Cisco CSS Basic Configuration Guide
Cisco CSS Basic Configuration Guide
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE
INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU
ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A
COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as
part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED
OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
AccessPath, AtmDirector, Browse with Me, CCDE, CCIP, CCSI, CD-PAC, CiscoLink, the Cisco NetWorks logo, the Cisco Powered Network logo,
Cisco Systems Networking Academy, the Cisco Systems Networking Academy logo, Fast Step, Follow Me Browsing, FormShare, FrameShare,
GigaStack, IGX, Internet Quotient, IP/VC, iQ Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, MGX, the
Networkers logo, Packet, RateMUX, ScriptBuilder, ScriptShare, SlideCast, SMARTnet, TransPath, Unity, Voice LAN, Wavelength Router, and
WebViewer are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, and
Empowering the Internet Generation, are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA,
CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Systems, Cisco Systems Capital, the Cisco Systems
logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub, FastSwitch, IOS, IP/TV, LightStream, MICA, Network Registrar, PIX, Post-Routing,
Pre-Routing, Registrar, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its
affiliates in the U.S. and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (0105R)
Copying the Boot Configuration Record from the Active SCM to the
Passive SCM 2-21
Showing the BOOT Configuration 2-22
Booting the CSS from a Network Drive 2-22
Configuring Network Boot for a Primary SCM 2-23
Configuring Network Boot for a Passive SCM 2-24
Showing Network Boot Configurations 2-25
Configuring Host Name 2-26
Configuring Idle Timeout 2-26
Configuring the CSS as a Client of a RADIUS Server 2-27
Configuring the CSS as a RADIUS Client 2-28
Specifying a Primary RADIUS Server 2-29
Specifying a Secondary RADIUS Server 2-30
Configuring the RADIUS Server Timeouts 2-31
Configuring the RADIUS Server Retransmits 2-31
Configuring the RADIUS Server Dead-Time 2-32
Showing RADIUS Server Configuration Information 2-32
Controlling Remote Access to the CSS 2-35
Restricting Console, FTP, SNMP, Telnet, XML, and Web Management Access to
the CSS 2-37
Finding an IP Address 2-38
Configuring Flow Parameters 2-39
Configuring Permanent Connections for TCP Ports 2-39
Resetting Fast Ethernet and Gigabit Ethernet Ports 2-40
Reclaiming Reserved Telnet and FTP Control Ports 2-40
Showing Flow Statistics 2-41
Configuring Content API 2-42
INDEX
Figure 7-5 Suspended or Failed Service Configured for Failover Linear 7-43
Table 1-2 Field Descriptions for the show clock Command 1-16
Table 1-3 Field Descriptions for the show sntp global Command 1-19
Table 1-6 Field Descriptions for the show disk Command 1-52
Table 1-7 Field Descriptions for the show chassis Command 1-66
Table 1-8 Field Descriptions for the show system-resources Command 1-68
Table 1-9 Field Descriptions for the show user-database Command 1-69
Table 1-10 Field Descriptions for the show lines Command 1-71
Table 2-1 Field Descriptions for the show radius config Command 2-33
Table 2-2 Field Descriptions for the show radius stat Command 2-34
Table 2-3 Field Descriptions for the show cmd-sched Command 2-49
Table 3-1 Field Descriptions for the show arp Command 3-8
Table 3-2 Field Descriptions for the show arp config Command 3-9
Table 3-3 Field Descriptions for the show rip Command 3-12
Table 3-4 Field Descriptions for the show rip globals Command 3-13
Table 3-5 Field Descriptions for the show rip statistics Command 3-13
Table 3-6 Field Descriptions for the show ip config Command 3-21
Table 3-7 Field Descriptions for the show ip interfaces Command 3-22
Table 3-8 Field Descriptions for the show ip routes Command 3-24
Table 3-9 Field Descriptions for the show ip statistics Command 3-25
Table 3-10 Field Descriptions for the show ip summary Command 3-28
Table 3-11 Field Descriptions for the show bridge forwarding Command 3-32
Table 3-12 Field Descriptions for the show bridge status Command 3-32
Table 3-13 Field Descriptions for the show sshd config Command 3-37
Table 4-2 Field Descriptions for the show phy Command 4-9
Table 4-3 Field Descriptions for the show bridge forwarding Command 4-17
Table 4-4 Field Descriptions for the show bridge status Command 4-18
Table 4-5 Field Description for the show trunk Command 4-19
Table 4-6 Field Descriptions for the show interface Command 4-20
Table 4-7 Field Descriptions for the show mibii Command 4-21
Table 4-8 Field Descriptions for the show ether-errors Command 4-23
Table 4-9 Field Descriptions for the show circuits Command 4-29
Table 4-10 Field Descriptions for the show ip interfaces Command 4-34
Table 4-11 Field Descriptions for the show rip Command 4-38
Table 4-12 Field Descriptions for the show rip globals Command 4-39
Table 4-13 Field Descriptions for the show rip statistics Command 4-39
Table 5-2 Field Descriptions for the show load Command 5-13
Table 5-3 Field Descriptions for the show keepalive Command 5-26
Table 5-4 Field Descriptions for the show service Command 5-55
Table 6-1 Owner Configuration Quick Start 6-2
Table 6-2 Field Descriptions for the show owner Command 6-6
Table 6-3 Field Descriptions for the show summary Command 6-8
Table 7-2 Field Descriptions for the show domain hotlist Command 7-28
Table 7-3 Field Descriptions for the show remap Command 7-40
Table 7-4 Field Descriptions for the show content Command 7-48
Table 7-5 Field Descriptions for the show rule Command 7-49
Table 8-5 Field Descriptions for the show log-state Command 8-17
Table 9-1 Quick Start for Defining the CSS as an SNMP Agent 9-10
Table 9-3 Field Descriptions for the show dos Command 9-20
Table 9-5 MIB Branches Under the CSS Enterprise MIB 9-26
Table 10-4 Field Descriptions for the show rmon Command 10-26
Table 10-5 Field Descriptions for the show rmon-history Command 10-31
This guide provides instructions for the basic configuration of the CSS 11050,
CSS 11150, and CSS 11800 Content Service Switches (hereinafter referred to as
the CSS) Information in this guide applies to all CSS models except where noted.
