv cdr.bin
A-4

A-1 A-1 A-1 A-1 A-1 1-4

data dumper, configuring to support BAMS dumper sink log file parameters (table) not being generated searching viewing CDR viewer config tab window (figure) configuring query tab window (figure) using CICs
3-131 3-134 3-133 3-133 3-132 8-172 3-126 A-2

meas.csv mml.log

platform.log

readable format, converting files viewer, configuring


3-133

Cisco MGC node connectivity (figure) Cisco MGC toolbar (figure) Cisco Switches power on procedure components data, retrieving config-lib viewer configuration
3-106 3-106 2-3 3-128

type data, retrieving

3-135, 3-136 3-136

config-lib viewer (figure)

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-6

OL-0800-06

Index

export, failure configuration data backup files listing


8-168

8-171

disk space, verifying available MML session, starting platform state, verifying processes, verifying
8-169 8-170 3-3 3-2 3-2

3-16 3-21

memory on the SLT, verifying available

restoring

8-169

restoring from a device local tape drive restoring from configuration library managing
3-135 8-165

processes, verifying the number of active SS7 routes, verifying state of all users, verifying the number of
8-166 3-10 3-19 3-20

3-18 3-8

restoring using mgcrestore script

signaling services, verifying the status of all

remote machine, restoring from

virtual memory, verifying available data dumper BAMS, configuring to support


A-4

configuration parameters, retrieving configurations, administering configuration tables alarm categories components component types data, retrieving
3-106 3-106 3-106 3-105 3-135

3-108

configuring D-channels

A-2 A-2

dumper sink log file parameters (table) state, changing state, retrieving DC power connections (figure)
3-108 6-10 6-9 8-98 3-53

default configuration parameters measurement categories retrieving services console port baud rate settings, SLT connecting (figure) connecting devices to continuity test manual
8-142 8-142 3-40 6-12 6-12 6-12 3-108 3-107 3-107

specifications (table) supply, installing wiring


6-9 6-9

DC power supply CO ground (figure) connectors (figure) front panel (figure) handling (figure) installing removing
7-13 7-8 7-12 7-15 7-12 7-13

removal and replacement


7-11

settings, verifying core dump, processing cover replacement caution

debug commands troubleshooting


4-7 8-8

6-21

diagnostics log file, creating dial plan backup


3-32 8-146

D
daily tasks alarm status monitoring CIC states, verifying
3-6 3-13

calls, misrouting provisioning restoring


3-78

proper loading, verifying


8-167

8-112

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-7

Index

translation, verifying verifying DIMM handling caution disk monitor configuring DNS cache contents, displaying managing purging
3-65 3-66 3-22 3-24 6-18 3-142

3-143 3-147

flash memory PCMCIA card replacement SIMMs, replacing


6-19 7-7

translation configuration data, viewing

G
group service reset messages See GSR messages
3-16

disk space, verifying amount available


3-65

GSR messages enabling


3-57

H
xxvii

documentation roadmap (figure) dynamic reconfiguration invoking


3-70 3-71

hardware maintenance procedures SLT


6-15

hardware shutdown Cisco MGC


2-5 3-71

preconditions (table) understanding

I E
incoming load control EIA/TIA-232 console port connections equipment status, checking
6-12 5-1 1-3

managing MCL

3-94

threshold values

Ethernet connections, Cisco MGC node execution environment process shell


1-9

modifying
MCL threshold values

3-97 3-82

MCL call reject settings, modifying retrieving


3-98

F
failover daemon failure Cisco MGC SLT fan LED, supervisor engine removal and replacement fault tolerance subsystem
7-2 7-15 1-8 3-149 8-2 8-2 8-2 1-8

MCL to ANSI or ITU congestion standard, mapping 3-95 retrieving MCL call reject settings input/output system installation DC power connections (figure) DC power supply
6-9 6-9 6-10 1-6 3-83

operating system

DC power supply specifications (table) network connections SLT rack-mount


6-6 6-19 6-11 7-7

PCMCIA card, Catalyst 5500 MSR system-code SIMMs, SLT

file options viewer window (figure)

