PGW Troubleshooting 01
PGW Troubleshooting 01
PGW Troubleshooting 01
Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R)
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide Copyright 20012006, Cisco Systems, Inc. All rights reserved.
CONTENTS
Preface
xix xix
Document Organization
xxii
xx
xxvi
Obtaining Documentation xxviii Cisco.com xxviii Product Documentation DVD xxviii Ordering Documentation xxviii Documentation Feedback
xxix
Cisco Product Security Overview xxix Reporting Security Problems in Cisco Products
xxx
Obtaining Technical Assistance xxx Cisco Technical Support & Documentation Website Submitting a Service Request xxxi Definitions of Service Request Severity xxxi Obtaining Additional Publications and Information Document Change History
1
xxxiii xxxii
xxx
CHA PTER
1-1
Cisco Media Gateway Controller Node 1-1 Cisco Media Gateway Controller Host 1-1 Sun Netra Hosts 1-2 Cisco SS7 Interfaces 1-2 Cisco SLTs 1-2 Cisco ITPs 1-2 Cisco Switches 1-3 Ethernet Connections 1-3 Cisco MGC Software Architecture 1-4 Input/Output Subsystem 1-6 Agent Management Subsystem 1-7 Fault Tolerance Subsystem 1-8
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
iii
Contents
Execution Environment Process Shell Call Engine Process 1-10 Call Instance Component 1-10 Cisco MGC Software Directory Structure
2
1-9
1-12
CHA PTER
Cisco MGC Node Component Startup and Shutdown Procedures Cisco Media Gateway Controller Startup Procedures 2-1 Starting the Cisco MGC Hardware 2-2 Starting the Cisco MGC Software 2-2 Starting up the Cisco MGC software manually 2-3 Cisco SS7 Interface Startup Procedure Cisco Switch Startup Procedure
2-3 2-3
2-1
Cisco Media Gateway Controller Shutdown Procedure 2-4 Shutting Down the Cisco MGC Software Manually 2-4 Shutting Down the Cisco MGC Hardware 2-5 Cisco SS7 Interface Shutdown Procedure Cisco Switch Shutdown Procedure
3
2-5 2-5
CHA PTER
3-1
Daily Tasks 3-1 Starting an MML Session 3-2 Verifying the Platform State of the Cisco MGC Hosts 3-2 Verifying That Processes Are Running 3-3 Understanding Processes 3-4 Monitoring the Alarms Status 3-6 Understanding Alarms 3-7 Verifying the Status of all Signaling Services 3-8 Understanding the Signaling Service State Information Verifying State of all SS7 Routes 3-10 Understanding the SS7 Route State Information 3-11 Verifying CIC States 3-13 Understanding CIC States 3-14 Verifying System Statistics 3-16 Verifying the Number of Active Processes 3-18 Verifying the Number of Users 3-19 Verifying Available Virtual Memory 3-20 Verifying Available Memory on the Cisco SLTs 3-21 Periodic Maintenance Procedures
3-22
3-9
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
iv
OL-0800-06
Contents
Automatic Disk Space Monitoring 3-22 Configuring Disk Monitor 3-24 Automatic System Log Rotation 3-26 Rotating System Logs Manually 3-26 Creating a Disaster Recovery Plan 3-26 Backing Up System Software 3-27 Backup Procedures for Cisco MGC Software up to Release 9.1(4) 3-27 Backup Procedures for Cisco MGC Software from Release 9.1(5) and up Processing a Core Dump File 3-40 Regular Operations 3-40 Managing MML Sessions 3-41 Displaying Previously Entered MML Commands 3-41 Displaying Information About MML Commands 3-42 Reentering Previously Entered MML Commands 3-46 Retrieving Active MML Sessions 3-47 Ending an MML Session 3-47 Managing Signaling Channels 3-47 Retrieving Signaling Service States 3-50 Retrieving Service State of C7/SS7 Links or Linksets 3-50 Retrieving the Service State for IP Links 3-51 Retrieving the Service State for IP Routes 3-51 Retrieving the Service State of D-Channels 3-53 Retrieving the State of SS7 Signaling Services 3-54 Retrieving the State of SS7 Routes 3-54 Retrieving the State of All Local Subsystem Numbers 3-55 Retrieving the Service State for Associations 3-55 Retrieving TCAP Transactions 3-56 Clearing TCAP Transactions 3-56 Enabling Group Service Reset Messages 3-57 Managing Bearer Channels 3-57 Verifying Proper Replication of Calls 3-58 Retrieving the States of Bearers Held By a Media Gateway 3-59 Blocking CICs 3-60 Retrieving the Administrative State 3-61 Managing SIP Communications 3-65 Managing the DNS Cache 3-65 Retrieving SIP Call Information 3-66 Provisioning your Cisco MGC 3-68 Starting a Provisioning Session 3-68 Saving and Activating your Provisioning Changes 3-69
3-32
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
Contents
Ending a Provisioning Session Without Activating your Changes Invoking Dynamic Reconfiguration 3-70 Retrieving Provisioning Data 3-72 Provisioning a Dial Plan 3-78 Importing Provisioning Data 3-79 Exporting Provisioning Data 3-79 Managing Automatic Congestion Control 3-80 Managing your Cisco MGC Platform 3-99 Performing a Manual Switchover 3-99 Verifying Successful Completion of a Switchover 3-100 Verifying the Patch Level of the Cisco MGC 3-104 Retrieving Configuration Table Data 3-105 Retrieving the Logging Level of Software Processes 3-109 Retrieving System Statistics 3-109 Managing System Measurements 3-112 Retrieving Measurements 3-112 Clearing Measurements 3-113 Retrieving Link or Linkset Measurements 3-113 Retrieving SS7 Signaling Point Measurements 3-115 Retrieving Measurement Thresholds 3-124 Modifying Measurement Thresholds 3-125 Managing Call Detail Records 3-125 Converting Individual CDR Files to ASCII Format 3-126 Converting Individual CDR Files to a Readable Format 3-126 Using the Cisco MGC Viewer Toolkit 3-127 Launching the Cisco MGC Toolbar 3-128 Using the Alarm Viewer 3-128 Using the Call Detail Record Viewer 3-131 Using the Config-Lib Viewer 3-135 Using the Log Viewer 3-136 Using the Measurement Viewer 3-139 Using the Trace Viewer 3-142 Using the Translation Verification Viewer 3-142 Using the File Options Viewer 3-148 Using the MGC Backup Viewer 3-149 Using the MGC Restore Viewer 3-149
4
3-70
CHA PTER
4-1
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
vi
OL-0800-06
Contents
Troubleshooting Strategy Overview 4-2 Symptoms, Problems, and Solutions 4-2 General Problem-Solving Model 4-2 System Troubleshooting Tools 4-4 Alarms 4-4 Call Traces 4-4 System Logs 4-4 MML Queries 4-5 Cisco Internetwork Management Tools 4-5 Cisco SS7 Interface Diagnostic Commands 4-7 Third-Party Troubleshooting Tools 4-9 Volt-Ohm Meters, Digital Multimeters, and Cable Testers Breakout Boxes, Fox Boxes, and BERTs/BLERTs 4-10 Network Monitors and Analyzers 4-10 TDRs and OTDRs 4-11
5
4-9
CHA PTER
Maintaining the Cisco MGC Checking Equipment Status Sun Netra LEDs 5-1
5-1 5-1
Maintaining Technical Support Staff 5-2 Skill Level of Personnel 5-2 Staff Software Troubleshooting Tools Maintaining Components 5-2 Software Upgrades 5-2
6
5-2
CHA PTER
6-1
Checking Equipment Status 6-2 Cisco SLT LEDs 6-2 Front-Panel LEDs 6-2 Rear-Panel LEDs 6-3 WIC LEDs 6-3 VWIC LEDs 6-4 Using the Cisco SLT Operating System to Check Status Removing a Cisco SLT 6-5 Required Tools and Equipment Procedure 6-6
6-5
6-4
Replacing a Cisco SLT 6-6 Required Tools and Equipment 6-6 Mounting the Chassis in a Rack 6-6
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
vii
Contents
Attaching the Brackets 6-7 Installing the Cisco SLT in a Rack 6-9 Connecting the DC Power Supply 6-9 DC Power Specifications 6-9 Wiring the DC Power Supply 6-9 Connecting to a Network 6-11 Connecting the Console Terminal and Modem Identifying a Rollover Cable 6-11 Connecting to the Console Port 6-12 Cisco SLT Interface Numbering 6-12 Install the New Software 6-13 Replacing Hardware Components 6-13 Required Tools and Equipment 6-14 Installing a WAN Interface Card 6-14 WIC Filler Panels 6-15
6-11
Additional Maintenance Tasks 6-15 Upgrading DRAM 6-16 Cisco SLT DRAM 6-16 Opening the Chassis 6-16 Tools Required 6-17 Removing the Chassis Cover 6-17 DRAM DIMM Installation 6-18 Replacing the System-Code SIMM 6-19 Tools Required 6-20 Preparing to Install the System-Code SIMM 6-20 System-Code SIMM Replacement 6-20 Closing the Chassis 6-21 Replacing the Cover 6-21 Procedures for Recovering Boot and System Images 6-22
7
CHA PTER
7-1
Checking Equipment Status 7-1 Cisco Catalyst 5500 LEDs 7-1 Supervisor Engine Module LEDs 7-2 Ethernet Switching Module (10BaseT 24 Port) LEDs 7-3 10/100 Mbps Fast Ethernet Switching Module (10/100BaseTX 12 Port) LEDs Route Switch Module LEDs 7-4 Using the Command Line Interface to Check Status 7-5 Replacing Hardware Components
7-5
7-4
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
viii
OL-0800-06
Contents
Avoiding Problems When Inserting and Removing Modules 7-6 Tools Required 7-6 Removing the Supervisor Engine 7-6 Replacing the Supervisor Engine 7-7 Using Flash Memory (PCMCIA) Cards (Supervisor Engine III) 7-7 Removing and Replacing the Power Supply 7-8 Removing an AC-Input Power Supply 7-9 Installing an AC-Input Power Supply 7-10 Removing a DC-Input Power Supply 7-11 Installing a DC-Input Power Supply 7-13 Removing and Replacing the Chassis Fan Assembly 7-15 Removing the Fan Assembly 7-15 Installing the Fan Assembly 7-16 Checking the Installation 7-17
8
CHA PTER
Troubleshooting the Cisco MGC Node Troubleshooting Overview 8-1 Cisco SLT Failure 8-2 Cisco MGC Failure 8-2 Operating System Failure 8-2
8-1
Troubleshooting Using Cisco MGC Alarms 8-2 Retrieving All Active Alarms 8-3 Acknowledging Alarms 8-3 Clearing Alarms 8-4 Troubleshooting with System Logs 8-4 Viewing System Logs 8-4 Understanding System Log Messages 8-6 Changing the Log Level for Processes 8-6 Creating a Diagnostics Log File 8-8 Collecting System Data for Cisco TAC 8-8 Alarm Troubleshooting Procedures 8-9 All Conn Cntl Links Fail 8-9 All C7 IP Links Fail 8-10 All ISDN BRI IP Conn Fail 8-11 All ISDN IP Conn Fail 8-12 All M3UAKEY Ack Pending 8-13 All M3UA Assoc Fail 8-14 All SUAKEY Ack Pending 8-15 All SUA Assoc Fail 8-16
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
ix
Contents
ANAL: ALoopCtrExceeded 8-17 ANAL: ATableFail_GetDigMod 8-18 ANAL: ATableFail_GetResult 8-18 ANAL: ATableFlt_DgtRangeError 8-18 ANAL: BLoopCtrExceeded 8-19 ANAL: BNum_GetFail_SrvcTbl 8-20 ANAL: BNum_MdfyBFail_ AnnounceID 8-20 ANAL: BTableFail_GetDigTree 8-20 ANAL: BTableFail_GetDigMod 8-20 ANAL: BTableFail_GetResult 8-21 ANAL: BTableFlt_DgtRangeError 8-21 ANAL: Cause_GetFail_CauseTbl 8-22 ANAL:Cause_GetFail_DigModTbl 8-22 ANAL: Cause_GetFail_InvldRsltType 8-23 ANAL:Cause_GetFail_LocTbl 8-23 ANAL:Cause_GetFail_RsltTbl 8-23 ANAL:Cause_InvldRslts_CauseTbl 8-24 ANAL: Cause_MdfyBFail_AnnounceID 8-24 ANAL: Cause_MdfyBFail_AppPtInvld 8-25 ANAL: Cause_Rte_LoopDetected 8-25 ANAL: CustId/StartIdx Missing 8-25 ANAL:DataBaseAccessFail 8-26 ANAL: Data Failure Rcvd 8-27 ANAL:dpselection_table_fail 8-27 ANAL:getDialplanBase_fail 8-27 ANAL: InvalidtrkGrpType 8-28 ANAL: Prof_GetFail_DigModTbl 8-28 ANAL: Prof_GetFail_InvldRslt 8-28 ANAL: Prof_GetFail_NOATbl 8-28 ANAL: Prof_GetFail_NOATbl_A 8-29 ANAL: Prof_GetFail_NPITbl 8-29 ANAL: Prof_GetFail_NPITbl_A 8-30 ANAL: Prof_GetFail_RsltTbl 8-30 ANAL: Prof_InvldNPAValue 8-31 ANAL: Prof_InvRslts_NOATbl 8-31 ANAL: Prof_InvRslts_NOATbl_A 8-31 ANAL: Prof_MdfyBFail_AppPtInvld 8-32 ANAL: RteStartIndexInvalid 8-32 ANAL: Rte_TableHopCtrExceeded 8-33 ANAL: RteTableFail_GetRteList 8-33
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
OL-0800-06
Contents
ANAL: RteTableFail_GetTrkAttrdata 8-34 ANAL: RteTableFail_GetTrkGrpdata 8-34 ANAL: RteTableFail_GetTrunkList 8-34 ANAL: TableFail_BearerCapTable 8-34 ANAL: TableFail_CondRouteDescTable 8-35 ANAL: TableFail_CondRouteTable 8-35 ANAL: TableFail_CPCTable 8-35 ANAL: TableFail_RouteHolTable 8-36 ANAL: TableFail_PercRouteTable 8-36 ANAL: TableFail_TMRTable 8-36 ANAL: TableFail_TNSTable 8-37 ANAL: TrunkGrpRsltCtrExceeded 8-37 Association Degraded 8-37 Association Fail 8-38 C7LNK ALGNMT LOST 8-38 C7DPC CONGESTION 8-38 C7LNK CONGESTION 8-39 C7LNK INHIBIT 8-39 C7SLTLnkCong 8-39 Charge Table Access Failure 8-40 Charge Table Load Failure 8-40 Comm Srvc Creation Error 8-40 Config Fail 8-41 Dial Plan Loading Failed 8-42 DISK 8-42 EISUP: Unexpected Msg/Par 8-42 ENGINE CONFIG FAIL 8-42 FAIL 8-43 FailoverPeerLost 8-44 FailoverPeerOOS 8-44 FAIL REMOTE STANDBY 8-45 FORCE NODE RESTART 8-45 Gen Fail 8-46 Holiday Table Access Failure 8-47 Holiday Table Load Failure 8-47 INVALID M3UA RC 8-47 INVALID SUA RC 8-48 Invalid Virtual_IP_Addr 8-48 IP CONNECTION FAILED 8-49 IP RTE CONF FAIL 8-50
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xi
Contents
IP RTE FAIL 8-50 ISUP: COT Failure 8-51 LIF BER 8-51 LIF FAIL 8-51 LIF LOF 8-52 LIF LOS 8-53 LIF SES 8-53 LIF YELLOW 8-54 LIF: IDLE CHANGE 8-54 LIF: LOST CD 8-55 LIF: LOST CTS 8-55 M3UAKEY Ack Pending 8-56 MMDB: Database unavailable 8-56 MMDB: Database cause failover 8-57 MMDB: Database nearly full 8-57 NAS: AuditResponse Failure 8-57 NAS: CommsFailure 8-58 NAS: ResourceFailure 8-58 OLC: Leg1chanSeizedUnpackError 8-59 OLC: Leg1chanModifiedUnpackError 8-59 OLC: Leg1chanDeletedUnpackError 8-59 OLC: Leg1notifyUnpackError 8-60 OLC: Leg1deleteChanUnpackError 8-60 OLC: Leg1notifyRequestAckUnpackError 8-60 OLC: Leg1chanOpsFailed 8-61 OOS TRAFFIC RE-ROUTE 8-61 OverloadHeavy 8-62 OverloadMedium 8-62 OverloadLight 8-63 OverResIncomingThreshold 8-63 PC UNAVAIL 8-64 Peer IP Links Failure 8-64 PEER LINK A FAILURE 8-65 PEER LINK B FAILURE 8-65 PEER MODULE FAILURE 8-65 POM INACTIVITY TIMEOUT 8-66 POM SESSION TERMINATE 8-66 POM: DynamicReconfiguration 8-66 POM: PEER_SYNC_ERR 8-66 PRI: B-Channel not available 8-66
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
xii
OL-0800-06
Contents
ProcM No Response 8-67 ProtocolFileMissing 8-67 REPL: all connections failure 8-68 RSET CONFIG FAIL 8-69 SC CONFIG FAIL 8-69 SC FAIL 8-70 SC M-OOS 8-70 SG Node Interface Fail 8-70 SG Pair Interface Fail 8-71 SIP: DNS CACHE NEARLY FULL 8-71 SIP: DNS SERVICE OOS 8-72 SIP: OOS 8-72 SIP Service Fail Over 8-72 Standby Warm Start 8-73 SS7 RTE KEY FAIL 8-74 SS7 SIG SRVC CONFIG FAIL 8-74 SS7 SIG SRVC UNAVAIL 8-75 SSN FAIL 8-76 SUAKEY Ack Pending 8-76 SUPPORT FAILED 8-77 SwitchoverFail 8-77 TALI: Invalid Protocol Version 8-77 TALI: Invalid State 8-78 Tariff Table Access Failure 8-78 Tariff Table Load Failure 8-78 TLC: Leg2chanSeizedUnpackError 8-79 TLC: Leg2chanModifiedUnpackError 8-79 TLC: Leg2chanDeletedUnpackError 8-79 TLC: Leg2notifyUnpackError 8-80 TLC: Leg2deleteChanUnpackError 8-80 TLC: Leg2notifyRequestAckUnpackError 8-80 TLC: Leg2chanOpFailed 8-81 UCM: CCodeModfailed 8-81 UCM: MGCPDIALAuthFail 8-83 Virtual_IP_Addr Mismatch 8-84 Wrong IP Path 8-84 XE Rsrc Fail 8-85 Resolving SS7 Network Related Problems Signaling Channel Problems 8-87 SS7 Link is Out-of-Service 8-88
8-86
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xiii
Contents
SS7 Load Sharing Malfunction 8-88 Physical Layer Failures 8-90 Configuration Errors 8-90 Supporting Entity Failures 8-90 Incomplete Signaling 8-90 Changing Service States 8-91 Signaling Destination Problems 8-91 Bouncing SS7 Links 8-92 Configuration Errors 8-93 Traffic Restart 8-93 SS7 Destination is Out of Service 8-93 SS7 Route is Out of Service 8-94 SS7 Destination is Unavailable 8-94 Signaling Channel Troubleshooting Procedures 8-94 Setting the Service State of a Signaling Service 8-95 Setting the Service State of a C7/SS7 Link or Linkset 8-96 Setting the Service State of an IP Link 8-97 Setting the Service State of an IP Route 8-97 Setting the Service State of a D-channel 8-98 Setting the Service State of a Local Subsystem Number 8-98 Setting the Service State of an Association 8-99 Verifying MTP Timer Settings 8-99 Modifying Configurable Timers 8-101 Managing Japanese SS7 Signaling Link Tests 8-110 Managing Japanese SS7 Signaling Route Tests 8-111 Verifying Proper Loading of a Dial Plan 8-112 Verifying Configuration to Support Multiple Versions of SS7 8-113 Resolving an Association Alarm 8-113 Converting Stored and Transmitted Point Code Values 8-114 Resolving Bearer Channel Connection Problems 8-115 Setting the Administrative State 8-116 Setting the Administrative State of a Cisco MGC 8-116 Setting the Administrative State of a Media Gateway 8-117 Setting the Administrative State of a Trunk Group 8-117 Setting the Administrative State of a Signaling Service 8-118 Setting the Administrative State of Spans 8-119 Setting the Administrative State of CICs 8-120 Querying Local and Remote CIC States 8-121 Resolving Local and Remote CIC State Mismatch 8-123 Performing CIC Validation Tests 8-123
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
xiv
OL-0800-06
Contents
Resolving ISDN D-Channel Discrepancies 8-129 Unblocking CICs 8-131 Unblocking Locally Blocked CICs 8-131 Unblocking Remotely Blocked CICs 8-132 Resetting CICs 8-132 Resolving Stuck CICs 8-133 Manually Resolving Stuck CICs 8-134 Auditing Call States 8-137 Stopping Calls 8-137 Stopping Calls on a Cisco MGC 8-137 Stopping Calls on a Media Gateway 8-138 Stopping Calls on a Trunk Group 8-138 Stopping Calls on a Signaling Service 8-138 Stopping Calls on Spans 8-139 Stopping Calls on CICs 8-140 Auditing an MGCP Media Gateway 8-140 Starting an MGCP Media Gateway Audit 8-140 Retrieving an MGCP Media Gateway Audit 8-141 Running a Manual Continuity Test 8-142 Verifying Continuity Test Settings 8-142 Media Gateway IP Destination/Link Out-of-Service 8-143 Calls Fail at the Cisco MGC 8-145 3.1 KHz (ISDN Category 3) Calls are Failing 8-146 Calls are Misrouting 8-146 Resolving SIP Communication Problems Stopping SIP-to-SIP Calls 8-148
8-148
Tracing 8-148 Performing a Call Trace 8-148 Starting A Call Trace 8-149 Stopping A Call Trace 8-150 Retrieving Names of Open Call Trace Files 8-151 Viewing the Call Trace 8-151 Deleting Call Trace Files 8-152 Understanding the Call Trace 8-152 Alternatives to Call Tracing 8-154 Diagnosing Hung Calls 8-154 Performing an Abnormal Call Termination Trace 8-156 Performing a TCAP Trace 8-157 Platform Troubleshooting
8-158
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xv
Contents
Verifying Cisco MGC Ethernet Operation 8-158 Deleting Unnecessary Files to Increase Available Disk Space 8-158 Recovering from a Switchover Failure 8-159 Recovering from Cisco MGC Host(s) Failure 8-161 Recovering from a Cisco MGC Host Failure in a Simplex System 8-162 Recovering from a Single Cisco MGC Host Failure in a Continuous Service System 8-162 Recovering from a Dual Cisco MGC Host Failure in a Continuous Service System 8-163 Restoring Stored Configuration Data 8-164 Restoring Procedures for Cisco MGC Software up to Release 9.1(4) 8-164 Restoring Procedures for Cisco MGC Software Release 9.1(5) and up 8-168 Verifying Proper Configuration of Replication 8-170 Configuration Export Failed Due to MMDB 8-171 Measurements Are Not Being Generated 8-171 Call Detail Records Are Not Being Generated 8-172 Resolving a Failed Connection to a Peer 8-172 Rebooting Software to Modify Configuration Parameters 8-173 Diagnosing SNMP Failure 8-174 Correcting the System Time 8-176 NTP is Not Used and MGC is Not the Source of the CDRs 8-176 NTP is Not Used and MGC is the Source of the CDRs 8-177 NTP is Used and MGC is the Source of the CDRs 8-177 Securing your Network 8-177 Securing the Cisco PGW 2200 8-178 Securing BAMS 8-179 TIBCO Interface Not Working 8-186
A
APPENDIX
A-1
Configuring the Data Dumper A-2 Configuring the Data Dumper to Support BAMS A-4 Understanding the Format of Log Files Archived Using Data Dumper
B
A-5
APPENDIX
Troubleshooting Cisco SLT Signaling Cisco SLT Signaling Overview B-2 IP Signaling Backhaul B-2 Types of Encapsulation B-2 PDU Verb Types B-2 Backhaul Message IDs B-2 Connection Management B-3
B-1
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
xvi
OL-0800-06
Contents
Backhaul Statistics B-3 Backhaul Congestion B-4 Link Status B-4 Troubleshooting SS7 Link Problems B-5 Checking Link Configuration Files B-5 Checking UDP Traffic Flows B-5 Checking Connection between Cisco MGC and Cisco SLT Checking the T1/E1 Link State B-6 Verifying the Link Alignment Status B-6 Verifying Exchanged Point Codes B-7 Cross-Checking Configuration Files B-8 Troubleshooting Cisco SLT-to-STP Signaling Links B-10 MTP1 Communication Problems B-11 Identifying MTP1 Communication Problems B-11 Resolving MTP1 Communication Problems B-11 MTP2 Communication Problems B-12 Identifying MTP2 Communication Problems B-12 Resolving MTP2 Communication Problems B-12 Troubleshooting Cisco SLT to Cisco MGC Communications B-13 Identifying MTP3 and Higher Layer Problems B-13 Resolving MTP3 and Higher Layer SS7 Communication Problems Identifying Ethernet Connectivity Problems B-14 Identifying IP Communication Problems B-14 Identifying RUDP Communications Problems B-15 Cisco SLT Error Messages
C
B-15
B-6
B-14
APPENDIX
C-1
Command Line Interface C-1 Command Line Interface Local Access C-3 Command Line Interface Remote Access C-3 Troubleshooting Virtual Pathways and ISLs
D
C-3
APPENDIX
D-1 D-29
INDEX
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xvii
Contents
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
xviii
OL-0800-06
Preface
This preface describes the objectives, audience, organization, and conventions of this document, and explains how to find additional information on related products and services. It contains the following sections:
Document Objective, page xix Audience, page xx Document Organization, page xx Conventions, page xxii Documentation Suite, page xxiv Obtaining Documentation, page xxviii Documentation Feedback, page xxix Cisco Product Security Overview, page xxix Obtaining Technical Assistance, page xxx Obtaining Additional Publications and Information, page xxxii Document Change History, page xxxiii
Document Objective
This document provides instructions for operating, maintaining, and troubleshooting the core elements of the Cisco Media Gateway Controller (MGC) node, as listed below.
Cisco MGCs Cisco Signaling Link Terminals (SLTs) Cisco Catalyst Multiswitch Routers (MSRs)
This document covers such topics systems operation and management, signaling channel operation, alarm management, and problem identification and resolution. The procedures in this document are to be used when your Cisco MGC node is configured with two Cisco MGCs working in a continuous service mode, unless otherwise specified.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xix
Preface Audience
Note
The term media gateway controller used in this document is a generic term that applies to the Cisco PGW 2200 product. Some of the documentation for your telephony solution might use the terms signaling controller or configured for signaling and PSTN gateway or configured for call control to refer to features that are unique to different configurations of the Cisco PGW 2200.
Note
The Cisco PGW 2200 configured for signaling was formerly called the Cisco SC2200 Signaling Controller. The Cisco PGW 2200 configured for call control was formerly called the Cisco VSC3000 Virtual Switch Controller. Some documentation for your telephony solution may use these names.
Audience
This guide is intended for three audiences: the system administrators, the system operators, and the system technicians.
The system administrator manages the host administrative functions, including configuring and maintaining system parameters, granting group and user IDs, and managing all Cisco MGC files and directories. The system administrator should have an in-depth knowledge of UNIX and a basic knowledge of data and telecommunications networking. The system operator should be familiar with telecommunication protocols, basic computer software operations, computer terminology and concepts, hierarchical file systems, common UNIX shell commands, log files, and the configuration of telephony switching systems. The system technician should be familiar with telecommunication protocols, basic computer software operations, computer terminology and concepts, hierarchical file systems, common UNIX shell commands, log files, the configuration of telephony switching systems, the use of electrical and electronic telephony test equipment, and basic troubleshooting techniques.
Document Organization
The major sections of this guide are summarized in Table 1.
Table 1 Major Sections of This Guide
Description Includes high-level descriptions of the operations, maintenance, and troubleshooting procedures contained in this guide. Contains the recommended startup and shutdown procedures for each component of the Cisco MGC node. Explains how to manage Cisco MGC operations, including starting and stopping the application, running the process manager, operating the switchover process, retrieving signal channel attributes, and changing signal service states.
Chapter 2
Cisco MGC Node Component Startup and Shutdown Procedures Cisco MGC Node Operations
Chapter 3
xx
OL-0800-06
Table 1
Description Contains the overall maintenance strategies for the Cisco MGC node. Describes maintenance of the Cisco MGC hosts, including LED descriptions, shutdown and restart procedures, spare parts stocking levels, the log rotation utility, the diskmonitor program, and backup procedures. Describes maintenance of the Cisco SLT, including checking equipment status, replacing a complete signal processor, replacing hardware components, and performing other maintenance tasks. Describes maintenance of Cisco Catalyst MSRs, including checking equipment status, replacing a complete router, and replacing various components. Describes strategies for isolating problems, including the use of system alarms, indicators, and interfaces. Explains how to troubleshoot the Cisco MGC. Troubleshooting includes working with alarms and resolving signaling channel problems, signaling destination problems, and bearer connection problems. System logs are also described.
Chapter 6
Chapter 7
Chapter 8
Appendix A
Configuring Cisco MGC Log Files Describes the Cisco MGC log files: how to view, print, and interpret log files. Also explains how to use the Cisco MGC software to retrieve network measurements and statistics, including call detail, measurement, and alarm records. Troubleshooting Cisco SLT Signaling Troubleshooting Cisco Switch Signaling Cisco MGC Measurements Explains how to troubleshoot the Cisco SLTs, including Cisco SLT to STP signaling links and Cisco SLT to Cisco MGC signaling links. Describes troubleshooting the Cisco MSR using the command line interface, as well as virtual pathways and links. Lists the measurements used by the Cisco MGC.
Appendix B
Appendix C
Appendix D
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxi
Preface Conventions
Conventions
Table 2 provides descriptions of the conventions used in this document.
Table 2 Document Conventions
Description of usage Commands and keywords you enter literally as shown Variables for which you supply values
Comments offset-list command type interface You replace the variable with the type of interface. In contexts that do not allow italics, such as online help, arguments are enclosed in angle brackets (< >).
command [abc] abc is optional. command [ abc | def ] You can choose either abc or def, or neither, but not both.
Braces ({ })
Required choices
command { abc | def } You must use either abc or def, but not both.
Braces and vertical bars A required choice within an within square brackets optional element ([ { | } ]) Caret character (^) Control key
command [ abc { def | ghi } ] You have three options: nothing, abc def, or abc ghi. The key combinations ^D and Ctrl-D are equivalent: Both mean hold down the Control key while you press the D key. Keys are indicated in capital letters, but are not case-sensitive. For example, when your are setting an SNMP community string to public, do not use quotation marks around the string; otherwise, the string will include the quotation marks. The system prompt indicates the current command mode. For example, the prompt Router (config) # indicates global configuration mode.
A string
System prompts
Denotes interactive sessions, indicates that the user enters commands at the prompt Terminal sessions and information the system displays
Screen
font
xxii
OL-0800-06
Preface Conventions
Table 2
Convention Angle brackets (< >) Exclamation points (!) at the beginning of a line
Comments
Note
Means reader take note. Notes contain helpful suggestions or references to material not covered in the guide.
Caution
Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.
Warning
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents. (To see translated versions of this warning, refer to the Regulatory Compliance and Safety Information that accompanied your equipment.)
Table 3 describes the various data type conventions used in this document.
Table 3 Data Type Conventions
Definition A series of decimal digits from the set of 0 through 9 that represents a positive integer. An integer might have one or more leading zero (0) digits padded on the left side to align the columns. Leading zeros are always valid as long as the number of digits is less than or equal to ten digits total. The range of values is 0 through 4294967295.
Signed integer
This data type has the same basic format as the integer but can 123 be positive or negative. When negative, it is preceded by the 000123 minus sign () character. As with the integer data type, this can be as many as 10 digits in length, not including the sign 2100000000l character. The value of this type has a range of 2147483647 through 2147483647.
Hexadecimal A series of 16-based digits from the set of 0 to 9, a to f, or 1f3 A to F. The hexadecimal number might have one or more 0 01f3000 digits padded on the left side. For all hexadecimal values, the maximum size is 0xffffffff (8 hexadecimal digits). Text A series of alphanumeric characters from the ASCII character set. Tab, space, and double quote ( ) characters cannot be used. Text can be as many as 255 characters; however, it is recommended that you limit the characters to no more than 32 for readability. EntityID LineSES_Threshold99
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxiii
Table 3
Definition
Example
A series of alphanumeric characters and white-space This is a descriptive characters. A string is surrounded by double quotes on the string. left and right sides ( ). Text can be as many as 255 characters; however, it is recommended that you limit the characters to no more than 80 for readability. Hexadecimal and integer fields in files might have different widths (number of characters) for column alignment. The standard TCP/IP address expressed as four numbers, where each number is from 0 through 255 and consecutive numbers are separated by a period. 139.85.60.17 or 127.55.13.200
Note
IP address
Note
All known exceptions to these conventions are expressed in the specific format sections of this document.
Documentation Suite
The documents that make up the Cisco MGC documentation set are listed in Table 4. The grayed box in this table indicates the publication you are currently reading.
Table 4 Cisco MGC Documentation
Publication
Cisco Media Gateway Controller Describes how to install the hardware Hardware Installation Guide components of the Cisco MGC node. Includes detailed information on the environmental requirements for all the components and step-by-step hardware installation and operational verification procedures. Also provides a checklist of the hardware you should have before starting the installation and a checklist of all the connections for the components. The audience for these publications is the engineering personnel responsible for installing the components and verifying the hardware installation.
Software Installation
Cisco Media Gateway Controller Describe the steps necessary to install and Software Release 9 Installation upgrade the software components of the and Configuration Guide Cisco MGC. The audience for these publications is the engineering personnel responsible for installing, configuring, and upgrading software for the respective solutions.
xxiv
OL-0800-06
Table 4
Publication Release Notes for the Cisco Media Gateway Controller Software Release 9
Description and Audience Provides information that is specific to a particular release of the Cisco MGC software. The audience for these publications is the engineering personnel responsible for installing, configuring, and upgrading software for the respective solutions.
Provisioning
Cisco Media Gateway Controller Provide step-by-step procedures for Software Release 9 Provisioning provisioning the Cisco MGC. Guide The audience for these publications is the Cisco Media Gateway Controller engineering personnel responsible for provisioning. Software Release 9 Dial Plan Guide Cisco Voice Services Provisioning Tool Users Guide
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
Describes the procedures necessary to conduct day-to-day operations, to perform preventive and corrective maintenance, and to troubleshoot the various components of the solution. The audience for this publication is the system administrators, system operators, and service technicians responsible for operating, maintaining, and servicing the components of the respective solutions
Reference
Provide reference information for the Regulatory Compliance and Safety Information for the Cisco hardware and software of the Cisco MGC. Media Gateway Controller The audience for these publications is the Hardware engineering personnel responsible for Cisco Media Gateway Controller installing, configuring, operating and upgrading software for the respective Software Release 9 MML solutions. Command Reference Guide Cisco Media Gateway Controller Software Release 9 Messages Reference Guide Cisco Media Gateway Controller Software Release 9 Billing Interface Guide Cisco Media Gateway Controller Software Release 9 Management Information Base Guide
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxv
Related Documentation
Other useful reference publications include
Overviews of the related telephony solutionsDescribe the Cisco telephony solutions with which the Cisco MGC node is associated Provisioning guides for the related telephony solutionsDescribe the provisioning steps for the Cisco telephony solutions with which the Cisco MGC node is associated Solution gateway installation and configuration guidesDescribe how to install and configure the media gateway for a particular Cisco telephony solution.
Figure 1 shows the sequence in which the various manuals documenting Cisco telephony solutions should be read.
xxvi
OL-0800-06
Figure 1
Documentation Roadmap
Start
Solution Overview
Yes
Yes
Solution Gateway Provisioning Guide End Cisco MGC Software Release 9 Billing Interface Guide *
Cisco MGC Software Release 9 MML Command Reference Guide * Cisco MGC Software Release 9 Messages Reference Guide * Cisco MGC Software Release 9 Management Information Base Guide *
57050
* This guide provides useful information that is not required during installation.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxvii
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL: http://www.cisco.com/techsupport You can access the Cisco website at this URL: http://www.cisco.com You can access international Cisco websites at this URL: http://www.cisco.com/public/countries_languages.shtml
Ordering Documentation
Beginning June 30, 2005, registered Cisco.com users may order Cisco documentation at the Product Documentation Store in the Cisco Marketplace at this URL: http://www.cisco.com/go/marketplace/ Cisco will continue to support documentation orders using the Ordering tool:
Registered Cisco.com users (Cisco direct customers) can order documentation from the Ordering tool: http://www.cisco.com/en/US/partner/ordering/
xxviii
OL-0800-06
Instructions for ordering documentation using the Ordering tool are at this URL: http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387).
Documentation Feedback
You can rate and provide feedback about Cisco technical documents by completing the online feedback form that appears with the technical documents on Cisco.com. You can send comments about Cisco documentation to [email protected]. You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address: Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883 We appreciate your comments.
Report security vulnerabilities in Cisco products. Obtain assistance with security incidents that involve Cisco products. Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at this URL: http://www.cisco.com/go/psirt If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL: http://www.cisco.com/en/US/products/products_psirt_rss_feed.html
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxix
Emergencies [email protected] An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.
Nonemergencies [email protected]
Tip
We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x. Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.htm The link on this page has the current PGP key ID in use.
xxx
OL-0800-06
Note
Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxxi
Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL: http://www.cisco.com/go/marketplace/
Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL: http://www.ciscopress.com
Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL: http://www.cisco.com/packet
iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL: http://www.cisco.com/go/iqmagazine or view the digital edition at this URL: http://ciscoiq.texterity.com/ciscoiq/sample/
Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL: http://www.cisco.com/ipj
Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL: http://www.cisco.com/en/US/products/index.html
Networking Professionals Connection is an interactive website for networking professionals to share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL: http://www.cisco.com/discuss/networking
World-class networking training is available from Cisco. You can view current offerings at this URL: http://www.cisco.com/en/US/learning/index.html
xxxii
OL-0800-06
Subject Troubleshooting the Cisco MGC Node Troubleshooting the Cisco MGC Node
Change Summary Added a note to All ISDN IP Conn Fail to indicate severity level can be modified as a result of a Release 9.5(2) patch. Added to the cause information for the ANAL:DataBaseAccessFail. Removed information related to SRCP, an interface that was never implemented.
Corrected the definitions for the XECfgParm.dat parameters diskmonitor.CdrRmFinished and diskmonitor.OptFileSys. Added a definition for the XECfgParm.dat parameter diskmonitor.CoreRmDays.
Added a procedure for converting point code values between SS7 variants. Modified software architecture information for the addition of the BRI interface. Added the TIBCO management system to the list of supported external clients.
Added a note to the description of prov-cpy that provides a work around for link and call state synchronization problems. Updated description of rtrv-ovld command. Updated instructions to contact the Cisco TAC to include collecting system data.
Updated the procedure for resolving a peer disconnect that accounts for link and call state synchronization problems. Added a procedure for the collection of system data for the Cisco TAC. Updated instructions to contact the Cisco TAC to include collecting system data. Added procedures for alarms new for Release 9.5(2). Added a procedure for troubleshooting a faulty TIBCO interface.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxxiii
Table 5
Change Summary Added a note to SP measurements information to indicate two measurements are not currently supported. Added measurements new for Release 9.5(2). Corrected default value information for the diskmonitor.softlimit parameter. Updated Ethernet interface information for the addition of WANs and the Cisco ITP. Modified software architecture information for the addition of the M3UA/SUA and IUA interfaces.
Cisco MGC Node Startup and Shutdown Procedures Cisco MGC Node Operations
Updated startup and shutdown information for the addition of WANs and Cisco ITPs to the Cisco MGC node. Added maintenance procedures for retrieving the service states of an IP route and an association. Updated maintenance and troubleshooting information for the addition of WANs and Cisco ITPs to the Cisco MGC node. Added troubleshooting procedures for alarms added in Release 9.4(1). Modified troubleshooting procedures for alarms impacted by the introduction of the M3UA/SUA and IUA interfaces. Added signaling troubleshooting procedures for setting the service states of an IP route and an association and resolving an association alarm. Modified procedure for modifying configuration while system is in-service. Added procedure for implementing security enhancements.
Troubleshooting Cisco SLT Signaling Troubleshooting Switch Signaling Cisco MGC Measurements Cisco MGC Node Operations
OL-0800-05, November 5, 2003 OL-0800-05, November 5, 2003 OL-0800-05, November 5, 2003 OL-0800-04, September 10, 2003
Added a procedure for determining the error code for RUDP failures. Revised content for support of WANs. Added measurements new for Release 9.4(1). Updated description of the rtrv-ne-health command indicating that when an E1 interface connects to a PBX, CRM messages are identified as active calls, and are displayed in the command response.
xxxiv
OL-0800-06
Table 5
Change Summary Added a note to the resolution procedure for the OverResIncomingThreshold alarm, indicating when new values for a modified trunk group property are activated. Added a procedure for modifying the system time through NTP.
Added a note indicating that empty alarm log files and CDR log files are no longer archived on both MGC hosts. Added a definition for the OFF_DUTY signaling channel service state. Added a recommendation to backup procedures as to the frequency and type of system backups. Modified the content of each switchover warning paragraph. Added an informational note for the section describing the prov-sta command.
Revised the definition for the All C7 IP Links Fail alarm. Removed explicit protocol patch information and inserted a reference to the associated Release Notes. Removed an invalid alarm: ANAL: A_TableFail_GetDigTree Modified the content of each switchover warning paragraph.
Inserted modified Cisco documentation information. Revised statements for component type lookups using the prov-rtrv command to indicate the unsupported components. Added warning to all manual switchover operation calls, indicating that all messaging is lost for approximately three seconds. Revised the switchover sections, removing statements that indicate that in-progress calls are maintained during a switchover. Revised statements for component type lookups to use the prov-rtrv:all command.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxxv
Table 5
Change Summary Added warning to all manual switchover operation calls, indicating that all messaging is lost for approximately three seconds. Added a step in the All C7 IP Links Fail alarm section to verify the configuration of the system if multiple versions of SS7 are used. Corrected the procedure for resolving the ANAL: CustId/StartIdx Missing alarm. Corrected the procedure for resolving the OverResIncomingThreshold alarm. Added a procedure to verify the configuration of the system to support the use of multiple versions of SS7. Corrected the procedure for modifying the configuration data while the system is in-service. Revised statements for component type lookups to use the prov-rtrv:all command.
Added warning to all manual switchover operation calls, indicating that all messaging is lost for approximately three seconds. Modified CIC blocking procedure for the introduction of support for individual service messages. Added a section for managing SIP-specific functions.
Added troubleshooting procedures for the alarms new for Release 9.3(2). Added a new procedure for verifying and modifying ISUP timers. Modified CIC unblocking, querying, and resetting procedures for the introduction of support for individual service messages. Added a section for resolving SIP-specific problems. Modified switchover failure procedure for new XECfgParm.dat parameters.
xxxvi
OL-0800-06
Table 5
Change Summary Updated the Backups for Release 9.1(5) and higher section for changes to the main menu. Updated the procedure for Verifying the Patch Level of the Cisco MGC for changes in the check inventory utility. Modified the procedure for Blocking CICs
Added troubleshooting procedures for the alarms new for Release 9.3(1). Updated the Restoring for Release 9.1(5) and higher section for changes to the main menu. Modified the procedures for Unblocking and Resetting CICs. Added a new procedure for diagnosing SNMP failure.
Added measurements new for Release 9.3(1). Modified section on managing signaling channels to clarify that the service state of links are maintained only on the active host. Removed .tar extension from the example backup files listed in the Backups for Release 9.1(5) and higher section.
Removed .tar extension from the example backup files listed in the Restoring for Release 9.1(5) and higher section. Modified the procedure to verify system patch level. Modified the procedures to perform backup operations for Release 9.1(5) and up.
Inserted new screen captures for the alarm and measurement viewers. Updated state information for the rtrv-cic command. Updated backup operation section. Added a procedure to verify the amount of available virtual memory. Removed procedure for the rtrv-eqpt command. Adjusted range settings for the blk-cic command.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxxvii
Table 5
Change Summary Updated content for the Standby Warm-Start and FAIL REMOTE STANDBY alarms. Updated descriptions of the commands to set the state of destinations and SPCs. Added a procedure to troubleshoot problems with 3.1 KHz calls. Removed procedure for the set-eqpt-state command. Updated state information for the query-cic command. Added note to indicate that the reset-cic command cannot be used in BTNUP environments.
Configuring Cisco MGC Log Files Cisco MGC Measurements All chapters
OL-0800-02, June 21, 2002 OL-0800-02, June 21, 2002 OL-0800-02, March 22, 2002
Clarified content to indicate that multiple CDBs can be created for each call. Added notes to indicate that the LIF, DL, and ASP measurements are now obsolete Updated each chapter with new product name rolled our for Release 9.2(x), the Cisco PGW 2200, configured either for signaling or call control. Updated the description of the Cisco SLT for the addition of the 4-link Cisco SLT. Updated description of the Measurement Viewer. Added information related to the introduction of the Cisco 2651 router for the Cisco SLT. Added information on the introduction of dual Ethernet links for the Cisco SLT.
Cisco MGC System Overview Cisco MGC Node Operations Operating the Cisco SLT
OL-0800-02, March 22, 2002 OL-0800-02, March 22, 2002 OL-0800-02, March 22, 2002
Added troubleshooting procedures for new alarms: Modified procedure for setting the service state of IP links. Added procedures for modifying MTP Level 3 and RLM timers.
Added a note to the Performing CIC Validation Tests Section indicating that these tests can only be performed on CICs associated with ANSI SS7-based DPCs. Modified the call stopping procedures to indicate that the confirm option must be used.
xxxviii
OL-0800-06
Table 5
Subject Configuring Cisco MGC Log Files Cisco MGC Node Operations
Document Number, Change Date OL-0800-01, February 12, 2002 OL-0800-01, February 4, 2002
Change Summary Updated the Configuring the Data Dumper Section with a newly tested procedure. Added content on MML commands to retrieve CDR data. Added content on the new backup and restore viewers in the Cisco MGC toolbar. Added new alarms. Added command descriptions to the Viewing the Call Trace section. Added the Rebooting Software to Modify Configuration Parameters section. Updated the Configuring the Data Dumper Section. Added the Understanding the Format of Log Files Archived Using Data Dumper section. Updated field definitions for the rtrv-cic command. Updated chapter for timestamp changes. Added new backup procedures. Updated chapter for timestamp changes. Added new restore procedures. Updated field definitions for the set-admin-state command. Initial version of the document.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
xxxix
xl
OL-0800-06
C H A P T E R
Note
The Cisco PGW 2200 configured for signaling was formerly called the Cisco SC2200 Signaling Controller. The Cisco PGW 2200 configured for call control was formerly called the VSC3000 Virtual Switch Controller. Some documentation for your telephony solution may use these names. This information is described in the following sections:
Cisco Media Gateway Controller Node, page 1-1 Cisco MGC Software Architecture, page 1-4 Cisco MGC Software Directory Structure, page 1-12
Cisco Media Gateway Controller Host, page 1-1 Cisco SS7 Interfaces, page 1-2 Cisco Switches, page 1-3
There are several optional elements of the Cisco MGC node, which are listed in the Agent Management Subsystem section on page 1-7. For more information on these optional elements, refer to the documentation for that element.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
1-1
Processing calls Originating call detail records (CDRs) Providing alarm initiation information Producing operational peg counts Receiving and processing craft user interface (CUI) data Providing Message Transfer Part (MTP) Level 3 (MTP3) functions Providing advanced intelligent network (AIN) capabilities
Cisco SLTs
The Cisco SLTs terminate Message Transfer Part (MTP) levels 1 and 2 of the SS7 protocol. The remaining SS7 layers are backhauled across an IP network to the Cisco MGC host, using the Reliable User Datagram Protocol (RUDP) over an Ethernet interface (10BASE-T for Cisco 2611 routers, 100BASE-T for Cisco 2651, 5350, and 5400 routers). The number of signaling network connections on each Cisco SLT varies with the router used in the chassis. The Cisco 2611 router supports up to two signaling network connections per Cisco SLT chassis. The Cisco 2651, 5350, and 5400 routers support up to four signaling network connections per Cisco SLT chassis. Multiple Cisco SLTs (up to 16 per Cisco MGC node) can be used to support additional signaling channels. The Cisco SLT, regardless of the router used, can be configured with redundant connections to the control signaling network, to eliminate the Cisco SLT as a possible single point of failure in the Cisco MGC node. The Cisco SLTs support V.35, T1, and E1 interfaces to the SS7 network.
Cisco ITPs
The Cisco ITPs terminate all levels of MTP and the Service Connection Control Part (SCCP) layer of the SS7 protocol. The remaining SS7 layers are backhauled across an IP network to the Cisco MGC host, using the SIGTRAN standards, MTP Level 3 User Adaptation/SCCP User Adaptation (M3UA/SUA) using Stream Controlled Transmission Protocol (SCTP), over an Ethernet interface.
1-2
OL-0800-06
Chapter 1
The number of signaling network connections on each Cisco ITP varies with the router used. A list of the routers that support the Cisco ITP functionality and the number of signaling network connections they support can be found the Release Notes for the Cisco ITP software.
Cisco Switches
Cisco switches are used to create the Ethernet backbone for the Cisco MGC node. Local area network (LAN) and wide area network (WAN) implementations are supported. The switches that are supported for your implementation are detailed in the Release Notes for the Cisco MGC software. WAN implementations have the following limitations:
Table 1-1 Limitations on WAN switches within a Cisco MGC Node
Requirement Cisco MGC software 9.3(2) or later (with associated operating system and hardware requirements).
Total end-to-end delay, one way (length of Must be less than 150 milliseconds. time it takes to send a message from a source to a destination, such as from MGC to SLT) Packet loss (defined as missing packets with a message) Must not exceed 1 percent (preferably, less than 0.5 percent).
Note
For packet loss rates below 0.5 percent, increase the RUDP receive window size (*. rudpWindowSz) to 64 for increased performance.
Ethernet Connections
Each Ethernet NIC for each Cisco MGC host is connected by a 100BASE-T interface to the switches. The switches connect to the SS7 interfaces using 10BASE-T or 100BASE-T interfaces. Figure 1-1 displays the Ethernet connections between the elements of the Cisco MGC node.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
1-3
Figure 1-1
Switch Fast Ethernet 100BT Active Cisco MGC 100Base T 100Base T Ethernet 10BT/100BT Supervisor engine Supervisor engine
Standby Cisco MGC Switch 100Base T 100Base T Supervisor engine Supervisor engine Fast Ethernet 100BT Ethernet 10BT/100BT
80156
Cisco ITP
Cisco SLT
Cisco SLT
Input/Output Subsystem, page 1-6 Agent Management Subsystem, page 1-7 Fault Tolerance Subsystem, page 1-8 Execution Environment Process Shell, page 1-9 Call Engine Process, page 1-10
1-4
OL-0800-06
Chapter 1
Figure 1-2
SCCP XE/PXE Process Shell Data Timers Signals Manager IPC Log client Meas. client Alarm client IOCC SS7 IOCC SUA IOCC M3UA MML Fault Terminal MNM MNM-PT Meas. Config. Agent Management System (AMS) Alarm Mgr Meas. Mgr Provision Mgr Core applications IOCC ISDNL3 IPFAS Config. Mgr IOCC IUA SS7 BSMVO SUA M3UA IUA DUA SLT (MTP2) 2611/2651 5350/5400 ITP (SCCP) ITP (MTP) MGW 53xx/5400 MGW 2600/36xx MGW 2600/36xx 5xxx/72xx MGX 8260/8850 MGW 36xx/5xxx/7200 MGX 8260 MGW 26xx/36xx 5xxx/7200 MGX 8260/8850 SIP Endpoint Peer PGW HSI
Process Manager
Operations agent
NAS
SNMP client (GUI) Other clients (FTP, APL and so on) Configuration Legend
MGCP
Master agent
CDRs
Meas.
BAMS
Customer billing
45901
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
1-5
Input/Output Subsystem
The Input/Output (I/O) subsystem consists of the I/O channel controllers (IOCC) and the I/O channel manager (IOCM), which manages them.
QSIG and Q.931 messages in a TCP session. This IOCC is used between a Cisco MGC and voice gateways that support BRI signaling backhaul.
Digital Private Network Signaling System (DPNSS)Added in Release 9.4, this IOCC enables
the tranparent transport of DPNSS data over IP. This IOCC is used between media gateways that support DPNSS.
Extended ISDN User Part (E-ISUP)Cisco-proprietary protocol that enables the transport of
endpoint- and media gateway-specific information between two (or more) Cisco MGCs. This protocol uses an enhanced ISUP base to support all ANSI and ITU ISUP messaging and elements. It also has additional fields to support transport of service information (such as local number portability (LNP), 800 numbers, and so on).
ISDN Level 3Provides backhauling of ISDN (standard variants) to the Cisco MGC from a
media gateway.
ISDN Q.921 User Adaptation Layer (IUA)Added in Release 9.4, this IOCC enables
backhauling of ISDN Q.921 user messages over IP using Stream Controlled Transmission Protocol (SCTP). This IOCC is used between a Cisco MGC and media gateways.
Media Gateway Control Protocol (MGCP)Enables communication with media gateways and
trunking gateways, making possible the setting up of bearer channel connections used in Cisco MGC systems configured for call control environments.
Message Transfer Part Level 3 (MTP3) User Adaptation (M3UA)Added in Release 9.4, this
IOCC enables the transport of any SS7 MTP Level 3 User signaling (for example, ISUP and TUP messages) over IP using SCTP. This IOCC is used between a Cisco MGC and Cisco IP Transfer Point (ITP).
Q.931+A stateless IOCC, for a Cisco-proprietary protocol, which is a special version of
ISDN that enables forward hauling of Q931+ signaling to a media gateway used with a Cisco MGC configured for signaling environments.
Session Initiation Protocol (SIP)Enables the Cisco MGC to receive and send SIP messages
IOCC enables the transport of any SCCP user signaling (for example, TCAP messages) over IP using SCTP. This IOCC is used between a Cisco MGC and Cisco ITP.
Signaling System 7 (SS7)Contains MTP3, which is used for backhauling SS7 signaling to the
1-6
OL-0800-06
Chapter 1
Configuration managementAdding, deleting, or modifying parameters and resources needed by the Cisco MGC to perform its switching function. This data is stored locally in data (.dat) files. This data is required to automate reconfiguration after a process failure. Alarm managementReporting and clearing alarms generated by Cisco MGC processes. Performance measurement managementReporting and clearing metrics generated by Cisco MGC processes. You can also define thresholds which, if exceeded, could produce alarms. Accounting managementDumping generated CDRs to locally persistent files or to remote databases through a standard or customized API.
The following types of external clients can access or manipulate data on the Cisco MGC:
Man-Machine Language (MML) terminalServes as a command-line interpreter where a craftsperson can manipulate data for fault detection, measurements, or configuration through a series of commands. MML is similar to TL/1 and is best suited for low-level system experts (such as operations personnel) for rapid system configuration or troubleshooting. SNMP-based terminalAllows any customer using SNMP to access network data for the purpose of managing system performance, measurements, and security. The Cisco MGC uses a master agent, EMANATE from SNMP Research, and the following related subagents to enable SNMP access to the system:
OperationsA custom subagent that provides access to fault data MeasurementA custom subagent that provides access to measurement data Critical application monitorA standard CIAgent subagent that is used to monitor the process
number of processors, and memory usage on the Cisco MGC host platform
MIB-IIA standard CIAgent subagent that partially supports the MIB-II standard (RFC-1213) File system monitorA standard CIAgent subagent that monitors thresholds for five file
systems
TIBCO management systemIntroduced in Release 9.5(2), the Cisco MGC TIBCO interface enables you to use a TIBCO management system to add, modify, delete, and retrieve provisioning data on the Cisco MGC. The Cisco MGC supports TIBCO Version 6 daemons and libraries. When this interface is enabled, the Cisco MGC can communicate with one of two TIBCO daemons on your management system:
Rendezvous Daemon (RVD)Used when the management system is in the same network as the
Cisco MGC hosts. RVD is started automatically on the management system by the TIBCO adapter on the Cisco MGC, unless either the RVD or Routing Daemon (RVRD) is already running.
Routing Daemon (RVRD)Used when the management system and the Cisco MGC hosts are
not on the same network. You must configure the RVRD routing table and start RVRD manually before activating the interface on the Cisco MGC. Refer to the TIBCO user documentation for information on configuring the RVRD routing table.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
1-7
Note
The TIBCO interface is typically activated during initial install or upgrade. For more information on activating the TIBCO interface, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.
Cisco MGC Node Manager (MNM)An optional application used for network element management. Cisco MNM Provisioning Tool (MNM-PT)An optional application used for provisioning the Cisco MGC. Formerly known as the Cisco Voice Services Provisioning Tool (VSPT). Billing and Measurements Server (BAMS)An optional application used for collection of CDRs and operational measurements. H.323 Signaling Interface (HSI)An optional application used to provide an interface to H.323 networks.
Failover daemonMonitors Cisco MGC processes using a heartbeat mechanism. If there is no response to its process polling in a fault-tolerant hardware configuration, the Cisco MGC switches control to the standby unit. ReplicatorAllows processes to checkpoint critical call information, such as signaling and bearer states, as well as call data across the active and standby processors. Its goal is to replicate enough information for established calls to survive a failover. Checkpointing events are generated at two points in a call:
When the call is answered, to update the full duplex path. When the call is released, after the physical resources are deallocated.
Connectionless (non-call) signaling may be generated by a craftsperson performing maintenance through an MML or SNMP client or by circuit supervision. Certain signaling can also generate checkpointing events:
Blocking or unblocking of circuits Circuit reset
Note
The replicator mechanism does not try to replicate program or data storage. Service features are not checkpointed across processors; there is just enough information to maintain the voice or data path between the call originator and the call terminator. If the switchover happens before the simplex path is established, call processing cannot proceed on the inactive side. Non-established calls in the process of being set up are lost.
1-8
OL-0800-06
Chapter 1
Operating system interfaceSuch as the Sun Solaris operating system. Process managementPerforms startup order, shutdown order, and monitoring of processes. Also performs software upgrade compatibility checking with minimal service interruption. Alarm managementAllows processes to register, set, and clear alarms, which are then presented to the AMS for further processing. Log managementAllows MGC processes to log messages to locally persistent data files. Message codes (instead of strings) minimize the overhead of interprocess transport of long buffers. Log files use a facility (process type originating the log) and a logging level (severity). Measurement managementAllows processes to adjust counters or other metrics, which are subsequently presented to the AMS for Alarm and Measurement Report processing. Command managementAn interface that can be used by any active processes or by an EMS interface, such as MML or SNMP agents, to exchange commands or responses. Configuration managementNotifies processes and gets responses when configuration data changes. Handles reconfiguration management when multiple processes are affected by changes. Access controlAllows only authorized processes to access certain services or other processes. Interprocess communication (IPC)Allows processes to exchange messages. Event Processing ServiceThe XEProcShell facility allows applications to register, deregister, and exchange events (messages) through IPC. This service is critical to efficient real-time CPU usage and overall system performance. TimersAllow processes to set, clear, or monitor timers. Provide timeouts to processes.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
1-9
Connection managerInterfaces with the nodes and protocols external to the Cisco MGC that are necessary to establish an IP (TCP, UDP, or RUDP) or PSTN connection that is managed by the Cisco MGC. The type of node supported is
VoIP/VoATM trunking gateways using MGCP. Time Domain Multiplex (TDM) trunking gateways using MGCP.
Call managerContains and selects the appropriate protocol adapters. These are protocol-specific entities performing the following functions:
Communicates with the corresponding protocol-specific IOCC. Converts incoming protocol data units (PDUs) received from the IOCC to an internal, protocol
independent format.
Converts internal, protocol-independent PDUs to protocol-specific format. Communicates current circuit states to the IOCM using the IOCCs. Creates a call instance when an incoming MTP3 call establishment message is received. Destroys that instance and frees any associated memory when the call is terminated. Supports multiple call instances. It dequeues incoming messages from the event dispatcher
queue and routes them to the call instance for which they are destined.
Generates call detail blocks (CDBs), which are used to create CDRs. Operates as a standby entity, which is created when the call engine is created at system startup,
and waits to create a new call, destroy an existing call, or process an event for an existing call.
Checkpoints call information, such as call signaling state and data, to the standby Cisco MGC
to guarantee that the signaling link is not lost during a manual or automatic switchover.
1-10
OL-0800-06
Chapter 1
Originating call control (OCC)Is the instance of the originating protocols state machine. In defining a protocol, two MDL modules are created:
A general declarations module, which contains protocol-specific types and definitions. A protocol definition module, which contains the state logic for two state machinesone for
call origination and one for call termination. This module produces an object file named protocolName.mdo.
compiled into an object file, but can only be loaded by the Call Engine and cannot be used by any of the protocols.
Provide event-driven logic, which controls the following call-processing functions: linking the
OCC and the terminating call control (TCC), updating and retrieving the call context structures, interacting with other call engine components, such as the resource manager, connection manager, and call manager, managing bearer resources, such as trunking gateways, using the MGCP, and keeping the call processing state machine.
The UCM also triggers events to be processed by the following MDL modules: generic analysis
module, subscriber profile retrieval, a-number and b-number pre-analysis, a-number and b-number full analysis, route selection, and the IN trigger module.
Connection plane manager (CPM)Communicates with the call engines resource manager to make the bearer connections to a remote trunking gateway using MGCP. CDR ManagerGenerates CDRs and forwards them to the EMS to be locally persisted or forwarded for off-platform accounting applications. CDRs are generated when calls are answered and they can also be generated in the following situations:
End of call (standard) Long duration calls Mid-call CDRs (can generate CDBs at eight different points in a call)
Terminating call controlIs the instance of the terminating protocols state machine. Call contextThe following are the call context characteristics:
A persistent object in a call instance that serves as the placeholder for bearer and signaling
information. Such information is set and retrieved by the OCC, TCC, or UCM at various points in the life of the call.
An MDL context definition module is used to define the information elements, structures, and
fields. This module is compiled into an object file to be used by all protocols. The format of these structures is protocol-independent to minimize cross-protocol conversion permutations. Contains rules for data conversion to and from each protocol.
Collects the following call information in CDBs, which are assembled to build CDRs: calling
number, called number, answer time, disconnect time, originating trunk group and circuit identification code (CIC), terminating trunk group and CIC, address translation and route information, ISUP information, ISDN service information, database query information, call completion codes, and other information depending on the type of call.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
1-11
Description Cisco MGC executable programs that cannot be customized. Cisco MGC executable programs that can be modified by the customer for a site-specific reason. See the procedures for how to customize files. Generally the factory default values are sufficient. Network element configuration files. This includes all provisionable configuration files required for proper operation of the Cisco MGC. Cisco MGC configuration file library. This is a simple version control system for configuration file changes. Saved data from the Cisco MGC Toolkit applications is stored in this directory. Shared object files. These libraries are loaded at runtime by the executables. The three types of libraries are: (1) system/program shared objects, (2) MDL interpreted objects, and (3) MDL shared objects. Subsystem communication and persistent storage area. This directory contains files and devices providing communications between the various subsystems in the Cisco MGC. It also contains files providing persistent storage of data for the Cisco MGC. System logging area. This directory contains the platform logs. See the Understanding Logging Files section on page A-1 for more information. Dumper Spool Area. This directory contains historic reports. Refer to the Understanding Logging Files section on page A-1. Signal Path Trace area. This directory contains all MDL trace logs used for conversion analysis. MDL source files. MDL source files are generally not provided, but if they are purchased, they will appear here.
$BASEDIR/etc
$BASEDIR/var
$BASEDIR/var/log
1-12
OL-0800-06
C H A P T E R
Cisco Media Gateway Controller Startup Procedures, page 2-1 Cisco SS7 Interface Startup Procedure, page 2-3 Cisco Switch Startup Procedure, page 2-3
Have made changes to the system configuration Are upgrading the software Are testing the system Are troubleshooting alarms Are trying to resolve a problem
Note
In these procedures, it is assumed that the component has been correctly installed, configured, and provisioned in accordance with the instructions provided in the relevant documentation. Shutdown procedures for each component of the Cisco MGC node are included in the following sections:
Cisco Media Gateway Controller Shutdown Procedure, page 2-4 Cisco SS7 Interface Shutdown Procedure, page 2-5 Cisco Switch Shutdown Procedure, page 2-5
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
2-1
Note
The system switch for each Sun Netra platform is unique. Refer to the documentation provided by Sun Microsystems for more information on your system. To power on the system, complete the following steps:
Step 1
Note
Peripheral power is activated prior to system power so that the system can recognize the peripherals when it is activated.
Step 2 Step 3
Apply power to the system inlet. Press the front panel ON/STBY system switch to the ON position and hold it until the system starts to power up.
Note
In this section, it is assumed that the Cisco MGC software Release 9 has been correctly installed, configured, and provisioned on the host server and that you have the appropriate packages, or applications, for your system. If the Cisco MGC Release 9 software has been installed, configured, or provisioned incorrectly, or if you are having other problems, see Chapter 8, Troubleshooting the Cisco MGC Node, for more information.
Note
To perform the procedures in this section, you must have a user ID that is part of the Cisco MGC group (mgcgrp) and you must have the proper group privileges. To verify that your user ID is part of the Cisco MGC group and that you have the necessary privileges, refer to the Configuring Groups and Users section in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide for more information.
2-2
OL-0800-06
Chapter 2
Cisco MGC Node Component Startup and Shutdown Procedures Cisco SS7 Interface Startup Procedure
Do not use the following commands unless specifically instructed to do so by Cisco Technical Assistance Center (TAC) personnel. To manually start the Cisco MGC software, log in to the active Cisco MGC as root and enter the following command:
/etc/init.d/CiscoMGC start
This action restores execution permission and enables the automated startup script.
In this section, it is assumed that the SS7 interface has been correctly installed and configured and that the correct software version is installed. If you are experiencing problems, refer to the documentation for your SS7 interface for detailed information. To start up a Cisco SS7 interface, perform the following steps:
Step 1
Before you start the Cisco SS7 interface, verify the following:
All modules are installed correctly, and all interface cable connections are secure. The power cable is connected to both the rear panel power connector and the power source. A terminal is connected to the console port and is turned on.
Step 2
Turn the power on (|). During the boot process, observe the following:
The power LED on the front panel should be green. The activity LED should be blinking. You should hear the system fans operating. The console terminal displays a script and system banner.
Step 3
Press Return at the Enter Password prompt to access the console command line.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
2-3
Note
In this section, it is assumed that the switch has been correctly installed and configured and that the correct software version is installed. If you are experiencing problems, refer to the documentation for your switch for detailed information. To start a Cisco switch, complete the following steps:
Step 1
All modules are installed correctly, and all interface cable connections are secure. Each power supply is installed correctly and is connected to a grounded power source. If two power supplies are present, each power cord is connected to a different line. A terminal is connected to the supervisor module console port and is turned on.
Step 2
Turn the power supplies on (|). During the boot process, observe the following:
The LEDs on the power supplies should be green. The PS1, PS2, and fan LEDs on the supervisor engine should be green, and you should hear the system fans operating. The System Status LED on the supervisor engine should be green after the boot is complete. It flashes red, orange, and green during startup. The supervisor engine interface LEDs and module LEDs (such as the Link LEDs) might blink or stay lit continuously during the boot process. Many module LEDs do not go on until you configure the interfaces. Wait until the boot is complete before trying to verify the module LED indications. The console terminal displays a script and system banner. The supervisor engine begins to initialize the modules once the boot process is completed. Messages appear on the console as the modules come online.
Step 3
Press Return at the Enter Password prompt to access the console command line.
Do not use the following commands unless specifically instructed to do so by Cisco Technical Assistance Center (TAC) personnel. To manually stop the Cisco MGC software, log into your active Cisco MGC as root and enter the following command:
/etc/init.d/CiscoMGC stop
2-4
OL-0800-06
Chapter 2
Cisco MGC Node Component Startup and Shutdown Procedures Cisco SS7 Interface Shutdown Procedure
Caution
Before you turn off the power, exit from the operating system. Failure to do so might result in data loss. To shut down the Cisco MGC, complete the following steps:
Where necessary, notify users that the Cisco MGC is going down. Back up system files and data prior to shutdown. Refer to the Backing Up System Software section on page 3-27. Exit from the operating system. Refer to your Sun documentation for the appropriate commands to be used to exit from the operating system.
Note
Ensure that you use the UNIX command init 5 as part of exiting from the operating system. This command is described in the Sun documentation.
Momentarily set the front panel power switch to the STBY position until the system powers down. Verify that the POWER LED is off. Remove the input power connector from the power inlet.
Caution
Regardless of the position of the ON/STBY switch, where an AC or DC power cord remains connected to the system, voltage may be present within the power supply.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
2-5
2-6
OL-0800-06
C H A P T E R
Note
Operation of the Cisco MGC node should be performed by someone who has been trained in the complexities of the system, who has some experience administering the system, and who understands UNIX at the system administrator level. This chapter contains the following sections:
Daily Tasks, page 3-1 Periodic Maintenance Procedures, page 3-22 Regular Operations, page 3-40
Daily Tasks
The following section detail the procedures you should perform on a daily basis on the Cisco MGC. These procedures use Man-Machine Language (MML) and UNIX commands. These procedures can also be performed using the optional Cisco MGC Node Manager (MNM) application. For more information on using the Cisco MNM to operate the Cisco MGC, refer to the Cisco Media Gateway Controller Node Manager Users Guide. The tasks you should perform on a daily basis are found in the following sections:
Starting an MML Session, page 3-2 Verifying the Platform State of the Cisco MGC Hosts, page 3-2 Verifying That Processes Are Running, page 3-3 Monitoring the Alarms Status, page 3-6 Verifying the Status of all Signaling Services, page 3-8 Verifying State of all SS7 Routes, page 3-10 Verifying CIC States, page 3-13 Verifying System Statistics, page 3-16
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-1
Verifying the Number of Active Processes, page 3-18 Verifying the Number of Users, page 3-19 Verifying Available Virtual Memory, page 3-20 Verifying Available Memory on the Cisco SLTs, page 3-21
Note
We recommend that you run your MML sessions from the active Cisco MGC, unless the procedure indicates otherwise.
Step 1 Step 2
Log in to the active Cisco MGC. Enter the following command at the UNIX prompt:
mml
If you receive an error message indicating that sessions are already in use, enter the following command:
mml -s session number
Use any session number from 2 through 12 and repeat until you find a vacant session. Once you have successfully started an MML session, the prompt changes to:
machine_name mml>
Log into one of the Cisco MGCs, start an MML session, and enter the following command to determine its platform state:
rtrv-ne
The system should return a message, similar to the following, if it is currently the active Cisco MGC:
M Media Gateway Controller 2000-03-29 14:15:22 RTRV "Type:"MGC "Hardware platform:sun4u sparc SUNW,Ultra-5_10" "Vendor:"Cisco Systems, Inc."" "Location:Media Gateway Controller" "Version:"9.1(5)"" "Platform State:ACTIVE"
The valid values for the Platform State field are ACTIVE, STANDBY, or OOS.
3-2
OL-0800-06
Chapter 3
Step 2
Log into the other Cisco MGC, start an MML session, and enter the following command to determine its platform state:
rtrv-ne
The system should return a message that indicates that it is in either the active or standby platform state. If the Cisco MGC hosts have changed their platform state, determine why the switchover occurred by searching the contents of the active system log file, as described in the Viewing System Logs section on page 8-4. Under normal operations, one Cisco MGC host should be active and the other Cisco MGC host should be standby. If the platform state of either Cisco MGC host is OOS, check the alarms as described in the Monitoring the Alarms Status section on page 3-6, and take the actions necessary to correct the condition that caused the associated alarm(s). The alarms that require you to take corrective action and their associated actions can be found in the Troubleshooting with System Logs section on page 8-4. A complete listing of alarms can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. If the platform state of both Cisco MGC hosts is active, proceed to Step 4.
Step 3
Verify that the active configuration has not changed by entering the following UNIX commands:
cd /opt/CiscoMGC/etc ls -l
Identify the active_link file. The listing indicates which configuration is currently active. The active configuration in the example is CFG_pol-addipl. If the configuration has changed, you may want to compare the active configuration to the previous configuration.
Step 4
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-softw:all
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-3
Note
If this MML command is entered on the standby Cisco MGC, the state of the processes is either RUNNING STANDBY or RUNNING IN N/A STATE.
Step 2
If any of the processes are initializing, wait a few moments and repeat Step 1. If that process is still initializing, contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If any of the processes are stopped, contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.
Understanding Processes
The Cisco MGC software contains processes and process groups that perform various functions. These functions include managing the I/O channels; generating alarms, call detail records (CDRs), and logs; and performing signal conversion. All these processes are managed by the process manager process of the Cisco MGC software. Three different monitoring levels are offered:
Active processControlled and monitored directly by the process manager. Passive processDoes not communicate with the process manager. Monitoring processPeriodically runs an executable or script and sets or clears an alarm based on the return code. This type of process can monitor other processes or tasks that can be checked programmatically. Some examples are the amount of available disk space, system daemon existence, and established process dependency.
Table 3-1 shows the system processes and process groups controlled by the process manager.
3-4
OL-0800-06
Chapter 3
Table 3-1
Group
ENGG-01
Description
Engine Group
Replicator controller. It is an active process. If it should go down, it causes a critical out-of-service alarm. Call engine. It is an active process. If it should go down, the system cannot process calls. Its failure causes a critical out-of-service alarm.
I/O Subsystem Group
IOSG-01
I/O channel controller. It is a passive process. If it should go down, it causes a critical out-of-service alarm. I/O channel controller. It is a passive process. If it should go down, it causes a critical out-of-service alarm. I/O channel manager. It is a passive process. If it should go down, it causes a major out-of-service alarm. TCAP and SCCP protocol handler. It is a passive process. If it should go down, it causes a major out-of-service alarm.
Execution Environment Group
Configuration manager. It is an active process. If it should go down, it causes a major out-of-service alarm. Alarm manager. It is an active process. If it should go down, it causes a major out-of-service alarm. Alarm and measurement dumper. It is an active process. If it should go down, it causes a major out-of-service alarm. Measurement manager. It is an active process. If it should go down, it causes a major out-of-service alarm.
CDRDMPR-01 CDR dumper. It is an active process. If it should go down, it causes a major out-of-service alarm. MMDB-01 POM-01
FTG-01
TimesTen database. It is a passive process. If it should go down, it causes a minor out-of-service alarm. Provisioning object manager. It is an active process. If it should go down, it causes a major out-of-service alarm.
Failover Group
FOD-01
PFMG-01
Failover controller. It is a monitoring process. If it should go down, it causes a minor out-of-service alarm.
Platform Monitoring Group
DSKM-01
Disk space monitor. This shell script monitors disk space and trims back older files in case the current amount of free space is below a specified threshold. This is a monitoring process. If it should go down, it causes a minor out-of-service alarm.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-5
Table 3-1
Group
SNMPG-01
Description
SNMP Group
Measurements SNMP agent. This is an active process. If it should go down, this is a major out-of-service alarm. Operational SNMP Agent. This is an active process. If it should go down, this is a major out-of-service alarm.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-alms::cont
Step 2
If an alarm appears, you can determine the appropriate course of action by referring to the listing for that alarm in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. Detailed descriptions of the actions required to resolve the problems associated with the alarm are found in Alarm Troubleshooting Procedures section on page 8-9. You can also find additional information on the conditions that caused the alarms by viewing the system logs. The logs can be viewed using the log viewer, part of the Cisco MGC viewer toolkit. For information on using the log viewer, see the Using the Log Viewer section on page 3-136.
Note
Once you have begun monitoring alarms continuously, you will need to open another MML session to perform any additional tasks. Refer to the Starting an MML Session section on page 3-2 for more information on starting additional MML sessions.
3-6
OL-0800-06
Chapter 3
Understanding Alarms
The following subsections describe each of the message components for the typical alarm response shown below:
"LPC-01: 2001-02-26 09:16:07.806 EST,ALM=\"SCMGC MTP3 COMM FAIL\",SEV=MJ" "IOCM-01: 2001-02-26 09:17:00.690 EST,ALM=\"Config Fail\",SEV=MN" "MGC1alink2: 2001-02-26 09:17:47.224 EST,ALM=\"SC FAIL\",SEV=MJ" "MGC1alink3: 2001-02-26 09:17:47.225 EST,ALM=\"SC FAIL\",SEV=MJ"
Component ID
The first element of the alarm message identifies the system component that generated the alarm, using the customer-defined description of the component given during system provisioning. In our example, these are LPC-01, IOCM-01, MGC1alink2, and MGC1alink3. All system components are described in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Time Stamp
The second element of the alarm message identifies the time of the alarm by year, month, day, hour, minute, hundredths, thousandths of a second (milliseconds), and time zone. The time displayed is the system time. In the example, these would be 2001-02-26 09:16:07.806 EST, 2001-02-26 09:17:00.690 EST, 2001-02-26 09:17:47.224 EST, and 2001-02-26 09:17:47.225 EST.
Alarm Category
The third element of the alarm message identifies the alarm category. It indicates the MML description of the alarm/event. In our example:
ALM=\SCMGC MTP3 COMM FAIL\ indicates an SCMGC-MTP3 communications failure. ALM=\Config Fail\ indicates a configuration failure. ALM=\SC FAIL\ indicates a signal channel failure.
Severity Level
The last element of the alarm message identifies the severity level of the alarm. The four levels are
Critical (CR)A serious problem exists in the network. Critical alarms cause a switchover, where the active Cisco MGC switches processing to the standby Cisco MGC. Because critical alarms affect service, they should be cleared immediately.
Caution
Critical alarms cause the system to automatically switchover. While a switchover is in progress, new calls are dropped and in-progress calls are sustained.