For configuration information on advanced features, refer to the Content Services
Switch Advanced Configuration Guide.
The CSS software is available in a Standard or Enhanced feature set. The
Enhanced feature set contains all of the Standard feature set and also includes
Network Address Translation (NAT) Peering, Domain Name Service (DNS),
Demand-Based Content Replication (Dynamic Hot Content Overflow), Content
Staging and Replication, and Network Proximity DNS. Proximity Database and
SSH are optional features.
Note If you are upgrading from the Standard to the Enhanced feature set
or want to activate a CSS software option (for example, SSH Server)
that you purchased, refer to the Content Services Switch Getting
Started Guide, Chapter 4, Booting the CSS.
If you configure your CSS for Proximity Database, you cannot use
the CSS for flow control. For details on Proximity Database, refer to
the Content Services Switch Advanced Configuration Guide.
Audience
This guide is intended for the following trained and qualified service personnel
who are responsible for configuring the CSS:
• Web master
• System administrator
• System operator
Chapter Description
Chapter 1, Logging in Log into the CSS and configure the CSS for operation.
and Getting Started This chapter contains an overview of the CSS system
software. It also contains information on using the
Offline Diagnostic Monitor (Offline DM) menu.
Chapter 2, Configuring Configure user profile and CSS parameters. This
User Profiles and CSS chapter also contains information on using the Content
Parameters API and Command Scheduler features.
Chapter 3, Configuring Configure the CSS DNS, ARP, RIP, IP, and bridging
CSS Network features.
Protocols
Chapter Description
Chapter 4, Configuring Configure the CSS management ports, interfaces, and
Interfaces and Circuits circuits for operation.
Chapter 5, Configuring Configure services.
Services
Chapter 6, Configuring Create and configure owners.
Owners
Chapter 7, Configuring Create and configure content rules.
Content Rules
Chapter 8, Using the Enable logging, set up the log buffer, and determine
CSS Logging Features where to send the activity information.
Chapter 9, Configure SNMP on the CSS (including a summary of
Configuring Simple all CSS Enterprise MIB objects).
Network Management
Protocol (SNMP)
Chapter 10, Configure RMON on the CSS.
Configuring Remote
Monitoring (RMON)
Appendix A, Upgrade your CSS software manually or use the
Upgrading Your CSS upgrade script.
Software
Related Documentation
In addition to this document, the Content Services Switch documentation set
includes the following:
Caution A caution means that a specific action you take could cause a loss of
data or adversely impact use of the equipment.
Warning A warning describes an action that could cause you physical harm
or damage the equipment.
This chapter describes how to log into the CSS and configure an IP address,
subnet mask, and default route. Included in this chapter is a description of the
system software. It also contains information on using the Offline Diagnostic
Monitor (Offline DM) menu. Information in this chapter applies to all CSS
models except where noted.
CSS software is available in a Standard or Enhanced feature set. The Enhanced
feature set contains all of the Standard feature set and also includes Network
Address Translation (NAT) Peering, Domain Name Service (DNS),
Demand-Based Content Replication (Dynamic Hot Content Overflow), Content
Staging and Replication, and Network Proximity DNS. Proximity Database and
SSH are optional features.
Note When you boot the CSS for the first time, the software prompts you
to enter a valid license key for the Standard or Enhanced feature set,
or for Proximity Database, depending on your intended use for the
CSS. For details, refer to the Content Services Switch Getting
Started Guide, Chapter 4, Booting the CSS.
If you are upgrading from the Standard to the Enhanced feature set
or want to activate another optional feature that you purchased, refer
to the Content Services Switch Getting Started Guide, Chapter 4,
Booting the CSS.
If you configure your CSS for Proximity Database, you cannot use
the CSS for flow control. For details on Proximity Database, refer to
the Content Services Switch Advanced Configuration Guide.
Use the date european-date command to enable the clock date command
to accept date input in the format of day, month, and year.
# date european-date 12/03/00
7. Configure the time using the clock time command. The clock time
command does not allow backspacing. If you enter the wrong time, reenter
the command with the new information.
Enter the time in the format hh:mm:ss.
# clock time
Enter time: [15:17:33] 16:17:33
8. If you are using an SNTP server to synchronize the system clock of the CSS,
specify the time zone and Universal Time Coordinated (UTC) offset.
# clock timezone EST hours 3 before-UTC
9. If you are using an SNTP server to synchronize the system clock of the CSS,
access the config mode and specify the SNTP server and the polling
frequency.
# config
(config)# sntp server 192.168.19.21 version 2
(config)# sntp poll-interval 90
Note When you power up the CSS (after initial start-up), the boot process
provides access to the Offline Diagnostic Monitor (Offline DM)
menu. The Offline DM Main menu allows you to set the boot
configuration, show the boot configuration, select Advanced
Options, or reboot the system. For details on using the Offline DM
Main menu, refer to “Using the Offline Diagnostic Monitor Menu”
in this chapter.
Note Any user with SuperUser status can create CSS usernames. To allow
only administrator or technician users to create usernames, use the
restrict user-database command (see “Restricting Modifications to
the CSS User Database” in this section).
Note If you specify the des-password option, you must know the
encrypted form of the password to successfully log in to the
CSS. You can find the CSS encrypted password in the
Global section of the running-config. To display the
running-config, use the show running-config command.
Figure 1-1 shows how the access privilege settings corresponds to the CSS
directories.
NWBNNNR
MIBs directory, set to read-only access
Core directory, set to None (no directory access)
Release Root directory, set to None (no directory access)
Archive directory, set to None (no directory access)
Root directory, set to both read and write-access
Log directory, set to write-only access
59110
Script directory, set to None (no directory access)
To change a user password, reenter the username command and specify the new
password. Remember to include SuperUser privileges if required. For example:
(config)# username picard password “flute” superuser
Caution The no username command removes a user permanently. Make sure you want to
perform this action because you cannot undo this command.