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-8

OL-0800-06

Index

tools, parts, and equipment required for SLT wiring DC power supply interface numbering, SLT IOCCs IOCMs IP links state, changing state, retrieving IP routes primary service states (table) secondary service states (table) state, changing state, retrieving ISUP timers settings, modifying settings, verifying
8-105 8-105 8-97 3-51 3-52 3-52 8-97 3-51 1-6 1-6 6-9 6-12

6-6

slot 2 status

7-3 7-3 7-2

supervisor engine III and uplink module (table) supervisor engine module switch load system status
7-2 7-2 7-4 7-2

Fast Ethernet switching module (figure) on Sun Netra t 112x on Sun Netra t 140x PS1
7-2 4-1 7-5 7-4 5-1 5-1

reading

route switch module SLT


6-2

route switch module (figure) SLT front panel (figure) SLT front panel (table) SLT rear panel (figure) SLT rear panel (table)
6-2 6-2

SLT multiflex trunk interface card (table)

6-4

J
Japanese SS7 signaling link tests signaling route tests
8-110 8-111

6-3 6-3 6-4

SLT serial WAN interface cards (figure)

SLT T1 and E1 multiflex trunk interface cards (figure) 6-4 SLT virtual WAN interface cards SLT WAN interface cards
6-3 6-4

L
LEDs 1000 Mbps 100 Mbps active
7-2 7-1 7-3 7-3 7-3 7-3

links bouncing, resolving state, changing state, retrieving linksets measurments, retrieving state, changing state, retrieving
7-4 7-4 8-96 3-50 3-113 8-96 3-50 8-92 3-113

measurements, retrieving

Catalyst 5500 MSR

Ethernet switching module (figure) Ethernet switching module (table) fan


7-2

Fast Ethernet switching module (figure) Fast Ethernet switching module (table) link slot 1
7-3 7-4

local subsystem number See LSSN logs diagnostics file, creating file types
A-1 8-6 8-8

route switch module


7-3

messages, understanding rotation, automatic


3-26

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-9

Index

rotation, manual searching


3-136

3-26

thresholds, modifying thresholds, retrieving


8-8 4-4

3-125 3-124

system data, collecting tools for troubleshooting troubleshooting understanding viewer (figure) viewing log viewer (figure) searching using LSSN service state, setting
3-137 8-4 8-4 A-1 3-137

measurement viewer (figure) searching


3-140 3-139 3-139 3-139

description

viewing and searching media gateway

administrative state, retrieving administrative state, setting


3-131, 3-137

3-62

8-117

log viewer (figure)


3-136 3-136

calls, stopping MGCP, auditing

8-138 8-140 6-19

memory, SLT system-code SIMMs (flash memory) MGC backup viewer window (figure)
8-98 3-149 3-150

MGC restore viewer window (figure) MGC viewer toolkit alarm and measurement viewer CDR viewer
3-131 3-135 3-148

M
maintenance checking Cisco MGC status components LEDs, reading SLT
6-15 3-27 4-1 5-2 4-1 4-1 5-1

3-128

config-lib viewer file options viewer log viewer


3-136

GUI NMS, using

MGC backup viewer MGC restore viewer toolbar, launching trace viewer MML
5-2 3-142

3-149 3-149

3-128

software, backing up status queries, issuing strategy overview measurements


4-1

translation verification viewer as a tool for troubleshooting commands


A-6

3-142

technical support staff

4-5

archived, field descriptions (table) category data, retrieving clearing


3-113 A-2 3-107

displaying information about displaying previously entered reentering previously entered session
A-2

3-42 3-41 3-46

data dumper, configuring links or linksets, retrieving managing retrieving


3-112, 3-125 8-171

dumper sink log file parameters (table)


3-113

ending

3-47 3-41 3-47

managing starting

retrieving active
3-2

not being generated


3-112

session, starting
3-115

3-2

SS7 signaling point, retrieving

MML terminal

1-7

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-10

OL-0800-06

Index

modem connecting MTP timers settings, verifying MTP1 communication identifying problems solving problems MTP2 communication identifying problems solving problems timers modifying MTP3 timers verifying
8-100 8-101 8-100 B-12 B-12 B-11 B-11 8-99, 8-102 6-11

deleting all listing


3-39

3-38

scheduling backup history listing


3-39

3-34 3-27

backing up system software

disk monitor, configuring full backup operation storing on a local tape log rotation, automatic manual backup operation MMDB backup
3-32