Major (MJ)A problem exists that disrupts service. Major alarms should be cleared immediately. These alarms differ from critical alarms in that they do not cause a switchover from the active Cisco MGC to the standby Cisco MGC. Minor (MN)Minor alarms should be noted and cleared as soon as possible. You might also want to research how often this alarm is appearing, because it may be an indicator of a bigger problem.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-7
Informational (IN)This severity level applies to messages that provide information about typical events and conditions. Informational messages do not require corrective action. Examples are timer expirations, values that have exceeded preset thresholds, and unexpected responses from endpoints to signaling messages sent by the Cisco MGC. Events with a severity level of informational are retrieved only by the SNMP Manager.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-dest:all
Note
If the rtrv-dest:all MML command is entered after a switchover has occurred, the state of some of the signaling services might be listed as undefined (UND). UND is the default state for a signaling service when the system starts. In this instance, UND states indicate that the Cisco MGC has not received a service state message for the associated signaling service since the switchover occurred. No user action is required.
Step 2
If the primary service state is not IS for any of the signaling service, check your alarms retrieval MML session for signaling-related alarms. The method for setting up an alarms retrieval MML session is described in the Monitoring the Alarms Status section on page 3-6. If a signaling-related alarm appears, you can determine the appropriate course of action by searching for the corrective actions for that alarm in the Alarm Troubleshooting Procedures section on page 8-9. If the alarm is not in that section, corrective action is not required. More information on the alarm can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. You can also find additional information on the conditions that caused the alarms by viewing the system logs. The logs can be viewed using the log viewer, part of the Cisco MGC viewer toolkit. For information on using the log viewer, see the Using the Log Viewer section on page 3-136.
Note
You can use the also use the rtrv-dest MML command to retrieve information on individual signaling services using the procedure found in the Retrieving Signaling Service States section on page 3-50.
3-8
OL-0800-06
Chapter 3
Destination
The first field lists the MML name of the associated signaling service. In the above example, this is sigsrv1, sigsrv2, and sigsrv3
Package
The PKG field lists the protocol package associated with the destination. In the example, the protocol is SS7-ANSI.
Association
The ASSOC field shows the type of association, either unknown, switched, or a specific channel for the signaling service. In the example, the association type is SWITCHED.
Description The system has taken the signaling service out-of-service (OOS). When a system is first configured, all signaling links default to this state and must be manually set in-service (IS) through the use of the set-c7lnk, set-iplnk, or set-dchan MML commands. The link to the signaling service is IS and fully operational. This is its normal operating state. The link to the signaling service has been manually taken OOS. The link to the signaling service is OOS from the remote end. The system is actively trying to restore the link. The state of the link to the signaling service is currently being changed. The state of the link to the signaling service is not known.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-9
CEACommanded into emergency alignment. CISCommanded in service. CONGCongestion. COOSCommanded out of service. CINHCommanded to the inhibited state. CRTECreated. CUINHCommanded to the uninhibited state. DLTDeleted.
Note
DLT is a transition state. It is seen when you are making provisioning changes to the associated signaling service.
EISEngine in service. EOOSEngine out of service. FLDFailed. FOOSForced out of service. RSTReset. RSTORestored. UNDUndefined.
Note
If the rtrv-dest MML command is entered after a switchover has occurred, the state of some of the signaling services might be listed as undefined (UND). UND is the default state for a signaling service when the system starts. In this instance, UND states indicate that the Cisco MGC has not received a service state message for the associated signaling service since the switchover occurred. No user action is required.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-rte:all
3-10
OL-0800-06
Chapter 3
"ss7srv3:linkset1,APC=apc=4,OPC=opc-3,PRIO=1,PST=IS,SST=NA" "ss7srv3:linkset2,APC=apc=4,OPC=opc-4,PRIO=1,PST=IS,SST=NA"
Step 2
If the primary service state is not IS for any of the routes, check your alarms retrieval MML session for signaling-related alarms. The method for setting up an alarms retrieval MML session is described in the Monitoring the Alarms Status section on page 3-6. If a signaling-related alarm appears, you can determine the appropriate course of action by searching for the corrective actions for that alarm in the Alarm Troubleshooting Procedures section on page 8-9. If the alarm is not in that section, corrective action is not required. More information on the alarm can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. You can also find additional information on the conditions that caused the alarms by viewing the system logs. The logs can be viewed using the log viewer, part of the Cisco MGC viewer toolkit. For information on using the log viewer, see the Using the Log Viewer section on page 3-136.
Signaling Service
The first field lists the MML name for the signaling service associated with the SS7 route. In the example, the signaling services are ss7srv1 and ss7srv2.
Linkset
The second field lists the MML name for the linkset associated with the SS7 route. In the example, the linksets are linkset1 and linkset 2.
opc-1
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-11
Priority
The PRIO field lists the priority provisioned for this SS7 route. In the example, all of the SS7 routes have a priority of 1.
Description The system has taken the SS7 route out-of-service (OOS). When a system is first configured, all signaling links default to this state and must be manually set in-service (IS) through the use of the set-dest MML command. The SS7 route is IS and fully operational. This is its normal operating state. The SS7 route has been manually taken OOS. The SS7 route is OOS from the remote end. The system is actively trying to restore the link. The state of the link to the SS7 route is currently being changed. The state of the link to the SS7 route is not known.
ACKDSS7 Acknowledgement delay BSNRSS7 backward sequence number received (BSNR) CISCommanded in service CONFConfiguration failure COOSCommanded out of service ENGRCall engine reset ISPENDIn service, pending LCNGCongestion, local LINELine failure LINHSS7 local inhibit
3-12
OL-0800-06
Chapter 3
LINKLink failure LINSLinkset failure NACause not available OOSPENDOut of service, pending PRHBSS7 prohibited RBLKSS7 remote blocked RCNGCongestion, remote RINHSS7 remote inhibit RSTRSS7 restricted SERRSS7 signal error STBYCause standby SUPPENTSupporting entity TPATHTraffic path UNKCause unknown
Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-cic:sig_srv:cic=number[,rng=range]
Where:
sig_srvMML name of the signaling service associated with the CICs to be displayed. numberA valid CIC number. rangeSpecifies a range of CICs to be retrieved. The status of all CICs between number and number+range are displayed.
For example, the following MML command retrieves bearer channel information for CICs 10 to 15 on signaling service c7s-1:
rtrv-cic:c7s-1:cic=10,rng=5
When the Cisco MGC software is configured for signaling, the system returns a response similar to the following:
M Media Gateway Controller - MGC-04 2000-04-05 08:05:54 RTRV "c7s-1:CIC=10,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=11,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=12,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=13,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=14,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=15,PST=IS,CALL=IDLE,BLK=NONE"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-13
When the Cisco MGC software is configured for call control, the system returns a response similar to the following:
M Media Gateway Controller - MGC-04 2000-04-05 08:05:54 RTRV "c7s-1:CIC=10,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=11,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=12,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=13,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=14,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=15,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"
Step 2
If the primary service state is not IS for any of the CICs, or a CIC is blocked, check your alarms retrieval MML session for bearer-related alarms. The method for setting up an alarms retrieval MML session is described in the Monitoring the Alarms Status section on page 3-6. If a bearer channel-related alarm appears, you can determine the appropriate course of action by searching for the corrective actions for that alarm in the Alarm Troubleshooting Procedures section on page 8-9. If the alarm is not in that section, corrective action is not required. More information on the alarm can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.
Circuit Identification
The output of this command identifies the MML name of the associated signaling channel and the number for each CIC.
Description The traffic channel or CIC is IS and fully operational. This is its normal operating state. The traffic channel or CIC is OOS from the remote end. The system is actively trying to restore the link. Individual CICs can be OOS even if the destination is IS, due to signaling events such as Q.931 service messages.
Call State
The CALL field identifies the current call state of each CIC. After a call is initiated, a circuit does not return to the Idle (available) state until all related release signaling is satisfactorily completed (the correct release sequence). In and Out call states indicate that the CIC is not available for new calls. Table 3-5 describes the various call states.
3-14
OL-0800-06
Chapter 3
Table 3-5
Description Incoming call is in progress. Bearer channel is not available for new call. Outgoing call is in progress. Bearer channel is not available for new call. Circuit is available for use.
State CARRIER_FAILURE
Description Individual CIC has failed. If this state is seen for all CICs associated with a T1 or E1, this indicates that the associated T1 or E1 has failed. This is the only media gateway state that is checkpointed to the standby Cisco MGC. The connection is in-service on the active Cisco MGC. The connection is out of service on the active Cisco MGC. The connection is out of service on the standby Cisco MGC. The connection is being held at the media gateway. This occurs due to a command timeout or an unexpected response. This state is only applicable to the active Cisco MGC.
Description Blocked because a continuity test failed on the CIC. Locally blocked on a switched system due to a media gateway event (for example, a media gateway interface fails causing an RSIP message to be sent, but the associated CICs remain in-service or when an RSIP message is not acted upon due to a mismatch between the MGCP host name in the RSIP string and the host name provisioned in the media gateway). If the associated switch is not responding to group unblock messages, the CICs stay in the GATEWAY circuit block state. Your CICs will be in this state when you bring up the Cisco MGC or media gateway. Once the associated switch acknowledges the unblock message, the CICs are taken out of this state. If the CICs stay in the GATEWAY circuit block state, troubleshoot the problem with the media gateway.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-15
Table 3-7
Type INTERFACE_DISABLED
Description The interface is disabled because the system received a CGB message or a new service has been started which is still in the install busy (INB) state. Hardware blocking typethe CIC is blocked by an external message generated by a network element outside the media gateway. Blocked manually using an MML command, such as blk-cic. This is removable using the unblk-cic or reset-cic MML commands. Locally blocked for unknown reasons. This indicates a potential software problem whereby a CIC has become blocked but the software did not track the cause of the blocking. Locally blocked on a nailed-up system due to a media gateway event (for example, a group service message received from the media gateway or the media gateway is out of service). If the associated switch is not responding to group unblock messages, the CICs stay in the MATE_UNAVAIL circuit block state. Your CICs will be in this state when you bring up the Cisco MGC or media gateway. Once the associated switch acknowledges the unblock message, the CICs are taken out of this state. If the CICs stay in the MATE_UNAVAIL circuit block state, troubleshoot the problem with the media gateway. There is no block on the CIC. DS0 is available for use. Remotely automatically blocked. Remotely blocked manually.
MATE_UNAVAIL
Note
Block types are additive: for example, LOCMAN (locally, manually blocked) and REMMAN (remotely, manually blocked) can both be active at the same time.
Platform state Number of active alarms Current congestion level Call success and failure rates CPU utilization level Amount of available memory Disk usage
3-16
OL-0800-06
Chapter 3
You can retrieve all of the statistics for your system by entering the following MML command on the active Cisco MGC:
rtrv-ne-health::all
Note
In a particular instance, the number of in-progress calls does not reflect the actual number of active calls. When an E1 link in a PBX comes up, CRMs are sent to the PBX for each channel to ensure that there are no active calls present in the PBX. This is done to ensure that synchronization can be maintained after a link failure on the IP side. These CRMs are treated as active calls, therefore increasing the number of in-progress calls returned by this command. If over 80 percent of CPU resources are being used over an extended period of time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If the response indicates that your system has a small amount of available real memory (2 gigabytes in the above example), you may need to add additional memory to your Cisco MGC to handle your systems call processing load. Refer to your Sun Netra documentation for more information on how to add additional memory to a Cisco MGC host.
Note
Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.
The amount of free and swap memory listed in the response (186 and 2048 in the above example) should be greater than 10 percent of the known total swap space and the total memory. If this is not the case, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-17
Note
Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.
If the response to the command indicates a percentage of disk space capacity used 90 percent or higher, you must delete files from your disk drive, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.
3-18
OL-0800-06
Chapter 3
root 621 618 0 10:29:23 ? 0:05 /opt/CiscoMGC/bin/snmpdm -tcplocal -d root 622 618 0 10:29:24 ? 0:00 /opt/CiscoMGC/bin/mib2agt -d mgcusr 610 1 0 10:29:18 ? 0:02 procM root 623 618 0 10:29:24 ? 0:00 /opt/CiscoMGC/bin/hostagt root 624 618 0 10:29:24 ? 0:01 /opt/CiscoMGC/bin/fsagt mgcusr 774 610 0 10:31:18 ? 0:17 ../bin/mmdbd -X 30007 mgcusr 626 610 0 10:29:24 ? 0:19 ../bin/LogServerd -X 30013 root 627 610 0 10:29:24 ? 0:05 ../bin/almM -X 30002 mgcusr 669 610 0 10:29:24 ? 0:08 ../bin/cdrDmpr -X 30005 mgcusr 637 610 0 10:29:24 ? 6:11 ../bin/amDmpr -X 30004 mgcusr 681 610 0 10:29:25 ? 0:11 ../bin/pom -X 30008 mgcusr 690 610 0 10:29:42 ? 0:02 ../bin/replicator -X 3000d -C ../ etc/XECfgParm.dat -t mgcusr 670 610 0 10:29:24 ? 0:01 ../bin/cfgM -X 30001 mgcusr 673 610 0 10:29:25 ? 0:43 ../bin/measMgr -X 30003 mgcusr 689 610 0 10:29:42 ? 1:29 ../bin/engine -X 3000e mgcusr 776 610 0 10:31:19 ? 0:01 ../bin/TCAP -X 30010 root 691 610 0 10:29:42 ? 0:01 ../bin/mmSAgt -X 30009 root 692 610 0 10:29:43 ? 0:04 ../bin/sagt -X 3000a root 693 610 0 10:29:43 ? 0:01 ../bin/provSAgt -X 3000b root 775 610 1 10:31:18 ? 37:37 ../bin/ioChanMgr -X 3000f mgcusr 777 610 0 10:31:23 ? 0:12 ../bin/MGCP -X 30016 mgcusr 778 610 0 10:31:23 ? 0:27 ../bin/ISDNL3 -X 3000c mgcusr 779 610 0 10:31:23 ? 0:26 ../bin/ISDNL3 -X 30011 mgcusr 780 610 0 10:31:23 ? 0:30 ../bin/ISDNL3 -X 30014 mgcusr 781 610 0 10:31:23 ? 0:01 ../bin/ISDNL3 -X 30015 mgcusr 782 610 0 10:31:23 ? 0:42 ../bin/SS7 -X 30017 root 783 610 0 10:31:23 ? 0:05 ../bin/foverd -X 30012 mgcusr2 5458 5456 0 11:07:28 pts/0 0:00 -tcsh root 5456 141 0 11:07:28 ? 0:00 in.rlogind root 367 1 0 14:21:02 ? 0:00 /usr/sbin/nscd mgcusr 2869 2867 0 10:05:23 pts/1 0:00 -csh root 3101 2869 0 10:06:49 pts/1 0:00 ps -ef
The response should indicate that there are between 60 and 100 processes active. If the response indicates that there are more than 100 active processes, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.
Only known login IDs should be listed in the response. If the response indicates that there are unknown login IDs, or login sessions that have lasted a very long time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-19
Caution
Do not copy other files into the /tmp directory, such as patches or other software. Use of this directory for temporary storage or for downloading can cause functional problems with the Cisco MGC software. To determine the amount of available virtual memory, you must compare the amount of virtual memory in use to the maximum amount of virtual memory for your system. To do this, perform the following steps:
Note
Be aware that the time of day at which you enter these commands effects the overall accuracy of the response. If you enter these commands during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.
Step 1
The maximum amount of virtual memory is the sum of the physical memory and the size of the swap space. To determine the amount of physical memory on your system, log in to the active Cisco MGC and enter the following UNIX commands:
cd /usr/sbin prtconf | grep Memory
Step 2
To determine the size of the swap space on the disk drive, enter the following UNIX command:
swap -s
Step 3 Step 4
Add the amount of physical memory to the amount of swap space. This value is the maximum virtual memory for your system. To determine the amount of available virtual memory, enter the following UNIX command:
vmstat
3-20
OL-0800-06
Chapter 3
The amount of swap and free memory listed in the response (3176 and 22,320 in the above example) represents the total amount of available virtual memory. This amount should always be greater than 10 percent of the maximum virtual memory. If this is not the case, proceed to Step 5.
Note
You also can use this command to check the available virtual memory repeatedly. Enter it in the format vmstat n, where n is the number of seconds between checks. Refer to the man pages on the vmstat command for more information. When the vmstat command is used to check the available virtual memory repeatedly, you should ignore the first line of output.
Step 5
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Log in to a Cisco SLT, and enter the following IOS command to check the amount of available memory:
show mem
Ensure that the memory used is less than 90 percent of the total available memory. If this is the case, the procedure is complete. If the response indicates that the Cisco SLT has a small amount of available memory, you may need to add additional memory to the Cisco SLT to handle your systems call processing load.
Note
Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-21
Step 2
Refer to the Upgrading DRAM section on page 6-16 for more information on how to add additional memory to a Cisco SLT.
Automatic Disk Space Monitoring, page 3-22 Automatic System Log Rotation, page 3-26 Rotating System Logs Manually, page 3-26 Creating a Disaster Recovery Plan, page 3-26 Backing Up System Software, page 3-27 Processing a Core Dump File, page 3-40
Note
This section does not include information on maintaining the Sun host server hardware. You should routinely perform general maintenance tasks and diagnostic checks on the host hardware. See the documentation provided by Sun Microsystems, the hardware manufacturer, for detailed information on these types of procedures.
3-22
OL-0800-06
Chapter 3
Disk monitor is controlled using the following parameters in the XECfgParms.dat file:
diskmonitor.LimitSpecifies the number of days to preserve data before trimming is initiated. The default value is 7. diskmonitor.OptFileSysAllows for optional user-configurable file systems to be monitored. This utility monitors the /opt file system for threshold crossing. Using this parameter, you can monitor additional file systems (disk slices) by setting parameter to the preferred directory, such as /tmp, /usr or /var. The messages associated with this parameter are sent to the platform.log file. To retrieve these messages, you must scan the platform.log file for messages using the following format: Filesystem file_system_name has exceeded num percent full. For example:
Filesystem /var has exceeded 80 percent full
Note
The files in these file sytems are not trimmed by disk monitor.
diskmonitor.Threshold Specifies the percentage of disk usage at which alarming and disk trimming is initiated. The default value is 80. diskmonitor.CdrRmFinishedSpecifies how many days to keep finished (polled) call detail record (CDR) files. The default value is 0, which means that if the Cisco BAMS is polling the Cisco MGC, CDR.bin files remain in a user-configurable directory until they are renamed by the Cisco BAMS (using the format CDR_timestamp.finished) and/or the disk monitor trims the file from user-configurable directory. diskmonitor.SoftLimitSpecifies the action to be taken once the number of days threshold set in the diskmonitor.Limit parameter is reached. If this parameter is set to true, disk monitor decrements the value in the diskmonitor.Limit parameter one day at a time (that is, from 7 down to 6, and then down to 5, and so on) until the utilization level drops below the threshold. If this parameter is set to false, disk monitor closes and the system generates a DISK alarm. The files can then be deleted manually. The default value is false. diskmonitor.CoreRmDaysSpecifies how many days to keep core dump files. The default value is 1, which means that core dump files are kept for one day before disk monitor removes them automatically. diskmonitor.CfgRmDirsThis parameter specifies the maximum number of configurations that can be stored in the configuration library. The valid values are the range of integers from 3 through 64. The default value is 64. Entering a value outside of the range of valid values disables monitoring of the number of entries stored in the configuration library. If you want to change the value of this parameter, you may need to add it manually to the XECfgParm.dat file.
Disk monitor performs the following steps in its inspection of disk utilization levels:
1.
Verify that the standard and optional partitions, as defined in diskmonitor.OptFileSys, are not over the thresholds for disk utilization or the configuration library, as defined in diskmonitor.Threshold and diskmonitor.CfgRmDirs, respectively.
a. If neither threshold is exceeded, disk monitor exits. b. If the disk utilization threshold is exceeded, disk monitor attempts to trim the files based on the
configuration files to match the setting in the diskmonitor.CfgRmDirs parameter, starting with the oldest.
2.
Once files are trimmed, disk monitor verifies again that the standard and optional partitions are not over the thresholds for disk utilization and the configuration library.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-23
a. If neither threshold is exceeded, disk monitor exits. b. If the disk utilization threshold is exceeded, and diskmonitor.SoftLimit is set to false, the disk
monitor begins decreasing the number of days that logs can be stored (the value defined in diskmonitor.Limit), stopping as soon as the disk is under the disk utilization threshold.
d. If the configuration library threshold is exceeded, disk monitor trims the number of
configuration files to match the setting in the diskmonitor.CfgRmDirs parameter, starting with the oldest. If any disk partition exceeds the configurable usage threshold, the Cisco MGC generates a DISK alarm (a major alarm), a warning of a disk partition overrun, and a warning of insufficient disk space. Refer to the DISK section on page 8-42 for information about the corrective actions required to resolve a DISK alarm. Some other files, such as call trace files, take up large amounts of disk space and are not trimmed by disk monitor. You may have to periodically delete call trace files. Call trace files are created when you perform call traces as part of troubleshooting a problem. These files can be rather large, and leaving them on your disk could cause problems. For more information about deleting call trace files, refer to the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.
Caution
Performing the following procedure requires that the Cisco MGC software be turned off. Do not attempt the following procedure without the guidance of the Cisco TAC. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If your system uses a single Cisco MGC in a simplex configuration, performing this procedure causes you to drop all calls.
Step 1
Determine whether any alarms are pending on the active Cisco MGC, as described in the Retrieving All Active Alarms section on page 8-3. If any alarms are pending, you can determine the appropriate courses of action by searching for the corrective actions for those alarms in the Alarm Troubleshooting Procedures section on page 8-9. If the alarms are not in that section, corrective action is not required. More information on those alarms can be found in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.
Step 2 Step 3
Repeat Step 1 for the standby Cisco MGC. Modify the disk monitor parameters in the XECfgParm.dat files, which are listed below, on each host, using the procedure described in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
diskmonitor.Limit parameterSets the number of days to preserve logged data before trimming is initiated. The default value is 7.
3-24
OL-0800-06
Chapter 3
diskmonitor.OptFileSysAllows for optional user-configurable file systems to be monitored. This utility monitors the /opt file system for threshold crossing. Using this parameter, you can monitor additional file systems (disk slices) by setting parameter to the preferred directory, such as /tmp, /usr or /var. The messages associated with this parameter are sent to the platform.log file. To retrieve these messages, you must scan the platform.log file for messages using the following format: Filesystem file_system_name has exceeded num percent full. For example:
Filesystem /var has exceeded 80 percent full
Note
The files in these file sytems are not trimmed by disk monitor.
diskmonitor.ThresholdSets the percentage of disk usage at which alarming and disk trimming is initiated. The default value is 80. diskmonitor.CdrRmFinishedSets the number of days that finished CDR files are kept in the log directory. The default value is 0, which means that if the Cisco BAMS is polling the Cisco MGC, CDR.bin files remain in a user-configurable directory until they are renamed by the Cisco BAMS (using the format CDR_timestamp.finished) and/or the disk monitor trims the file from user-configurable directory. diskmonitor.SoftLimitDetermines what action is taken once the number of days threshold set in the diskmonitor.Limit parameter is reached. If this parameter is set to true, disk monitor decrements the value in the diskmonitor.Limit parameter one day at a time (that is, from 7 down to 6 then down to 5 and so on), until the utilization level drops below the threshold. If this parameter is set to false, disk monitor exits and the system generates a DISK alarm. The default value is false. diskmonitor.CoreRmDaysSets the number of that core dump files are kept in the log directory. The default value is 1, which means that core dump files are kept for one day before disk monitor removes them automatically. diskmonitor.CfgRmDirsSets the maximum number of configurations that can be stored in the configuration library. The valid values are the range of integers from 3 through 64. The default value is 64. This parameter is not present in the XECfgParm.dat file initially. If you want to modify the value, you must enter the parameter manually into the file.
Caution
The Cisco MGC software is case-sensitive. Ensure that you enter the parameter name correctly, or the maximum number of configurations will not be modified.
Note
We recommend that you keep the latest configurations, store older configurations on system backups, and delete those older configurations from the library. For information on deleting configurations from the library, refer to the procedure in the Using the Config-Lib Viewer section on page 3-135.
Note
If you want to ensure the proper functioning of the prov-sync MML command, set the diskmonitor.CfgRmDirs parameter to a value between 50 and 60. Entering a value outside of the range of valid values (3 through 64) disables monitoring of the number of entries stored in the configuration library.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-25
Cisco MGC software startup (the log rotation script is run) Log rotation script (log_rotate.sh) is run manually The size of the active system log file has exceeded the value set in the XECfgParm.dat parameter, fileRotateSize. The time elapsed since the last log rotation has exceeded the value set in the XECfgParm.dat parameter, fileRotateInterval.
When the system rotates the system log file, the current system log file is archived and a new system log file is opened. The archived log file is stored in the /opt/CiscoMGC/var/spool directory. Once the Cisco MGC software is up and running, the log server takes over the actual file rotation responsibility of renaming the active file to a historical file with a new file name with the following format: logFileNamePrefix_yyyymmddhhmmss.log, where the time stamp indicates the system date/time at the time of log rotation.
The system creates a new current system log file and archived log file, as described in the Automatic System Log Rotation section on page 3-26.
3-26
OL-0800-06
Chapter 3
Note
We recommend that you back up your system software during periods of low call volume to minimize the effect of the backup on your call processing. There are two backup methods available for the Cisco MGC software, one for software releases up to 9.1(4), and another for software releases from 9.1(5) and up. These backup methods are described in the following sections:
Backup Procedures for Cisco MGC Software up to Release 9.1(4), page 3-27 Backup Procedures for Cisco MGC Software from Release 9.1(5) and up, page 3-32
Note
If your Cisco MGC is a continuous service system, ensure that you perform backup procedures on both Cisco MGC hosts. The following sections provide the backup procedures:
Storing a Full Backup Operation on a Local Tape, page 3-28 Storing a Partial Backup Operation on a Local Tape, page 3-28 Storing a Full Backup Operation on a Remote Machine, page 3-29 Storing a Partial Backup Operation on a Remote Machine, page 3-31 Performing a Backup Operation on the Main Memory Database, page 3-32
Note
The procedures for restoring system data can be found in the Restoring Procedures for Cisco MGC Software up to Release 9.1(4) section on page 8-164.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-27
Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory. For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local
Step 2
If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh
Step 3
Step 4
Enter F and press Enter to start the full backup. The system returns a message similar to the following:
a ./ 0 tape blocks a ./var/ 0 tape blocks a ./var/log/ 0 tape blocks a ./var/log/platform.log 1 tape blocks a ./var/log/mml.log 1 tape blocks a ./var/spool/ 0 tape blocks a ./var/trace/ 0 tape blocks a ./var/audit_cron.log 1 tape blocks . . .#
Step 5
When the backup operation has finished, remove the tape, engage the write-protect tab, and label the tape "Full MGC Backup." Specify the machine name and the time and date.
Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory.
3-28
OL-0800-06
Chapter 3
For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local
Step 2
If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh
Step 3
Step 4
Select P and press Enter to start the partial backup. The system returns a response similar to the following:
a a a a a a a a . . . # ./ 0 tape blocks ./var/ 0 tape blocks ./var/log/ 0 tape blocks ./var/log/platform.log 1 tape blocksL ./var/log/mml.log 1 tape blocks ./var/spool/ 0 tape blocks ./var/trace/ 0 tape blocks ./var/audit_cron.log 1 tape blocks
Step 5
When the backup operation has finished, remove the tape, engage the write-protect tab, and label the tape "Partial MGC Backup." Specify the machine name and the time and date.
Note
The remote NFS server you select to store your back up data should be a system in your network that is not used as a Cisco MGC. Storing back up data on a Cisco MGC can negatively affect the performance of the system.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-29
To back up the entire Cisco MGC software directory to a remote machine, complete the following steps:
Step 1
Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory. For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local
Step 2
If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh
Step 3
Step 4 Step 5
Select N and press Enter to define the remote NFS server. The system then prompts you for the name of the remote server. Enter the name of the remote NFS server.
Enter server name: remote_hostname
Where: remote_hostnameName of your desired remote server. The system then prompts you for the associated directory name on your remote server.
Step 6
Where: remote_directoryName of the associated directory on your remote server. The system then prompts you to select a backup mode.
Step 7
Select F and press Enter to start the full backup. The system returns a response similar to the following:
a ./ 0 tape blocks a ./var/ 0 tape blocks a ./var/log/ 0 tape blocks . . . backup to va-panthers:/backup/va-blade20000317105337.tar complete #
The filename on the remote NFS server is the host name of the machine with the date in YYYYMMDDHHMMSS format and .tar appended.
3-30
OL-0800-06
Chapter 3
Note
The remote NFS server you select to store your back up data should be a system in your network that is not used as a Cisco MGC. Storing back up data on a Cisco MGC can negatively affect the performance of the system. To back up a portion of the Cisco MGC software directory to a remote machine, complete the following steps:
Step 1
Log in to the active Cisco MGC as root and change directories to a local subdirectory under the base directory. For example, enter the following command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local
Step 2
If your system does not have a dial plan configured, proceed to Step 3. If your system has a dial plan configured, backup the contents of the MMDB to a single file, as described in the Performing a Backup Operation on the Main Memory Database section on page 3-32. Run the backup script by entering the following command at the UNIX prompt:
./backup.sh
Step 3
Step 4 Step 5
Select N and press Enter to define the remote NFS server. The system then prompts you for the name of the remote server. Enter the name of the remote NFS server.
Enter server name: remote_hostname
Where: remote_hostnameName of your desired remote server. The system then prompts you for the associated directory name on your remote server.
Step 6
Where: remote_directoryName of the associated directory on your remote server. The system then prompts you to select a backup mode.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-31
Step 7
Select P and press Enter to start the partial backup. The system returns a response similar to the following:
Select backup mode: P a ./ 0 tape blocks a ./var/ 0 tape blocks a ./var/log/ 0 tape blocks . . . backup to va-panthers:/backup/va-blade20000317105337P.tar complete #
The filename on the remote NFS server is the host name of the machine with the date in YYYYMMDDHHMMSS format and P.tar appended.
Note
If your system is not configured with a dial plan, do not perform this procedure.
Step 1
Log in to the active Cisco MGC and change directories to a local subdirectory under the base directory. For example, enter the following UNIX command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local
Step 2
Run the MMDB backup script by entering the following UNIX command:
./backupDb.sh filename
Where filename is the name of the database backup file. For example, to backup the contents of the MMDB to a file called dplan, you would enter the following command:
./backupDb.sh dplan
Backup Procedures for Cisco MGC Software from Release 9.1(5) and up
This backup method uses a script to backup the configuration data for the Cisco MGC software, select UNIX administrative files, and the Main Memory Database (MMDB). This script only performs full backups. This script enables you to perform manual backups, schedule and administer automatic backups, and view a history of the last 30 backup operations performed.
3-32
OL-0800-06
Chapter 3
Note
This functionality is part of a patch to Release 9.1(5). If you want to use this functionality, you must be upgraded to the proper patch level. For more information on verifying the patch level of your system, refer to the Verifying the Patch Level of the Cisco MGC section on page 3-104.
Note
If your Cisco MGC is a continuous service system, ensure that you perform backup procedures on both Cisco MGC hosts.
Note
The various backup operations described in the following sections can only be run when you are logged in to your system as mgcusr. You cannot perform any backup operation while you are logged in as root.
Note
The procedures for restoring system data can be found in the Restoring Procedures for Cisco MGC Software Release 9.1(5) and up section on page 8-168. The following sections provide the backup procedures:
Performing a Manual Backup Operation, page 3-33 Scheduling an Automatic Backup Operation, page 3-34 Listing Scheduled Automatic Backup Operations, page 3-39 Removing an Automatic Backup Operation from the Schedule, page 3-37 Listing the Backup Operation History, page 3-39
Where:
pathThe full path of the directory in which to store the backup file, for example a directory on a remote server that you have mounted on your system, or the local tape drive (the local tape drive is the default location).
Note
We recommend that you do not store backup files on your local Cisco MGC host, as storage of backup files on the local host reduces the amount of disk space available to process call data, and does not ensure that the data is safe in the event of a natural disaster.
Note
If the path you enter is for a tape device, be aware that a new tape must be entered into the device for each backup. The backup data on a used tape will be overwritten by this operation.
retriesThe number of times to check for an active provisioning session on the Cisco MGC, before aborting the backup operation. The default value is 0, and the maximum value is 100.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-33
Note
A backup operation cannot start while there is an active provisioning session on the Cisco MGC.
retry_timeThe number of seconds to wait between checks for an active provisioning session on the Cisco MGC. The default value is 30 seconds, and the maximum value is 3600 seconds.
For example, to perform a manual backup operation where the backup file is saved to a directory path called /dev/rmt/h0, with a maximum of three attempts, each 60 seconds apart, you would enter the following UNIX command:
mgcbackup -d /dev/rmt/h0 -r 3 -t 60
Note
You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The backup file is stored in the specified directory path in the following format:
mgc_hostname_yyyymmdd_hhmmss _backup
Where:
hostnameThe name of the Cisco MGC host, such as MGC-01. yyyymmddThe date the backup file is created, in a year-month-day format, such as 20011130. hhmmssThe time the backup file is created, in an hour-minute-second format, such as 115923.
Note
You can schedule an automatic backup operation only when you are logged in to your system as mgcusr. You cannot schedule an automatic backup operation while you are logged in as root.
Step 1
Selection:
Step 2
Enter 1 to add an automatic backup operation to the schedule. The system returns a response similar to the following:
3-34
OL-0800-06
Chapter 3
Step 3
Note
The name of the backup can only be between 1 and 10 alphanumeric characters in length.
After you enter the name of your automatic backup, the system returns a response similar to the following:
Enter the directory to place the backup file (default=/dev/rmt/0):
Step 4
Enter the directory path where you want the backup file stored.
Note
Note
We recommend that you do not store backup files on your local Cisco MGC host, as storage of backup files on the local host reduces the amount of available disk space to process call data, and does not ensure that the data is safe in the event of a natural disaster.
Note
If the path you enter is for a tape device, be aware that a new tape must be entered into the device for each backup. The backup data on a used tape will be overwritten by this operation.
After you enter your directory path, the system returns a response similar to the following:
Enter the number of retries (default=0):
Step 5
Enter the number of times to check for an active provisioning session on the Cisco MGC before aborting the backup operation.
Note
A backup operation cannot start while a provisioning session is active on the Cisco MGC.
Note
After you enter the number of retries, the system returns a response similar to the following:
Enter the time between retries (default=30 seconds):
Step 6
Enter the number of seconds to wait between checks for an active provisioning session on the Cisco MGC.
Note
After you enter the time between attempts, the system returns a response similar to the following:
Enter the day of the week (default=everyday):
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-35
Step 7
Enter the day(s) of the week that you would like the backup operation performed. The following values are valid:
SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY SATURDAY WEEKDAYS WEEKENDS EVERYDAY
After you enter your day(s) of the week setting, the system returns a response similar to the following:
Enter the time (HH:MM):
Step 8
Enter the time to start your automatic backup operation, in hour:minute format.
Note
The range for hour is 00-23, and the range for minute is 00-59.
Note
We recommend that you schedule your automatic backup operation for a time when your system is likely to have a minimum amount of call volume to minimize the effect of the backup on your call processing. After you enter your time setting, the system returns a response similar to the following:
Save this scheduled backup (Y or N)?
Step 9
Enter Y if you want to add this automatic backup operation, or enter N if you do not want to add an automatic backup operation.
Note
You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The system returns a response similar to the following:
Press enter to continue:
Step 10
Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.
When the automatic backup operation is performed, the backup file is stored in the specified directory path in the following format:
mgc_hostname_yyyymmdd_hhmmss _backup
Where:
3-36
OL-0800-06
Chapter 3
yyyymmddThe date the backup file is created, in a year-month-day format, such as 20011130. hhmmssThe time the backup file is created, in a hour-minute-second format, such as 115923.
Selection:
Step 2
Enter 2 to remove an automatic backup operation from the schedule. The system returns a response similar to the following:
Delete a Scheduled Backup ------------------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Enter the name of the backup to be deleted:
Step 3
Enter the name of the automatic backup operation you want to remove from the schedule. The system returns a response similar to the following:
Delete this scheduled backup (Y or N)?
Step 4
Enter Y if you want to continue with deleting an automatic backup operation, or enter N if you do not want to delete an automatic backup operation.
Note
You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The system returns a response similar to the following:
Scheduled backup name deleted. Press enter to continue:
Where name is the name of the deleted scheduled backup, as specified in Step 3.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-37
Step 5
Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.
Selection:
Step 2
Enter 3 to remove all automatic backup operations from the schedule. The system returns a response similar to the following:
Delete all Scheduled Backups ----------------------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Delete all scheduled backups (Y or N)?
Step 3
Enter Y if you want to continue with deleting all automatic backup operations, or enter N if you do not want to delete all automatic backup operations.
Note
You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcbackup script. The system returns a response similar to the following:
All scheduled backups deleted. Press enter to continue:
Where name is the name of the deleted scheduled backup, as specified in Step 3.
Step 4
Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.
3-38
OL-0800-06
Chapter 3
Selection:
Step 2
Enter 4 to list the scheduled automatic backup operations. The system returns a response similar to the following:
Scheduled Backups ----------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Press enter to continue:
Step 3
Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.
Note
If a backup operation fails, the reason for the failure is listed below the file name.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-39
Step 2
Press enter to return to the backup schedule menu. You can either exit the utility or perform another backup scheduling activity.
Determines which executable dumped the core. Finds the current time of the system. Renames the core dump file, inserting the executable that dumped the core and the date and time that the file was identified, using the following format: core.execname_yyyymmddhhmms For example, if the failover daemon process dumped the core on August 17, 2001 at 12:29:37, the core dump file is named as follows: core.foverd_20010817122937
Note
All of the processing of the core dump file(s) is performed by the process manager, after the process manager receives a signal from a failed child process. If the process manager should cause the core to be dumped, the steps listed above are not performed.
Regular Operations
This section contains procedures that you can perform on your Cisco MGC as needed. The regular operations are described in the following sections:
Managing MML Sessions, page 3-41 Managing Signaling Channels, page 3-47 Managing Bearer Channels, page 3-57 Managing SIP Communications, page 3-65 Provisioning your Cisco MGC, page 3-68 Managing your Cisco MGC Platform, page 3-99 Managing System Measurements, page 3-112 Managing Call Detail Records, page 3-125 Using the Cisco MGC Viewer Toolkit, page 3-127
3-40
OL-0800-06
Chapter 3
Displaying Previously Entered MML Commands, page 3-41 Displaying Information About MML Commands, page 3-42 Reentering Previously Entered MML Commands, page 3-46 Retrieving Active MML Sessions, page 3-47 Ending an MML Session, page 3-47
To redisplay a particular MML command that you entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
h::number
Where number is the number of the MML command you want to display. The last MML command you entered is equal to 1, the command you entered before that would be equal to 2, and so on. For example, to redisplay the tenth most recently entered MML command, you would enter the following command:
h::10
To redisplay a range of MML command that you entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
h::start_num,end_num
Where:
start_numThe number of the first MML command you want to display. The last MML command you entered is equal to 1, the command you entered before that would be equal to 2, and so on. end_numThe number of the last MML command you want to display.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-41
For example, to redisplay all of the commands from the second to the fifth most recently entered MML commands, you would enter the following command:
h::2,5
Where command_name is the name of the MML command for which you want information. For example, if you wanted information on the set-log MML command, you would enter the following command:
help:set-log
3-42
OL-0800-06
Chapter 3
associated with a single call instance. numan-add:<comp>:custgrpid=<cust group ID>,<param name>=<param value>,... Adds an element to a dial plan table numan-dlt:<comp>:custgrpid=<cust group ID> Deletes an element from a dial plan table numan-ed:<comp>:custgrpid=<cust group ID>,<param name>=<param value>,... Edits an element in a dial plan table numan-rtrv:<comp>:custgrpid=<cust group ID> Retrieves an element from a dial plan table numan-rtrv:<comp>:custgrpid=<cust group ID>,"all" Retrieves all elements from a dial plan table prov-add:<comp>:name=<MML name>,<param name>=<param value>,... Adds the component prov-add:sippath:name=<MML name>,<param name>=<param value>,... Adds SIP signal path prov-add:siplnk:name=<MML name>,<param name>=<param value>,... Adds SIP signal chan prov-add:siprttrnkgrp:name=<MML name>,<param name>=<param value>,... Adds SIP route trunk group prov-cpy Commits provisioning data prov-dlt:<comp>:name=<MML name> Deletes the component prov-dply Deploys provisioning data prov-ed:<comp>:name=<MML name>,<param name>=<param value>,... Modifies the component attributes prov-exp:<tid>:dirname="<export directory name>" Exports provisioning data to the given export directory name tid can be one of the following: all config signal trkgrp trunk numan routing export directory name can be any directory name, in double quotes, which will be created under the cust_specific directory prov-rtrv:<comp>:name=<MML name> Retrieves the component attributes prov-rtrv:all Retrieves select components prov-rtrv:siprttrnkgrp:"all" Retrieves all SIP route trunk group information prov-rtrv:session Retrieves provisioning session information if one exists prov-rtrv:variants Retrieves all variants prov-rtrv:profiletypes Retrieves all profile types prov-sta::srcver=<version>,dstver=<version>,confirm Starts a provisioning session prov-stp Stops the current provisioning session prov-stp:<session name>:confirm Stops the specified provisioning session prov-sync Synchronizes provisioning data prt-call:<sig path>|<trk grp>:[CIC=<number>|SPAN=<number>[BC=<number>]] [,LOG=<logname>] [,EVT] Prints diagnostic information about an active call into the log file query-cic:<sigpath>:CIC=<number>[,RNG=<slaves>][,RSLV] Performs a circuit query for a circuit or a circuit range with an optional RESOLVE parameter quit Ends the session r[::<number>] Repeats a previously entered command with a specified backward number; the last command by default reset-cic:<sigpath>:CIC=<number>[,RNG=<slaves>] Resets a circuit or a circuit range
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-43
rtrv-admin-state:<target>:<param> Retrieves the administrative state of the target; target can be a MGC or gateway or trunk group or signal path;param can be one of the following combinations: [span=number] or [span=number,]bc=number[,RNG=number] or cic=number[,RNG=number] rtrv-alms Displays all active alarms rtrv-alms::CONT Displays all active alarms and listens for alarm events until Ctrl-C rtrv-aud-gw:<sig path MGCP> Retrieves result of an auditing process of a gateway rtrv-aud-gw:all Retrieves results of auditing processes of all gateways rtrv-cic:<sigpath>:CIC=<number>[,RNG=<slaves>] Retrieves bearer channels of a signal path rtrv-ctr:<comp>:"<meas cat>" Retrieves a measurement of a component rtrv-dest:<sigpath> Retrieves state of a destination (signal path) rtrv-dest:all Retrieves state of all destinations (signal paths) rtrv-dns-info:<sig path SIP> Retrieves DNS cache info rtrv-iplnk:<IP link> Displays attributes of an IP link rtrv-iplnk:all Displays attributes of all IP links rtrv-lnk-ctr:<C7 link/set> Retrieves all measurements of a link or link set rtrv-lnk-ctr:all Retrieves all measurements of all links rtrv-log:all Displays logging level of all processes rtrv-log:<proc> Displays logging level of a process rtrv-lset:<C7 link set> Displays state of a link set rtrv-lssn:all Displays state of local SSN rtrv-mml Displays all active MML sessions rtrv-ne Displays attributes of the Network Element rtrv-ne-health Displays health of the Network Element (CPU/Memory utilization etc.) rtrv-ovld Displays congestion level and number of rejected calls due to far-end congestion rtrv-rssn:all Displays state of remote SSN rtrv-rte:<sig path> Retrieves all SS7 routes for a signaling service rtrv-rte:all Retrieves SS7 routes for all signaling services rtrv-dchan:<D channel | fas link> Displays attributes of a signal channel rtrv-dchan:all Displays attributes of all D channels rtrv-c7lnk:<C7 link set|C7 link> Displays attributes of a link(set) rtrv-c7lnk:all Displays attributes of all signal channels and link sets rtrv-sc-trc Displays the names of all files currently open for the various traces in progress rtrv-softw:<proc> Displays status of a process or process group rtrv-softw:all Displays status of all known processes rtrv-sp-ctr:<point code> Retrieves all measurements of a point code rtrv-sp-ctr:all Retrieves all measurements of all point codes rtrv-spc:<point code> Retrieves route set of a point code rtrv-spc:all Retrieves route sets of all point codes rtrv-ss7-slt:<C7 link> Retrieves result of an MTP SLT test on a link (Japanese SS7 only) rtrv-ss7-srt:<point code>:LSET="<C7 link/set>" Retrieves result of an MTP SRT test on a point code (Japanese SS7 only) rtrv-tc:<sig path>&<sig path>... Displays state of bearers per signal path(s) rtrv-tc:all Displays state of all bearers rtrv-tc-held:<sig path>&<sig path>... Displays state of bearers per signal path(s) held by gateway rtrv-tc-held:all Displays state of all bearers, held by gateway rtrv-tcap-trans Displays number of active TCAP transactions rtrv-thres::"<Meas Cat>" Displays the threshold settings for measurement category set-admin-state:<target>:<param>,LOCK|UNLOCK|RESET
3-44
OL-0800-06
Chapter 3
Sets the administrative state of the target; target can be a MGC or gateway or trunk group or signal path; param can be one of the following combinations: [span=number] or [span=number,]bc=number[,RNG=number] or cic=number[,RNG=number] set-dest-state:<sig path>:IS|OOS... replaced by set-dest set-dest:<sig path>:IS|OOS|FOOS Changes service state of signal path set-iplnk:<IP link>:IS:OOS:FOOS Changes the services state of an IP link This command is disabled for NAS links set-lnk-state:<C7 link/set>:IS|OOS|INH|UNH Changes service state of a link or a linkset set-log:<proc>:<log level> Sets logging level for process <proc> set-log:<proc>:DEBUG,CONFIRM Sets DEBUG logging level for <proc> set-log:all:<log level> Sets logging level for all processes. logLevel can be: DEBUG | TRACE | INFO | WARN | ERR | CRIT set-lssn-state::<SSN>,IS|OOS Changes service state of a local SSN set-c7lnk:<C7 IP or TDM SS7 link>:IS|OOS|FOOS|UNH|INH Changes service state of a SS7 link set-dchan:<FAS link|d-channel>:IS|OOS Changes service state of FAS related link set-spc-state:<point code>:IS|OOS... Changes service state of a point code set-thres::cat="<meas cat>",interval=<seconds>,thres=<value> Changes the threshold value of measurement category <meas cat> for interval to the new value snd:ext:<string> Sends a message to an external process snd:ext:"help" Displays a list of commands available for an external process (provided by external process, not MML) sta-aud Starts auditing process sta-aud-gw:<sig path MGCP> Starts auditing process of a gateway sta-aud-gw:all Starts auditing processes of all gateways sta-abn-trc:<sig path>|all:params Starts dumping diagnostic info for abnormally terminated calls on entire MGC or a specified signal path or a point code , optional params are: CONFIRM - confirms tracing over all or signal path or point code (not needed when using span or trunk - otherwise required) log="filename" output file name in the ../var/trace directory span=x, where x is the span number of interest trk=y, where y is the trunk number tc=c, where c is the traffic channel of interest rng=b, where b is the range of spans prd=n, where n is the period in seconds that this trace needs to be run for (default is half minutes or 30 seconds) sta-dns-info:<sig path SIP>:<param> Starts retrieve process of DNS cache sta-dns-purge:<sig path SIP> Starts purge of DNS cache sta-sc-trc:<sig path>|<trkgrp>:params Starts tracing on a signal path or a point code or a trunk group, optional params are: CONFIRM - confirms tracing over a signal path or point code or trunk group (not needed when using span or trunk - otherwise required)
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-45
log="filename" output file name in the ../var/trace directory span=x, where x is the span number of interest trk=y, where y is the trunk number tc=c, where c is the traffic channel of interest rng=b, where b is the range of spans prd=n, where n is the period in seconds that this trace needs to be run for (default is 30 minutes or 1800 seconds) sta-ss7-slt:<C7 link> Starts an MTP SLT test on a link sta-ss7-srt:<point code>:LSET="<C7 link/set>" Starts an MTP SRT test on a point code sta-tcap-trc Starts TCAP tracing stp-abn-trc:<sig path>|<trkgrp> Stops abnormal tracing on a signal path stp-abn-trc:all Stops abnormal tracing on all signal paths stp-aud Stops auditing process stp-call:<target>:<param> Stops call(s) in progress for the given target; target can be a MGC or gateway or trunk group or signal path; param can be one of the following combinations: [span=number,]confirm or [span=number,]bc=number,[RNG=number,] confirm or cic=number,[RNG=number,]confirm stp-sc-trc:<sig path>|<trkgrp> Stops tracing on a signal path or trunk group stp-sc-trc:all Stops tracing on all signal paths stp-tcap-trc Stops TCAP tracing sw-over::CONFIRM Forces a switchover to a stand-by platform tst-cot:<sigpath>:CIC=<number> Performs a COT test on a circuit unblk-cic:<sigpath>:CIC=<number>[,RNG=<slaves>] Unblocks a circuit or a circuit range vld-cic:<sigpath>:CIC=<number> Performs a circuit validation
The system returns a response appropriate to the previously entered command. For example, if the previously entered command was rtrv-spc:all, a response similar to the following would be returned:
MGC-01 - Media Gateway Controller 2001-06-08 10:20:38 M RTRV "sigsrv1:DPC=244.001.045,DNW=2:OPC=244.001.004:AOOS" "sigsrv2:DPC=244.018.030,DNW=2:OPC=244.001.004:AOOS" "sigsrv3:DPC=244.018.031,DNW=2:OPC=244.001.004:AOOS" "sigsrv4:DPC=244.018.032,DNW=2:OPC=244.001.004:AOOS" "sigsrv5:DPC=244.018.033,DNW=2:OPC=244.001.004:AOOS"
To reenter a particular MML command that you entered, log in to the active Cisco MGC, start an MML session, and enter the following command:
r::number
Where number is the number of the MML command you want to reenter. The last MML command you entered is equal to 1, the command you entered before that would be equal to 2, and so on.
3-46
OL-0800-06
Chapter 3
For example, to reenter the tenth most recently entered MML command, you would enter the following command:
r::10
Note
You can also use the up arrow key to re-execute a previously entered MML command.
The response lists the session number (mml5 in the example) and the user ID of the session owner (guest in the example).
SS7 Message Transfer Part (MTP)Used for reliable delivery. MTP level 2 provides point-to-point delivery. MTP level 3 maintains multiple load-sharing links and multiple routes between SS7 point codes. SS7 MTP over IP (SS7/IP)MTP level 2 is terminated on the Cisco SLT. MTP level 3 is backhauled to the Cisco MGC by means of the Cisco-proprietary Reliable User Datagram Protocol (RUDP). Facility Associated Signaling (FAS)Found in ISDN PRI or DPNSS over a 64-Kbps channel. Reliable delivery is provided by some form of Link Access Protocol (LAP), for example Q.921. FAS over IP (FAS/IP)Same as FAS, but uses IP as its transport mechanism. Reliable delivery is provided by Q.921 LAP-D or RUDP/SM. Media Gateway Control Protocol (MGCP)Reliable delivery is also provided by the MGCP, which uses UDP/IP.
The following sections describe the information returned by the system when you retrieve signaling channel data using MML commands.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-47
Parent Name
The second field lists the MML name of the parent of the signaling channel or linkset.
Link ID
The LID field lists the associated link identification number.
Subsystem Number
The SSN field lists the associated subsystem number.
Description The system has taken the signaling channel out-of-service (OOS). When a system is first configured, all signaling links default to this state and must be manually set in-service (IS) through the use of the set MML commands. The signaling channel is IS and fully operational. This is its normal operating state. The signaling channel has been manually taken OOS. State of signaling channels when a retrieve command is entered on the standby Cisco MGC. The current service state is maintained only on the active Cisco MGC. The signaling channel is OOS from the remote end. The system is actively trying to restore the signaling channel. The links on the standby Cisco MGC are always OOS (with a secondary service state of STBY) because the current service state is maintained only on the active Cisco MGC. The state of the signaling channel is currently being changed. The state of the signaling channel is not known.
IS MOOS OFF_DUTY
OOS
Out-of-service
TRNS UNK
Transient Unknown
3-48
OL-0800-06
Chapter 3
CISCommanded in service CONFConfiguration failure COOSCommanded out of service ENGRCall engine reset ISPENDIn service, pending LCNGCongestion, local LINELine failure LINHSS7 local inhibit LINKLink failure LINSLinkset failure NACause not available OOSPENDOut of service, pending PRHBSS7 prohibited RBLKSS7 remote blocked RCNGCongestion, remote RINHSS7 remote inhibit RSTRSS7 restricted SERRSS7 signal error STBYHost is in the standby state SUPPENTSupporting entity TPATHTraffic path UNKCause unknown
The operations you can use to manage an signaling channels are described in the following sections:
Note
To ensure that you are retrieving the correct service states of the signaling channels, always perform the retrieval procedures below on the active Cisco MGC. The current service states of the signaling channels are maintained only on the active Cisco MGC. If you retrieve the service state of a signaling channel on the standby Cisco MGC, the system always returns a message that indicates that the links are out-of-service due to the host being in the standby state (i.e., "c7link1:ls01,LID=0:OOS,STBY" /* Link 1 in Linkset 1 */). Such a message does not indicate that the signaling channel itself is out-of-service. If a switchover occurs, the service state for each signaling channel remains the same as the standby Cisco MGC assumes the active role.
Retrieving Signaling Service States, page 3-50 Retrieving Service State of C7/SS7 Links or Linksets, page 3-50 Retrieving the Service State for IP Links, page 3-51 Retrieving the Service State for IP Routes, page 3-51 Retrieving the Service State of D-Channels, page 3-53 Retrieving the State of SS7 Signaling Services, page 3-54 Retrieving the State of SS7 Routes, page 3-54
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-49
Retrieving the State of All Local Subsystem Numbers, page 3-55 Retrieving the Service State for Associations, page 3-55 Clearing TCAP Transactions, page 3-56 Enabling Group Service Reset Messages, page 3-57
Where sig_srv is the MML name of a signaling service. The system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 14:53:03 M RTRV "sigsrv1:PKG=SS7-ANSI,ASSOC=SWITCHED,PST=IS,SST=RCNG"
For more information on the response to this command, refer to the Understanding the Signaling Service State Information section on page 3-9. If the destination is in a primary service state other than IS, attempt to bring it into service, as described in the Setting the Service State of a Signaling Service section on page 8-95.
Note
If the rtrv-dest MML command is entered after a switchover has occurred, the state of some of the signaling services might be listed as undefined (UND). UND is the default state for a signaling service when the system starts. In this instance, UND states indicate that the Cisco MGC has not received a service state message for the associated signaling service since the switchover occurred. No user action is required.
For example, to retrieve the service state for an SS7 link called c7link1, enter the command:
rtrv-c7lnk:c7link1
To retrieve service state for all of the SS7 links, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-c7lnk:all
3-50
OL-0800-06
Chapter 3
The valid service states for a C7/SS7 link are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the link is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96.
For example, to retrieve the service state of an IP link called iplink1, enter the following command:
rtrv-iplnk:iplink1
To retrieve attributes for all of the IP links, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-iplnk:all
The system returns a message similar to the following, which shows the IP links to and from the Cisco MGCs and the associated media gateways (different solutions might use different media gateways).
M Media Gateway Controller 2000-03-26 19:23:23 RTRV "iplink1:OOS "iplink2:OOS "iplink3:OOS "iplink4:OOS "iplink5:OOS "iplink6:OOS
The valid service states for an IP link are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the link is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of an IP Link section on page 8-97.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-51
For example, to retrieve the service state of an IP route called iprte1, enter the following command:
mml>rtrv-iproute:iprte1
To retrieve attributes for all of the IP routes, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>rtrv-iproute:all
The valid service states for an IP route are described in the following sections. If the route is in any other state than IS, attempt to bring it into service, as described in the Setting the Service State of an IP Route section on page 8-97.
Description Route is IS and fully operational. This is its normal operating state. Route is OOS. The system is actively trying to restore the link.
Description Route is OOS due to a configuration failure. Route has been commanded OOS by the operator. Route is available for use, but not currently being used. Routes on the standby Cisco MGC.
3-52
OL-0800-06
Chapter 3
For example, to retrieve the service state for D-channel called dchan-1, enter the following command:
rtrv-dchan:dchan-1
When the D-channel is associated with an FAS signaling path, the system returns a message similar to the following:
M Media Gateway Controller 2000-03-26 20:26:18 RTRV "dchan-1:fas1,LID=0:IS" ;
In this response, fas1 is the signaling path, or a logical grouping of D-channels (equivalent to a linkset). The LID is the line identifier, or the logical line ID of the D-channel within the signaling path (equivalent to the SLC in SS7). IS is the primary service state of the D-channel. When the D-channel is associated with an NFAS signaling path, the system returns a message similar to the following:
M Media Gateway Controller 2000-03-26 20:26:18 RTRV "dchan-1:nfas1,LID=0:PRI,backup=dchan-2:STBY" ;
In this response, nfas1 is the signaling path, or a logical grouping of D-channels (equivalent to a linkset). The LID is the line identifier, or the logical line ID of the D-channel within the signaling path (equivalent to the SLC in SS7). The next field indicates whether the specified D-channel is the primary (PRI) channel or the standby (STBY). Finally, the backup field specifies the MML name of the D-channel that is configured as the backup to the specified D-channel. This field is displayed only when a backup D-channel has been provisioned. For information on provisioning backup D-channels, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. To retrieve the service state for all of the D-channels, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-dchan:all
The system returns a message similar to the following, which shows the signaling links to and from the Cisco MGCs and the associated media gateways (different solutions might use different media gateways).
M Media Gateway Controller 2000-03-26 19:23:23 RTRV "dchan1:nfas1,LID=0:IS" "dchan2:nfas1,LID=1:IS" "dchan3:fas1,LID=0:IS"
The valid service states for a D-channel are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the link is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of a D-channel section on page 8-98.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-53
Where SS7_sig_srv is the MML name for the associated SS7 signaling service. The system returns a response similar to the following:
M MGC-01 - Media Gateway Controller 2001-06-12 16:10:21 RTRV "ss7sigsrv1:DPC=244.001.041,DNW=2:OPC=244.001.005:AOOS"
To retrieve the current state for all of your SS7 signaling services, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-spc:all
The valid service states for a signaling service are found in the Understanding the Signaling Service State Information section on page 3-9. If the signaling service is in any other state than IS, attempt to bring it into service, as described in the Setting the Service State of an SS7 Signaling Service section on page 8-96.
Where dpc is the MML name for the associated destination point code (DPC). The system returns a response similar to the following:
M MGC-01 - Media Gateway Controller 2001-06-12 16:17:55 RTRV "dpc1:linkset1,APC=244.001.040,PRIO=1,PST=AOOS,SST=NA"
To retrieve the current state for all of SS7 routes, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-rte:all
3-54
OL-0800-06
Chapter 3
The valid service states for a linkset are identical to the primary service state listings for signaling channels, as found in the Managing Signaling Channels section on page 3-47. If the linkset is in any other state than IS, attempt to bring the linkset into service, as described in the Setting the Service State of a Signaling Service section on page 8-95.
The response indicates the name of the associated process, the SSN, and the state (either in-service or out-of-service). If any of the local SSNs are out of service, proceed to the Setting the Service State of a Local Subsystem Number section on page 8-98.
For example, to retrieve the service state of an association called assoc1, enter the following command:
mml>rtrv-association:assoc1
To retrieve attributes for all of the associations, log in to the active Cisco MGC, start an MML session, and enter the following command:
mml>rtrv-association:all
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-55
The valid service states for an association are described in the following sections. If the association is in any other state than IS, attempt to bring it into service, as described in the Resolving an Association Alarm section on page 8-113.
Description When a system is first configured, all associations default to this state and must be manually set in-service (IS) through the use of the set-iplnk MML command. Association is IS and fully operational. This is its normal operating state. Association is OOS. The system is actively trying to restore the association.
IS OOS
In-service Out-of-service
Description Association is OOS due to a configuration failure. Association has been commanded OOS by the operator. Association on the standby Cisco MGC.
3-56
OL-0800-06
Chapter 3
Where number is the time period, in seconds, after which you want to clear TCAP transactions. For example, to clear all TCAP transactions that are older than 60 seconds, you would enter the following command:
clr-tcap-trans::t=60
Caution
We do not recommend enabling the sending of GSR messages on your Cisco MGC.
Note
You can use the CMM or the VSPT to enable the sending of GSR messages on your system. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information about using the CMM or VSPT to modify the properties of an SS7 signaling service. To enable the sending of GSR messages, perform the following steps:
Step 1 Step 2
Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to set the property that enables the sending of GRS messages for CICs during point code initialization:
prov-ed:ss7path:name="comp_name",GRSEnabled=true
Where: comp_nameMML name for the SS7 signaling service on which you are enabling the sending of GRS messages. For example, to enable the sending of GRS messages on an SS7 signaling service named ss7svc1, you would enter the following command:
prov-ed:ss7path:name=ss7svc1,GRSEnabled=true
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Verifying Proper Replication of Calls, page 3-58 Retrieving the States of Bearers Held By a Media Gateway, page 3-59 Blocking CICs, page 3-60 Retrieving the Administrative State, page 3-61
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-57
Caution
The following command retrieves the current status of all provisioned traffic channels. If you have a large number of traffic channels, you might want to limit the command to a subset of the provisioned channels, perhaps on a signaling-service-by-signaling-service basis. For example, to see just the provisioned channels for a signaling service named ss7svc2, you would enter the following command: rtrv-tc:name=ss7svc2.
Step 1
Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-tc:all
The system returns a different set of responses, depending on which release of the MGC software you are running and the type of configuration you are using on the associated media gateway. When the Cisco MGC software is configured for signaling, the system returns a response similar to the following:
Media Gateway Controller - MGC-67 2000-04-05 08:08:12 M RTRV "c7s-1:CIC=1,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=2,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=3,PST=IS,CALL=IDLE,BLK=NONE" "c7s-1:CIC=4,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=5,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=6,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=7,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=8,PST=IS,CALL=IN,BLK=NONE" "c7s-1:CIC=9,PST=IS,CALL=IN,BLK=NONE"
When the Cisco MGC software is configured for call control, the system returns a response similar to the following:
M Media Gateway Controller - MGC-04 2000-04-05 08:05:54 RTRV "c7s-1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=2,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=3,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=4,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=5,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=6,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=7,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=8,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "c7s-1:CIC=9,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"
Note
An explanation of the fields in the response can be found in the Understanding CIC States section on page 3-14.
Step 2 Step 3
Repeat Step 1 on the standby Cisco MGC. Verify that the CICs in both systems are in sync and show the same status. Calls in progress should say CALL=IN for both systems.
3-58
OL-0800-06
Chapter 3
If necessary, you can force the active Cisco MGC to do a maintenance switchover (see the Performing a Manual Switchover section on page 3-99) and repeat the above procedure for that system.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Where sig_dest is a logical signaling destination, such as an SS7 point code, FAS path, IP FAS path, or DPNSS path. You can display a complete list of configured components by performing the procedure in the Retrieving component data section on page 3-106. When none of the group of bearer channels associated with the specified signaling destination(s) are being held by a media gateway, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1" /* No bearer channels in held state */
When bearer channels associated with the specified signaling destination(s) are being held by a media gateway, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=2,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=3,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=4,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=5,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=6,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=7,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=8,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=9,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"
To retrieve the state of all bearer channels held by a media gateway, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-tc-held:all
When none of the bearer channels are being held by a media gateway, the system returns a response similar to the following:
Retrieving results. This could take a few moments... MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1" /* No bearer channels in held state */ "ss7svr2" /* No bearer channels in held state */
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-59
When bearer channels are being held by a media gateway, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 16:28:39 M RTRV "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=1,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=2,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=3,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=4,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=5,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=6,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=7,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=8,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc1:CIC=9,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=10,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=11,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=12,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=13,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=14,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=15,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=16,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=17,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE" "ss7svc2:CIC=18,PST=IS,CALL=IDLE,GW_STAT=CXN_IS,BLK=NONE"
Blocking CICs
You may need to block a CIC or a range of CICs on your Cisco MGC. Blocking a single CIC causes a BLA message to be sent to the destination SSP. Blocking a range of CICs causes a CGB message to be sent to the destination SSP. The range option only can be used to block CICs within a given trunk (T1 or E1). To block a single CIC, log in to your active Cisco MGC, start an MML session and enter the following command:
blk-cic:sig_srv:CIC=number
Where:
sig_srvMML name of a signaling service associated with the CIC you want to block. numberThe number of the CIC you want to block.
For example, to block CIC number 1, which is associated with a signaling service called ss7svc1, you would enter the following command:
blk-cic:ss7svc1:cic=1
To block a range of CICs, log in to your active Cisco MGC, start an MML session, and enter the following command:
blk-cic:sig_srv:CIC=number,RNG= range
Where:
sig_srvMML name of a signaling service associated with the CICs you want to block. numberThe number of the first CIC in the range of CICs you want to block. rangeSpecifies the end of the range of CICs to be blocked.
3-60
OL-0800-06
Chapter 3
Note
The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, use of the range option causes individual supervision messages to be issued for each CIC in the range, instead a single group supervision message. For example, to block CIC number 1 through 20, which are associated with a signaling service called ss7svc1, you would enter the following command:
blk-cic:ss7svc:cic=1,rng=20
To verify that the CIC(s) have been successfully blocked, retrieve the status of the affected CICs as described in the Verifying CIC States section on page 3-13. When you want to return the CIC(s) to service, you must unblock the CIC(s) as described in the Unblocking CICs section on page 8-131.
If all circuits are in a locked state, the inferred target administrative state is locked. If at least one circuit is in an unlocked state, the inferred target administrative state is unlocked. If the circuits are in a mixture of the locked and shutdown states, the inferred target administrative state is shut down.
If you want to change the administrative state of a component, refer to the Setting the Administrative State section on page 8-116. The following procedures describe how you can use the rtrv-admin-state MML command:
Retrieving the Administrative State of a Cisco MGC, page 3-61 Retrieving the Administrative State of a Media Gateway, page 3-62 Retrieving the Administrative State of a Trunk Group, page 3-62 Retrieving the Administrative State of a Signaling Service, page 3-62 Retrieving the Administrative State of Spans, page 3-63 Retrieving the Administrative State of CICs, page 3-64
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-61
If you want to change the administrative state of the Cisco MGC, refer to the Setting the Administrative State of a Cisco MGC section on page 8-116.
Note
Not all media gateway types are applicable. Supported types are CU, MUX, and MGW external nodes. The system returns a response similar to the following:
Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "mgw1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"
If you want to change the administrative state of the media gateway, refer to the Setting the Administrative State of a Media Gateway section on page 8-117.
Note
This command can only be used for time-division multiplexing (TDM) trunk groups. Allow the corresponding MML name for component type "0020". The system returns a response similar to the following:
Media Gateway Controller - MGC-03 2000-02-17 14:27:52 M COMPLD "trunkgrp1:PST=UNLOCK,LOCK=0,UNLOCK=384,SHUTDOWN=0"
If you want to change the administrative state of the trunk group, refer to the Setting the Administrative State of a Trunk Group section on page 8-117.
3-62
OL-0800-06
Chapter 3
Where sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC). Signaling service or routeset associated with a DPC. EISUP signaling service.
If you want to change the administrative state of the signaling service, refer to the Setting the Administrative State of a Signaling Service section on page 8-118.
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
For example, to determine the administrative state of span number 2 associated with a signaling service called ss7svc1, you would enter the following command:
rtrv-admin-state:ss7svc1,span=2
To retrieve the administrative state of a bearer channel or a range of bearer channels in a span, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:sig_srv,span= x,bc=y[,rng=range]
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-63
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
xA16-bit value that identifies an ISDN/PRI physical cable. yA numeric value that identifies the non-ISUP bearer channel number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved.
For example, to determine the administrative state of bearer channels numbers 2 through 6, associated with a signaling service called ss7svc1, you would enter the following command:
rtrv-admin-state:ss7svc1,span=2,bc=2,rng=5
If you want to change the administrative state of the spans, refer to the Setting the Administrative State of Spans section on page 8-119.
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
numberA valid CIC number. rangeA value such that y+range is a valid CIC number. The administrative state for all CICs between y and y+range are retrieved.
For example, to determine the administrative state of CICs 2 through 11 associated with a signaling service called ss7svc1, you would enter the following command:
3-64
OL-0800-06
Chapter 3
rtrv-admin-state:ss7svc1,cic=2,rng=9
If you want to change the administrative state of the CICs, refer to the Setting the Administrative State of CICs section on page 8-120.
Managing the DNS Cache, page 3-65 Retrieving SIP Call Information, page 3-66
Log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-dns-info:sippath_name :URL | cache_entry_num | null_string
Where:
sippath_nameMML name of the SIP signaling service associated with the DNS cache. URLThe associated WWW address. If you enter the associated URL in this command, the command in Step 2 displays the IP address and the time to live (TTL) values. cache_entry_numThe DNS cache entry number. If you enter the associated cache entry number in this command, the command in Step 2 displays the URL, IP address and TTL values. null_stringAn empty string (entered as in the command line). If you enter a null string in this command, the command in Step 2 displays the DNS IP addresses, size of the cache, percentage of the cache being used, and the local TTL value.
For example, to start a DNS information request for the cache associated with the signaling service, sipsigpath, enter one of the following commands:
sta-dns-info:sipsigpath:sipphone1.cisco.com sta-dns-info:sipsigpath:10 sta-dns-info:sipsigpath:
Step 2
Request the contents of the specified DNS cache associated with a SIP signaling service. To do this, enter the following command:
rtrv-dns-info:sippath_name
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-65
Where: sippath_nameMML name of the SIP signaling service you entered in Step 1. If you entered the associated URL along with name of the SIP signaling service in Step 1, the system returns a message similar to the following.
M Media Gateway Controller 2000-03-26 19:23:23 RTRV IP address = 193.12.174.56 TTL = 240
If you entered the associated cache entry number along with the name of the SIP signaling service, the system returns a message similar to the following.
M Media Gateway Controller 2000-03-26 19:23:23 RTRV URL = sipphone3.cisco.com IP address = 193.12.174.56 TTL = 240
If you entered a null string along with the name of the SIP signaling service, the system returns a message similar to the following.
M Media Gateway Controller 2000-03-26 19:23:23 RTRV DNS 1 DNS 2 Cache Cache Local address 193.12.77.2 address 193.21.9.76 size = 280 usage = 81 TTL = 240 ;
Where: sippath_nameMML name of the SIP signaling service associated with the DNS cache. For example, to purge the DNS cache associated with the signaling service, sipsigpath, enter the following command:
sta-dns-purge:sipsigpath
3-66
OL-0800-06
Chapter 3
To retrieve information about calls that use SIP for at least one end of the call, log in to the active Cisco MGC, and enter the following command:
rtrv-sip:type [timerperiod=min | detail]
always SIP).
sipDisplays calls that use SIP on both ends of a call (a SIP-to-SIP call)
minOptional parameter to limit the content of the response to calls that have durations over the specified amount, in minutes. For example if you entered the parameter as timerperiod=120, the response to this command would be limited to calls of the specified type that are over 120 minutes in duration.
Note
If you find that you have SIP-to-SIP calls that have excessive durations, you can cancel those calls using the procedure described in the Stopping SIP-to-SIP Calls, page 8-148.
detailOptional parameter to provide the calling (from) and the called (to) number for the specified type of calls.
The standard version of this command returns a response that indicates the SIP call identification name and the protocol type used on the other end of the call. The protocol type can be one of the following:
TDMUsed when the other end of the call is SS7, ISDN, or other protocols of this type IPUsed when the other end of the call is EISUP or H.323 SIPUsed when the other end of the call is SIP (a SIP-to-SIP call)
When the standard version of this command is entered, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2002-05-13 10:02:08.833 PST M RTRV sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=SIP "sip-sigpath:[email protected]," "sip-sigpath:CALL=IN,MATE_FAMILY=SIP "sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=SIP "sip-sigpath:[email protected]," "sip-sigpath:CALL=IN,MATE_FAMILY=IP "sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=IP
When this command is entered with the optional command to provide detailed call data, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2002-05-13 10:02:08.833 PST M RTRV "sip-sigpath:[email protected]," "sip-sigpath:CALL=OUT,MATE_FAMILY=SIP,FROM=2025553230,TO=4080000284" "sip-sigpath:[email protected]," "sip-sigpath:CALL=IN,MATE_FAMILY=SIP,FROM=2025553230,TO=4080000284"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-67
Starting a Provisioning Session, page 3-68 Saving and Activating your Provisioning Changes, page 3-69 Ending a Provisioning Session Without Activating your Changes, page 3-70 Invoking Dynamic Reconfiguration, page 3-70 Retrieving Provisioning Data, page 3-72 Provisioning a Dial Plan, page 3-78 Importing Provisioning Data, page 3-79 Exporting Provisioning Data, page 3-79 Managing Automatic Congestion Control, page 3-80
For more detailed information about provisioning your Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Where:
curr_verThe name of the current configuration version. In place of the name of the current configuration version, you can also enter:
newA new default session configuration; no existing source configuration is available. activeSelects the active configuration as the source for configuration changes.
Note
You can use new as the source configuration only when there is no existing, active set of provisioning data in the configuration library. Therefore, new cannot be used as the source configuration once a provisioning session has been saved and activated by using prov-cpy or prov-dply. Once you have saved and activated a set of data, you must use either active or the name of the set of provisioning data as the source configuration.
Note
If you do not know the name of your current configuration session, you can use the CONFIG-LIB viewer in the MGC toolbar to determine that name. For more information on the CONFIG-LIB viewer, proceed to the Using the Config-Lib Viewer section on page 3-135.
3-68
OL-0800-06
Chapter 3
mod_verA new configuration version name that contains your provisioning changes.
For example, to use a configuration version called ver1 as the basis for a version to be called ver2, you would enter the following command:
prov-sta::srcver=ver1,dstver=ver2
Once a provisioning session is underway, you may use the prov-add, prov-ed, or prov-dlt MML commands to add, modify, and delete components on your system. If you want to add components to your system, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. If you want to modify or delete components on your system, refer to the Invoking Dynamic Reconfiguration section on page 3-70. There are two ways to close your provisioning session: save and activate your provisioning changes or end your provisioning session without saving and activating your changes. For more information on saving and activating your provisioning changes, refer to the Saving and Activating your Provisioning Changes section on page 3-69. For more information on ending your provisioning session without saving and activating your changes, refer to the Ending a Provisioning Session Without Activating your Changes section on page 3-70.
Caution
Using the prov-cpy and prov-dply MML commands can severely impact your systems call processing performance, depending on the extent of your provisioning changes. We recommend that these commands be issued during a maintenance window when traffic is minimal. The prov-cpy MML command is used to save and activate your changes on the active Cisco MGC. This command is typically used to save and activate changes on a Cisco MGC in a simplex configuration. However, you can use the prov-cpy MML command on Cisco MGCs in high-availability or continuous-service configurations, to save and activate your changes on the active Cisco MGC. If you choose to do this, you should enter the prov-sync MML command immediately afterwards, to have your changes saved and activated on the standby Cisco MGC.
Note
When you add new signaling links and/or CICs to your provisioning data using the prov-cpy command, and then save your new objects to the standby MGC host using the prov-sync command, the link and call state data are not synchronized. To ensure that the link and call state data are synchronized, reboot the MGC software on the standby MGC host once prov-sync has completed its synchronization.
Caution
Using the prov-sync MML command can severely impact your systems call processing performance. We recommend that this command be issued during a maintenance window when traffic is minimal.
Note
When the prov-sync MML command is used to synchronize the provisioning settings on the standby Cisco MGC host with current settings on the active Cisco MGC host, the system does not indicate when the synchronization process has failed.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-69
Note
When you enter the prov-cpy command, your provisioning session is also automatically ended. If you want to make additional provisioning changes, you must start a new provisioning session as described in the Starting a Provisioning Session section on page 3-68. The prov-dply MML command is used to save and activate your changes on the active and standby Cisco MGCs. This command is typically used to save and activate changes on Cisco MGCs in high-availability or continuous-service configurations. This command should not be used on a Cisco MGC in a simplex configuration.
Note
When you enter the prov-dply command, your provisioning session is also automatically ended, unless an error occurs during execution. If you want to make additional provisioning changes, you must start a new provisioning session as described in the Starting a Provisioning Session section on page 3-68.
Note
For more information on which components can be dynamically reconfigured, refer to the Understanding Dynamic Reconfiguration section on page 3-71.
Step 1 Step 2
Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Enter the prov-ed or prov-dlt MML commands to change or delete a component. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the specific structure of the command for the component type you want to dynamically reconfigure.
Note
To change or delete a component, you might have to meet certain preconditions, such as changing the service state of the component to OOS using MML commands (as mentioned in Table 3-13).
Step 3
Repeat Step 2 for each component that you want to modify or delete. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for provisioning guidelines. Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Step 4
After completing a dynamic reconfiguration operation on the Cisco MGC, you must issue a service message from the associated media gateway to invoke the changes throughout your SS7 solution.
3-70
OL-0800-06
Chapter 3
Note
Refer to the documentation associated with your media gateway for more information on issuing service messages.
CICs Point codes (DPC, originating point code [OPC], or APC) Physical interfaces (TDM, ATM, or Ethernet) Signaling links (TDM, ATM, or SS7) Signaling services SS7 subsystems SS7 routes Trunk groups Component properties (linksets, signaling services, and trunk groups)
Table 3-1 lists the preconditions that must be met for the component before any modification or deletion action can be performed as part of dynamic reconfiguration. There are no preconditions for adding components as part of dynamic reconfiguration.
Table 3-13 Dynamic Reconfiguration Preconditions
Component CICs
Preconditions Call state of the CIC must be IDLE (refer to the Verifying CIC States section on page 3-13) and the service state of the associated DPC must be set to OOS (refer to the Setting the Service State of a Signaling Service section on page 8-95). or Block type for the CIC must be set to locally blocked (refer to the Blocking CICs section on page 3-60) and the associated media gateway span and timeslot must be set to OOS (refer to the documentation for the media gateway).
Point codes (DPC, OPC, or APC) and SS7 routes Signaling links (TDM, ATM, or SS7)
Service state of the point code and SS7 route must be set to OOS (refer to the Setting the Service State of a Signaling Service section on page 8-95). Service state of the signaling link must be set to OOS (refer to the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96).
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-71
Preconditions Service state of the signaling service must be set to OOS (refer to the Setting the Service State of an SS7 Signaling Service section on page 8-96). Service state of the subsystems and routes must be set to OOS (refer to the Setting the Service State of a Local Subsystem Number section on page 8-98). None.