Note You must reboot the CSS for the IP address to take effect.
Configuring an IP Address
To configure an IP address for the CSS Ethernet Management port, use the
ip address option in boot mode. This command does not have a no version. To
change the IP address, reissue the ip address command and enter the new
IP address. The CSS does not accept an all zero IP address.
For example:
(config)# boot
(config-boot)# ip address 172.3.6.58
Note You must reboot the CSS for the new IP address to take effect.
Configuring an IP Route
In order to establish IP connectivity to the CSS, a static IP route is required to
connect the CSS to next hop router. A static route consists of a destination
network address and mask and the next hop to reach the destination. You can also
specify a default static route (using 0.0.0.0 as the destination network address and
a valid next hop address) to direct frames for which no other destination is listed
in the routing table. Default static routes are useful for forwarding otherwise
unrouteable packets by the CSS.
When you configure a static IP route, the CSS periodically polls the next hop
router with an internal ICMP keepalive service to ensure the router is functioning
properly. If the router fails, the CSS removes any entries from the routing table
that point to the failed router and stops sending traffic to the failed router. When
the router recovers, the CSS:
• Becomes aware of the router
• Re-enters applicable routes into the routing table
To configure an IP route, use the ip route command and specify either an:
• IP address and a subnet mask prefix - For example, 192.168.1.0/24
or
• IP address and a subnet mask - For example, 192.168.1.0 255.255.255.0
The syntax for the ip route command to configure a default IP route is:
ip route IP address subnet mask IP address2
For example, enter:
(config)# ip route 0.0.0.0/0 192.168.3.123
The variables are:
• ip_address - The destination network address. Enter the IP address in
dotted-decimal notation (for example, 192.168.11.1).
• subnet_mask - The IP subnet mask. Enter the mask as either:
– A prefix length in CIDR bitcount notation (for example, /24). Do not
enter a space to separate the IP address from the prefix length.
– An IP address in dotted-decimal notation (for example, 255.255.255.0).
• ip_address2 - The next hop address for the route. Enter the IP address in
dotted-decimal notation (for example, 192.168.11.1).
For complete information on configuring IP routes, refer to Chapter 3,
Configuring CSS Network Protocols.
Note The clock command does not allow backspacing. If you enter the
wrong date, time, or time zone, reenter the command with the new
information.
To set the date, enter the clock date command. When you enter this command, a
prompt appears and shows the current date in the format you must use to enter the
new date. Enter the month, day, and year as integers with dash characters
separating them. For example, enter June 15th 2001 as 06-15-2001.
Enter the new information in the format mm-dd-yy as shown:
# clock date
Enter date: [10-03-00] 10-04-00
To set the time, enter the clock time command. This command sets the time in
military-time (24-hour) format. When you enter this command, a prompt appears
and shows the current time in the format you must use to enter the new time. Enter
the hour, minutes, and seconds as integers, separated by colons.
Enter the new time in the format hh:mm:ss as shown:
# clock time
Enter time: [15:12:38] 16:12:38
To specify a time zone for the CSS, which synchronizes the CSS system clock
with an SNTP server, enter the clock timezone command. The time stored in the
CSS is the local time. The Universal Time Coordinated (UTC, also know as
Greenwich Mean Time) time is calculated by offsetting the time zone from the
local time. You can apply a negative offset to the UTC (for example, –05:-23:+00)
or a positive offset to the UTC (for example, +12:+00:+00).
Use the no form of the clock timezone command to reset the time zone
information to 00:00:00, and also sets the clock to the new time without the time
zone offset.
Note The use of the clock timezone command assumes that you are using
the CSS with an SNTP server to synchronize the CSS system UTC
time to that of a designated SNTP server. Without a configured
SNTP server, the time zone information is not used. Refer to
“Synchronizing the CSS with an SNTP Server” later in this chapter
for details.
To set the time zone offset back to 00:00:00 (and also set the clock to the new time
without the time zone offset):
# no clock timezone
To display the current date and time, enter the show clock command:
# show clock
Field Description
Date The configured date in the format of month, day, and
year. For example, 06-15-2001 is June 15th 2001.
If you use the date european-date command, the format
is day, month, and year. For example, the date June 15th
2001 is displayed as 15-06-2001.
Time The configured time in the format of hour, minute, and
second, for example 16:23:45.
To reset the format for the clock date command to its default of month, day and
year, enter:
# no date european-date
Note Before you synchronize the CSS with an SNTP server, make sure you
configure the proper time zone for the CSS (for example, to EST). Also
make sure that the time difference between the CSS internal clock and the
SNTP server clock is less than 24 hours. Otherwise, the CSS will not
synchronize its clock with the SNTP server. To configure the time on the
CSS, see “Configuring Date, Time, and Time Zone” earlier in this
chapter for details.
Table 1-3 describes the fields in the show sntp global output.
Table 1-3 Field Descriptions for the show sntp global Command
Field Description
Server Address The IP address for the SNTP server.
Version The version number of the server. The default is 1.
Poll Interval The time in seconds between SNTP request messages.
The range is 16 to 16284. The default is 64.
TimeSinceLastUpdate The time in seconds since the last server reply.
Server Status The operating status of the SNTP server, UP or
DOWN.
MAIN MENU
An asterisk (*) next to a menu option indicates that the option contains a submenu.
Table 1-4 describes each menu item.
Enter:
• Y to reboot the CSS
• N to continue using the Offline DM Main
menu
No Is Primary Boot
Record Configured?
Yes
Attempt Primary
Boot Record
No
No Is Secondary Boot
No configuration Record Configured?
Attempt Secondary
Boot Record
The Boot Configuration menu enables you to perform the following tasks as
described in Table 1-5.