3-24 3-22

disk space, automatic monitoring


3-28

storing on a remote machine


3-26 3-33

3-29

partial backup operation storing on a local tape platform management calling data, retrieving
3-110 3-105 3-28 3-31

verifying on an SLT

storing on a remote machine

configuration table data, retrieving

N
network management tools Cisco Media Gateway Controller Node Manager Cisco WAN Manager CiscoWorks2000
4-5 4-6 4-6

manual switchover, performing

3-99 3-104

patch level, verifying for the Cisco MGC processes, retrieving the logging level statistics, retrieving
3-109 3-101

3-109

switchover, understanding

switchover, verifying successful completion system state and alarm data, retrieving system usage data, retrieving
3-111 3-109

3-100

O
outgoing load control ACL timer, modifying managing
3-83 3-93

platform state, verifying platform troubleshooting backup files, listing

3-2

8-168 8-169 8-169 8-170

backup files, restoring from a device backup files, restoring from a directory

backup files, restoring using mgcrestore script

P
periodic maintenance procedures automatic backup operation deleting
3-37

CDRs, not being generated

8-172 8-161

Cisco MGC, recovering from a failure Cisco MGC Ethernet, verifying core dump, processing
3-40 8-158

data, restoring from a local tape drive

8-165

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-11

Index

data, restoring from a remote machine deleting files


8-158 8-167

8-166

data, retrieving

3-72

dial plan, restoring a network, securing

data, retrieving for all components of a particular type 3-75


8-171

measurements, not being generated


8-177

data, retrieving for an individual component data, retrieving for select components
3-74 3-76

3-73

peer, resolving failed connection to properties, rebooting to modify SNMP, diagnosing failure
8-174

8-172

data, retrieving for the current session dial plan


3-78

8-109 8-170

data, retrieving supported signaling protocols dynamic reconfiguration, invoking managing ACC session, starting
3-80 3-70

3-77

replication, verifying configuration

software, rebooting to modify configuration parameters 8-173 stored configuration data, restoring switchover failure, recovering system time, correcting TIBCO interface point codes converting Cisco MGC Cisco MGC power supply Catalyst 5500 MSR removal and replacement Preface Document Organization processes logging level, changing logging level, retrieving understanding verifying properties rebooting to modify provisioning changes, saving and activating data, exporting
3-79 3-69 8-109 3-3 3-18 3-4 8-6 8-6 xx 7-8 8-114 8-186 8-176 8-159 8-164

session, ending without activating changes


3-68

3-70

provisioning, dynamic reconfiguration, understanding 3-71

R
rack equipment SLT installation regular operations bearer channels, managing Cisco MGC, provisioning Cisco MGC viewer toolkit measurements, managing MML session, managing SIP, managing replication configuration, verifying
3-5 8-170 3-65 3-57 3-68 3-99 6-6

power down procedure


2-4

power on procedure
2-2

Cisco MGC platform, managing


3-127

3-112, 3-125 3-41 3-47

signaling channels, managing

logging level, lowest possible (table)


3-109

process manager, controlled by (table)

replication of calls replicator restore


1-8

3-58

verifying the number of active

backup files, from a device backup files, from a directory backup files, listing local tape drive remote machine
8-168

8-169 8-169

backup files, using mgcrestore script


8-165 8-166

8-170

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-12

OL-0800-06

Index

RLM timers, modifying rollover cable (figure)


8-103 6-11 6-11

TCAP transactions clearing retrieving


3-56 3-56

rollover cable, identifying

signaling destinations configuration errors


8-93 8-92

S
security network
8-177 3-107

links, resolving bouncing traffic restart signaling service


8-93

signaling link terminal See SLT administrative state, retrieving administrative state, setting
4-7 3-62

services, retrieving show commands troubleshooting signaling channels

8-118

calls, stopping on signaling services


8-99 3-55

8-138

association, changing state of associations, retrieving state of configuration errors


8-90

primary service states (table) service state, setting SS7, retrieving state
8-95 3-54 8-96

3-9

D-channel, changing state of D-channels, retrieving state of GSR messages, enabling incomplete signaling
8-90

8-98 3-53

SS7, setting service state state information verifying status SIMM handling caution SIMMs replacing, SLT
6-19 3-9 3-8

IP link, changing state of IP links, retrieving state of IP route, changing state of