SS7 subsystems
Trunk groups Component properties (linksets, signaling services, and trunk groups)
For example, if you want to change the settings for a DPC or remove it altogether, you must first set the service state of the DPC to OOS, before attempting to make changes. If you do not set the service state to OOS, your dynamic reconfiguration request is rejected with an error message. During dynamic reconfiguration, the system goes through two phases. First, it validates the service states of all objects being changed. If any error is encountered, no reconfiguration takes place on any of the objects. Error messages indicate which components are in error. The format of the error message is Components MML name, process rejecting change, reason for rejecting the change, remedy. If no errors are encountered during the validation phase, the update phase proceeds. This is where the new configuration data is loaded by all of the processes. At the beginning of the update phase, an SNMP alarm is displayed to indicate update starting. At the end of the update phase, the alarm clears, and, if commit/deploy was initiated by MML, the MML response is returned. To change the current configuration of a component using dynamic reconfiguration, you can only use the provisioning tools provided with the Cisco MGC, MML provisioning commands or an SNMP provisioning agent (such as the Voice Services Provisioning Tool [VSPT]). Provisioning or configuring by using any other means can cause errors during the dynamic reconfiguration process. Using these tools is required because the dynamic reconfiguration process relies on the provisioning tools to validate the data values and, more importantly, to crosscheck the dependencies of the objects. For example, the provisioning tool ensures that adding a signal transfer point (STP) first requires the existence of the associated route.
Retrieving Data for an Individual Component, page 3-73 Retrieving Data for Select Components, page 3-74 Retrieving Data for All Components of a Particular Type, page 3-75 Retrieving Data on the Current Provisioning Session, page 3-76 Retrieving Data on Supported Signaling Protocols, page 3-77
3-72
OL-0800-06
Chapter 3
Where:
componentThe MML component type associated with the desired component. You can determine the MML names for select provisioned component types using the prov-rtrv:all MML command. MML_nameThe MML name for the desired component. You can determine the MML names for select components using the prov-rtrv:all MML command.
For example, to view the provisioning data for a point code called opc, you would enter the following command:
prov-rtrv:opc:name="opc"
The response to the command is dependent upon the component type associated with the desired component. For example, to view the properties for an SS7 signaling service called ss7svc1, you would enter the following command:
prov-rtrv:sigsvcprop:name="ss7svc1"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-73
InternationalPrefix = 0 layerRetries = 2 layerTimer = 10 MaxACL = 3 maxMessageLength = 250 mtp3Queue = 1024 NationalPrefix = 0 NatureOfAddrHandling = 0 Normalization = 0 OMaxDigits = 24 OMinDigits = 0 OOverlap = 0 OwnClli = na RedirMax = 3 ReleaseMode = Async restartTimer = 10 RoutePref = 0 sendAfterRestart = 16 slsTimer = 300 srtTimer = 300 sstTimer = 300 standard = ANSI92 SwitchID = 0 TMaxDigits = 24 TMinDigits = 0 TOverlap = 0 variant = SS7-ANSI VOIPPrefix = 0 */
Note
This command returns data on all signaling components, except for signaling service and linkset properties. The system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-12 17:12:49 M RTRV "session=active:all" /* NAME COMPID Parent Name ----------- ----------"ether1" 00050003 "MGC-01" "ether2" 00050004 "MGC-01" "enif1" 00060003 "ether1" "enif2" 00060004 "ether2" "ls1" 00080001 "dpc1" 2600-202-INET-6a" "ls2" 00080004 "dpc2" 2600-203-INET-6a" "ls-itu" 00080005 "stp1" "va-5300-202-1" 00100001 "va-5300-202" va-5300-202"
Description ----------"Ethernet Card 1" "Ethernet Card 2" "Ethernet IF 1" "Ethernet IF 2" "link set 1 to "link set 2 to "Lkset stp1,1-6-1" "link 1 to
3-74
OL-0800-06
Chapter 3
"va-5300-202-2" va-5300-202" "va-5300-203-1" va-5300-203" "va-5300-203-2" va-5300-203" "va-5800-5-1" va-5300-202" "va-5800-5-2" va-5800-5" "route1" ls1" "rt3" "rt1" "rt2" "route2" ls2" "opc2" "dpc2" Pointcode" "opc1" "dpc1" Pointcode" "va-5300-202" "va-5300-203" "va-5800-5" "ss7svc2" dpc2" "ss7svc1" dpc1" "nas1" "nas2" "nas8" "ls1link1" va-2600-202" "ls2link1" va-2600-202" "ls1link2" va-2600-203" "ls2link2" va-2600-203" "lk-3" "stp1" "scp1" "scp2" "ss7subsys3" rte-ssn 254" "ss7subsys1" "ss7subsys2" cp1 rte-ssn 254" */
00100002 00100003 00100004 00100005 00100006 00110001 00110005 00110006 00110007 0011000a 00130002 00130004 00130006 00130007 00140001 00140002 00140003 00150002 00150005 00160001 00160002 00160003 001d0001 001d0002 001d0003 001d0004 001d0005 001e0001 001e0002 001e0003 001f0003 001f0004 001f0005
"va-5300-202" "va-5300-203" "va-5300-203" "va-5800-5" "va-5800-5" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "nas1" "nas2" "nas1" "dpc2" "dpc1" "MGC-01" "MGC-01" "MGC-01" "ls1" "ls2" "ls1" "ls2" "ls-itu" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01" "MGC-01"
IPLNK IPLNK IPLNK IPLNK IPLNK SS7ROUTE SS7ROUTE SS7ROUTE SS7ROUTE SS7ROUTE PTCODE PTCODE PTCODE PTCODE NASPATH NASPATH NASPATH SS7PATH SS7PATH EXTNODE EXTNODE EXTNODE C7IPLNK C7IPLNK C7IPLNK C7IPLNK C7IPLNK APC APC APC SS7SUBSYS SS7SUBSYS SS7SUBSYS
"link 2 to "link 1 to "link 2 to "link 1 to "link 2 to "route to dpc1 via "SS7 Rte3-for scp2" "SS7 Rte1-stp1" "SS7 Rte2-for scp1" "route to dpc2 via "Own Pointcode" "TDM Switch dpc2 "Own Pointcode" "TDM Switch dpc1 "Serviceto nas1" "Serviceto nas2" "Serviceto nas1" "SS7 service to "SS7 service to "va-5300-202" "va-5300-203" "va-5800-5" "link 1 of ls1 to "link 1 of ls2 to "link 2 of ls1 to "link 2 of ls2 to "SS7ITU 2600-91" "STP 1" "SCP1 for PC/SSN" "SCP2 for PC/SSN" "pc_ssn scp2 "ssn 254(800)" "pc_ssn s
Where: component is the MML component type associated with the desired provisioned component group. You can find a complete list of MML component types in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-75
Note
Components that are used to retrieve signaling or routing properties (that is sigsvcprop, lnksetprop, and trnkgrpprop) cannot use this command. The properties for only one signaling or routing component can be listed per command instance. Please use the following format:
prov-rtrv: propComp:name="compName " | name=ss7famName
Where: propCompMML component name appropriate to the property type you want to retrieve, as listed below: sigsvcpropProvides maintenance access to the properties of signaling services. trnkgrppropProvides maintenance access to the properties of trunk groups lnksetpropProvides maintenance access to the properties of linksets. compName - MML name of a previously provisioned signaling service or trunk group. ss7famName - MML name of the SS7 family associated with the desired linkset. For example, to view the provisioning data for all DPCs, you would enter the following command:
prov-rtrv:dpc:"all"
3-76
OL-0800-06
Chapter 3
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-77
Q761_BELG_ISUP_CUJO SS7-ITU Q761_BELG_MOBI SS7-ITU Q761_CHILE SS7-ITU Q761_CHINA SS7-China Q761_CHINA_MOB SS7-China Q761_CHINA_MOB SS7-ITU Q761_DANISH SS7-ITU Q761_INDIA SS7-ITU Q761_KOREAN SS7-ITU Q761_NEWZEALAND SS7-ITU Q761_PERU SS7-ITU Q761_PORTUGAL SS7-ITU Q761_SIEMENS_MOBI SS7-ITU Q761_SINGAPORE SS7-ITU Q761_TAIWAN SS7-ITU Q761_THAILAND SS7-ITU Q767_BASE SS7-ITU Q767_BRAZIL SS7-ITU Q767_COLOMBIA SS7-ITU Q767_GUATEMALA SS7-ITU Q767_INDONESIA SS7-ITU Q767_ITAL SS7-ITU Q767_ITAL_INTERCONNECT SS7-ITU Q767_MEXICAN SS7-ITU Q767_RUSS SS7-ITU Q767_SPAN SS7-ITU Q767_SWED SS7-ITU Q767_TELSTRA SS7-ITU Q767_TURKISH SS7-ITU T113_BELL SS7-ANSI dummy AVM dummy MGCP dummy TCAPOverIP dummy VSI */
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
numan-addAdds an element to a dial plan. numan-dltDeletes an element from a dial plan. numan-edEdits an existing element in a dial plan. numan-rtrvDisplays information pertaining to an element or all elements in a dial plan.
Note
You can verify dial plans using the translation verification viewer on the Cisco MGC toolbar. For information on using the translation verification viewer, refer to the Verifying a Dial Plan Translation section on page 3-143.
3-78
OL-0800-06
Chapter 3
Where:
export_directory_pathThe directory path to the location of the exported provisioning data files. filenameThe name of the provisioning data file you want to import.
config.mmlContains core configuration data (signaling services, SS7 nodes) export_trunks.dat (created only when trunks are configured on your system) export_trkgrp.dat (created only when trunk groups are configured on your system) routing.mmlContains routing plans custGrpID.mmlOne of these files is created for each existing dial plan, with the file being named with the associated customer group ID number.
For example, to import the provisioning data stored in the config.mml file, which is located in the /opt/ CiscoMGC/etc/cust_specific/saved_config directory, you would enter the following command:
mml -b /opt/CiscoMGC/etc/cust_specific/saved_config/config.mml
Where:
groups. This selection creates the following files: config.mml, export_trunks.dat (created only when trunks are configured on your system), and export_trkgrp.dat (created only when trunk groups are configured on your system).
routingRouting plans. This selection creates a file called routing.mml numanDial plans. This selection creates a file for each dial plan specified on your system.
The file name is dependent on the customer group ID for each dial plan, that is the names of the files follows the format custGrpID.mml.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-79
export_directory_nameName of the directory to which the data is exported. This directory is a subdirectory within the /opt/CiscoMGC/etc/cust_specific directory established at installation.
For example, to export the core configuration data to a file stored in the /opt/CiscoMGC/etc/ cust_specific/saved_config directory, you would enter the following command:
prov-exp:config:dirname="saved_config"
To export all of the current configuration of your Cisco MGC to several files, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-exp:all:dirname="export_directory_name "
Where export_directory_name is the name of the directory to which the data is exported. This directory is a subdirectory within the /opt/CiscoMGC/etc/cust_specific directory established at installation. The system creates the following files in the specified directory when this command is entered:
config.mmlContains core configuration data (signaling services, SS7 nodes) export_trunks.dat (created only when trunks are configured on your system) export_trkgrp.dat (created only when trunk groups are configured on your system) routing.mmlContains routing plans custGrpID.mmlOne of these files is created for each existing dial plan, with the file being named with the associated customer group ID number. GLBL.awhiteContains global screening data for A-number white lists. Introduced in Release 9.4(1). GLBL.ablackContains global screening data for A-number black lists. Introduced in Release 9.4(1). GLBLbwhiteContains global screening data for B-number white lists. Introduced in Release 9.4(1). GLBLbblackContains global screening data for B-number black lists. Introduced in Release 9.4(1).
For example, to export all of the provisioning data into files stored in the /opt/CiscoMGC/etc/ cust_specific saved_config directory, you would enter the following command:
prov-exp:all:dirname="saved_config"
Rejection of calls to prevent internal congestionWhen the Cisco MGC is congested, a user-defined percentage of calls (depending on internal overload level) are rejected and an ISUP release message is sent to the adjacent signaling point. That ISUP release message has a clear cause of Switch Equipment Congestion and contains an Automatic Congestion Level (ACL) value that indicates the overload level of the Cisco MGC. For a call that is in progress when overload occurs and the call clears normally, the ISUP release message has a clear cause of Normal Call Clearing and an ACL value associated with the current overload level of the Cisco MGC.
3-80
OL-0800-06
Chapter 3
Reception and response to congested statusWhen an adjacent signaling point is congested, the Cisco MGC can reduce the amount of traffic offered by re-routing calls or rejecting a percentage of the calls. This is referred to as outgoing load control (OLC). Detection and transmission of congested statusThe Cisco MGC can indicate its current level of congestion to adjacent signaling points using SS7 ISUP. Detection of congestion is based on dynamic measurements such as CPU occupancy, sizes of queues and buffers, or amounts of other resources needed for call processing. This is referred to as incoming load control (ILC).
Managing Call Rejection Percentages, page 3-81 Managing Outgoing Load Control, page 3-83 Managing Incoming Load Control, page 3-94
The procedures for managing call rejection percentages can be found in the following sections:
Modifying the MCL Call Reject Settings, page 3-82 Retrieving the MCL Call Reject Settings, page 3-83
The Cisco MGC has alarms associated with three of the MCLs. These alarms are issued as the Cisco MGC enters an MCL. These alarms are automatically cleared once the Cisco MGC exits an MCL. Table 3-15 shows which MCLs are associated with which alarms. For more information on these alarms, refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.
Table 3-15 Alarm Associations for MCLs
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-81
For example, if, over several CPU timer interval periods, the Cisco MGC were to enter MC1, go up to MC2, and then return to MC1, the alarms would be set or cleared as follows:
1. 2. 3. 4. 5.
The OverloadLight alarm is set. The OverloadLight alarm is cleared. The OverloadMedium alarm is set. The OverloadMedium alarm is cleared. The OverloadLight alarm is set.
Note
The alarms associated with the Cisco MGCs MCLs create SNMP traps. To identify these alarms among the SNMP traps, look for the tpAlarmCatName object to contain the name of the alarm (OverloadLight, OverloadMedium, or OverloadHeavy) and the tpAlarmSet object to indicate whether the alarm is being set (2) or cleared (1). For more information on the MIBs for the Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Management Information Base Guide.
Note
You can also use the Cisco Voice Services Provisioning Tool (VSPT) to make the provisioning changes necessary to modify the MCL call release settings. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the percentage of calls released for a particular MCL:
prov-ed:mclcallreject:name="mcl_name",callreject=value
Where:
mcl_nameName of the MCL level for which you want to modify the call release percentage. The following names are valid:
mcl1Specifies the percentage of calls defined in value that are released when the Cisco MGC
valuePercentage of calls that are released. The valid range is 0 through 100.
For example, to modify the percentage of MCL1 such that 30 percent of calls are released when the Cisco MGC meets the conditions necessary to enter MCL1, you would enter the following command:
prov-ed:mclcallreject:name=mcl1,callreject=30
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
3-82
OL-0800-06
Chapter 3
Where: mcl_nameThe name of the MCL for which you want settings. The following names are valid:
The system responds with a listing of the call release settings for that MCL. For example, to retrieve the settings for an MCL called mcl1, you would enter the following command:
prov-rtrv:mclcallreject:name=mcl1
To retrieve the settings for every MCL on your system, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:mclcallreject:all
The system responds with a listing of the call release settings for each MCL.
MGC-01 - Media Gateway Controller 2001-02-23 14:15:02 M RTRV "session=accstuff:mclcallreject" /* Name CallReject -------------------- ---------mcl1 25 mcl2 50 mcl3 100 */
Cancel-to (CANT)Causes a percentage of the traffic that would have been routed to an SS7 signaling path (systems configured for signaling) or trunk group (systems configured for call control) to be rejected due to congestion.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-83
Note
The Cisco PGW 2200 configured for signaling was formerly called the Cisco SC2200 Signaling Controller. The Cisco PGW 2200 configured for call control was formerly called the VSC3000 Virtual Switch Controller. Some documentation for your telephony solution may use these names.
SkipCauses a percentage of the traffic that would have routed to a trunk group to overflow to alternate routes. If an alternate route is not available, calls are rejected due to congestion.
Note
Skip controls are available only on trunk groups (systems configured for call control). When applying congestion controls, the CANT control is given precedence over the skip control. Percentages assigned to CANT and skip for each ACL are independent. If both skip and CANT percentages are specified for a trunk group, these percentages are applied independently, based on the number of calls offered to a trunk group. The results are given in Table 3-16.
Table 3-16 CANT and Skip Results Matrix
Depending on the type of traffic, there can be different CANT and skip percentages.
Direct routedThis trunk group is the first choice in a list of routes in a priority sequence coming from the adjacent signaling point. Alternate routedThis trunk group is an alternate route in a list of routes in priority sequence coming from the adjacent signaling point.
Note
The alternate routed control is available only on trunk groups (call control configurations). The outgoing load congestion controls are configured in sets referred to as ACC response categories (ACCRCs). The ACCRCs attach a label to a set of configuration data for each control that can be reused. Only one ACCRC can be configured per SS7 signaling path (signaling configurations) or trunk group (call control configurations) that supports outgoing traffic. If an ACCRC is not assigned to an SS7 signaling path or trunk group, the default ACC response procedures are performed. There is an ACCRC field for each control type combination of every ACL indication level (for example, there are three alternate routed skip control fields for ACL 1, 2, and 3: acl1arskip, acl2arskip, and acl3arskip). The Cisco MGC comes configured with a default ACCRC, which cannot be modified. The field values for the default ACCRC are listed below:
3-84
OL-0800-06
Chapter 3
Once an ACL indication is received from a adjacent signaling point, the actions defined in the ACCRC are enabled for the amount of time defined in a configurable ACL timer (ACLDur). The following sections describe how to manage OCL:
Adding an ACC Response Category on System Configured for Signaling, page 3-85 Adding an ACC Response Category on a System Configured for Call Control, page 3-86 Modifying an ACC Response Category on a System Configured for Signaling, page 3-88 Modifying an ACC Response Category on a System Configured for Call Control, page 3-89 Deleting an ACC Response Category on a System Configured for Signaling, page 3-90 Deleting an ACC Response Category on a System Configured for Call Control, page 3-91 Retrieving ACC Response Category Settings, page 3-91 Modifying the SS7 Signaling Path Associated with an ACC Response Category, page 3-92 Modifying the Trunk Group Associated with an ACC Response Category, page 3-93 Modifying an ACL Timer, page 3-93
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to add an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to configure the values for an ACCRC:
prov-add:accrespcat:name="cat_name "[,field_name=value,field_name=value...]
Where:
cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be configured:
acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-85
acl3drcantSpecifies the percentage of calls defined in value that are released when an ACL
valuePercentage of calls that are released. The valid range is 0 through 100.
Note
Any ACCRC field that you do not enter a value for is set to 0. For example, to configure an ACCRC called cat1 such that 20 percent of calls are rejected when an ACL of 1 is received, 50 percent of calls are rejected when an ACL of 2 is received, and 98 percent of calls are rejected when an ACL of 3 is received, you would enter the following command:
prov-add:accrespact:name=cat1,acl1drcant=20,acl2drcant=50,acl3drcant=98
Step 3
Enter the following command to associate an ACCRC with an SS7 signaling path:
prov-ed:sigsvcprop:name="comp_name ",ACCRespCatName=cat_name
Where:
comp_nameMML name for the SS7 signaling path to be associated with an ACCRC.
Note
If you do not know the MML name of the SS7 signaling path, use the prov-rtrv:ss7path:all command to find the name.
For example, to associate an ACCRC called cat1 with an SS7 signaling path named access1, you would enter the following command:
prov-ed:sigsvcprop:name=access1,ACCRespCatName=cat1
Step 4
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to add an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to configure the values for an ACCRC:
prov-add:accrespcat:name="cat_name "[,field_name=value,field_name=value...]
Where:
cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be configured:
3-86
OL-0800-06
Chapter 3
acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 1 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl1drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl1arcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 1 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl1arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl2drcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 2 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl2drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl2arcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 2 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl2arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl3drcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 3 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl3drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 3 is received from an adjacent signaling point.
acl3arcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 3 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl3arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 3 is received from an adjacent signaling point.
valuePercentage of calls that are released. The valid range is 0 through 100.
Note
Any ACCRC field that you do not enter a value for is set to 0. For example, to configure an ACCRC on a trunk group called cat1 such that when an ACL indication of 1 is received, 20 percent of direct routed calls are rejected, 20 percent of direct routed calls are re-routed, 10 percent of alternate routed calls are rejected, and 10 percent of alternate routed calls are re-routed, you would enter the following command:
prov-add:accrespact:name=cat1,acl1drcant=20,acl1drskip=20,acl1arcant=10,acl1arskip=10
Step 3
Where:
comp_nameMML name for the trunk group on which you want to configure an ACCRC.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-87
Note
If you do not know the MML name of the trunk group, use the prov-rtrv:trnkgrp:all command to find the name.
For example, to create an ACCRC called cat1 on an trunk group named trunk, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk1,ACCRespCatName=cat1
Step 4
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to modify an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the configuration of an ACCRC:
prov-ed:accrespcat:name="cat_name "[,field_name=value,field_name=value...]
Where:
cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be modified:
acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL
valuePercentage of calls that are released. The valid range is 0 through 100.
For example, to modify the configuration of an ACCRC called cat1 such that 30 percent of calls are rejected when an ACL of 1 is received, you would enter the following command:
prov-ed:accrespact:name=cat1,acl1drcant=30
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
3-88
OL-0800-06
Chapter 3
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to modify an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the configuration for an ACCRC:
prov-ed:accrespcat:name="cat_name "[,field_name=value,field_name=value...]
Where:
cat_nameMML name for the ACCRC. field_nameACCRC field that is used to specify a percentage of calls that are released when a congestion indication of a particular ACL level is received from an adjacent signaling point. The following fields can be modified:
acl1drcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 1 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl1drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl1arcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 1 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl1arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 1 is received from an adjacent signaling point.
acl2drcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 2 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl2drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl2arcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 2 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
acl2arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 2 is received from an adjacent signaling point.
acl3drcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 3 is received from an adjacent signaling point and this trunk group is configured as a direct route from that signaling point.
acl3drskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 3 is received from an adjacent signaling point.
acl3arcantSpecifies the percentage of calls defined in value that are released when an ACL
indication of 3 is received from an adjacent signaling point and this trunk group is configured as an alternate route from that signaling point.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-89
acl3arskipSpecifies the percentage of calls defined in value that are re-routed to an alternate
trunk group when an ACL indication of 3 is received from an adjacent signaling point.
valuePercentage of calls that are released. The valid range is 0 through 100.
For example, to modify the configuration an ACCRC on a trunk group called cat1 such that 30 percent of calls are rejected when an ACL of 1 is received, you would enter the following command:
prov-ed:accrespact:name=cat1,acl1drcant=30,acl1arcant=30
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to delete an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Before you can delete an ACCRC, you must delete the associated SS7 signaling path. To do this, enter the following command:
prov-dlt:ss7path:name=comp_name
Where: comp_nameMML name for the SS7 signaling path you want to delete.
Note
If you do not know the MML name of the SS7 signaling path, use the prov-rtrv:ss7path:all command to find the name.
For example, to delete an SS7 signaling path named access1, you would enter the following command:
prov-dlt:ss7path:name=access1
Step 3
Where: cat_nameThe name of the ACCRC you want to delete. For example, to delete an ACCRC called cat1, you would enter the following command:
prov-dlt:accrespact:name=cat1
Step 4
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
3-90
OL-0800-06
Chapter 3
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to delete an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Before you can delete an ACCRC, you must delete the associated trunk group. To do this, enter the following command:
prov-dlt:trnkgrp:name=comp_name
Where: comp_nameMML name for the trunk group you want to delete.
Note
If you do not know the MML name of the trunk group, use the prov-rtrv:trnkgrp:all command to find the name.
For example, to delete a trunk group named access1, you would enter the following command:
prov-dlt:trnkgrp:name=access1
Step 3
Where: cat_nameThe name of the ACCRC you want to delete. For example, to delete an ACCRC called cat1, you would enter the following command:
prov-dlt:accrespact:name=cat1
Step 4
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Where: cat_nameThe name of the ACCRC for which you want settings. The system responds with a listing of the settings for each of the ACCRC fields. For example, to retrieve the settings for an ACCRC called cat1, you would enter the following command:
prov-rtrv:accrespact:name=cat1
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-91
/* NAME ACL1DRCANT ACL1DRSKIP ACL1ARCANT ACL1ARSKIP ACL2DRCANT ACL2DRSKIP ACL2ARCANT ACL2ARSKIP ACL3DRCANT ACL3DRSKIP ACL3ARCANT ACL3ARSKIP */
= = = = = = = = = = = =
= cat1 20 10 20 10 50 20 50 20 98 2 98 2
To retrieve the settings for every ACCRC on your system, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:accrespcat:all
Acl2DrSkip ---2 0
Modifying the SS7 Signaling Path Associated with an ACC Response Category
To modify the SS7 signaling path associated with an ACCRC on your system when it configured for signaling, perform the following steps:
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to modify the SS7 signaling path associated with an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify which SS7 signaling path is associated with an ACCRC:
prov-ed:sigsvcprop:name="comp_name ",ACCRespCatName=cat_name
Where:
comp_nameMML name for the SS7 signaling path to be associated with an ACCRC.
Note
If you do not know the MML name of the SS7 signaling path, use the prov-rtrv:ss7path:all command to find the name.
3-92
OL-0800-06
Chapter 3
For example, to associate an ACCRC called cat1 with an SS7 signaling path named access2, you would enter the following command:
prov-ed:sigsvcprop:name=access2,ACCRespCatName=cat1
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to modify the trunk group associated with an ACCRC. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify which trunk group is associated with an ACCRC:
prov-ed:trnkgrpprop:name="comp_name ",ACCRespCatName=cat_name
Where:
Note
If you do not know the MML name of the trunk group, use the prov-rtrv:trnkgrp:all command to find the name.
For example, to associate an ACCRC called cat1 with an trunk group named trunk2, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk2,ACCRespCatName=cat1
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Note
Timers may require adjustment depending on the size of your trunk group.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-93
To modifying the settings for the ACL timer associated with a particular trunk group or SS7 signaling path, perform the following steps:
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to modify the settings for an ACL timer. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the property that sets the duration of the ACL timer:
prov-ed:component:name="comp_name ",ACLDur=num
Where:
componentMML component type name for the SS7 signaling path or trunk group properties. Depending on the type of system you have, enter one of the following:
sigsvcpropComponent type for signaling path properties, used to set the ACL timer duration
comp_nameMML name for the SS7 signaling path or trunk group on which you are modifying the duration of the ACL timer. numDuration of the ACL timer in seconds. The default value is 5 seconds.
For example, to change the duration of the ACL timer to 20 seconds on a trunk group named trunk1, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk1,ACLDur=20
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Call rate (callrate)Measures the number of incoming call attempts per second. CPU utilization (cpu)Measures the percentage of CPU utilization. Engine input queue length (queuelen)Measures the number of messages waiting in the call engine input queue. Memory address utilization (memoryaddress)Measures the percentage of how much physical memory address space is in use.
3-94
OL-0800-06
Chapter 3
Virtual memory address utilization (virtualmemory)Measures the percentage of how much virtual memory address space is in use.
You can configure the onset and abatement settings for each of these threshold values. You can also configure the percentage of calls that are released once the thresholds are met. Table 3-17 lists the default values for the MCL thresholds.
Table 3-17 Default Values for the MCL Thresholds
MCL1 Onset 82 80 84 75 0
MCL1 Abate 75 75 80 60 0
MCL2 Onset 90 85 88 80 0
MCL2 Abate 77 80 82 70 0
MCL3 Onset 93 90 93 85 0
MCL3 Abate 85 80 85 75 0
Mapping Machine Congestion Level to the ANSI or ITU Congestion Standard, page 3-95 Modifying MCL Threshold Values, page 3-97 Retrieving MCL Threshold Values, page 3-98
Note
Disabling the MaxACL parameter (setting it to 0) does not disable the ACC functionality. If the MaxACL parameter is set to 0 and the Cisco MGC becomes congested, the percentage of calls specified for that overload level are released, and the associated ISUP release message does not contain an ACL indication. The ISUP release message still indicates the proper clear cause.
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to map the MCL to the congestion standard used by the adjacent signaling points. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-95
To map the MCL to the appropriate congestion standard for the associated signaling point, perform the following steps:
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to set the property that maps the MCL to the congestion standard used by the adjacent signaling point:
prov-ed:component:name="comp_name",MaxACL=num
Where:
componentMML component type name for the SS7 signaling path or trunk group properties. Depending on the type of system you have, enter one of the following:
sigsvcpropComponent type for signaling paths properties, used to map MCL for systems
comp_nameMML name for the SS7 signaling path or trunk group on which you are mapping the MCL to the congestion standard used by the adjacent signaling point. numNumber that indicates how to map the MCL values. Table 3-18 lists the valid values for this parameter and their associated congestion levels.
MaxACL Value 0 2
MCL Value
MC0 through ACL is disabled MC3 MC0 MC1 MC2 MC3 MC0 MC1 MC2 MC3 ACL is not present 1 2 2 ACL is not present 1 2 3
ANSI
For example, to map the MCL on a trunk group named trunk1 which is adjacent to a signaling point that uses the ITU congestion standard, you would enter the following command:
prov-ed:trnkgrpprop:name=trunk1,MaxACL=2
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
3-96
OL-0800-06
Chapter 3
Note
You can also use the Cisco VSPT to make the provisioning changes necessary to modify existing MCL threshold values. For more information on using the Cisco VSPT, refer to the Cisco Voice Services Provisioning Tool Users Guide.
Step 1 Step 2
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify existing MCL threshold values:
prov-ed:mclthreshold:name="thres_type"[,field_name=value,field_name=value,...]
Where:
thresh_typeMML name for the MCL threshold type for which you want to modify values. The following threshold types are valid.
callrateMeasures the number of incoming call attempts per second. cpuMeasures the percentage of CPU utilization. queuelenMeasures the number of processes waiting in the call engine input queue. memoryaddressMeasures the percentage of how much physical memory address space is in
use.
virtualmemoryMeasures the percentage of how much virtual memory address space is in use.
field_nameMCL threshold field that is used to specify the onset and abatement values for the selected threshold type. The following fields can be configured:
mcl1onsetSpecifies the threshold, as defined in value, at which the Cisco MGC enters MCL1. mcl1abateSpecifies the threshold, as defined in value, at which the Cisco MGC abates MCL1. mcl2onsetSpecifies the threshold, as defined in value, at which the Cisco MGC enters MCL2. mcl2abateSpecifies the threshold, as defined in value, at which the Cisco MGC abates MCL2. mcl3onsetSpecifies the threshold, as defined in value, at which the Cisco MGC enters MCL3. mcl3abateSpecifies the threshold, as defined in value, at which the Cisco MGC abates MCL3.
valueSpecifies the threshold value for the specified field. The valid value for fields associated with the cpu, memoryaddress, and virtualmemory threshold types is a percentage, ranging from 0 to 100. The valid value for fields associated with the callrate and queuelen threshold types is any nonnegative integer.
Note
Setting the thresholds for any of the fields to 0 disables the all of the MCL settings.
For example, you would enter the following command to modify the MCL threshold values for the cpu threshold type, such that the following values are set:
MCL1 is reached when CPU utilization reaches 75 percent MCL1 abates when CPU utilization reaches 65 percent
prov-add:mclthreshold:name=cpu,mcl1onset=75,mcl1abate=65
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-97
Step 3
Save and activate your provisioning changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Where: thresh_typeMML name for the MCL threshold type. The following threshold types are valid.
callrateMeasures the number of incoming call attempts per second. cpuMeasures the percentage of CPU utilization. queuelenMeasures the number of processes waiting in the call engine input queue. memoryaddressMeasures the percentage of how much physical memory address space is in use. virtualmemoryMeasures the percentage of how much virtual memory address space is in use.
The system responds with a listing of the values for each of the fields associated with the MCL threshold type. For example, to retrieve the values for the queuelen MCL threshold type, you would enter the following command:
prov-rtrv:mclthreshold:name=queuelen
To retrieve the values for every MCL threshold type on your system, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:mclthreshold:all
The system responds with a listing of the settings for each field for all of the ACCRCs.
MGC-01 - Media Gateway Controller 2001-02-23 14:11:11 M RTRV "session=accstuff:mclthreshold" /* Name Mcl1Onset Mcl1Abate Mcl2Onset Mcl2Abate ------------- --------- --------- --------- --------callrate 0 0 0 0 cpu 82 75 90 77 memoryaddress 84 80 88 82 queuelen 75 60 80 70
Mcl3Onset --------0 95 93 85
Mcl3Abate --------0 85 85 75
3-98
OL-0800-06
Chapter 3
virtualmemory 80 */
75
85
80
90
80
Performing a Manual Switchover, page 3-99 Verifying Successful Completion of a Switchover, page 3-100 Verifying the Patch Level of the Cisco MGC, page 3-104 Retrieving Configuration Table Data, page 3-105 Retrieving the Logging Level of Software Processes, page 3-109 Retrieving System Statistics, page 3-109
To periodically switch the roles of the Cisco MGCs To upgrade the existing software to a new release To bring down a system for hardware maintenance
Caution
Performing a manual switchover can severely impact your systems call processing performance. All established calls are retained, but any calls in the process of being setup may be dropped. We recommend that this command be issued during a maintenance window when traffic is minimal. When you need to order a manual switchover to perform maintenance or upgrade procedures on one or both of the Cisco MGCs, use the following steps or all calls might be killed by the call engine. Starting with both the active and standby Cisco MGCs operating normally, you can invoke a manual switchover from one system to the other by completing the following steps:
Step 1 Step 2
Determine whether both the active and standby Cisco MGCs are operating normally, as described in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. Determine whether any alarms are pending on either system, as described in the Monitoring the Alarms Status section on page 3-6. If any alarms are pending, you must correct the situation that caused the alarms. Search for the corrective actions required to clear any alarms in the Alarm Troubleshooting Procedures section on page 8-9. If the alarms do not appear in that section, corrective action is not required for those alarms. Refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide for more information on those alarms.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-99
Step 3 Step 4
Ensure that calls are being replicated from the active Cisco MGC to the standby Cisco MGC, as described in the Verifying Proper Replication of Calls section on page 3-58. Enter the following MML command to synchronize the provisioning data on the standby Cisco MGC with the data on the active Cisco MGC:
prov-sync
Caution
Using the prov-sync MML command can severely impact your systems call processing performance. We recommend that this command be issued during a maintenance window when traffic is minimal. Determine platform state of both Cisco MGCs, as described in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. Check that all the processes on the active Cisco MGC are in the running state, as described in the Verifying That Processes Are Running section on page 3-3.
Step 5 Step 6
Caution
The next step forces a manual switchover to the standby Cisco MGC. Ensure that the standby Cisco MGC is fully operational and that debugging is turned off before taking the active Cisco MGC OOS, or there might be a total interruption of service. Switchover can also cause call processing to fail if debugging is turned on.
Step 7
Log in to the active Cisco MGC, start an MML session, and enter the following command:
sw-over::confirm
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Site alarms are automatically set until the OOS Cisco MGC is returned to an IS state.
Step 8
Verify that the switchover has been successfully performed. To do this, follow the procedure described in the Verifying Successful Completion of a Switchover section on page 3-100.
3-100
OL-0800-06
Chapter 3
Understanding Switchover
Cisco MGCs can be arranged in an Active-Standby configuration in which one MGC host runs active traffic while checkpointing information to the standby Cisco MGC. In the continuous service configuration, the active Cisco MGC is paired with an identical standby Cisco MGC that automatically takes over if a failure or switchover occurs. The continuous service architecture of the Cisco MGC increases the reliability, availability, and failure-aversion capabilities of the system. The primary goal of the Cisco MGC failover subsystem is call preservation when there is a system failure. This is achieved by interconnecting two Cisco MGCs while the system carries out the logical functions of call control. At any point, one Cisco MGC is in the active role and the other Cisco MGC is in the standby role. The active Cisco MGC carries out the call control function and updates the standby Cisco MGC about call-processing events. The standby Cisco MGC maintains the same system state (from the call-processing point of view) as the active Cisco MGC. In the event of a critical failure on the active Cisco MGC, the standby switches to the active role and takes over the call control function. There is a period of approximately three seconds in which all messaging is lost in the process of switching over call control.
Note
If your system is using a simplex configuration (a single Cisco MGC), or is functioning in standalone mode (the standby Cisco MGC is in the OOS service state), the system cannot perform a switchover. In these instances, the active Cisco MGC remains in the active service state when a critical failure occurs. Switchovers can occur automatically (also known as failovers) when a critical alarm is generated, or a switchover can be performed manually, typically as part of a maintenance or troubleshooting procedure. For more information on performing a manual switchover, refer to the Performing a Manual Switchover section on page 3-99.
Note
When an automatic switchover is caused by the temporary loss of all Cisco MGC/IP continuity, the newly standby Cisco MGC can take upwards of 6 minutes to come in-service.
Fault-Tolerant Components
The following component processes of the Cisco MGC are fault-tolerant. In other words, each of these processes knows its own state (Active/Standby/Out-of-Service) and the corresponding state of its peer process on the standby system.
Process manager (procM)Spawns and manages all processes in the system Failover daemon (foverd)Determines and switches platform states Call engineHandles call-processing functions ReplicatorReplicates call states from the active Cisco MGC to the standby Cisco MGC I/O channel controller (IOCC)Manages the signaling messages I/O channel manager (IOCM)Manages the protocol-specific IOCCs
Failover Daemon
The active Cisco MGC runs the procM process. ProcM automatically starts when the Cisco MGC is booted and, in turn, starts the alarm manager, configuration manager, call engine, IOCCs, and other processes, including foverd. The continuous service architecture is controlled by the failover daemon. The failover daemons on both Cisco MGC hosts coordinate the active, standby, and OOS states of those hosts.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-101
The alarm manager process also plays a significant role in a continuous service system. The alarm manager raises the alarm when a critical event occurs and clears the alarm when the condition that caused the alarm is cleared. See the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide for detailed information regarding alarms, specifically which alarms are critical. The foverd process directs manual switchovers. The switchover configuration provides the following:
Minimal interruption of service in the event of failure of a single machine Maintenance of a consistent configuration on both the active and standby Cisco MGCs Avoidance of false switchovers that could cause disruption of service
A critical event is typically a critical process dying or the failure of a subsystem or component that can critically affect call processing. A forced failover occurs automatically when the conditions governing it are met; it is system-initiated and not user-initiated. When a critical event occurs, the alarm manager sends a specific message to the foverd process, indicating the occurrence of the critical event. When the failover daemon receives notification that a critical event has occurred on the active Cisco MGC, the failover daemon initiates a forced switchover to the standby Cisco MGC. The standby Cisco MGC transitions immediately to the active state. For approximately three seconds, all messaging is lost. This affects established and new calls. The occurrence of a critical event on system A results in its peer, system B, becoming active while system A goes to an OOS state. Until the critical event that triggered the failover on system A is cleared, its state remains OOS. When the critical event is cleared, the alarm manager sends another message, known as a Clear Alarm message, to the foverd process. The foverd process drives system A to a standby state (if the peer system (B) is still in the active state). When the critical event is cleared, the failed controller (A) comes back online. It can then become the standby for the currently active Cisco MGC (B). Initially, system A is still OOS. The platform state of system A continues to be OOS until the critical event is cleared. The Call Engine checkpoints call information from the active Cisco MGC to the standby Cisco MGC. In addition, the state of the SS7 network is checkpointed by the MTP3 IOCC. The MTP2 terminal functionality resides on the Cisco SLTs to enable the fault-tolerant MTP3 solution. The Cisco SLTs are responsible for SS7 MTP2 message processing. The Cisco SLTs communicate directly with the Cisco MGC hosts (active and standby) using RUDP, but they send SS7 traffic only to the active Cisco MGC.
Note
The number of Cisco SLTs is dependent on the SS7 network traffic load and on link and linkset requirements. It is generally recommended that a minimum of two links per linkset, one link per Cisco SLT, be used to provide SS7 reliability. To further enhance redundancy, it is recommended that the links in a linkset be spread across multiple Cisco SLTs so that any single unit can be removed, added, or serviced without disrupting the SS7 network.
Circuit Auditing
An auditing process discovers discrepancies in circuit states between the Cisco MGC and the media gateways it controls. During a switchover, discrepancies might exist as to the state of bearer circuits (CICs) between the newly active Cisco MGC and the bearer devices it controls. Discrepancies in circuit states between the active Cisco MGC and the bearer devices could also occur as the result of control messages to the bearer devices that get lost. The circuit auditing mechanism can be run periodically at configured intervals or after an automatic or manual switchover. It can also be initiated manually using the MML command, sw-over::confirm. The audit capability is always initiated automatically on indication of critical error conditions from solution
3-102
OL-0800-06
Chapter 3
components, adjacent SS7 switches, or when critical Cisco MGC conditions occur. The circuit-auditing mechanism detects and resolves circuit state discrepancies that it discovers and resynchronizes the Cisco MGC and the bearer devices. The circuit auditing mechanism is a function of the call engine process in the active Cisco MGC. The call engine subsystem starts a thread to perform the circuit-auditing function upon notification of a switchover event from the fault manager. The circuit auditing mechanism commands the bearer devices to reflect the circuit state of the Cisco MGC. If a bearer device believes the circuit to be in use and the Cisco MGC does not, the Cisco MGC releases the circuit. However, if the Cisco MGC shows that a bearer circuit is in use and discovers that the bearer device does not show that circuit as in use, the Cisco MGC does not attempt to rebuild the call, but releases all associated resources. Even though the Cisco MGC is the controlling authority, the only course of action when a discrepancy is discovered during a circuit audit is to release all of the allocated resources, which means dropping the call.
Checkpointing
Checkpointing of calls ensures that established calls are preserved in the event of a switchover. The Call Engine sends checkpoint events to the local checkpoint process at one point during call setup and at one point in the call release phase. Checkpointing is also applied to the following protocol supervisory messages and MML commands that change the logical state of the bearer circuits:
Blocking and Unblocking Messages and Commands Circuit Reset Messages and Commands
The local checkpointing process is responsible for securing these events to disk if the standby Cisco MGC is unavailable and for forwarding those events to the remote checkpointing process once it does become available. If the standby Cisco MGC is running, checkpoint events are batched and forwarded to the remote checkpointing process. The remote checkpointing process is responsible for handling the checkpoint events from the active Cisco MGC, delivering only established calls to the remote call engine. The remote call engine process begins checkpointing events for calls when it begins active call processing. The following scenarios are supported:
Standalone (no standby Cisco MGC available)You can specify the activation or deactivation of checkpointing. If checkpointing is activated, all checkpoint events are secured to disk. Startup (standby Cisco MGC unavailable)The local checkpointing process retains or secures all events until the standby Cisco MGC is available and a request for synchronization is completed. SynchronizationYou can request synchronization of the configurations of the two Cisco MGCs. This is required after startup and transition from the standalone Cisco MGC to the standby available configuration. SwitchoverIn the event of a switchover (or failover), the standby Cisco MGC assumes the primary responsibility for processing calls and securing checkpoint events.
Checkpointing is also implemented to support forward Cisco MGC software migration by one release. You can manually take the standby Cisco MGC out of service, upgrade the software to the new release, and resynchronize calls with the active Cisco MGC. For detailed procedures on upgrading the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-103
Display the current patch level of your system by logging into the active Cisco MGC as root and entering the following UNIX command:
pkginfo | grep Patch
Look for the Cisco MGC patch with the largest number to determine the current patch level. In the example, the current protocol patch level is patch 9 (CSCOgp009), while the system patch level is patch 3 (CSCOgs003).
Note
For more information on the patches to the release of the Cisco MGC software you are running, refer to the release notes associated with your release. To determine which release of the Cisco MGC software you are running, enter the rtrv-ne MML command, as described in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2.
Step 2
Determine the patches available for your version of Cisco MGC software by entering the following URL on an Internet browser: http://www.cisco.com/kobayashi/sw-center/sw-voice.shmtl Select your software version from the list and a list of currently available patches displays. If you find that your patch level matches the current patch level on the web page, the procedure is complete. Otherwise, proceed to Step 3.
Download the latest patches and associated installation instruction files to your active Cisco MGC. Open the instruction files and follow the procedures within to install the patches. Once you have installed the new patches, run the check inventory utility to ensure that the patches have installed correctly by entering the following UNIX commands:
Caution
This utility should not be run while the system is actively processing calls, as it can reduce the call processing rate.
Note
This utility can only be run by a user with root permissions. If you are not logged in as root, you must enter the UNIX command sudo before the utility name to ensure proper execution.
Note
You must be in the /opt/CiscoMGC/bin directory to run the check inventory utility.
3-104
OL-0800-06
Chapter 3
Where file_path is an optional parameter used when you want to redirect the output of the utility to a file. If you do not redirect the output to a file, the results are written to your screen. For example, to redirect the results of the check inventory utility to a file called inv.out, you would enter the following command:
chk_inv >/opt/CiscoMGC/local/inv.out
Step 6
Review the utility results, either on-screen or by opening the file. If the results indicate that there are no problems with the installation, the procedure is complete. Otherwise, proceed to Step 7.
Caution
The check inventory utility uses a 32-bit cyclic redundancy check (CRC) to verify your systems software. A 32-bit CRC can have a value anywhere from 1 to over 4 billion. However, there is a slight possibility that two sets of data can have the same CRC value. If this should occur, you will recieve a false positive from the utility.
Note
If the utility results indicate that there is a problem with a part of the software outside of the Cisoc MGC software patch(es), you should determine whether a problem truly exists. The utility compares the software on your system against a master list, and it is possible that your environment may not be using every piece of software on that master list. If the utility indicates that a piece of software is missing, and your system configuration does not use that software, you do not need to load that software. However, if the utility identifies a problem with other software, and your system is using that software, proceed to Step 8.
Step 7 Step 8
Re-install the patch(es), repeating steps 3 through 6. If your second attempt at downloading and installing the patch(es) succeeds, the procedure is complete. Otherwise, proceed to Step 8. Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software.
Retrieving alarm category data, page 3-106 Retrieving component data, page 3-106 Retrieving component type data, page 3-106 Retrieving measurement category data, page 3-107 Retrieving services data, page 3-107 Retrieving tables data, page 3-108 Retrieving default configuration parameters data, page 3-108
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-105
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the alarm categories for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:37:59 M RTRV "Config Fail" "XE Rsrc Fail" "Gen Fail" . . .
For a complete listing of the alarm categories for the Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the configured components on the Cisco MGC, which begins as follows:
MGC-01 - Media Gateway Controller 2001-06-12 15:00:46 M RTRV "MGC-02: KEY=00010001, PARENT=00000000, DESCR=Media Gateway Controller" "CFGG-01: KEY=00020001, PARENT=00010001, DESCR=Config Mgr Subsystem" "ALGG-01: KEY=00020002, PARENT=00010001, DESCR=Alarm Mgr Subsystem" "MSGG-01: KEY=00020003, PARENT=00010001, DESCR=Measurement Mgr Subsystem" "ENGG-01: KEY=00020004, PARENT=00010001, DESCR=Engine Subsystem" "IOSG-01: KEY=00020005, PARENT=00010001, DESCR=IO Subsystem" . . .
3-106
OL-0800-06
Chapter 3
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the component types for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:24:01 M RTRV "LPC" "Proc Group" "Proc" "Equipment" "IO Card" . . .
For a complete listing of the component types for the Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the measurement categories for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:26:56 M RTRV "ALL-COUNTERS" "LIF-GROUP" "LIF: SES" "LIF: ES" "LIF: CODE VIOLATION" . . .
For a complete listing of the measurement categories for the Cisco MGC, refer to the Appendix D, Cisco MGC Measurements.
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-107
The system returns a list of the services on the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:32:24 M RTRV "ProcessManagement" "ProcessManagement_hi_pri" . . .
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the tables for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:33:47 M RTRV "alarmCategories" "componentTypes" "components" "measCategories" "services" . . .
Note
The rtrv-cfg MML command is no longer valid as of Release 9.3(2). The information in this section remains for the benefit of users of older versions of the Cisco MGC software. The system returns a list of the default configuration parameters for the Cisco MGC, which begins as follows:
MGC-02 - Media Gateway Controller 2001-06-12 15:34:49 M RTRV "*.disableMeas" "*.sm_meas_baseaddr" "*.platformId" "*.transpathId" "*.tempDir" . . .
3-108
OL-0800-06
Chapter 3
Where process is the MML name of the desired process. For a list of valid process names, refer to the Understanding Processes section on page 3-4. For example, to retrieve the current logging level of the call engine process (eng-01), you would enter the following command:
rtrv-log:eng-01
To retrieve the current logging level of all of the processes, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-log:all
Note
The process manager (PM-01) is not included in the "all" parameter, because this is a special process. To retrieve the logging level of PM-01, it must be used individually, as in the example above.
Retrieving System State and Alarm Statistics, page 3-109 Retrieving Calling Statistics, page 3-110 Retrieving System Usage Statistics, page 3-111
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-109
If the platform state is not the value you expected, enter the same command on the other Cisco MGC to determine if it is the active Cisco MGC. If the other Cisco MGC is also not the active Cisco MGC, contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If you find that alarms are active, you can determine the current alarms using the procedure in the Retrieving All Active Alarms section on page 8-3.
Note
In a particular instance, the number of in-progress calls does not reflect the actual number of active calls. When an E1 link in a PBX comes up, CRMs are sent to the PBX for each channel to ensure that there are no active calls present in the PBX. This is done to ensure that synchronization can be maintained after a link failure on the IP side. These CRMs are treated as active calls, therefore increasing the number of in-progress calls returned by this command. If a large amount of CPU resources are being used over an extended period of time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If the response indicates that your system has a small amount of available real memory (512 in the above example), you may need to add additional memory to your Cisco MGC to handle your systems call processing load. Refer to your Sun Netra documentation for more information on how to add additional memory to a Cisco MGC host.
Note
Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.
3-110
OL-0800-06
Chapter 3
The amount of free and swap memory listed in the response (186 and 2048 in the above example) should be greater than 10 percent of the known total swap space and the total memory. If this is not the case, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.
Note
Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.
Note
In a particular instance, the number of in-progress calls does not reflect the actual number of active calls. When an E1 link in a PBX comes up, CRMs are sent to the PBX for each channel to ensure that there are no active calls present in the PBX. This is done to ensure that synchronization can be maintained after a link failure on the IP side. These CRMs are treated as active calls, therefore increasing the number of in-progress calls returned by this command. If a large amount of CPU resources are being used over an extended period of time, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC. If the response indicates that your system has a small amount of available real memory (512 in the above example), you may need to add additional memory to your Cisco MGC to handle your systems call processing load. Refer to your Sun Netra documentation for more information on how to add additional memory to a Cisco MGC host.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-111
Note
Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available memory could be quite small, but this may not indicate a need to add additional memory. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available memory.
The amount of free and swap memory listed in the response (186 and 2048 in the above example) should be greater than 10 percent of the known total swap space and the total memory. If this is not the case, you should contact the Cisco TAC for assistance. Refer to the Obtaining Technical Assistance section on page xxx for more information on contacting the Cisco TAC.
Note
Be aware that the time of day at which you enter this command will have an effect on the overall accuracy of the response. If you enter this command during your busiest hours, the amount of available virtual memory could be quite small, but this may not indicate a need to contact the Cisco TAC. If this is the case, consider also performing this procedure during a less active call processing time, to determine an average amount of available virtual memory.
If the response to the command indicates a percentage of disk space capacity used 90 percent or higher, you must delete files from your disk drive, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.
Retrieving Measurements, page 3-112 Clearing Measurements, page 3-113 Retrieving Link or Linkset Measurements, page 3-113 Retrieving SS7 Signaling Point Measurements, page 3-115 Retrieving Measurement Thresholds, page 3-124 Modifying Measurement Thresholds, page 3-125
Retrieving Measurements
You can view and search the measurements results stored in the measurements log file using the measurement viewer included in the Cisco MGC viewer toolkit. For more information on viewing and searching measurement log files, refer to the Viewing and Searching System Measurement Files section on page 3-139. For more information on log files, refer to Appendix A, Configuring Cisco MGC Log Files..
3-112
OL-0800-06
Chapter 3
Each measurement (or counter) is uniquely defined by its measurement category and component identification number. You can retrieve individual measurements using the following MML command from the active Cisco MGC:
rtrv-ctr:comp :"meas_cat "
Where:
compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of select provisioned components by entering the prov-rtrv:all MML command. meas_catThe desired measurement category. A complete list of measurement categories can be found in Appendix D, Cisco MGC Measurements.
For example, to view the ISUP IAM transmission measurement totals for a component called dpc1, enter the following MML command:
rtrv-ctr:dpc1:ISUP: XMIT IAM TOT
Clearing Measurements
Each measurement (or counter) is uniquely defined by its measurement category and component identification number. You can retrieve individual measurements using the following MML command from the active Cisco MGC:
clr-ctr:comp :"meas_cat "
Where:
compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of selected provisioned components by entering the prov-rtrv:all MML command. meas_catThe desired measurement category. A complete list of measurement categories can be found in Appendix D, Cisco MGC Measurements.
For example, to clear the ISUP IAM transmission measurement totals for a component called dpc1, enter the following MML command:
clr-ctr:dpc1:ISUP: XMIT IAM TOT
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-113
Where link is the MML name of the SS7 link. For example, to view the measurements for a link called ls1link1, you would enter the following command:
rtrv-lnk-ctr:ls1link1
To retrieve a list of system measurements for the links that make up a linkset, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-lnk-ctr:linkset
Where linkset is the MML name of the SS7 linkset. For example, to view the measurements for each link within a linkset called ls1, you would enter the following command:
rtrv-lnk-ctr:ls1link1
3-114
OL-0800-06
Chapter 3
"ls1link2:CAT=\"SC: RCV FRM TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: RCV FRM TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: XMIT FRM TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=900,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=3600,VAL=0" "ls1link2:CAT=\"SC: RCV BAD TOT\",INT=86400,VAL=0" "ls1link2:CAT=\"C7LNK: MSU DROP-CONG\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: DUR UNAVAIL\",INT=1800,VAL=0" "ls1link2:CAT=\"SC: RCV BAD CRC\",INT=900,VAL=0" "ls1link2:CAT=\"SC: RCV BAD CRC\",INT=3600,VAL=0" "ls1link2 CAT=\"SC: RCV BAD CRC\",INT=86400,VAL=0" "ls1link2:CAT=\"C7LNK: DUR IS\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: RCV SIO TOT\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: XMIT SIO TOT\",INT=1800,VAL=0" "ls1link2:CAT=\"C7LNK: RCV SU ERR\",INT=1800,VAL=0"
To retrieve a list of system measurements for all the links on your Cisco MGC, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-lnk-ctr:all
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-115
To retrieve a list of system measurements for a single SS7 signaling point, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-sp-ctr:point_code
Where point_code is the MML name of the SS7 signaling point. For example, to view the measurements for a point code called dpc2, you would enter the following command:
rtrv-sp-ctr:dpc2
3-116
OL-0800-06
Chapter 3
"dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP:
XMIT ANM TOT\",INT=300,VAL=0" XMIT ANM TOT\",INT=1800,VAL=0" XMIT COT TOT\",INT=300,VAL=0" XMIT COT TOT\",INT=1800,VAL=0" RCV ANM TOT\",INT=300,VAL=0" RCV ANM TOT\",INT=1800,VAL=0" RCV INR TOT\",INT=300,VAL=0" RCV INR TOT\",INT=1800,VAL=0" RCV COT TOT\",INT=300,VAL=0" RCV COT TOT\",INT=1800,VAL=0" XMIT BLO TOT\",INT=300,VAL=0" XMIT BLO TOT\",INT=1800,VAL=0" ABN REL TOT\",INT=300,VAL=0" ABN REL TOT\",INT=1800,VAL=0" XMIT REL TOT\",INT=300,VAL=0" XMIT REL TOT\",INT=1800,VAL=0" RCV CVR TOT\",INT=300,VAL=0" RCV CVR TOT\",INT=1800,VAL=0" RCV CGU TOT\",INT=300,VAL=0" RCV CGU TOT\",INT=1800,VAL=0" XMIT SUS TOT\",INT=300,VAL=0" XMIT SUS TOT\",INT=1800,VAL=0" XMIT CVT TOT\",INT=300,VAL=0" XMIT CVT TOT\",INT=1800,VAL=0" XMIT GRA TOT\",INT=300,VAL=0" XMIT GRA TOT\",INT=1800,VAL=0" RCV SUS TOT\",INT=300,VAL=0" RCV SUS TOT\",INT=1800,VAL=0" RCV FOT TOT\",INT=300,VAL=0" RCV FOT TOT\",INT=1800,VAL=0" RCV GRS TOT\",INT=300,VAL=0" RCV GRS TOT\",INT=1800,VAL=0" XMIT CFN TOT\",INT=300,VAL=0" XMIT CFN TOT\",INT=1800,VAL=0" XMIT UBL TOT\",INT=300,VAL=0" XMIT UBL TOT\",INT=1800,VAL=0" RCV CVT TOT\",INT=300,VAL=0" RCV CVT TOT\",INT=1800,VAL=0" XMIT LPA TOT\",INT=300,VAL=0" XMIT LPA TOT\",INT=1800,VAL=0" XMIT FAC TOT\",INT=300,VAL=0" XMIT FAC TOT\",INT=1800,VAL=0" RCV FAC TOT\",INT=300,VAL=0" RCV FAC TOT\",INT=1800,VAL=0" RCV CGUA TOT\",INT=300,VAL=0" RCV CGUA TOT\",INT=1800,VAL=0" RCV UBL TOT\",INT=300,VAL=0" RCV UBL TOT\",INT=1800,VAL=0" XMIT USR TOT\",INT=300,VAL=0" XMIT USR TOT\",INT=1800,VAL=0" XMIT CGUA TOT\",INT=300,VAL=0" XMIT CGUA TOT\",INT=1800,VAL=0" RCV USR TOT\",INT=300,VAL=0" RCV USR TOT\",INT=1800,VAL=0" RCV ACM TOT\",INT=300,VAL=0" RCV ACM TOT\",INT=1800,VAL=0" XMIT FOT TOT\",INT=300,VAL=0" XMIT FOT TOT\",INT=1800,VAL=0" XMIT PAM TOT\",INT=300,VAL=0" XMIT PAM TOT\",INT=1800,VAL=0" RCV CGB TOT\",INT=300,VAL=0" RCV CGB TOT\",INT=1800,VAL=0" RCV RLC TOT\",INT=300,VAL=0" RCV RLC TOT\",INT=1800,VAL=0"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-117
"dpc2:CAT=\"ISUP: RCV REL TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV REL TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CRM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CRM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=300,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: XMIT MSU DROP/RTE\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=900,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=3600,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=86400,VAL=17" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=900,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=3600,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=86400,VAL=99" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=1800,VAL=0"
3-118
OL-0800-06
Chapter 3
To retrieve a list of system measurements for all the SS7 signaling points on your Cisco MGC, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-sp-ctr:all
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-119
"dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP: "dpc2:CAT=\"ISUP:
RCV ANM TOT\",INT=1800,VAL=0" RCV INR TOT\",INT=300,VAL=0" RCV INR TOT\",INT=1800,VAL=0" RCV COT TOT\",INT=300,VAL=0" RCV COT TOT\",INT=1800,VAL=0" XMIT BLO TOT\",INT=300,VAL=0" XMIT BLO TOT\",INT=1800,VAL=0" ABN REL TOT\",INT=300,VAL=0" ABN REL TOT\",INT=1800,VAL=0" XMIT REL TOT\",INT=300,VAL=0" XMIT REL TOT\",INT=1800,VAL=0" RCV CVR TOT\",INT=300,VAL=0" RCV CVR TOT\",INT=1800,VAL=0" RCV CGU TOT\",INT=300,VAL=0" RCV CGU TOT\",INT=1800,VAL=0" XMIT SUS TOT\",INT=300,VAL=0" XMIT SUS TOT\",INT=1800,VAL=0" XMIT CVT TOT\",INT=300,VAL=0" XMIT CVT TOT\",INT=1800,VAL=0" XMIT GRA TOT\",INT=300,VAL=0" XMIT GRA TOT\",INT=1800,VAL=0" RCV SUS TOT\",INT=300,VAL=0" RCV SUS TOT\",INT=1800,VAL=0" RCV FOT TOT\",INT=300,VAL=0" RCV FOT TOT\",INT=1800,VAL=0" RCV GRS TOT\",INT=300,VAL=0" RCV GRS TOT\",INT=1800,VAL=0" XMIT CFN TOT\",INT=300,VAL=0" XMIT CFN TOT\",INT=1800,VAL=0" XMIT UBL TOT\",INT=300,VAL=0" XMIT UBL TOT\",INT=1800,VAL=0" RCV CVT TOT\",INT=300,VAL=0" RCV CVT TOT\",INT=1800,VAL=0" XMIT LPA TOT\",INT=300,VAL=0" XMIT LPA TOT\",INT=1800,VAL=0" XMIT FAC TOT\",INT=300,VAL=0" XMIT FAC TOT\",INT=1800,VAL=0" RCV FAC TOT\",INT=300,VAL=0" RCV FAC TOT\",INT=1800,VAL=0" RCV CGUA TOT\",INT=300,VAL=0" RCV CGUA TOT\",INT=1800,VAL=0" RCV UBL TOT\",INT=300,VAL=0" RCV UBL TOT\",INT=1800,VAL=0" XMIT USR TOT\",INT=300,VAL=0" XMIT USR TOT\",INT=1800,VAL=0" XMIT CGUA TOT\",INT=300,VAL=0" XMIT CGUA TOT\",INT=1800,VAL=0" RCV USR TOT\",INT=300,VAL=0" RCV USR TOT\",INT=1800,VAL=0" RCV ACM TOT\",INT=300,VAL=0" RCV ACM TOT\",INT=1800,VAL=0" XMIT FOT TOT\",INT=300,VAL=0" XMIT FOT TOT\",INT=1800,VAL=0" XMIT PAM TOT\",INT=300,VAL=0" XMIT PAM TOT\",INT=1800,VAL=0" RCV CGB TOT\",INT=300,VAL=0" RCV CGB TOT\",INT=1800,VAL=0" RCV RLC TOT\",INT=300,VAL=0" RCV RLC TOT\",INT=1800,VAL=0" RCV REL TOT\",INT=300,VAL=0" RCV REL TOT\",INT=1800,VAL=0" RCV CRM TOT\",INT=300,VAL=0" RCV CRM TOT\",INT=1800,VAL=0" XMIT CGBA TOT\",INT=300,VAL=0"
3-120
OL-0800-06
Chapter 3
"dpc2:CAT=\"ISUP: XMIT CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RLC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=300,VAL=0" "dpc2:CAT=\"C7SP: SP DUR UNAVAIL\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CGBA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"C7SP: XMIT MSU DROP/RTE\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT GRS TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RSC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT UCIC TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV RES TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV PAM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV GRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CGU TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV EXM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CQM TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV INF TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV BLO TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=900,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=3600,VAL=0" "dpc2:CAT=\"SP: cInit in\",INT=86400,VAL=17" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=900,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=3600,VAL=0" "dpc2:CAT=\"SP: PDU out\",INT=86400,VAL=99" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CQR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT CRA TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CPG TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: XMIT INR TOT\",INT=1800,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=300,VAL=0" "dpc2:CAT=\"ISUP: RCV CRA TOT\",INT=1800,VAL=0" "opc1" /* No active counters found for this component/category */ "dpc1:CAT=\"ISUP: XMIT BLA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT BLA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: CHAN MATE UNAVAILABLE\",INT=1800,VAL=0"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-121
"dpc1:CAT=\"SP: cInit out\",INT=900,VAL=0" "dpc1:CAT=\"SP: cInit out\",INT=3600,VAL=0" "dpc1:CAT=\"SP: cInit out\",INT=86400,VAL=1" "dpc1:CAT=\"SP: PDU in\",INT=900,VAL=0" "dpc1:CAT=\"SP: PDU in\",INT=3600,VAL=0" "dpc1:CAT=\"SP: PDU in\",INT=86400,VAL=13" "dpc1:CAT=\"ISUP: XMIT CGB TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CGB TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV BLA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV BLA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CQM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CQM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CVR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CVR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV LPA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV LPA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT RSC TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT RSC TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT ACM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT ACM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT UBA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT UBA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CCR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CCR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV UBA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV UBA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: UNEX MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: UNEX MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT IAM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT IAM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: UNREC MSG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: UNREC MSG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV IAM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV IAM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CFN TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CFN TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CCR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CCR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT ANM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT ANM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT COT TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT COT TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV ANM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV ANM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV INR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV INR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV COT TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV COT TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT BLO TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT BLO TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: ABN REL TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: ABN REL TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT REL TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT REL TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CVR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CVR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CGU TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CGU TOT\",INT=1800,VAL=0"
3-122
OL-0800-06
Chapter 3
"dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"C7SP: "dpc1:CAT=\"C7SP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"C7SP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP: "dpc1:CAT=\"ISUP:
XMIT SUS TOT\",INT=300,VAL=0" XMIT SUS TOT\",INT=1800,VAL=0" XMIT CVT TOT\",INT=300,VAL=0" XMIT CVT TOT\",INT=1800,VAL=0" XMIT GRA TOT\",INT=300,VAL=0" XMIT GRA TOT\",INT=1800,VAL=0" RCV SUS TOT\",INT=300,VAL=0" RCV SUS TOT\",INT=1800,VAL=0" RCV FOT TOT\",INT=300,VAL=0" RCV FOT TOT\",INT=1800,VAL=0" RCV GRS TOT\",INT=300,VAL=0" RCV GRS TOT\",INT=1800,VAL=0" XMIT CFN TOT\",INT=300,VAL=0" XMIT CFN TOT\",INT=1800,VAL=0" XMIT UBL TOT\",INT=300,VAL=0" XMIT UBL TOT\",INT=1800,VAL=0" RCV CVT TOT\",INT=300,VAL=0" RCV CVT TOT\",INT=1800,VAL=0" XMIT LPA TOT\",INT=300,VAL=0" XMIT LPA TOT\",INT=1800,VAL=0" XMIT FAC TOT\",INT=300,VAL=0" XMIT FAC TOT\",INT=1800,VAL=0" RCV FAC TOT\",INT=300,VAL=0" RCV FAC TOT\",INT=1800,VAL=0" RCV CGUA TOT\",INT=300,VAL=0" RCV CGUA TOT\",INT=1800,VAL=0" RCV UBL TOT\",INT=300,VAL=0" RCV UBL TOT\",INT=1800,VAL=0" XMIT USR TOT\",INT=300,VAL=0" XMIT USR TOT\",INT=1800,VAL=0" XMIT CGUA TOT\",INT=300,VAL=0" XMIT CGUA TOT\",INT=1800,VAL=0" RCV USR TOT\",INT=300,VAL=0" RCV USR TOT\",INT=1800,VAL=0" RCV ACM TOT\",INT=300,VAL=0" RCV ACM TOT\",INT=1800,VAL=0" XMIT FOT TOT\",INT=300,VAL=0" XMIT FOT TOT\",INT=1800,VAL=0" XMIT PAM TOT\",INT=300,VAL=0" XMIT PAM TOT\",INT=1800,VAL=0" RCV CGB TOT\",INT=300,VAL=0" RCV CGB TOT\",INT=1800,VAL=0" RCV RLC TOT\",INT=300,VAL=0" RCV RLC TOT\",INT=1800,VAL=0" RCV REL TOT\",INT=300,VAL=0" RCV REL TOT\",INT=1800,VAL=0" RCV CRM TOT\",INT=300,VAL=0" RCV CRM TOT\",INT=1800,VAL=0" XMIT CGBA TOT\",INT=300,VAL=0" XMIT CGBA TOT\",INT=1800,VAL=0" XMIT RLC TOT\",INT=300,VAL=0" XMIT RLC TOT\",INT=1800,VAL=0" SP DUR UNAVAIL\",INT=300,VAL=0" SP DUR UNAVAIL\",INT=1800,VAL=0" XMIT CRM TOT\",INT=300,VAL=0" XMIT CRM TOT\",INT=1800,VAL=0" RCV UCIC TOT\",INT=300,VAL=0" RCV UCIC TOT\",INT=1800,VAL=0" RCV CGBA TOT\",INT=300,VAL=0" RCV CGBA TOT\",INT=1800,VAL=0" XMIT MSU DROP/RTE\",INT=1800,VAL=0" XMIT GRS TOT\",INT=300,VAL=0" XMIT GRS TOT\",INT=1800,VAL=0" RCV RSC TOT\",INT=300,VAL=0"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-123
"dpc1:CAT=\"ISUP: RCV RSC TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT RES TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT RES TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT UCIC TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT UCIC TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV RES TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV RES TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV PAM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV PAM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV GRA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV GRA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT EXM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT EXM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CGU TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CGU TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV EXM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV EXM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT INF TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT INF TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQM TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CQM TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV INF TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV INF TOT\",INT=1800,VAL=0" "dpc1:CAT=\"SP: cInit in\",INT=900,VAL=0" "dpc1:CAT=\"SP: cInit in\",INT=3600,VAL=0" "dpc1:CAT=\"SP: cInit in\",INT=86400,VAL=5" "dpc1:CAT=\"ISUP: RCV BLO TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV BLO TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CPG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CPG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"SP: PDU out\",INT=900,VAL=0" "dpc1:CAT=\"SP: PDU out\",INT=3600,VAL=0" "dpc1:CAT=\"SP: PDU out\",INT=86400,VAL=19" "dpc1:CAT=\"ISUP: RCV CQR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CQR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT CRA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT CRA TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CPG TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CPG TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: XMIT INR TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: XMIT INR TOT\",INT=1800,VAL=0" "dpc1:CAT=\"ISUP: RCV CRA TOT\",INT=300,VAL=0" "dpc1:CAT=\"ISUP: RCV CRA TOT\",INT=1800,VAL=0"
Where meas_cat is the desired measurement category. For example, to display the threshold settings for the measurement category, LIF: SES, you would enter the following MML command:
rtrv-thres::LIF: SES
3-124
OL-0800-06
Chapter 3
The INT field lists the thresholds for the 15-minute (900 seconds), 60-minute (3600 seconds) and 24-hour (86400 seconds) intervals. The type field identifies the threshold type, in this case, upper. The type field has two possible values, upper or down. Upper indicates that the alarm is generated when the measurement value gets above the alarm threshold value. The alarm is cleared when the measurement value falls below the clear threshold value. Down indicates that the alarm is generated when the measurement value falls below the alarm threshold. The alarm is cleared when the measurement value gets above this value. The response also shows the clear threshold value (clrthres), the alarm threshold value (almthres), and the alarm category associated with the measurement (alarmcat).
Where:
meas_catThe measurement category you want to modify. secondsThe number of seconds in the interval. The valid values are 900 for the 15-minute, 3600 for the 60-minute, and 86400 for the 24-hour interval. valueThe desired threshold value.
For example, to set the threshold to a value of 12 in the 15-minute (900 seconds) interval for the LIF: SES measurement category, enter the following command:
set-thres::cat=LIF: SES,interval=900,thres=12
Converting Individual CDR Files to ASCII Format, page 3-126 Converting Individual CDR Files to a Readable Format, page 3-126
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-125
Where:
cdrlogfileName of the CDR log file to be converted, including the file path. filenameName for the file that is output by execution of this command, including the file path. -outformat 1Specifies that the output file should be in CSV format. -followUsed when you are converting the active CDR file. Processing of the active CDR file continues as CDR logs are created in the active file. Processing is stopped when you enter a Control C.
For example to convert an archived CDR log file from binary format to CSV format, you would enter the following UNIX command:
MGC_Toolkit cdrconvert -input /opt/CiscoMGC/var/spool/cdr_20011113100350_002172.bin -output /tmp/cdr.csv -outformat 1
The output file stores the CDR log file data in a manner similar to the following:
1090,,1,2001/Nov/13 EST 10:3:50,0X0000000000000000,2001/Nov/13 10:3:50 ,MGC-CDR-NODE-STRING 1100,,1,2001/Nov/13 EST 10:18:50,0X0000000000000000,2001/Nov/13 EST 10:18:50,2,MGC-CDR-NODE-STRING
Where:
cdrlogfileName of the CDR log file to be converted, including the file path. filenameName for the file that is output by execution of this command, including the file path. -outformat 2Specifies that the output file should be in a readable format. -followUsed when you are converting the active CDR file. Processing of the active CDR file continues as CDR logs are created in the active file. Processing is stopped when you enter a Control C.
For example to convert an archived CDR log file from binary format to a readable format, you would enter the following UNIX command:
MGC_Toolkit cdrconvert -input /opt/CiscoMGC/var/spool/cdr_20011113100350_002172.bin -output /tmp/cdr.csv -outformat 2
The output file stores the CDR data in a manner similar to the following:
0X0000000000000000 ----------------------------------------0X0000000000000000 File_Header(1090)
3-126
OL-0800-06
Chapter 3
0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000 0X0000000000000000
Unique_Call_ID(5000): Ver(4000): 1 Create_Tm(4001): 2001/Nov/13 10:3:50 EST Call_Ref_ID(4002): 0X0000000000000000 File_Start_Time(6001): 2001/Nov/13 10:3:50 EST Host_ID(6000): MGC-CDR-NODE-STRING MGC_Version(6004): "9.1(4.3)" --------------------------------------------------------------------------------File_Footer(1100) Unique_Call_ID(5000): Ver(4000): 1 Create_Tm(4001): 2001/Nov/13 10:18:50 EST Call_Ref_ID(4002): 0X0000000000000000 File_End_Time(6002): 2001/Nov/13 10:18:50 EST Total_CDBNum(6003): 2 Host_ID(6000): MGC-CDR-NODE-STRING MGC_Version(6004): "9.1(4.3)" -----------------------------------------
Launching the Cisco MGC Toolbar, page 3-128 Using the Alarm Viewer, page 3-128 Using the Call Detail Record Viewer, page 3-131 Using the Config-Lib Viewer, page 3-135 Using the Log Viewer, page 3-136 Using the Measurement Viewer, page 3-139 Using the Trace Viewer, page 3-142 Using the Translation Verification Viewer, page 3-142 Using the File Options Viewer, page 3-148 Using the MGC Backup Viewer, page 3-149 Using the MGC Restore Viewer, page 3-149
The Cisco MGC toolbar (Figure 3-1) is a graphical user interface (GUI) application used to launch the various viewers in the toolkit. Each application runs independently of the others. The toolbar includes a button for launching each application in the toolkit.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-127
Figure 3-1
You can run multiple instances of the Cisco MGC toolbar at one time, but only one instance of each tool at a time. If the selected application is already running, a message is displayed stating that your user ID and the application are already running. However, different tools can be run simultaneously. There is also a Close button on the toolbar, which is used to close the toolbar; however, closing the toolbar does not stop toolkit applications that are already running.
Caution
The potential exists for foreground (text) and background (non-text) settings to conflict because your local display settings might conflict with the toolkits color settings, thus rendering the text within various fields in the toolkit applications unreadable. If you have problems reading text on any of the toolkit screens, please change the foreground color to a darker color on your display to see if that solves the problem.
Note
For optimal performance, your display should be set to 1024 pixels. The MGC Toolbar window is displayed.
Open the alarm viewer. To do this, click Alarm Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The Alarm Viewer window loads and displays (as shown in Figure 3-2).
3-128
OL-0800-06
Chapter 3
Figure 3-2
Step 2
You can view current alarms as they happen. To do this, select the Alarm Continuous<ACTIVE, NEW>,Not Filtered check box. The current alarms are displayed in the field at the bottom of the viewer, and alarms are added to the field as they occur. To stop displaying current alarms, de-select the check box. You can search for alarms that occurred between a certain dates and times, specifying month, day, year, hour, and minute settings. To do this, select a starting date and time from the Start Date/Time drop-down list boxes and then select a stopping date and time from the Stop Date/Time drop-down list boxes. The current date and time are the default values for both the start and stop values for the time period; however, using these default values results in a null search (no records). The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to be performed up until the current date and time.
Step 3
Step 4
To search by a component, select a component type from the Component Type drop-down list box. If you do not want to search by a component or you want to view the entire contents of the file(s), select the ALL entry. Click the drop-down list box to the right of the Component Type list box to select subcomponents for the component you selected. If you do not want to specify an individual subcomponent, or you want to view the entire contents of the file(s), select the NO_SPECIFIC entry.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-129
Step 5
To search by an alarm category, select a category type from the alarm category drop-down list box. If you want to select one or more alarm categories, click the Select check box and select your desired alarm categories (if you want to select multiple categories, you must hold down the Ctrl key while selecting). If you do not want to search by a category or you want to view the entire contents of the file(s), select the ALL check box. Click Execute to search the files within the selected time frame. The contents are displayed as multicolored text in the field at the bottom of the window.Alarm Record View Tab Window The following list describes the text colors associated with each alarm severity level
Step 6
Step 7
If you want to view the logs that may be associated with this alarm, click Log Viewer and the Log Record View tab window is displayed (see Figure 3-3). By default, the viewer searches the platform log files for related logs that occurred within 60 seconds before and after the alarm occurred. If you want to modify the criteria for the related logs search, click the LogView menu. This menu has two options, to modify the name of the log file to be searched (the log file prefix) and to modify the period the search occurs (the log time range). To modify the name of the log file to be searched, click the LogView menu and select the Log File Prefix option. The Log File Prefix window displays. Select the contents of the Log File Prefix field and enter the desired log file name. Click Set to close this window. To modify the period of the search, click the LogView menu and select the Log Time Range option. The Log Time Range window displays. Select the contents of the Time Before Alarm field and enter the desired period in seconds. Select the contents of the Time After Alarm field and enter the desired period in seconds. Click Set to close this window.
Step 8
If you want to perform additional searches, repeat steps 2 to 6. The color of the text from the old search changes from multicolored to blue, and the newly requested search data is inserted as multicolored text, appearing after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. You can also reset the search criteria by clicking Reset. If you want to save the displayed data, click Save. The contents of the field are saved to a file with the following directory path: /opt/CiscoMGC/etc/cust_specific/toolkit/alarmRec.log If you perform another search and save that content again, the contents of the field are added into the alarmRec.log file, after the previously saved data. If you do not want the new search data to be added onto the previous data, you must change the name of the alarmRec.log file before you save the new data. To change the name of a file, refer to the procedures in the Using the File Options Viewer section on page 3-148.