• Boot via Network allows you to boot the CSS via FTP from CSS software on
a network-mounted file system on a remote system
• Boot via FTP allows you to download an ADI file containing CSS software
that you want to install on the CSS drive
• Boot via Disk allows you to boot the CSS from software currently on the CSS
drive
• Boot via Clear instructs the CSS to boot the CSS from the secondary boot
record
Refer to the following sections for a description of each Primary Boot Record
option:
• Specifying a Network-Mounted File System as the Primary Boot Record
• Specifying FTP as the Primary Boot Record
• Specifying Disk as the Primary Boot Record
• Specifying Clear as the Primary Boot Record
Set the Primary Boot Record to Network when you want to boot the system from
a network-mounted file system on a remote system (such as a PC or UNIX
workstation) via FTP. Instead of the CSS disk, the network file system contains
the CSS software. The CSS boots from this file system and loads the configuration
into memory. Perform a network boot when:
• You want multiple CSSs to use the same boot image while keeping their own
configuration information. You provide an alternate path for the location of
the configuration information. However this information must exist on the
same network file system with the boot image.
• The CSS has a disk failure. A network boot allows the CSS to boot
independently from its disk and to load the configuration into memory.
Before the CSS can boot from the network:
• Locate the remote system on the network where you will copy the CSS
software.
– Make sure that the CSS can access the system via FTP.
– Copy the CSS software zip file from the CSS CD onto the system disk.
– Create a directory and unzip the file into it. This directory will contain
all of the boot files and directories.
• On the CSS, create an FTP record to the directory containing the CSS
software on the network drive.
• Make sure that you cable the following port on the CSS to the network:
– CSS 11800 SCM 10/100 Mbps-Ethernet Management port
– CSS 11050 or CSS 11150 rear panel 10/100-Mbps Ethernet Management
port
For example:
Enter the FTP Config Path? [] k:/atlanta-config/
Press <Enter> to continue...
Set the Primary Boot Record to FTP when you want to upgrade the CSS software
on the CSS disk. The CSS accesses the ADI or GZIP file containing the CSS
software from an FTP server, copies it to the IDM, and unpacks it. Then the CSS
boots from the hard drive.
Make sure that you cable the following port on the CSS to the network:
• CSS 11800 SCM 10/100 Mbps-Ethernet Management port
• CSS 11050 or 11150 rear panel 10/100-Mbps Ethernet Management port
When you select FTP, the CSS prompts you for the boot image filename and FTP
information.
1. If required, enter a valid FTP pathname. For example:
Enter the boot image filename: /ftpimages/ap0500002
Enter FTP Server IP address: 10.3.6.58
Enter FTP Server authentication user name: mandy
Enter FTP Server authentication password: fred
The CSS queries if you want to access the boot image directly from the disk
at the next reboot (that is, the next time you reboot the CSS after completing
this current boot process).
Boot from Disk at next reboot? y/n
Press <Enter> to continue...
2. Enter either:
• y to copy the boot image from the FTP server to the disk. The CSS
accesses the boot image directly from the disk at next reboot. The CSS
also changes the information in the Primary Boot Record to Disk.
• n to FTP the boot image from the FTP server at next reboot.
3. Press Enter to display the Boot Configuration menu.
4. Enter r to display the Offline DM Main menu.
5. Select Reboot the System to reboot the CSS.
When the CSS completes the current boot process, it:
• Accesses the ADI file from the FTP server and unpacks (uncompresses) it
• Boots the CSS using the boot image you specified
When you select Disk as the Primary Boot Record, the CSS displays all boot
image versions that reside on the disk. For example:
ap0401003
ap0410008
ap0500002
1. At the prompt, enter the boot image filename you wish to use.
Enter the boot image filename: ap0500002
To use the Secondary Boot Record information instead of the Primary Boot
Record to boot the CSS:
1. Select Clear as the Primary Boot Record.
2. Press Enter to display the Boot Configuration menu.
3. Press r to display the Offline DM Main menu.
4. Select Reboot the System to reboot the CSS. Upon reboot, the CSS uses the
Secondary Boot Record.
• Boot via Network allows you to boot the CSS via FTP from CSS software on
a network-mounted file system on a remote system
• Boot via FTP allows you to download an ADI file containing CSS software
that you want to install on the CSS disk
• Boot via Disk allows you to boot the CSS from software currently on the CSS
disk
• Boot via Clear instructs the CSS to boot the CSS from the primary boot record
Refer to the following sections for a description of each Primary Boot Record
option:
• Specifying a Network-Mounted File System as the Secondary Boot Record
• Specifying FTP as the Secondary Boot Record
• Specifying Disk as the Secondary Boot Record
• Specifying Clear as the Secondary Boot Record
Set the Secondary Boot Record to Network when you want to boot the system
from a network-mounted file system on a remote system via FTP. Instead of the
CSS disk, the network file system contains the CSS software. The CSS boots from
this file system and loads the configuration into memory. Perform a network boot
when:
• You want multiple CSSs to use the same boot image while keeping their own
configuration information. You provide an alternate path for the location of
the configuration information. However this information must exist on the
same network file system with the boot image.
• The CSS has a disk failure. A network boot allows the CSS to boot
independently from its disk and to load the configuration into memory.
Before the CSS can boot from the network:
• Locate the remote system (such as a PC or UNIX workstation) on the network
where you will copy the CSS software.
– Make sure that the CSS can access the system via FTP.
– Copy the CSS software zip file from the CSS CD onto the system disk.
– Create a directory and unzip the file into it. This directory will contain
all of the boot files and directories.
• On the CSS, create an FTP record to the directory containing the CSS
software on the network drive.
• Make sure that you cable the following port on the CSS to the network:
– CSS 11800 SCM 10/100 Mbps-Ethernet Management port
– CSS 11050 or CSS 11150 rear panel 10/100-Mbps Ethernet Management
port
Note The CSS must be able to access the configuration path through the
previously configured FTP server IP address, login username, and
password.
For example:
Enter the FTP Config Path? [] k:/atlanta-config/
Press <Enter> to continue...