8-97 3-51 8-97 3-51

6-20

IP routes, retrieving state of links, changing state of links, retrieving state of linksets, changing state of linksets, retrieving state of managing
3-47 8-90 8-96 3-50

SLT system-code (flash)

6-19 6-19 6-20

SLT system-code, replacing SIP call information, retrieving DNS cache, managing
3-48 3-65 3-66

tools, required for replacement


3-66

8-96 3-50

DNS cache, contents, displaying DNS cache, purging managing SLT backing up software board layout
6-18 6-19 6-12 3-65 8-148

3-65

physical layer failures service states, changing service states, retrieving

primary service states (table)


8-91 3-50 3-66

SIP-to-SIP calls, stopping

SIP, DNS cache, purging SS7 link is out-of-service

8-88 8-88 3-55 3-54

SS7 loadsharing malfunction state of all LSSNs, retrieving state of SS7 routes, retrieving supporting entity failures
8-90

baud rate, console terminal

boot and system images, recovering

6-22 6-8

bracket, center mount installation (figure)

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-13

Index

bracket, front panel installation forward (figure) bracket, rear panel installation forward (figure) brackets, identifying (figure) chassis removing cover, (figure) chassis, closing chassis, opening
6-21 6-17 6-17 6-9 6-7

6-7, 6-8 6-8

serial WAN interface card (figure) virtual WAN interface card WAN interface card maintenance procedures MTP1 communication problems
B-11 6-3 B-10 6-4

6-4 6-4

T1 and E1 multiflex trunk interface card (figure)

links to STPs, troubleshooting


6-15

chassis, attaching to rack (figure)

memory, verifying amount available

3-21

chassis, holding for cover removal (figure)


6-17 6-21

chassis, replacing cover components, replacing

Cisco MGC communications, troubleshooting


6-13 6-11

B-13

identifying B-11 solving B-11


MTP2 communication problems
B-12

connecting console terminal and modem connecting DC power supply connection management cover, replacing
6-21 B-3 6-12 6-9 6-12

solving
identifying
B-12

B-12

connecting to a console port (figure) console port, connecting to

MTP2 communication problems MTP2 timers, verifying MTP3 and higher layer SS7 protocol processing (figure) MTP3 and higher layers identifying problems
B-13 B-14 8-100

data link layer, MTP2 communication problem (figure) B-12 DC power connections (figure)
6-10 6-9

DC power supply specifications (table)

solving problems network connections opening the chassis

B-14 6-11 6-16

debug outputs, probable causes, and recovery actions (table) B-7, B-8 DRAM DIMM, removing/replacing (figure) equipment status, checking error messages (table)
B-15 B-14 6-2 6-19

physical layer, MTP1 communication problems (figure) B-11 rack installation rack-mounting removing
6-5 6-6 6-11 6-11 B-15 6-9 6-6 6-3

Ethernet connectivity, identifying problems flash memory SIMM, replacing front-panel LEDs (figure) interface numbering IP signaling backhaul LEDs
6-2 6-3 6-2 6-4 6-12 6-2 B-1 6-20

rear-panel LEDs (figure) replacing

hardware and I/O signaling (figure)

rollover cable (figure)


B-14

IP communication, identifying problems


B-2 6-18

rollover cable, identifying SIMMs, replacing


6-19 6-13

RUDP communication, identifying problems software, installation

layout, system card (figure) frear-panel (table) front-panel (table)

system card layout (figure)

6-18 6-21

system-code SIMM, removing/replacing (figure) system-code SIMMs, replacing


6-19

multiflex trunk interface card (table)

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-14

OL-0800-06

Index

system status, checking tools, required


6-14

6-4

SLT system-code SIMMs, replacing upgrades


6-17 6-6 6-14 6-13 5-2 3-2

6-19

tools required for DRAM SIMM replacement tools required for installation WAN interface card, installation

verifying version software architecture

agent management subsystem call engine process


1-10 1-10

1-7

WAN interface card chassis slot locations (figure) WIC-2T dual port serial WAN interface card (figure) 6-14 wiring DC power supply SNMP diagnosing failure SNMP terminal software automatic backup operation deleting listing
3-37 3-38 1-7 8-174 6-9

call instance component

Cisco MGC software system diagram (figure) execution environment process shell fault tolerance subsystem input/output subystem software shutdown Cisco MGC software startup Cisco MGC spans administrative state, retrieving
3-63 2-3 2-4 1-6 1-8 1-9