Step 9
3-130
OL-0800-06
Chapter 3
Figure 3-3
Note
For more information on CDRs, refer to the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. The CDR dumper (see Figure 1-2) provides logging capabilities on the Cisco MGC for all CDRs. Also, the CDR dumper supports external user application programming interfaces (APIs). The APIs allow users to get a real-time feed of CDRs and call detail blocks (CDBs) from the Cisco MGC that can be routed to a third-party mediation application for use in billing. The CDR dumper operates according to the configuration set up in the XECfgParm file. When certain thresholds are met, the CDR dumper closes and saves the generated CDB records into the $BASEDIR/var/spool directory.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-131
The CDR viewer is designed to help you view and search call detail records that reside in the CDR logs. The formats of the CDBs and call data elements (CDEs) that comprise CDRs are specified in the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. These records are designed for database loading, not user reading. The CDR viewer can help you understand these records, and it also provides useful searching functions based on the search criteria you select.
Note
Your screen might be slightly different from this example, depending on which release of the software you are running. You can exit the CDR viewer in one of two ways: in the Query Criteria portion of the window, click Exit, or from the File menu, select Exit.
Open the CDR viewer. To do this, click CDR Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The CDR Viewer window loads and displays. Click the Configuration tab. The Configuration tab window displays (Figure 3-4). The first five fields in the window cannot be modified. These fields list the directory paths and file names for the related data files.
Step 2
Step 3 Step 4
You can modify the CDR source directory on your local host. To do this, click in the CDR Data Directory field and change the displayed information. You can specify the message type(s) to be queried. All message types are enabled for querying by default. If you want to filter out certain message types, select these message types from the All Possible Message Types field and click on the right arrow button. Your selected message types are displayed in the Selected filtering field. To remove a message type from the Selected filtering field, select that message type in that field and click the left arrow button.
3-132
OL-0800-06
Chapter 3
Figure 3-4
Open the CDR viewer. To do this, click CDR Viewer on the Cisco MGC toolbar. A popup window displays, warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The CDR Viewer window loads and displays the Query tab window by default (Figure 3-5). If you have just opened the viewer, you must configure it before you can search the CDR files. Refer to the Configuring the CDR Viewer section on page 3-132.
Step 2
You can search for logs that occurred between a certain dates and times, specifying month, day, year, hour, and minute settings. To do this, select a starting date and time from the Start Date/Time drop-down list boxes and then select a stopping date and time from the Stop Date/Time drop-down list boxes.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-133
Figure 3-5
The current date and time are the default values for both the start and stop values for the time period; however, using these values results in a null search (no records). The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to continue to the current date and time.
Step 3
If you want to view your selected CDR file(s) in their entirety, proceed to Step 7. If you want to search through your selected CDR file(s) for particular type(s) of CDRs, proceed to Step 4.
Step 4
You can search through your selected CDR files based on seven different field values. They are as follows:
Calling Party Number Dialed Party Number Originating Trunk Group Number Terminating Trunk Group Number Originating Trunk Number Terminating Trunk Number Call Reference ID
3-134
OL-0800-06
Chapter 3
To select a field value, click the check box next to the name. You can select as few or as many field values as you require.
Step 5
Enter a search qualifier and related string for each of the field values you selected. To do this, choose a search qualifier, as defined below, for the search string from the drop-down list box to the right of a field value you have selected.
Equal toThe selected field in the CDB is equal to the value defined in the search string. HasAny substring of the selected field in the CDB has the value defined in the search string. Begins withThe selected field in the CDB begins with the value defined in the search string. Ends withThe selected field in the CDB ends with the value defined in the search string.
Enter a search string in the field to the right of the search qualifier you just chose. Repeat this step for all field values that you have selected for your search.
Step 6
Choose a query operator (AND or OR) for your search. You can search for CDBs that have all of the field values you selected (AND), or you can search for CDBs that have any of the field values you selected (OR). The default value is AND. Click the appropriate check box to specify your query operator. Click Execute to search the files within the selected time frame. A popup window displays while the contents load. The contents are displayed as multicolored text in the field at the bottom of the window. If you want to perform additional searches, repeat steps 2 to 13. The color of the text from the old search changes from multicolored to black, and the newly requested search data is inserted as multicolored text, appearing after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. You can also reset the search criteria by clicking Reset. If you want to save the displayed data, click Save. The contents of the field are saved to the file you specified in the Config tab window. If you perform another search and save that content again, the contents of the field are added to the same file, after the previously saved data. If you do not want the data to be added to the previous data, you must change the name of the file before you save again. To change the name of a file, refer to the procedures in the Using the File Options Viewer section on page 3-148.
Step 7 Step 8
Step 9
List Configuration Versions in LibraryReturns a listing of the configuration versions stored in the library and identifies the configuration that is currently being used (referred to as the production version). To activate this function, enter 1 at the prompt. Save Production to a new Library VersionSaves your current configuration settings to a new version file. When you select this function, the Cisco MGC software must not be running, or an error message is displayed. For more information on stopping the Cisco MGC software, refer to the Shutting Down the Cisco MGC Software Manually section on page 2-4. To activate this function, enter 2 at the prompt and then enter the name for the new library version.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-135
Figure 3-6
Config-Lib Viewer
Copy Library Version to ProductionRestores your Cisco MGC to the settings in an old configuration version. When you select this function, the Cisco MGC software must not be running, or an error message is displayed. For more information on stopping the Cisco MGC software, refer to the Shutting Down the Cisco MGC Software Manually section on page 2-4. To activate this function, enter 3 at the prompt and then enter the number of the library version to be set as the production version.
Note
We recommend that you not attempt to restore an old configuration version without the assistance of the Cisco TAC.
Remove Configuration Library VersionDeletes a configuration version from the library. When you select this function, the Cisco MGC software must not be running, or an error message is displayed. For more information on stopping the Cisco MGC software, refer to the Shutting Down the Cisco MGC Software Manually section on page 2-4. To activate this function, enter 4 at the prompt and then enter the number of the library version to be deleted.
Open the log viewer. To do this, click Log Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The Log Viewer window loads and displays (Figure 3-7).
3-136
OL-0800-06
Chapter 3
Figure 3-7
Log Viewer
Step 2
You can search for logs that occurred between certain dates and times, specifying month, day, year, hour, and minute settings. To do this, select a starting date and time from the Start Date/Time drop-down list boxes and then select a stopping date and time from the Stop Date/Time drop-down list boxes. The current date and time are the default values for both the start and stop values for the time period; however, using these values results in a null search (no records). The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to continue to the current date and time.
Note Step 3
You can clear the query options you select at any time by clicking Reset Query Options.
If you want to view all of the logs within the time range you have specified in Step 3, click the Show All check box. If you select this option, your search can be only based on a text string. Go to Step 6 for more information on performing text searches. If you do not want to view all of the logs within the time range you have specified, proceed to Step 4 to further refine your search criteria before displaying the logs.
Step 4
You can search for logs within certain log categories. To do this, select your desired category or categories by clicking one or more entries in the Category list box. To select multiple entries, hold down either the Ctrl or Shift key while clicking. The available categories are:
GEN
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-137
Step 5
You can search for logs of certain severities. To do this, select a severity or severities by clicking one or more entries in the Severity list box. To select multiple entries, hold down either the Ctrl or Shift key while clicking. The severity choices are cumulativeeach level selected also displays all levels below it. For example, the ERR selection displays both ERR (error) and CRIT (critical) messages. The severity levels are
Step 6
You can search for logs that contain certain text string(s). You can search for up to two text strings. To do this, enter the desired search string(s) in the Text String fields. The text is case-sensitive, and all characters are allowed. If you want to search by only one text string, enter that string in the upper Text String field, and do not enter a string in the lower Text String field. If you want to search using two text strings, enter your strings in the upper and lower Text String fields. If you want to search for logs that contain both of your text strings, select the And check box. If you want to search for logs that contain either of your text strings, select the Or check box. If you want the text search to match the case used in your text string(s), click the Match Case check box. If you do not want to search for text strings, click the None check box.
Step 7
You can also choose to display debug messages. Debug messages do not conform to the log message format. If you select this option, the debug messages are filtered only on the date/time and text strings. To display debug messages, click the Show Debug messages check box. The viewer displays debug messages similar to the following:
platform.log : currently active log Fri Apr 14 17:57:19:253 2000 | ProcessManager (PID 24929) <Debug> initialized process info for 'POM-01' Fri Apr 14 17:57:25:908 2000 | ProcessManager (PID 24929) <Debug> Received heartbeat response from process CFM-01
Caution Step 8
Displaying debug messages can seriously impact system performance. Click Execute Query to display the results of your search. The results are displayed in the field at the bottom of the window, in increments of 5 MB blocks. While the application is searching through the log files, a dialog box appears and shows the progression of the search. If you want to stop a search in progress, click Stop Query in the dialog box.
3-138
OL-0800-06
Chapter 3
Note
Your results may run to several pages of information. You can use several buttons to navigate through your results. To go to the end of your results, click Bottom. To go to the next page of results, click More. To go to the beginning of your results, click Top.
Step 9
If you want to save the displayed data, click the File menu and select Save. A popup window lists the default save directory (/opt/CiscoMGC/etc/cust_specific/toolkit). Enter a file name for your data in the File Name field and click Save. If you want to perform additional searches, repeat steps 2 to 9. The old search data is appended to the new search data. You can clear the display field by clicking Clear before you click Execute Query.
Step 10
Open the measurement viewer. To do this, click Measurement Viewer on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes if you want to continue. The Measurement Viewer window is displayed (Figure 3-8). You can search for logs that occurred between certain dates and times, by specifying date, time, and counter interval settings. To do this, perform the following steps:
a.
Step 2
Select a starting date and time from the Start Date/Time drop-down list boxes.
Note
The current date and time are the default values for both the start and stop values for the time period; however, using these values results in a null search (no records).
b.
Select a stopping date and time from the Stop Date/Time drop-down list boxes.
Note
The Use Current Time as Stop Time check box, if selected, disables the Stop Date/Time drop-down list boxes and allows searching to continue to the current date and time.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-139
Figure 3-8
c.
If you want to further refine your search by specifying a counter interval, select an interval from the Counter Interval drop-down list box. The following intervals are valid for this field:
NO_SPECIFIC (default value) 5_Minute 15_Minute 30_Minute 60_Minute 24_Hours
d.
If you want to further refine your search by specifying a system component type, proceed to Step 3. If you want to further refine your search by specifying a measurement category type, proceed to Step 4. If you want to execute a search based on your current search criteria, proceed to Step 5.
Step 3
Select a system component type from the Component Type drop-down list box. If you do not want to search by a system component or you want to view the entire content of the file(s), select the ALL entry in the Component Type list box.
3-140
OL-0800-06
Chapter 3
Note
When you select a system component type, the drop-down list box to the right of the Component Type list box fills with the names of the system components of that type configured on your system.
b.
If you want to further refine your search by specifying a particular system component, select a system component name from the drop-down list box to the right of the Component Type list box.
Note
The default value for this field is to search for all system components of the selected component type.
c.
If you want to further refine your search by specifying a measurement category type, proceed to Step 4. If you want to execute a search based on your current search criteria, proceed to Step 5.
Step 4
Select a measurement category type from the Category Type drop-down list box. If you do not want to search by a measurement category or you want to view the entire content of the file(s), select the ALL entry in the Category Type list box.
Note
When you select a measurement category type, the drop-down list box to the right of the the Category Type list box fills with the names of all of the measurements associated with that type.
b.
If you want to further refine your search by specifying a particular measurement, select a measurement from the drop-down list box to the right of the Category Type list box.
The default value for this field is to search for all measurements of the selected category.
Click Execute to search the files within the selected time frame. The results of the search are displayed as blue text in the field at the bottom of the window. If you want to perform additional searches, repeat steps 2 to 5. The color of the text from the old search changes from blue to black and the newly requested search data is inserted as blue text, appearing after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. You can also reset the search criteria by clicking Reset.
Step 7
If you want to save the displayed data, click Save. The contents of the field are saved to a file with the following directory path: /opt/CiscoMGC/etc/cust_specific/toolkit/measRec.log If you perform another search and save the resulting content, the contents of the field are added into the measRec.log file, after the previously saved data. If you do not want the new search data to be added to the previous data, you must change the name of the measRec.log file before you save the new data. To change the name of a file, refer to the procedures in the Using the File Options Viewer section on page 3-130.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-141
3-142
OL-0800-06
Chapter 3
Note
The translation verification viewer does not simulate the screening database and cause analysis dial plan functions. You can exit the translation verification viewer by clicking on the File menu and selecting Exit.
Open the translation verification viewer. To do this, click Translation Verification on the Cisco MGC toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes. The Translation Verification Viewer window loads and the DialPlan Translation tab window is displayed by default (Figure 3-11). Enter the incoming trunk group number for your simulated call in the trunk group number field. Specify an ISDN preference for the selecting of the outgoing trunk by choosing a value from the message specific ISDN preference drop-down list box. The following values are valid for this field.
Step 2 Step 3
Step 4
Specify the Nature Of Address (NOA) setting for the called party by selecting a value from the called partys Nature of Address drop-down list box. The following values are valid for this list.
NOA_NATIONAL (default value) NOA_NONE NOA_UNKNOWN NOA_SUBSCRIBER NOA_INTERNATIONAL NOA_NETWORK NOA_MERIDIAN NOA_ABBR NOA_UNIQUE_3DIG_NATL_NUM NOA_ANI NOA_NO_ANI_RECD NOA_NON_UNIQUE_SUBSCRIBER NOA_NON_UNIQUE_NATIONAL NOA_NON_UNIQUE_INTERNATIONAL NOA_OPRREQ_TREATED NOA_OPRREQ_SUBSCRIBER NOA_OPRREQ_NATIONAL NOA_OPRREQ_INTERNATIONAL NOA_OPRREQ_NO_NUM
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-143
NOA_CARRIER_NO_NUM NOA_950_CALL NOA_TEST_LINE_CODE NOA_INT_INBOUND NOA_NAT_OR_INTL_CARRIER_ACC_CODE_INC NOA_CELL_GLOBAL_ID_GSM NOA_CELL_GLOBAL_ID_NMT_900 NOA_CELL_GLOBAL_ID_NMT_450 NOA_CELL_GLOBAL_ID_AUTONET NOA_PORTED_NUMBER NOA_PISN_SPECIFIC_NUMBER NOA_UK_SPECIFIC_ADDRESS NOA_SPARE NOA_SUBSCRIBER_OPERATOR_REQUESTED NOA_NATIONAL_OPERATOR_REQUESTED NOA_INTERNATIONAL_OPERATOR_REQUESTED
3-144
OL-0800-06
Chapter 3
Step 5
NOA_NO_NUMBER_PRESENT_OPERATOR_REQUESTED NOA_NO_NUMBER_CUT_THROUGH_TO_CARRIER NOA_950_PUBLIC_HOTEL_LINE NOA_TEST_CALL NOA_MCI_VNET NOA_INTERNATIONAL_OPERATOR_TO_OPERATOR_OUTSIDE_WZI NOA_INTERNATIONAL_OPERATOR_TO_OPERATOR_INSIDE_WZI NOA_DIRECT_TERMINATION_OVERFLOW NOA_ISN_EXTENDED_INTERNATIONAL_TERMINATION NOA_TRANSFER_ISN_TO_ISN NOA_CREDIT_CARD RESERVED
Specify the Numbering Plan Indicator (NPI) setting for the called party by selecting a value from the called partys Numbering Plan Indicator drop-down list box. The following values are valid for this field.
NPI_E164 (default value) NPI_NONE NPI_DATA NPI_TELEX NPI_PNP NPI_NATIONAL NPI_TELEPHONY NPI_MARITIME_MOBILE NPI_LAND_MOBILE NPI_ISDN_MOBILE
Specify the called number in the called numbers field. Specify the calling number in the calling numbers field. Specify the level of the trace by selecting a value from the trace level drop-down list box. The following values are valid for this list.
result (default)Returns the originating trunk group number, called and calling party numbers, outgoing called and calling party numbers, and the resulting trunk group. This trace type is suited for quick call analysis. Here is an example result trace:
>simWriter -tgnum 7001 -isdnp 1 -cdnoa 4 -cdnpi 1 -cdpn 7075511234 -cgpn 7034843 368 >Result of Execution Originating side: A-number 7034843368 B-number 7075511234 Trunk group 7001 Outgoing side: A-number 7034843368 B-number 7075511234 No suitable trunk group found! *Internal errors/warnings were encountered during translation! >OK
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-145
diagnosticReturns limited information about all of the stages of number and route analysis and messages and warnings about data files being read and whether or not default values are being used. This trace type is suited for determining which results were used to produce the outgoing numbers and trunk group. Here is an example diagnostic trace:
>simWriter -tgnum 7001 -isdnp 1 -cdnoa 4 -cdnpi 1 -cdpn 7075511234 -cgpn 7034843 368 -diag >Result of Execution ******************************************************** * START call translation verification diagnostic summary * ********************************************************** performing Dial Plan Base. performing Profile Analysis (NOA). *Internal errors/warnings were encountered during translation! ******************************************************** * END call translation verification diagnostic summary * ********************************************************** Analysing .dat files: used default Route Prefernce used default Terminating Max Digits used default Terminating Min Digits used default Originating Min Digits used default Originating Max Digits the Originating Start Index property for tg-7001 was not found in /opt/CiscoMGC/ etc/properties.dat Customer Group ID's do not match up in the sigPath and Properties files used default Carrier Screening property used default AOCEnabled field used the default field for default directory number used the default Database Access Error flag Analysis complete, writing message... Message completed, running simulator... >OK
fullReturns complete information about all of the stages of number and route analysis. It also includes all tables and parameters from flat files and internal errors generated during generic analysis. This trace type is suited for determining where in the dial plan or number analysis problems occurred. Here is an example full trace:
>simWriter -tgnum 7001 -isdnp 1 -cdnoa 4 -cdnpi 1 -cdpn 7075511234 -cgpn 7034843 368 -full >Result of Execution ******************************************** * START full call translation verification * ******************************************** Decoding generic analysis trace... the length of the trace is 82 bytes ( 1)entering Dial Plan Base. ( 2) tracing Dial plan, entering Dial Plan Base table with... ( 1) 0 parameter(s): ( 2) reading Dial Plan Base table... ( 1) 1 error/warning code read: *Internal Error:Table could not be read ( 1)ending Dial Plan Base... ( 1)entering Call Information Reception.
3-146
OL-0800-06
Chapter 3
(13) A Number:'7034843368' (13) B Number:'7075511234' ( 1)ending Call Information Reception... ( 1)entering Profile Analysis (NOA). (13) Tracing call number:'7075511234' (Called party number) ( 7) Trace for customer:'jst1' ( 5) TreeBase:'10' ( 2) tracing Dial plan, entering NOA table with... ( 1) 1 parameter(s): ( 4) NOA table index = 4. ( 2) reading NOA table... ( 1) 1 error/warning code read: *Internal Error:Table could not be read ( 1)ending Profile Analysis (NOA)... ( 1)end of trace reached ******************************************** * DONE full call translation verification * * with 0 bytes left untranslated * ******************************************** Analysing .dat files: used default Route Prefernce used default Terminating Max Digits used default Terminating Min Digits used default Originating Min Digits used default Originating Max Digits the Originating Start Index property for tg-7001 was not found in /opt/CiscoMGC/ etc/properties.dat Customer Group ID's do not match up in the sigPath and Properties files used default Carrier Screening property used default AOCEnabled field used the default field for default directory number used the default Database Access Error flag Analysis complete, writing message... Message completed, running simulator... >OK
The content of the field identifies for you which elements of your dial plan need to be modified, if necessary.
Step 9 Step 10
Click Execute to perform a dial plan translation verification. The results are displayed in the field at the bottom of the window. If you want to verify additional dial plan translations, repeat steps 2 to 9. The newly requested data is inserted after the old data. Scroll down through the field to view the data you have added. You can clear the display field by clicking Clear before you click Execute, if you no longer require the previously requested data. If you want to save the displayed data, click SaveinFile. The contents of the field are saved to a file specified in the XECfgParms.dat file.
Step 11
Open the translation verification viewer. To do this, click Translation Verification on the Cisco MGC Toolbar. A popup window displays warning you that running this tool can impact system performance and asking you if you want to launch the tool. Click Yes. The Translation Verification Viewer window loads and displays the DialPlan Translation tab window by default (Figure 3-11).
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-147
Step 2
Click the Config tab to display the Config tab window (Figure 3-12). The fields in this window display the directory paths to the files used by this viewer. The values in these fields cannot be modified.
Figure 3-12 Configuration Tab Window
Note
You cannot use the file options viewer to delete files within the $BASEDIR/etc/cust_specific/export directory.
3-148
OL-0800-06
Chapter 3
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
3-149
3-150
OL-0800-06
C H A P T E R
Maintenance Strategy Overview, page 4-1 Troubleshooting Strategy Overview, page 4-2
Checking equipment status. Determining the current status involves three basic activities:
Reading LEDsMost Cisco products include light-emitting diode (LED) indicators on the
front or rear panels and, in some cases, on both panels. These LEDs indicate the status of the equipment. The specific meaning of each LED on each product is described in the maintenance sections for the individual elements of the Cisco MGC node.
Issuing Status QueriesYou can query the status of the system using various commands. The
commands that can be used to determine the status of the devices in your system are described in the maintenance sections for the individual elements of the Cisco MGC node.
Using a GUI NMSUsing a network management system (NMS) with a graphical user
interface (GUI), such as CiscoWorks2000 or Cisco WAN Manager, to determine the operational status of system devices is described in detail in the maintenance sections for the individual elements of the Cisco MGC node.
Removing the device from the systemProcedures for removing defective devices from the system with as little impact on the system as possible are described in the maintenance sections for the individual elements of the Cisco MGC node. Replacing the complete deviceReinstating a device into the system using a new or repaired model, again with as little impact on the system as possible, is described in the maintenance sections for the individual elements of the Cisco MGC node.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
4-1
Replacing hardware componentsSwapping out components of a device is a maintenance task used for replacing defective components and for upgrading hardware. The maintenance chapters for each element of the Cisco MGC node include sections describing how to replace the field-replaceable components of that device.
Note
You need to understand and/or determine the message flow for certain actions. You may have to use different tools for situations where messages are exchanged within the Cisco MGC software or the operating system (UNIX), and situations where messages flow between the Cisco MGC host(s) and the external nodes over IP.
Step 1
When analyzing a problem, draft a clear problem statement. Define the problem in terms of a set of symptoms and the potential causes behind those symptoms. For example, the symptom might be that the EQPT FAIL alarm has become active. Possible causes might be physical problems, a bad interface card, or the failure of some supporting entity (for example, layer 1 framing).
4-2
OL-0800-06
Chapter 4
Figure 4-1
Step 2
Gather the facts you need to help isolate the symptoms and their possible causes. Ask questions of affected users, network administrators, managers, and other key people. Collect information from sources such as network management systems, protocol analyzer traces, output from router diagnostic commands, or software release notes.
Step 3
Consider possible causes based on the facts you have gathered. You can also use these facts to eliminate potential causes from your list. For example, depending on the data, you might be able to eliminate hardware as a cause, allowing you to focus on software. At every opportunity, try to narrow the number of potential causes so that you can create an efficient plan of action.
Step 4
Create an action plan based on the remaining potential causes. Begin with the most likely cause, and devise a plan in which only one variable at a time is manipulated. This approach allows you to reproduce the solution to a specific problem. If you alter more than one variable simultaneously, identifying the change that eliminated the symptom becomes more difficult.
Step 5 Step 6
Perform each step of the action plan carefully, and test to see if the symptom disappears. Whenever you change a variable, gather the results. You should use the same method of gathering facts that you used in Step 2. Analyze the results to determine if the problem has been resolved. If it has, then the process is complete.
Step 7
If the problem has not been resolved, you must create an action plan based on the next most likely problem in your list. Return to Step 2 and continue the process until the problem is solved. Before trying out a new cure, make sure to undo any "fixes" you made in implementing your previous action plan. Remember that you want to change only one variable at a time.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
S1228a
4-3
Note
If you exhaust all of the common causes and actions (those outlined in this chapter and those that you have identified for your environment), your last recourse is to contact the Cisco Technical Assistance Center (TAC). Refer to the Obtaining Technical Assistance section on page xxx for more information about contacting the Cisco TAC.
Alarms
The Cisco MGC software generates alarms to indicate problems with processes, routes, linksets, signaling links, and bearer channels. For more information on troubleshooting using alarms, refer to Alarm Troubleshooting Procedures section on page 8-9. Refer to the Cisco Media Gateway Controller Software Release 9 Software Messages Reference Guide for detailed information on the system alarms.
Call Traces
The Cisco MGC generates call traces that capture call-processing activity by following the call from a specified destination through the Cisco MGC software engine to see where it fails. Call failure location is determined using the following information provided in the call trace:
The protocol data units (PDUs) that the Cisco MGC receives How the Cisco MGC decodes the PDU The PDUs that the Cisco MGC sends out
The results of call traces are signal flow diagrams that you can use for troubleshooting. Call traces are typically used to capture system activity as part of a procedure to clear an alarm. For more information on using call traces, refer to Tracing section on page 8-148.
System Logs
The Cisco MGC software continuously generates log files of various system information, including operational measurements (OMs) and alarm records. You can use these logs to obtain statistical information about the calls processed by the system and network events such as delays or service-affecting conditions. The Cisco MGC generates the following types of logs:
Platform logs containing information useful for tracking configuration errors and signaling link and call instantiation problems. Command/response logs containing Man-machine language (MML) command history. Alarm logs containing alarm information. Measurement logs containing system measurements data. Call record logs containing call-processing data.
4-4
OL-0800-06
Chapter 4
System logs can be read using the various viewers within the Cisco MGC viewer toolkit. For more information on the viewers that comprise the Cisco MGC toolkit, refer to Using the Cisco MGC Viewer Toolkit section on page 3-127. Refer to Appendix A, Configuring Cisco MGC Log Files, for more information on system log files.
MML Queries
MML is the command line interface method for configuring and managing the Cisco MGC. You can use it to retrieve information about system components, and to perform logging and tracing. Refer to the Cisco Media Gateway Controller Software Release 9 Software MML Command Reference Guide for more information.
CiscoWorks2000 Cisco WAN Manager Cisco Media Gateway Controller Node Manager (CMNM)
CiscoWorks2000
CiscoWorks2000 is a series of SNMP-based internetwork management software applications. CiscoWorks applications are integrated on several popular network management platforms. The applications build on industry-standard platforms to provide tools for monitoring device status, maintaining configurations, and troubleshooting problems. Some of the applications included in CiscoWorks2000 that are useful for troubleshooting are:
Device MonitorMonitors specific devices for environmental and interface information. Health MonitorDisplays information about the status of a device, including buffers, CPU load, memory available, and protocols and interfaces being used. Show CommandsEnables you to view data similar to output from router show EXEC commands. Path ToolCollects path utilization and error data by displaying and analyzing the path between devices. Device PollingExtracts data about the condition of network devices. CiscoViewProvides dynamic monitoring and troubleshooting functions, including a graphical display of Cisco devices, statistics, and comprehensive configuration information. Offline Network AnalysisCollects historical network data for offline analysis of performance trends and traffic patterns. CiscoConnectAllows you to provide Cisco with debugging information, configurations, and topology information to speed resolution of network problems.
CiscoWorks2000 can be used to manage a variety of Cisco products. Within the Cisco MGC node, CiscoWorks2000 can be used for management of the Cisco SS7 interfaces and switches. Refer to the CiscoWorks2000 documentation for more information.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
4-5
Connection statistics Circuit line statistics Packet line statistics Frame Relay port statistics Network statistics Physical layer statistics Protocol layer statistics
The Cisco WAN Manager application can be used to manage a variety of Cisco products. Within the Cisco MGC node, the Cisco WAN Manager can be used for management of the Cisco SS7 interfaces and switches. Refer to the Cisco WAN Manager documentation for more information.
4-6
OL-0800-06
Chapter 4
Show Commands
The show commands are powerful monitoring and troubleshooting tools. You can use the show commands to perform a variety of functions:
Monitoring router behavior during initial installation Monitoring normal network operation Isolating problem interfaces, nodes, media, or applications Determining when a network is congested Determining the status of servers, clients, or other neighbors
show interfacesDisplays statistics for network interfaces using the following commands:
show interfaces ethernet show interfaces fddi show interfaces atm show interfaces serial
show controller t1Displays statistics for T1 interface card controllers show running-configDisplays the router configuration currently running show startup-configDisplays the router configuration stored in nonvolatile RAM (NVRAM) show flashDisplays the layout and contents of Flash memory show buffersDisplays statistics for the buffer pools on the router show memoryShows statistics about the router's memory, including free pool statistics show processesDisplays information about the active processes on the router show stacksDisplays information about the stack utilization of processes and interrupt routines, as well as the reason for the last system reboot show versionDisplays the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images
For details on using and interpreting the output of specific show commands, refer to the Cisco IOS command reference for the release you are using.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
4-7
Caution
Exercise care when using debug commands. These commands are processor-intensive and can cause serious network problems (degraded performance or loss of connectivity) if they are enabled on an already heavily loaded router. When you finish using a debug command, remember to disable it with its specific no debug command, or use the no debug all command to turn off all debugging.
Note
Output formats vary among debug commands. Some generate a single line of output per packet, and others generate multiple lines of output per packet. Some generate large amounts of output, and others generate only occasional output. Some generate lines of text, and others generate information in field format. To minimize the negative impact of using debug commands, follow this procedure:
Enter the no logging console global configuration command on your router. This command disables all logging to the console terminal. Telnet to a router port and enter the enable EXEC command. Enter the terminal monitor command on your router to copy debug command output and system error messages to your current terminal display. This permits you to view debug command output remotely, without being connected through the console port. Following this procedure minimizes the load created by using debug commands because the console port no longer has to generate character-by-character processor interrupts.
If you intend to keep the output of the debug command, spool the output to a file. The procedure for setting up such a debug output file, as well as complete details regarding the function and output of debug commands is provided in Chapter 10, Debug Command Reference, in the Troubleshooting Internetworking Systems manual.
Note
In many situations, third-party diagnostic tools can be more useful and less intrusive than the use of debug commands. For more information, see the Third-Party Troubleshooting Tools section on page 4-9.
4-8
OL-0800-06
Chapter 4
Volt-ohm meters, digital multimeters, and cable testers Breakout boxes, fox boxes, bit error rate testers (BERTs), and block error rate testers (BLERTs) Network analyzers and network monitors Time domain reflectometers (TDRs) and optical time domain reflectometers (ODTRs)
Test and report on cable conditions, including near-end crosstalk, attenuation, and noise Perform TDR, traffic monitoring, and wire map functions
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
4-9
Display media access control (MAC) layer information about network traffic, provide statistics such as network utilization and packet error rates, and perform limited protocol testing (for example, TCP/IP tests such as ping)
Similar testing equipment is available for fiber-optic cable. Due to the relatively high cost of fiber-optic cable and its installation, the cable should be tested both before installation (on-the-reel testing) and after installation. Continuity testing of fiber-optic cable requires either a visible light source or a reflectometer. Light sources capable of providing light at the three predominant wavelengths, 850 nanometers (nm), 1300 nm, and 1550 nm, are used with power meters that can measure the same wavelengths and test attenuation and return loss in the fiber-optic cable.
Filtering traffic that meets certain criteria so that, for example, all traffic to and from a particular device can be captured Time-stamping captured data Presenting protocol layers in an easily readable form Generating frames and transmitting them onto the network Incorporating an "expert" system in which the analyzer uses a set of rules, combined with information about the network configuration and operation, to diagnose and solve, or offer potential solutions to, network problems
4-10
OL-0800-06
Chapter 4
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
4-11
4-12
OL-0800-06
C H A P T E R
Checking Equipment Status, page 5-1 Maintaining Technical Support Staff, page 5-2 Maintaining Components, page 5-2
Reading the Cisco MGC LEDs Querying the system using UNIX and Man-Machine Language MML commands.
The UNIX and MML commands for querying the status of the system are found in Chapter 3, Cisco MGC Node Operations. Information about the LEDs on the Cisco MGC hosts is found in the sections that follow.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
5-1
SYSTEMGreen LED is off during power-up procedures and is illuminated when UNIX is running and the alarms driver is installed. This LED is reset by a hardware watchdog timeout, or when the user-defined Alarm 3 (spare) is asserted. ALARM1Amber LED is illuminated when the user-defined Alarm 1 is asserted. ALARM2Amber LED is illuminated when the user-defined Alarm 2 is asserted. SPAREAmber LED is reserved for future use.
The DC-powered Sun Netra t 1120/1400 displays the following additional LEDs:
SUPPLY AGreen LED is illuminated when DC input A is present and the system is powered on. SUPPLY BGreen LED is illuminated when DC input B is present and the system is powered on.
User assistance Problem diagnosis and duplication Hardware replacement Patch distribution
The technical profile portion of the Sun audit analyzes the technical ability of service personnel and determines if the number of support staff is sufficient for quality customer support.
Maintaining Components
For more detailed information, see the Cisco Media Gateway Controller Hardware Installation Guide.
Software Upgrades
Refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide for a description of the procedures for software upgrades.
5-2
OL-0800-06
C H A P T E R
1-port high-speed serial interface (WIC-1T) 2-port high-speed serial interface (WIC-2T) 1-port T1 multiflex trunk interface (VWIC-1MFT-T1) 1-port E1 multiflex trunk interface (VWIC-1MFT-E1) 2-port T1 multiflex trunk interface (VWIC-2MFT-T1) 2-port E1 multiflex trunk interface (VWIC-2MFT-E1) 2-port T1 multiflex trunk interface with Drop and Insert (VWIC-2MFT-T1-DI) 2-port E1 multiflex trunk interface with Drop and Insert (VWIC-2MFT-E1-DI)
Only SS7 serial interfaces and protocols are supported. There is no support for non-SS7 serial WAN protocols. Up to four SS7 signaling links are supported per Cisco SLT.
Note
You must use the Cisco 2651 routers to achieve four SS7 signaling links. Using the Cisco 2611, you can have a maximum of two SS7 signaling links.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
6-1
This chapter describes Cisco SLT hardware maintenance and includes the following sections:
Checking Equipment Status, page 6-2 Removing a Cisco SLT, page 6-5 Replacing a Cisco SLT, page 6-6 Replacing Hardware Components, page 6-13 Additional Maintenance Tasks, page 6-15
Reading Cisco SLT LEDs Using Cisco IOS status queries Using CiscoWorks 2000, Cisco WAN Manager, or the Cisco MGC Node Manager (CMNM)
Front-Panel LEDs
Figure 6-1 shows the location of the LEDs on the Cisco SLT. Table 6-1 describes these LEDs.
Figure 6-1 Cisco SLT Front-Panel LEDs
POWER
RPS
ACTIVITY
H11660
Table 6-1
Description Indicates the Cisco SLT operating status. Goes on when power is supplied to the Cisco SLT and the Cisco SLT is operational. OFFNo RPS 1 is attached. ONRPS is attached and operational. BlinkRPS is attached, but has a failure.
6-2
OL-0800-06
Chapter 6
Table 6-1
LED Activity
Description OFFIn the Cisco IOS software, but no network activity. Blink (500 ms ON, 500 ms OFF)In Remote Monitor (ROMMON), no errors. Blink (500 ms ON, 500 ms OFF, 2 sec. between codes)In ROMMON, error detected. Blink (less than 500 ms)In the Cisco IOS software, the blink rate reflects the level of activity.
Rear-Panel LEDs
Figure 6-2 shows the location of the Cisco SLT rear-panel LEDs. Table 6-2 describes these LEDs.
Figure 6-2
Link LED ACT LED
SERIAL 1 SERIAL 1 SERIAL 0 SEE MANUAL BEFORE INSTALLA TION WIC CONN 2A/S SERIAL 0 SEE MANUAL BEFORE INSTALLA TION
CONN
W0
LINK ETHERNET 0/1 ACT LINKETHERNET 0/0 ACT CONSOLE
AUX
Ethernet 0/0 10BASE-T port (RJ-45) Ethernet 0/1 10BASE-T port (RJ-45)
Table 6-2
Description When this LED is lit, a link has been established with the hub or switch at the other end of the cable. When this LED is lit, packets are being transmitted or received on the Ethernet interface.
WIC LEDs
Each serial card has one LED, labeled CONN for each port, which lights when the serial port is connected. When the port is in DTE mode, the CONN LED indicates that Data Set Ready (DSR), Data Carrier Detect (DCD), and Clear To Send (CTS) have been detected. When the port is in DCE mode, it indicates that Data Terminal Ready (DTR) and Request To Send (RTS) have been detected.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
H11584
6-3
Figure 6-3
SERIAL 1 SERIAL 0 CONN SEE MANUAL BEFORE INSTALLATION WIC CONN 2A/S
CONN
SERIAL
CONN LEDs
VWIC LEDs
You can distinguish between T1 and E1 interface cards by the labeling on the faceplate, as shown in Figure 6-4. Each multiflex trunk interface card has three LEDs, which are shown in Figure 6-4 and described in Table 6-3.
Table 6-3 1-Port Multiflex Trunk Interface Card LEDs Description Color
LED LP LED
On means that a loopback or line state is detected or is manually set by the user. This LED is off during normal operation.
Yellow
AL LED CD LED
On means that there is a local or remote alarm state. This LED Yellow is off during normal operation. On means that a carrier has been detected and the internal DSU/CSU in the WAN interface card is communicating with another DSU/CSU. This LED is on during normal operation.
1- and 2-Port T1 and E1 Multiflex Trunk Interface Card LEDs
RJ-48C port
RJ-48C ports
Green
Figure 6-4
CTRLR T1 0
VWIC 2MFT-E1
CTRLR E1 1
CTRLR E1 0
6-4
OL-0800-06
17859
VWIC 1MFT-T1
17856
AL LP CD
H11497
H7212
AL LP CD
Chapter 6
Status commands that may help to monitor the health and state of your Cisco SLT at any given time include the following:
show c2600Shows complex troubleshooting information that does not pertain to a specific interface, but to the platforms shared resources. show contextDisplays information stored in nonvolatile random access memory (NVRAM) when an exception occurs. show flashShows information about the Flash memory device. show interfacesDisplays statistics for all interfaces configured on the Cisco SLT. show ip routeDisplays the entries in the routing table. show memShows statistics about the units memory, including memory free pool statistics. show processesDisplays information about the active processes. show protocolsDisplays the configured protocols. This command shows the status of any configured Layer 3 (network) protocol. show rudp failuresDisplays Reliable User Datagram Protocol (RUDP) failure statistics. show rudp statisticsDisplays RUDP internal statistics. show running-configDisplays the active configuration parameters. show SS7 mtp2Displays Message Transfer Part 2 (MTP 2) channel control-block data, MTP 2 link state information, MTP 2 statistics, MTP 2 timer information, protocol information for a channel, and the channel number. (The default is channel 0.) show SS7 smDisplays session manager session information. show startup-configDisplays the backup configuration file. show versionDisplays the configuration of the system hardware, the software version, the names and sources of configuration files, and the boot images.
Note
The SS7-related commands (show SS7 mtp2, show SS7 sm, show rudp failures, and show rudp statistics) are part of CiscoS RUDP session manager. They are not available on other Cisco equipment running IOS.
Safety recommendations General site requirements Preparations for connecting to the network
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
6-5
Flat-blade screwdrivers: small, 3/16-inch (0.476 cm) and medium, 1/4-inch (0.625 cm) ESD-preventive wrist strap
It is also assumed that the cables and console terminal were installed during the original system installation.
Procedure
To remove the Cisco SLT, complete the following steps:
Step 1 Step 2 Step 3 Step 4
Power off the Cisco SLT. Attach the ESD-preventive wrist strap to the chassis of the Cisco SLT. Disconnect all cables from the rear panel of the Cisco SLT. Remove the front and rear mounting screws and remove the unit from the rack.
Number 2 Phillips screwdriver Flat-blade screwdrivers: small, 3/16-inch (0.476 cm) and medium, 1/4-inch (0.625 cm) ESD-preventive wrist strap Screws to secure the rack-mount brackets to the Cisco SLT
It is assumed that cables, Ethernet hub, and the console terminal remain from the original installation.
Warning
To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions to ensure that the system remains stable. The following guidelines are provided to ensure your safety:
If the rack contains only one unit, mount the unit at the bottom of the rack. If the rack is a partially filled rack, load the rack from the bottom to the top, with the heaviest component at the bottom of the rack.
6-6
OL-0800-06
Chapter 6
If the rack contains stabilizing devices, install the stabilizers prior to mounting or servicing the unit in the rack.
Identifying the Brackets
Figure 6-5
With the front panel forward (see Figure 6-6 and Figure 6-7) With the rear panel forward (see Figure 6-8 and Figure 6-9) In a center-mount rack, with the rear panel forward (see Figure 6-10)
Note
Note
If you are installing a Cisco SLT in a 19-inch rack with a 17.5-inch opening, orient the rack-mount brackets so that, when installed, they do not increase the width of the chassis. (See Figure 6-6.) If you are installing a Cisco SLT in a 19-inch EIA-standard rack with a 17.75-inch opening or a 23- or 24-inch rack, orient the rack-mount brackets so that, when installed, they increase the width of the chassis. (See Figure 6-7.)
Note
The following illustrations show how to connect the bracket to one side of the chassis. The second bracket connects to the opposite side of the chassis.
Figure 6-6 Bracket InstallationFront Panel Forward (19-Inch Rack with a 17.5-Inch Opening)
H4201
Note: The second bracket attaches to the other side of the chassis.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
27712
6-7
Note
When installed in a 19-inch rack with a 17.75-inch opening, the Cisco SLT protrudes beyond the front of the rack.
Figure 6-7 Bracket InstallationFront Panel Forward (19-Inch Rack with a 17.75-Inch Opening or a 23-inch or 24-Inch Rack)
Figure 6-8
Figure 6-9
Bracket InstallationRear Panel Forward (19-Inch Rack with a 17.75-Inch Opening or a 23-inch or 24-Inch Rack)
6-8
27716
19-inch brackets
27714
19-inch brackets
27713
19-inch brackets
OL-0800-06
Chapter 6
24 in. brackets
Warning
This unit is intended for installation in restricted access areas. A restricted access area is where access can only be gained by service personnel through the use of a special tool, lock and key, or other means of security, and is controlled by the authority responsible for the location.
DC Power Specifications
The DC power supply is intended for use in DC-operating environments. Table 6-4 lists the power supply specifications.
Table 6-4 Power Supply Specifications
Warning
Before performing any of the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
H6331
19 in. brackets
6-9
Warning
Figure 6-12 shows the DC power supply terminal block. The proper wiring sequence is ground to ground, positive to positive (line to L), and negative to negative (neutral to N). Note that the ground wire should always be connected first and disconnected last.
Caution
Do not over torque the terminal block captive thumbscrew or terminal block contact screws. The recommended torque is 8.2 0.4 inch-lb.
Warning
After wiring the DC power supply, remove the tape from the circuit breaker switch handle and reinstate power by moving the handle of the circuit breaker to the ON position.
Warning
Secure all power cabling when installing this unit to avoid disturbing field-wiring connections.
Note
This product is intended for installation in restricted access areas and is approved for use with 14 AWG copper conductors only. The installation must comply with all applicable codes. To wire the terminal block, complete the following steps:
Step 1 Step 2
Attach the appropriate lugs at the wire end of the power supply cord. Wire the DC power supply to the terminal block, as shown in Figure 6-12.
Terminal block
Ground
6-10
35260
On/off switch
Negative Positive
OL-0800-06
Chapter 6
Connecting to a Network
This section explains how to connect the Cisco SLT to the control signaling LAN. It is assumed that the cables required to connect the Cisco SLT to the LAN are available from the Cisco SLT being replaced.
Warning
Do not work on the system, or connect or disconnect cables during periods of lightning activity.
Connect your cables from the Ethernet 100BaseT ports to Ethernet 100BaseT ports on the LAN switch.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
H3824
6-11
Connect the terminal using the thin, flat, RJ-45-to-RJ-45 rollover cable (looks like a telephone cable) and an RJ-45-to-DB-9 or RJ-45-to-DB-25 adapter (labeled TERMINAL) included with the Cisco SLT. (See Figure 6-14.) Configure your terminal or PC terminal emulation software for 9600 baud, 8 data bits, no parity, and 2 stop bits. For information on console port pinouts, see the online document Cisco Modular Access Router Cabling Specifications on the Documentation CD-ROM that accompanied your Cisco SLT package.
Step 2
SERIAL 1 SERIAL 1 CONN SERIAL 0 SEE MANUAL BEFORE INSTALLATION WIC CONN 2A/S SERIAL 0 SEE MANUAL BEFORE INSTALLATION
Cisco 2611
WIC CONN 2A/S
100-240V 1A 50/60 Hz 47 W
CONN
W0
LINK ETHERNET 1 ACT LINK ETHERNET 0 ACT CONSOLE
AUX
6-12
OL-0800-06
Chapter 6
Figure 6-15 Cisco SLT WAN Interface Card Chassis Slot Locations
SERIAL 1 SERIAL 1 CONN SERIAL 0 SEE MANUAL BEFORE INSTALLATION WIC CONN 2A/S SERIAL 0 CONN SEE MANUAL BEFORE INSTALLATION
Cisco 2612
WIC 2T
100-240V 1A 50/60 Hz 47 W
CONN
W1
W0
LINK TOKEN RING 1 ACT LINK ETHERNET 0 ACT
CONSOLE
AUX
Unit numbers identify the interfaces on the modules installed in the unit. Unit numbers begin at 0 for each interface type, and continue from right to left and from bottom to top. Modules are identified by interface type, slot number (always 0), a forward slash (/), then the unit number. For example:
Note
First Ethernet interface is referred to as Ethernet 0/0 Slot W0, serial interface 0 is referred to as serial 0/0 Slot W1, serial interface 1 is referred to as serial 0/1
WAN interface card slots (built into the chassis) are always numbered as slot 0, even if the interface card is installed in the slot labeled W1. For information about WAN interface slot and port numbering, see the Cisco WAN Interface Cards Hardware Installation Guide.
Required Tools and Equipment, page 6-14 Installing a WAN Interface Card, page 6-14
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
10344
6-13
CONN LEDs
Number 1 Phillips screwdriver. Appropriate connecting cableThe cables should already be available. For more information on cable types, see the online document Cisco Modular Router Cable Specifications on the Documentation CD-ROM that came with your Cisco SLT package, or on Cisco Connection Online. Synchronous modem, channel service unit/data service unit (CSU/DSU), or other data circuit-terminating equipment (DCE) (serial card only)Used to connect the WAN interface card to a digital WAN line.
Caution
WICs do not support online insertion and removal (hot-swapping). Before inserting a card into the network module or Cisco SLT chassis, you must turn off electrical power and disconnect network cables.
Warning
Before performing any of the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.
To install WAN interface cards in a Cisco SLT WIC chassis slot, complete the following procedure:
Step 1
Turn off power to the Cisco SLT. However, to channel ESD voltages to ground, do not unplug the power cable. Remove all network interface cables, including telephone cables, from the rear panel.
6-14
H11496
OL-0800-06
Chapter 6
Note
If you are installing a single WIC-2T, use slot W0 first (see Figure 6-15). The Cisco SLT checks slot W0 before it checks slot W1. If you fill slot W1 while leaving slot W0 vacant, your Cisco SLT configuration could be affected.
Step 2
Use a screwdriver to remove the blank filler panel from the chassis card slot where you plan to install the card. Save the filler panel for future use.
a. b. c. d.
Align the card with the guides in the WAN interface card slot and slide it gently into the slot. Push the card into place until you feel its edge connector mate securely with the connector in the WAN interface card slot. Fasten the cards captive mounting screws into the holes in the WAN interface card slot, using the screwdriver. Reinstall the network interface cables and turn on power to the Cisco SLT.
The following warning applies only to Cisco SLTs that use a DC power supply:
Warning
After wiring the DC power supply, remove the tape from the circuit breaker switch handle and reinstate power by moving the handle of the circuit breaker to the ON position.
Upgrading DRAM, page 6-16 Opening the Chassis, page 6-16 Replacing the System-Code SIMM, page 6-19 Closing the Chassis, page 6-21 Procedures for Recovering Boot and System Images, page 6-22
Additional maintenance procedures are available on the Documentation CD-ROM that shipped with the Cisco SLT.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
6-15
To see translated versions of warnings in this section, see the Regulatory Compliance and Safety Information document that accompanied your Cisco SLT.
Caution
Before opening the chassis, be sure that you have discharged all static electricity from your body and the power is off.
Warning
Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.
Upgrading DRAM
This section describes how to upgrade dynamic random-access memory (DRAM) on the system card. You might need to upgrade DRAM if you have loaded a new Cisco IOS software feature set or release. To see how much memory is currently installed in the Cisco SLT, enter the show version command. Near the middle of the resulting output, a message similar to the following appears:
Cisco 2611(MPC860) processor (revision 0x200) with 28672K/4096K bytes of memory.
This line shows how much memory is installed (in this example, 28672 K/4096 K). The first number represents primary memory, and the second number represents shared memory. For information about recommended DRAM part numbers for your Cisco SLT, refer to the Cisco 2600 Series Hardware Installation Guide.
Warning
Do not touch the power supply when the power cord is connected. For systems with a power switch, line voltages are present within the power supply even when the power switch is OFF and the power cord is connected. For systems without a power switch, line voltages are present within the power supply when the power cord is connected.
6-16
OL-0800-06
Chapter 6
Tools Required
You will need the following tools to remove and replace the DRAM DIMMs on the Cisco SLT:
Number 2 Phillips screwdriver ESD-preventive wrist strap DRAM DIMM required for your planned upgrade
Warning
Before opening the chassis, disconnect the telephone-network cables to avoid contact with telephone-network voltages.
Power off the Cisco SLT. Disconnect all cables from the rear panel of the Cisco SLT. Remove the screws located on the top of the chassis. Note that the chassis is composed of two sections, top and bottom. Holding the chassis with both hands, position it as shown in Figure 6-18. Slide the top section away from the bottom section as shown in Figure 6-19.
Figure 6-18 Holding Chassis for Cover Removal
Cisco 2600
POWER RPS ACTIVITY
SERIES
Cisco 2600
POWER RPS ACTIVITY
SERIES
Step 6
When the top cover is off, set it aside. Figure 6-20 shows the layout of the system cards.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
H11659
H11658
6-17
Lattice U23
PCI connector
Ethernet Ethernet
AUX Console
Power off the Cisco SLT. Attach an ESD-preventive wrist strap. Open the cover following the instructions in the Opening the Chassis section on page 6-16. Remove the existing DRAM DIMM by pulling outward on the connectors to unlatch them, as shown in Figure 6-21. Be careful not to break the holders on the DIMM connector.
Caution Step 5
To prevent damage, do not press on the center of the DIMMs. Handle each DIMM carefully. Position the new DIMM so that the polarization notch is located at the left end of the DIMM socket as shown in Figure 6-21.
6-18
H11599
OL-0800-06
Chapter 6
2
10243
Step 6
Insert the new DRAM DIMM by sliding the end with the metal fingers into the DIMM connector socket at approximately a 90 angle to the system card. Gently rock the DIMM back into place until the latch on either side snaps into place. Do not use excessive force, because the connector might break. Replace the Cisco SLT cover. Follow the instructions in the Closing the Chassis section on page 6-21.
Step 7
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
6-19
Tools Required
You will need the following tools to remove and replace the system-code SIMM on the Cisco SLT:
Medium-size flat-blade screwdriver (1/4 inch [0.625 cm]) Electrostatic discharge (ESD)-preventive wrist strap System-code SIMM
Caution
The system code is stored on the Flash memory SIMM, but new system-code SIMMs are shipped without preinstalled software. Before continuing with this procedure, use the copy flash tftp EXEC command to back up the system code to a Trivial File Transfer Protocol (TFTP) server.
Note
For more information about the copy flash tftp command and other related commands, refer to the Cisco IOS configuration and command reference publications. These publications are available on the Documentation CD-ROM that came with your Cisco SLT, and on Cisco.com.
If you have not already done so, enter the copy flash tftp EXEC command to back up the system code. Power off the Cisco SLT. Remove all cables from the rear panel of the Cisco SLT. Attach an ESD-preventive wrist or ankle strap. Open the chassis cover, following the procedure in the Opening the Chassis section on page 6-16. Locate the system-code SIMM on the system card. (See Figure 6-20.) If necessary, remove the existing system-code SIMM by pulling outward on the connector holders to unlatch them. The connector holds the SIMM tightly, so be careful not to break the holders on the SIMM connector. (See Figure 6-22.) Position the new SIMM so that the polarization notch is located at the left end of the SIMM socket.
Step 8
Caution
To prevent damage, do not press on the center of the SIMM. Handle each SIMM carefully. Note that some Flash memory SIMMs have the components mounted on the rear side; therefore, when inserting the SIMM, always use the polarization notch as a reference and not the position of the components on the SIMM. Insert the new SIMM by sliding the end with the metal fingers into the SIMM connector socket at approximately a 90 angle to the system card. Gently rock the SIMM back into place until the latches on both sides snap into place. Do not use excessive force because the connector might break.
Step 9
6-20
OL-0800-06
Chapter 6
Step 10
Replace the Cisco SLT cover following the procedure in the following section. Refer to the Procedures for Recovering Boot and System Images section on page 6-22 for instructions on how to place the Cisco IOS image on the new SIMM.
Tab
SIMM Tab
Position the two chassis sections, as shown in Figure 6-19. Referring to Figure 6-18, press the two chassis sections together and ensure that the top section fits into the rear of the bottom section, the bottom section fits into the front of the top section, and that the sides of the top and bottom sections fit together.
Caution
To fit the two sections together, it might be necessary to work them together at one end and then the other; however, use care to prevent bending the chassis edges. When the two sections fit together snugly, slide the chassis top until it fits into the front bezel.
Step 3
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
10244
6-21
Replace the cover screws. Tighten the screws to no more than 8 or 9 inch/pound of torque. Reinstall the chassis on the wall, rack, desktop, or table. Reconnect all cables.
6-22
OL-0800-06
C H A P T E R
Checking Equipment Status, page 7-1 Replacing Hardware Components, page 7-5
Reading the Cisco Catalyst 5500 LEDs Querying the status using the Catalyst command line interface (CLI) Querying the system using CiscoWorks 2000 and Cisco WAN Manager (CWM)
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
7-1
S ST YS AT TE U M S
100%
PS PS FA N 1 2 R ES ET
SL
10/100Mbps LINK
SUPERVISOR ENGINE I I I
CONSOLE
AUX
Switch
Load
Status LEDs
PCMCIA slots
Uplink ports
The LEDs on the supervisor engine front panel indicate the status of the system, which includes the supervisor engine, the power supplies, and the fan assembly. Table 7-1 describes LED operation.
Table 7-1 Supervisor Engine III and Uplink Module LED Descriptions
Description Indicates that a series of self-tests and diagnostic tests has been passed. System is being booted or is faulty (fails a test or module is disabled). Fan modules have failed or redundant power supply is installed, but not turned on. The fan is operational. The fan is not operational. Power supply in left bay is operational. Power supply in left bay is not operational, switched off, or not receiving power. Power supply in the left bay is off or not installed.
Note
FAN PS1
The Catalyst 5500 power supply LED is red when no modules are installed.
PS2
The power supply in the right bay is operational. The power supply in the right bay is not operational, is switched off, or is not receiving input power. The power supply in the right bay is off or is not installed.
Note
The Catalyst 5500 power supply LED is red when no modules are installed.
If the switch is operational, the switch load display indicates (as an approximate percentage) the current traffic load over the backplane. The supervisor engine is operational and active. The supervisor engine module is in standby mode.
7-2
H10965
AC TIV
SL
PORT 1
MDIX
PORT 2
MDIX
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Checking Equipment Status
Table 7-1
State On
Description Supervisor Engine III only: The Flash PC Card SLOT 1 and SLOT 0 LEDs light when their respective slot 1 and slot 0 Flash PC Card devices are accessed. The port is operating at 100 Mbps. The port is operating at 1000 Mbps. The port is operational. The link has been disabled by software. The link is bad and has been disabled due to a hardware failure. No signal is detected.
LED STATUS
Description The switch performs a series of self-tests and diagnostic tests. If it passes all the tests, the status LED is green. If it fails any test, the status LED is red (or orange for a minor fault or if manually disabled).
Link
If the port is operational (a signal is detected), the LED is green. If the link has been disabled by software, the LED is orange. If the link is bad and has been disabled due to a hardware failure, the LED flashes orange. If no signal is detected, the LED is off.
Figure 7-2
ST AT US
3 2 1
6 5 4
9 8 7
12 11 10
15 14 13
18 17 16
21 20 19
24 23 22
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
H3043
7-3
LED STATUS
Description The switch performs a series of self-tests and diagnostic tests. If it passes all the tests, the LED is green. If it fails a test other than an individual port test fails, the LED is red. During system boot or if the module is disabled, the LED is orange. During self-test diagnostics, the LED is orange. If the module is disabled, the LED is orange.
If the port is operating at 100 Mbps, the LED is green. If the port is operating at 10 Mbps, the LED is off. If the port is operational (a signal is detected), the LED is green. If the link has been disabled by software, the LED is orange. If the link is bad and has been disabled due to a hardware failure, the LED flashes orange. If no signal is detected, the LED is off.
Figure 7-3
US
AT
ST
LI
NK
10
bp
H5796
C H AN N EL PC M C IA
EN C AB PU LE HA LT D
ST AT U S
SL SL O O T T 0 1
R ES ET
TX
R X
R X
TX
AU X
7-4
H10366
PC M IC A
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components
Table 7-4
LED STATUS
Description All the self-tests have been passed. A test other than an individual port test has been failed. System boot, self-test diagnostics running, or the module is disabled. Indicates normal RSM operation. The system detected a processor hardware failure. Indicates IP microcode is loaded and the RSM is operational. Indicates PCMCIA devices in slot 0 and 1 are being accessed by the RSM. The port is transmitting a packet (LED is lit for approximately 50 ms). The port is receiving a packet (LED is lit for approximately 50 ms3)
On Off On
Green Green
Removing the Supervisor Engine, page 7-6 Using Flash Memory (PCMCIA) Cards (Supervisor Engine III), page 7-7 Removing and Replacing the Power Supply, page 7-8 Removing and Replacing the Chassis Fan Assembly, page 7-15
For instructions on installing and replacing switching modules, refer to the Catalyst 5000 Series Module Installation Guide.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
7-5
R ES ET
10 0%
1%
LIN 10 0 K M BP S
LIN 10 K 0M BP S
OL
PS PS FA 1 2 N AC TIV E
ST AT US
M DI X
A4 11
M DI X
A4 11
SUPERVISOR ENGINE
CO
PO RT
PO RT
NS
Ejector lever
Tools Required
Use a flat-blade screwdriver to remove any filler (blank) modules and to tighten the captive installation screws that secure the modules in their slots. When you handle modules, use an ESD-preventive wrist strap or other grounding device to prevent electrostatic discharge (ESD) damage.
If you do not plan to immediately reinstall the supervisor engine you are removing, disconnect any network interface cables attached to the module ports. Use a screwdriver to loosen the captive installation screws at the left and right sides of the module. Grasp the left and right ejector levers and simultaneously pull the left lever to the left and the right lever to the right to release the module from the backplane connector.
7-6
H9170
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components
Grasp the handle of the module with one hand and place your other hand under the carrier to support and guide the module out of the slot. Avoid touching the module. Carefully pull the module straight out of the slot, keeping your other hand under the carrier to guide it. Keep the module at a 90-degree orientation to the backplane. Place the removed module on an antistatic mat or antistatic foam. If the slot is to remain empty, install a module filler plate to keep dust out of the chassis and to maintain proper airflow through the module compartment.
Caution
Always install a switching module filler plate in empty switching module slots to maintain the proper flow of cooling air across the modules.
Note
When you remove and replace the supervisor engine, the system provides status messages on the console screen. The messages are for information only. Enter the show system and show module commands to view specific information. For additional information, refer to the Catalyst 5000 Series Software Configuration Guide and the Catalyst 5000 Series Command Reference.
Remove the module filler plate, if any. Grasp the handle of the module with one hand and carefully align the module with the slot, keeping your other hand under the carrier to support it. Keep the module at a 90-degree orientation to the backplane. Carefully push the module straight into the slot, keeping one hand under the carrier to guide it. Avoid touching the module. Make sure that the ejector levers are pushed in, holding the module to the backplane connector. Use a screwdriver to tighten the captive installation screws at the left and right sides of the module. Reattach network interface cables to the module ports.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
7-7
Note
You can insert and remove the Flash memory card with the power on. Before you install a card, verify that the Flash memory card is set with write protection off. The write-protect switch is located on the front edge of the card when oriented with the printing right side up and the edge connector end away from you. (See Figure 7-6.)
Figure 7-6 Locating the Flash Memory Card Write-Protection Switch
Flash PC card
Use the following procedure for installing and removing a Flash memory card:
Step 1
Face the front panel of the switch and hold the Flash memory card with the connector end of the card toward the slot. The connector end of the card is opposite the end with the write-protection switch, which is shown in Figure 7-6. Insert the card into the appropriate slot until the card completely seats in the connector at the back of the slot and the eject button pops out toward you. Note that the card does not insert all the way into the slot; a portion of the card remains outside the slot. Do not attempt to force the card past this point. To eject a card, press the appropriate ejector button until the card is free of the connector at the back of the slot. Remove the card from the slot and place it in an antistatic bag.
Step 2
Step 3 Step 4
Removing an AC-Input Power Supply, page 7-9 Installing an AC-Input Power Supply, page 7-10 Removing a DC-Input Power Supply, page 7-11 Installing a DC-Input Power Supply, page 7-13
7-8
H2352
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components
Note
In systems with redundant power supplies, the faulty supply can be replaced while the system is operating.
Step 1
Turn off the power switch on the power supply you are removing (see Figure 7-7).
Warning
Do not touch the power supply when the power cord is connected. For systems with a power switch, line voltages are present within the power supply even when the power switch is off and the power cord is connected. For systems without a power switch, line voltages are present within the power supply when the power cord is connected.
Caution
Failure to turn off the power supply could result in equipment damage.
Figure 7-7 AC-Input Power Supply Front Panels
Power connection
AC OK FAN OK OUTPUT FAIL
Metal prongs
Power switch
Captive screw
Step 2
Warning
Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.
Step 3 Step 4
Disconnect the power cord from the power supply being removed. Using a flat-blade screwdriver, loosen and remove the captive installation screws (see Figure 7-7).
Caution Step 5
Use both hands to install and remove power supplies. Grasp the power supply handle with one hand and place your other hand underneath to support the bottom of the supply, as shown in Figure 7-8 (Cisco Catalyst 5000 supply shown).
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
H11764
7-9
Figure 7-8
Warning
Keep your hands and fingers out of the power supply bays. High current is present on the power backplane when the system is operating.
Step 6 Step 7
Pull the supply out of the bay and put it aside. If the power supply bay is to remain empty, install a blank power supply filler plate over the opening; secure it with the mounting screws.
Caution
Always install a filler plate over an empty power supply bay, not only to protect the inner chassis and connectors from dust or other contamination, but to prevent possible contact with the high current levels of those connectors when the chassis is powered on.
Before installing a Cisco Catalyst 5500 AC-input power supply, read the warning in the Removing an AC-Input Power Supply section.
Turn off the power switch on the power supply you are installing (see Figure 7-9).
Caution
Failure to turn off the power supply could result in equipment damage.
Caution
Use both hands to install and remove power supplies. The Cisco Catalyst 5500 power supply weighs 22 lb. (9.9 kg).
Warning
Keep your hands and fingers out of the power supply bays. High current is present on the power backplane when the system is operating.
Step 2
Grasp the power supply handle with one hand and place your other hand underneath to support the bottom of the supply, as shown in Figure 7-11.
7-10
H2751
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components
Slide the power supply all the way into the power supply bay. Using a flat-blade screwdriver, tighten the captive installation screws (see Figure 7-10). Before connecting the power supply to a power source, ensure that all site power and grounding requirements described in the Cisco Media Gateway Controller Hardware Installation Guide have been met. Plug the power cord into the power supply. Connect the other end of the power cord to an AC-power input source.
Step 6 Step 7
Note
Each AC-input power supply operating at 120 VAC requires a dedicated 20A service and 20A plug and receptacle. It is not acceptable to power the Cisco Catalyst 5500 from a 15A line cord because of the safety ratings under which the Cisco Catalyst 5500 is certified.
Caution
In a system with dual power supplies, connect each power supply to a separate input source. In case of a power source failure, the second source will probably still be available and can maintain maximum overcurrent protection for each power connection. Turn the power switch to the ON position on the power supply. Verify that power supply operation and the front panel LEDs are in the following states: AC OK LED is green. FAN OK LED is green. OUTPUT FAIL LED is off.
Step 8 Step 9
Step 10 Step 11
Verify that the appropriate supervisor engine module PS1 and PS2 LEDs are on (green). Enter the show system command to display the power supply and system status. If the LEDs or show system command indicate a power or other system problem, refer to Appendix C, Troubleshooting Cisco Switch Signaling. for troubleshooting information.
Verify that power is off to the DC circuit on the power supply you are removing.
Warning
Before performing the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.
Warning
Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
7-11
Step 2 Step 3
Turn the power switch to the OFF (0) position on the power supply you are removing (see Figure 7-9). Remove the two screws securing the terminal block cover and slide the cover straight off the terminal block (see Figure 7-9).
Figure 7-9 DC-Input Power Supply Front Panels
Remove
DC OK FAN OUTPUT OK FAIL
Captive screw
Step 4 Step 5
Disconnect the DC-input wires from the terminal block. Disconnect the ground wire last. Disconnect the central office (CO) ground from the CO ground connector (Figure 7-10).
Figure 7-10 DC-Input Power Supply CO Ground
FA N 2 1 RE SE T TX RX LIN K SLO Ene t PC MC SLO T2 T1 PS PS
SWITCH/PROCESSOR
IA EJE CT
o o
Loosen and remove the captive screws on the power supply (see Figure 7-9).
Caution Step 7
Use both hands to remove and install power supplies. Grasp the power supply handle with one hand and place your other hand underneath as you slowly pull the power supply out of the bay (see Figure 7-11).
7-12
28649
H8767
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components
Warning
Keep hands and fingers out of the power supply bays. High voltage is present on the power backplane when the system is operating.
Figure 7-11 Handling a DC Power Supply
Step 8
If the bay is to remain empty, install a blank power supply filler plate (Cisco part number 700-00177-01) over the opening and secure it with the mounting screws. This protects the inner chassis from dust and prevents accidental contact with live voltage at rear of the bay.
Caution
Always install a filler plate over an empty power supply bay to protect the inner chassis and connectors from dust or other contamination and to prevent possible contact with the high current levels of those connectors when the chassis is powered on. Reinstall the power supply terminal block cover.
Step 9
Verify that power is off to the DC circuit on the power supply you are installing.
Warning
Before performing any of the following procedures, ensure that power is removed from the DC circuit. To ensure that all power is OFF, locate the circuit breaker on the panel board that services the DC circuit, switch the circuit breaker to the OFF position, and tape the switch handle of the circuit breaker in the OFF position.
Warning
Before working on a chassis or working near power supplies, unplug the power cord on AC units; disconnect the power at the circuit breaker on DC units.
Step 2
Connect the switch to the CO ground through the CO ground connector shown in Figure 7-10. Remove the adhesive strip covering the CO ground connector on the switch. Use the following guidelines when connecting the switch to the CO ground:
The ground wire lug must be less than or equal to 0.320 in. (8.1 mm) to fit within the ground connector.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
H7805
7-13
Step 3
The ground wire must be 10 to 12 AWG. Use the larger gauge ground wire when the switch is further away from the ground location.
Turn the power switch to the OFF (0) position on the power supply you are installing (see Figure 7-10).
Caution
Warning
Keep hands and fingers out of the power supply bays. High voltage is present on the power backplane when the system is operating.
Grasp the power supply handle with one hand and place your other hand underneath as you slowly insert the power supply into the bay (see Figure 7-11). Using a screwdriver, tighten the captive screws on the power supply (see Figure 7-9). Remove the terminal block cover (see Figure 7-9). Remove the two screws securing the terminal block cover and slide the cover straight off the terminal block. Attach the appropriate lugs to the DC-input wires. Maximum width of the lugs is 0.300 inch (7.6 mm). Suggested lugs are AMP 322985 or 52941. Suggested DC-input wires are 10 AWG.
Caution
When stranded wiring is required, use approved wiring terminations, such as closed-loop or spade-type with upturned lugs. These terminations must be the appropriate size for the wires and clamp both the insulation and conductor. Connect the DC-input wires to the terminal block. If not already done, route the DC-input power cable through the conduit from your power source, through the conduit bracket on the power supply, and make a sufficient length of wire available to attach to the three terminal block connections. Attach and tighten the conduit to the conduit bracket. How this conduit is attached depends on your site; its attachment is beyond the scope of this document.
Step 8
Caution Step 9
Connect the ground wire first. Connect the DC-input wires to the terminal block (see Figure 7-12). The proper wiring sequence is ground to ground, positive to positive (line to L), and negative to negative (neutral to N). Note that the ground wire should always be connected first and disconnected last. After ensuring that all wire connections are secure, reinstall the terminal block cover.
Step 10
Caution
To prevent a short-circuit or shock hazard after wiring the DC-input power supply, reinstall the terminal block cover.
7-14
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components
Power switch
Caution
In a system with dual power supplies, use the modular power cord to connect each power supply to a separate input line. In case of a line failure, the second source will most likely still be available and can maintain maximum overcurrent protection for each power connection. Remove the tape from the circuit breaker switch handle and restore power by moving the circuit breaker switch handle to the on position. Turn the power switch to the on position on the power supply. Verify power supply operation. Verify that the power supply front panel LEDs are in the following states: DC OK LED is green. FAN OK LED is green. OUTPUT FAIL LED is off. Verify that the appropriate supervisor engine module PS1 and PS2 LEDs are on and green. Enter the show system command to display the power supply and system status.
Caution
Never operate the system if the fan assembly is removed or if it is not functioning properly. An overtemperature condition can result in severe equipment damage.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
H9325
7-15
Note
The fan assembly is designed to be removed and replaced while the system is operating without presenting an electrical hazard or damage to the system.
Locate the fan assembly to the left of the card cage (see Figure 7-13). Loosen the two captive installation screws by turning them counterclockwise. Grasp the fan assembly with both hands and pull it outward, joggling it if necessary to unseat it from the backplane. Pull it clear of the chassis and place it in a safe location.
Hold the fan assembly with the fans facing to the right. Place the fan assembly into the front chassis cavity so that it rests on the chassis, and then lift the fan assembly up slightly, aligning the top and bottom guides. Push the fan assembly into the chassis until the captive installation screws meet the chassis. Tighten the captive installation screws by turning them clockwise.
SY ST ST AT EM US
AC TIV E
SW ITC LO H G
CO NS OL E
RE SE T
100 %
FA N
1%
LIN 100 K Mb ps
PO RT
PS PS 2 1
SUPERVISOR ENGINE
MD IX
MII
LIN 100 K Mb ps
MD IX
PO RT
SY ST ST AT EM US
TIV
ITC
SE
SW
100
AC
LO
1%
FA
RE
NS
OL
CO
ps
RT
PO
PS
Mb
ps
100
IX
MD
MII
LIN
SUPERVISOR ENGINE
LIN
100
PS
Mb
IX
PO
RT
MD
MII
MII
7-16
H10647
OL-0800-05
Chapter 7
Maintaining the Cisco Catalyst 5500 Multiswitch Router Replacing Hardware Components
Listen for the fans; you should immediately hear them operating. If you do not hear them, ensure that the fan assembly is completely inserted in the chassis and that the faceplate is flush with the switch back panel. If after several attempts the fans do not operate, or if you experience trouble with the installation (for instance, if the captive installation screws do not align with the chassis holes), contact the Cisco Technical Assistance Center (TAC) for assistance. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC.
Step 2
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-05
7-17
7-18
OL-0800-05
C H A P T E R
Troubleshooting Overview, page 8-1 Troubleshooting Using Cisco MGC Alarms, page 8-2 Resolving SS7 Network Related Problems, page 8-86 Resolving Bearer Channel Connection Problems, page 8-115 Resolving SIP Communication Problems, page 8-148 Tracing, page 8-148 Platform Troubleshooting, page 8-158
Troubleshooting Overview
This chapter uses the alarms and logs that appear at the Cisco MGC as the basis for isolating problems within the system. You can find a complete listing of alarms and logs in the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide. Typically, suggested corrective actions start with simple troubleshooting tasks and become increasingly more complex. It is easier, for example, to check LEDs and cabling than to perform a call trace. The suggested corrective actions point to other chapters in this manual, as well as to troubleshooting tools including the Cisco MGC software, the Cisco WAN Manager, and CiscoWorks. Additionally, you will find examples of troubleshooting typical problems. The examples provide a logical sequence for troubleshooting that you can use as a model.
Note
Troubleshooting of the Cisco MGC node should be performed by someone who has been trained in the complexities of the system, who has some experience administering the system, and who understands UNIX at the system administrator level. The following sections contain various equipment failure scenarios for the solution, including
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-1
An IP link failure between the Cisco SLT and the Cisco MGC, which indicates that it is impossible to transfer MTP3 messages. In this case, MTP Level 2 (MTP2) transmits Status Indication Processor Outage (SIPO) messages to the signaling transfer point (STP) to initiate switchover to another Cisco SLT. In the case where MTP2 failed (equivalent to a Cisco SLT failure), no SIPO messages are sent because MTP2 is inoperable. Instead, the mated STP pair detects the failure because of timer expiration or link unavailability and initiates the switchover to another SS7 link. If a Cisco MGC fault is detected by a Cisco SLT timer, a coordination mechanism causes SS7 messaging to flow to the newly active (formerly standby) Cisco MGC. The standby Cisco MGC assumes control for all calls in progress and all new calls.
8-2
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
The active alarm log files reside in the /opt/CiscoMGC/var/log directory. These alarm log files are archived based on the criteria set in the dmprSink.dat file. For more information on the dmprSink.dat file, refer to the Configuring the Data Dumper section on page A-2. Troubleshooting using Cisco MGC alarms is described in the following sections:
Retrieving All Active Alarms, page 8-3 Acknowledging Alarms, page 8-3 Clearing Alarms, page 8-4 Troubleshooting with System Logs, page 8-4 Alarm Troubleshooting Procedures, page 8-9
The system returns a response that shows all active alarms, in a format similar to the following:
Media Gateway Controller 2000-02-26 11:41:01 M RTRV "LPC-01: 2000-02-26 09:16:07.806," "LPC-01:ALM=\"SCMGC MTP3 COMM FAIL\",SEV=MJ" "IOCM-01: 2000-02-26 09:17:00.690," "IOCM-01:ALM=\"Config Fail\",SEV=MN" "MGC1alink2: 2000-02-26 09:17:47.224,ALM=\"SC FAIL\",SEV=MJ" "MGC1alink3: 2000-02-26 09:17:47.225,ALM=\"SC FAIL\",SEV=MJ" "MGC1alink4: 2000-02-26 09:17:47.226,ALM=\"SC FAIL\",SEV=MJ" "MGC2alink1: 2000-02-26 09:17:47.227,ALM=\"SC FAIL\",SEV=MJ" "MGC2alink2: 2000-02-26 09:17:47.227,ALM=\"SC FAIL\",SEV=MJ" "MGC2alink4: 2000-02-26 09:17:47.229,ALM=\"SC FAIL\",SEV=MJ" "dpc5: 2000-02-26 09:17:47.271,ALM=\"PC UNAVAIL\",SEV=MJ" "ls3link1: 2000-02-26 09:16:28.174," "ls3link1:ALM=\"Config Fail\",SEV=MN" "ls3link1: 2000-02-26 09:18:59.844,ALM=\"SC FAIL\",SEV=MJ"
Acknowledging Alarms
Acknowledging an alarm does not clear the alarm. You can still retrieve it with the rtrv-alm MML command. To acknowledge an alarm, log in to the active Cisco MGC, start an MML session, and enter the following command:
ack-alm:comp :"alarmCategory "
Where:
compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of select provisioned components by entering the prov-rtrv:all MML command. alarmCategoryMML name of the associated alarm category. The entered name must match exactly the name of the alarm as it is displayed.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-3
For example, to acknowledge a signaling channel fail alarm (SC FAIL) that occurred on the link MGC2alink1, enter the following command:
ack-alm:MGC2alink1:"SC FAIL"
Clearing Alarms
You can clear an alarm for a affected component. Clearing the alarm removes it and any associated alarms from the internal processes list maintained by the Cisco MGC. To clear an alarm, log in to the active Cisco MGC, start an MML session, and enter the following command:
clr-alm: comp :alarmCategory
Where:
compThe MML name of the component. A complete list of components can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. You can retrieve a list of select provisioned components by entering the prov-rtrv:all MML command. alarmCategoryMML name of the associated alarm category. The entered name must match exactly the name of the alarm as it is displayed.
For example, to acknowledge a signaling channel fail alarm (SC FAIL) that occurred on the link MGC2alink1, enter the following command:
clr-alm:MGC2alink1:"SC FAIL"
Note
Log level and destination can be controlled through settings in the XECfgParm.dat file. Refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide for more information.
8-4
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
To view a log file when you do not have the Cisco MGC viewer toolkit installed on your system, complete the following steps:
Step 1
Log in to the active Cisco MGC enter the following UNIX command to change to the /opt/CiscoMGC/var/log directory:
cd /opt/CiscoMGC/var/log
Step 2
Step 3
Where log_file_name is the name of the log file you want to view.
Note
Because the log files are very large, use the more parameter to scroll through the file. You might prefer to print the file to find the information you need. For example, you would enter the following command to view a specific platform log file:
cat platform_20010516141831.log | more
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-5
TimestampDisplays the date and time on the system when the log message was created, for example, May 8 01:35:23:047 2001 EST. The time displayed is down to the millisecond level. Process NameDisplays the name of the process that created the log message, for example, engine. Process IDDisplays the identification number of the process that created the log message, for example, (PID29974). Log LevelDisplays the severity level of the log message, for example, "Info". Log IDDisplays a short, symbolic name for the message, for example, GEN_ERR_GETCFGPARM:. Message TextDisplays the log message text, for example, installed time handler, hdlrId = 1. The message text can take up multiple lines, but is typically only a single line.