Set the Secondary Boot Record value to FTP when you want to upgrade the CSS
software on the CSS disk. The CSS accesses the ADI or GZIP file containing the
CSS software from an FTP server, copies it to the IDM, and unpacks it. Then the
CSS boots from the hard drive.
Make sure that you cable the following port on the CSS to the network:
• CSS 11800 SCM 10/100 Mbps-Ethernet Management port
• CSS 11050 or CSS 11150 rear panel 10/100-Mbps Ethernet Management port
When you select FTP, the CSS prompts you for the boot image filename and FTP
information.
1. If required, enter a valid FTP pathname. For example:
Enter the boot image filename: /ftpimages/ap0500002
Enter FTP Server IP address: 10.3.6.58
Enter FTP Server authentication user name: mandy
Enter FTP Server authentication password: fred
The CSS queries if you want to access the boot image directly from the disk
at the next reboot (that is, the next time you reboot the CSS after completing
this current boot process).
Boot from Disk at next reboot? y/n
2. Enter either:
• y to copy the boot image from the FTP server to the disk. The CSS
accesses the boot image directly from the disk at next reboot. The CSS
also changes the information in the Secondary Boot Record to Disk.
• n to FTP the boot image from the FTP server at next reboot.
3. Press Enter to display the Boot Configuration menu.
Press <Enter> to continue...
When you select Disk as the Secondary Boot Record, the CSS displays all boot
image versions that reside on the disk and prompts you to enter a boot image.
1. Enter a boot image filename.
Boot via [N]etwork, [F]TP, [D]isk, or [C]lear: [D]
ap0401003
ap0410008
ap0500002
3. Enter either:
• y to reboot
• n to continue using the Offline DM Main menu
The CSS enables you to password-protect the Offline DM Main menu to protect
it against unauthorized access. The default is disabled; no password is required to
access the Offline DM Main menu.
Caution Use care when password-protecting the Offline DM Main menu and
ensure that you write down the new password. If you lose the new
password, it cannot be recovered and you will be unable to access
the Offline DM Main menu. The only solution, at that point, would
be to contact the Cisco Technical Assistance Center (TAC) at
1-800-553-2447 or 1-408-526-7209. You can also email TAC at
[email protected].
• When you enter yes, the CSS prompts you to enter a username and
password when you access the Offline DM Main menu.
• When you enter no, the CSS does not prompt for a username and
password when you access the Offline DM Main menu.
2. Press Enter to redisplay the Security Options menu.
Press <Enter> to continue...
For security reasons, you can change the administrative username and password
through either the Offline DM Main menu or the username-offdm command.
Unlike other usernames and passwords, the CSS saves the administrative
username and password in nonvolatile RAM (NVRAM). Anytime you reboot the
CSS, it reads them from NVRAM and reinserts them into the user database.
3. Enter a password. Note that the CSS does not display passwords.
Enter [administrator] password:
1. Format Disk
2. Check Disk
3. Check Disk Disable
r. Return to previous menu
If the CSS detects unrecoverable errors when performing a check disk, you must
reformat the disk. Reformatting the disk erases all data from the disk permanently.
To reformat the disk:
1. Enter option 1 from the Disk Options menu.
Formatting the disk results in all disk data being permanently
erased.
Are you sure you want to continue? (yes,no):
Enter either:
• yes to reformat the disk.
• no to abort the reformat function. If the disk has unrecoverable errors and
you do not reformat it, be aware that the file system may be corrupt and
functionality is compromised.
2. The CSS queries whether you want to perform a quick format or a complete
format.
Enter either:
• yes to reformat the disk using the quick format (does not perform cluster
verification). Only use the quick format when you are certain of the disk
integrity.
• no to reformat the disk including cluster verification.
Quick format? (yes,no):
You must enter the Offline DM Main menu to set the primary boot
configuration.
When the CSS boots up, it checks the results of the previous shutdown. If the
CSS:
• Does not detect errors, it reports a status of OK and continues the boot
process
Reading configuration records...OK
Checking previous shutdown...OK
Initializing the disk...OK
If the CSS reports that the disk is dirty, it has discovered errors on the disk. In this
case, the CSS automatically perform a check disk to recover from the errors and
maintain the integrity of the disk.
2. Choose whether you want the CSS to perform a quick check disk or a
complete check disk. Enter either:
• yes to instruct the CSS to perform a quick check disk (does not include
cluster verification
• no to instruct the CSS to perform a complete check disk (includes cluster
verification)
The CSS performs check disk. When completed, it displays:
Operation completed successfully.
Press <Enter> to continue...
By default, the CSS performs a check disk when it boots. The Disk Options menu
provides an option that allows you to disable the running of check disk or reenable
it. When you select this option, it toggles to disable check disk if it is currently
enabled, or to enable check disk if it is currently disabled.
For example, if check disk is currently enabled, to disable it:
1. Enter option 3 from the Disk Options menu.
2. Enter r to return to the Advanced Options menu.
3. Enter r to return to the Offline DM Main menu.
4. Enter option 2 to display the boot configuration.
Note For a flash disk-based system, if the core dump file is older than 15
minutes, it may be overwritten. If you want to save the core dump
file for later examination, archive it to another directory or disk
before it is overwritten. For details on using the archive log
command, refer to “Archiving a Log File” later in this chapter.
When the CSS experiences a fatal error and core dumps are disabled, the CSS
reboots automatically. The CSS does not write information to the hard disk or the
flash disk.
Build prefix
From an FTP server, you can view the following directories on the hard disk or
flash disk:
• The log directory contains the following log files:
– boot.log - ASCII log of boot process
– boot.bak - Backup of the previous boot log
– sys.log - ASCII log of system events (logging to disk is enabled by
default to subsystem all and level info)
– sys.log.prev - Backup of the previous system log file (if any)
• The scripts directory contains default, profile, and sample scripts.
• The core directory contains any core dumps created by the CSS. For
information on copying core dumps to an FTP or TFTP server, refer to
“Copying Core Dumps to an FTP or TFTP Server” later in this chapter.