1-5

deleting all
3-39

scheduling

3-34 6-19

administrative state, setting SS7 links


8-169 8-169 8-170 8-168

8-119

backing up SLT before replacing SIMMs backup files, listing backup files, restoring from a device backup files, restoring from a directory backup history listing
3-39 1-12 1-12

changing the service state network troubleshooting SS7 interface power on procedure SS7 interfaces power down procedure
2-5 2-3 8-86

8-96 8-113

multiple versions, configuring to support

backup files, restoring using mgcrestore script

directory structure

directory structure (table) full backup operation storing on a local tape manual backup operation partial backup operation storing on a local tape

3-28 3-29

SS7 routes primary service states (table) state, verifying


3-10 3-11 3-115 3-12

storing on a remote machine


3-33

state information, understanding


3-28 3-31 8-165, 8-168, 8-169, 8-170 8-166

SS7 signaling point, retrieving measurements SS7 troubleshooting signaling destination OOS, resolving signaling route OOS, resolving
6-22 8-94 8-93

storing on a remote machine restore from a local tape drive restore from a remote machine restore MMDB SLT installation
8-167

signaling destination unavailable, resolving statistics calling data, retrieving


3-110

8-94

SLT boot and system images, recovering


6-13

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-15

Index

platform data, retrieving

3-109 3-109

window (figure)
3-111

3-142

platform state and alarm data, retrieving system usage data, retrieving Switches power down procedure switches command line interface
C-1 C-3 2-5

traffic channel and CIC primary link service states (table) 3-14 traffic channels call states (table)
3-15 3-15 3-15 3-14

circuit block types (table)

media gateway states (table) primary service states (table) states, understanding
3-14

command line interface, local access command line interface, remote access virtual LANs switchover checkpointing circuit auditing failover daemon
3-103 3-102 3-100 C-1

C-3

translation verification viewer


C-3

virtual pathways and ISLs, troubleshooting

config tab window (figure) dial plan, verifying


3-143

3-148 3-148

Configuration tab window (figure)

dial plan translation configuration data, viewing dial plan translation tab window (figure) troubleshooting
8-159 3-101 3-144

3-147

completion, verifying
3-101

failure, recovering from fault-tolerant components manual, performing understanding


3-101 3-99

alarms, using

8-2 4-10 4-10

bit error rate testers breakout boxes cable testers


4-9 4-10

block error rate testers

system measurements viewing and searching system time correcting


8-176 3-139

configuration export failure debug commands digital multimeters fox boxes


4-10 4-7 4-9

8-171

general problem-solving model (figure)

4-2, 4-3

T
TCAP transactions clearing retrieving TCAP trace
3-56 3-56 8-157

network analyzers network monitors ping command show commands


4-8

4-10 4-10 4-11

optical time domain reflectometers


4-7

signaling destination OOS, resolving signaling route OOS, resolving


5-2 8-94

8-93 8-94

technical support staff personnel, skill level TIBCO interface troubleshooting trace viewer using
3-142 8-186 5-2

signaling destination unavailable, resolving SLT diagnostic commands SS7 network procedures strategy overview third-party tools
4-2 4-9 4-7 8-94 8-86

software troubleshooting tools

SS7 network related problems

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-16

OL-0800-06

Index

time domain reflectometers tools


4-4 4-9 4-9

4-11

trace command volt-ohm meters trunk group

administrative state, retrieving administrative state, setting trunk groups calls, stopping on
8-138

3-62

8-117

U
users, verifying the number of
3-19

V
viewer toolkit measurement viewer
3-139 3-20

virtual memory, verifying available amount

W
WAN interface cards slot filler panel (figure)
6-15 6-13 6-14

SLT chassis slot locations (figure) warning DC power connection, SLT


6-15

two-slot network module, installation in a

equipment, holding with both hands, Catalyst 5500 MSR 7-12, 7-14 power, turning off, Catalyst 5500 MSR
7-11, 7-13

power supply bay high voltage, Catalyst 5500 MSR 7-13, 7-14

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06

IN-17

Index

Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide

IN-18

OL-0800-06

You might also like