Lowest Logging Level Without Severe Performance Degradation Informational (the debug level causes major performance impactsdo not set). Debug, but only a single process can be in debug at any point in time.
Caution
Debug level logging provides extremely verbose output and, if misused, can cause severe system performance degradation. To change the log level of a single process, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-log:process_name :log_level [,confirm]
8-6
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Where:
process_nameName of the process for which you want to change the logging level. Processes are listed in the Understanding Processes section on page 3-4. log_levelDesired logging level. Valid log levels are as follows:
CRITCritical level messages WARNWarning condition messages ERRError condition messages TRACETrace messages INFOInformational messages DEBUGDebug-level messages (lowest level). Do not set the process to this logging level
Note
Setting the logging level at a given level means that the information related to the levels above the selected level are included. In other words, setting a process to the INFO logging level means that information related to the TRACE, ERR, WARN, and CRIT levels are also displayed. The order of the levels shown above can also be viewed as a verbosity level, in that at CRIT, the least information is logged and at DEBUG the most information logged. For example, to change the log level of the engine, enter the following command:
set-log:eng-01:info
To change the log level of all processes, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-log:all:log_level
Where log_level is the desired logging level. Valid log levels are as follows:
CRITCritical level messages WARNWarning condition messages ERRError condition messages TRACETrace messages INFOInformational messages
Note
Setting the logging level at a given level means that the information related to the levels above the selected level are included. In other words, setting a process to the INFO logging level means that information related to the TRACE, ERR, WARN, and CRIT levels are also displayed. The order of the levels shown above can also be viewed as a verbosity level, in that at CRIT, the least information is logged and at DEBUG the most information logged. For example, to change the log level of all processes to warning, enter the command:
set-log:all:warn
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-7
Note
The logging level of the process manager (PM-01) cannot be set using the set-log:all:log_level MML command. You can only change the logging level of the process manager using the set-log:pm-01:log_level MML command.
Note
The set-log:all:log_level MML command cannot be used to set all of the processes to the debug (DEBUG) logging level.
Note
The disk monitor (DSKM-01) process does not accept log-level change requests.
Create a diagnostics log file by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
diaglog:filename:start
Where filename is the name of your diagnostics log file. Enter the name only, do not enter a suffix, such as .log.
Step 2 Step 3
Perform your troubleshooting procedures. When you have finished troubleshooting and you want to view your diagnostics file, enter the following command at the active Cisco MGC:
diaglog:filename:stop
The file, which is given the name you entered in Step 1, without a suffix, can be found in the $BASEDIR/var/log directory. You can view the file using a text editor, such as vi.
System name System boot messages Operating system patch level System patch level Processor information Disk usage
8-8
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Processor tables CPU utilization Number of users logged in Statistics for the Ethernet interfaces IP routing System setup Swap space Date and time of last system reboot Permissions for the configuration library (CONFIG_LIB) File permissions for the /opt/CiscoMGC/etc and /opt/CiscoMGC/bin directories Copy of the XECfgParm.dat file
Log in to your active Cisco MGC, and enter the following UNIX command to change directories:
cd /opt/CiscoMGC/local
Step 2
The system returns a response that indicates the name of the file and the data path to the file.
Note
The name of the log file contains the time stamp for file creation and the name of the MGC host. The file is always saved to the opt/CiscoMGC/var/log directory. Provide the log file to the Cisco TAC as instructed by TAC personnel.
Step 3
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-9
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces between the Cisco MGC and the associated media gateway working properly. are
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the media gateway can be found in its associated documentation.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step3.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the media gateway can be found in its associated documentation.
Step 3
Verify that the near-end and far-end MGCP sessions are operating normally. Refer to the documentation for the affected media gateway for more information on verifying the functioning of the MGCP sessions. If the MGCP sessions are not operating normally, return the MGCP sessions to normal operations, as described in the documentation for the affected media gateway. Otherwise, proceed to Step 3.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
The ability to generate this alarm is changed in a patch (CSCOgs019) to Release 9.4(1) and for Release 9.5(2) and up. Generation of this alarm is now controlled by an XECfgParm.dat parameter, *.AllLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm is not generated when the alarm condition occurs. If you want this alarm to be generated, you must set the parameter to true, using the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If your Cisco MGC hosts are in separate geographic locations, we recommend that you set the value of *AllLinksFailCausesFailover to true. If you are running Release 9.4(1) with patch CSCOgs019 installed, and want to enable the generation of this alarm, you must enter the parameter manually in the XECfgParm.dat file. The XECfgParm.dat files in subsequent releases contain the parameter.
8-10
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. If your system is provisioned with destinations that use more than one version of SS7, ensure that this alarm is configured correctly, as described in the Verifying Configuration to Support Multiple Versions of SS7 section on page 8-113. Verify that the Cisco SLTs are operating normally, as described in the Checking Equipment Status section on page 6-2 and the Using the Cisco SLT Operating System to Check Status section on page 6-4. Verify that the Ethernet interfaces between the Cisco MGC and the Cisco SLTs are working properly.
Step 3
Step 4
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 5.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an interface card on the Cisco SLT can be found in the Replacing a Cisco SLT section on page 6-6.
Step 5
Verify that the configuration for your system is correct. To verify the provisioning data for your Cisco MGC, use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. To verify the provisioning data for the Cisco SLTs, use show commands, as described in the Using the Cisco SLT Operating System to Check Status section on page 6-4. If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of your Cisco SLTs is incorrect, modify the provisioning data for your system. Refer to the Cisco Signaling Link Terminal document for more information. If the configuration of both the Cisco MGC and the Cisco SLTs are correct, then proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-11
Step 2
Determine the health of the associated media gateway using the procedures in the user documentation for the media gateway. If the media gateway is working correctly, proceed to Step 3. If the media gateway is not healthy, restore it using the procedures in the user documentation for the media gateway. If those procedures restore the media gateway and this alarm clears, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Verify the functioning of the cabling between the Cisco MGC and the switch. If the cables are functioning properly, proceed to Step 4. If you find bad cable(s), replace them. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 4.
Step 4
Verify the functioning of the associated switch. Refer to the documentation for your switch for the necessary steps. If the switch is functioning properly, proceed to Step 5. If the switch is not functioning properly, refer to the appropriate troubleshooting procedures in the documentation for the switch. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 5
Check the IP connectivity between the Cisco MGC and the associated Cisco BRI voice gateway. If the IP connectivity is good, proceed to Step 6. If the IP connectivity is bad, restore the IP connectivity. If the alarm clears after the IP connectivity is restored, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Verify that the provisioning data for your ISDN BRI backhaul connect is correct. To verify the provisioning data, use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. . If the provisioning data is correct, proceed to Step 7. If the provisioning data is not correct, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
The ability to change the severity level of this alarm is implemented in a patch (CSCOgs059) for Release 9.5(2). The severity level of this alarm is now controlled by an XECfgParm.dat parameter, *.AllISDNLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm has a severity level of Major. If you set this parameter to true, this alarm has a severity level of Critical. This property should be set to true if your Cisco MGC hosts are in separate geographic locations. You can also set this parameter to true if your system is not processing SS7 calls and you want your system
8-12
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
to perform an automatic switchover should all of the ISDN IP connections fail. To change the value of this parameter, use the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected media gateways are operating normally, as described in the associated documentation. Verify that the Ethernet interfaces between the Cisco MGC and the media gateways are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on a media gateway can be found in its associated documentation.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 2.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the media gateway can be found in its associated documentation.
Step 4
Verify that the configuration for your system is correct. To verify the provisioning data for your Cisco MGC, use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. To verify the provisioning data for the media gateways, use show commands, as described in the associated documentation. If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of your media gateways is incorrect, modify the provisioning data for the media gateways. Refer to the documentation associated with the media gateway for more information. If the configuration of the Cisco MGC and the media gateways are correct, then proceed to Step 5.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-13
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected M3UA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. The AS definitions should match the routing contexts of the M3UA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
Note
The ability to generate this alarm is changed in a patch (CSCOgs019) to Release 9.4(1) and for Release 9.5(2) and up. Generation of this alarm is now controlled by an XECfgParm.dat parameter, *.AllLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm is not generated when the alarm condition occurs. If you want this alarm to be generated, you must set the parameter to true, using the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If your Cisco MGC hosts are in separate geographic locations, we recommend that you set the value of *AllLinksFailCausesFailover to true. If you are running Release 9.4(1) with patch CSCOgs019 installed, and want to enable the generation of this alarm, you must enter the parameter manually in the XECfgParm.dat file. The XECfgParm.dat files in subsequent releases contain the parameter.
8-14
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Cisco ITPs are operating normally. Refer to the documentation for your Cisco ITP for more information. If you find that the Cisco ITPs are operating normally, proceed to Step 3. Otherwise, correct the problems. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Verify that the Ethernet interfaces between the Cisco MGC and the Cisco ITPs are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on a Cisco ITP can be found in its associated documentation.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the Cisco ITP can be found in its associated documentation.
Step 4
Verify that the M3UA provisioning data on your Cisco MGC is correct. If the provisioning data is correct, proceed to Step 6. Otherwise, proceed to Step 5.
Step 5
Open a dynamic reconfiguration session to modify the M3UA provisioning data, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-15
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected SUA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. The AS definitions should match the routing contexts of the SUA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
Note
The ability to generate this alarm is changed in a patch (CSCOgs019) to Release 9.4(1) and for Release 9.5(2) and up. Generation of this alarm is now controlled by an XECfgParm.dat parameter, *.AllLinksFailCausesFailover. When this parameter is set to false (the default value), this alarm is not generated when the alarm condition occurs. If you want this alarm to be generated, you must set the parameter to true, using the procedure defined in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If your Cisco MGC hosts are in separate geographic locations, we recommend that you set the value of *AllLinksFailCausesFailover to true. If you are running Release 9.4(1) with patch CSCOgs019 installed, and want to enable the generation of this alarm, you must enter the parameter manually in the XECfgParm.dat file. The XECfgParm.dat files in subsequent releases contain the parameter.
8-16
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Cisco ITPs are operating normally. Refer to the documentation for your Cisco ITP for more information. If you find that the Cisco ITPs are operating normally, proceed to Step 3. Otherwise, correct the problems. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Verify that the Ethernet interfaces between the Cisco MGC and the Cisco ITPs are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on a Cisco ITP can be found in its associated documentation.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the Cisco ITP can be found in its associated documentation.
Step 4
Verify that the SUA provisioning data on your Cisco MGC is correct. If the provisioning data is correct, proceed to Step 6. Otherwise, proceed to Step 5.
Step 5
Open a dynamic reconfiguration session to modify the SUA provisioning data, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: ALoopCtrExceeded
This alarm occurs when an A-number analysis operation has gone into an infinite loop. The purpose of the alarm is to limit the number of passes spent in the analysis tree to 30.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-17
Step 2
Validate that there are no infinite loops in the A-number dial plan, as described in the Verifying a Dial Plan Translation section on page 3-143. If there are infinite loops in your A-number dial plan, modify the settings in your A-number dial plan to remove the infinite loops, using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. If their are no infinite loops in your A-number dial plan, then proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: ATableFail_GetDigMod
This alarm occurs when a retrieval of a modification string failed during A-number analysis. The problem occurs when the modification table is not loaded or a pointer to a nonexistent location in the modification table is given.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: ATableFail_GetResult
This alarm occurs when access to the result table failed during A-number analysis. The problem occurs if the result table is not loaded or a pointer to a nonexistent location in the result table is given.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: ATableFlt_DgtRangeError
This alarm occurs when the A-number analysis digit tree has been accessed with a digit that is out of range for the digit tree table. This alarm could occur if the system was incorrectly configured to support a base 10 dial plan, and an overdecadic digit was received from the line and passed to analysis.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the parameter, *.OverdecadicDigitsEnabled, is set correctly in the XECfgParm.dat file on each host.
8-18
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Note
The setting of this parameter should reflect the dial plan restrictions for the protocol in use. If the configured protocol supports the use of overdecadic digits, the parameter should be set to true, and vice versa.
If the setting for the parameter is correct, proceed to Step 3. Otherwise, reboot your software using the procedure described in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Step 3
If the setting for the parameter is false, check the received digit string for presence of an overdecadic digit. If the digit string does not have an overdecadic digit, proceed to Step 5. If the digit string does have an overdecadic digit, proceed to Step 4. If the setting for the parameter is true, proceed to Step 5.
Step 4
Check the compliancy documentation for the configured protocol. If the documentation indicates that overdecadic digits are supported, change the setting for the *.OverdecadicDigitsEnabled XECfgParm.dat parameter to true on both hosts, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If the documentation indicates that overdecadic digits are not supported, proceed to Step 5.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: BLoopCtrExceeded
The alarm occurs when a B-number analysis operation has gone into an infinite loop. The purpose of the alarm is to limit the number of passes spent in the analysis tree to 30.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Validate that there are no infinite loops in the B-number dial plan, as described in the Verifying a Dial Plan Translation section on page 3-143. If there are infinite loops in your B-number dial plan, modify the settings in your B-number dial plan to remove the infinite loops, using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. If their are no infinite loops in your B-number dial plan, then proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-19
ANAL: BNum_GetFail_SrvcTbl
This alarm occurs during B-number analysis when a screening result is encountered and an attempt to read the service table to determine the name of the service performing the screening fails. This is due to corruption of either the result table or the service table.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that all of the configured announcement IDs are within the range 0 through 9999, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If any of the announcement IDs are outside of the range, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: BTableFail_GetDigTree
This alarm occurs when an invalid path for B-number analysis has been given or that the B-number analysis table is not loaded. The problem occurs when an invalid path has been specified for B-number analysis or the B-number analysis table is not loaded.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: BTableFail_GetDigMod
This alarm occurs when retrieval of a modification string failed during B-number analysis. The problem occurs if the modification table is not loaded or a pointer to a nonexistent location in the modification table is given.
8-20
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: BTableFail_GetResult
This alarm occurs when access to the result table failed during B-number analysis. The problem occurs if the result table is not loaded or a pointer to a nonexistent location in the result table is given.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: BTableFlt_DgtRangeError
This alarm occurs when the B-number analysis digit tree has been accessed with a digit that is out of range for the digit tree table. This alarm could occur if the system was incorrectly configured to support a base 10 dial plan, and an overdecadic digit was received from the line and passed to analysis.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the parameter, *.OverdecadicDigitsEnabled, is set correctly in the XECfgParm.dat file on each host.
Note
The setting of this parameter should reflect the dial plan restrictions for the protocol in use. If the configured protocol supports the use of overdecadic digits, the parameter should be set to true, and vice versa.
If the setting for the parameter is correct, proceed to Step 3. Otherwise, update the parameter settings in the XECfgParm.dat files using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Step 3
If the setting for the parameter is false, check the received digit string for presence of an overdecadic digit. If the digit string does not have an overdecadic digit, proceed to Step 5. If the digit string does have an overdecadic digit, proceed to Step 4. If the setting for the parameter is true, proceed to Step 5.
Step 4
Check the compliancy documentation for the configured protocol. If the documentation indicates that overdecadic digits are supported, change the setting for the *.OverdecadicDigitsEnabled XECfgParm.dat parameter to true on each host using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If the documentation indicates that overdecadic digits are not supported, proceed to Step 5.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-21
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: Cause_GetFail_CauseTbl
This alarm occurs during cause analysis when the cause table is unreadable. This can be due to the cause table being corrupted, a failure in the underlying software, or the cause table being built without all the existing call context cause values.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated cause table contains all of the existing call context cause values, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the cause table is incomplete, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL:Cause_GetFail_DigModTbl
This alarm occurs during cause analysis when a B-number modification result is encountered and the digit modification string is unreadable. This can be due to the digit modification table being corrupted or an incorrect digit modification index being stored in the B-number modification result's data.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated B-number digit modification table is correct, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the information in the B-number digit modification table is incorrect, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
8-22
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
ANAL: Cause_GetFail_InvldRsltType
This alarm occurs during cause analysis when a result is encountered that is not supported in cause analysis. This is due to corruption of the cause or location tables or the result table.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL:Cause_GetFail_LocTbl
This alarm occurs during cause analysis when the location table is unreadable. This can be due to the location table being corrupted, a failure in the underlying software, or the location table not being fully populated with all possible references from the cause table.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated location table contains all of the possible references from the cause table, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the location table does not contain all of the references, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL:Cause_GetFail_RsltTbl
This alarm occurs during cause analysis when the result table is unreadable. This can be due to the result table being corrupted, a failure in the underlying software, or the result table not being fully populated with all possible references from the cause and location tables.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the associated result table contains all of the possible references from the cause and location tables, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the result table does not contain all of the references, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-23
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL:Cause_InvldRslts_CauseTbl
This alarm occurs when cause analysis successfully reads the cause table but the value returned is logically invalid. Cause analysis gets two values from the cause table: an immediate result index and a location index. The immediate result index indicates that analysis should start reading results now, but the location index indicates that another table read is required to find the correct result table index. These results are logically incompatible. Most likely this results from a failure of the underlying software or a corruption of the cause table.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Cause_MdfyBFail_AnnounceID
This alarm occurs during cause analysis when an announcement result is encountered and analysis is unable to replace the last 4 digits of the B-number with the announcement ID. This is commonly caused by an out-of-range announcement ID (it should be 0 to 9999) or a B-number less than 4 digits long.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected announcement ID is within the range 0 through 9999, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the announcement ID is outside of the range, modify its value using the numan-ed MML command and proceed to Step 3. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Otherwise, proceed to Step 3.
Step 3
Verify that the affected B-number is at least 4 digits long, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the affected B-number is less than 4 digits long, modify its value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Otherwise, proceed to Step 4.
Step 4 Step 5
If you modified your dial plan, save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 5. Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
8-24
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
ANAL: Cause_MdfyBFail_AppPtInvld
This alarm occurs during cause analysis when a B-number modification result is encountered and the application point (where digits are inserted) specified is beyond the end of the digit string. This is caused by an incorrect application point being specified in the result data, a corrupt result table, or incorrectly constructed cause analysis values.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the specified application points in the result data is correct, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If any of the application points are incorrect, modify their value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Cause_Rte_LoopDetected
This alarm occurs during cause analysis when a route or announcement result is encountered. In these cases, the indicated route identifier is checked against a list of previously provided results. If a match is found, this alarm is raised and an error is returned to call processing. This is done to prevent calls from endlessly routing to a single route or series of routes infinitely due to cause analysis interactions.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the value of the CustGrpId property for the associated trunk group is correct by logging in to the active Cisco MGC, starting an MML session, and entering he following command:
prov-rtrv:trnkgrpprop:name="comp_name"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-25
Where comp_name is the MML name for the affected trunk group. For example, if you wanted to verify the properties for an trunk group called 1001, you would enter the following command:
prov-rtrv:trnkgrpprop:name="1001"
If your system has been properly configured for dial plan use, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-01 10:09:47 M RTRV "session=active:trnkgrpprop" /* . . . CustGrpId=2222 . . .
Step 3 Step 4
If you need to modify your settings, start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. If the CustGrpId property is missing from the affected trunk group, enter the following command:
Note
If you are modifying the CustGrpId value for an SS7 signaling service, you must set that SS7 signaling service to the out-of-service administrative state, as described in the Setting the Administrative State section on page 8-116. Once you have entered the CustGrpId value, you can return the SS7 signaling service to the in-service administrative state.
prov-ed:trnkgrp:name="comp_name", CustGrpId=number
Where:
Step 5
comp_nameMML name for the affected trunk group. numberCustomer group ID number that is associated with your dial plan.
Save and activate your provisioning session as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the alarm clears, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL:DataBaseAccessFail
This alarm occurs when certain functions in generic analysis has failed. Failure of any of the following general analysis functions causes this alarm to be triggered:
ReadANumDpSelection ()Alarm is found in the Analysis MDL log. CheckEPortedHandling(VAR BNumRecd : BNumberElem, B_DgtBuff : Dgtbuff, VAR ResultsFromBnoForUpdate : AnalyseBnoResults ): GeneralActionRsltsAlarm is found in the B_Analysis MDL log.
8-26
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
CheckERouteNumHandling(B_DgtBuff : Dgtbuff, VAR ResultsFromBnoForUpdate : AnalyseBnoResults ): GeneralActionRsltsAlarm is found in the B_Analysis MDL log. ANumberHandling()Alarm is found in either the B_Analysis or A_Analysis MDL log. BNumberHandling()Alarm is found in the MDL log as B-Analysis.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the parameter, engine.SysConnectDataAccess, is set to true in the XECfgParm.dat file on the active Cisco MGC. If the setting is correct, proceed to Step 4. Otherwise, update the value of the parameter for each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If correcting the setting does not clear the alarm, proceed to Step 4.
Step 3 Step 4
Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL:dpselection_table_fail
This alarm occurs when the correct dial plan selection could not be determined.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL:getDialplanBase_fail
This alarm occurs when the Cisco MGC could not load or generate the dial plan.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-27
ANAL: InvalidtrkGrpType
This alarm occurs when the analysis module has not provided a valid trunk group type. The problem occurs if the route analysis table specifies an invalid trunk group type.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Display the valid trunk group types using the prov-rtrv MML command as described in the Retrieving Provisioning Data section on page 3-72. Correct the invalid trunk group type in the route analysis table using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the alarm clears, the procedure is complete. Otherwise, proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: Prof_GetFail_DigModTbl
This alarm occurs during profile analysis when a B-number modification result is encountered and the digit modification string is unreadable. This can be due to the digit modification table being corrupted or an incorrect digit modification index being stored in the B-number modification result's data.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Prof_GetFail_InvldRslt
This alarm occurs during profile analysis when a result is encountered that is not supported in profile analysis. This is due to corruption of either the NOA or NPI tables or the result table.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Prof_GetFail_NOATbl
This alarm occurs during profile analysis when the NOA table is unreadable. This can be due to the NOA table being corrupted, a failure in the underlying software, or the NOA table being built without all the existing call context NOA values.
8-28
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the NOA table uses all of the existing call context NOA values using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the NOA table is missing any of the existing call context NOA values, add them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Prof_GetFail_NOATbl_A
This alarm occurs during profile analysis when the NOA table is unreadable. This can be due either to the NOA table being corrupted, or to a failure in the underlying software.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: Prof_GetFail_NPITbl
This alarm occurs during profile analysis when the NPI table is unreadable. This can be due to the NPI table being corrupted, a failure in the underlying software, or the NPI table not being fully populated with all the possible references from the NOA table.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-29
Step 2
Verify that the NPI table uses all of the possible references from the NOA table using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the NPI table is missing any of the references from the NOA table, add them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Prof_GetFail_NPITbl_A
This alarm occurs during profile analysis when the NPI table is unreadable. This can be due either to the NOA table being corrupted, or to a failure in the underlying software.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: Prof_GetFail_RsltTbl
This alarm occurs during profile analysis when the result table is unreadable. This can be due to the result table being corrupted, a failure in the underlying software, or the result table not being fully populated with all the possible references from the NOA or NPI tables.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the result table uses all of the possible references from the NOA and NPI tables using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the result table is missing any of the references from the NOA and NPI tables, add them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
8-30
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Prof_InvldNPAValue
This alarm occurs during profile analysis when a 7-digit B-number is encountered and the NPA property is set against the originating trunk group. An NPA string of more or less than 3 characters is invalid. This is most likely caused by data corruption.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the NPA values have been properly provisioned for the trunk group using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If the NPA values are incorrect, modify them using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 3.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Prof_InvRslts_NOATbl
This alarm occurs when profile analysis successfully reads the NOA table but the value returned is logically invalid. Profile analysis gets two values from the NOA table: an immediate result index and an NPI index. An immediate result index indicates that analysis should start reading results now but an NPI index indicates that another table read is required to find the correct result table index. These results are logically incompatible. Most likely this results from a failure of the underlying software or a corruption of the NOA table.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: Prof_InvRslts_NOATbl_A
This alarm occurs when profile analysis successfully reads the NOA table but the value returned is logically invalid. Profile analysis gets two values from the NOA table, an immediate result index and an NPI index. The immediate result index indicates that analysis should start reading results now but the NPI index indicates that another table read is required to find the correct result table index. These results are logically incompatible. Most likely, this alarm results from a failure of the underlying software or a corruption of the NOA table.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-31
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: Prof_MdfyBFail_AppPtInvld
This alarm occurs during profile analysis when a B-number modification result is encountered and the specified application point (where digits are inserted) is beyond the end of the digit string. This is caused by an incorrect application point being specified in the result data, a corrupt result table, or incorrectly constructed Profile analysis values.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the specified application points in the result data is correct, using the numan-rtrv MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. If any of the application points are incorrect, modify their value using the numan-ed MML command. Refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide for more information. Save and activate your dial plan changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Otherwise, proceed to Step 2.
Step 3
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: RteStartIndexInvalid
This alarm occurs when the start index for the route analysis table is invalid.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.
8-32
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 2
Verify that the data for the provisioned route lists is correct by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:rtlist:all
Step 3
If their is incorrect data for the route lists, correct it by using the prov-ed MML command. Otherwise, proceed to Step 4. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on provisioning route lists. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Step 4
ANAL: Rte_TableHopCtrExceeded
This alarm occurs when generic analysis fails due to excessive number of routing table changes.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Test for a loop in the routing configuration using the following steps:
a. b.
Export the routing configuration to a file, as described in the Exporting Provisioning Data section on page 3-79. Import the routing configuration file created in Step 2a, as described in the Importing Provisioning Data section on page 3-79. If the import fails, proceed to Step 3. Otherwise, proceed to Step 4.
Step 3 Step 4
Perform a call trace, as described in the Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: RteTableFail_GetRteList
This alarm occurs when access to the route list failed. The problem occurs if the index to the route list is not valid or if the route list is not loaded.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-33
ANAL: RteTableFail_GetTrkAttrdata
This alarm occurs when access to the trunk group attribute data table failed. The problem occurs if the index to the trunk group attribute data table is not valid or if the table is not loaded.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: RteTableFail_GetTrkGrpdata
This alarm occurs when access to the trunk group data failed. The problem occurs if the index to the trunk group data is not valid or if the trunk group data table is not loaded.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: RteTableFail_GetTrunkList
This alarm occurs when access to the trunk group list failed. The problem occurs if the index to the trunk group list is not valid or if the trunk group list is not loaded.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
ANAL: TableFail_BearerCapTable
This alarm occurs when the bearer capability table could not be read during generic analysis.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-34
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
ANAL: TableFail_CondRouteDescTable
This alarm occurs when the conditional route description table could not be read during generic analysis.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: TableFail_CondRouteTable
This alarm occurs when the conditional routing table could not be read during generic analysis.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112. If that procedure resolves the problem, the procedure is finished. Otherwise, proceed to Step 2.
Step 3 Step 4
Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: TableFail_CPCTable
This alarm occurs when the calling party category (CPC) table could not be read during generic analysis.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-35
Step 2 Step 3
Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: TableFail_RouteHolTable
This alarm occurs when route holiday table could not be read during generic analysis.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: TableFail_PercRouteTable
This alarm occurs when the percentage route holiday table could not be read during generic analysis.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: TableFail_TMRTable
This alarm occurs when the transmission medium requirements (TMR) table could not be read during generic analysis.
Note
8-36
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: TableFail_TNSTable
This alarm occurs when the transit network selection (TNS) table could not be read during generic analysis.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ANAL: TrunkGrpRsltCtrExceeded
This alarm occurs when the analysis module has provided the maximum number of candidate trunk groups allowed. The maximum number is 20. The purpose of the alarm is to limit the time spent searching for candidate trunk groups.
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
Association Degraded
This alarm occurs when one of the destination addresses for an SCTP association has failed, but the association is still in-service (IS).
Note
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-37
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving an Association Alarm section on page 8-113.
Association Fail
This alarm occurs when an SCTP association has failed due to an IP connectivity failure or an out-of-service (OOS) destination.
Note
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving an Association Alarm section on page 8-113.
Corrective Action
To correct the problem identified by this alarm, use the diagnostics on the affected Cisco SLT to determine why the link has lost alignment, as described in the Verifying the Link Alignment Status section on page B-6.
C7DPC CONGESTION
This alarm occurs when a link in a signaling route towards a given DPC becomes congested or when a DPC is congested and has sent a congestion indication to the Cisco MGC.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the status of the links associated with the affected DPC, as described in the Retrieving Service State of C7/SS7 Links or Linksets section on page 3-50. If none of the links are out-of-service, this alarm has occurred because the DPC is congested. In this instance, corrective action is not necessary, and you must wait for the congestion condition to clear. If any of the links are out-of-service, proceed to Step 2.
Step 3
Return the out-of-service links to service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96. If that does not resolve the problem, proceed to Step 3.
8-38
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
C7LNK CONGESTION
This alarm occurs when an SS7 MTP2 link becomes congested and it cannot receive any more messages.
Corrective Action
If this alarm occurs repeatedly, perform the following steps to correct the problem:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Reduce the amount of traffic from the far-end associated with the affected link. If that clears the alarm, the procedure is complete. Otherwise, proceed to Step 2.
Step 3
Add additional links to the linkset associated with the affected link. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information about adding links. If that does not resolve the problem, proceed to Step 3.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
C7LNK INHIBIT
This alarm occurs when a C7 link has been inhibited for maintenance.
Corrective Action
To correct the problem identified by this alarm, uninhibit the specified C7 link, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96, when the maintenance is complete.
C7SLTLnkCong
This alarm occurs when an SS7 link on a 4-link Cisco SLT is congested.
Corrective Action
If this alarm occurs repeatedly, perform the following steps to correct the problem:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Reroute the SS7 traffic to other links to reduce the congestion. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information about adding links. If that does not resolve the problem, proceed to Step 3.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-39
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, check for the presence of the Charge Table Load Failure alarm, using the procedure in Retrieving All Active Alarms section on page 8-3. If this alarm is present, perform the corrective action for that alarm. Otherwise, the procedure is complete.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify whether a charge table is present on your system by logging in to your active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:charge:all
The system responds with a list of elements in the charge table, or with an error indicating that a charge table does not exist. If a charge table is not present, provision a charge table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide. If a charge table is present, verify that the information returned is correct. If the information is correct, proceed to Step 3. Otherwise, correct the contents of the charge table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Shutdown the Cisco MGC software on the standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4.
8-40
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 3 Step 4
Restart the Cisco MGC software on the standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover operation, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Shutdown the Cisco MGC software on the newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover operation, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Config Fail
This alarm occurs when the configuration has failed.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate errors in the content of your provisioning data. If there are no logs that indicate errors in the content of your provisioning data, proceed to Step 3. If there are logs that indicate errors in the content of your provisioning data, start a dynamic reconfiguration session to change the settings for the component(s) identified in the log message(s), as described in the Invoking Dynamic Reconfiguration section on page 3-70. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-41
Corrective Action
To correct the problem identified by this alarm, verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112.
DISK
This alarm occurs when the system disk is running out of space.
Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. To upgrade the version of EISUP locally, you must either upgrade the Cisco MGC software to same release as the other Cisco PGW 2200, or to the release supported by your current version of the Cisco HSI software. The steps required to upgrade your Cisco MGC software are found in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. If upgrading the Cisco MGC software clears the alarm, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-42
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file for log messages indicating which component is raising this alarm, using the procedure described in the Viewing System Logs section on page 8-4. If there are logs that indicate a failed component, proceed to Step 2. If there are no logs that indicate a failed component, proceed to Step 3.
Step 3
Begin a dynamic reconfiguration session to reprovision the failed component, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 3.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
FAIL
This alarm occurs when the component referenced in the alarm has failed. The failure may be service affecting, in which case other alarms are raised.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. If the component identified in the alarm text is in the system software, contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx. If the component identified in the alarm text is a piece of system hardware, proceed to Step 3.
Shut down the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Step 6 Step 7
Shut down the Cisco MGC software on your newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-43
If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 8.
Step 8
Replace the component identified in the alarm text. Procedures for replacing Cisco MGC host hardware can be found in the associated Sun Microsystems documentation. Procedures for replacing Cisco SLT hardware can be found in Replacing a Cisco SLT section on page 6-6. Procedures for replacing Cisco switch can be found in the documentation for your switch. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Step 9
FailoverPeerLost
This alarm occurs when the failover daemon on the standby Cisco MGC is not reachable.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces between the active and standby Cisco MGCs and the Cisco switches are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the Cisco switches can be found in the documentation for your switch.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 3.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the Cisco switch can be found in the documentation for your switch.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
FailoverPeerOOS
This alarm occurs when the failover daemon goes out-of-service in the standby Cisco MGC.
Corrective Action
To correct the problem identified by this alarm, check the alarms on the standby Cisco MGC, using the procedure in the Retrieving All Active Alarms section on page 8-3, and resolve those alarms.
8-44
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the standby Cisco MGC is in the standby platform state, using the procedure defined in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. If the standby Cisco MGC is in the standby platform state, proceed to Step 3. Otherwise, proceed to Step 4.
Synchronize the standby Cisco MGC with the active Cisco MGC by entering the prov-sync MML command. Shut down the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Once the Cisco MGC software has restarted on the standby Cisco MGC, collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the standby Cisco MGC is in the standby platform state, using the procedure defined in the Verifying the Platform State of the Cisco MGC Hosts section on page 3-2. If the standby Cisco MGC is in the standby platform state, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-45
Gen Fail
This alarm occurs when a failure has occurred due to resource exhaustion or configuration problems, including:
Memory exhaustion. Queue overflow. Message congestion. IPC file cannot be opened. A timer has expired.
Log messages in the active system log file indicate the nature of the failure. For the majority of the failures, this alarm is informational and no user action is required. When this alarm is generated because an IPC file cannot be opened, you must take corrective action.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate that an IPC file cannot be opened. If there are no logs that indicate that an IPC file cannot be opened, no further action is required. If there are logs that indicate that an IPC file cannot be opened, proceed to Step 3.
Shut down the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Step 6 Step 7
Shut down the Cisco MGC software on your newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 8.
Step 8
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-46
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, check for the presence of the Holiday Table Load Failure alarm, using the procedure in Retrieving All Active Alarms section on page 8-3. If this alarm is present, perform the corrective action for that alarm. Otherwise, the procedure is complete.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify whether a holiday table is present on your system by logging in to your active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:holiday:all
The system responds with a list of elements in the holiday table, or with an error indicating that a holiday table does not exist. If a holiday table is not present, provision a holiday table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide. If a holiday table is present, verify that the information returned is correct. If the information is correct, proceed to Step 2. Otherwise, correct the contents of the holiday table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
INVALID M3UA RC
This alarm occurs when an M3UA message is received from the identified Cisco ITP with a routing context that has not been provisioned on the MGC.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-47
Retrieve the settings for the affected M3UA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. Identify the AS defined on the Cisco ITP that is not provisioned as a routing context on the MGC. Open a dynamic reconfiguration session to add the routing context to the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
INVALID SUA RC
This alarm occurs when there is a mismatch between SUA routing keys defined on the MGC and the Signaling Gateway.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected SUA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. Identify the AS defined on the Cisco ITP that is not provisioned as a routing context on the MGC. Open a dynamic reconfiguration session to add the routing context to the SUA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 5.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Invalid Virtual_IP_Addr
This alarm occurs when the configured virtual IP address is not part of the networks associated with the IP addresses set for the IP_Addr1 or IP_Addr2 parameters in the XECfgParm.dat file.
Note
8-48
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the IP address defined for the XECfgParm.dat parameter, *.Virtual_IP_Addr, is set correctly in the XECfgParm.dat file on each host.
Note
The IP address defined for this parameter should be a part of the networks associated with the IP addresses defined for the XECfgParm.dat parameters IP_Addr1 or IP_Addr2.
If the setting for the parameter is correct, proceed to Step 3. Otherwise, reboot your software using the procedure described in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
IP CONNECTION FAILED
This alarm occurs when the Cisco MGC loses network (IP) connectivity to a Cisco SLT. This alarm is generated for each SS7 link associated with the affected Cisco SLT.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected Cisco SLT is up and running by performing the procedures in the Checking Equipment Status section on page 6-2. If the affected Cisco SLT is not up and running, start it using the procedure in the Cisco SS7 Interface Startup Procedure section on page 2-3. If this does not resolve the problem, replace the affected Cisco SLT as described in the Replacing a Cisco SLT section on page 6-6. If the affected Cisco SLT is up and running, proceed to Step 3.
Step 3
Verify that the Ethernet interfaces between the Cisco MGC and the affected Cisco SLT are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the Cisco SLT can be found in the Checking Equipment Status section on page 6-2.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-49
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing components on the Cisco SLT can be found in the Replacing Hardware Components section on page 6-13.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
IP RTE FAIL
This alarm occurs when an IP route is in the OOS state with a cause other than off-duty or commanded out-of-service.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the IP addresses of the local interfaces on the standby Cisco MGC using the following UNIX command:
ifconfig -a
The system returns a response indicating the IP addresses of your local interfaces.
Step 3
Verify that the IP addresses obtained in Step 2 match the values set for the IP_Addr1 through IP_Addr4 parameters in the XECfgParm.dat file. If the settings for the local IP addresses are not the same, proceed to Step 4. If the settings for the local IP addresses are the same, proceed to Step 12.
Step 4
Log in to your active Cisco MGC and change directories to the /opt/CiscoMGC/etc directory using the following UNIX command:
cd /opt/CiscoMGC/etc
Open the XECfgParm.dat file in a text editor, such as vi. Search for the IP_Addr properties and change those that are not configured correctly. Save the file and exit the text editor.
8-50
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 8
Shut down the Cisco MGC software on your standby Cisco MGC by entering the following UNIX command:
/etc/init.d/CiscoMGC stop
Note
Shutting down the Cisco MGC software on the active Cisco MGC causes the currently standby Cisco MGC to become the active Cisco MGC.
Step 9
Restart the Cisco MGC software on this Cisco MGC by entering the following command:
/etc/init.d/CiscoMGC start
Step 10
Once the Cisco MGC software is fully activated, log in to the active Cisco MGC and perform a manual switchover, using the following MML command:
mml>sw-over::confirm
Step 11
Repeat steps 2 through 9 on the newly standby Cisco MGC. If the problem has not been resolved after you have completed those steps, proceed to Step 12.
Step 12
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, run a manual COT test, as described in the Running a Manual Continuity Test section on page 8-142.
LIF BER
This alarm occurs when an excessive bit error ratio is detected from a frame alignment signal. This might be caused by any source of electrical noise; for example, degraded transmission line, degraded line connectors, high-voltage electrical source located in proximity of line.
Corrective Action
To correct the problem identified by this alarm, isolate the source by testing the connections and transmission line for the identified component. When you have identified the source, resolve as necessary.
LIF FAIL
This alarm occurs when a local Ethernet interface has failed.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-51
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Note
If the Association Degraded or Association Failed alarms occur along with this alarm, follow the procedure defined in the Resolving an Association Alarm section on page 8-113.
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Use the Log viewer in the MGC Viewer toolkit to search the system log file from the same time period as this alarm for a GEN_ERR_IPINTF_FAIL log message.
Note
For more information on using the Log viewer, refer to the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
Identify the cause of the failure from the information in the log message. If the cause in the log message is Admin Down, the interface was taken down using an administrative command. Proceed to Step 4. If the cause in the log message is Link Down, the Ethernet path has failed. Proceed to Step 5.
Step 4
Where interface is the IP address of the affected interface. If the interface is restored and is working fine, the procedure is complete. Otherwise, proceed to Step 7.
Step 5
Verify that the cable connected between the interface and the associated Ethernet switch is working properly. If the cable is working correctly, proceed to Step 6. If the cable is not working correctly, replace it. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Verify that the associated Ethernet switch is working properly. If the Ethernet switch is working correctly, proceed to Step 7. If the Ethernet switch is not working correctly, trouble shoot the problem as indicated in the documentation for your switch. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
LIF LOF
This alarm occurs when a loss of T1/E1 framing has been detected on the LIF. The physical line has a signal but has lost the framing pattern.
8-52
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the framing format used on the port matches the framing format used on the line. If the framing formats are different, change the framing format on the port to the other framing format. Otherwise, proceed to Step 3. If the alarm does not clear, proceed to Step 3.
Step 3 Step 4
Change the line build-out setting. If the alarm does not clear, proceed to Step 4. Open the statistics report for the port and look for evidence of a bad line. Bursts of Latvia could indicate a timing problem. If you find evidence of a bad line, perform loopback tests on the line to isolate the problem. Otherwise, proceed to Step 5. Once you have isolated the problem, resolve as necessary. If the alarm does not clear, proceed to Step 5.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
LIF LOS
This alarm occurs when the transmitted signal is lost in the T1/E1. The receiving end does not receive the signal. The physical line might have a break in it.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the cable connections are correct between the interface port and your service providers equipment or T1/E1 terminal equipment. If the cable was built on-site, check the cable connectors. A reversal of transmit and receive pairs or an open receive pair can cause this condition. If the cable connections appear correct, then proceed to Step 3.
Step 3
Check your T1/E1 equipment, or ask your service provider to test your T1/E1 line and correct any errors found. If the alarm does not clear, then proceed to Step 3.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
LIF SES
This alarm occurs when the LIF is automatically set to the out-of-service state because of severely errored seconds. The TDM line has a large amount of noise, causing an error rate greater than 10-3. Framing and signal are within tolerance. This indicates a degraded but functioning line.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-53
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the terminations and cabling for the LIF are working. If you can identify the source of the problem, resolve as necessary. Otherwise, proceed to Step 3. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
LIF YELLOW
This alarm occurs when the receiving end is reporting a loss of the transmitted signal. This is reported for T1/E1 facilities only.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Connect an external loopback cable to the affected port. If no alarms are produced, proceed to Step 3. If alarms are produced, the port is causing the error. Replace the hardware component associated with the port. Refer to the associated media gateway documentation for more information on replacing the component.
Step 3
Check for an open, short, or wiring error in the cable between the network interface port and your service providers network interface unit T1/E1 terminal equipment. An open transmit pair can cause this condition. If you find a wiring problem, replace the cable. If that does not clear the alarm, proceed to Step 4. If you do not find a wiring problem, then proceed to Step 4.
Step 4
If your port is configured to use D4 framing, the port may intermittently detect yellow alarms because the packet data may contain the pattern that is used to signal yellow alarm in D4 framing. If it is possible, switch to ESF framing in both the terminal equipment and the line equipment. If that does not clear the alarm, proceed to Step 5.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-54
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the V.35 cables between the port and the far-end are working correctly. If you find a problem with a V.35 cable, replace the cable. If that does not correct the problem, proceed to Step 3. If you do not find a problem with the V.35 cables, proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
LIF: LOST CD
This alarm occurs when the physical line has failed because its cable is broken or not plugged in. This is reported for V.35 facilities only.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the V.35 cables between the port and the far-end are working correctly. If you find a problem with a V.35 cable, replace the cable. If that does not correct the problem, proceed to Step 3. If you do not find a problem with the V.35 cables, proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the V.35 cables between the port and the far-end are working correctly. If you find a problem with a V.35 cable, replace the cable. If that does not correct the problem, proceed to Step 3. If you do not find a problem with the V.35 cables, proceed to Step 3.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-55
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4 Step 5
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected M3UA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. The AS definitions should match the routing contexts of the M3UA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.
8-56
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your standby Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.
Corrective Action
To correct the problem identified by this alarm, delete any unnecessary files from your Cisco MGC, as described in the Deleting Unnecessary Files to Increase Available Disk Space section on page 8-158.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the affected media gateway is in the in-service state, as described in the Verifying the Status of all Signaling Services section on page 3-8. If the affected media gateway is in-service, proceed to Step 3. Otherwise, proceed to Step 4.
Step 3
Verify that the configuration of the affected media gateway is correct. Refer to the documentation for the media gateway for more information. If that does not resolve the problem, proceed to Step 4.
Step 4
Verify that the Ethernet interfaces between the Cisco MGC and the associated media gateway are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of an Ethernet interface on the media gateway can be found in its associated documentation.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 5.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-57
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing an Ethernet interface card on the media gateway can be found in its associated documentation.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
NAS: CommsFailure
This alarm occurs when the Cisco MGC cannot communicate with the identified media gateway.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine whether the affected media gateway is up and running. Refer to the documentation for the media gateway for more information. If the affected media gateway is not up and running, restore it to service. Refer to the documentation for the media gateway for more information. If the affected media gateway is up and running, proceed to Step 3.
Step 3
Verify that the IP configuration parameters for the Cisco MGC and the affected media gateway are correct.
Note
Use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72, to retrieve the IP configuration information for the Cisco MGC. Refer to the documentation for the media gateway for information on retrieving the IP configuration data.
If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of the affected media gateway is incorrect, modify the provisioning data for your system. Refer to the documentation for the media gateway for more information. If the configuration of both the Cisco MGC and the affected media gateway are correct, then proceed to Step 3.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
NAS: ResourceFailure
This alarm occurs when a continuity test (COT) has not been acknowledged by the indicated media gateway.
8-58
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, run a manual COT on the indicated media gateway, as described in the Running a Manual Continuity Test, page 8-142.
OLC: Leg1chanSeizedUnpackError
This alarm occurs when an Seized Channel (CRCX) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
OLC: Leg1chanModifiedUnpackError
This alarm occurs when an Modify Channel (MDCX) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
OLC: Leg1chanDeletedUnpackError
This alarm occurs when a Delete Channel (DLCX) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-59
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
OLC: Leg1notifyUnpackError
This alarm occurs when a Notify (NTFY) message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
OLC: Leg1deleteChanUnpackError
This alarm occurs when a Delete Channel (DLCX) message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
OLC: Leg1notifyRequestAckUnpackError
This alarm occurs when an Request Notify (RQNT) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148.
8-60
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
OLC: Leg1chanOpsFailed
This alarm occurs when the Cisco MGC has detected an internal error or a media gateway related problem.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Other alarms associated with the affected component should also be displayed. Resolve those alarms first. If resolving those alarms does not clear this alarm, proceed to Step 3.
Step 3
Verify that the traffic channel provisioning settings for the Cisco MGC and the affected media gateway are correct.
Note
Use the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72, to retrieve the traffic channel provisioning data for the Cisco MGC. Refer to the documentation for the media gateway for information on retrieving the traffic channel data.
If the configuration of your Cisco MGC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration of the affected media gateway is incorrect, modify the provisioning data for your system. Refer to the documentation for the media gateway for more information. If the configuration of both the Cisco MGC and the affected media gateway are correct, then proceed to Step 4.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-61
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
OverloadHeavy
This alarm occurs when the system has reached the threshold for overload level 3. The system performs an automatic switchover operation. If the call rejection percentage setting for overload level 3 is unchanged from its default value, all new calls are rejected until the abate threshold for overload level 3 is reached. This alarm is automatically cleared at that time. For more information, refer to the Managing Automatic Congestion Control section on page 3-80.
Corrective Action
If this alarm is caused by a rare spike in traffic, corrective action is not necessary. If this alarm occurs regularly, you should ensure that your links and routes are properly configured for load sharing, as described in the SS7 Load Sharing Malfunction section on page 8-88, and re-route some of your traffic to other Cisco MGCs.
Note
This alarm can occur when a provisioning session is active during peak busy hours. If this should happen, the alarm can be cleared by stopping the provisioning session. For more information on the MML commands to manage a provisioning session, refer to the Provisioning your Cisco MGC section on page 3-68.
OverloadMedium
This alarm occurs when the system has reached the threshold for overload level 2. A percentage of new calls, based on the call rejection percentage setting for overload level 2, are rejected until the abate threshold for overload level 2 is reached. This alarm is automatically cleared at that time. For more information, refer to the Managing Automatic Congestion Control section on page 3-80.
Corrective Action
If this alarm is caused by a rare spike in traffic, corrective action is not necessary. If this alarm occurs regularly, you should ensure that your links and routes are properly configured for load sharing, as described in the SS7 Load Sharing Malfunction section on page 8-88, and re-route some of your traffic to other Cisco MGCs.
Note
This alarm can occur when a provisioning session is active during peak busy hours. If this should happen, the alarm can be cleared by stopping the provisioning session. For more information on the MML commands to manage a provisioning session, refer to the Provisioning your Cisco MGC section on page 3-68.
8-62
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
OverloadLight
This alarm occurs when the system has reached the threshold for overload level 1. A percentage of new calls, based on the call rejection percentage setting for overload level 1, are rejected until the abate threshold for overload level 1 is reached. This alarm is automatically cleared at that time. For more information, refer to the Managing Automatic Congestion Control section on page 3-80.
Corrective Action
If this alarm is caused by a rare spike in traffic, corrective action is not necessary. If this alarm occurs regularly, you should ensure that your links and routes are properly configured for load sharing, as described in the SS7 Load Sharing Malfunction section on page 8-88, and re-route some of your traffic to other Cisco MGCs.
Note
This alarm can occur when a provisioning session is active during peak busy hours. If this should happen, the alarm can be cleared by stopping the provisioning session. For more information on the MML commands to manage a provisioning session, refer to the Provisioning your Cisco MGC section on page 3-68.
OverResIncomingThreshold
This alarm occurs when the percentage of idle CICs in a trunk group is less than or equal to the configured threshold.
Note
Corrective Action
This alarm may occur occasionally during periods of congestion. However, if this alarm occurs repeatedly, you may need to adjust the value of the parameter that controls the percentage of idle CICs for the affected trunk group. To do this, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current settings for the affected trunk group using the following MML command:
prov-rtrv:rttrnkgrp:name=trnkgrp_name
Where trnkgrp_name is the name of the affected trunk group. The system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2002-09-20 15:38:02.892 EST M RTRV "session=NOA_SPAIN:rttrnkgrp" /* name type reattempts queuing cutThrough resIncomingPerc ---------- ---- ---------- ------- ---------- ---------111 1 2 120 2 0 */
The parameter, ResIncomingPerc, controls the percentage of idle CICs for the trunk group. In the above example the value is 0.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-63
Step 3 Step 4
Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Use the prov-ed MML command to modify the setting of the resIncomingPerc parameter. For example, to change the percentage of idle CICs to 30 percent in a trunk group called 1000, you would enter the following command:
prov-ed:rttrnkgrp:name=1000, resIncomingPerc=30
Note
The new value for resIncomingPerc takes effect after your provisioning session is activated. Once the new value is activated, the OverResIncomingThreshold alarm is set or cleared after an outgoing call routed is over the affected trunk group.
Step 5
Save and activate your provisioning session, as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the alarm clears, the procedure is complete. Otherwse, proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
PC UNAVAIL
This alarm occurs when a destination point code (DPC) is unavailable. This can be due to a network failure causing the DPC to become isolated, a local failure equipment failure causing a loss of connectivity, or a local provisioning failure causing the DPC or routes to it to be configured improperly.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Other alarms associated indicating problems with hardware, the SS7 links, or the network should also be displayed. Resolve those alarms first. If resolving those alarms does not clear this alarm, proceed to Step 3.
Step 3
Ensure that the provisioning settings for the DPC and for all routes to the DPC and adjacent STPs match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the DPC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data associated with the DPC is correct, then proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-64
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces for the active and standby Cisco MGCs are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 3.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving a Failed Connection to a Peer section on page 8-172.
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving a Failed Connection to a Peer section on page 8-172.
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Resolving a Failed Connection to a Peer section on page 8-172.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-65
Corrective Action
To correct the problem identified by this alarm, enter some provisioning MML commands, or stop the provisioning session as described in the Saving and Activating your Provisioning Changes section on page 3-69. For more information about provisioning your Cisco MGC, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Corrective Action
If you want to restart your provisioning session, perform the steps listed in the Starting a Provisioning Session section on page 3-68, using the same source version set equal to the destination version name.
POM: DynamicReconfiguration
This alarm occurs when a dynamic reconfiguration procedure is started. It is cleared once the dynamic reconfiguration is successfully completed. Refer to the Invoking Dynamic Reconfiguration section on page 3-70 for more information.
Corrective Action
If necessary, you can clear the alarm, as described in the Clearing Alarms section on page 8-4, or you can complete the dynamic reconfiguration procedure, as described in the Invoking Dynamic Reconfiguration section on page 3-70.
POM: PEER_SYNC_ERR
This alarm occurs when the standby Cisco MGC attempts to synchronize the contents of its configuration library while a provisioning session is in progress on the active Cisco MGC.
Corrective Action
To correct the problem identified by this alarm, either stop the provisioning session as described in the Ending a Provisioning Session Without Activating your Changes section on page 3-70, or save and activate your changes as described in the Saving and Activating your Provisioning Changes section on page 3-69.
8-66
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
If necessary, you can clear the alarm, as described in the Clearing Alarms section on page 8-4, or you can save and activate your provisioning session, as described in the Saving and Activating your Provisioning Changes section on page 3-69.
ProcM No Response
The process manager is not responding to state information changes from the failover daemon.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Stop the Cisco MGC software on the standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Step 5 Step 6
Stop the Cisco MGC software on the newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If this does not resolve the problem, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
ProtocolFileMissing
This alarm occurs when the protocol file(s) associated with your system configuration have not been installed.
Note
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-67
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate that a *.mdo or *.so file cannot be found. If there are logs that indicate that a *.mdo or *.so file cannot be found, proceed to Step 3. If there are no logs that indicate that an IPC file cannot be opened, proceed to Step 5.
Step 3 Step 4
Determine which protocol patch contains the missing file. To do this, consult the Release Notes for your particular release of the Cisco MGC software. Once you have determined the protocol patch that contains your missing file(s), go to the following URL to down load this patch for your version of the Cisco MGC software: http://www.cisco.com/kobayashi/sw-center/sw-voice.shmtl
Step 5 Step 6
Install the patch as instructed in its associated text file. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the Ethernet interfaces for the Cisco MGC are working properly.
Note
Information on verifying the proper operation of an Ethernet interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.
If an element of the Ethernet connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 3.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system.
Step 3
Verify the replicator configuration on the Cisco MGCs, as described in the Restoring a Backup File from a Device section on page 8-169. If that does not resolve the alarm, proceed to Step 4.
8-68
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the provisioning settings for the DPC and for all routes to the DPC match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the DPC is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data associated with the DPC is correct, then proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
SC CONFIG FAIL
This alarm occurs when the provisioning parameters for the data link layer of a signaling channel are inconsistent or invalid. The signaling channel may already be provisioned. The configuration file might be corrupted and cannot be read by the system.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3 Step 4
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Place the affected signaling channel in the out-of-service state. Start a provisioning session, as described in the Starting a Provisioning Session section on page 3-68. Remove the affected signaling channel from your configuration using the prov-dlt MML command. Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for more information. Referring to your local provisioning parameters, re-provision the signaling channel using the prov-add MML command. Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for more information. Save and activate your provisioning session, as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Step 5
Step 6
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-69
Step 7
Place the signaling channel in the in-service state. If that does not resolve the problem, proceed to Step 8.
Step 8
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
SC FAIL
This alarm occurs when the signaling channel is down and unable to process traffic. As a result, the signaling channel is failing to negotiate a D-channel session, automatic restarts are not able to recover the session, and the data link-layer has failed. This can occur when SS7 SLTM/SLTA fails or when a PRI D-channel fails.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the near-end and far-end data link terminations are operating. If the near-end or far-end data link terminations are not operating, fix as necessary. If the near-end and far-end data link terminations are operating, proceed to Step 3.
Step 3
Ensure that the provisioning settings for the signaling channel match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data for the signaling channel is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data for the signaling channel is correct, then proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
SC M-OOS
This alarm occurs when a signaling channel has been manually taken out of service.
Corrective Action
To correct the problem identified by this alarm, restore the affected signaling channel to the in-service state, using the appropriate procedure. Procedure for modifying the state of signaling channels are described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96, the Setting the Service State of an IP Link section on page 8-97, and the Setting the Service State of a D-channel section on page 8-98.
8-70
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, check the configuration of the SG node and, if necessary, configure it to connect to the Cisco MGC. Refer to the Tekelec documentation for more information.
Corrective Action
To correct the problem identified by this alarm, check the configuration of the affected SG and, if necessary, configure it to connect to the peer SG. Refer to the Tekelec documentation for more information.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current DNS properties by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:dnsparam:all
Begin a dynamic reconfiguration session to increase the value of the *.DnsCacheSize parameter, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this alarm occurs repeatedly despite increasing the size of the cache, then proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-71
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current DNS properties by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:dnsparam:all
Begin a dynamic reconfiguration session to select new DNS servers for your system, entering their IP addresses in the *.DnsServer1 and *.DnsServer2 parameters, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If this alarm occurs repeatedly despite selecting new DNS servers, then proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
SIP: OOS
This alarm occurs when an IP link used by the SIP is out of service.
Corrective Action
To correct the problem identified by this alarm, attempt to restore the IP link to service using the procedure described in the Setting the Service State of an IP Link section on page 8-97.
8-72
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine whether the failure is caused by a physical failure or an administrative shutdown. If the failure is caused by a physical failure, proceed to Step 2. If the failure is caused by an administrative shutdown, check for this alarm again once the interface has been restored. If this alarm is still active, proceed to Step 3.
Step 3
Verify that the switch interfaces between the Cisco MGC and the affected SIP element are working properly.
Note
Information on verifying the proper operation of a switch interface on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on verifying the proper functioning of a switch interface on other devices can be found in the user documentation that came with that device.
If an element of the switch connection (such as a cable or an Ethernet interface card) is not working properly, replace it. Otherwise, proceed to Step 4.
Note
Information on removing and replacing an Ethernet interface card on the Cisco MGC host can be found in the Sun Microsystems documentation that came with your system. Information on removing and replacing components on other devices can be found in the user documentation that came with that device.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-73
Corrective Action
Corrective action is only required when the alarm does not clear automatically. If this alarm does not clear automatically, verify that the pom.dataSync parameter in the XECfgParm.dat is set to true on each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the provisioning settings for the bearer channels associated with this SG are correct, using the procedure described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the bearer channels is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this clears the alarm, the procedure is complete. Otherwise, proceed to Step 3. If the configuration data associated with the bearer channels is correct, then proceed to Step 3.
Step 3 Step 4
Determine the maximum number of dynamic routing keys that are allowed on the associated SG. Refer to the Tekelec documentation for more information. Determine how many routing keys are being used by the Cisco MGC by adding the number of CICs associated with the SS7 signaling service(s) (ss7sgpath) and the number of SS7 subsystems (ss7sgsubsys) for the affected SG. For example, if 990 CICs and 10 SS7 subsystems were associated with the SG, then 1000 routing keys would be in use by the Cisco MGC.
Step 5 Step 6
Compare the maximum number of routing keys allowed to the number of routing keys being used. If the number of routing keys being used is greater, proceed to Step 6. Otherwise, proceed to Step 7. Begin a dynamic reconfiguration session to delete the excess routing keys by removing either CICs or SS7 subsystems from your configuration, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If this clears the alarm, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-74
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Retrieve the current DNS properties by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:SS7SGPath:name=sig_srv
Where sig_srv is the MML name of the identified SS7 signaling service. The system returns a response that lists all of the properties associated with the selected SS7 signaling service.
Step 3
Verify that the information displayed for the SS7 signaling service is correct. If it is correct, proceed to Step 5. Otherwise, proceed to Step 4.
Step 4
Begin a dynamic reconfiguration session to correct the settings for the SS7 signaling service, using the procedure described in the Invoking Dynamic Reconfiguration section on page 3-70. If this clears the alarm, the procedure is complete. Otherwise, proceed to Step 5.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform the MML command rtrv-dest on the SS7PATH or SS7SUBSYS object. If the state is OOS,FLD, the signaling service is out of service due to failure of the MTP3 transport. Perform a prov-rtrv:SS7PATH or a prov-rtrv:SS7SUBSYS on the signaling service object.
a.
If the object has an OPC attribute defined, the signaling service is using SLTs for SS7 communication. The MTP3 layer is on the MGC. The SS7ROUTEs and LINKSETs need to be examined to determine the cause of the failure. If the object doesn't have an OPC attribute defined, the signaling service is using ITPs for SS7 communication. The MTP3 layer is one the ITPs. Examine the M3UAROUTEs that have the same OPC and DPC as SS7PATH or the SUAROUTEs that have the same OPC, APC, and REMOTE SSN to determine which ITP EXTNODEs are being uses by the signaling service. Consult the ITP documentation and debug the problem on the ITPs.
b.
If the state is OOS,FLD&UPU, the signaling service is out of service due to failure of the user part layer at the destination. This remote destination should be examined to determine the cause of the failure.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-75
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
SSN FAIL
This alarm occurs when the SCP located by subsystem number (SSN) is not available.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Ensure that the provisioning settings for the SSN and the associated routes match the settings used on the far-end, as described in the Retrieving Provisioning Data section on page 3-72. If the configuration data associated with the SSN is incorrect, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the configuration data associated with the SSN is correct, then proceed to Step 3.
Step 3
Verify the network configuration to confirm that the SCP identified with the SSN is reachable. If the SCP is not reachable, begin a dynamic reconfiguration session, as described in the Invoking Dynamic Reconfiguration section on page 3-70, and reprovision your data for an SCP that is reachable, or remove the SSN and its associated data. If the SCP is reachable, proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine the AS definitions on the associated Cisco ITP. Refer to the documentation for your Cisco ITP for more information. Retrieve the settings for the affected SUA routing keys using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72.
8-76
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
Step 4 Step 5
The AS definitions should match the routing contexts of the SUA routing keys. If they match, proceed to Step 6. Otherwise, proceed to Step 5. Open a dynamic reconfiguration session to modify the routing contexts of the M3UA routing keys, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Verify that the AS is not shutdown on the Cisco ITP. Refer to the documentation for your Cisco ITP for more information. If the AS is shutdown, restart it. Otherwise, proceed to Step 7. If this corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
SUPPORT FAILED
This alarm occurs when the identified entity cannot provide service because a supporting entity is not providing service. The supporting entity may be hardware or software.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Check for other alarms, as described in the Retrieving All Active Alarms section on page 8-3, that further identify the failed entity. Once you have identified the failed entity, replace it and restore it to service. If the entity is hardware, refer to the appropriate documentation for replacement. If it is software, attempt to reboot the software. If the alarms clear, the procedure is complete. Otherwise, proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
SwitchoverFail
This alarm occurs when a switchover operation from the active Cisco MGC to the standby Cisco MGC has failed.
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the Recovering from a Switchover Failure section on page 8-159.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-77
Corrective Action
To correct the problem identified by this alarm, you must upgrade the software on the identified SG to support TALI version 3.0. Refer to your Tekelec documentation for information on upgrading your SG software.
Corrective Action
To correct the problem identified by this alarm, you must set the connection state of the identified SG to allowed. Refer to your Tekelec documentation for more information.
Corrective Action
To correct the problem identified by this alarm, check for the presence of the Tariff Table Load Failure alarm, using the procedure in Retrieving All Active Alarms section on page 8-3. If this alarm is present, perform the corrective action for that alarm. Otherwise, the procedure is complete.
Corrective Action
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify whether a tariff table is present on your system by logging in to your active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:tariff:all
The system responds with a list of elements in the tariff table, or with an error indicating that a tariff table does not exist. If a tariff table is not present, provision a tariff table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide. If a tariff table is present, verify that the information returned is correct. If the information is correct, proceed to Step 3. Otherwise, correct the contents of the tariff table, as described in the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-78
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
TLC: Leg2chanSeizedUnpackError
This alarm occurs when a Seize Channel (CRCX) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
TLC: Leg2chanModifiedUnpackError
This alarm occurs when a Modify Channel (MDCX) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
TLC: Leg2chanDeletedUnpackError
This alarm occurs when a Delete Channel (DLCX) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-79
TLC: Leg2notifyUnpackError
This alarm occurs when a Notify (NTFY) message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
TLC: Leg2deleteChanUnpackError
This alarm occurs when a Delete Channel (DLCX) message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
TLC: Leg2notifyRequestAckUnpackError
This alarm occurs when an Request Notify (RQNT) acknowledge message received from the media gateway could not be unpacked.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-80
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
TLC: Leg2chanOpFailed
This alarm occurs when the Cisco MGC has detected an internal error or a media gateway related problem.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
UCM: CCodeModfailed
This alarm occurs when the country code prefix could not be applied or removed.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Determine whether the country code prefix could not be applied or removed by viewing the active system log file, using the procedure described in the Viewing System Logs section on page 8-4. There should be a log present that uses the same text as the alarm. That log indicates whether the country code prefix could not be applied or removed and lists the affected B-number. Determine whether country code prefix application or removal should be performed for the affected B-number. If country code prefix processing should not be performed, proceed to Step 4. If country code prefix processing should be performed, proceed to Step 8.
Step 3
Step 4
Verify whether the result set associated with the affected B-number has a result type of CC_DIG configured, using the numan-rtrv MML command. For example:
numan-rtrv:resulttable:custgrpid=T002
If the result set does have a result type of CC_DIG configured, use the numan-dlt MML command to remove the CC_DIG result set. For example:
numan-dlt:resulttable:custgrpid=T002, name=result46, resulttype=CC_DIG
Verify that the BDigitCCPrefix property for the associated trunk group is set to 0 (disabled) using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-81
If the BDigitCCPrefix property in the associated trunk group is not set to 0, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCPrefix=0
Verify that the BDigitCCrm property for the associated trunk group is set to NULL (disabled) using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1
If the BDigitCCrm property in the associated trunk group is not set to NULL, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCrm=null
Verify that the associated B-number analysis configuration does not allow for country code digit removal using the numan-rtrv MML command. For example:
numan-rtrv:digmodstring:custgrpid=T002
If the associated B-number analysis configuration allows country code digit removal, use the numan-dlt MML command to remove the digit string. For example:
numan-dlt:digmodstring:custgrpid=T002, name=ccspain
Select a step based on the country code prefix information found in the log identified in Step 2. If the log indicates that the country code prefix could not be applied, proceed to Step 9. If the log indicates that the country code prefix could not be removed, proceed to Step 11.
Step 9
Verify whether the result set associated with the affected B-number has a result type of CC_DIG configured, using the numan-rtrv MML command. If the result set does not have a result type of CC_DIG configured, use the numan-ed MML command to add the CC_DIG result set. For example:
numan-ed:resulttable:custgrpid=T002, name=result46, resulttype=CC_DIG, dw1=ccspain, setname=setname1
Verify that the BDigitCCPrefix property for the associated trunk group is set to 1 (enabled) using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1
If the BDigitCCPrefix property in the associated trunk group is not set to 1, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCPrefix=1
Verify that the BDigitCCrm property for the associated trunk group is set to the correct number string using the prov-rtrv MML command. For example:
prov-rtrv:trnkgrpprop:name=trnkgrp1
8-82
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
If the BDigitCCrm property in the associated trunk group is not set to the correct number string, use the prov-ed MML command to modify the value of the property. For example:
prov-ed:trnkgrp:name=trnkgrp1, BDigitCCrm=34
Verify that the associated B-number analysis configuration allows for country code digit removal using the numan-rtrv MML command. For example:
numan-rtrv:digmodstring:custgrpid=T002
If the associated B-number analysis configuration does not allow for country code digit removal, use the numan-ed MML command to modify of the setting. For example:
numan-ed:digmodstring:custgrpid=T002, name=ccspain, digstring=34
Verify that the dial plan file was loaded correctly, using the procedure described in Verifying Proper Loading of a Dial Plan section on page 8-112. If that procedure resolves the problem, the procedure is finished. Otherwise, proceed to Step 13.
Step 14 Step 15
Perform a call trace, as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
UCM: MGCPDIALAuthFail
This alarm occurs when an MGCP dial call fails after an automatic switchover takes place, due to the expiration of a timer waiting for a Notify message from the associated media gateway.
Note
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the configuration of the associated media gateway. If there are no configuration problems, proceed to Step 2. Otherwise, fix the identified configuration problems. Verify that the IP path between the media gateway and the Cisco MGC is working properly. If you find no problems in the IP path between the media gateway and the Cisco MGC, proceed to Step 4. Otherwise, fix the identified IP path problems. Verify that the IP path between the media gateway and the authentication server is working properly. If you find no problems in the IP path between the media gateway and the authentication, proceed to Step 5. Otherwise, fix the identified IP path problems.
Step 4
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-83
Step 5 Step 6
Verify that the authentication server is working properly. If you find no problems in the authentication server, proceed to Step 6. Otherwise, fix the identified problems in the authentication server. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Virtual_IP_Addr Mismatch
This alarm occurs when the virtual IP addresses configured in XECfgParm.dat files on the active and the standby Cisco MGCs do not match.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2 Step 3
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify the value set for the XECfgParm.dat parameter, *.Virtual_IP_Addr, on the active Cisco MGC. Verify the value set for the XECfgParm.dat parameter, *.Virtual_IP_Addr, on the standby Cisco MGC. If the parameter values match, proceed to Step 10. Otherwise, proceed to Step 4.
Step 4
Log in to the standby Cisco MGC and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc
Open the XECfgParm.dat using a text editor, such as vi. Set the value of the *.Virtual_IP_Addr parameter to match the value on the active Cisco MGC. Save your changes and close the text editor. Stop the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 10.
Step 10
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Wrong IP Path
This alarm occurs when an IP route or local interface associated with the identified component cannot be used. This can happen when one of the following occurs:
A route has been overridden by another route in the operating system routing table. A route configured on your system has been deleted by someone using the UNIX command route delete. An IP link or route has been provisioned incorrectly.
8-84
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Troubleshooting Using Cisco MGC Alarms
This alarm can also occur if an IP signaling channel has been misconfigured. Use the netstat -rnv UNIX command to retrieve the current operating system routing table.
Note
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC and retrieve the current operating system routing table using the following UNIX command:
netstat -rnv
If the response does not contain the route identified in the alarm, open the operating system routing table file using a text editor such as vi. Otherwise, proceed to Step 6. Add the route to the routing table using the appropriate text editor command. Save the file and exit the editing session. If this resolves the problem, the procedure is complete. Otherwise, proceed to Step 6. Verify that the provisioned settings for the identified IP link are correct, using the prov-rtrv MML command, as described in the Retrieving Provisioning Data section on page 3-72. If the provisioned settings for your IP link are correct, proceed to Step 8. If the provisioned settings for your IP link are incorrect, proceed to Step 7.
Step 7
Start a dynamic reconfiguration session to change the settings, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If this resolves the problem, the procedure is complete. Otherwise, proceed to Step 8. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Step 8
XE Rsrc Fail
This alarm occurs when memory resources have been exhausted on the active Cisco MGC host. If this alarm occurs frequently you may need to add additional memory to your Cisco MGC. Refer to the Sun Microsystems documentation for your Cisco MGC host for more information about adding additional memory.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-85
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Step 2
Collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Step 3 Step 4
Stop the Cisco MGC software on the newly standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on the newly standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. If this resolves the problem, the procedure is complete. Otherwise, proceed to Step 5.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Circuit-related Noncircuit-related
The signals involved in the setup and teardown of bearer circuits are circuit-related. Non-circuit-related signals are used for all the ancillary services provided by the SS7 network, including database access and network management. The SS7 protocol is composed of several levels or parts, including the following:
Message Transfer Part (MTP)Levels 1 (MTP1) through 3 (MTP3) Signaling Connection Control (SCCP) Application Service Part (ASP) Transaction Capabilities Application Part (TCAP) Telephony User Part (TUP) ISDN User Part (ISUP) Broadband ISUP (BISUP)
There are many variations of different parts of the SS7 protocol stack. MTP has ANSI, ITU, Bellcore, and a number of national variations. Each country and each major carrier may have slightly different variations of a part to fit its particular needs.
8-86
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
The SS7 network needs to have the highest degree of reliability. Each switch with access to the SS7 network must be configured to a preconceived set of network parameters. There is some risk that the person configuring a switch will not use the correct set of parameters or values. This is the root cause of most SS7 problems at both the MTP layers and upper layers of the SS7 protocol. A single parameter value, such as an incorrect timer value, can cause SS7 connectivity to act improperly or fail completely. The first, and most important, step in troubleshooting SS7 related problems is to understand, and fully document, the SS7 network topology and protocols. The protocol documents are used as a reference over the months and years of maintenance on the SS7 network. Troubleshooting SS7 network problems is described in the following sections:
Signaling Channel Problems, page 8-87 Signaling Destination Problems, page 8-91 Signaling Channel Troubleshooting Procedures, page 8-94
Note
Multiple alarms are likely to occur for severe failures. For example, SUPPORT FAIL and SC FAIL would typically occur with LIF LOS. Signaling links are the dedicated communication channels that the Cisco MGC uses to transfer signaling information among itself, the Cisco SLTs, and the Signal Transfer Points (STPs). Signaling links provide the necessary delivery reliability for higher-layer SS7 signaling protocols. You can use the Cisco MGC software and MML commands to manage signaling channels and lines. You can retrieve signaling channel attributes, change the states of signaling channels, and change the state of signaling lines. See Chapter 3, Cisco MGC Node Operations, for detailed information.
Note
For more information on MML commands, refer to the Cisco Media Gateway Controller Software Release 9 MML Reference Guide. Because all types of signaling channels have basically the same functionality, they are managed similarly. Unless otherwise noted, all commands, counters, and alarms mentioned here are applicable to all types of signaling channels. Signaling channel problems are described in the following sections:
SS7 Link is Out-of-Service, page 8-88 SS7 Load Sharing Malfunction, page 8-88 Physical Layer Failures, page 8-90
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-87
Configuration Errors, page 8-90 Supporting Entity Failures, page 8-90 Incomplete Signaling, page 8-90 Changing Service States, page 8-91
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Change the service state of the SS7 link to in-service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96. If the SS7 link returns to service, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Verify that MTP1 is working correctly on the affected Cisco SLT, as described in the Identifying MTP1 Communication Problems section on page B-11. If MTP1 is working correctly on the affected Cisco SLT, proceed to Step 3. Otherwise, correct the MTP1 problems as described in the Resolving MTP1 Communication Problems section on page B-11. Repeat Step 2. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 7.
Step 4
Searching for excessive SUREM/AERM errors and link failure messages in the active system log file, as described in the Viewing System Logs section on page 8-4. If MTP2 is working correctly on the Cisco MGC, proceed to Step 8. Otherwise, correct the MTP2 problems as described in the Resolving MTP2 Communication Problems section on page B-12. Repeat Step 1. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 5.
Step 5
Verify that MTP2 is working correctly on the affected Cisco SLT, as described in the Identifying MTP2 Communication Problems section on page B-12. If MTP2 is working correctly on the affected Cisco SLT, proceed to Step 8. Otherwise, correct the MTP2 problems as described in the Resolving MTP2 Communication Problems section on page B-12. Repeat Step 1. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Troubleshoot the SS7 link by performing the procedures found in the Troubleshooting SS7 Link Problems section on page B-5. If no problems can be found, proceed to Step 7. Otherwise, repeat Step 2. If the link returns to service, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8.
8-88
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
Step 2
Log in to the active Cisco MGC, start an MML session, and enter the following command to verify the priority settings of your SS7 links:
prov-rtrv:c7iplnk:"all"
The PRI field in the response shows the priority settings for your SS7 links. For load sharing to work properly, the priority settings for all of your links should be set to 1.
Step 3
Enter the following command to verify the priority settings of your SS7 routes:
prov-rtrv:ss7route:"all"
PRI --1 1 1 1 1
The PRI field in the response shows the priority settings for your SS7 routes. For load sharing to work properly, the priority settings for all of your routes should be set to 1.
Step 4 Step 5
Start a provisioning session, as described in Starting a Provisioning Session section on page 3-68. If any of the SS7 links show a priority other than 1, you must change the priority settings to ensure proper link load sharing. Before you can change the priority settings for the link, you must take the link out-of-service, as described in the Setting the Service State of a C7/SS7 Link or Linkset section on page 8-96. Modify the priority settings of the link by entering the following command:
prov-ed:c7iplnk:name=lnkname,pri=1
Step 6
Where lnkname is the name of an SS7 link that does not have a priority of 1. Repeat this step for each link that does not have a priority of 1.
Step 7
If any of the SS7 routes show a priority other than 1, you must change the priority settings to ensure proper route load sharing. Before you can change the priority settings for the route, you must take the route out-of-service, as described in the Setting the Service State of an SS7 Signaling Service section on page 8-96. Modify the priority settings of the link by entering the following command:
prov-ed:ss7route:name=rtname,pri=1
Step 8
Where rtname is the name of an SS7 route that does not have a priority of 1.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-89
Repeat this step for each route that does not have a priority of 1.
Step 9
Save and activate your provisioning changes, as described in the Saving and Activating your Provisioning Changes section on page 3-69. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 10.
Step 10
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Configuration Errors
The most common mistake in SS7 signal link configuration is to misconfigure the Signal Link Code (SLC) for the SS7 link. This is a preconfigured code on both ends of the link. If the SLC or the point codes do not match, the link does not align and no transmission can take place. For T1 and E1 connectors, an SS7 signaling link is carried in a single 56- or 64-kbps time slot. The time slot that is used must also agree on both sides of the link. Make sure the MTP2 timers and thresholds agree with the network defaults. Confirm that the far-end switch or STP has the same values as your system. When a Cisco SLT is used to terminate MTP2, confirm that the RUDP parameters agree on both sides and are consistent with the documentation.
Incomplete Signaling
Link failures between the Cisco SLT and the Cisco MGC can be caused by
Ethernet card failure on the Cisco SLT Ethernet card failure on the Cisco switch
8-90
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
Cisco switch failure Fast Ethernet interface card failure on the Cisco MGC
In each of the above cases, it is impossible to transfer MTP3 signaling messages from the Cisco SLT to the Cisco MGC. Cisco SLT platform failure (which is equivalent to MTP2 failure) causes signaling messages to be unable to go to MTP3. The MTP2 layer on the Cisco SLT is supposed to transmit SIPO messages to the STP mated pair to initiate the changeover procedure. Cisco SLT platform failure on the SS7 network is detected by the mated STP pair, which detects timer expiration and link unavailability.
In-service (IS)The signaling channel is requested to start providing service. Out-of-service (OOS)The signaling channel is requested to stop providing service. For some protocols, this request is accepted, but not granted until after all calls have been released. During the interim period, the channels service state appears as OOS, PEND.
Forced out-of-service (FOOS)The signaling channel is requested to stop providing service immediately regardless of related call states, and to drop currently active calls. Inhibit (INH)The signaling channel is requested to be put into an inhibit state. This state is for SS7 signaling channels only and fails on other types of signaling channels. In this state, the channel is active but does not provide service for call processing. If the signaling channel is the last one in the signal path, the inhibit request is denied and an error is returned.