• The MIB directory contains MIB files that you can load into SNTP-compliant
network management software applications.
Note When you view the CSS software directories installed on a network
drive, more directories are listed than those you can view on the hard
disk or flash disk. These additional directories are reserved for
internal use. Do not manipulate the files in these directories.
The software directory also contains the startup-config file. This is an ASCII file
containing commands the CSS executes at startup. This file is created when you:
• Finish using the configuration script.
• Issue the copy running-config startup-config or write memory command.
Both commands save configuration changes to the startup-config during a
CSS session. The write memory command also archives the startup
configuration file to the archive directory on the CSS (similar to the archive
startup-config command, as described in “Archiving Files to the Archive
Directory” in this chapter).
• Use File Transfer Protocol (FTP) to copy a startup-config file to the CSS.
The archive directory contains the files that you archive from the current software
by using the archive command. These files include running-config,
startup-config, log files, profile scripts, and scripts you create. You can view a list
of archived files by using the show archive ? command.
To restore any archived files to the CSS, use the restore command. For more
information on the archive and restore commands, refer to the “Archiving Files
to the Archive Directory” and “Restoring Files from the Archive Directory” in
this chapter.
To view general information about the CSS disk, use the show disk command.
Table 1-6 describes the fields in the show disk output.
Field Description
Disk Size The total size of the disk in megabytes.
Note The CSS flash disk has a disk size of 350 MB,
however 130 MB is reserved for the generation of
dump files. This dump partition is not available to
the CSS file system, and is not included in the
Disk Size field. The CSS hard disk is allocated a
similar but larger dump partition.
For example:
# clear running-config
service serv2
ip address 10.3.6.2
active
!************************ OWNER ***********************
owner arrowpoint.com
content rule1
ip address 158.3.7.43
protocol tcp
port 80
add service Serv1
add service Serv2
active
Note You must archive your startup-config and scripts before you upgrade
the CSS software or these files will be overwritten during the
upgrade. Once the upgrade is complete and the CSS has rebooted,
use the restore command to copy these files from the archive
directory to be used as current startup-config and scripts.
Archiving Scripts
Use the archive script command to archive a script file. The syntax for this
command is:
archive script script_filename {archive_filename}
The variables are:
• script_filename - The filename of the script to archive. To see a list of scripts,
enter archive script ?.
• archive_filename - An optional name you want to assign to the archive file.
Enter an unquoted text string with a maximum length of 32 characters.
Note The archive directory resides on the CSS hard drive. If you booted
your CSS from a network-mounted system and your hard drive is not
working, archive- and restore-related functions are suspended.
For more information on these options and associated variables, refer to the
following sections.
Note The CSS does not show configuration default values in the show
displays. This applies even when you enter a command to configure
a default value.
Note In the CSS 11050 and the CSS 11150, the Switch Control Module
(SCM) and Switch Fabric Module (SFM) are combined on one
integrated circuit card called the Switch Control Fabric Module
(SCFM).
Field Description
Name The model number of the CSS.
SW Version The currently running software version on the CSS.
HW Major Version The major version of the hardware.
HW Minor Version The minor version associated with the hardware major
version.
Serial Number The serial number of the chassis flash.
Base MAC Address The MAC address for the chassis.
Module Number The slot number for the module.
Module Name The name of the module.
Status The status of the module. The possible states are:
• primary
• backup
• powered-off
• powered-on
• bad
• unknown
Table 1-7 Field Descriptions for the show chassis Command (continued)
Field Description
Port Number The number of the Ethernet port.
Port Name The name of the port.
Status The status of the port. The possible states are:
• online
• offline-ok
• offline-bad
• bad
• going-online
• going-offline
• inserted
• post
• post-ok
• post-fail
• post-bad-comm
• any
• unknown-state
Operational Active flash on the CSS.
Locked The inactive flash version available on the CSS.
Chassis/Board The hardware part comprising the CSS.
PN The part number of the hardware.
Rev The revision of the part.
Field Description
Installed Memory The total memory size in the CSS
Free Memory The amount of free memory available
CPU The utilized percentage of the CPU
Buffer Statistics
Buffer Pool The buffer pool index
Size The size in bytes of each buffer in the buffer pool
Total The total number of buffers in the buffer pool
Available The current number of available buffers in the buffer
pool
Failures The number of failures to obtain a buffer from the
buffer pool
Low Buffer Count The lowest recorded number of available buffers
Field Description
Virtual Authentication Whether or not users must enter a username and
password to log into the CSS.
Console Authentication Whether or not console port authentication of
locally-defined usernames and passwords logging
into the CSS in enabled.
Username The username.
Privilege Level The privilege level of the user.
Type The type of user. Types are:
• administrator (administrative username, created
using the username-offdm command)
• technician (technician username, created using
the username-technician command)
If the field is blank, the user is neither an
administrator or technician.
Table 1-9 Field Descriptions for the show user-database Command (continued)
Field Description
Directory Access The directory access privileges for the listed
usernames (as specified through the dir-access
option of the username command). There are a
series of access privilege codes assigned to the seven
CSS directories, in the following order: Script, Log,
Root (installed CSS software), Archive, Release
Root (configuration files), Core, and MIBs
directories. By default, users have both read- and
write-access privileges (B) to all seven directories.
The levels for each of the CSS directories can be one
of the following access privilege codes:
• R - Read-only access to the CSS directory
• W - Write-only access to the CSS directory
• B - Both read- and write-access privileges to the
CSS directory (default for all users)
• N - No access privileges to the CSS directory
For example, BBNBNBB indicates that the user has
no access to the root and release root directories, but
has read and write access to the script, log, archive,
core, and MIB directories.
Field Description
Line The type of session. The * indicates your current session.
User The login name of the user.
Login The amount of time that the user has been logged on the CSS.
Idle The amount of time that the session has been idle.
Location The location where the session is occurring.
Where to Go Next
Chapter 2, Configuring User Profiles and CSS Parameters, provides information
on how to configure user profiles and CSS parameters. This chapter also contains
information on using the Content API and Command Scheduler features.
This chapter describes how to configure user profiles and CSS parameters. This
chapter also contains information on using the Content API and Command
Scheduler features. Information in this chapter applies to all models of the CSS
except where noted.
This chapter contains the following sections:
• Configuring User Profiles
• Boot Configuration Mode Commands
• Configuring Host Name
• Configuring Idle Timeout
• Configuring the CSS as a Client of a RADIUS Server
• Controlling Remote Access to the CSS
• Restricting Console, FTP, SNMP, Telnet, XML, and Web Management
Access to the CSS
• Configuring Flow Parameters
• Finding an IP Address
• Configuring Content API
• Configuring the Command Scheduler
For example:
# show profile
@prompt CSS11150
@no expert
alias all reboot "@configure;boot;rebo"
alias all shutdown "@configure;boot;shutd"
alias all logon "@configure;logging line \${LINE};exit"
alias all logoff "@configure;no logging line \${LINE};exit"
alias all aca-load "@script play service-load"
alias all dnslookup "@script play dnslookup"
alias super save_config "copy running-config startup-config;archive
startup-config"
alias super setup "script play setup"
alias super upgrade "script play upgrade"
alias super monitor "script play monitor"
alias super save_profile "copy profile user-profile;archive script
admin-profile
"
set CHECK_STARTUP_ERRORS "1" session
To allow the CSS to prompt you for confirmation when you make configuration
changes, enter:
# no expert
For example, when you issue the command to create an owner and expert mode is
off, the CSS prompts you to verify the command, enter:
(config)# owner arrowpoint.com
Create owner <arrowpoint.com>, [y/n]:y
(config-owner[arrowpoint.com])#
To save the new prompt, add it to user or default profiles. To restore the prompt
to its default, use the no prompt command.
For example:
# show history
history
show history
show ip routes
show ip summary
show ip stat
clock
clock date
clock time
show history
Note If you exit the CSS without copying changes in the running profile
to your username-profile or default-profile, the CSS prompts you
that the profile has changed and queries whether or not you want to
save your changes. If you respond with y, the CSS copies the running
profile to your username-profile or the default-profile.
For information about commands available in boot mode, refer to the following
sections:
• Unpacking an ArrowPoint Distribution Image (ADI)
• Removing an ArrowPoint Distribution Image (ADI)
• Specifying the Primary BOOT Configuration
• Specifying the Secondary Boot Configuration
• Configuring a Boot Configuration Record for the Passive SCM
• Showing the BOOT Configuration
• Booting the CSS from a Network Drive
Note Before unpacking the ADI, you must first copy the ADI to the CSS
disk. Use the copy ftp ftp_record filename boot-image command
to copy the ADI to the CSS disk.
Enter the configuration pathname as an unquoted text string with no spaces and a
maximum length of 64 characters.
To configure the secondary config path, enter:
(config-boot)# secondary config-path f:/bootdir/
Note The passive command and its options only affect the current passive
SCM. When you configure the passive SCM, the set values are
loaded into its nonvolatile RAM. If the passive SCM transitions to
the active state, it continues to retain these values but is no longer
affected by these commands; boot commands are not saved in the
running-config.
To change the passive SCM boot IP address, reissue the passive ip address
command.
To remove the primary boot file from the passive SCM, enter:
(config-boot)# no passive primary boot-file
To remove the primary boot type from the passive SCM, enter:
(config-boot)# no passive primary boot-type
To remove the secondary boot file from the passive SCM, enter:
(config-boot)# no passive secondary boot-file
To remove the secondary boot type from the passive SCM, enter:
(config-boot)# no passive secondary boot-type
When using an alternate configuration path, make sure that the path leads to a
directory containing the script, log and info subdirectories and the startup-config
file. These subdirectories must contain the files in the corresponding
subdirectories of the unzipped boot image. First, create these subdirectories. Then
copy the files from the boot image to the subdirectories.
Enter the configuration path as an unquoted text string with no spaces and a
maximum length of 64 characters.
For example, enter:
(config-boot)# passive secondary config-path c:/bootdir/
Copying the Boot Configuration Record from the Active SCM to the Passive SCM
Use the passive sync command to copy the primary and secondary boot
configuration record from the nonvolatile RAM (NVRAM) of the active SCM to
its passive SCM backup. This command is available in boot mode.
For example, enter:
(config-boot)# passive sync
• The CSS has a hard drive failure. A network boot allows the CSS to boot
independently from its hard drive and to load the configuration into memory.
To display a list of configured ftp records, reenter the command and use a “?”.
For example, enter:
(config-boot)# passive primary boot-type boot-via-network
bootrecord ?
You can also use the show boot-config command to display network boot
configuration information. For example:
(config)# show boot-config
Note To add a host to the Host table, the host name must not already exist.
To change a current host address, remove it and then add it again.
Note To override the idle timeout value for a specific session, configure
the terminal timeout command. Terminal commands are
user-specific; that is, they apply uniquely for each CSS user.
To revert the terminal timeout value to its default of enabled for 5 minutes, enter:
(config)# no idle timeout
Note This section assumes that you have properly configured your
RADIUS server implementation. Cisco Systems does not provide
RADIUS server software, and it is beyond the scope of this
document to cover the different RADIUS server configurations.
Use the radius-server command and its options to specify the RADIUS server
host (primary RADIUS server, and, optionally, a secondary RADIUS Server),
communication time interval settings, and a shared secret text string. This
command is available in configuration mode. The options for this command are:
• radius-server primary ip_address secret string {auth-port port_number}-
Specify the primary RADIUS server.
• radius-server secondary ip_address secret string {auth-port port_number}
- Specify the secondary RADIUS server. Configuration of a secondary
RADIUS server is optional.
• radius-server dead-time seconds - Set the time interval (in seconds) that the
CSS probes an inactive RADIUS server (primary and secondary) to
determine if it is back online.