Un-inhibit (UNH)The signaling channel is requested to be removed from an INH state and to provide service for call processing. This state is for SS7 signaling channels only and fails on other types of signaling channels. Use this option (UNH), rather than the IS option, to return an inhibited signaling channel to service.
Note
Changing the state of a signaling channel generates an alarm. For more information on retrieving and clearing alarms, see Troubleshooting Using Cisco MGC Alarms section on page 8-2.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-91
An SS7 STP is treated as an adjacent point code (APC) to the Cisco MGC. SS7 MTP uses a message exchange called Signaling Link Test Message (SLTM)/Signaling Link Test Acknowledgment (SLTA) to confirm that the far-end point code is the one configured. The SLTM consists of the originating point code (OPC) of the Cisco MGC, an APC number, and an SS7 network indicator. If the values for these parameters match with the values used for these at the far-end switch, an SLTA is returned. If the value for any of these parameters do not match, the far-end switch does not send an SLTA. The Cisco MGC drops the link and tries to realign it. This process continues until the SLTM parameters match on both sides. The problem is manifested by the SS7 links dropping and recovering in roughly 30-second cycles (this is referred to as bouncing). The following sections describe signaling destination problems:
Bouncing SS7 Links, page 8-92 Configuration Errors, page 8-93 Traffic Restart, page 8-93 SS7 Destination is Out of Service, page 8-93 SS7 Route is Out of Service, page 8-94 SS7 Destination is Unavailable, page 8-94
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the SLC, OPC, and DPC provisioning settings match with those used on the far end. To do this, enter the prov-rtrv MML command for the SS7 link, OPC, and DPC components, as described in the Retrieving Provisioning Data section on page 3-72, and compare the values found there with those used by the far end. If the provisioning settings for the SLC, OPC, and DPC match with those used on the far end, proceed to Step 3. Otherwise, modify the settings to match with those used on the far end. Refer to the Invoking Dynamic Reconfiguration section on page 3-70 for more information about modifying the settings of a provisioned component. If that clears the problem, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Ensure that the local MTP3 timer settings match the network defaults by performing the Verifying MTP3 Timers section on page 8-100. If the local MTP3 timer settings match the network defaults, proceed to Step 4. Otherwise, contact the far-end to determine whether their timer settings can be changed to match your settings. If that clears the problem, the procedure is complete. Otherwise, proceed to Step 4.
Step 4
View the system logs, as described in the Viewing System Logs section on page 8-4, looking for excessive alignment error monitoring (AERM) logs. If large numbers of AERM logs are present, proceed to Step 5. If no AERM logs are present, proceed to Step 6.
8-92
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
Step 5
Determine why the link is not aligning properly by checking the alignment status on the Cisco SLT associated with the affected link, as described in the Verifying the Link Alignment Status section on page B-6. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Configuration Errors
If the SS7 DPC is fully associated, it can have the same SLTM/SLTA problems as described above. If the SS7 DPC is quasi-associated, the most common cause for failure is a route misconfiguration. Review the route information between the Cisco MGC and the DPC to make sure that the APCs are valid, the route priorities are set correctly, and the route uses the appropriate linkset.
Traffic Restart
Make sure that the MTP3 traffic restart timers and thresholds agree with the network defaults. Confirm that the far-end switch or STP also has the same values.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Contact your SS7 provider and have them verify the links from the DPC to the associated STP. Verify the state of the signaling channels, as described in the Verifying the Status of all Signaling Services section on page 3-8. If any of the SS7 links are out-of-service, restore the links as described in the SS7 Link is Out-of-Service section on page 8-88. If all of the SS7 links to a destination are out-of-service, restore the destination as described in the SS7 Destination is Out of Service section on page 8-93. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 4.
Step 4
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-93
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Change the service state of the destination to in-service, as described in the Setting the Service State of a Signaling Service section on page 8-95. If the destination goes into service, the procedure is complete. Otherwise, proceed to Step 3.
Step 3
Verify the state of the signaling channels, as described in the Verifying the Status of all Signaling Services section on page 3-8. If none of the SS7 links are in-service, proceed to Step 4. If all or at least one of the SS7 links to the destination are in-service, then contact your SS7 provider and have them verify the links from the DPC to the associated STP.
Step 4
Determine why the link is not aligning properly by checking the alignment status on the Cisco SLT associated with the affected link, as described in the Verifying the Link Alignment Status section on page B-6. If the conditions clears, the procedure is complete. Otherwise, proceed to Step 5.
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Setting the Service State of a Signaling Service, page 8-95 Setting the Service State of an SS7 Signaling Service, page 8-96 Setting the Service State of a C7/SS7 Link or Linkset, page 8-96 Setting the Service State of an IP Link, page 8-97 Setting the Service State of an IP Route, page 8-97 Setting the Service State of a D-channel, page 8-98 Setting the Service State of a Local Subsystem Number, page 8-98 Setting the Service State of an Association, page 8-99 Verifying MTP Timer Settings, page 8-99 Modifying Configurable Timers, page 8-101 Managing Japanese SS7 Signaling Link Tests, page 8-110
8-94
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
Managing Japanese SS7 Signaling Route Tests, page 8-111 Verifying Proper Loading of a Dial Plan, page 8-112 Verifying Configuration to Support Multiple Versions of SS7, page 8-113 Resolving an Association Alarm, page 8-113 Converting Stored and Transmitted Point Code Values, page 8-114
Caution
The set-dest command should only be used while you are dynamically reconfiguring the system. Do not use the set-dest command to take a signaling service out-of-service during a maintenance session, as all calls associated with the specified signaling service will be dropped. You should instead use the blk-cic command to block the CICs associated with the signaling service when you need to perform maintenance.
Step 1
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-dest:sig_srv:serv_state
Where:
sig_srvThe MML name of the desired signaling service. serv_stateThe desired service state. The valid states are listed below:
ISPlaces a signaling service in service. OOSTakes a signaling service out of service.
Note
Before you can take a NAS signaling service out of service, you must shut down the D-channel on the associated media gateway. Refer to the documentation for the media gateway for more information on shutting down D-channels. For example, to set the service state of a signaling service called sigsrv1 to IS, enter the following command:
set-dest:sigsrv1:IS
Step 2
Verify that the state of the destination has changed by entering the rtrv-dest command, as described in the Retrieving Signaling Service States, page 3-50.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-95
Caution
The set-spc command should only be used while you are dynamically reconfiguring the system. Do not use the set-spc command to take an SS7 signaling service out-of-service during a maintenance session, as all calls associated with the specified SS7 signaling service will be dropped. You should instead use the blk-cic command to block the CICs associated with the SS7 signaling service when you need to perform maintenance.
Step 1
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-spc:ss7_srv:serv_state
Where:
ss7_srvThe MML name of the desired SS7 signaling service. serv_stateThe desired service state. The valid states are listed below:
ISPlaces the SS7 signaling service in service. OOSTakes the SS7 signaling service out of service.
For example, to set the service state of an SS7 signaling service called ss7srv1 to IS, enter the following command:
set-spc:ss7srv11:IS
Step 2
Verify that the state of the SS7 signaling service has changed by entering the rtrv-spc command, as described in the Retrieving the State of SS7 Signaling Services, page 3-54.
Where:
c7link_nameMML name of the SS7 link you want to modify. serv_stateservice state to which you want to change. Valid values for SS7 links are IS, OOS, FOOS, INH, and UNH.
Note
To set the last link in a linkset out of service, you must enter the FOOS service state in the command.
For example, to set the service state of the SS7 link, c7link1, to IS, enter the following command:
set-c7lnk:c7link1:IS
You can verify that the selected SS7 link is in the proper service state by performing the procedure in the Retrieving Service State of C7/SS7 Links or Linksets, page 3-50.
8-96
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
Note
To modify the service state of the backhaul link for the Cisco SLT, you must set the state of all link types associated with that Cisco SLT. The possible link types are S77 links (c7lnk), D-channels, (dchan), and IP links (iplnk).
Where:
iplink_nameMML name of the IP link you want to modify. serv_stateService state to which you want to change. Valid values for IP links are IS, OOS, and FOOS. confirmAs of Release 9.2(1)T, this parameter is required when you are setting the service state of an MGCP link. Other types of IP links do not require this parameter.
For example, to set the service state of the IP link, iplink1, to IS, enter the following command:
set-iplnk:iplink1:IS
In another example, you would enter the following command to set the service state of an MGCP link called mgcplnk1 to IS:
set-iplnk:mgcplnk1:IS::confirm
You can verify that the selected IP link is in the proper service state by performing the procedure in the Retrieving the Service State for IP Links section on page 3-51.
Note
To modify the service state of the backhaul link for the Cisco SLT, you must set the state of all link types associated with that Cisco SLT. The possible link types are S77 links (c7lnk), D-channels, (dchan), and IP links (iplnk).
Where:
iproute_nameMML name of the IP route you want to modify. serv_stateService state to which you want to change. Valid values for IP links are IS, OOS, and FOOS. confirmThis parameter is required when you are setting the service state to OOS or FOOS.
Note
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-97
An IP route in any of the following combinations of primary and secondary service states can be set to OOS or FOOS:
For an IP route to be set to IS, it must have a primary service state of OOS and secondary service state of COOS. For example, you would enter the following command to set the service state of an IP route called iprte1 to OOS:
mml>set-iproute:iprte1:OOS,confirm
Note
You can verify that the selected IP route is in the proper service state by performing the procedure in the Retrieving the Service State for IP Routes section on page 3-51.
Where:
dchan_nameMML name of the D-channel you want to modify. serv_stateservice state to which you want to change. Valid values for D-channels are IS and OOS.
For example, to set the service state of the D-channel, dchan-1, to IS, enter the following command:
set-dchan:dchan-1:IS
You can verify that the selected D-channel is in the proper service state by performing the procedure in the Retrieving the Service State of D-Channels section on page 3-53.
Note
To modify the service state of the backhaul link for the Cisco SLT, you must set the state of all link types associated with that Cisco SLT. The possible link types are S77 links (c7lnk), D-channels, (dchan), and IP links (iplnk).
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-lssn-state:ssn:serv_state
Where:
8-98
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
serv_stateThe desired service state. The valid states are listed below:
ISPlaces an LSSN in service. OOSTakes an LSSN out of service.
For example, to set the service state of an LSSN called lnp to IS, enter the following command:
set-lssn-state:lnp:IS
Step 2
Verify that the state of the LSSN has changed by entering the rtrv-lssn command, as described in the Retrieving the State of All Local Subsystem Numbers section on page 3-55.
Where:
assoc_nameMML name of the association you want to modify. serv_stateService state to which you want to change. Valid values for IP links are IS, OOS, and FOOS. confirmThis parameter is required when you are setting the service state to OOS or FOOS.
Note
This command cannot be used on the standby Cisco MGC. For example, to set the service state of the association, assoc1, to OOS, enter the following command:
mml>set-association:assoc1:OOS,confirm
You can verify that the selected association is in the proper service state by performing the procedure in the Retrieving the Service State for Associations section on page 3-55.
Note
Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the MTP timers.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-99
Enter the following command at the Cisco SLT to display the settings for the MTP2 timers:
Router #show SS7 mtp2 timer channel
Where: channel specifies a channel, 0 through 3. The system returns a message similar to the following:
SS7 MTP2 Timers for channel 0 in milliseconds Protocol version for channel 0 is Japan NTT Q.703 Version 1-1 T1 aligned/ready = 15000 T2 not aligned = 5000 T3 aligned = 3000 T4 Emergency Proving = 3000 T4 Normal Proving = 3000 T5 sending SIB = 200 T6 remote cong = 3000 T7 excess ack delay = 2000 T8 errored int mon = 0 TA SIE timer = 20 TF FISU timer = 20 TO SIO timer = 20 TS SIOS timer = 20
Step 2
Verify the MTP2 timers settings listed for the Cisco SLTs against the MTP2 timers used at the associated destination. If the MTP2 timers settings match, your signaling problem has different cause. Continue troubleshooting the problem. If the MTP2 timers settings do not match, perform the procedure in the Modifying MTP2 Timers section on page 8-101.
Log on to active Cisco MGC, start an MML session, and enter the following command to display the settings for the MTP3 timers:
prov-rtrv:lnksetprop:name=MML_name
Where MML_name is the MML name for the linkset associated with the MTP3 timers you want to verify. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2000-07-27 18:33:56 M RTRV "session=nsite04:sigsvcprop" /* mtp3ApcMtpRstrtT28 = 50 mtp3DlnkConnAckT7 = 10 mtp3FrcUnhT13 = 10 mtp3InhAckT14 = 20 mtp3LocInhTstT20 = 900 mtp3MaxSltTries = 2
8-100
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
mtp3MsgPriority = 2 mtp3MtpRstrtT24 = 60 mtp3RepeatRstrtT26 = 150 mtp3TfrUsed = false mtp3TraSnT29 = 600 mtp3tstSltmT1 = 60 mtp3tstSltmT2 = 600 mtp3UnhAckTl2 = 10 reference = ANSI96
Step 2
Verify the MTP3 timers settings listed against the MTP3 timers used at the associated destination. If the MTP3 timers settings match, your signaling problem has different cause. Continue troubleshooting the problem.
Modifying MTP2 Timers, page 8-101 Verifying and Modifying MTP3 Timer Settings, page 8-102 Verifying and Modifying RLM Timers, page 8-103 Verifying and Modifying ISUP Timer Settings, page 8-105 Rebooting Your System to Modify Properties, page 8-109
Where:
standardName of the SS7 standards used for your links. Valid values are Bellcore, ITU, NTT, and TTC channelSpecifies a channel, 0 through 3 parametersThe timer number and the new value for the timer
Note
Refer to the Cisco Signaling Link Terminal documentation for more information on the parameters for this command. In the following example, the aligned/ready timer duration on channel 0 is set to 30,000 milliseconds:
Router(config)# ss7 mtp2-variant Bellcore 0 Router(config-Bellcore)# T1 30000
In the following example, the aligned/ready timer is restored to its default value of 13,000 milliseconds:
Router(config)# ss7 mtp2-variant Bellcore 0 Router(config-Bellcore)# no T1
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-101
You might want to verify the new settings after the modification is complete. To do this, refer to the procedure in the Verifying MTP2 Timers section on page 8-100.
Note
Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the MTP timers. To verify and modify the values used for the MTP3 timers, complete the following steps:
Step 1
Log on to active Cisco MGC, start an MML session, and enter the following command to display the settings for the MTP3 timers:
prov-rtrv:sigsvcprop:name=protocol
Where protocol is the MML name for the SS7 protocol family being used, such as SS7-ANSI or SS7-ITU. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2001-06-01 10:31:00 M RTRV "session=active:lnksetprop" /* mtp2AermEmgThr = 1 mtp2AermNrmThr = 4 mtp2CongDiscard = false mtp2LssuLen = 1 mtp2MaxAlignRetries = 5 mtp2MaxMsuFrmLen = 272 mtp2MaxOutsFrames = 127 mtp2ProvingEmgT4 = 6 mtp2ProvingNormalT4 = 23 mtp2SuermThr = 64 mtp2T1 = 130 mtp2T2 = 115 mtp2T3 = 115 mtp2T5 = 1 mtp2T6 = 30 mtp2T7 = 10 mtp3ApcMtpRstrtT28 = 30 mtp3DlnkConnAckT7 = 10 mtp3FrcUnhT13 = 10 mtp3InhAckT14 = 20 mtp3LocInhTstT20 = 900 mtp3MaxSltTries = 2 mtp3MsgPriority = 2 mtp3MtpRstrtT24 = 100 mtp3RepeatRstrtT26 = 150 mtp3TfrUsed = false mtp3TraSntT29 = 600
8-102
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
mtp3tstSltmT1 = 60 mtp3tstSltmT2 = 600 mtp3UnhAckT12 = 10 reference = ANSI92 rudpAck = enable rudpKeepAlives = enable rudpNumRetx = 2 rudpRetxTimer = 6 rudpSdm = enable rudpWindowSz = 32
Step 2
Verify the MTP3 timers settings listed against the MTP3 timers used at the associated destination. If the MTP3 timers settings match, your signaling problem has different cause. Check for alarms on your system and resolve them using the procedures in the Alarm Troubleshooting Procedures section on page 8-9. If the MTP3 timers settings do not match, proceed to Step 3.
Step 3 Step 4
Start a provisioning session, using the procedure in the Starting a Provisioning Session section on page 3-68. Modify the parameters for the desired MTP3 timers by entering the following command:
prov-ed:lnkset:name=protocol,param_name=param_value
Where:
protocolMML name for the SS7 protocol family being used, such as SS7-ANSI or SS7-ITU. param_nameName of the MTP timer you want to change param_valueNew value for the MTP timer
Note
Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the parameters for this command. In the following example, the MTP3 T1 timer, waiting for signaling link test acknowledgment message, is set to 65 tenths of a second:
prov-ed:lnkset:name=SS7-ANSI,mtp3tstSltmT1=65
Step 5 Step 6
Save and activate your provisioning session, using the procedure in the Saving and Activating your Provisioning Changes section on page 3-69. Reboot your system as described in the Rebooting Your System to Modify Properties section on page 8-109.
Note
RLM keepalives are sent only when traffic has not been transmitted for some time, that is, when a signaling message is received, the RLM keepalive timer is reset. RLM keep a lives are sent by the media gateway to the Cisco MGC. If the RLM keepalive timer on the Cisco MGC expires, the system
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-103
sets the IP link out-of-service. Increasing the RLM keepalive timer values on both sides can ensure that the IP link is not reset during transient conditions in the IP network, when the default values might be too stringent. However, if your system is in a continuous service configuration, increasing the values of the RLM keepalive timers reduces the systems ability to quickly detect a link failure. Systems in a simplex configuration would not be affected.
Step 1
Verify the current settings of your RLM timers on the Cisco MGC by logging in to the standby Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:lnksetprop:name="protocol_fam"
Where protocol_fam is the MML name for the associated protocol family. For example, to retrieve the values of RLM timers for an ANSI signaling environment, you would enter the following command:
prov-rtrv:lnksetprop:name="SS7-ANSI"
All of the properties listed, except for port and PropagateSvcMsgBlock, are RLM timer properties.
Step 2 Step 3
Start a provisioning session, using the procedure in the Starting a Provisioning Session section on page 3-68. Modify the RLM timer properties, as needed, using the following command:
prov-ed:lnksetprop:name="protocol_fam",prop_name=value,prop_name=value,...
Where:
protocol_famThe MML name of the associated protocol family. prop_nameThe name of the RLM timer property you want to modify. valueThe value you want for the specified RLM timer property.
For example, to change the values of RLM timers for an ANSI signaling environment, you would enter the following command:
prov-ed:lnksetprop:name="SS7-ANSI",timerLinkDownMin=120,timerLinkEcho=15
Step 4
Save and activate your provisioning session, using the procedure in the Saving and Activating your Provisioning Changes section on page 3-69.
8-104
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
Step 5
Reboot your system as described in the Rebooting Your System to Modify Properties section on page 8-109.
Timers
T1
ANSISS7_STANDARD Q761_BASE Q767_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN ANSISS7_STANDARD Q761_BASE Q767_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_SPANISH ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN
T2, T5, T6 T7, T8, T9 T12, T13, T14 T15, T16, T17 T18, T19, T20 T21, T22, T23 T24, T25, T26 T27, T33, T36
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-105
Table 8-2
Timers
T28 T34
ANSISS7_STANDARD Q761_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_SPANISH ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN Q761_BASE Q767_BASE Q761_SINGAPORE Q761_ARGENTINA ISUPV2_SPANISH ISUPV2_FINNISH96 ISUPV2_FRENCH Q761_THAILAND Q761_PERU Q761_BELG_C2 ISUPV2_JAPAN
T35
8-106
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
Table 8-2
Timers
T38
ANSISS7_STANDARD
Note
The default values and valid ranges for each of these timers within the supported protocols can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide. To verify and modify the values used for the ISUP timers, complete the following steps:
Step 1
Unless you have previously created a profile for the associated signaling service or trunk group with modified values for these ISUP timers, the values for these eight timers match the default values listed in the tables above. If you have previously created a profile with modified ISUP timer values for the associated signaling service or trunk group, proceed to Step 2 to retrieve the current values set in the profile. Otherwise, proceed to Step 3. Log on to active Cisco MGC, start an MML session, and enter the following command to display the settings for the modified ISUP timers:
prov-rtrv:profile:name=profile_name
Step 2
Where profile_name is the MML name for the profile that contains the modified values for the configurable ISUP timers. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2002-10-07 15:47:39.928 EST M RTRV "session=NOA_SPAIN:profile" /* ProfileType PropertyName ProfileValue -------------------- -------------------- ----------isuptmrprofileT15000
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-107
*/
Step 3
Verify the ISUP timers settings listed against the ISUP timers used at the associated destination. If the ISUP timers settings match, your signaling problem has different cause. Check for alarms on your system and resolve them using the procedures in the Alarm Troubleshooting Procedures section on page 8-9. If the ISUP timers settings do not match, proceed to Step 4.
Start a provisioning session, using the procedure in the Starting a Provisioning Session section on page 3-68. If you have already defined a profile that modifies the configurable ISUP timers, proceed to Step 8. Otherwise, proceed to Step 6. Enter your new ISUP timer values using the following command:
prov-add:profile:name=profile_name,type=isuptmrprofile, timer_number=timer_value, timer_number=timer_value, timer_number=timer_value...
Where:
profile_nameMML name for the profile that contains the set of ISUP measurements being used. timer_numbernumber of the timer to be modified. timer_valueNew value for the selected ISUP timer.
Note
Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the valid ranges for the ISUP timers. If you enter a number outside the valid range, the default value is used. In the following example, the values of the T6, T8, and T35 ISUP timers are modified:
prov-add:profile:name=set1,type=isuptmrprofile,T6=30000,T8=12000,T35=18000
Step 7
Create a profile for your new ISUP timer values using the following command:
prov-add:component:name=comp_name, isuptmrprofile=profile_name
Where:
componentMML component type name for signaling service or trunk group profiles. Enter one of the following:
sigpathprofComponent type for signaling service profiles. trnkgrpprofComponent type for trunk group profiles.
comp_nameMML name for the signaling service or trunk group profile to be associated with the set of new ISUP timer values, as set in Step 6. profile_nameMML name for the profile that contains the customized set of ISUP measurements, as set in Step 6.
Once the new ISUP timer values have been set, proceed to Step 9.
Step 8
Modify the parameters for the desired ISUP timers by entering the following command:
prov-ed:profile:name=profile_name,type=isuptmrprofile, timer_number=timer_value, timer_number=timer_value, timer_number=timer_value...
Where:
profile_nameMML name for the profile that contains the set of ISUP measurements being used.
8-108
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
timer_numbernumber of the timer to be modified. timer_valueNew value for the selected ISUP timer.
Note
Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on the valid ranges for the ISUP timers. If you enter a number outside the valid range, the default value is used. In the following example, the values of the T6, T8, and T33 ISUP timers are modified:
prov-ed:profile:name=set1,type=isuptmrprofile,T6=180,T8=12,T33=14
Once the new ISUP timer values have been set, proceed to Step 9.
Step 9
Save and activate your provisioning session, using the procedure in the Saving and Activating your Provisioning Changes section on page 3-69.
Log in to your active Cisco MGC and change directories to the /opt/CiscoMGC/etc directory using the following UNIX command:
cd /opt/CiscoMGC/etc
Open the XECfgParm.dat file in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to false. Save the file and exit the text editor. Shut down the Cisco MGC software on your active Cisco MGC, using the procedure in the Shutting Down the Cisco MGC Software Manually section on page 2-4.
Note
Shutting down the Cisco MGC software on the active Cisco MGC causes the currently standby Cisco MGC to become the active Cisco MGC.
Step 6 Step 7
Restart the Cisco MGC software on this Cisco MGC, using the procedure in the Starting the Cisco MGC Software section on page 2-2. Once the Cisco MGC software is fully activated, log in to the active Cisco MGC and perform a manual switchover, using the procedure in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Step 8
Once the manual switchover is complete, log in to the newly active Cisco MGC, start an MML session and enter the following command to synchronize the Cisco MGCs:
prov-sync
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-109
Step 9
Once the synchronization is complete, perform a manual switchover using the procedure in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Step 10
Once the manual switchover is complete, log in to your newly standby Cisco MGC and change directories to the /opt/CiscoMGC/etc directory using the following UNIX command:
cd /opt/CiscoMGC/etc
Open the XECfgParm.dat file in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to true. Save the file and exit the text editor. Shut down the Cisco MGC software on your standby Cisco MGC by entering the following UNIX command:
/etc/init.d/CiscoMGC stop
Step 15
Restart the Cisco MGC software on this Cisco MGC by entering the following command:
/etc/init.d/CiscoMGC start
Starting an Japanese SS7 Signaling Link Test, page 8-110 Retrieving Results for a Japanese SS7 Signaling Link Test, page 8-110
Where link is the MML name of a link configured for Japanese SS7. For example, to start a signaling link test on a link called ls1-link1, you would enter the following command:
sta-ss7-slt:ls1-link1
Where link is the MML name of a link configured for Japanese SS7.
8-110
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
For example, to retrieve the results of a signaling link test run on a link called ls1-link1, you would enter the following command:
rtrv-ss7-slt:ls1-link1
The system returns a result that indicates the name of the link and the status of the signaling link test. The valid status responses are listed below:
TEST PASSED TEST FAILED (reasons for failure may be any of the following:)
TEST TIMEOUT LINK INACTIVE LINKSET INACTIVE ROUTE UNAVAILABLE INVALID TEST PATTERN INVALID SLC FLOW CONTROL ON UNKNOWN REASON
For example, here is a sample response to a signaling link test run on a link called ls1-link1:
Media Gateway Controller - MGC-01 2000-01-12 15:18:41 M RTRV "ls1link1:TEST PASSED; COMPLETED 15:18:34"
Starting a Japanese SS7 Signaling Route Test, page 8-111 Retrieving Results for a Japanese SS7 Signaling Route Test, page 8-112
Where:
pt_codeMML name of an adjacent point code (APC) or destination point code (DPC) configured for Japanese SS7. linksetMML name of a linkset associated with the specified destination.
For example, to start a signaling route test on a point code called dpc1 associated with a linkset called ls1, you would enter the following command:
sta-ss7-srt:dpc1:lset=ls1
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-111
Where:
pt_codeMML name of an adjacent point code (APC) or destination point code (DPC) configured for Japanese SS7. linksetMML name of a linkset associated with the specified destination.
For example, to retrieve the results of a signaling route test run on a point code called dpc1 associated with a linkset called ls1, you would enter the following command:
rtrv-ss7-srt:dpc1:lset=ls1
The system returns a result that indicates the name of the link and the status of the signaling route test. The valid status responses are listed below:
TEST PASSED TEST FAILED (reasons for failure may be any of the following:)
TEST TIMEOUT LINK INACTIVE LINKSET INACTIVE ROUTE UNAVAILABLE INVALID TEST PATTERN INVALID SLC FLOW CONTROL ON UNKNOWN REASON
For example, here is a sample response to a signaling route test run on a point code called dpc1 associated with a linkset called ls1:
Media Gateway Controller - MGC-01 2000-01-12 15:20:09 M RTRV "dpc1:TEST FAILED; TEST TIMEOUT; COMPLETED 15:20:01"
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Search the active system log file, as described in the Viewing System Logs section on page 8-4, for logs that indicate that the dial plan was loaded incorrectly. If the dial plan was not loaded correctly, reload the dial plan by saving and activate your dial plan again as described in the Saving and Activating your Provisioning Changes section on page 3-69.
8-112
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving SS7 Network Related Problems
If there are no logs that indicate that the dial plan was loaded incorrectly, then proceed to Step 3.
Step 3
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc
Step 3 Step 4
Open the alarmCats.dat using a text editor, such as vi. The third column in the file indicates the severity level for each alarm. Verify that the severity level for the All C7 IP Links Fail alarm is set to 2. If it is set correctly, the procedure is complete. Otherwise, proceed to Step 5 to begin the process of correcting your configuration. Set the the severity level of the All C7 IP Links Fail alarm to 2. Save your changes and close the text editor. Repeat steps 2 through 6 on the standby Cisco MGC. Stop the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover from the active Cisco MGC, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. If this alarm occurs along with the LIF FAIL alarm on the failed destination address, proceed to Step 3. Otherwise, proceed to Step 5. Verify the functioning of the cabling between the Cisco MGC and the destination address. If the cables are functioning properly, proceed to Step 4.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-113
If bad cable(s) are found, replace them. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 4.
Step 4
Verify the functioning of the associated Cisco switch. If the switch is functioning properly, proceed to Step 5. If the switch is not functioning properly, refer to the documentation for your switch for troubleshooting information. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 5
Debug the IP connectivity between the Cisco MGC and the associated external node. If the IP connectivity is working correctly, proceed to Step 6. If the IP connectivity is not working correctly, refer to the documentation for the external node to determine a method to identify and fix the IP connectivity problem. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6
Determine the health of the associated external node. If the external node is working correctly, proceed to Step 7. If the external node is not healthy, refer to the documentation for the external node for troubleshooting information. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Convert the hexidecimal or decimal value to binary code. For example, if you found a log message indicating a problem with a point code in a ITU SS7 connection, identified with a hexidecimal value of 00:00:36:33, the converted binary value is 00000000000000000011011000110011.
Step 2
Remove the padding, based upon which point code address type applies to the point code (14, 16, or 24-bit).
Note
You can find an explanation of the point code address types in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Continuing with the example, since the problem is with an ITU SS7 connection, the address should be 14 bits in length, resulting in a binary value 11011000110011.
Note
If you are troubleshooting signaling problems for a Japanese ISUP connection, remember that the Cisco MGC transmits the higher order bits first for those point codes. The fields for any transmitted point code value you retrieve for a Japanese ISUP connection must be reversed while in its binary value for you to correctly identify the associated point code on the Cisco MGC.
Step 3
Convert the binary code into decimal, using the correct point code format.
8-114
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
Note
You can find an explanation of the point code formats in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Concluding the example, since the problem is with an ITU SS7 connection and the value came from a Cisco MGC log message, the address should use the ITU International point code format (3-bits/8-bits/3-bits, or 3-8-3), the resulting point code is 6.198.3.
Setting the Administrative State, page 8-116 Querying Local and Remote CIC States, page 8-121 Performing CIC Validation Tests, page 8-123 Resolving ISDN D-Channel Discrepancies, page 8-129 Unblocking CICs, page 8-131 Resetting CICs, page 8-132 Resolving Stuck CICs, page 8-133 Auditing Call States, page 8-137 Stopping Calls, page 8-137 Auditing an MGCP Media Gateway, page 8-140 Running a Manual Continuity Test, page 8-142 Verifying Continuity Test Settings, page 8-142 Media Gateway IP Destination/Link Out-of-Service, page 8-143 Calls Fail at the Cisco MGC, page 8-145 3.1 KHz (ISDN Category 3) Calls are Failing, page 8-146 Calls are Misrouting, page 8-146
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-115
Setting the Administrative State of a Cisco MGC, page 8-116 Setting the Administrative State of a Media Gateway, page 8-117 Setting the Administrative State of a Trunk Group, page 8-117 Setting the Administrative State of a Signaling Service, page 8-118 Setting the Administrative State of Spans, page 8-119 Setting the Administrative State of CICs, page 8-120
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:mgc:state
Where:
mgcThe MML name of the desired Cisco MGC. stateThe desired administrative state. The valid states are listed below:
lockMakes all bearer channels unavailable for call processing. If the state is set to lock, active
calls go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed.
unlockMakes all bearer channels available for call processing. If the state is set to unlock, the
Cisco MGC becomes available. New calls are allowed to use the unlocked bearer channels.
resetClears local and remote blocking on all bearer channels and they take on the blocking
view of remote side. For example, to set the administrative state of a Cisco MGC called mgc1 to unlock, enter the following command:
set-admin-state:mgc1:unlock
Step 2
Verify that the state of the Cisco MGC has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Cisco MGC section on page 3-61.
8-116
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:gway:state
Where:
Note
Not all media gateway types are applicable. Supported types are CU, MUX, MGW, and AVM external nodes.
stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the media gateway unavailable for call
processing. If the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the media gateway available for call
processing. If the state is set to unlock, the media gateway becomes available. New calls are allowed to use the affected bearer channels.
resetClears local and remote blocking on the bearer channels associated with the media
gateway and these bearer channels take on the blocking view of remote side. For example, to set the administrative state of a media gateway called sfgway to lock, enter the following command:
set-admin-state:sfgway:lock
Step 2
Verify that the state of the media gateway has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Media Gateway section on page 3-62.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:trkgrp:state
Where:
Note
This command can only be used for time-division multiplexing (TDM) trunk groups. Allow the corresponding MML name for component type "0020".
stateThe desired administrative state. The valid states are listed below:
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-117
lock Makes all bearer channels associated with the trunk group unavailable for call
processing. If the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the trunk group available for call
processing. If the state is set to unlock, the media gateway becomes available. New calls are allowed to use the affected bearer channels.
resetClears local and remote blocking on the bearer channels associated with the trunk group
and these bearer channels take on the blocking view of remote side. For example, to set the administrative state of a trunk group called trunkgrp1 to lock, enter the following command:
set-admin-state:trunkgrp1:lock
Step 2
Verify that the state of the trunk group has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Trunk Group section on page 3-62.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:sig_srv:state
Where:
sig_srvThe MML name of the desired signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the signaling service unavailable for call
processing. If the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the signaling service available for call
processing. If the state is set to unlock, the media gateway becomes available. New calls are allowed to use the affected bearer channels. For example, to set the administrative state of a signaling service called nassrv1 to lock, enter the following command:
set-admin-state:nassrv1:lock
8-118
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
Step 2
Verify that the state of the Cisco MGC has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of a Signaling Service section on page 3-62.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:sig_srv:span=x:state
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
xA16-bit value that identifies an ISDN/PRI physical cable. stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the span unavailable for call processing. If the
state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the span available for call processing. If the
state is set to unlock, the span becomes available. New calls are allowed to use the affected bearer channels. For example, to set the administrative state of span number 2 associated with a signaling service called ss7svc1 to unlock, you would enter the following command:
set-admin-state:ss7svc1:span=2:lock
Step 2
Verify that the state of the bearer channels have changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of Spans section on page 3-63.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-119
To set the administrative state of a bearer channel or a range of bearer channels in a span, perform the following steps:
Step 1
Log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-admin-state:sig_srv:span=x,bc=y[,rng=range]:state
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
xA16-bit value that identifies an ISDN/PRI physical cable. yA numeric value that identifies the non-ISUP bearer channel number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved. stateThe desired administrative state. The valid states are listed below:
lockMakes the specified bearer channels unavailable for call processing. If the state is set to
lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes the specified bearer channels available for call processing. If the state is set to
unlock, the bearer channels become available. New calls are allowed to use the affected bearer channels. For example, to set the administrative state of bearer channels numbers 2 through 6, associated with a signaling service called ss7svc1, to unlock, you would enter the following command:
rtrv-admin-state:ss7svc1:span=2,bc=2,rng=5:unlock
Step 2
Verify that the state of the bearer channels have changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of Spans section on page 3-63.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-admin-state:sig_srv:cic=number[,rng=range]:state
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
8-120
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
numberA valid CIC number. rangeA value such that y+range is a valid CIC number. The administrative state for all CICs between y and y+range are retrieved. stateThe desired administrative state. The valid states are listed below:
lock Makes all bearer channels associated with the CICs unavailable for call processing. If
the state is set to lock, active calls on the affected bearer channels go into pending state, where calls remain up until either party voluntarily releases the call. New calls are disallowed on the affected bearer channels.
unlockMakes all bearer channels associated with the CICs available for call processing. If the
state is set to unlock, the CICs become available. New calls are allowed to use the affected bearer channels.
resetClears local and remote blocking on the bearer channels associated with the CICs and
these bearer channels take on the blocking view of remote side. For example, to set the administrative state of CICs 2 through 11, associated with a signaling service called ss7svc1, to lock, you would enter the following command:
set-admin-state:ss7svc1:cic=2,rng=9:lock
Step 2
Verify that the state of the Cisco MGC has changed by entering the rtrv-admin-state MML command, as described in the Retrieving the Administrative State of CICs section on page 3-64.
Where:
sig_srvThe MML name for the signaling service associated with the affected CICs. numberThe number of the first CIC in the range of affected CICs. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. All CICs between number and number+range are displayed.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-121
Note
Not all SS7 variants support the querying of CICs. If this command is executed on a signaling service that is configured for an SS7 variant that does not support the querying of CICs, an error code, SABT, is returned once the query operation times out. Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for more information on the SABT error code.
Note
The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, the range option cannot be used with this command. Querying of CICs can only be done one CIC number at a time for point codes associated with an ISUP signaling service configured to issue individual supervision messages. For example, to query the state of CICs 20 through 24, associated with a signaling service called ss7svc1, you would enter the following command:
query-cic:ss7svc1:cic=20,rng=4
The response lists the local and remote primary and secondary states of the requested CICs. If the response indicates that the mismatch is due to a problem on the local side, you can attempt to resolve the state mismatch using the instructions in the Resolving Local and Remote CIC State Mismatch section on page 8-123. If the response indicates that the mismatch is due to a problem on the remote side, you must contact the personnel at the remote site to resolve the problem. The valid values for the fields found in the response to this command are as follows:
8-122
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
OG_BUSY_REM_BLOCOutgoing is busy, blocked remotely OG_BUSY_BOTH_BLOCOutgoing is busy, blocked both remotely and locally IDLEThe circuit is idle, available for use IDLE_LOC_BLOCIdle, blocked locally IDLE_REM_BLOCIdle, blocked locally IDLE_BOTH_BLOCIdle, blocked both locally and remotely
Where:
sig_srvThe MML name for the signaling service associated with the affected CICs. numberThe number of the first CIC in the range of affected CICs. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. The system attempts to resolve state mismatches for all CICs between number and number+range.
Note
The rslv option can only be used if your system used ANSI SS7 signaling. If your system uses ITU SS7 signaling and you use this command, the rslv option is ignored and a regular query-cic operation is performed.
Note
The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, the range option cannot be used with this command. Resolving CIC state mismatches can only be done one CIC number at a time for point codes associated with an ISUP signaling service configured to issue individual supervision messages. If the command fails in its attempt to resolve the local and remote CIC state mismatch, collect system data as described in the Collecting System Data for Cisco TAC section on page 8-8 and contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-123
Note
CIC validation tests can only be performed on CICs associated with ANSI SS7-based DPCs. To perform a circuit validation test, complete the following steps:
Step 1
Start an MML session on the active Cisco MGC and validate the properties for a particular circuit identification code (CIC) using the following command:
vld-cic:dest_pc:cic=number
Where:
dest_pcThe MML name for the DPC associated with the affected CIC. numberThe trunk identification number for the affected CIC.
If the circuit validation test is passed, the system returns a message similar to the following:
Media Gateway Controller - MGC-01 2000-03-07 09:35:19 M RTRV "dms100-pc:CIC=105,PASSED"
If the circuit validation test is failed, the system returns a message similar to the following:
Media Gateway Controller - MGC-01 2000-03-07 09:35:19 M RTRV "dms100-pc:CIC=105,FAIL" LOC: GRP=DIG,SEIZ=EVEN,ALM=UNK,COT=NONE LOC: TRK=1003,A_CLLI=dms1003****,Z_CLLI=na********* REM: GRP=DIG,SEIZ=ODD,ALM=SOFT,COT=STAT
The fields in the LOC line are values associated with the Cisco MGC. The fields in the REM line are values associated with the far-end exchange. The valid values for those fields are described below.
GRPCircuit group carrier indicator. The values in these fields should be the same in the LOC and REM lines. The valid values for this field are:
UNKUnknown circuit group carrier type ANLAnalog circuit group carrier type DIGDigital circuit group carrier type ANDAnalog and digital circuit group carrier type
SIEZDouble seizing indicator. The values for this field in the LOC line should be logically opposite to the value for the REM line. The valid values for this field are:
NONENo circuit control. When one line is set to NONE, the other should be set to ALL. ALLAll circuit control. When one line is set to ALL, the other should be set to NONE. EVENEven circuit control. When one line is set to EVEN, the other should be set to ODD. ODDOdd circuit control. When one line is set to ODD, the other should be set to EVEN.
ALMAlarm carrier indicator. The values in these fields should be the same in the LOC and REM lines. The valid values for this field are:
UNKUnknown alarm carrier SOFTSoftware alarm carrier HARDHardware alarm carrier
8-124
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
COTContinuity check requirements indicator. The values in these fields should be the same in the LOC and REM lines. The valid values for this field are:
UNKUnknown continuity check requirements NONENo continuity check requirements STATStatistical continuity check requirements PERCPer call continuity check requirements
TRKTrunk number. This field is always displayed in the LOC line. It is only displayed in the REM line when the circuit identification names for the Cisco MGC and the far-end exchange do not match. A_CLLICommon language location identifier (CLLI) code for either the far-end exchange or the Cisco MGC. The CLLIs for each are sorted alphabetically, and the A_CLLI field is populated with the CLLI that is found to be first. This field is always displayed in the LOC line. It is displayed in the REM line only when the CLLIs for the Cisco MGC and the far-end exchange do not match. Z_CLLICLLI code for either the far-end exchange or the Cisco MGC. The CLLIs for each are sorted alphabetically, and the Z_CLLI field is populated with the CLLI that is found to be second. This field is always displayed in the LOC line. It is displayed in the REM line only when the CLLIs for the Cisco MGC and the far-end exchange do not match.
If the circuit validation test passes, proceed to Step 14. If the circuit validation test fails, proceed to Step 2.
Step 2
Determine which settings are not correct by comparing the values displayed in the LOC field (from the Cisco MGC) to those in the REM field (from the associated far-end exchange), based on the field descriptions found above. Consult your provisioning records to determine whether the settings on the Cisco MGC and/or the associated far-end exchange need to be modified to resolve the error. If the settings on the Cisco MGC need to be modified to resolve the error, proceed to Step 4. If the settings on the associated far-end exchange need to be modified to resolve the error, contact the provider that operates the switch and work with them to resolve the configuration error.
Step 3
Step 4
Identify the signaling service associated with the affected DPC using the following command:
prov-rtrv:ss7path:"all"
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-125
The response lists the SS7 signaling services and their associated DPCs. Search for the DPC associated with the trunk to identify the name of the SS7 signaling service. In the example, dms100-pc is the name of the DPC associated with the trunk. The SS7 signaling service names are in the column to the immediate left of the DPCs, so the name of the associated SS7 signaling service in the example is ss7dms.
Step 5
Identify the MML names of the mismatched settings for the affected signaling service found in Step 4 using the following command:
prov-rtrv:sigsvcprop:name="sig_serv"
Where sig_serv is the MML name of the affected signaling service. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2000-09-26 15:57:29 M RTRV "session=active:sigsvcprop" /* adjDestinations = 16 AlarmCarrier = 0 BothwayWorking = 1 CctGrpCarrier = 2 CGBA2 = 0 CircHopCount = 0 CLIPEss = 0 CotInTone = 2010 CotOutTone = 2010 CotPercentage = 0 dialogRange = 0 ExtCOT = Loop ForwardCLIinIAM = 1 ForwardSegmentedNEED = 1 GLARE = 0 GRA2 = 0 GRSEnabled = false InternationalPrefix = 0 layerRetries = 2 layerTimer = 10 maxMessageLength = 250 mtp3Queue = 1024 NationalPrefix = 0 NatureOfAddrHandling = 0 Normalization = 0 OMaxDigits = 24 OMinDigits = 0 OOverlap = 0 OwnClli = na RedirMax = 3 restartTimer = 10 RoutePref = 0 sendAfterRestart = 16 slsTimer = 300 srtTimer = 300 sstTimer = 300 standard = ANSI92 SwitchID = 0 TMaxDigits = 24 TMinDigits = 0 TOverlap = 0 variant = SS7-ANSI VOIPPrefix = 0
The response above can be mapped to the response to the circuit validation test in Step 1, as listed below:
8-126
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
CctGrpCarrierThe value in this field maps to the value in the GRP field, as follows:
0Equal to UNK (unknown carrier) in the GRP field. 1Equal to ANL (analog carrier) in the GRP field. 2Equal to DIG (digital carrier) in the GRP field. 3Equal to AND (analog and diglossia carrier) in the GRP field.
GlareThe value in this field maps to the value in the SEIZ field, as follows:
0 or 3Equal to NONE (no circuit control) in the SEIZ field. 1Equal to ALL (all circuit control) in the SEIZ field. 2Equal to ODD (odd circuit control) in the SEIZ field when the OPC is less than the
associated DPC. Equal to EVEN (even circuit control) in the SEIZ field when the OPC is greater than the associated DPC.
AlarmCarrierThe value in this field maps to the value in the ALM field, as follows:
0Equal to UNK (unknown) in the ALM field. 1Equal to SOFT (software handling) in the ALM field. 2Equal to HARD (hardware handling) in the ALM field.
CotPercentage and ExtCOTThe values in these field maps to the value in the COT field, as follows:
CotPercentage is undefined and ExtCOT is not set to Loop or TransponderEqual to UNK
Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Modify the appropriate signaling service settings using the following command:
prov-ed:sigsvcprop:name=sig_svc,param_name=param_value,param_name=param_value,...
Where:
sig_svcThe MML name for the affected signaling service. param_nameThe MML name for a mismatched setting. param_valueThe correct value for a mismatched setting.
For example, to change the settings for the COT to per call and seizing (glare) to no circuit control for the ss7dms signaling service, you would enter the following command:
prov-ed:sigsvcprop:name="ss7dms",ExtCOT="Loop", CotPercentage=100,GLARE="0"
Step 8
If your Cisco MGC is provisioned for a switched environment and you need to modify the COT and/or seizing (glare) properties, the trunk group properties need to be modified. If you need to modify the trunk group properties, proceed to Step 9. If you do not need to modify the trunk group properties, proceed to Step 12.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-127
Step 9
Identify the trunk group associated with the affected DPC using the following command:
prov-rtrv:trnkgrp:svc=sig_serv
Where: sig_servThe MML name of the SS7 signaling service identified in Step 4. The system returns a message similar to the following:
MGC-01 - Media Gateway Controller 2000-09-26 15:55:17 M RTRV "session=active:trnkgrp" /* NAME CLLI SVCTYPESELSEQQABLE ---- --- --- ----------------1003DMS100CLLIss7dmsTDM_ISUPASCN
The response lists the trunk group associated with the affected SS7 signaling service. The MML name of the trunk group is found in the NAME column. In the example, ss7dms is the name of the SS7 signaling service associated with the trunk. The trunk group names are in the first column, so the name of the associated trunk group in the example is 1003.
Step 10
Identify the MML names of the mismatched settings for the affected trunk group found in Step 9 using the following command:
prov-rtrv:trnkgrpprop:name="trnk_grp"
Where: trnk_grpThe MML name of the affected trunk group. The system returns a message similar to the following:
mgc-01 - Media Gateway Controller 2000-09-26 15:57:29 M RTRV "session=active:trnkgrpprop" /* CarrierIdentity = 0333 CLLI = GR31764KB5 CompressionType = 1 CotPercentage = 1 CustGrpId = V123 EchoCanRequired = 0 ExtCOT = Loop GLARE = 2 Npa = 919 RingNoAnswer = 100000 SatelliteInd = 0 ScreenFailAction = 0 */
Step 11
Modify the appropriate trunk group settings using the following command:
prov-ed:trnkgrp:name=trnk_grp,param_name=param_value,param_name=param_value,...
Where:
trnk_grpThe MML name for the affected trunk group. param_nameThe MML name for a mismatched setting. param_valueThe correct value for a mismatched setting.
Note
The values for the COT and/or seizing properties entered here should match the values set in Step 7.
8-128
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
For example, to change the settings for the COT to per call and seizing (glare) to no circuit control for the trnkgrpdms trunk group, you would enter the following command:
prov-ed:ztrnkgrp:name="trnkgrpdms",ExtCOT="Loop", CotPercentage=100,GLARE="0"
Step 12 Step 13
Activate your new configuration as described in the Saving and Activating your Provisioning Changes section on page 3-69. Return to Step 1 and enter the vld-cic command again. If the response indicates that the test has passed, proceed to Step 14. If the response indicates that the test has failed, resume performing this procedure from Step 2 and modify the mismatched settings identified in the latest command response.
Step 14
Repeat Steps 1 through 13 for each additional CIC you want to test.
Enter the following command at the active Cisco MGC to change directories:
cd $BASEDIR/etc
Step 2
Determine the component IDs associated with the D-channel number identified in the log text by searching for the D-channel number in the data files. For example, if the log message contains the following text:
PROT_ERR_ISDN:Error message from ISDN:Receive MGMT_ERROR_IND for set 1, channel 2854
The D-channel number in the example is 2854. Therefore, you would search for occurrences of D-channel 2854 in the data files. Enter the following command to search the data files for the identified D-channel number:
grep d_num *.dat
Where d_num is the D-channel number identified in the alarm message. The system returns a message similar to the following:
sigChanDev.dat:001002bd sigChanDev.dat:001002be
00160002 00160002
1 1
0034015e 0034015e
00030011 00030011
00060001 00060002
2854 2854
The response lists the data file(s) in which the D-channel number found, along with the associated properties. In the example above, the D-channel number, 2854, is found twice in the sigChanDev.dat file. The component IDs are in the column immediately following the data file name. So, in this example, the component IDs are 001002bd and 001002be.
Step 3
Determine the MML name of an IP link associated with one of the component IDs you identified in Step 2 using the following command:
grep comp_ID components.dat
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-129
The response lists the properties associated with your selected component ID. The MML name for the IP link is in the third column in the response. In the above example, bh531-31 is the MML name for the IP link.
Step 4 Step 5
Repeat Step 3 for each component ID identified in Step 2. Start an MML session from the active Cisco MGC and enter the following command to determine the MML name for the signaling service associated with the IP link(s) identified in Step 3:
prov-rtrv:iplnk:name="ip_link"
Where: ip_link The MML name for an IP link(s) identified in Step 3. The system returns a message similar to the following:
Media Gateway Controller 2000-06-08 13:49:53 M RTRV "session=active:iplnk" /* NAME = bh531-31 DESC = IP link-backhaul svc mgx8260 EAST SVC = bh531-3 IF = enif1 IPADDR = IP_Addr1 PORT = 7007 PEERADDR = 10.15.26.20 PEERPORT = 7007 PRI = 1 SIGSLOT = 11 SIGPORT = 38 */
The response lists the properties associated with your selected IP link. The MML name for the signaling service associated with the link is in the SVC field. In the above example, bh531-3 is the MML name for the signaling service. Note the values in the SIGSLOT and SIGPORT fields. These values are used later to determine whether the D-channel is defined on the media gateway.
Step 6
Enter the following command to retrieve the properties for the signaling service identified in Step 5:
rtrv-dest:sig_serv
Where sig_serv is the MML name for a signaling service identified in Step 5. The system returns a message similar to the following:
Media Gateway Controller 2000-06-08 13:50:26 M RTRV "bh531-3:PKG=ISDNPRI,ASSOC=SWITCHED,PST=OOS,SST=UND"
Step 7
Log into the associated media gateway and determine whether the D-channel is defined. Refer to the documentation for the media gateway for information on how to verify whether the D-channel is defined. For example, to determine whether a D-channel is defined for a Cisco MGX8260 media gateway, you would enter the following command:
lsdchan 12.39
The values, 12.39, specify the D-channel. These numbers are determined by adding 1 to the SIGSLOT and SIGPORT values identified in Step 5. The media gateway responds with a message that indicates whether the D-channel is defined.
8-130
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
Step 8
Consult your provisioning records and determine whether the identified D-channel should exist. If your provisioning records indicate that the D-channel should exist, proceed to Step 9. If your provisioning records indicate that the D-channel should not exist, proceed to Step 10.
Step 9
Define the D-channel on the associated media gateway. Refer to the documentation for the media gateway for information on how to define a D-channel. The procedure is finished.
Step 10 Step 11
Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Delete the appropriate D-channel(s) using the following command:
prov-dlt:iplnk:name=ip_link,...
Where ip_link is the MML name(s) for an IP link identified in Step 3. For example, to delete a D-channel named bh531-31, you would enter the following command:
prov-dlt:iplink:name="bh531-31"
Step 12
Delete the signaling service associated with the D-channel(s) using the following command:
prov-dlt:ipfaspath:name=sig_serv
Where sig_serv is the MML name for a signaling service identified in Step 5. For example, to delete a signaling service named bh531-3, you would enter the following command:
prov-dlt:ipfaspath:name="bh531-3"
Step 13
Activate your new configuration as described in the Saving and Activating your Provisioning Changes section on page 3-69.
Unblocking CICs
You may need to unblock a CIC or a range of CICs on your Cisco MGC. There are two types of blocking on a CIC, local and remote.
Where:
sig_svcThe MML name of the signaling service associated with the CICs to be unblocked. numberThe number of the affected CIC.
For example, to unblock CIC number 2, which is associated with a signaling service called ss7svc1, you would enter the following command:
unblk-cic:ss7svc1:CIC=2
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-131
To unblock a range of CICs, log in to your active Cisco MGC, start an MML session, and enter the following command:
unblk-cic:sig_svc:CIC=number,RNG=range
Where:
sig_svcThe MML name of a signaling service associated with the CICs you want to unblock. numberThe number of the first CIC in the range of CICs you want to unblock. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. All CICs between number and number+range are displayed.
Note
The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, use of the range option causes individual supervision messages to be issued for each CIC in the range, instead a single group supervision message. For example, to unblock CIC number 1 through 20, which are associated with a signaling service called ss7svc1, you would enter the following command:
unblk-cic:ss7svc1:cic=1,rng=19
To verify that the CIC(s) have been successfully unblocked, retrieve the status of the affected CICs as described in the Verifying CIC States section on page 3-13. If the CIC(s) are still blocked, proceed to the Resetting CICs section on page 8-132.
Resetting CICs
When trying to clear a blocked CIC or range of CICs, you may need to perform a reset on the affected CIC(s) using the reset-cic MML command.
Note
The reset-cic MML command is not supported for signaling services that use variants of the BTNUP protocol. To reset a single CIC, log in to your active Cisco MGC, start an MML session and enter the following command:
reset-cic:sig_srv:CIC=number
Where:
sig_srvThe MML name of the signaling service associated with the CICs to be reset. numberThe number of the affected CIC.
8-132
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
For example, to reset CIC number 2, which is associated with a signaling service called ss7svc1, you would enter the following command:
reset-cic:ss7svc1:CIC=2
To reset a range of CICs, log in to your active Cisco MGC, start an MML session, and enter the following command:
reset-cic:sig_srv:CIC=number,RNG=range
Where:
sig_srvThe MML name of a signaling service associated with the CICs you want to reset. numberThe number of the first CIC in the range of CICs you want to reset. rangeA number such that number+range is the number of the last CIC in the range of affected CICs. All CICs between number and number+range are displayed.
Note
The Cisco MGC software can be configured to issue individual or group supervision messages for point codes that are associated with an ISUP signaling service. ISUP signaling services issue group supervision messages by default. If an ISUP signaling service is configured to issue individual supervision messages, use of the range option causes individual supervision messages to be issued for each CIC in the range, instead a single group supervision message. For example, to reset CICs number 1 through 20, which are associated with a signaling service called ss7svc1, you would enter the following command:
reset-cic:ss7svc1:cic=1,rng=19
To verify that the CIC(s) have been successfully reset, retrieve the status of the affected CICs as described in the Verifying CIC States section on page 3-13. If the CIC(s) are still blocked, proceed to the Resolving Stuck CICs section on page 8-133.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-133
Note
If you suspect that you have stuck CICs, and you do not want to wait for the audit cron job to be performed, or if the audit cron job appears to be unable to clear your stuck CICs, perform the steps identified in the Manually Resolving Stuck CICs section on page 8-134.
Note
The format of the CDR is dependent upon how you have configured the associated XECfgParm.dat configuration parameters. For more information on XECfgParm.dat configuration, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. For more information on CDRs, refer to the Cisco Media Gateway Controller Software Release 9 Billing Interface Guide. If you want to run the audit cron job more than once a day, increase the frequency of the audit in the mgcusr crontab entry. You must have system administration authority to use crontab. For more information on crontab, enter the UNIX command, man crontab, on your Cisco MGC.
Note
The audit cron job is not run by the system when the call engines CPU load is greater than the limit set in the XECfgParm.dat file. For more information on XECfgParm.dat configuration, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Set the logging level of the call engine process (eng-01) to info, using the procedure described in the Changing the Log Level for Processes section on page 8-6. Perform a call state audit, using the procedure described in the Auditing Call States section on page 8-137. When you search the active system log file, look for a CP_INFO_CHAN_STATE message containing the following text:
NAS is idle, SC is busy
If you find this kind of CP_INFO_CHAN_STATE message in the active system log file, proceed to Step 4. Otherwise, proceed to Step 16.
Step 4
There should be two associated CP_ERR_AUEP messages, one containing information on the affected span and bearer channel and another containing information on the affected CIC.
8-134
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
Search the active system log file for a CP_ERR_AUEP message containing the following text:
Audit:failed to audit end point
In the first message, which contains information on the affected span and bearer channel, the text that immediately follows the word point identifies the following:
The MML name of the media gateway destination associated with the affected span and bearer channel (nasssvc1 in the example). The internal hexadecimal code associated with the identified media gateway destination (00140001 in the example). This number appears in brackets. The affected span number, in hexadecimal (0 in the example). The affected bearer channel number, in hexadecimal (2 in the example).
In the second message, which contains information on the affected CIC, the text that immediately follows the word point identifies the following:
Step 5 Step 6 Step 7
The MML name of the signaling service associated with the affected CIC (sigsrv1 in the example). The internal hexadecimal code associated with the identified signaling service (00130002 in the example). This number appears in brackets. The affected span number, in hexadecimal (ffff in the example). This field for this type of message is always set to ffff, because there is no correlation to span in SS7 networks. The affected CIC number, in hexadecimal (2 in the example).
Convert the hexadecimal values for the span, bearer channel, and CIC into decimal values. Using the information gathered in steps 4 and 5, stop the call on an affected CIC for its associated signaling service, using the procedure described in the Stopping Calls on CICs section on page 8-140. Using the information gathered in steps 4 and 5, stop the call on an affected span and bearer channel for its associated media gateway destination, using the procedure described in the Stopping Calls on Spans section on page 8-139. Reset the affected CIC using the procedure in the Resetting CICs section on page 8-132. Repeat steps 3 through 8, searching for additional sets of affected CICs, spans, and bearer channels, until you have addressed all of the stuck CICs identified by the call state audit. Repeat steps 3 and 4, performing a second call state audit and searching the active system log file to determine whether the previously identified CICs are still stuck. If the previously identified CICs are still stuck, proceed to Step 11. Otherwise, proceed to Step 14.
Step 11
Forcefully end the call on the signaling services and CICs identified in Step 4 by entering the following command:
kill-call:sig_srv:cic=num,confirm
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-135
Caution
The kill-call MML command forcibly ends calls locally. It does not send any SS7 messages to the far-end. Kill-call should only be used when you are attempting to clear stuck CICs that cannot be cleared using the reset-cic or stp-call MML commands. Where:
sig_srvMML name of the signaling service identified in Step 4. numNumber of the stuck CIC identified in Step 4.
For example, to forcefully stop a call on CIC 215, which is associated with a signaling service called sigsrv1, you would enter the following command:
kill-call:sigsrv1:cic=215,confirm
Repeat this step for each CIC you have identified as being stuck.
Step 12
Forcefully end the call on the signaling service, spans, and bearer channels identified in Step 4 by entering the following command:
kill-call:sig_srv:span=span_num,bc=bear_chan,confirm
Caution
The kill-call MML command forcibly ends calls locally. It does not send any SS7 messages to the far-end. Kill-call should only be used when you are attempting to clear stuck CICs that cannot be cleared using the reset-cic or stp-call MML commands. Where:
sig_srvMML name of the signaling service identified in Step 4. span_numNumber of the span identified in Step 4. bear_chanNumber of the stuck bearer channel identified in Step 4.
For example, to forcefully stop a call on bearer channel 2, which is on span 2, and is associated with a signaling service called nassvc1, you would enter the following command:
kill-call:nassvc1:span=2,bc=2,confirm
Repeat this step for each bearer channel you have identified as being stuck.
Step 13
Repeat steps 3 and 4, performing a third call state audit and searching the active system log file to determine whether the previously identified CICs are still stuck. If the previously identified CICs are no longer stuck, proceed to Step 14. If these CICs are still stuck, proceed to Step 15.
Set the logging level of the call engine (eng-01) to err, using the procedure described in the Changing the Log Level for Processes section on page 8-6. Perform a call trace as described in Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
8-136
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-aud
Note
The Cisco MGC does not indicate when the sta-aud MML command has completed its call state audit process. Wait a few minutes before proceeding to the next step.
The results of the call state audit are sent to the active system log file.
Step 3
View the active system log file as described in the Viewing System Logs section on page 8-4. If you see any call state mismatch logs in the active system log file, contact the Cisco TAC for assistance in resolving the call state mismatch. Refer to the Obtaining Technical Assistance section on page xxx for more information about contacting the Cisco TAC. Once you have finished audit the call states, enter the following command:
stp-aud
Step 4
Stopping Calls
You can use the stp-call MML command to stop calls gracefully on all traffic channels associated with a specified system resource. The stp-call MML command is described in the following sections:
Stopping Calls on a Cisco MGC, page 8-137 Stopping Calls on a Media Gateway, page 8-138 Stopping Calls on a Trunk Group, page 8-138 Stopping Calls on a Signaling Service, page 8-138 Stopping Calls on Spans, page 8-139 Stopping Calls on CICs, page 8-140
Where mgc is the MML name of the desired Cisco MGC. For example, to stop all active calls on all traffic channels on a Cisco MGC called mgc1, enter the following command:
stp-call:mgc1,confirm
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-137
Note
Not all media gateway types are applicable. Supported types are CU, MUX, MGW, and AVM external nodes. For example, to stop all active calls on all traffic channels on a media gateway called sfgway, enter the following command:
stp-call:sfgway,confirm
Note
This command can only be used for TDM trunk groups. For example, to stop all active calls on all traffic channels associated with a trunk group called trunkgrp1, enter the following command:
stp-call:trunkgrp1,confirm
Where sig_srv is the MML name of the desired signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the Cisco MGC over IP (that is, FE box<-sig/tdm->media gateway<-NI2/IP-> Cisco MGC). Signaling service or routeset associated with a DPC. EISUP signaling service.
8-138
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
For example, to stop all active calls on all traffic channels associated with a signaling service called nassrv1, enter the following command:
stp-call:nassrv1,confirm
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
For example, to stop all active calls on all bearer channels on a signaling service called ss7svc1 associated with span number 1, enter the following command:
stp-call:ss7svc1:span=1,confirm
To stop all active calls on a bearer channel, or a range of bearer channels, for a span associated with a signaling service, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-call:sig_srv:span=x,bc=y[,rng=range],confirm
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
xA16-bit value that identifies an ISDN/PRI physical cable. yA numeric value that identifies the non-ISUP bearer channel number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-139
For example, to stop all active calls on all bearer channel numbers 2 through 6, associated with a signaling service called ss7svc1, enter the following command:
stp-call:ss7svc1:span=2,bc=2,rng=5,confirm
Where:
sig_srv is the MML name of the signaling service. The following signaling service types are valid for this command:
For in-band TDM up to MUX and then time switched to TDM media and sent to the Cisco MGC. For in-band TDM signaling up to CU and then encapsulated and sent over IP to the Cisco MGC. For in-band TDM signaling up to the media gateway and then converted to NI2 and sent to the
numberA valid CIC number. rangeA value such that y+range is a valid bearer channel number. The administrative state for all bearer channels between y and y+range are retrieved.
For example, to stop all active calls on CICs 2 through 11, associated with a signaling service called ss7svc1, enter the following command:
stp-call:ss7svc1:cic=2,rng=9,confirm
Starting an MGCP Media Gateway Audit, page 8-140 Retrieving an MGCP Media Gateway Audit, page 8-141
8-140
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
Where MGCP_sig_srv is the MML name of the MGCP signaling service associated with the MGCP media gateway. For example, to start an audit on an MGCP media gateway associated with an MGCP signaling service called T-1-16, you would enter the following command:
sta-aud-gw:T-1-16
To run an audit all of your MGCP media gateways, log on to the active Cisco MGC, start an MML session, and enter the following command:
sta-aud-gw:all
Where MGCP_sig_srv is the MML name of the MGCP signaling service associated with the MGCP media gateway. For example, to retrieve an audit on an MGCP media gateway associated with an MGCP signaling service called T-1-16, you would enter the following command:
rtrv-aud-gw:T-1-16
The response indicates whether the audit has passed or failed. If the audit has failed, refer to the documentation for the associated MGCP media gateway for more information on troubleshooting the identified problem. To retrieve audits run on all of your MGCP media gateways, log on to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-aud-gw:all
The system returns a response similar to the one shown above, with a set of data for every MGCP media gateway associated with your system.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-141
Where:
sig_srvThe MML name of the signaling service associated with the CIC to be tested. numberThe identification number of the CIC to be tested.
For example, to run a manual COT on CIC number 5 of a signaling service named sigsrv1, you would enter the following command:
tst-cot:sigsrv1:cic=5
If the manual COT test should fail, verify the COT settings for the Cisco MGC and the associated media gateway, as described in the Verifying Continuity Test Settings section on page 8-142.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the COT properties for the associated SS7 signaling service or trunk group are correct by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
prov-rtrv:component:name="comp_name"
Where:
componentMML component type name for the SS7 signaling service or trunk group properties. Enter one of the following:
sigsvcpropComponent type for SS7 signaling service properties. trnkgrppropComponent type for trunk group properties.
comp_nameMML name for the affected SS7 signaling service or trunk group.
For example, if you wanted to verify the properties for an SS7 signaling service called ss7svc1, you would enter the following command:
prov-rtrv:sigsvcprop:name="ss7svc1"
If your system has been properly configured for dial plan use, the system returns a response similar to the following:
MGC-01 - Media Gateway Controller 2001-06-01 10:09:47 M RTRV "session=active:sigsvcprop" /* adjDestinations = 16 AlarmCarrier = 0 BothwayWorking = 1 CctGrpCarrier = 2 CGBA2 = 0 CircHopCount = 0 CLIPEss = 0 CotInTone = 2010
8-142
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
Step 3
If your settings for the highlighted properties match what is displayed above, proceed to Step 6. Otherwise, you must modify the COT settings on your Cisco MGC. To begin modifying the COT settings, start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Enter the following command to modify the COT settings on your Cisco MGC:
prov-ed:component:name="comp_name",cot_prop=value,cot_prop=value,...
Step 4
Where:
componentMML component type name for the SS7 signaling service or trunk group properties. Enter one of the following:
ss7pathComponent type for SS7 signaling services. trnkgrpComponent type for trunk groups.
Step 5 Step 6
comp_nameMML name for the affected SS7 signaling service or trunk group. cot_propName of the COT property you want to modify. valueValue for the specified COT property.
Save and activate your changes as described in the Saving and Activating your Provisioning Changes section on page 3-69. Debug the COT settings on the associated media gateway using the show cot dsp, show cot request, show cot summary, and debug cot detail commands. Refer to the documentation for the associated media gateway for more information on these commands. If debugging the COT settings on the media gateway does not reveal any problems, or does not fix the COT failure, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
An IP destination to a media gateway is out-of-service when both IP links associated with the destination are out-of-service.
Step 1
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-143
Step 2
Ping the affected MGC link from the associated media gateway, using the following UNIX command:
ping link_addr
Where link_addr is the IP address of the affected MGC link. Repeat this step if the second link for the destination is also out-of-service. If the links are unreachable, proceed to Step 10. Otherwise, proceed to Step 3.
Step 3
If the path between the Cisco MGC and the media gateway is defined using an MGCP signaling service, proceed to Step 4. If the path between the Cisco MGC and the media gateway is defined using a NAS signaling service, proceed to Step 5. Verify the MGCP interface on your media gateway is working properly. Refer to the documentation associated with the media gateway for more information. If the MGCP interface on your media gateway is working properly, proceed to Step 10. Otherwise, correct the problems with the MGCP interface as described in the documentation associated with the media gateway.
Step 4
Step 5
Identify which Redundant Link Manager (RLM) group is configured on the media gateway by entering the sh run command. For more information on this command, refer to the documentation associated with the media gateway. Verify that the RLM group identified in Step 5 is defined under the D-channel serial interface. Refer to the documentation associated with the media gateway for more information. If the RLM group is defined, proceed to Step 7. Otherwise, add the RLM group to the D-channel serial interface. Refer to the documentation associated with the media gateway for more information. If the link(s) returns to service, the procedure is complete. Otherwise, proceed to Step 7.
Step 6
Step 7
Reset the RLM group using the shut/no shut commands. Refer to the documentation associated with the media gateway for more information. If the link(s) return to service, the procedure is complete. Otherwise, proceed to Step 8.
Step 8
Verify that RLM messages are being acknowledged by the Cisco MGC using the debug command. Refer to the documentation associated with the media gateway for more information. If RLM messages are being acknowledged by the Cisco MGC, proceed to Step 10. Otherwise, proceed to Step 9.
Step 9
Verify that the configuration for RLM on the Cisco MGC matches the configuration on the media gateway. To display the configuration of the IP links on the Cisco MGC, enter the following MML command at the active Cisco MGC:
prov-rtrv:iplnk:"all"
IPADDR PORT NEXTHOP NETMASK --------------------IP_Addr1 3001 0.0.0.0 255.255.255.255 IP_Addr1 3001 0.0.0.0 255.255.255.255 IP_Addr1 3001 0.0.0.0 255.255.255.255
8-144
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
va-5300-203-2 172.24.200.20 */
3001
va-5300-203 1
enif1 0 0
Ensure that the IP addresses (IPADDR and PEERADDR) and the ports (PORT and PEERPORT) match the values used by the media gateway. If the values match, proceed to Step 10. Otherwise, if the changes need to be made on the media gateway, refer to the documentation for your media gateway for more information. If the changes need to be made on the Cisco MGC, start a dynamic reconfiguration session to make your changes, as described in the Invoking Dynamic Reconfiguration section on page 3-70. If the changes resolve the problem, the procedure is complete. Otherwise, proceed to Step 10.
Step 10
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Debug the interface on the media gateway associated with the Cisco MGC. If your system is configured for signaling, the interface is Q.931. If your system is configured for call control, the interface is MGCP. Refer to the documentation for the associated media gateway for more information on debugging the interface. If the calls in question do not appear on the media gateway, proceed to Step 3. Otherwise, resolve the problems with the interface as described in the documentation for the associated media gateway.
Step 3
Verify that the signaling channels are in-service, as described in the Verifying the Status of all Signaling Services section on page 3-8. If any of the signaling channels are out-of-service, attempt to bring them into service using the appropriate procedures. Otherwise, proceed to Step 4.
Step 4 Step 5
Run a call trace as described in the Performing a Call Trace section on page 8-148. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-145
Note
The following procedure is valid only if your Cisco PGW 2200 is using the BTNUP protocol.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. If your system is configured for the BTNUP protocol, proceed to Step 3. Otherwise, proceed to Step 7. Verify the setting for the defaultBC property on the trunk group associated with the failed calls by entering the following MML command at the active Cisco MGC:
prov-rtrv:trnkgrpprop:name="trnkgrpname"
Where trnkgrpname is the MML name of the trunk group associated with the failed calls. The system returns a response listing the values of all of the properties for the specified trunk group. The defaultBC property should be set to 3_1_KHZ to ensure proper processing of 3.1 KHz calls. If the defaultBC property is set to 3_1_KHZ, proceed to Step 7. Otherwise, proceed to Step 4.
Note
Setting the defaultBC property changes the identifying information for incoming 3.1 KHz (ISDN category 3) calls to match the settings for speech (ISDN category 2) calls. This change allows these calls to be processed by far-end switches that ordinarily reject 3.1 KHz calls.
Step 4 Step 5
Start a provisioning session as described in the Starting a Provisioning Session section on page 3-68. Modify the appropriate signaling service settings using the following command:
prov-ed:trnkgrpprop:name=trnkgrpname,defaultBC=3_1_KHZ
Where trnkgrpname is the MML name for the affected trunk group.
Step 6
Save and activate your new configuration as described in the Saving and Activating your Provisioning Changes section on page 3-69. If your system now completes 3.1 KHz calls, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Perform a diagnostic trace of your dial plan and routing data using the translation verification viewer, as described in the Using the Translation Verification Viewer section on page 3-142.
8-146
OL-0800-06
Chapter 8
Troubleshooting the Cisco MGC Node Resolving Bearer Channel Connection Problems
If the diagnostic trace does not reveal any configuration errors in your dial plan or routing data, proceed to Step 8. Otherwise, proceed to Step 3 to correct the configuration errors.
Step 3
Correct your dial plan and/or routing data as indicated in the output of the translation verification viewer and proceed to Step 7.
Note
The MML commands to be used to correct the data differ based on the elements of the configuration to be changed. For more information on the appropriate MML commands for changing the configuration of individual dial plan and routing data elements, refer to the Cisco Media Gateway Controller Software Release 9 Dial Plan Guide.
If the call that is misrouting is an MGCP dial call, the value for the MGCPDIALPKG result type could be incorrect. To correct the value of the MGCPDIALPKG result type, proceed to Step 4.
Step 4
Verify the current setting of the MGCPDIALPKG result type using the following MML command:
numan-rtrv:resulttable:custgrpid=group_number,name=result_name,resulttype=MGCPDIALPKG ,SETNAME=set_name
Where:
group_numberCustomer group identification number associated with the affected dial plan. result_nameResult name associated with the affected dial plan. set_nameName of the set associated with the affected MGCP dial plan.
Where:
Step 6
group_numberCustomer group identification number associated with the affected dial plan. result_nameResult name associated with the affected dial plan. set_nameName of the set associated with the affected MGCP dial plan. call_typeCall type for the MGCP calls. Valid values are digital, analog, and dynamic. xValue for data word 2. Valid values are 0 and 1.
Deploy the updated dial plan using the following MML command:
chg-dpl:custgrpid=group_number
Where group_number is the customer group identification number associated with the affected dial plan.
Step 7
Re-run the diagnostic trace on your dial plan as described in Step 1. If no errors are found, the procedure is complete. Otherwise, return to Step 3 and continue to modify your dial plan.
Note
If you have repeatedly modified your dial plan and routing data and errors are still appearing in the diagnostic trace, proceed to Step 8.
Step 8
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-147
Where:
sip_sig_srvThe MML name for the SIP signaling service associated with the SIP-to-SIP call. nameThe SIP call identification name. This can be obtained using the rtrv-sip MML command, as described in the Retrieving SIP Call Information section on page 3-66.
For example, the following MML command stops a SIP-to-SIP call on a SIP signaling service called sip_svc1:
kill-call:sip_svc1:[email protected],confirm
Tracing
Tracing on the Cisco MGC is described in the following sections:
Performing a Call Trace, page 8-148 Alternatives to Call Tracing, page 8-154 Performing a TCAP Trace, page 8-157
Starting A Call Trace, page 8-149 Stopping A Call Trace, page 8-150 Retrieving Names of Open Call Trace Files, page 8-151 Viewing the Call Trace, page 8-151 Deleting Call Trace Files, page 8-152 Understanding the Call Trace, page 8-152
8-148
OL-0800-06
Chapter 8
Log in to the active CiscoMGC, start an MML session, and enter the command. This command can be entered in any one of five different formats:
1. 2. 3. 4. 5.
sta-sc-trc:sig_path: [log=filenameprefix ][ ,prd=n] , confirm sta-sc-trc:sig_path:span=x[ ,rng=y][,log=filenameprefix][,prd=n ] sta-sc-trc:sig_path:span=x[[,tc=z],rng=y][,log=filenameprefix][,prd=n] sta-sc-trc:trkgrp: [log=filenameprefix][ ,prd=n] , confirm sta-sc-trc:trkgrp:trk=w[,rng=y][ ,log=filenameprefix][ ,prd=n ]
Where:
sig_pathThe logical signaling destination, such as an SS7 point code, an FAS path, an IP FAS path, or a DPNSS path, trkgrpThe logical trunk group of interest. filenameprefixTrace files are created and written to a file whose name can vary, depending on how the command is invoked. (A system log message is generated for each trace started. The filenames created as part of the sta-sc-trc command are contained in the log messages.) If the log= parameter is used, the value of this parameter is treated as a prefix to the filename. If no log= parameter is used, default filenameprefix values are used for each sta-sc-trc command. For example:
For sta-sc-trc:sig_path:confirm the filename is:
sig_path_yyyymmddhhmmss.btr
For sta-sc-trc:trkgrp:confirm the filename is:
ssIs the two-digit designation for the seconds (00 through 59).
nThe duration for which call trace information is collected, in seconds. At the expiration of this period, the system discontinues PDU collection on the signaling path and closes the log file. In the absence of this parameter, the default period is set to 1800 seconds (30 minutes), after which time the trace is stopped automatically. confirmAn option that is required to confirm a sig_path level trace or a trkgrp level trace command. This is required due to the large volume of data that can be generated and the potential performance impact of generating a large trace file. If the confirm option is not entered, the command is rejected, and you receive a message regarding the potential performance impact of this command. xThe span ID, an integer value denoting the traffic channel for the sig_path (NFAS only).
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-149
Chapter 8 Tracing
yThe range. When used with span=x, y is an optional range of spans beginning with span x and continuing for y spans. When used with tc=z, y is an optional range of traffic channels beginning with z and continuing for y traffic channels. When used with trk=w, y is an optional range of contiguous trunks to be traced starting with trunk w and ending with trunk y. yThe traffic channel of interest in integer form. wThe trunk of interest in integer form.
The following paragraphs present examples of each of the five possible command variations:
1.
A signaling path level trace traces all calls occurring on the signaling path. Use this format if the specific traffic channel the call uses is unknown.
sta-sc-trc:sig_path:log=filenameprefix, prd=600, confirm
A signaling path/span level trace traces calls at the span level. Use this format to reduce the amount of trace information if you know the span on which the call will be placed.
sta-sc-trc:sig_path:span=x
The confirm parameter is not needed in this form of the command because the volume of the trace file should not be an issue, nor should system performance.
3.
A signaling path/span/traffic channel level trace traces calls at the TC or CIC level. Use this format if the traffic channel on which the call will be placed is known.
sta-sc-trc:sig_path:span=x,tc= y
4.
A trunk group level trace traces all calls at a trunk group level. Use this format if the trunk group on which the call will be placed is known.
sta-sc-trc:trkgrp:confirm
A trunk group/trunk level trace traces only calls for a given trunk (or CIC). Use this format if the trunk group and trunk on which the call will be placed is known.
sta-sc-trc:trkgrp:trk=w
Note
Refer to the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide for detailed information on using the sta-sc-trc command.
Step 2
Where:
sig_srvMML name for the signaling service on which you are running a call trace. trkgrpMML name for the trunk group on which you are running a call trace.
8-150
OL-0800-06
Chapter 8
For example, to stop a call trace session on a trunk group called T-1-1, you would enter the following command:
stp-sc-trc:T-1-1
To stop all call trace sessions, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-sc-trc:all
Where filename is the name of the call trace output data file (.btr) you want to view.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-151
Chapter 8 Tracing
The script then displays a list of commands and prompts you to enter a command. The following commands are listed:
SDisplays the call trace data using the SimPrint utility. For more information on SimPrint, refer to the Understanding SimPrint section on page 8-154. FDisplays the call trace data using the SimPrint utility, and a listing of the sent and received fields. DDisplays the data in the .trc file associated with this call trace. For more information on .trc files, refer to the Understanding Trace Files section on page 8-153. CConverts the file created by this script to a .trc file. ADisplays the data in the .ca file associated with this call trace. For more information on .ca files, refer to the Understanding the Conversion Analyzer section on page 8-153. NDisplays the information for the next call ID in the list. PDisplays the information for the previous call ID in the list. LLists all of the call IDs in the data for this call trace. HProvides help on displaying call trace data. QCloses the script. idDisplays the information for a call ID that you specify.
The PDU that the Cisco MGC receives How the Cisco MGC decodes the PDU The PDU that the Cisco MGC sends out
Using call trace logs is easy if you remember how to locate the record of a call:
You can easily locate incoming signal messages that cause instances of engine call objects to be started by searching backwards in the call trace for new cmgCall. Similarly, you can find the end of a call by searching forward from the new cmgCall message for the next end cmgCall message.
8-152
OL-0800-06
Chapter 8
If you are experiencing problems with call processing and need to contact Cisco for support, you should run a call trace before contacting Cisco's TAC. The trace file helps the Cisco TAC troubleshoot the problem more effectively. For some problems, the Cisco TAC cannot begin troubleshooting the problem until you supply the trace file, so it is a good practice to create this file before contacting them.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-153
Chapter 8 Tracing
Understanding SimPrint
SimPrint (SP) is a viewing utility for .trc files. SP converts a .trc file into a sequence diagram that shows all of the external and internal events that occur in a .trc file. This is useful for getting an overview of what is occurring in the trace. The following list defines the terms used in the call flow printouts generated by the SimPrint tool:
LINERefers generically to the incoming and outgoing interfaces of the Cisco MGC. OCCOriginating Call Control state machine. The call is passed from the incoming interface to a protocol adapter, where it is converted into a generic message signaling unit (MSU) and sent to the OCC for parsing of MSU data to memory. LCMLightspeed Call Model state machine. The LCM is a generic call model containing event handlers to process generic call event data. This processing includes generic call analysis, requests for bearer channels, and transfer of the MSU to the appropriate TCC state machine. The LCM is also known as the Universal Call Model (UCM). ANALYSISThe LCM can perform generic call analysis, based on the content of the MSU. The LCM exchanges data with the call processing engine to analyze the MSU. After analysis is complete, an available circuit is identified and the LCM sends a bearer channel seizure request message to the CPM state machine. CPMConnection Plane Manager state machine. The CPM exchanges data with the call processing engine to seize and prepare a bearer channel for routing of the call data. CDRCall Detail Record. CDR information is created as a result of LCM processing of the MSU. TRIGGERIntelligent Network (IN) Trigger state machine. This state machine is used to send and receive IN trigger events to the Transfer Capabilities Application Part (TCAP) interface in the I/O channel controller (IOCC). This enables IN messages to be sent to a service control point (SCP). ENGINEThe call processing engine exchanges data with the LCM as generic call analysis is performed on the MSU and a bearer channel is seized and prepared for routing of the call data. TCCTerminating Call Control state machine. The TCC changes the call data into a protocol-specific protocol data unit (PDU) and passes the PDU to the terminating IOCC for routing to the outgoing interface.
If the hung call is a SIP-to-SIP call, proceed to Step 3. Otherwise, proceed to Step 2. Log in to the active Cisco MGC and enter the following command:
8-154
OL-0800-06
Chapter 8
prt-call:sig_path:cic=number [,log=xyz]
or
prt-call:sig_path:span=phys, bc=bchan [,log=xyz]
Where:
Note
This command allows for the use of wildcards for the sig_path parameter. numberA numeric value that identifies the ISUP circuit identification code (CIC) number. physA 16-bit value that identifies an ISDN/PRI physical cable. bchanA numeric value that identifies the non-ISUP bearer channel number. BC is used for non-ISUP trunks.; otherwise use CIC. xyzAn optional parameter that names the ASCII log file to which the output of this command is written. The name given in this parameter is used as a prefix to the actual name of the file, which includes the sig_path name, date, and time. If no log file name is provided, a default name consisting of the sig_path name, date, and time is created. The extension of these log files is .prt, and they are located in the $BASEDIR/var/trace directory.
For example, the following MML command prints call data for a signaling service called dms100-pc using a CIC of 124:
prt-call:dms100-pc:cic=124
Proceed to Step 4.
Step 3
Log in to the active Cisco MGC and enter the following command:
prt-call:sig_path:cid=name [,log=xyz]
Where:
sig_pathThe MML name for the signaling service associated with the SIP-to-SIP call. nameThe SIP call identification name. This can be obtained using the rtrv-sip MML command, as described in the Retrieving SIP Call Information section on page 3-66. xyzAn optional parameter that names the ASCII log file to which the output of this command is written. The name given in this parameter is used as a prefix to the actual name of the file, which includes the sig_path name, date, and time. If no log file name is provided, a default name consisting of the sig_path name, date, and time is created. The extension of these log files is .prt, and they are located in the $BASEDIR/var/trace directory.
For example, the following MML command prints call data for a particular call on a SIP signaling service called sip_svc1:
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-155
Chapter 8 Tracing
prt-call:sip_svc1:[email protected]
Step 4
Change directories to access the log file by entering the following command:
cd /opt/CiscoMGC/var/trace
Step 5
Use a text file viewer, such as vi, to view the contents of the log file.
Log in to the active Cisco MGC, start an MML session, and enter the following command:
sta-abn-trc:sig_path|all[,log=xyz] [,prd=n],confirm
Where:
Cisco MGC.
Signaling path of in-band TDM signaling up to CU and then encapsulated and sent over IP to
Note
This command allows for the use of wildcards for the sig_path parameter. allIndicates that the start trace command needs to be applied to the whole Cisco MGC, in which case only one trace file is generated. xyzThe name of an ASCII log file to which the output of this command is written. The name given in this parameter is used as a prefix to the actual name of the file, which includes the sig_path name, date, and time. If no log file name is provided, a default name consisting of the sig_path name, date, and time is created. The extension of these log files is .prt, and they are located in the $BASEDIR/var/trace directory. nThe period, in seconds, for which this trace is enabled, during which time any abnormal calls are traced. If this optional parameter is not used, the period defaults to 30 seconds.
For example, the following MML command prints call data for a signaling path called dms100-pc to a file named trace1 (since the period parameter, n, is not entered, the trace lasts for the default period, 30 seconds):
sta-abn-trc:dms100-pc,log=trace1,confirm
Step 2
8-156
OL-0800-06
Chapter 8
Step 3
Use a text file viewer, such as vi, to view the contents of the log file.
Where sig_srv is the MML name for a signaling service on which an abnormal call termination trace is being run. For example, to stop an abnormal call termination trace being run on a signaling service called ss7srv1, you would enter the following command:
stp-abn-trc:ss7srv1
To stop all in-progress abnormal call termination traces, log in to the active Cisco MGC, start an MML session, and enter the following command:
stp-abn-trc:all
Start the TCAP trace by logging in to the active Cisco MGC, starting an MML session, and entering the following command:
sta-tcap-trc
The system begins sending TCAP trace messages to the active system logs file.
Step 2 Step 3
View the active system logs file, as described in the Viewing System Logs section on page 8-4. Make note of any TCAP trace messages, such as hex dumps of messages sent to the SCCP layer. When your TCAP trace is complete, enter the following command to stop the TCAP trace:
stp-tcap-trc
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-157
Platform Troubleshooting
The following sections contain procedures related to resolving problems with the Cisco MGC platform:
Verifying Cisco MGC Ethernet Operation, page 8-158 Deleting Unnecessary Files to Increase Available Disk Space, page 8-158 Recovering from a Switchover Failure, page 8-159 Recovering from Cisco MGC Host(s) Failure, page 8-161 Restoring Stored Configuration Data, page 8-164 Restoring a Backup File from a Device, page 8-169 Configuration Export Failed Due to MMDB, page 8-171 Measurements Are Not Being Generated, page 8-171 Call Detail Records Are Not Being Generated, page 8-172 Resolving a Failed Connection to a Peer, page 8-172 Rebooting Software to Modify Configuration Parameters, page 8-173 Diagnosing SNMP Failure, page 8-174 Correcting the System Time, page 8-176 Securing your Network, page 8-177 TIBCO Interface Not Working, page 8-186
Log in to the active Cisco MGC and enter the following UNIX commands to determine whether the affected disk drive contains any call trace files in the /opt/CiscoMGC/var/trace directory:
cd /opt/CiscoMGC/var/trace ls
The system responds with a list of files in the directory. If the command response indicates that there are *.btr and *.trc files stored in this directory, then proceed to Step 2. Otherwise, proceed to Step 4.
8-158
OL-0800-06
Chapter 8
Note Step 2
Do not delete any call trace files related to troubleshooting any current system problems.
Delete the identified call trace files using the following UNIX command:
rm -i filename
Where filename is the name of the call trace file (either *.btr or *.trc) you have identified for deletion.
Step 3 Step 4
Repeat Step 2 for each additional call trace file identified for deletion. Enter the following UNIX commands to view the archived logs in the /opt/CiscoMGC/var/spool directory on the affected disk drive:
cd /opt/CiscoMGC/var/spool ls
The system responds with a list of files in the directory. Review the listed files. If there are archived log files listed that are no longer required, proceed to Step 5. Otherwise, proceed to Step 7.
Note
If you are backing up your system software on a regular basis, you can retrieve any files that you choose to delete from your backup files, if the need arises. For more information on backing up your system software, refer to the Backing Up System Software section on page 3-27.
Step 5
Delete the identified archived log files using the following UNIX command:
rm -i filename
Where filename is the name of the archived log file you have identified for deletion.
Step 6 Step 7
Repeat Step 5 for each additional identified archived log file. Use the config-lib viewer to view the contents of the configuration library, using the information in the Using the Config-Lib Viewer section on page 3-135. Determine whether any of the configurations listed are no longer necessary for the operation of your system. If any of the configurations can be deleted, delete them using the information in the Using the Config-Lib Viewer section on page 3-135.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC, start an MML session, and view the current alarms, as described in the Retrieving All Active Alarms section on page 8-3. Identify the critical alarm that caused the switchover attempt. To do this, review the alarm(s) that are listed in the response. There should be at least one critical alarm, and an alarm indicating that a switchover began and another alarm indicating that the switchover failed.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-159
If there is only one critical alarm listed, that alarm caused the switchover attempt. If there is more than one critical alarm listed, compare the timestamp of the critical alarms with the timestamp of the alarm indicating that a switchover began. The critical alarm that occurred before the switchover was begun is the alarm that caused the switchover attempt.
Step 4 Step 5 Step 6
Refer to the Alarm Troubleshooting Procedures section on page 8-9 for descriptions of the steps necessary to resolve the critical alarm that caused the switchover attempt. Log in to the standby Cisco MGC, start an MML session, and view the current alarms, as described in the Retrieving All Active Alarms section on page 8-3. Resolve the listed alarm(s). Refer to the Alarm Troubleshooting Procedures section on page 8-9 for descriptions of the steps necessary to resolve the alarm(s). If resolving the alarms does not stabilize the standby Cisco MGC, proceed to Step 7.
Step 7
Generate a ping from the active Cisco MGC to the standby Cisco MGC by entering the following UNIX command at the active Cisco MGC:
ping standby_addr
Where standby_addr is the IP address of the standby Cisco MGC. If the ping fails, proceed to Step 8. Otherwise, proceed to Step 9.
Step 8
Verify the Ethernet interfaces between the active Cisco MGC and the standby Cisco MGC. Refer to the Sun Microsystems documentation that came with your system for more information. If an element of the Ethernet interfaces between the active Cisco MGC and the standby Cisco MGC is found to be faulty, replace it. Otherwise, proceed to Step 9. Refer to the Sun Microsystems documentation that came with your system for more information. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 9.
Step 9
Verify that the host name for each Cisco MGC host is unique. To do this, log on as root to each Cisco MGC host and view the contents of the host file in the /etc directory. If a Cisco MGC host does not have a unique host name, enter the following UNIX command:
# echo host_name > /etc/host
Verify that the IP address parameters in the XECfgParm.dat file, which are listed below, are set correctly on each host.
Note
8-160
OL-0800-06
Chapter 8
If the IP address settings are correct, proceed to Step 11. Otherwise, update the IP address parameters for each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 11.
Step 11
Verify that the settings for the foverd parameters are set correctly in the XECfgParm.dat file, which are listed below, on each host.
foverd.conn1Type foverd.ipLocalPortA foverd.ipPeerPortA foverd.conn2Type foverd.ipLocalPortB foverd.ipPeerPortB foverd.conn3Type foverd.conn3Addr foverd.abswitchPort foverd.heartbeatInterval = = = = = = = = = = socket 1051 1052 socket 1053 1054 serial /dev/null (/dev/null) 1000
Note
If the foverd settings are correct, proceed to Step 12. Otherwise, update the foverd settings in the XECfgParm.dat files using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 12.
Step 12
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Note
In these procedures, it is assumed that backup operations have been performed regularly on your Cisco MGC. For more information on backing up your Cisco MGC, refer to the Backing Up System Software section on page 3-27.
Note
Successful recovery from a natural or man-made disaster depends upon your planning in advance for a possible disaster. Refer to the Creating a Disaster Recovery Plan section on page 3-26 for more information. The following sections contain the procedures that describe how to recover from Cisco MGC host(s) failure:
Recovering from a Cisco MGC Host Failure in a Simplex System, page 8-162 Recovering from a Single Cisco MGC Host Failure in a Continuous Service System, page 8-162
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-161
Recovering from a Dual Cisco MGC Host Failure in a Continuous Service System, page 8-163
Reload the Solaris 2.6 operating system on the Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of your Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.
Step 2
Step 3
Note
If your backup files are stored on a remote server, have your network administrator re-establish the path between the Cisco MGC and the server that stores your backups.
Note Step 4
Any changes you made to the Cisco MGC system subsequent to your last backup are lost.
Start the Cisco MGC software, as described in the Starting the Cisco MGC Software section on page 2-2.
Recovering from a Single Cisco MGC Host Failure in a Continuous Service System
To recover from a single Cisco MGC host failure in a system equipped with two Cisco MGCs, perform the following steps:
Step 1
Reload the Solaris 2.6 operating system on the affected Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the affected Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of the affected Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.
Step 2
Step 3
Note
If your backup files are stored on a remote server, have your network administrator re-establish the path between the affected Cisco MGC and the server that stores your backups.
Step 4 Step 5
Open the XECfgParm.dat file on the affected Cisco MGC in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to true.
8-162
OL-0800-06
Chapter 8
Save the file and exit the text editor. Start the Cisco MGC software, as described in the Starting the Cisco MGC Software section on page 2-2. Synchronize the databases of the active and standby Cisco MGCs, using the procedure described in the Synchronizing Databases section of the Configuring the Cisco Media Gateway Controller Software Release 9 chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.
Recovering from a Dual Cisco MGC Host Failure in a Continuous Service System
To recover from a dual Cisco MGC host failure in a system equipped with two Cisco MGCs, perform the following steps:
Step 1 Step 2
Select one of the Cisco MGC hosts to be your active system, and the other to be your standby system. Reload the Solaris 2.6 operating system on the active Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the active Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of the active Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.
Step 3
Step 4
Note
If your backup files are stored on a remote server, have your network administrator re-establish the path between the active Cisco MGC and the server that stores your backups.
Open the XECfgParm.dat file on the active Cisco MGC in a text editor, such as vi. Search for the pom.dataSync property and ensure that it is set to true. Save the file and exit the text editor. Start the Cisco MGC software on the active Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Reload the Solaris 2.6 operating system on the standby Cisco MGC host, as described in the Installing the Operating System Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Reload the Cisco MGC software on the standby Cisco MGC host, as described in the Installing the Cisco Media Gateway Controller Software chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Restore the configuration of the standby Cisco MGC from your latest backup file, as described in the Restoring Stored Configuration Data section on page 8-164.
Step 10
Step 11
Note
If your backup files are stored on a remote server, have your network administrator re-establish the path between the standby Cisco MGC and the server that stores your backups.
Step 12
Open the XECfgParm.dat file on the standby Cisco MGC in a text editor, such as vi.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-163
Search for the pom.dataSync property and ensure that it is set to true. Save the file and exit the text editor. Start the Cisco MGC software, as described in the Starting the Cisco MGC Software section on page 2-2. Synchronize the databases of the active and standby Cisco MGCs, using the procedure described in the Synchronizing Databases section of the Configuring the Cisco Media Gateway Controller Software Release 9 chapter of the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.
Restoring Procedures for Cisco MGC Software up to Release 9.1(4), page 8-164 Restoring Procedures for Cisco MGC Software Release 9.1(5) and up, page 8-168
Restoring Data from a Local Tape Drive, page 8-165 Restoring Data from a Remote Machine over the Network, page 8-166 Restoring Data to the Main Memory Database, page 8-167
Note
These procedures assume that you have backed up your system configuration data regularly. The procedures for system configuration backup can be found in the Backup Procedures for Cisco MGC Software up to Release 9.1(4) section on page 3-27.
8-164
OL-0800-06
Chapter 8
Caution
This procedure overwrites existing files under the Cisco MGC base directory. Current content in the overwritten files will be lost! To restore the contents of the entire Cisco MGC software directory from a local tape, complete the following steps:
Step 1
Enter the following UNIX command at the affected Cisco MGC to run the restore script:
./restore.sh
Step 2
Select R and press Enter to start the restore. The system then prompts you as listed below:
Are you sure you want to restore a backup. Current data in the MGC directory will be overwritten and lost. Answer(Y/N):
Step 3
Select y and press Enter if you are sure you want to restore from the tape. The system begins the restoration and returns a response similar to the following:
Answer(Y/N): y x ., 0 bytes, 0 tape blocks x ./var, 0 bytes, 0 tape blocks x ./var/log, 0 bytes, 0 tape blocks x ./var/log/platform.log, 117 bytes, 1 tape blocks x ./var/log/mml.log, 187 bytes, 1 tape blocks. . . . #
Step 4 Step 5
When the restore has finished, remove the tape from the tape drive. If you have performed any partial backups since the creation of the full backup tape you have just restored, retrieve the most recent partial backup tape and repeat steps 1 to 4 with that tape in the tape drive. If your system does not have a dial plan configured, the procedure is complete. Otherwise, restore the contents of your dial plan as described in the Restoring Data to the Main Memory Database section on page 8-167.
Step 6
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-165
Enter the following UNIX command on the affected Cisco MGC to run the restore script:
./restore.sh
Step 2 Step 3
Select N and press Enter to define the remote NFS server. The system then prompts you to provide the name of the remote server. Enter the name of the remote NFS server:
Enter server name: remote_hostname
Where: remote_hostnameName of the remote server where the backups are stored. The system then prompts you to enter the name of the associated directory on the remote server.
Step 4
Where: remote_directory_nameName of the directory path on the remote server where the backups are stored. The system returns a response similar to the following:
Enter server name: va-panthers Enter remote directory : /backup MGC restore utility ----------------------------Source currently set to remote NFS server (va-panthers:/backup) Enter: <N> <L> <R> <Q> set source to remote NFS server set source to Local tape (/dev/rmt/0h) for Restore to quit
8-166
OL-0800-06
Chapter 8
Step 5
Select R and press Enter to start the restore. The system returns a response similar to the following:
mount -F nfs -o retry=3 va-panthers:/backup /mnt Available files: va-blade20000317105201P.tar va-blade20000317105337.tar
Step 6
Enter the filename for the most recent full backup performed on your system.
Note
Full backups have a file name consisting of the name of the host and the timestamp with a .tar designation. Partial backups have a file name consisting of the name of the host, timestamp, and the letter P with a .tar designation.
The system then asks you if you really want to restore a backup:
Are you sure you want to restore a backup. Current data in the MGC directory will be overwritten and lost. Answer(Y/N):
Step 7
Enter y and press Enter if you are sure that you want to restore the Cisco MGC directory. The system returns a response similar to the following:
x etc, 0 bytes, 0 tape blocks x etc/Copyright, 545 bytes, 2 tape blocks x etc/CONFIG_LIB, 0 bytes, 0 tape blocks x etc/CONFIG_LIB/new, 0 bytes, 0 tape blocks . . restore from va-panthers:/backup/va-blade20000317105337.tar complete #
Step 8 Step 9
If you have performed any partial backups since the creation of the full backup you have just restored, repeat Steps 1 to 7 and restore the most recent partial backup. If your system does not have a dial plan configured, the procedure is complete. Otherwise, restore the contents of your dial plan as described in the Restoring Data to the Main Memory Database section on page 8-167.
Log in to the active Cisco MGC and change directories to a local subdirectory under the base directory. For example, enter the following UNIX command to change to the /opt/CiscoMGC/local directory:
cd /opt/CiscoMGC/local
Step 2
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-167
Step 3
Run the MMDB restore script by entering the following UNIX command:
./restoreDb.sh filename
Where filename is the name of the database backup file. For example, to restore the contents of a file called dplan to the MMDB, you would enter the following command:
./restoreDb.sh dplan
Step 4
Note
This functionality is part of a patch to Release 9.1(5). If you want to use this functionality, you must be upgraded to the proper patch level. For more information on verifying the patch level of your system, refer to Verifying the Patch Level of the Cisco MGC section on page 3-104. The following sections provide the restoration procedures:
Listing Backup Files, page 8-168 Restoring a Backup File from a Directory, page 8-169 Restoring a Backup File from a Device, page 8-169
Note
These procedures assume that you have backed up your system configuration data regularly. The procedures for system configuration backup can be found in the Backup Procedures for Cisco MGC Software from Release 9.1(5) and up section on page 3-32.
Where path is the directory path in which you have stored backup files, such as a directory on a remote server or a local tape drive. The system returns a response similar to the following:
Backup files in /var/cisco --------------------------------------------------
8-168
OL-0800-06
Chapter 8
Note
You can restore a backup file only when you are logged in to your system as mgcusr. You cannot restore a backup file while you are logged in as root.
mgcrestore -d path -f filename
Where:
pathThe directory path to the location where your backup files are stored. filenameThe file name of the backup file you want to restore.
For example, to restore a backup file called mgc_venus_20011012_153003_backup stored in a directory path called /var/cisco, you would enter the following command:
mgcrestore -d /var/cisco -f mgc_venus_20011012_153003_backup
Note
You can restore a backup file only when you are logged in to your system as mgcusr. You cannot restore a backup file while you are logged in as root.
mgcrestore -d device
Where device is the device where your backup files are stored. For example, to restore a backup file stored on a tape drive called /dev/rmt/0, you would enter the following command:
mgcrestore -d /dev/rmt/0
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-169
Note
You can restore a backup file only when you are logged in to your system as mgcusr. You cannot restore a backup file while you are logged in as root.
Step 1
Step 2
Enter 1 to restore a backup file. The system returns a response similar to the following:
Restore a Backup -----------------NameRetriesTimeoutDayTimeDirectory Back15 60everyday12:00/var/cisco Mybackup030weekdays04:00/var/cisco Enter the name of the backup to be restored:
Step 3
Enter the name of the automatic backup operation you want to restore. The system returns a response similar to the following:
Restore this backup (Y or N)?
Step 4
Enter Y if you want to continue with restoring a backup, or enter N if you do not want to restore a backup.
Note
You can enter a Ctrl C keyboard command at any time to halt the execution of the mgcrestore script.
8-170
OL-0800-06
Chapter 8
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the active Cisco MGC and determine whether the MMDB is running by entering the following UNIX command:
ps -ef | grep timesten
If the system returns a list of running timesten processes such as those listed below, the MMDB is running.
root 234 1 0 Dec 21 ? root 235 234 0 Dec 21 ? root 236 234 0 Dec 21 ? root 237 234 0 Dec 21 ? root 238 234 0 Dec 21 ? root 239 234 0 Dec 21 ? root 240 234 0 Dec 21 ? root 241 234 0 Dec 21 ? root 242 234 0 Dec 21 ? mgcusr 14246 14127 0 09:19:38 pts/1 root 23327 234 0 Dec 26 ? -datastore /opt/TimesTen32/datastore/ 0:04 0:03 0:00 0:00 0:00 0:00 0:00 0:00 0:00 0:00 9:44 /opt/TimesTen32/32/bin/timestend /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd /opt/TimesTen32/32/bin/timestensubd grep timesten /opt/TimesTen32/32/bin/timestenrepd -id -id -id -id -id -id -id -id 0 1 2 3 4 5 6 7
-id 8
Log in to the active Cisco MGC as root and enter the following UNIX command:
/etc/init.d/tt4.1_32bit start
If the system response indicates that the database has started, proceed to Step 4. Otherwise, proceed to Step 5.
Step 4
Re-attempt to export your system configuration using the following MML command:
prov-exp:all
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the amdmpr process is running, as described in the Verifying That Processes Are Running section on page 3-3.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-171
If the amdmpr process is not running, proceed to Step 3. Otherwise, proceed to Step 4.
Step 3 Step 4
Verify that the *.disableMeas parameter in the XECfgParm.dat file is set to false on each host, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the dmpr-01 process is running, as described in the Verifying That Processes Are Running section on page 3-3. If the dmpr-01 process is not running, proceed to Step 3. Otherwise, proceed to Step 5.
Step 3
Verify that the settings for the dmprSink.dat file are correct, using the procedure in the Configuring the Data Dumper section on page A-2. If that clears the alarm, the procedure is finished. Otherwise, proceed to Step 4.
Step 4
Verify that the settings for the CDR parameters in the XECfgParm.dat file on each host match those listed below, using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173.
cdrDmpr.openCDR = true cdrDmpr.callDetail = /opt/CiscoMGC/local/cdbscript.sh cdrDmpr.seqFile = ../var/.cdr.seq diskmonitor.CdrRmFinished = 0 # remove "finished" cdrs after X days (0 = immediate) engine.CDRencodingFormat = AnsiCDB engine.CDRtimeStamp = S engine.CDRmessageTypes = "1010,1020,1030,1040,1050,1060,1070"
Step 5
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. If your system is provisioned to control Voice over IP (VoIP) calls that do not originate or terminate on SS7 or PRI (such as SIP-to-SIP or SIP-to-EISUP/H.323 calls), you must synchronize the system state data before continuing. To do this, proceed to Step 3.
8-172
OL-0800-06
Chapter 8
If your system is provisioned to control VoIP calls in which at least one call leg is SS7 or PRI, proceed to Step 4.
Step 3
To synchronize the system state data, you must resart the MGC software on the standby Cisco MGC. To restart the MGC software, stop the software, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4 and then start the software, as described in the Starting the Cisco MGC Software section on page 2-2. Verify that the path to the affected peer is out-of-service, as described in the Verifying the Status of all Signaling Services section on page 8. If the destination is in-service, or there is no destination associated with the peer, proceed to Step 5. If the destination associated with the peer is out-of-service, bring the destination back into service, as described in the SS7 Destination is Out of Service section on page 8-93.
Step 4
Note
If the out-of-service destination is IP destination, perform the procedure described in Media Gateway IP Destination/Link Out-of-Service section on page 8-143.
If that resolves the problem, this procedure is complete. Otherwise, proceed to Step 5.
Step 5
Trace the route to the peer by entering the following UNIX command on your active Cisco MGC:
traceroute ip_addr
Where ip_addr is the IP address of the affected peer. The system responds with a listing of the peers that are passed through on route to the identified peer. If the system response indicates that the identified peer was reached with no problems, proceed to Step 7. If the system response indicates that you were unable to reach the identified peer, proceed to Step 6.
Step 6
Log in to the peer identified in Step 4 and verify that the Ethernet interfaces for this peer are working correctly. Refer to the documentation for the peer for more information. If the Ethernet interfaces are working properly, proceed to Step 7. If the Ethernet interfaces are not working properly, replace the element that is not working properly. Refer to the documentation of the peer for more information. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 7.
Step 7
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Caution
Performing this procedure stops the functioning of the Cisco MGC software. Perform this step only while in contact with Cisco Technical Assistance Center (TAC) personnel. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-173
Step 1 Step 2
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Log in to the standby Cisco MGC and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc
Step 3 Step 4
Open the XECfgParm.dat using a text editor, such as vi. Search for the parameters specified in the referring procedure and verify that it is set to the correct value. If they are set correctly, proceed to Step 11. Otherwise, proceed to Step 5 to begin the process of correcting your configuration. Modify the incorrect parameters identified in Step 4 to match their correct values. Save your changes and close the text editor. Stop the Cisco MGC software on your standby Cisco MGC, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2. Perform a manual switchover from the active Cisco MGC, as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects unstable in-progress calls as well as new calls. Stable in-progress calls are not affected.
Step 10
Repeat steps 2 through 9 for the newly standby Cisco MGC. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 10.
Step 11
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8.
8-174
OL-0800-06
Chapter 8
Step 2
Determine whether the SNMP daemon (snmpdm) is running on your system by entering the following command:
ps -ef | grep snmp
If the response from your system does not include snmpdm, the SNMP daemon is not running. If the SNMP daemon is not running, proceed to Step 3. Otherwise, proceed to Step 11.
Step 3
Verify that the host name and IP address information for your Cisco MGC system configured on your SNMP server is correct. If the host name and IP address information are incorrect, proceed to Step 4. Otherwise, proceed to Step 4.
Step 4
Modify the host name and IP address information for your Cisco MGC system on your SNMP server. If this resolves the problem, proceed to Step 10. Otherwise, proceed to Step 5.
Step 5
Verify that the 64-bit kernel instruction sets are installed in your system by entering the following UNIX command:
isalist
If the response from your system does not include the sparcv9+vis and sparcv9 instruction sets, the 64-bit kernel is not installed on your system. If the response indicates that the 64-bit kernel is installed in your system, proceed to Step 11. Otherwise, proceed to Step 6.
Step 6
Re-install the operating system as described in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. Ensure that the 64-bit kernel is selected during installation. If the operating system installs successfully, proceed to Step 7. Otherwise, proceed to Step 9.
Step 7
Repeat Step 5 to ensure that the 64-bit kernel has been installed. If the 64-bit kernel is installed, proceed to Step 8. Otherwise, proceed to Step 9.
Step 8
Re-install the Cisco MGC software as described in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. If the Cisco MGC software installs successfully, proceed to Step 10. Otherwise, proceed to Step 11.
Step 9
Your system hardware is unable to support the 64-bit kernel. To operate the Cisco MGC software for Release 9.2 and later, the 64-bit kernel must be installed. You must upgrade your hardware to enable your system to support the 64-bit operating system. Instructions for upgrading your hardware can be found in the Sun Microsystems documentation for the host platform. Once the upgrade is complete, repeat this procedure starting from Step 6. If the hardware upgrade resolves the problem, proceed to Step 10. Otherwise, proceed to Step 11.
Step 10
Repeat the above steps on the other Cisco MGC host in your system.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-175
If the problem is resolved after fixing both Cisco MGC hosts, the procedure is complete. Otherwise, proceed to Step 11.
Step 11
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco recommends that you configure your MGC hosts to use NTP to maintain system time as described in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide. In instances where the system time is incorrect, there are procedures you can use to correct the system time, which vary based on how system time is set on your system, and whether the MGC is being used to record your call detail records (CDRs). These procedures are as follows:
NTP is Not Used and MGC is Not the Source of the CDRs, page 8-176 NTP is Not Used and MGC is the Source of the CDRs, page 8-177 NTP is Used and MGC is the Source of the CDRs, page 8-177
Caution
Cisco strongly recommends that the synchronization of the host system clock be done in a manner that does not adversely impact operating system or application processes. A rapid change of the system clock can have adverse effects on call processing, system logs, and CDRs.
Caution
Correcting the system time on your MGC host(s) requires that the user be logged in as root. We recommend that you closely control the use of the super-user (root) password and privileges.
NTP is Not Used and MGC is Not the Source of the CDRs
To correct the system time when NTP is not used to maintain system time and the MGC is not the source of the CDRs, perform the procedure below. This procedure is not service impacting, if performed during a maintenance window.
Step 1 Step 2
If the time on one MGC host is correct, proceed to Step 2. If the time is incorrect on both MGC hosts, proceed to Step 3. If the MGC host with the incorrect time is the active Cisco MGC, perform a manual switchover, as described in the Performing a Manual Switchover section on page 3-99. If the MGC host with the incorrect time is the standby Cisco MGC, proceed to Step 3.
Stop the Cisco MGC software on your standby Cisco MGC (which has the incorrect time), as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Correct the time on the standby Cisco MGC using the UNIX command date. For more information about the date command, refer to man page for date. Restart the Cisco MGC software on your standby Cisco MGC, as described in the Starting the Cisco MGC Software section on page 2-2.
8-176
OL-0800-06
Chapter 8
If the time was incorrect on only one of the MGC hosts, the procedure is complete. Otherwise, repeat steps 1 through 5 for the other MGC host with the incorrect time.
Caution
This procedure is service impacting and should be performed during a maintenance window.
Stop the Cisco MGC software on both MGC hosts, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Correct the time on both MGC hosts using the UNIX command date. For more information about the date command, refer to man page for date. Restart the Cisco MGC software on both MGC hosts, as described in the Starting the Cisco MGC Software section on page 2-2.
Caution
This procedure is service impacting and should be performed during a maintenance window.
Step 1 Step 2
Stop the Cisco MGC software on both MGC hosts, as described in the Shutting Down the Cisco MGC Software Manually section on page 2-4. Reboot your MGC hosts, as described in Sun Microsystems documentation that came with your system. Rebooting the MGC hosts restarts the Xntp demon, which synchronizes the system time with the time on the NTP server. Restart the Cisco MGC software on both MGC hosts, as described in the Starting the Cisco MGC Software section on page 2-2.
Step 3
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-177
Securing the Cisco PGW 2200, page 8-178 Securing BAMS, page 8-179
Before you begin the securing process you must identify the last CDR that has been pulled into BAMS. Log in to the active Cisco MGC as root and enter the following UNIX command to change directories:
/opt/CiscoMGC/var/spool
Step 2
Where yyyymmdd represents the current date, entered in the following format:
Check the list of files that is displayed for the last finished filename preceded by a period (.) and write down the file nameyou will need this information later. Log in to the standby Cisco MGC as root and enter the following command to change directory:
cd /opt/sun_install
Step 5
Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file
Step 6
Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file
Step 7
Log in to the active Cisco MGC as root and enter the following command to change directory:
cd /opt/sun_install
8-178
OL-0800-06
Chapter 8
Step 8
Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file
Step 9
Where filename is a name that you selected. The system returns a response similar to the following:
You are running as root - Good... Operating System: SunOS 5.8 Disable ftp in inetd.conf file
Step 10
Verify that Telnet and FTP are off. Telnet or FTP to your active Cisco MGC. If Telnet and FTP are turned off, you will get the following error message:
Connection refused.
This completes the procedures for securing your Cisco PGW 2200. If you have BAMS on your network, continue to the Securing BAMS section on page 8-179.
Securing BAMS
To secure BAMS on your network:
Step 1
Step 2
The following steps require you to use MML commands. To use MML commands, enter the following command:
mml
Step 3
Enter the node of the Cisco PGW 2200 that is being changed. At the MML command line type the following and press Enter:
set-mode:<x>:
Note Step 4
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-179
Note
Look for the line containing POL402. POL402 indicates the presence of an alarm. Proceed to Step 5. In this text display, va-hoover and va-fish are Cisco PGW 2200 and BAMS host name examples.
Step 5 Step 6
Log in as root. Type the following command and press Enter to change directory:
cd /opt/sun_install
Step 7
Note
Step 8
Type the following command and press Enter to toggle Telnet off:
toggle_telnet.sh disable <filename>
Note
On the active host (BAMS 1), log in as bams. Repeat Step 2 through Step 8. On the standby BAMS, while logged in as root, type the following command and press Enter to change the directory:
8-180
OL-0800-06
Chapter 8
cd /opt/sun_install
Step 12
Step 13
Type y (yes) to continue and press Enter. Text similar to the following is displayed:
Sun Microsystems Inc. SunOS 5.6 Generic August 1997 Warning: Before running this script, SSH must be installed on all PGW and BAMS hosts. This script will reset the existing known hostkeys and user keys for bams user for each host entered during this session. You need to run this script every time the PGW or BAMS is re-installed. You also need to run this script if SSH is re-installed on PGW or BAMS. Do you want to continue [y/n]:
Step 14
Type y (yes) to continue and press Enter. Text similar to the following is displayed:
Generating security keys, this will take a couple of minutes... Generating public/private rsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa.pub. The key fingerprint is: 32:8e:10:10:98:2a:35:8a:18:bb:e6:3e:a1:54:d9:27 bams@va-pine Generating public/private dsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa.pub. The key fingerprint is: 32:dd:2d:51:e3:b4:9b:41:29:49:1a:f2:49:6f:e4:29 bams@va-pine You will be prompted for the user name and password for each PGW or BAMS host. Please remember to enter both PGW host names for a failover pair. You also need to enter the other BAMS host if this is a redundant setup. Please enter a PGW or BAMS host name, or q to quit Enter a host name now:
Step 15
Type host name PGW1 and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit Enter a host name now:
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-181
Step 16
Type the host name mgcusr (the login name of PGW1) and press Enter. Text similar to the following is displayed:
Are you sure you want to continue connecting (yes/no)? yes
Step 17
Type y (yes) and press Enter. Text similar to the following is displayed:
mgcusr@<hostname>'s password: id_dsa.pub 100% |*****************************| 602 00:00
Step 18
Type the password and press Enter. Text similar to the following is displayed:
mgcusr@<BAMS 1>'s password:
Step 19
Type y (yes) again and press Enter. Text similar to the following is displayed:
mgcusr on <BAMS> successfully configured Do you want to configure second interface for <BAMS>? n
Step 20
Yes (configuring a second interface) is optional. If you answer y, repeat Step 1 through Step 19. If you answer no, proceed to Step 21.
Step 21
Repeat Step 15 through Step 19 for additional Cisco PGW 2200 nodes. Text similar to the following is displayed:
mgcusr on <BAMS1> successfully configured Do you want to configure second interface for <BAMS1>? n
Step 22
Type n (no) and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit Enter a host name now:
Step 23 Step 24
While still on the standby BAMS, type the active BAMS unit information (BAMS name, BAMS login password). When all the BAMS interfaces have been configured, type q to quit and press Enter. Text similar to the following is displayed:
Done
Note
Look out for the following error message. If some hosts were not configured, follow the recommendation in this message. Failed to configure some hosts. Please check for SSH installation on these hosts and/or the user name and password for these hosts.
Step 25
8-182
OL-0800-06
Chapter 8
Step 26
Change the directory. Type the following command and press Enter:
cd /opt/install
Step 27
Step 28
Type y to continue and press Enter. Text similar to the following is displayed:
Sun Microsystems Inc. SunOS 5.6 Generic August 1997 Warning: Before running this script, SSH must be installed on all PGW and BAMS hosts. This script will reset the existing known hostkeys and user keys for bams user for each host entered during this session. You need to run this script every time the PGW or BAMS is re-installed. You also need to run this script if SSH is re-installed on PGW or BAMS. Do you want to continue [y/n]:
Step 29
Type y (yes) to continue and press Enter. Text similar to the following is displayed:
Generating security keys, this will take a couple of minutes... Generating public/private rsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_rsa.pub. The key fingerprint is: 32:8e:10:10:98:2a:35:8a:18:bb:e6:3e:a1:54:d9:27 bams@va-pine Generating public/private dsa key pair. Your identification has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa. Your public key has been saved in /opt/CiscoBAMS/local/.ssh/id_dsa.pub. The key fingerprint is: 32:dd:2d:51:e3:b4:9b:41:29:49:1a:f2:49:6f:e4:29 bams@va-pine You will be prompted for the user name and password for each PGW or BAMS host. Please remember to enter both PGW host names for a failover pair. You also need to enter the other BAMS host if this is a redundant setup. Please enter a PGW or BAMS host name, or q to quit Enter a host name now:
Step 30
Type host name PGW1 and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-183
Step 31
Type the host name mgcusr (the login name of PGW1) and press Enter. Text similar to the following is displayed:
Are you sure you want to continue connecting (yes/no)? yes
Step 32
Type y (yes) and press Enter. Text similar to the following is displayed:
mgcusr@<hostname>s password: id_dsa.pub 100% |*****************************| 602 00:00
Type the password and press Enter. Text similar to the following is displayed:
mgcusr@<BAMS 1>'s password:
Step 33
Type y (yes) again and press Enter. Text similar to the following is displayed:
mgcusr on <BAMS> successfully configured Do you want to configure second interface for <BAMS>? n
Step 34
Yes (configuring a second interface) is optional. If you answer y, repeat Step 1 through Step 19. If you answer no, proceed to Step 21.
Step 35
Repeat Step 15 through Step 19 for additional Cisco PGW 2200 nodes. Text similar to the following is displayed:
mgcusr on <BAMS1> successfully configured Do you want to configure second interface for <BAMS1>? n
Step 36
Type n (no) and press Enter. Text similar to the following is displayed:
Please enter a PGW or BAMS host name, or q to quit Enter a host name now:
Step 37 Step 38
While still on the active BAMS, type the standby BAMS unit information (BAMS name, BAMS login password). When all the BAMS interfaces have been configured, type q to quit and press Enter. Text similar to the following is displayed:
Done
Step 39
Go to the active Cisco PGW 2200 (Host A) in the Securing the Cisco PGW 2200 section on page 8-178 and repeat Step 1 and Step 2. Text similar to the following is displayed:
-rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r-1 1 1 1 1 mgcusr mgcusr mgcusr mgcusr mgcusr mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp 182 182 182 182 182 Feb Feb Feb Feb Feb 12 12 12 12 12 14:29 14:34 14:39 14:44 14:49 cdr_20030212142403_037281.finished cdr_20030212142903_037282.finished cdr_20030212143403_037283.finished cdr_20030212143903_037284.finished cdr_20030212144403_037285.finished
8-184
OL-0800-06
Chapter 8
-rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--rw-rw-r--
1 1 1 1 1 1 1 1 1 1 1 1 1
mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr mgcusr
mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp mgcgrp
182 182 182 182 182 182 182 182 182 182 182 182 182
Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb Feb
12 12 12 12 12 12 12 12 12 12 12 12 12
14:54 14:59 15:04 15:09 15:14 15:19 15:24 15:30 15:35 15:40 15:45 15:50 15:55
cdr_20030212144903_037286.finished cdr_20030212145403_037287.finished cdr_20030212145903_037288.finished cdr_20030212150403_037289.finished cdr_20030212150903_037290.finished cdr_20030212151403_037291.bin cdr_20030212151904_037292.bin cdr_20030212152434_037293.bin cdr_20030212153004_037294.bin cdr_20030212153504_037295.bin cdr_20030212154004_037296.bin cdr_20030212154504_037297.bin cdr_20030212155004_037298.bin
Step 40 Step 41
Make sure that the CDR file number you noted down in Step 3 has changed from .bin to .finished. Check for alarms on BAMS. Type the following command and press Enter:
<bams hostname> rtrv-alms
Note
The CDR file POL402 (which indicates the presence of an alarm, shown in Step 4) for the active Cisco PGW 2200 and standby BAMS should be gone.
Step 42
Verify that both BAMS 1 and BAMS 2 are communicating with each other. CDR file POL329 indicates that the active BAMS (BAMS 1) is sending information to the standby BAMS (BAMS 2).
Note
Since BAMS polls the Cisco PGW 2200 at regular intervals, you may still see an alarm for a while. When you do, wait a few minutes and check the logs (see Step 43).
Step 43
To check the logs for alarms (the log name within this directory is syslog), change directory to the following:
cd /opt/CiscoBAMS/files/s0x
Note
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-185
If you have not already gathered system data, collect it as described in the Collecting System Data for Cisco TAC section on page 8-8. Verify that the TIBCO adapter daemon is running by entering the following UNIX command on the active Cisco MGC:
ps -ef
Note
If your system is also equipped with an SNMP interface, a trap is generated when the MGC software cannot start the TIBCO daemon. Log in to the standby Cisco MGC as root and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc
Step 3
Open the XECfgParm.dat using a text editor, such as vi. Search for the *.tibcoSupport parameter and verify that it is set to enable. If it is set properly, exit the text editor and proceed to Step 9. Otherwise proceed to Step 6. Change the *.tibcoSupport parameter to enable using the procedure in the Rebooting Software to Modify Configuration Parameters section on page 8-173. Verify that the TIBCO adapter daemon is running by entering the following UNIX command on the active Cisco MGC:
ps -ef
Repeat steps 3 through 7 for the newly standby Cisco MGC host. If that resolves the problem, the procedure is finished. Otherwise, proceed to Step 9.
8-186
OL-0800-06
Chapter 8
Step 9
Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the Obtaining Technical Assistance section on page xxx.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
8-187
8-188
OL-0800-06
A P P E N D I X
MML_yyyymmddh Man-Machine Language (MML) command hmmss.log category log messages. alm_yyyymmddhh mmss_seq#.csv meas_yyyymmddh hmmss_seq#.csv cdr_yyyymmddhh mmss_seq#.bin Alarm category log messages. Archived files are stored in the $BASEDIR/var/spool directory. Measurement category log messages. Archived files are stored in the $BASEDIR/var/spool directory. CDRs rotated on a regular basis. Archived files are stored in the $BASEDIR/var/spool directory.
Measurements
meas.csv
cdr.bin
Note
The time stamps used on the archived file names (yyyymmddhhmmss) are in system time.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
A-1
The contents of the file displays the log file setup data for each of these three log file types. There are eight fields for each log file type in the file. The last three fields in each line can be modified to administer log file creation for these three log file types.
Caution
Do not modify any of the first five fields in each line. The first field in each line identifies the log file type, such as callDetail for the CDR log files. The second field in each line identifies the storage format used in the log files. The storage format is either bin for binary, or csv for comma-separated-value. The third field identifies the file name used to identify the file type, such as meas for system measurements. The fourth field identifies the directory in which the active log files are stored, and the fifth field identifies the directory in which the archived log files are stored. Table A-2 describes the last three fields in each line, which you can be modify, depending on your needs.
Note
At least one of the last three fields in each line must be set to a value other than zero (0) for logging to function properly.
Table A-2 Dumper Sink Log File Parameters
Description Defines the maximum number of records a file can contain before it is flushed or moved to the spool directory. If this value is set to 0, the number of records is unlimited. You can improve system performance by increasing the value of this field to a larger value, such as 50000. This results in fewer log files being generated during periods of high call volume.
Note
In the case of CDRs, the value in this field refers to the maximum number of call detail blocks (CDBs), which make up CDRs. Multiple CDBs can be created for each call. For more information on individual CDBs, refer to the Cisco Media Gateway Controller Release 9 Billing Interface Guide.
Defines the maximum size of the log file in bytes before it is moved to the spool directory. If this value is set to 0, the size of the file is limited only by the disk space available. Defines the maximum time, in minutes, the file is allowed to remain open, before it is flushed or moved to the spool directory. If there is no data in the file, it is not flushed when the time limit expires. If this value is set to 0, there is no time limit.
15
A-2
OL-0800-06
Appendix A
Note
Starting with Release 9.3(2), empty alarm log files are no longer archived, and CDR log files are not archived to the standby Cisco MGC. In prior releases, empty alarm log files and CDR log files would be archived on both MGC hosts.
Log in to the active Cisco MGC and change to the /opt/CiscoMGC/etc directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc
Step 2
Use a text editor, such as vi, to open and edit the dmprSink.dat file fields you want to change.
Note
If you are going to use the BAMS to collect CDRs, proceed to the Configuring the Data Dumper to Support BAMS section on page A-4, for information on how to configure the data dumper to support BAMS.
Step 3 Step 4
Save your changes and exit the text editor. Change to the /opt/CiscoMGC/etc/active_link directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc/active_link/
Step 5 Step 6
Repeat steps 2 and 3 for the version of dmprSink.dat stored in this directory. If your system uses a continuous service configuration (active and standby Cisco MGC hosts), perform steps 9, 10, and 11 to update the settings on the standby Cisco MGC and load the new dmprSink.dat settings. If your system uses a simplex configuration (a single Cisco MGC host), perform steps 7 and 8 to load the new dmprSink.dat settings.
Step 7
Stop the Cisco MGC software using the procedure described in the Shutting Down the Cisco MGC Software Manually section on page 2-4.
Caution
Stopping the Cisco MGC software should only be performed while in contact with Cisco Technical Assistance Center (TAC) personnel. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC. Restart the Cisco MGC software using the procedure described in the Starting the Cisco MGC Software section on page 2-2. The procedure is complete. Repeat steps 1 through 5 on your standby Cisco MGC. Log on to the active Cisco MGC, start an MML session and perform a manual switchover as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects in-progress as well as new calls.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
A-3
Step 11
Once the manual switchover is complete, repeat Step 10 on the newly active Cisco MGC. The procedure is complete.
Log into the active Cisco MGC and change to the /opt/CiscoMGC/etc directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc
Step 2 Step 3
Use a text editor, such as vi, to open the dmprSink.dat file. In the callDetail line of the file, find the following directory path:
../var/spool
Step 4
Modify that directory path to point to the /opt/CiscoMGC/var/bam directory, as shown below:
../var/bam
Step 5 Step 6
Save your changes and exit the text editor. Change to the /opt/CiscoMGC/etc/active_link directory by entering the following UNIX command:
cd /opt/CiscoMGC/etc/active_link/
Step 7 Step 8
Repeat steps 2 through 5 for the version of dmprSink.dat stored in this directory. If your system uses a continuous service configuration (active and standby Cisco MGC hosts), perform steps 11, 12, and 13 to update the settings on the standby Cisco MGC and load the new dmprSink.dat settings. If your system uses a simplex configuration (a single Cisco MGC host), perform steps 9 and 10 to load the new dmprSink.dat settings.
Step 9
Stop the Cisco MGC software using the procedure described in the Shutting Down the Cisco MGC Software Manually section on page 2-4.
Caution
Stopping the Cisco MGC software should only be performed while in contact with Cisco Technical Assistance Center (TAC) personnel. Refer to the Obtaining Technical Assistance section on page xxx for information on contacting the Cisco TAC. Restart the Cisco MGC software using the procedure described in the Starting the Cisco MGC Software section on page 2-2. The procedure is complete. Repeat steps 1 through 7 on your standby Cisco MGC. Log on to the active Cisco MGC, start an MML session and perform a manual switchover as described in the Performing a Manual Switchover section on page 3-99.
Warning
Switchover operations cause the loss of all SS7 messages transmitted to the Cisco MGC for approximately three seconds. This affects in-progress as well as new calls.
A-4
OL-0800-06
Appendix A
Step 13
Once the manual switchover is complete, repeat Step 10 on the newly active Cisco MGC. The procedure is complete.
Each field is separated by a comma. The content of each field is described in Table A-3.
Table A-3 Archived Alarm File Fields
Maximum Length 3 10 5 1
Comments Format of records (should be set to 0) Indicates the time, in seconds, since the start of the UNIX internal timer, time of epoch. Indicates the time, in milliseconds, since the start of the UNIX internal timer, time of epoch. Used for informational alarms, either 0 for reset or 1 for set.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
A-5
Table A-3
Maximum Length 1
Alarm category
String
80
Text that describes the nature of the alarm. For a list and description of the available alarms, refer to the Cisco Media Gateway Controller Software Release 9 System Messages Guide. Identifies the component associated with the alarm. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on components. Identifies the service that set or cleared this alarm.
32
Originator
String
32
Each field is separated by a comma. The content of each field is described in Table A-4.
Table A-4 Archived Measurement File Fields
Maximum Length 3 10
Comments Format of records (should be set to 0). Indicates the time, in seconds, since the start of the UNIX internal timer, time of epoch.
A-6
OL-0800-06
Appendix A
Table A-4
Field Name Time interval (seconds) Measurement value Measurement units Measurement category
Maximum Length 5 10 32 32
Comments Duration of the collection interval. Value of the measurement. Units for which the measurement is recorded. Text that describes the nature of the measurement. For a list and description of the available measurement, refer to Appendix D, Cisco MGC Measurements. Identifies the component associated with the alarm. Refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide for more information on components.
32
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
A-7
A-8
OL-0800-06
A P P E N D I X
SP subsystem 10BaseT
Switches
100BaseT SLT-0
SLT-1
Cisco SLT Signaling Overview, page B-2 Troubleshooting SS7 Link Problems, page B-5 Troubleshooting Cisco SLT-to-STP Signaling Links, page B-10 Troubleshooting Cisco SLT to Cisco MGC Communications, page B-13 Cisco SLT Error Messages, page B-15.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
26672
SLT-2
B-1
IP Signaling Backhaul
IP signaling backhaul is accomplished by means of the Cisco-proprietary Reliable User Datagram Protocol (RUDP) for communication between the Cisco SLT and the Cisco MGC. Backhaul messages can be traced from the Cisco SLT command line interface (CLI) by means of the command
debug ss7 mtp2 backhaul channel
Types of Encapsulation, page B-2 PDU Verb Types, page B-2 Backhaul Message IDs, page B-2
Types of Encapsulation
There are two different types of data encapsulation associated with IP signaling backhaul messages:
Non-PDU messagesDefined as session manager control messages. These are used to control active and standby sessions with the respective Cisco MGCs. PDU messagesMessages the Session Manager delivers to the Message Transfer Part (MTP) Level 2 (MTP2). These messages are used to control MTP2 and to send and receive MSU messages.
RequestsMessages sent only from the Cisco MGC to the Cisco SLT requesting that the Cisco SLT take some action, such as connect the link (align link), disconnect the link, or return its statistics. ConfirmationsMessages sent from the Cisco SLT to the Cisco MGC in response to requests indicating that the requested action has been completed with success or failure. IndicationsAsynchronous messages sent from the Cisco SLT to the Cisco MGC, indicating that the Cisco SLT has detected a state change, such as link alignment lost.
B-2
OL-0800-06
Appendix B
Backhaul Reset
There are two types of IP signaling backhaul reset commands:
SoftReset (Link reset)Command is sent from the Cisco MGC to the Cisco SLT to put the backhaul signaling link in the Out-Of-Service (OOS) state. If the command succeeds, there is no response from the Cisco SLT because the backhaul link is out of service. Sample message trace:
00:10:18: SoftResetRequest
HardReset (CPU reset)Command is sent from the Cisco MGC to the Cisco SLT to cause a CPU reset on the Cisco SLT. Sample message trace:
00:10:18: HardResetRequest
Connection Management
There are two IP signaling backhaul connection commands; a connection request and a disconnect request. Each command has a corresponding confirmation message.
Connection requestCommand sent from the Cisco MGC to the Cisco SLT to request link alignment. The request indicates if the alignment is in a normal or emergency state. Connection confirmationReply sent from the Cisco SLT to the Cisco MGC in response to a connection request command to indicate its success or failure. Sample message trace:
4d10h: MTP2: rcvd Conn Req - Emergency ch=0 Statistics
Disconnect requestCommand sent from the Cisco MGC to the Cisco SLT to request that an In-Service (IS) link be taken OOS. The request is always processed. The Cisco SLT transmits a status indicator, an Out-of-Service (SIOS) message on the SS7 link.
Disconnect confirmationReply sent from the Cisco SLT to the Cisco MGC in response to a disconnect request command to indicate its success or failure. Disconnect indicationAn asynchronous message sent from the Cisco SLT to the Cisco MGC, indicating that the Cisco SLT has detected a state change that calls for a disconnect request command, such as link alignment lost. Sample message trace:
4d10h: MTP2: send Disc Ind ch=0 reason=0x7-LSSU condition
Backhaul Statistics, page B-3 Backhaul Congestion, page B-4 Link Status, page B-4
Backhaul Statistics
There are two IP signaling backhaul statistics messages:
Stats requestCommand sent from the Cisco MGC to the Cisco SLT to request that the Cisco SLT return its MTP Level 1 (MTP1) and MTP2 statistics. The request is always processed.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-3
An action value is provided to accomplish one of three options: (1) return the statistics and reset the statistics collection, (2) just return the statistics, or (3) just reset the statistics collection.
Stats confirmationReply sent from the Cisco SLT to the Cisco MGC in response to the stats request command. Sample message trace:
4d10h: MTP2: rcvd Statistics Req-Send&Reset ch=0
Backhaul Congestion
The Cisco SLT uses the congestion indication, an asynchronous message sent from the Cisco SLT to the Cisco MGC to indicate that its backhaul signaling link is entering (Onset) or exiting (Abate) congestion. Sample message trace:
Mar 1 005616.707 MTP2 send Flow Ind ch=0 status=0x0 start congestion
The Cisco SLT has two types of possible congestion. Both are determined in the same manner, but control flow in different directions.
MTP2 signaling congestionSS7 congestion deals with each individual SS7 link. Backhaul congestionDeals with the active Session Manager session.
Congestion onset and abatement are determined by the percentage of free receive buffers.
Congestion onsetAn indication that the signaling node is congested. When the number of free receive buffers drops below 20 percent, a backhaul congestion onset message is sent from the Cisco SLT to the Cisco MGC. At this point, the Cisco MGC holds all backhaul traffic destined for the Cisco SLT.
Congestion abateAn indication that congestion has cleared. When the number of free receive buffers rises above 40 percent, a backhaul congestion abate message is sent from the Cisco SLT to the Cisco MGC. At this point, the Cisco MGC resumes sending backhaul traffic destined for the Cisco SLT.
Link Status
Congestion status is maintained for backhaul. Example of a congestion status message:
Nomad-C#sho ss7 mtp2 state SS7 MTP2 states for channel 0 Protocol version for channel 0 is Bellcore GR-246-Core Issue 2, Dec 1997 MTP2LSC_INSERVICE MTP2IAC_IDLE MTP2TXC_INSERVICE MTP2RC_INSERVICE MTP2SUERM_MONITORING MTP2AERM_IDLE MTP2CONGESTION_IDLE Congestion Backhaul = Abate Remote Processor Outage = FALSE
B-4
OL-0800-06
Appendix B
Checking Link Configuration Files, page B-5 Checking UDP Traffic Flows, page B-5 Checking Connection between Cisco MGC and Cisco SLT, page B-6 Checking the T1/E1 Link State, page B-6 Verifying the Link Alignment Status, page B-6 Verifying Exchanged Point Codes, page B-7 Cross-Checking Configuration Files, page B-8
MTP2 Configuration:
Is the channel configured to the proper MTP2 variant? Do the MTP2 variant protocol parameters match the remote configuration?
The response should look like the following, again depending on your configuration:
2600-1#debug ip udp UDP packet debugging is on 2600-1# 15:06:53: UDP: rcvd src=10.15.13.6(7000), 15:06:53: UDP: rcvd src=10.15.13.6(7000), 15:06:53: UDP: sent src=10.15.13.2(7000), 15:06:53: UDP: sent src=10.15.13.2(7000), 15:06:53: UDP: rcvd src=10.15.13.6(7000), 15:06:55: UDP: sent src=10.15.13.2(7000), 15:06:55: UDP: rcvd src=10.15.13.6(7000),
Check for traffic in both directions. If there is traffic, go to the Checking Connection between Cisco MGC and Cisco SLT section on page B-6.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-5
Otherwise, verify IP addresses, try to ping in both directions, reload the Cisco SLT software, check subnets, and check the VLANs on the LAN switches.
Where N identifies the specific MTP link. Valid values are from 0 through 3. The Cisco SLT does not attempt to align the link until it has received an MTP3 Connect Indication from the Cisco MGC. The MTP3 primitives between the Cisco SLT and the Cisco MGC can be seen with this debug command.
Where N identifies the specific MTP link. Valid values are from 0 through 3. Table B-1 describes various debug outputs from the previous command, the probable cause, and the recommended recovery. This traffic is exchanged only when the link is initially brought up. If the link is already In-Service, nothing is displayed.
B-6
OL-0800-06
Appendix B
Table B-1
Recovery Action 1. Check that term monitor is on. 2. Reload Cisco SLT. 3. Cross-check configuration files.
itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_Stop chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_T2_TMO chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_T2_TMO chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Start chnl=0 MTP2IAC_IDLE
Check DS0 assignment (should use the same time slot on both sides of the physical link) and the DS0 speed (defaults to 56 kbps on T1 and 64 kbps on E1). The DS0 speed can be changed by conf t contr E1 0/0 channel-group 0 timeslot 1 speed 56
15:14:32: 15:14:33: 15:14:33: 15:14:37: 15:14:38: Interface 15:14:45: 15:14:46: Interface 15:14:50: 15:14:50: 15:14:50: 15:14:54: 15:14:55: Interface
itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_ALIGNED itu2IAC_T4_TMO chnl=0 MTP2IAC_PROVING %LINEPROTO-5-UPDOWN: Line protocol on Serial0/0:0, changed state to up itu2IAC_Rcvd_SIOS chnl=0 MTP2IAC_IDLE %LINEPROTO-5-UPDOWN: Line protocol on Serial0/0:0, changed state to down itu2IAC_Start chnl=0 MTP2IAC_IDLE itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_NOT_ALIGNED itu2IAC_Rcvd_SIE chnl=0 MTP2IAC_ALIGNED itu2IAC_T4_TMO chnl=0 MTP2IAC_PROVING %LINEPROTO-5-UPDOWN: Line protocol on Serial0/0:0, changed state to up
The link is able to align, but Check the provisioning fails in the PROVING settings for the SLC, OPC, sequence. and DPC in the Cisco MGC, as described in the It is generally a mismatch in Bouncing SS7 Links point codes. section on page 8-92. You can use an SS7 sniffer tool to look at the exchanged point codes. The procedure in Verifying Exchanged Point Codes section on page B-7 allows you to get them using Cisco SLT debug tools.
Where N identifies the specific MTP link. Valid values are from 0 through 3. Table B-2 describes various debug outputs from this command, the probable cause, and the recommended recovery.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-7
Table B-2
Recovery Action 1. Check that term monitor is on. 2. Reload the Cisco SLT. 3. Cross check configuration files.
15:08:31: MTP2 incoming trace enabled on channel 0. 15:08:31: MTP2 outgoing trace enabled on channel 0. 15:08:34: ---- Outgoing Rudp msg (41 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0000 msg_type 0x0011 channel_ID 0x0000 bearer_ID 0x0000 length 0x0019 data 0xB2236ED6 0x006FD600 0x11F01122 0x33445566 0x778899AA 0xBBCCDDEE 15:08:34: ---- Incoming Rudp msg (41 bytes) ---SM_msg_type 0x00008000 protocol_type 0x0001 msg_ID 0x0000 msg_type 0x0010 channel_ID 0x0000 bearer_ID 0x0000 length 0x0019 data 0xB2006FD6 0x236ED600 0x21F01122 0x33445566 0x778899AA 0xBBCCDDEE
Cisco MGC is exchanging messages with remote SP. Exchanged point codes must match before communication can be successfully established.
Check point codes: in data 0xB2236ED6 0x006FD6: 1. 236ED6 should be read D6-6E-23 and converted in decimal: 214-110-035, which is the point code of the Cisco MGC. 2. 006FD6 should be read D6-6F-00 and converted in decimal: 214-111-000, which is the point code of the STP in this example. The values in the incoming and outgoing messages must match.
You should see a response similar to the following Cisco MGC sample configuration file:
File: XECfgParm.dat (extract) *.ipAddrLocalA = 10.15.13.6 # Should be same as *.IP_Addr1 *.ipAddrLocalB = 10.15.13.22 *.ipAddrPeerA = 0.0.0.0 # Failover peer's address *.ipAddrPeerB = 0.0.0.0 *.IP_Addr1 *.IP_Addr2 *.IP_Addr3 *.IP_Addr4 *.stPort = = = = = 0 10.15.13.6 # Address of interface on motherboard 10.15.13.22 0.0.0.0 0.0.0.0
This file defines the Cisco MGC IP addresses used to communicate with the Cisco SLT. To check if they match with the Solaris configuration, you can use ifconfig -a Solaris command.
File: sigChanDev.dat
B-8
OL-0800-06
Appendix B
0 0 1 1 2 2 3 3
1 1 1 1 1 1 1 1
0 1 1 0 0 1 1 0
Note
The last digit in each line (0 or 1 in this example) identifies the link ID on the Cisco SLT. It can take the value 0, 1, 2, or 3 and is misleadingly identified as a timeslot in Cisco MGC provisioning. Only two STP links can be used on the Cisco SLT.
File: sigChanDevIp.dat 001d0001 001d0002 001d0003 001d0004 001d0005 001d0006 001d0007 001d0008 IP_Addr1 IP_Addr1 IP_Addr2 IP_Addr2 IP_Addr1 IP_Addr1 IP_Addr2 IP_Addr2 7000 7000 7000 7000 7000 7000 7000 7000 10.15.13.2 7000 10.15.13.2 7000 10.15.13.19 7000 10.15.13.19 7000 10.15.13.4 7000 10.15.13.4 7000 10.15.13.21 7000 10.15.13.21 7000
This file associates the Cisco MGC IP address/UDP port to the Cisco SLT IP address/UDP port. IP_Addr1 and IP_Addr2 are defined in XECfgParm.dat. These files should not be edited using vi. Any change is lost when provisioning tools are used. The only exception is XECfgParm.dat (and changes can be lost anyway). Cisco SLT sample configuration:
controller T1 0/0 framing esf linecode b8zs channel-group 0 timeslots 1 ! controller T1 0/1 framing esf linecode b8zs channel-group 0 timeslots 1 ! interface Ethernet0/0 ip address 10.15.13.2 255.255.255.240 no ip directed-broadcast ! interface Serial0/0:0 no ip address no ip directed-broadcast ! interface Ethernet0/1 ip address 10.15.13.18 255.255.255.240 no ip directed-broadcast ! interface Serial0/1:0 no ip address no ip directed-broadcast !
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-9
no ip http server ! ss7 set failover-timer 3 ss7 session-0 address 10.15.13.6 7000 10.15.13.2 7000 ss7 session-0 retrans_t 600 ss7 session-0 cumack_t 300 ss7 session-0 kp_t 2000 ss7 session-0 m_retrans 2 ss7 session-0 m_cumack 3 ss7 session-0 m_outseq 3 ss7 session-0 m_rcvnum 32 ! line con 0 transport input none line aux 0 line vty 0 4 login ! end
Connect an SS7 protocol analyzer to a patch panel monitor port to monitor the SS7 message traffic entering or leaving the Cisco SLT-to-STP link. Monitor the SS7 message traffic (if any) between the STP and the Cisco SLT. If SS7 traffic is being received from the STP, continue with the next step. If no SS7 message traffic is being received, go to the MTP1 Communication Problems section on page B-11.
Step 4 Step 5
Ensure that SS7 Message Signaling Units (MSUs), Fill-in Signaling Units (FISUs), or Link Status Signaling Units (LSSUs) are being transceived by the Cisco SLT. If SS7 LSSU messages are being transceived, go to the MTP2 Communication Problems section on page B-12. If SS7 LSSU messages are not being transceived, go to the next step.
Step 6 Step 7
If SS7 MSU and FISU messages are being transceived by the Cisco SLT go to the Troubleshooting Cisco SLT to Cisco MGC Communications section on page B-13. If SS7 MSU and FISU messages are not being transceived, replace the faulty Cisco SLT with a backup unit, if one is available. If the problem is no longer present with the replacement unit, you can test the faulty unit offline to determine the cause of the problem.
B-10
OL-0800-06
Appendix B
Physical Layer MTP1 communications problem STP Physically/virtually broken signaling path SLT1
Ensure that power is on to the Cisco SLT. Check to ensure that the STP signal link cabling is correctly connected to the Cisco SLT. Disconnect the Cisco SLT from both the STP and the LAN switch for offline testing. Connect two recommended SS7 protocol analyzers, one to the STP interface the other to the IP interface. One SS7 protocol analyzer must be equipped to send/receive SS7 test messages to the Cisco SLT over the V.35 interface, and the other to send/receive messages to the Cisco SLT over the IP interface.
Caution
Do not leave the Cisco SLT connected to the LAN switch, and thus the Cisco MGC, while injecting SS7 test messages into the Cisco SLT. The Cisco MGC might not properly recognize the SS7 test messages generated by your protocol analyzer, which could cause error conditions between the Cisco MGC and the Cisco Media Gateway. Test Cisco SLT ports and hardware by conducting a loop test of the signal link, excluding connectivity to the distant end SS7 node and the LAN switch.
Step 4
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-11
Step 5
If no MTP1 problem is discovered by the test, then the MTP1 problem more than likely resides within the STP node or the connection to the STP node. If the problem is within the Cisco SLT, replace the unit.
STP
SLT1
MSUs FISUs
MSUs FISUs
27328
Check to ensure that the signal link cabling is correctly connected to the Cisco SLT. Disconnect the Cisco SLT from both the STP and the LAN switch for offline testing. Connect two recommended SS7 protocol analyzers. One SS7 protocol analyzer must be equipped to send/receive SS7 test messages to the Cisco SLT over the V.35 interface, and the other to send/receive messages to the Cisco SLT over the IP interface.
Step 3 Step 4
Test router ports and hardware by conducting a loop test of the signal link, excluding connectivity to the distant end SS7 node. If no MTP2 (link alignment) problem is discovered by the test, then the problem more than likely resides within the distant end STP node. If a problem is discovered with the Cisco SLT, replace the unit.
B-12
OL-0800-06
Appendix B
Troubleshooting Cisco SLT Signaling Troubleshooting Cisco SLT to Cisco MGC Communications
Identifying MTP3 and Higher Layer Problems, page B-13 Identifying Ethernet Connectivity Problems, page B-14 Identifying IP Communication Problems, page B-14 Identifying RUDP Communications Problems, page B-15
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-13
Figure B-4
STP to SLT to Cisco MGC MTP3 and higher layer SS7 protocol data processing
Cisco MGC
MTP3 ISUP
44251
Caution
Do not leave the Cisco SLT connected to the LAN switch, and thus the Cisco MGC, while injecting SS7 test messages into the Cisco SLT. The Cisco MGC might not properly recognize the SS7 test messages generated by your protocol analyzer, which could cause error conditions between the Cisco MGC and the media gateway.
Destination Not Reachable/No Echo Reply Source Quench/Receiving Buffer Congestion Redirection Required Time to Live Exceeded Parameter Problems Timestamp Request/Reply
B-14
OL-0800-06
Appendix B
Echo Request/Reply
If IP communication is good, then the RUDP application layer software could be the cause of the problem. Utilizing echo and timestamp request messages and monitoring response messages should be sufficient to identify RUDP/IP/Ethernet communication problems within the system.
Where ses_num is the number of the affected session. The system returns a response similar to the following:
SM: Failed to open session[0], return code = x
Where x is the RUDP return code. The valid value is an integer from 1 through 14. These return codes are defined as follows:
1RUDP_OPTION_NOT_SUPPORTED 2RUDP_NOT_READY 3RUDP_CONNREC_RESOURCE_UNAV 4RUDP_BUFFER_RESOURCE_UNAVAIL 5RUDP_EVENT_RESOURCE_UNAVAIL 6RUDP_EVENT_ENQUEUE_FAILED 7RUDP_INVALID_CONN_HANDLE 8RUDP_BUFFER_TOO_LARGE 9RUDP_EMPTY_SEND_BUFFER 10RUDP_CONNECTION_NOT_OPEN 11RUDP_SEND_WINDOW_FULL 12RUDP_REMOTE_PORT_REQUIRED 13RUDP_REMOTE_ADDRESS_REQUIRED 14RUDP_LOCAL_PORT_IN_USE
Message Name
OWNERR, PQUICC, LOG_ERR, MSG_TRACEBACK| MSG_PROCESS INITFAIL, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), SCC%d init failed
Definition An internal software error has occurred. The software failed to initialize/restart a 1T serial card.
Recommended Action Call your technical support representative for a software upgrade for the Cisco SLT. Clear the serial interface. If the message recurs, call your technical support representative for assistance.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-15
Table B-3
Message Name
CTSLOST, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), Clear to Send Lost
Definition The Clear To Send (CTS) input signal on a data terminal equipment (DTE) serial interface became inactive while transmitting a frame. This is the result of a communication line failure or cable disconnection.
Recommended Action Check the serial interface cable and/or communication equipment, such as the channel service unit/data service unit (CSU/DSU).
The system should recover; no action is While transmitting a frame, the serial required. controller chips local buffer received insufficient data, because data could not be transferred to the chip fast enough to keep pace with its output rate. Normally, such a problem is temporary, depending on transient peak loads within the system. The system received too many modem control signal interrupts. Modem control signals are hardware handshake signals between data terminal equipment (DTE) and data communications equipment (DCE). The signals include either a data carrier detect (DCD) or a data set ready (DSR), or both. Check the serial interface cable. The error can occur if the cable is disconnected or has come loose and is picking up noise. If the cable appears to be connected correctly, check the equipment connected to the cable.
BADHDXFSM, PQUICC, LOG_ALERT, 0, PQUICC(%d%%d), Unexpected HDX state %d, event %d TOOSMALL, PQUICC, LOG_ALERT, 0, "PQUICC(%d/%d), packet was less than 2 bytes"
A bad event was detected in the state machine Copy the error message exactly as it for half duplex transmission/reception. appears, and report it to your Cisco technical support representative. A small packet (less than 2 bytes) was queued The system should recover. No action is up for transmission.The interface cannot required. If the message recurs, it might handle such small packets for transmission. indicate a hardware error related to data traffic patterns. Copy the error message exactly as it appears, and report it to your Cisco technical support representative. A packet greater than the assigned MTU of this serial interface was queued up for transmission. The system should recover. No action is required. If the message recurs, it might indicate an error related to data traffic patterns. Copy the error message exactly as it appears, and report it to your Cisco technical support representative. Check part number on the WIC card to verify it is supported in the Cisco IOS release operational on the router, or contact your Cisco technical support representative.
The software does not recognize the WAN Interface Card (WIC) plugged into the port module.
If you need to contact your technical support representative for assistance, be prepared to provide the Cisco SLT and Cisco MGC debug trace information captured while the problem was occurring. In most cases, the backhaul trace and the LSC trace from the Cisco SLT would be required. If the problem is associated with link alignment, you should also include the IAC trace output. Trace information can help the investigator delineate the problem to the Cisco SLT or to the Cisco MGC.
B-16
OL-0800-06
Appendix B
To turn debug trace off, enter the command un all. The output from a show version command provides explicit details about the image and branch info. This information tells specifically which branch of code to investigate. The output from a show run command indicates what Cisco SLT configuration is in use. This is important because many problems can be caused by improper configurations, such as timer durations. Provide any information from show commands that you used to identify the problem; for example:
show ss7 sm stats
Include any other information that might be useful in understanding or reproducing the problem. This information will help your technical support representative verify the fix.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
B-17
B-18
OL-0800-06
A P P E N D I X
VLANs, page C-1 Command Line Interface, page C-1 Troubleshooting Virtual Pathways and ISLs, page C-3
VLANs
VLANs are configured within each switch, and help to simplify management. All intrasystem Ethernet message traffic is partitioned and routed over VLANs according to component origination and destination. The active VLAN configuration is exactly the same as that of the standby VLANs.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
C-1
Commands entered from the CLI can apply to the entire system or to a specific module, port, or virtual local area network (VLAN). Modules (module slots), ports, and VLANs are numbered starting with 1. For example, if you are using a Catalyst 5500 with a redundant supervisor engine, the supervisor modules reside in slots 1 and 2. On each module, port 1 is the leftmost port. To reference a specific port on a specific module, the command syntax is mod_num/port_num. For example, 3/1 denotes module 3, port 1. In some commands, such as set trunk, set cam, and set VLAN commands, you can enter lists of ports and VLANs. Designate ports by entering the module and port number pairs, separated by commas. To specify a range of ports, use a dash (-) between the module number and port number pairs. Dashes take precedence over commas. The following examples show several ways of designating ports: Example 1: 2/1,2/3 denotes module 2, port 1 and module 2, port 3 Example 2: 2/1-12 denotes module 2, ports 1 through 12 Example 3: 2/1-2/12 is the same as Example 2 Each VLAN is designated by a single number. You specify lists of VLANs in the same way that you do for ports. Individual VLANs are separated by commas (,); ranges are separated by dashes (-). In the following example, VLAN numbers 1 through 10 and VLAN 1000 are specified:
1-10,1000
Some commands require a Media Access Control (MAC) address, IP address, or IP alias, which must be designated in a standard format. The MAC address format must be six hexadecimal numbers separated by hyphens, as shown in this example:
00-00-0c-24-d2-fe
The IP address format is 32 bits, written as four octets separated by periods (dotted decimal format) that are made up of a network section, an optional subnet section, and a host section, as shown in this example:
126.2.54.1
If the IP alias table is configured, you can use IP aliases in place of the dotted decimal IP address. This is true for most commands that use an IP address, except commands that define the IP address or IP alias. For more information about the set interface and set IP alias commands, refer to the command reference for your switch.
C-2
OL-0800-06
Appendix C
At the Console> prompt, press Return (or Enter). At the Enter Password: prompt, enter the system password. The Console> prompt appears indicating that you have successfully accessed the CLI in normal operation mode. Enter the necessary commands to complete the required task. Enter quit and press Return (or Enter) to exit the session.
From the remote host, enter the Telnet command and designate the name or IP address of the switch you wish to access (Telnet hostname | IP address). At the Enter Password: prompt, enter the password for the CLI. There is no default password (just press Return or Enter) unless a password was previously established using the set password command. Enter the necessary commands to complete the required task. Enter quit and press Return (or Enter) to exit the Telnet session.
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
C-3
5/2
notconnect 1
normal
half
100 FDDI
Step 2
VLAN Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode Trans1 Trans2 ---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ -----998 trcrf 100998 4472 999 0xff srb 0 0
VLAN AREHops STEHops Backup CRF ---- ------- ------- ---------998 10 10 off
Step 3
Port Vlans allowed on trunk -------- -----------------------------------------------------2/1 1-1005 2/2 1-1005 Port -------2/1 2/2 Port -------2/1 2/2 Vlans allowed and active in management domain ------------------------------------------------------1,10,20,30,40,50,60 1,10,20,30,40,50,60 Vlans in spanning tree forwarding state and not pruned ------------------------------------------------------1,10,20,30,40,50,60 1,10,20,30,40,50,60
Step 4 Step 5
Use a PING utility program to echo response test the desired ports, VLANs, and ISLs. Check the switch equipment status, as described in the associated documentation. Replace suspected hardware, then return to Step 1 to verify switch operation.
C-4
OL-0800-06
A P P E N D I X
MML Counter Group:Name ACC-GROUP ACC: CALL REJ ACC: CALL RE-RTE
Description Automatic congestion control (ACC) statistics Number of calls rejected by ACC Number of calls rerouted by ACC
Related Components SS7 Signaling Service Trunk Groups: ISUP IPFAS MGCP NAS n/a Auxiliary Signaling Service
ALL-COUNTERS ASP-GROUP ASP: XMIT MSG ASP: RCV MSG ASP: RCV CONN REQ
Note
Lists all of the measurements Auxiliary signal path statistics Number of messages transmitted Number of messages received Number of call initiate messages received Calling statistics Number of successful calls Number of failed calls Number of failed calls due to a resource being unavailable Number of failed calls due to other reasons
The ASP-GROUP measurements are obsolete as of Release 9.2 of the Cisco MGC software MGC Network Element 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
CALL-GROUP CALL: SuccCall TOT CALL: FailCall TOT CALL: RUFailCall TOT CALL: ORFailCall TOT
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-1
Appendix D
Table D-1
MML Counter Group:Name CALL-GROUP (continued) CALL: OLFailCall TOT CALL: ACC REJ TOT CALL: ACC RE-RTE TOT CALL: PrepaidAccess CALL: PrepaidComplet CALL: RLFailCall TOT CALL: IncT38FaxReq CALL: IncT38FaxUsed CALL: OtgT38FaxReq CALL: OtgT38FaxUsed CAS-GROUP CAS: IN CALL ATMPT TOT CAS: IN CALL SUCC TOT CAS: OUT CALL ATMPT TOT CAS: OUT CALL SUCC TOT CAS: IN SZR ATMPT TOT CAS: IN SZR SUCC TOT CAS: OUT SZR ATMPT TOT CAS: OUT SZR SUCC TOT CAS: IN UNEXPECTED MSG
Description Calling statistics Number of failed calls due to overload Number of calls rejected by automatic congestion control (ACC) Number of calls re-routed by ACC Number of times the Prepaid Calling Card IN service is invoked Number of times a Prepaid Calling Card call reaches the connected state Number of times a call failed due to the route list being exhausted Number of times a T.38 fax tone is detected on incoming calls Number of times a T.38 fax is successfully completed on incoming calls Number of times a T.38 fax tone is detected on outgoing calls Number of times a T.38 fax is successfully completed on outgoing calls CAS traffic statistics Number of incoming call attempts Number of successful incoming calls Number of outgoing call attempts Number of successful outgoing calls Number of incoming seizure attempts Number of successful incoming seizures Number of outgoing seizure attempts Number of successful outgoing seizures Number of incoming unexpected messages
Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
D-2
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name C7LNK-GROUP C7LNK: RCV SU ERR C7LNK: XMIT SIO TOT C7LNK: RCV SIO TOT C7LNK: DUR IS C7LNK: DUR UNAVAIL C7LNK: MSU DROP-CONG C7SP-GROUP C7SP: SP DUR UNAVAIL C7SP: XMIT MSU DROP/RTE DL-GROUP DL: RCV UNSOL DL: RCV SABME DL-GROUP DL: XMIT T200 DL: RCV SEQ DL: RCV FRMR RESP DL: RCV SIZE DL: RCV SABMR
Note
Description SS7 link statistics Number of signaling units received Number of link realignment (SIF/SIO) messages transmitted Number of link realignment (SIF/SIO) messages received Number of seconds C7 link in-service Number of seconds C7 link unavailable Number of messages dropped due to congestion SS7 Signaling path statistics Number of seconds SP unavailable Number of transmitted messages dropped due to routing failure Data link statistics Number of unsolicited frames received Number of SABMEs received Data link statistics Number of T200 expires transmitted Number of bad N(R) frames received Number of bad frame responses Number of bad frame sizes received Number of DPNSS SABMR received H.323 calling statistics Number of successful calls terminated in an H.323 network Number of successful calls originated in an H.323 network Number of failed calls terminated in an H.323 network Number of failed calls originated in an H.323 network
Logging Interval 30 30 30 30 30 30
5, 30 30
15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
The DL-GROUP measurements are obsolete as of Release 9.2 of the Cisco MGC software EISUP Signaling Service 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
H323-GROUP H323: SUCC H323 TERM H323: SUCC H323 ORIG H323: FAIL H323 TERM H323: FAIL H323 ORIG
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-3
Appendix D
Table D-1
MML Counter Group:Name ISUP-GROUP ISUP: XMIT MSG TOT ISUP: RCV MSG TOT ISUP: XMIT ACM TOT ISUP: RCV ACM TOT ISUP: XMIT ANM TOT ISUP: RCV ANM TOT ISUP: XMIT BLO TOT ISUP: RCV BLO TOT ISUP: XMIT BLA TOT ISUP: RCV BLA TOT ISUP: XMIT CPG TOT ISUP: RCV CPG TOT ISUP: XMIT CGB TOT ISUP: RCV CGB TOT ISUP: XMIT CGBA TOT ISUP: RCV CGBA TOT ISUP: XMIT GRS TOT ISUP: RCV GRS TOT ISUP: XMIT GRA TOT ISUP: RCV GRA TOT ISUP: XMIT CGU TOT ISUP: RCV CGU TOT ISUP: XMIT CGUA TOT ISUP: RCV CGUA TOT ISUP: XMIT CFN TOT ISUP: RCV CFN TOT ISUP: XMIT CON TOT ISUP: RCV CON TOT ISUP: XMIT IAM TOT ISUP: RCV IAM TOT ISUP: XMIT INR TOT ISUP: RCV INR TOT ISUP: XMIT REL TOT
Description ISUP Signaling Service Statistics Number of messages transmitted, total Number of messages received, total Number of ACM messages transmitted Number of ACM messages received Number of ANM messages transmitted Number of ANM messages received Number of BLO messages transmitted Number of BLO messages received Number of BLA messages transmitted Number of BLA messages received Number of CPG messages transmitted Number of CPG messages received Number of CGB messages transmitted Number of CGB messages received Number of CGBA messages transmitted Number of CGBA messages received Number of GRS messages transmitted Number of GRS messages received Number of GRA messages transmitted Number of GRA messages received Number of CGU messages transmitted Number of CGU messages received Number of CGUA messages transmitted Number of CGUA messages received Number of CFN messages transmitted Number of CFN messages received Number of CON messages transmitted Number of CON messages received Number of IAM messages transmitted Number of IAM messages received Number of INR messages transmitted Number of INR messages received Number of REL messages transmitted
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
D-4
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name ISUP-GROUP (continued) ISUP: RCV REL TOT ISUP: XMIT INF TOT ISUP: RCV INF TOT ISUP: XMIT RLC TOT ISUP: RCV RLC TOT ISUP: XMIT RSC TOT ISUP: RCV RSC TOT ISUP: XMIT RES TOT ISUP: RCV RES TOT ISUP: XMIT SAM TOT ISUP: RCV SAM TOT ISUP: XMIT SUS TOT ISUP: RCV SUS TOT ISUP: XMIT UBL TOT ISUP: RCV UBL TOT ISUP: XMIT UBA TOT ISUP: RCV UBA TOT ISUP: XMIT USR TOT ISUP: RCV USR TOT ISUP: XMIT CCR TOT ISUP: RCV CCR TOT ISUP: XMIT COT TOT ISUP: RCV COT TOT ISUP: XMIT CQM TOT ISUP: RCV CQM TOT ISUP: XMIT CQR TOT ISUP: RCV CQR TOT ISUP: XMIT CRA TOT ISUP: RCV CRA TOT ISUP: XMIT CRM TOT ISUP: RCV CRM TOT ISUP: XMIT CVR TOT ISUP: RCV CVR TOT
Description ISUP Signaling Service Statistics (continued) Number of REL messages received Number of INF messages transmitted Number of INF messages received Number of RLC messages transmitted Number of RLC messages received Number of RSC messages transmitted Number of RSC messages received Number of RES messages transmitted Number of RES messages received Number of SAM messages transmitted Number of SAM messages received Number of SUS messages transmitted Number of SUS messages received Number of UBL messages transmitted Number of UBL messages received Number of UBA messages transmitted Number of UBA messages received Number of USR messages transmitted Number of USR messages received Number of CCR messages transmitted Number of CCR messages received Number of COT messages transmitted Number of COT messages received Number of CQM messages transmitted Number of CQM messages received Number of CQR messages transmitted Number of CQR messages received Number of CRA messages transmitted Number of CRA messages received Number of CRM messages transmitted Number of CRM messages received Number of CVR messages transmitted Number of CVR messages received
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-5
Appendix D
Table D-1
MML Counter Group:Name ISUP-GROUP (continued) ISUP: XMIT CVT TOT ISUP: RCV CVT TOT ISUP: XMIT EXM TOT ISUP: RCV EXM TOT ISUP: XMIT FAC TOT ISUP: RCV FAC TOT ISUP: XMIT FOT TOT ISUP: RCV FOT TOT ISUP: XMIT LPA TOT ISUP: RCV LPA TOT ISUP: XMIT PAM TOT ISUP: RCV PAM TOT ISUP: XMIT UCIC TOT ISUP: RCV UCIC TOT ISUP: XMIT FAA TOT ISUP: RCV FAA TOT ISUP: XMIT FAD TOT ISUP: RCV FAD TOT ISUP: XMIT FAR TOT ISUP: RCV FAR TOT ISUP: XMIT FRJ TOT ISUP: RCV FRJ TOT ISUP: XMIT SGM TOT ISUP: RCV SGM TOT ISUP: XMIT MPM TOT ISUP: RCV MPM TOT ISUP: ABN REL TOT ISUP: UNEX MSG TOT ISUP: UNREC MSG TOT ISUP: CHAN MATE UNAVAILABLE ISUP: AOC TOT ISUP: XMIT UPA TOT
Description ISUP Signaling Service Statistics (continued) Number of CVT messages transmitted Number of CVT messages received Number of EXM messages transmitted Number of EXM messages received Number of FAC messages transmitted Number of FAC messages received Number of FOT messages transmitted Number of FOT messages received Number of LPA messages transmitted Number of LPA messages received Number of PAM messages transmitted Number of PAM messages received Number of UCIC messages transmitted Number of UCIC messages received Number of FAA messages transmitted Number of FAA messages received Number of FAD messages transmitted Number of FAD messages received Number of FAR messages transmitted Number of FAR messages received Number of FRJ messages transmitted Number of FRJ messages received Number of SGM messages transmitted Number of SGM messages received Number of MPM messages transmitted Number of MPM messages received Number of abnormal clear messages received Number of unexpected messages received Number of unrecognized messages received Number of Channel Mate Unavailable messages received Number of calls that invoked the advice of charge (AOC) feature Number of UPA messages sent
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
5, 30
D-6
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name ISUP-GROUP (continued) ISUP: RCV UPA TOT ISUP: XMIT UPT TOT ISUP: RCV UPT TOT ISUP: XMIT BELGACOM1 TOT ISUP: RCV BELGACOM1 TOT ISUP: XMIT BELGACOM2 TOT ISUP: RCV BELGACOM2 TOT ISUP: XMIT EOH TOT ISUP: RCV EOH TOT ISUP: XMIT EOHA TOT ISUP: RCV EOHA TOT ISUP: XMIT NRM TOT ISUP: RCV NRM TOT ISUP: XMIT PRI TOT ISUP: RCV PRI TOT ISUP: XMIT OPR TOT ISUP: RCV OPR TOT ISUP: XMIT CHG TOT ISUP: RCV CHG TOT ISUP: XMIT FWT TOT ISUP: RCV FWT TOT ISUP: XMIT IDR TOT ISUP: RCV IDR TOT ISUP: XMIT IRS TOT ISUP: RCV IRS TOT ISUP: XMIT LPM TOT ISUP: RCV LPM TOT ISUP: XMIT MCID TOT ISUP: RCV MCID TOT ISUP: XMIT BELGACOM1 TOT ISUP: RCV BELGACOM1 TOT ISUP: XMIT BELGACOM2 TOT ISUP: RCV BELGACOM2 TOT
Description ISUP message traffic statistics Number of UPA messages received Number of UPT messages sent Number of UPT messages received Number of BELGACOM1 messages transmitted Number of BELGACOM1 messages received Number of BELGACOM2 messages transmitted Number of BELGACOM2 messages received Number of EOH messages transmitted Number of EOH messages received Number of EOHA messages transmitted Number of EOHA messages received Number of NRM messages transmitted Number of NRM messages received Number of PRI messages transmitted Number of PRI messages received Number of OPR messages transmitted Number of OPR messages received Number of CHG messages transmitted Number of CHG messages received Number of FWT messages transmitted Number of FWT messages received Number of IDR messages transmitted Number of IDR messages received Number of PRI messages transmitted Number of PRI messages received Number of LPM messages transmitted Number of LPM messages received Number of MCID messages transmitted Number of MCID messages received Number of BELGACOM1 messages transmitted Number of BELGACOM1 messages received Number of BELGACOM2 messages transmitted Number of BELGACOM2 messages received
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-7
Appendix D
Table D-1
MML Counter Group:Name ISUP-GROUP (continued) ISUP: XMIT EOH TOT ISUP: RCV EOH TOT ISUP: XMIT EOHA TOT ISUP: RCV EOHA TOT ISUP: XMIT NRM TOT ISUP: RCV NRM TOT ISUP: XMIT PRI TOT ISUP: RCV PRI TOT ISUP: XMIT OPR TOT ISUP: RCV OPR TOT ISUP: XMIT CHG TOT ISUP: RCV CHG TOT ISUP: XMIT FWT TOT ISUP: RCV FWT TOT ISUP: XMIT IDR TOT ISUP: RCV IDR TOT ISUP: XMIT IRS TOT ISUP: RCV IRS TOT ISUP: XMIT LPM TOT ISUP: RCV LPM TOT ISUP: XMIT MCID TOT ISUP: RCV MCID TOT IUA GROUP IUA: ASPUpTx
Description ISUP message traffic statistics Number of EOH messages sent Number of EOH messages received Number of EOHA messages sent Number of EOHA messages received Number of NRM messages sent Number of NRM messages received Number of PRI messages sent Number of PRI messages received Number of OPR messages sent Number of OPR messages received Number of CHG messages sent Number of CHG messages received Number of FWT messages sent Number of FWT messages received Number of IDR messages sent Number of IDR messages received Number of IRS messages sent Number of IRS messages received Number of LPM messages sent Number of LPM messages received Number of MCID messages sent Number of MCID messages received IUA message statistics Number of application server process (ASP) Up messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is ready to receive traffic or maintenance messages. Number of ASP Up Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of ASP Down messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is not ready to receive traffic or maintenance messages.
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
IUA: ASPUpAckRx
15, 60, 24
IUA: ASPDnTx
15, 60, 24
D-8
OL-0800-06
Appendix D
Table D-1
Description IUA message statistics Number of ASP Up Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of ASP Active messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is active. Number of ASP Active Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of ASP Inactive messages sent from the Cisco MGC to the media gateway on this SCTP association. These messages indicate that the Cisco MGC is inactive. Number of ASP Inactive Acknowledgement messages received by the Cisco MGC from the media gateway on this SCTP association. Number of Error messages received by the Cisco MGC from the media gateway on this SCTP association. Number of Notify messages received by the Cisco MGC from the media gateway on this SCTP association. These messages provide autonomous indications of IUA events on the media gateway. Number of Data messages sent from the Cisco MGC to the media gateway on this SCTP association. Each messages is transmitted through the use of the Q.921 acknowledged information transfer service. Number of Data messages received by the Cisco MGC from the media gateway on this SCTP association. Each message is received through the use of the Q.921 acknowledged information transfer service. Number of Data messages sent from the Cisco MGC to the media gateway on this SCTP association. Each message is transmitted through the use of the Q.21 unacknowledged information transfer service.
IUA: ASPActTx
15, 60, 24
IUA: ASPActAckRx
15, 60, 24
IUA: ASPInactTx
15, 60, 24
IUA: ASPInactAckRx
15, 60, 24
IUA: ErrorRx
15, 60, 24
IUA: NotifyRx
15, 60, 24
IUA: DataRqt
15, 60, 24
IUA: DataInd
15, 60, 24
IUA: UnitDataRqt
15, 60, 24
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-9
Appendix D
Table D-1
Description IUA message statistics (continued) Number of Data messages received by the Cisco MGC from the media gateway on this SCTP association. Each message is received through the user of the Q.21 unacknowledged information transfer service. Number of requests that an SCTP association be established. Number of confirmations that IUA has established an SCTP association with the media gateway. Number of times that the media gateway has informed Link Management that the Cisco MGC has established an SCTP association.
Number of requests for the release of an SCTP association with a media gateway. Number of confirmations that IUA has released an SCTP association with the media gateway. Number of times that the media gateway has informed Link Management that the Cisco MGC has released an SCTP association. Line interface statistics Number of severely errored seconds Number of errored seconds Number of code violations Number of frame slips M3UA message statistics Number of error messages transmitted. Number of error messages received Number of notify messages transmitted Number of notify messages received Number of DUNA messages received Number of DAVA messages received Number of DAUD messages transmitted Number of SCON messages received Number of DRST messages received Number of DUPU messages transmitted Association TDM Link SS7 Link
LIF GROUP LIF: SES, 15/10, 60/30, 24/200 LIF: ES LIF: CODE VIOLATION LIF: FRAME SLIP
Note
The LIF GROUP measurements are obsolete as of Release 9.2 of the Cisco MGC software 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
M3UA GROUP M3UA: ErrorTx M3UA: ErrorRx M3UA: NotifyTx M3UA: NotifyRx M3UA: DunaRx M3UA: DavaRx M3UA: DaudTx M3UA: SconRx M3UA: DrstRx M3UA: DupuRx
D-10
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name M3UA GROUP (continued) M3UA: ASPUpTx M3UA: ASPDnTx M3UA: ASPUpAckRx M3UA: ASPDnAckRx M3UA: ASPActTx M3UA: ASPInactTx M3UA: AspActAckRx M3UA: AspInactAckRx M3UA: DataXferTx M3UA: DataXferRx M3UA: DataBytesTx M3UA: DataBytesRx M3UA: InvSctpSig M3UA: AssocFail M3UA: AssocTxFail M3UA: RxVersionErr M3UA: RxMsgClassErr M3UA: RxMsgTypeErr M3UA: RxMsgLenErr M3UA: RxStrmIdErr
Description M3UA message statistics Number of ASP UP messages transmitted Number of ASP DOWN messages transmitted Number of ASP UP acknowledgements received Number of ASP DOWN acknowledge messages received Number of ASP ACTIVE messages transmitted Number of ASP INACTIVE messages transmitted Number of ASP ACTIVE ACK messages received Number of ASP INACTIVE ACK messages received Number of DATA transfer messages transmitted Number of DATA transfer messages received Number of M3UA data bytes transmitted Number of M3UA data bytes received Number of invalid SCTP signals received by M3UA Number of SCTP association failures Number of transmit SCTP failures Number of messages received with an invalid version Number of received messages with an unexpected or unsupported Message Class Number of messages received with an unexpected or unsupported Message Type Number of messages received with length error Number of messages received with stream ID error, when a message is received on an unexpected SCTP stream (for example, a Management message was received on a stream other than "0") Number of unexpected messages received - a defined and recognized message is received that is not expected in the current state
Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
M3UA: RxUnexpMsgErr
15, 60, 24
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-11
Appendix D
Table D-1
Description M3UA message statistics Number of messages received with protocol errors, for any protocol anomaly (that is, reception of a parameter that is syntactically correct but unexpected in the current state). Number of messages received with parameter value errors Number of messages received with a parameter having a wrong length field Number of messages received that contain one or more invalid parameters Number of messages received with an invalid (unconfigured) Network Appearance. Number of messages received with an invalid (unconfigured) Routing Context. Number of messages that were dumped because memory ran out (buffer overflow). National User Part Statistics Number of messages transmitted, total Number of messages received, total Number of unexpected messages received Overload Statistics Number of minutes in level 1 overload condition Number of minutes in level 2 overload condition Number of minutes in level 3 overload condition Number of minutes in level 0 overload condition Number of transitions from level 0 to level 1 overload condition Number of transitions from level 0 to level 2 overload condition Number of transitions from level 0 to level 3 overload condition ISDN PRI Link statistics
M3UA: RxParmValErr M3UA: RxParmFieldErr M3UA: RxUnexpParmErr M3UA: RxNtwkAppErr M3UA: RouteCntxErr M3UA: RxNoMemErr NUP-GROUP NUP: XMIT MSG TOT NUP: RCV MSG TOT NUP: UNEX MSG TOT OVL-GROUP OVL: LVL1 Duration OVL: LVL2 Duration OVL: LVL3 Duration OVL: LVL0 Duration OVL: LVL0-LVL1 TOT OVL: LVL0-LVL2 TOT OVL: LVL0-LVL3 TOT PRI-GROUP
15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 SS7 Signaling Service
5, 30 5, 30 5, 30
15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
PRI: CHAN MATE UNAVAILABLE Number of times ISDN PRI link channel mate unavailable
15, 60, 24
D-12
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name SC-GROUP SC: XMIT FRM TOT SC: RCV FRM TOT SC: RCV BAD CRC SC: RCV BAD TOT SC: RCV FRMR SC: RCV RESET SCCP-GROUP SCCP:ROUTING FAILURE SCCP: UDT XMIT SCCP: UDTS XMIT SCCP: UDT RCV SCCP: UDTS RCV SCCP: TOTAL MSG SCTP-GROUP SCTP: OOTB SCTP: InvalidChksum SCTP: CtrlTx SCTP: OrdDataTx SCTP: UnordDataTx SCTP: CtrlRx SCTP: OrdDataRx SCTP: UnordDataRx SCTP: DataSegTx SCTP: DataSegRx SCTP: AssocFailures SCTP: DestFailures SCTP: PeerRestarted SIP-GROUP SIP: XMIT MSG TOT SIP: RCV MSG TOT SIP: RETX INV TOT SIP: RETX BYE TOT SIP: RETX CAN TOT
Description Signaling link statistics Total number of frames transmitted Total number of frames received Number of bad CRCs received Total number of bad frames received Number of bad FRMRs received Number of RESETs received Signaling Connection Control Part statistics Total number of routing failures Number of unit data messages transmitted Number of unit data service messages transmitted Number of unit data messages received Number of unit data service messages received Total number of messages handled SCTP traffic statistics Number of out of the blue packets received. Number of checksum error packets received. Number of control chunks sent. Number of ordered data chunks sent. Number of unordered data chunks sent. Number of control chunks received. Number of ordered data chunks received. Number of unordered data chunks received. Number of SCTP data segments sent. Number of SCTP data segments received. Number of association failures. Number of destination failures. Number of peer restarts. SIP traffic statistics Number of messages transmitted Number of messages received Number of INVITE messages retransmitted Number of BYE messages retransmitted Number of CANCEL messages retransmitted
Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
Association 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 MGC Network Element 30 30 30 30 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-13
Appendix D
Table D-1
MML Counter Group:Name SIP-GROUP (continued) SIP: RETX REG TOT SIP: RETX RESP TOT SIP: RETX MSG TOT SIP: RCV INVALID MSG TOT SIP: XMIT INV TOT SIP: RCV INV TOT SIP: XMIT ACK TOT
Description SIP traffic statistics Number of REGISTER messages retransmitted Number of RESPONSE messages retransmitted Number of retransmitted messages Number of invalid messages received Number of INVITE messages transmitted Number of INVITE messages received Number of ACKnowledgement messages transmitted Number of ACKnowledgement messages received Number of BYE messages transmitted Number of BYE messages received Number of CANCEL messages transmitted Number of CANCEL messages received Number of REGISTER messages transmitted Number of REGISTER messages received Number of OPTION messages transmitted Number of OPTION messages received Number of TRYING messages transmitted Number of TRYING messages received Number of RINGING messages transmitted Number of RINGING messages received Number of CALL IS BEING FORWARDED messages transmitted Number of CALL IS BEING FORWARDED messages received Number of QUEUED messages transmitted Number of QUEUED messages received Number of SESSION PROGRESS messages transmitted Number of SESSION PROGRESS messages received Number of OK messages transmitted Number of OK messages received
Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
SIP: RCV ACK TOT SIP: XMIT BYE TOT SIP: RCV BYE TOT SIP: XMIT CAN TOT SIP: RCV CAN TOT SIP: XMIT REG TOT SIP: RCV REG TOT SIP: XMIT OPT TOT SIP: RCV OPT TOT SIP: XMIT 100 TOT SIP: RCV 100 TOT SIP: XMIT 180 TOT SIP: RCV 180 TOT SIP: XMIT 181 TOT SIP: RCV 181 TOT SIP: XMIT 182 TOT SIP: RCV 182 TOT SIP: XMIT 183 TOT SIP: RCV 183 TOT SIP: XMIT 200 TOT SIP: RCV 200 TOT
D-14
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name SIP-GROUP (continued) SIP: XMIT 300 TOT SIP: RCV 300 TOT SIP: XMIT 301 TOT SIP: RCV 301 TOT SIP: XMIT 302 TOT SIP: RCV 302 TOT SIP: XMIT 305 TOT SIP: RCV 305 TOT SIP: XMIT 380 TOT SIP: RCV 380 TOT SIP: XMIT 400 TOT SIP: RCV 400 TOT SIP: XMIT 401 TOT SIP: RCV 401 TOT SIP: XMIT 402 TOT SIP: RCV 402 TOT SIP: XMIT 403 TOT SIP: RCV 403 TOT SIP: XMIT 404 TOT SIP: RCV 404 TOT SIP: XMIT 405 TOT SIP: RCV 405 TOT
Description SIP traffic statistics (continued) Number of MULTIPLE CHOICES messages transmitted Number of MULTIPLE CHOICES messages received Number of MOVED PERMANENTLY messages transmitted Number of MOVED PERMANENTLY messages received Number of MOVED TEMPORARILY messages transmitted Number of MOVED TEMPORARILY messages received Number of USE PROXY messages transmitted Number of USE PROXY messages received Number of ALTERNATIVE SERVICE messages transmitted Number of ALTERNATIVE SERVICE messages received Number of BAD REQUEST messages transmitted Number of BAD REQUEST messages received Number of UNAUTHORIZED messages transmitted Number of UNAUTHORIZED messages received Number of PAYMENT REQUIRED messages transmitted Number of PAYMENT REQUIRED messages received Number of FORBIDDEN messages transmitted Number of FORBIDDEN messages received Number of NOT FOUND messages transmitted Number of NOT FOUND messages received Number of METHOD NOT ALLOWED messages transmitted Number of METHOD NOT ALLOWED messages received
Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-15
Appendix D
Table D-1
MML Counter Group:Name SIP-GROUP (continued) SIP: XMIT 406 TOT SIP: RCV 406 TOT SIP: XMIT 407 TOT SIP: RCV 407 TOT SIP: XMIT 408 TOT SIP: RCV 408 TOT SIP: XMIT 409 TOT SIP: RCV 409 TOT SIP: XMIT 410 TOT SIP: RCV 410 TOT SIP: XMIT 411 TOT SIP: RCV 411 TOT SIP: XMIT 413 TOT SIP: RCV 413 TOT SIP: XMIT 414 TOT SIP: RCV 414 TOT SIP: XMIT 415 TOT SIP: RCV 415 TOT SIP: XMIT 420 TOT SIP: RCV 420 TOT SIP: XMIT 480 TOT
Description SIP traffic statistics (continued) Number of NOT ACCEPTABLE messages transmitted Number of NOT ACCEPTABLE messages received Number of PROXY AUTHENTICATION REQUIRED messages transmitted Number of PROXY AUTHENTICATION REQUIRED messages received Number of REQUEST TIMEOUT messages transmitted Number of REQUEST TIMEOUT messages received Number of CONFLICT messages transmitted Number of CONFLICT messages received Number of GONE messages transmitted Number of GONE messages received Number of LENGTH REQUIRED messages transmitted Number of LENGTH REQUIRED messages received Number of REQUEST ENTITY TOO LARGE messages transmitted Number of REQUEST ENTITY TOO LARGE messages received Number of REQUEST-URI TOO LONG messages transmitted Number of REQUEST-URI TOO LONG messages received Number of UNSUPPORTED MEDIA TYPE messages transmitted Number of UNSUPPORTED MEDIA TYPE messages received Number of BAD EXTENSION messages transmitted Number of BAD EXTENSION messages received Number of TEMPORARILY NOT AVAILABLE messages transmitted
Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
D-16
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name SIP-GROUP (continued) SIP: RCV 480 TOT SIP: XMIT 481 TOT SIP: RCV 481 TOT SIP: XMIT 482 TOT SIP: RCV 482 TOT SIP: XMIT 483 TOT SIP: RCV 483 TOT SIP: XMIT 484 TOT SIP: RCV 484 TOT SIP: XMIT 485 TOT SIP: RCV 485 TOT SIP: XMIT 486 TOT SIP: RCV 486 TOT SIP: XMIT 487 TOT SIP: RCV 487 TOT SIP: XMIT 500 TOT SIP:RCV 500 TOT SIP: XMIT 501 TOT SIP: RCV 501 TOT SIP: XMIT 502 TOT
Description SIP traffic statistics (continued) Number of TEMPORARILY NOT AVAILABLE messages received Number of CALL LEG/ TRANSACTION DOES NOT EXIST messages transmitted Number of CALL LEG/ TRANSACTION DOES NOT EXIST messages received Number of LOOP DETECTED messages transmitted Number of LOOP DETECTED messages received Number of TOO MANY HOPS messages transmitted Number of TOO MANY HOPS messages received Number of ADDRESS INCOMPLETE messages transmitted Number of ADDRESS INCOMPLETE messages received Number of AMBIGUOUS messages transmitted Number of AMBIGUOUS messages received Number of BUSY HERE messages transmitted Number of BUSY HERE messages received Number of REQUEST CANCELLED messages transmitted Number of REQUEST CANCELLED messages received Number of INTERNAL SERVER ERROR messages transmitted Number of INTERNAL SERVER ERROR messages transmitted Number of NOT IMPLEMENTED messages transmitted Number of NOT IMPLEMENTED messages received Number of BAD GATEWAY messages transmitted
Logging Interval 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-17
Appendix D
Table D-1
MML Counter Group:Name SIP-GROUP (continued) SIP: RCV 502 TOT SIP: XMIT 503 TOT SIP: RCV 503 TOT SIP: XMIT 504 TOT
Description SIP traffic statistics (continued) Number of BAD GATEWAY messages received Number of SERVICE UNAVAILABLE messages transmitted Number of SERVICE UNAVAILABLE messages received Number of GATEWAY TIMEOUT messages transmitted Number of GATEWAY TIMEOUT messages received Number of SIP VERSION NOT SUPPORTED messages transmitted Number of SIP VERSION NOT SUPPORTED messages received Number of BUSY EVERYWHERE messages transmitted Number of BUSY EVERYWHERE messages received Number of DECLINE messages transmitted Number of DECLINE messages received Number of DOES NOT EXIST ANYWHERE messages transmitted Number of DOES NOT EXIST ANYWHERE messages received Number of NOT ACCEPTABLE messages transmitted Number of NOT ACCEPTABLE messages received Number of PRACK messages retransmitted Number of PRACK messages transmitted Number of PRACK messages received Number of SIP to SIP calls attempted Number of SIP to SIP calls completed
Logging Interval
30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
SIP: RCV 504 TOT SIP: XMIT 505 TOT SIP: RCV 505 TOT SIP: XMIT 600 TOT SIP: RCV 600 TOT SIP: XMIT 603 TOT SIP: RCV 603 TOT SIP: XMIT 604 TOT SIP: RCV 604 TOT SIP: XMIT 606 TOT SIP: RCV 606 TOT SIP: RETX PRACK TOT SIP: XMIT PRACK TOT SIP: RCV PRACK TOT SIP: SIP2SIP CALLS ATTEMPT SIP: SIP2SIP CALLS COMPL
D-18
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name SIPLINK-GROUP SIPLINK: XMIT MSG TOT SIPLINK: RCV MSG TOT SIPLINK: XMIT FAIL TOT SIPLINK: RCV FAIL TOT SIPLINK: DNS QUERY TOT SIPLINK: DNS TIMEOUT TOT SIPLINK: BAD URL TOT SIPLINK: DNS CACHE NEW TOT SIPLINK: DNS CACHE PURGE TOT SIPLINK: DNS CACHE REFRESHED TOT SIPLINK: ICMP ERR TOT SP-GROUP SP: cInit in SP: cInit out SP: PDU in SP: PDU out SP: Blacklist Call Ctr SP: COT Failure
Note
Description SIP link statistics Number of messages transmitted Number of messages received Number of UPD transmitted failed Number of UPD received failed Number of DNS queries Number of DNS timeouts Number of unresolved URLs Number of new entries in the DNS cache Number of entries purged from the DNS cache Number of entries refreshed in the DNS cache Number of ICMP errors Signaling service statistics Number of call init messages received Number of call init messages sent Number of messages received Number of messages sent Number of blacklist calls counter Number of COT failures User Defined Statistics Number of CDBs transmitted User defined count 1 User defined count 2 User defined count 3 User defined count 4 User defined count 5 User defined count 6 User defined count 7 User defined count 8 User defined count 9 User defined count 10
Logging Interval 30 30 30 30 30 30 30 30 30 30 30
15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
The SP: Blacklist Call Ctr and SP: COT Failure measurements are not currently supported. MGC Network Element 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
STATE-GROUP STATE: CDB ReCord Xmit STATE: User Count1 STATE: User Count2 STATE: User Count3 STATE: User Count4 STATE: User Count5 STATE: User Count6 STATE: User Count7 STATE: User Count8 STATE:User Count 9 STATE: User Count10
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-19
Appendix D
Table D-1
MML Counter Group:Name STATE-GROUP (continued) STATE: User Count11 STATE: User Count12 STATE: User Count13 STATE: User Count14 STATE: User Count15 STATE: User Count16 STATE: User Count17 STATE: User Count18 STATE: User Count19 STATE: User Count20 STATE: User Count21 STATE: User Count22 STATE: User Count23 STATE: User Count24 STATE: User Count25 SUA GROUP SUA: ErrorTx SUA: ErrorRx SUA: NotifyTx SUA: NotifyRx SUA: DunaRx SUA: DavaRx SUA: DaudTx SUA: SconRx SUA: DrstRx SUA: DupuRx SUA: ASPUpTx SUA: ASPDnTx SUA: ASPUpAckRx SUA: ASPDnAckRx SUA: ASPActTx SUA: ASPInactTx
Description User Defined Statistics User defined count 11 User defined count 12 User defined count 13 User defined count 14 User defined count 15 User defined count 16 User defined count 17 User defined count 18 User defined count 19 User defined count 20 User defined count 21 User defined count 22 User defined count 23 User defined count 24 User defined count 25 SUA message statistics Number of error messages transmitted Number of error messages received Number of notify messages transmitted Number of notify messages received Number of DUNA messages received Number of DAVA messages received Number of DAUD messages transmitted Number of SCON messages received Number of DRST messages received Number of DUPU messages transmitted Number of ASP UP messages transmitted Number of ASP DOWN messages transmitted Number of ASP UP acknowledgements received Number of ASP DOWN acknowledge messages received Number of ASP ACTIVE messages transmitted Number of ASP INACTIVE messages transmitted
Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
Association 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
D-20
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name SUA GROUP (continued) SUA: AspActAckRx SUA: AspInactAckRx SUA: CldtTx SUA: CldrRx SUA: DataBytesTx SUA: DataBytesRx SUA: InvSctpSig SUA: AssocFail SUA: AssocTxFail SUA: RxVersionErr SUA: RxMsgClassErr
Description SUA message statistics Number of ASP ACTIVE ACK messages received Number of ASP INACTIVE ACK messages received Number of Connectionless Data Transfers sent Number of Connectionless Data Responses received Number of SUA data bytes transmitted Number of SUA data bytes received Number of invalid SCTP signals received by SUA Number of SCTP association failures Number of transmit SCTP failures Number of messages received with an invalid version. Number of received messages with an unexpected or unsupported Message Class. Number of messages received with an unexpected or unsupported Message Type Number of messages received with length error Number of messages received with stream ID error, when a message is received on an unexpected SCTP stream (that is, a Management message was received on a stream other than "0") Number of unexpected messages received, a defined and recognized message is received that is not expected in the current state Number of messages received with protocol errors, for any protocol anomaly (that is, reception of a parameter that is syntactically correct but unexpected in the current state). Number of messages received with parameter value errors Number of messages received with a parameter having a wrong length field Number of messages received that contain one or more invalid parameters
Logging Interval 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
SUA: RxUnexpMsgErr
15, 60, 24
SUA: RxProtErr
15, 60, 24
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-21
Appendix D
Table D-1
MML Counter Group:Name SUA GROUP (continued) SUA: RxNtwkAppErr SUA: RouteCntxErr SUA: RxNoMemErr TALI-GROUP TALI: XMIT SCCP TOT TALI: RCV SCCP TOT TALI: XMIT ISUP TOT TALI: RCV ISUP TOT TALI: XMIT MTP3 TOT TALI: RCV MTP3 TOT TALI: XMIT TEST TOT TALI: RCV TEST TOT TALI: XMIT ALLO TOT TALI: RCV ALLO TOT TALI: XMIT PROH TOT TALI: RCV PROH TOT TALI: XMIT PROA TOT TALI: RCV PROA TOT TALI: XMIT MONI TOT TALI: RCV MONI TOT TALI: XMIT MONA TOT TALI: RCV MONA TOT TALI: XMIT RKRP TOT TALI: RCV RKRP TOT TALI: XMIT MGMT TOT TALI: RCV MGMT TOT
Description SUA message statistics Number of messages received with an invalid (unconfigured) Network Appearance. Number of messages received with an invalid (unconfigured) Routing Context. Number of messages that were dumped because memory ran out (buffer overflow). TALI traffic statistics Number of SCCP service messages sent Number of SCCP service messages received Number of ISUP service messages sent Number of ISUP service messages received Number of MTP Level 3 service messages sent Number of MTP Level 3 service messages received Number of Test service messages sent Number of Test service messages received Number of Allow messages sent Number of Allow messages received Number of Prohibit messages sent Number of Prohibit messages received Number of Prohibit Acknowledge messages sent Number of Prohibit Acknowledge messages received Number of Monitor messages sent Number of Monitor messages received Number of Monitor Acknowledge messages sent Number of Monitor Acknowledge messages received Number of Routing Key Registration messages sent Number of Routing Key Registration messages received Number of Management messages sent Number of Management messages received
15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24 15, 60, 24
D-22
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name TALI-GROUP (continued) TALI: XMIT TOT TALI: RCV VALID TOT TALI: RCV INVALID TOT TALI-RSP-GROUP TALI: MIN RSP TIME TALI: AVG RSP TIME TALI: MAX RSP TIME TCAP-GROUP TCAP: MSG XMIT TCAP: QWP XMIT TCAP: RSP XMIT TCAP: UNI XMIT TCAP: ABT XMIT TCAP: MSG RCV TCAP: QWP RCV TCAP: RSP RCV TCAP: UNI RCV TCAP: ABT RCV TCAP: MSG DROP TCAP: MSG UNREC TCAP: BEGIN XMIT
Description TALI traffic statistics (continued) Number of messages sent Number of valid messages received Number of invalid messages received TALI Response statistics Minimum response time in milliseconds Average response time in milliseconds Maximum response time in milliseconds Transaction Capabilities Application Part statistics Total number of messages transmitted Number of Query with permission messages transmitted Number of Response messages transmitted Number of Unidirectional messages transmitted Number of Abort messages transmitted Total number of messages received Number of Query with permission messages received Number of Response messages received Number of Unidirectional messages received Number of Abort messages received Number of messages dropped Number of unrecognized messages received Number of Begin messages transmitted. This measurement is valid only for ETSI and ITU TCAP. Number of Begin messages received. This measurement is valid only for ETSI and ITU TCAP. Number of End messages transmitted. This measurement is valid only for ETSI and ITU TCAP. Number of End messages received. This measurement is valid only for ETSI and ITU TCAP.
5 5 5
5, 30
5, 30
5, 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-23
Appendix D
Table D-1
Description Transaction Capabilities Application Part statistics (continued) Number of Continue messages transmitted. This measurement is valid only for ETSI and ITU TCAP. Number of Continue messages received. This measurement is valid only for ETSI and ITU TCAP. Number of Conversation messages transmitted. This measurement is valid only for ANSI TCAP. Number of Conversation messages received. This measurement is valid only for ANSI TCAP. Telephone User Part statistics Number of messages transmitted, total Number of messages received, total Number of ACB messages transmitted Number of ACB messages received Number of ACC messages transmitted Number of ACC messages received Number of ACM messages transmitted Number of ACM messages received Number of ADI messages transmitted Number of ADI messages transmitted Number of ANC messages received Number of ANC messages transmitted Number of ANN messages received Number of ANN messages transmitted Number of ANU messages received Number of ANU messages transmitted Number of BLO messages received Number of BLO messages transmitted Number of BLA messages received Number of BLA messages transmitted Number of CBK messages received Number of CBK messages transmitted
Logging Interval
5, 30
5, 30
5, 30
TCAP: CONV RCV TUP-GROUP TUP: XMIT MSG TOT TUP: RCV MSG TOT TUP: XMIT ACB TOT TUP: RCV ACB TOT TUP: XMIT ACC TOT TUP: RCV ACC TOT TUP: XMIT ACM TOT TUP: RCV ACM TOT TUP: XMIT ADI TOT TUP: RCV ADI TOT TUP: XMIT ANC TOT TUP: RCV ANC TOT TUP: XMIT ANN TOT TUP: RCV ANN TOT TUP: XMIT ANU TOT TUP: RCV ANU TOT TUP: XMIT BLO TOT TUP: RCV BLO TOT TUP: XMIT BLA TOT TUP: RCV BLA TOT TUP: XMIT CBK TOT TUP: RCV CBK TOT
5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5,30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
D-24
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name TUP-GROUP (continued) TUP: XMIT CCF TOT TUP: RCV CCF TOT TUP: XMIT CCL TOT TUP: RCV CCL TOT TUP: XMIT CCR TOT TUP: RCV CCR TOT TUP: XMIT CFL TOT TUP: RCV CFL TOT TUP: XMIT CGC TOT TUP: RCV CGC TOT TUP: XMIT CHG TOT TUP: RCV CHG TOT TUP: XMITCLF TOT TUP: RCV CLF TOT TUP: XMIT COT TOT TUP: RCV COT TOT TUP: XMIT DPN TOT TUP: RCV DPN TOT TUP: XMIT EUM TOT TUP: RCV EUM TOT TUP: XMIT FOT TOT TUP: RCV FOT TOT TUP: XMIT GRA TOT TUP: RCV GRA TOT TUP: XMIT GRQ TOT TUP: RCV GRQ TOT TUP: XMIT GRS TOT TUP: RCV GRS TOT TUP: XMIT GSM TOT TUP: RCV GSM TOT TUP: XMIT HBA TOT TUP: RCV HBA TOT TUP: XMIT HGB TOT
Description Telephone User Part statistics (continued) Number of CCF messages received Number of CCF messages transmitted Number of CCL messages received Number of CCL messages transmitted Number of CCR messages received Number of CCR messages transmitted Number of CFL messages received Number of CFL messages transmitted Number of CGC messages received Number of CGC messages transmitted Number of CHG messages transmitted Number of CHG messages received Number of CLF messages transmitted Number of CLF messages received Number of COT messages transmitted Number of COT messages received Number of DPN messages transmitted Number of DPN messages received Number of EUM messages transmitted Number of EUM messages received Number of FOT messages transmitted Number of FOT messages received Number of GRA messages transmitted Number of GRA messages received Number of GRQ messages transmitted Number of GRQ messages received Number of GRS messages transmitted Number of GRS messages received Number of GSM messages transmitted Number of GSM messages received Number of HBA messages transmitted Number of HBA messages received Number of HGB messages transmitted
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-25
Appendix D
Table D-1
MML Counter Group:Name TUP-GROUP (continued) TUP: RCV HGB TOT TUP: XMIT HGU TOT TUP: RCV HGU TOT TUP: XMIT HUA TOT TUP: RCV HUA TOT TUP: XMIT IAI TOT TUP: RCV IAI TOT TUP: XMIT IAM TOT TUP: RCV IAM TOT TUP: XMIT LOS TOT TUP: RCV LOS TOT TUP: XMIT MAL TOT TUP: RCV MAL TOT TUP: XMIT MBA TOT TUP: RCV MBA TOT TUP: XMIT MGB TOT TUP: RCV MGB TOT TUP: XMIT MGU TOT TUP: RCV MGU TOT TUP: XMIT MPM TOT TUP: RCV MPM TOT TUP: XMIT MUA TOT TUP: RCV MUA TOT TUP: XMIT NNC TOT TUP: RCV NNC TOT TUP: XMIT OPR TOT TUP: RCV OPR TOT TUP: XMIT RAN TOT TUP: RCV RAN TOT TUP: XMIT RLG TOT TUP: RCV RLG TOT TUP: XMIT RSC TOT TUP: RCV RSC TOT
Description Telephone User Part statistics (continued) Number of HGB messages received Number of HGU messages transmitted Number of HGU messages received Number of HUA messages transmitted Number of HUA messages received Number of IAI messages transmitted Number of IAI messages received Number of IAM messages transmitted Number of IAM messages received Number of LOS messages transmitted Number of LOS messages received Number of MAL messages transmitted Number of MAL messages received Number of MBA messages transmitted Number of MBA messages received Number of MGB messages transmitted Number of MGB messages received Number of MGU messages transmitted Number of MGU messages received Number of MPM messages transmitted Number of MPM messages received Number of MUA messages transmitted Number of MUA messages received Number of NNC messages transmitted Number of NNC messages received Number of OPR messages transmitted Number of OPR messages received Number of RAN messages transmitted Number of RAN messages received Number of RLG messages transmitted Number of RLG messages received Number of RSC messages transmitted Number of RSC messages received
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
D-26
OL-0800-06
Appendix D
Table D-1
MML Counter Group:Name TUP-GROUP (continued) TUP: XMIT SAM TOT TUP: RCV SAM TOT TUP: XMIT SAO TOT TUP: RCV SAO TOT TUP: XMIT SBA TOT TUP: RCV SBA TOT TUP: XMIT SEC TOT TUP: RCV SEC TOT TUP: XMIT SGB TOT TUP: RCV SGB TOT TUP: XMIT SGU TOT TUP: RCV SGU TOT TUP: XMIT SLB TOT TUP: RCV SLB TOT TUP: XMIT SSB TOT TUP: RCV SSB TOT TUP: XMIT SST TOT TUP: RCV SST TOT TUP: XMIT STB TOT TUP: RCV STB TOT TUP: XMIT SUA TOT TUP: RCV SUA TOT TUP: XMIT UBA TOT TUP: RCV UBA TOT TUP: XMIT UBL TOT TUP: RCV UBL TOT TUP: XMIT UNN TOT TUP: RCV UNN TOT TUP: ABN REL TOT TUP: UNEX MSG TOT TUP: UNREC MSG TOT TUP: CHAN MATE UNAVILABLE TUP: XMIT ACF TOT
Description Telephone User Part statistics (continued) Number of SAM messages transmitted Number of SAM messages received Number of SAO messages transmitted Number of SAO messages received Number of SBA messages transmitted Number of SBA messages received Number of SEC messages transmitted Number of SEC messages received Number of SGB messages transmitted Number of SGB messages received Number of SGU messages transmitted Number of SGU messages received Number of SLB messages transmitted Number of SLB messages received Number of SSB messages transmitted Number of SSB messages received Number of SST messages transmitted Number of SST messages received Number of STB messages transmitted Number of STB messages received Number of SUA messages transmitted Number of SUA messages received Number of UBA messages transmitted Number of UBA messages received Number of UBL messages transmitted Number of UBL messages received Number of UNN messages transmitted Number of UNN messages received Number of abnormal clear messages received Number of unexpected messages received Number of unrecognized messages received Number of Channel Mate Unavailable messages received Number of ACF messages transmitted
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-27
Appendix D
Table D-1
MML Counter Group:Name TUP-GROUP (continued) TUP: RCV ACF TOT TUP: XMIT AUU TOT TUP: RCV AUU TOT TUP: XMIT CBU TOT TUP: RCV CBU TOT TUP: XMIT CHA TOT TUP: RCV CHA TOT TUP: XMIT CHP TOT TUP: RCV CHP TOT TUP: XMIT CHT TOT TUP: RCV CHT TOT TUP: XMIT CLU TOT TUP: RCV CLU TOT TUP: XMIT GSE TOT TUP: RCV GSE TOT TUP: XMIT IAF TOT TUP: RCV IAF TOT TUP: XMIT ICF TOT TUP: RCV ICF TOT TUP: XMIT SNA TOT TUP: RCV SNA TOT TUP: XMIT MPR TOT TUP: RCV MPR TOT
Description Telephone User Part statistics (continued) Number of ACF messages received Number of AUU messages transmitted Number of AUU messages received Number of CBU messages transmitted Number of CBU messages received Number of CHA messages transmitted Number of CHA messages received Number of CHP messages transmitted Number of CHP messages received Number of CHT messages transmitted Number of CHT messages received Number of CLU messages transmitted Number of CLU messages received Number of GSE messages transmitted Number of GSE messages received Number of IAF messages transmitted Number of IAF messages received Number of ICF messages transmitted Number of ICF messages received Number of SNA messages transmitted Number of SNA messages received Number of MPR messages transmitted Number of MPR messages received
Logging Interval 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30 5, 30
D-28
OL-0800-06
Appendix D
MML Counter Group:Name ISUP: XMIT MSG TOT ISUP: RCV MSG TOT ISUP: XMIT ACM TOT
Description count of every message sent count of every message received count of every Address Complete Message (ACM) received count of every ACM sent count of every Answer Message (ANM) received count of every ANM sent count of every Blocking (BLO) message received count of every BLO message sent count of every Blocking Acknowledgement (BLA) message received count of every BLA message sent count of every Current Cell Rate (CCR) message received count of every CCR message sent count of every Confusion (CFN) message received count of every CFN message sent count of every Circuit Group Blocking (CGB) message received count of every CGB message sent count of every Circuit Group Blocking Acknowledgement (CGBA) message received count of every CGBA message sent count of every Circuit Group Unblocking (CGU) message received
ISUP: RCV ACM TOT ISUP: XMIT ANM TOT ISUP: RCV ANM TOT ISUP: XMIT BLO TOT ISUP: RCV BLO TOT ISUP: XMIT BLA TOT
ISUP: RCV BLA TOT ISUP: XMIT CCR TOT ISUP: RCV CCR TOT ISUP: XMIT CFN TOT ISUP: RCV CFN TOT ISUP: XMIT CGB TOT
CountReceivedCGB CountSentCGBA
CountReceivedCGBA CountSentCGU
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-29
Table D-2
MML Counter Group:Name ISUP: RCV CGU TOT ISUP: XMIT CGUA TOT
Description count of every CGU message sent count of every Circuit Group Unblocking Acknowledgement (CGUA) message received count of every CGUA sent count of every Continuity Check (COT) message received count of every COT message sent count of every Call Progress (CPG) message received count of every CPG message sent count of every Circuit Group Query Message (CQM) received count of every CQM sent count of every Circuit Group Query Response (CQR) message received count of every CQR message sent count of every Circuit Reservation Acknowledgement (CRA) message received count of every CRA message sent count of every Cell Rate Margin (CRM) message received count of every CRM message sent count of every Circuit Validation Response (CVR) message received count of every CVR message sent count of every Circuit Validation Test (CVT) message received count of every CVT message sent count of every Exit Message (EXM) received count of every EXM sent
ISUP: RCV CGUA TOT ISUP: XMIT COT TOT ISUP: RCV COT TOT ISUP: XMIT CPG TOT ISUP: RCV CPG TOT ISUP: XMIT CQM TOT ISUP: RCV CQM TOT ISUP: XMIT CQR TOT
CountReceivedCQR CountSentCRA
ISUP: RCV CRA TOT ISUP: XMIT CRM TOT ISUP: RCV CRM TOT ISUP: XMIT CVR TOT
ISUP: RCV CVR TOT ISUP: XMIT CVT TOT ISUP: RCV CVT TOT ISUP: XMIT EXM TOT ISUP: RCV EXM TOT
D-30
OL-0800-06
Appendix D
Table D-2
ANSI Measurement Name CountSentFAC CountReceivedFAC CountSentFOT CountReceivedFOT CountSentGRS CountReceivedGRS CountSentGRA
MML Counter Group:Name ISUP: XMIT FAC TOT ISUP: RCV FAC TOT ISUP: XMIT FOT TOT ISUP: RCV FOT TOT ISUP: XMIT GRS TOT ISUP: RCV GRS TOT ISUP: XMIT GRA TOT
Description count of every Facility (FAC) message received count of every FAC message sent count of every Forward Transfer (FOT) message received count of every FOT message sent count of every Circuit Group Reset (GRS) message received count of every GRS message sent count of every Circuit Group Reset Acknowledgment (GRA) message received count of every GRA message sent count of every Initial Address Message (IAM) received count of every IAM sent count of every INF received count of every INF sent count of every INR received count of every INR sent count of every Loop Back Acknowledgement (LPA) message received count of every LPA message sent count of every Pass Along Message (PAM) received count of every PAM sent count of every Release (REL) message received count of every REL message sent count of every Release Complete (RLC) received count of every RLC message sent count of every Reset Circuit (RSC) message received count of every RSC message sent count of every Resume (RES) message received count of every RES message sent
ISUP: RCV GRA TOT ISUP: XMIT IAM TOT ISUP: RCV IAM TOT ISUP: XMIT INF TOT ISUP: RCV INF TOT ISUP: XMIT INR TOT ISUP: RCV INR TOT ISUP: XMIT LPA TOT
CountReceivedLPA CountSentPAM CountReceivedPAM CountSentREL CountReceivedREL CountSentRLC CountReceivedRLC CountSentRSC CountReceivedRSC CountSentRES CountReceivedRES
ISUP: RCV LPA TOT ISUP: XMIT PAM TOT ISUP: RCV PAM TOT ISUP: XMIT REL TOT ISUP: RCV REL TOT ISUP: XMIT RLC TOT ISUP: RCV RLC TOT ISUP: XMIT RSC TOT ISUP: RCV RSC TOT ISUP: XMIT RES TOT ISUP: RCV RES TOT
Cisco MGC Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
D-31
Table D-2
MML Counter Group:Name ISUP: XMIT SUS TOT ISUP: RCV SUS TOT ISUP: XMIT UBL TOT ISUP: RCV UBL TOT ISUP: XMIT UBA TOT
Description count of every Suspend (SUS) message received count of every SUS message sent count of every Unblocking (UBL) message received count of every UBL message sent count of every Unblocking Acknowledgement (UBA) message received count of every UBA message received count of every Unequipped Carrier Identification Code (UCIC) message sent count of every UCIC message received count of every User-to-User Information (USR) message sent count of every USR message received count of release messages not normal clearing count of unexpected messages count of unrecognized messages count of when B mate not there
CountReceivedUBA CountSentUCIC
ISUP: RCV UCIC TOT ISUP: XMIT USR TOT ISUP: RCV USR TOT ISUP: ABN REL TOT ISUP: UNEX MSG TOT ISUP: UNREC MSG TOT ISUP: CHAN MATE UNAVAILABLE
D-32
OL-0800-06
INDEX
A
ACC ACL timer, modifying
3-93 3-81
7-9
administrative state
3-64
alarm associations for ACC MCLs (table) call rejection percentages, managing CANT and skip results matrix (table) deleting a response category call control signaling managing MCL call reject settings, modifying mapping values (table)
3-96 3-97 3-98 3-82 3-91 3-90 3-94
8-120
media gateway retrieving setting retrieving retrieving setting spans retrieving setting trunk group retrieving setting alarm SS7 RTE KEY FAIL resolution
3-83 8-74 3-62 8-117 1-7 3-63 8-119 3-62 8-117 3-61
signaling service
3-62 8-118
MCL to ANSI or ITU congestion standard, mapping 3-95 modifying a response category call control signaling
3-89 3-88
alarm and measurement viewer Alarm Record View tab window (figure)
3-86 3-130
adding on a call control configuration adding on signaling configurations AC power supply front panels (figure) handling (figure) installing
7-10 7-8 7-9 7-10
using alarms
3-128
3-85
acknowledging
All Conn Cntl Links Fail resolution All ISDN IP Conn Fail resolution
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-1
Index
All M3UA Assoc Fail resolution All SUA Assoc Fail resolution ANAL ALoopCtrExceeded
8-17
8-14 8-13
8-32
RteTableFail_GetRteList resolution
8-15
8-36 8-37
BNum_GetFail_SrvcTbl resolution BTableFail_GetDigMod resolution BTableFail_GetDigTree resolution BTableFail_GetResult resolution Cause_GetFail_CauseTbl resolution
8-20
8-33 8-35
BNum_MdfyBFail_AnnounceID resolution
8-20 8-20 8-21 8-22 8-22
TableFail_CondRouteDescTable resolution TableFail_CPCTable resolution TableFail_TMRTable resolution TableFail_TNSTable resolution archived, field descriptions (table) Association Degraded resolution Association Fail resolution
8-38 3-81 8-38 8-38 8-39 8-35 8-36
TableFail_PercRouteTable resolution
8-37 A-5 8-37
8-34, 8-36
Cause_GetFail_InvldRsltType resolution
8-23
Cause_InvldRslts_CauseTbl resolution
C7DPC CONGESTION resolution C7LNK ALGNMT LOST resolution C7LNK CONGESTION resolution C7LNK INHIBIT resolution C7SLTLnkCong resolution category data, retrieving
8-39 8-39
Cause_MdfyBFail_AnnounceID resolution Cause_MdfyBFail_AppPtInvld resolution Cause_Rte_LoopDetected resolution CustId/StartIdx Missing resolution DataBaseAccessFail resolution Data Failure Rcvd resolution InvalidtrkGrpType resolution dpselection_table_fail resolution
8-27 8-27 8-26 8-25 8-25
Charge Table Access Failure resolution Charge Table Load Failure resolution clearing
8-28 8-28 8-29 8-4
8-28
Prof_GetFail_DigModTbl resolution Prof_GetFail_InvldRslt resolution Prof_GetFail_NOATbl_A resolution Prof_GetFail_NOATbl resolution Prof_GetFail_NPITbl_A resolution Prof_GetFail_NPITbl resolution Prof_GetFail_RsltTbl resolution Prof_InvldNPAValue resolution Prof_InvRslts_NOATbl resolution
8-40
8-28 8-30
8-42
dumper sink log file parameters (table) Unexpected Msg//Par resolution ENGINE CONFIG FAIL resolution FailoverPeerLost resolution
8-44 8-42
A-2
Prof_InvRslts_NOATbl_A resolution
8-42
8-31
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-2
OL-0800-06
Index
8-44 8-45
8-60 8-61
FAIL REMOTE STANDBY resolution FORCE NODE RESTART resolution Gen Fail resolution
8-46
OverloadLight resolution
OverloadMedium resolution
8-47 8-47
Holiday Table Access Failure resolution Holiday Table Load Failure resolution INVALID M3UA RC resolution INVALID SUA RC resolution
8-47 8-48 8-48
8-63
Invalid Virtual_IP_Addr resolution IP RTE CONF FAIL resolution IP RTE FAIL resolution
8-50 8-51 8-50
PEER MODULE FAILURE resolution POM DynamicReconfiguration resolution INACTIVITY TIMEOUT resolution PEER_SYNC_ERR resolution
8-66
8-66 8-66
ISUP: COT Failure resolution LIF: IDLE CHANGE resolution LIF: LOST CD resolution LIF: LOST CTS resolution LIF BER resolution LIF FAIL resolution LIF LOF resolution LIF LOS resolution LIF SES resolution
8-51 8-51 8-52 8-53 8-53 8-54 8-55
8-54
SESSION TERMINATE resolution PRI:B-Channel not available resolution ProcM No Response resolution ProtocolFileMissing resolution retrieving all
8-3 8-69 8-67 8-67
8-66 8-66
8-55
REPL: all connections failure resolution RSET CONFIG FAIL resolution SC CONFIG FAIL resolution
8-56
8-68
8-69
Database cause failover resolution Database nearly full resolution Database unavailable resolution NAS AuditResponse Failure resolution CommsFailure resolution ResourceFailure resolution OLC
8-58 8-58
8-57 8-56
8-71
8-72
8-72 8-74
SS7 SIG SRVC CONFIG FAIL resolution SS7 SIG SRVC UNAVAIL resolution SSN FAIL resolution status monitoring
8-60 3-6 8-76 8-76 8-73 8-75
Leg1notifyRequestAckUnpackError resolution
8-77
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-3
Index
8-77
Tariff Table Access Failure resolution Tariff Table Load Failure resolution TLC
8-78 8-78
B
backing up system software Cisco MGC software
8-79 8-79 3-27
MMDB BAMS
3-32
A-4
Leg2chanSeizedUnpackError resolution Leg2deleteChanUnpackError resolution Leg2notifyUnpackError resolution tools for troubleshooting troubleshooting procedures troubleshooting using alarms UCM CCodeModfailed resolution understanding
3-7 3-128 8-84 8-81 8-83 4-4 8-9 8-2 8-80
bearer channels 3.1 KHz calls fail calls, stopping call state audit CIC state mismatch, resolving states, querying CICs blocking
3-60 8-134 8-121 8-123 8-146 3-61
Leg2notifyRequestAckUnpackError resolution
Virtual_IP_Addr Mismatch resolution Wrong IP Path resolution XE Rsrc Fail resolution alarm viewer (figure)
3-129 8-84 8-85
8-134
8-145 8-137
log record view tab window (figure) viewing and searching association alarm resolution associations primary service states (table) secondary service states (table) state, changing state, retrieving
8-99 3-55 3-56 3-56 8-113
8-142
8-129
media gateway, retrieving states held by media gateway IP destination is OOS media gateway IP links are OOS MGCP media gateway, auditing
8-143 8-140
3-59
8-143
automatic congestion control managing incoming load control managing outgoing load control
3-94 3-109
3-58
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-4
OL-0800-06
Index
8-139
viewing
3-142
center mount, installing (figure) chassis, attaching to rack (figure) identifying (figure)
6-7
front panel, installing forward (figure) rear panel, installing forward (figure)
C
call detail records See CDRs call detail record viewer Config tab window (figure) Query tab window (figure) call engine process calls abnormal termination trace bearer channels, stopping on CICs, stopping on Cisco MGC, fails at hung, diagnosing
8-140 8-145 8-137 8-156 8-137 1-10 1-10 3-133 3-134
chassis fan assembly (figure) components, replacing DC power supply CO ground (figure) connectors (figure) front panel (figure) handling (figure) installing removing
7-13 7-11 7-12 7-15 7-12 7-13 7-5
7-16 7-15
media gateway, stopping on signaling service, stopping on SIP-to-SIP, stopping state audit call trace alternatives deleting files performing starting stopping
8-154 8-152 8-137 8-148
8-139
flash memory card, locating write-protection switch (figure) 7-8 flash memory cards, using with supervisor engine
7-7
8-138
LEDs
supervisor engine III and uplink module (table) modules, avoiding problems when inserting or removing 7-6 PCMCIA card
8-152
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
7-2
OL-0800-06
IN-5
Index
3-64
8-120
power supply, removing and replacing route switch module (table) slot 1 LED slot 2 LED status LED
7-3 7-3 7-5 7-5 7-4
status, checking
7-3
media gateway states (table) primary service states (table) querying states resetting
8-132 7-2 8-121
3-15 3-14
supervisor engine III front panel (figure) supervisor engine module LEDs switch load LED system status LED caution chassis-cover replacement DIMM handling
6-18 6-20 6-21 7-2 7-2
8-123
stuck, manually resolving stuck, resolving unblocking Cisco MGC checking equipment status viewer toolkit toolbar (figure) Cisco MGC log file
3-128 8-131 8-133
8-134
flash memory SIMM replacement hot swapping not supported SIMM handling CDRs ASCII format, converting files data dumper, configuring
A-2 6-20 6-14
5-1
3-126
alm.csv cdr.bin
A-4
data dumper, configuring to support BAMS dumper sink log file parameters (table) not being generated searching viewing CDR viewer config tab window (figure) configuring query tab window (figure) using CICs
3-131 3-134 3-133 3-133 3-132 8-172 3-126 A-2
meas.csv mml.log
platform.log
Cisco MGC node connectivity (figure) Cisco MGC toolbar (figure) Cisco Switches power on procedure components data, retrieving config-lib viewer configuration
3-106 3-106 2-3 3-128
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-6
OL-0800-06
Index
8-171
disk space, verifying available MML session, starting platform state, verifying processes, verifying
8-169 8-170 3-3 3-2 3-2
3-16 3-21
restoring
8-169
restoring from a device local tape drive restoring from configuration library managing
3-135 8-165
processes, verifying the number of active SS7 routes, verifying state of all users, verifying the number of
8-166 3-10 3-19 3-20
3-18 3-8
configuration parameters, retrieving configurations, administering configuration tables alarm categories components component types data, retrieving
3-106 3-106 3-106 3-105 3-135
3-108
configuring D-channels
A-2 A-2
dumper sink log file parameters (table) state, changing state, retrieving DC power connections (figure)
3-108 6-10 6-9 8-98 3-53
default configuration parameters measurement categories retrieving services console port baud rate settings, SLT connecting (figure) connecting devices to continuity test manual
8-142 8-142 3-40 6-12 6-12 6-12 3-108 3-107 3-107
DC power supply CO ground (figure) connectors (figure) front panel (figure) handling (figure) installing removing
7-13 7-8 7-12 7-15 7-12 7-13
6-21
D
daily tasks alarm status monitoring CIC states, verifying
3-6 3-13
8-112
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-7
Index
translation, verifying verifying DIMM handling caution disk monitor configuring DNS cache contents, displaying managing purging
3-65 3-66 3-22 3-24 6-18 3-142
3-143 3-147
G
group service reset messages See GSR messages
3-16
H
xxvii
I E
incoming load control EIA/TIA-232 console port connections equipment status, checking
6-12 5-1 1-3
managing MCL
3-94
threshold values
modifying
MCL threshold values
3-97 3-82
F
failover daemon failure Cisco MGC SLT fan LED, supervisor engine removal and replacement fault tolerance subsystem
7-2 7-15 1-8 3-149 8-2 8-2 8-2 1-8
MCL to ANSI or ITU congestion standard, mapping 3-95 retrieving MCL call reject settings input/output system installation DC power connections (figure) DC power supply
6-9 6-9 6-10 1-6 3-83
operating system
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-8
OL-0800-06
Index
tools, parts, and equipment required for SLT wiring DC power supply interface numbering, SLT IOCCs IOCMs IP links state, changing state, retrieving IP routes primary service states (table) secondary service states (table) state, changing state, retrieving ISUP timers settings, modifying settings, verifying
8-105 8-105 8-97 3-51 3-52 3-52 8-97 3-51 1-6 1-6 6-9 6-12
6-6
slot 2 status
supervisor engine III and uplink module (table) supervisor engine module switch load system status
7-2 7-2 7-4 7-2
Fast Ethernet switching module (figure) on Sun Netra t 112x on Sun Netra t 140x PS1
7-2 4-1 7-5 7-4 5-1 5-1
reading
route switch module (figure) SLT front panel (figure) SLT front panel (table) SLT rear panel (figure) SLT rear panel (table)
6-2 6-2
6-4
J
Japanese SS7 signaling link tests signaling route tests
8-110 8-111
SLT T1 and E1 multiflex trunk interface cards (figure) 6-4 SLT virtual WAN interface cards SLT WAN interface cards
6-3 6-4
L
LEDs 1000 Mbps 100 Mbps active
7-2 7-1 7-3 7-3 7-3 7-3
links bouncing, resolving state, changing state, retrieving linksets measurments, retrieving state, changing state, retrieving
7-4 7-4 8-96 3-50 3-113 8-96 3-50 8-92 3-113
measurements, retrieving
Fast Ethernet switching module (figure) Fast Ethernet switching module (table) link slot 1
7-3 7-4
local subsystem number See LSSN logs diagnostics file, creating file types
A-1 8-6 8-8
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-9
Index
3-26
3-125 3-124
system data, collecting tools for troubleshooting troubleshooting understanding viewer (figure) viewing log viewer (figure) searching using LSSN service state, setting
3-137 8-4 8-4 A-1 3-137
description
3-62
8-117
memory, SLT system-code SIMMs (flash memory) MGC backup viewer window (figure)
8-98 3-149 3-150
MGC restore viewer window (figure) MGC viewer toolkit alarm and measurement viewer CDR viewer
3-131 3-135 3-148
M
maintenance checking Cisco MGC status components LEDs, reading SLT
6-15 3-27 4-1 5-2 4-1 4-1 5-1
3-128
MGC backup viewer MGC restore viewer toolbar, launching trace viewer MML
5-2 3-142
3-149 3-149
3-128
3-142
4-5
displaying information about displaying previously entered reentering previously entered session
A-2
ending
managing starting
retrieving active
3-2
session, starting
3-115
3-2
MML terminal
1-7
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-10
OL-0800-06
Index
modem connecting MTP timers settings, verifying MTP1 communication identifying problems solving problems MTP2 communication identifying problems solving problems timers modifying MTP3 timers verifying
8-100 8-101 8-100 B-12 B-12 B-11 B-11 8-99, 8-102 6-11
3-38
3-34 3-27
disk monitor, configuring full backup operation storing on a local tape log rotation, automatic manual backup operation MMDB backup
3-32
3-24 3-22
3-29
partial backup operation storing on a local tape platform management calling data, retrieving
3-110 3-105 3-28 3-31
verifying on an SLT
N
network management tools Cisco Media Gateway Controller Node Manager Cisco WAN Manager CiscoWorks2000
4-5 4-6 4-6
3-99 3-104
patch level, verifying for the Cisco MGC processes, retrieving the logging level statistics, retrieving
3-109 3-101
3-109
switchover, understanding
switchover, verifying successful completion system state and alarm data, retrieving system usage data, retrieving
3-111 3-109
3-100
O
outgoing load control ACL timer, modifying managing
3-83 3-93
3-2
backup files, restoring from a device backup files, restoring from a directory
P
periodic maintenance procedures automatic backup operation deleting
3-37
8-172 8-161
Cisco MGC, recovering from a failure Cisco MGC Ethernet, verifying core dump, processing
3-40 8-158
8-165
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-11
Index
8-166
data, retrieving
3-72
data, retrieving for an individual component data, retrieving for select components
3-74 3-76
3-73
peer, resolving failed connection to properties, rebooting to modify SNMP, diagnosing failure
8-174
8-172
8-109 8-170
data, retrieving supported signaling protocols dynamic reconfiguration, invoking managing ACC session, starting
3-80 3-70
3-77
software, rebooting to modify configuration parameters 8-173 stored configuration data, restoring switchover failure, recovering system time, correcting TIBCO interface point codes converting Cisco MGC Cisco MGC power supply Catalyst 5500 MSR removal and replacement Preface Document Organization processes logging level, changing logging level, retrieving understanding verifying properties rebooting to modify provisioning changes, saving and activating data, exporting
3-79 3-69 8-109 3-3 3-18 3-4 8-6 8-6 xx 7-8 8-114 8-186 8-176 8-159 8-164
3-70
R
rack equipment SLT installation regular operations bearer channels, managing Cisco MGC, provisioning Cisco MGC viewer toolkit measurements, managing MML session, managing SIP, managing replication configuration, verifying
3-5 8-170 3-65 3-57 3-68 3-99 6-6
power on procedure
2-2
3-58
backup files, from a device backup files, from a directory backup files, listing local tape drive remote machine
8-168
8-169 8-169
8-170
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-12
OL-0800-06
Index
S
security network
8-177 3-107
signaling link terminal See SLT administrative state, retrieving administrative state, setting
4-7 3-62
8-118
8-138
primary service states (table) service state, setting SS7, retrieving state
8-95 3-54 8-96
3-9
D-channel, changing state of D-channels, retrieving state of GSR messages, enabling incomplete signaling
8-90
8-98 3-53
SS7, setting service state state information verifying status SIMM handling caution SIMMs replacing, SLT
6-19 3-9 3-8
6-20
IP routes, retrieving state of links, changing state of links, retrieving state of linksets, changing state of linksets, retrieving state of managing
3-47 8-90 8-96 3-50
SLT system-code, replacing SIP call information, retrieving DNS cache, managing
3-48 3-65 3-66
8-96 3-50
DNS cache, contents, displaying DNS cache, purging managing SLT backing up software board layout
6-18 6-19 6-12 3-65 8-148
3-65
SS7 loadsharing malfunction state of all LSSNs, retrieving state of SS7 routes, retrieving supporting entity failures
8-90
6-22 6-8
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-13
Index
bracket, front panel installation forward (figure) bracket, rear panel installation forward (figure) brackets, identifying (figure) chassis removing cover, (figure) chassis, closing chassis, opening
6-21 6-17 6-17 6-9 6-7
serial WAN interface card (figure) virtual WAN interface card WAN interface card maintenance procedures MTP1 communication problems
B-11 6-3 B-10 6-4
6-4 6-4
3-21
B-13
connecting console terminal and modem connecting DC power supply connection management cover, replacing
6-21 B-3 6-12 6-9 6-12
solving
identifying
B-12
B-12
MTP2 communication problems MTP2 timers, verifying MTP3 and higher layer SS7 protocol processing (figure) MTP3 and higher layers identifying problems
B-13 B-14 8-100
data link layer, MTP2 communication problem (figure) B-12 DC power connections (figure)
6-10 6-9
debug outputs, probable causes, and recovery actions (table) B-7, B-8 DRAM DIMM, removing/replacing (figure) equipment status, checking error messages (table)
B-15 B-14 6-2 6-19
physical layer, MTP1 communication problems (figure) B-11 rack installation rack-mounting removing
6-5 6-6 6-11 6-11 B-15 6-9 6-6 6-3
Ethernet connectivity, identifying problems flash memory SIMM, replacing front-panel LEDs (figure) interface numbering IP signaling backhaul LEDs
6-2 6-3 6-2 6-4 6-12 6-2 B-1 6-20
6-18 6-21
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-14
OL-0800-06
Index
6-4
6-19
tools required for DRAM SIMM replacement tools required for installation WAN interface card, installation
1-7
WAN interface card chassis slot locations (figure) WIC-2T dual port serial WAN interface card (figure) 6-14 wiring DC power supply SNMP diagnosing failure SNMP terminal software automatic backup operation deleting listing
3-37 3-38 1-7 8-174 6-9
Cisco MGC software system diagram (figure) execution environment process shell fault tolerance subsystem input/output subystem software shutdown Cisco MGC software startup Cisco MGC spans administrative state, retrieving
3-63 2-3 2-4 1-6 1-8 1-9
1-5
deleting all
3-39
scheduling
3-34 6-19
8-119
backing up SLT before replacing SIMMs backup files, listing backup files, restoring from a device backup files, restoring from a directory backup history listing
3-39 1-12 1-12
changing the service state network troubleshooting SS7 interface power on procedure SS7 interfaces power down procedure
2-5 2-3 8-86
8-96 8-113
directory structure
directory structure (table) full backup operation storing on a local tape manual backup operation partial backup operation storing on a local tape
3-28 3-29
SS7 signaling point, retrieving measurements SS7 troubleshooting signaling destination OOS, resolving signaling route OOS, resolving
6-22 8-94 8-93
storing on a remote machine restore from a local tape drive restore from a remote machine restore MMDB SLT installation
8-167
8-94
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-15
Index
3-109 3-109
window (figure)
3-111
3-142
platform state and alarm data, retrieving system usage data, retrieving Switches power down procedure switches command line interface
C-1 C-3 2-5
traffic channel and CIC primary link service states (table) 3-14 traffic channels call states (table)
3-15 3-15 3-15 3-14
media gateway states (table) primary service states (table) states, understanding
3-14
command line interface, local access command line interface, remote access virtual LANs switchover checkpointing circuit auditing failover daemon
3-103 3-102 3-100 C-1
C-3
3-148 3-148
dial plan translation configuration data, viewing dial plan translation tab window (figure) troubleshooting
8-159 3-101 3-144
3-147
completion, verifying
3-101
alarms, using
8-171
4-2, 4-3
T
TCAP transactions clearing retrieving TCAP trace
3-56 3-56 8-157
8-93 8-94
technical support staff personnel, skill level TIBCO interface troubleshooting trace viewer using
3-142 8-186 5-2
signaling destination unavailable, resolving SLT diagnostic commands SS7 network procedures strategy overview third-party tools
4-2 4-9 4-7 8-94 8-86
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-16
OL-0800-06
Index
4-11
administrative state, retrieving administrative state, setting trunk groups calls, stopping on
8-138
3-62
8-117
U
users, verifying the number of
3-19
V
viewer toolkit measurement viewer
3-139 3-20
W
WAN interface cards slot filler panel (figure)
6-15 6-13 6-14
equipment, holding with both hands, Catalyst 5500 MSR 7-12, 7-14 power, turning off, Catalyst 5500 MSR
7-11, 7-13
power supply bay high voltage, Catalyst 5500 MSR 7-13, 7-14
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide OL-0800-06
IN-17
Index
Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
IN-18
OL-0800-06