To set the RADIUS server retransmit request back to the default of 10 seconds,
enter:
(config)# no radius-server timeout
To set the RADIUS server retransmit request back to the default of 3 retries, enter:
(config)# no radius-server retransmit
To set the RADIUS server dead-time request back to the default of 5 seconds,
enter:
(config)# no radius-server dead-time
Table 2-1 describes the fields in the show radius config output.
Table 2-1 Field Descriptions for the show radius config Command
Field Description
Server IP The IP address or host name for the specified RADIUS
Address server.
Secret The shared secret text string between the specified RADIUS
server and the CSS RADIUS client.
Port The UDP port on the specified RADIUS server allocated to
receive authentication packets from the CSS RADIUS client.
The default port number is 1645.
State The operational stats of the RADIUS server (ALIVE,
DOWN, UNKNOWN).
Dead Timer The time interval (in seconds) that the CSS probes a
RADIUS server (primary or secondary), which is not
responding, to determine if it is operational and can receive
authentication requests.
Timeout The interval (in seconds) the CSS RADIUS client waits for
the RADIUS server to reply to an authentication request
before retransmitting requests to the RADIUS server.
Retransmit Limit The number of times the CSS RADIUS client retransmits an
authentication request a timed out RADIUS server before
stopping transmission to that server.
Probes The packets that the CSS RADIUS client automatically
transmits to determine if the RADIUS server is still available
and can receive authentication requests.
Table 2-2 describes the fields in the show radius stat output.
Table 2-2 Field Descriptions for the show radius stat Command
Field Description
Server IP address The IP address or host name of the specified RADIUS server
Accepts The number of times the RADIUS server accepts an
authentication request from the CSS RADIUS client
Requests The number of times the CSS RADIUS client issues an
authentication request to the RADIUS server
Retransmits The number of times the CSS RADIUS client retransmits an
authentication request to the active RADIUS server after a
timeout occurred
Rejects The number of times the CSS RADIUS client receives a
reject notification from the RADIUS server while trying to
establish an authentication request
Bad Responses The number of times the CSS RADIUS client receives a bad
transmission from the RADIUS server
Bad The number of times the RADIUS server denies an
Authenticators authentication request from the CSS RADIUS client
Pending The number of pending authentication requests to the
Requests RADIUS server
Timeouts The number of times the CSS RADIUS client reached the
specified timeout interval while waiting for the RADIUS
server to reply to an authentication request
Discarded The number of authentication requests that were discarded
Authentication while the primary or secondary RADIUS server was down
Requests
Note Before you can use RADIUS as either the virtual authentication
method or the console authentication method, you must enable
communication with the RADIUS security server using the
radius-server command (refer to “Configuring the CSS as a Client
of a RADIUS Server” earlier in this chapter for details).
Note To remove users already logged into the CSS, use the
admin-shutdown command.
Note Disable Telnet access when you want to use the Secure Shell Host
(SSH) server. For information on configuring SSHD, refer to
“Configuring Secure Shell Daemon” in Chapter 3, Configuring CSS
Network Protocols.
The syntax and options for this global configuration mode command are:
• restrict console - Disable console access to the CSS
• restrict ftp - Disable FTP access to the CSS
• restrict snmp - Disable SNMP access to the CSS
• restrict telnet - Disable Telnet access to the CSS
• restrict XML - Disable XML access to the CSS
• restrict web-mgmt - Disable Web management access to the CSS
To enable access to the CSS:
• no restrict console - Enable console access to the CSS
• no restrict ftp - Enable FTP access to the CSS
• no restrict snmp - Enable SNMP access to the CSS
• no restrict telnet - Enable Telnet access to the CSS
• no restrict xml - Enable XML access to the CSS
• no restrict web-mgmt - Enable Web management access to the CSS
For example, enter:
(config)# restrict telnet
Finding an IP Address
Use the find ip address command to search the CSS configuration for the
specified IP address. You can include a netmask for subnet (wildcard) searches.
This search can help you avoid IP address conflicts when you configure the CSS.
When you use this command, it checks services, source groups, content rules,
ACLs, the management port, syslog, APP sessions, and local interfaces for the
specified IP address. If the address is found, the locations of its use are displayed.
If no addresses are found, the CSS returns you to the command prompt.
This command is available in all modes. The syntax is:
find ip address ip_or_host {subnet_mask|range number}
Enter the:
• IP address in dotted-decimal notation (for example, 192.168.11.1) or enter
the host name in mnemonic host-name format (for example,
host.domain.com).
• Optional subnet mask as either:
– A prefix length in CIDR bitcount notation (for example, /24). Do not
enter a space to separate the IP address from the prefix length.
– An IP address in dotted-decimal notation (for example, 255.255.255.0).
If you enter a mask of 0.0.0.0, the CSS finds all addresses.
• range number to define how many IP addresses you want to find, starting
with the ip_or_host address. Enter a number from 1 to 65535. The default
range is 1.
For example, if you enter an IP address of 203.1.1.1 with a range of 10, the
CSS tries to find the addresses from 203.1.1.1 through 203.1.1.10.
For example, enter:
(config)# find ip address 192.168.0.0
To reset a permanent connection to its default port number of 0, use the no flow
permanent command. For example, to reset the port number for port1 to 0, enter:
(config) no flow permanent port1
-------------------------------------------------------------
Port Active Total TCP UDP
-------------------------------------------------------------
1 13 43339169 13 0
2 16 43337519 16 0
5 18 3167362 18 0
6 9 33483528 9 0
2. Enclose the CLI commands within the <action></action> tag set. For
example:
<action>add service MyServiceName</action>
<action>vip address 10.2.3.4</action>
3. Pay attention to mode hierarchy of the CLI commands in the XML file. Each
mode has its own set of commands. Many of the modes have commands
allowing you to access other related modes. If you enter a series of commands
in the improper mode hierarchy, this will result in an XML file that fails to
execute properly.
As an example, the following commands configure an access list (ACL):
<?xml version="1.0" standalone="yes" ?>
<config>
<action>acl 98</action>
<action>clause 10 permit any any dest any</action>
<action>apply circuit-(VLAN3)</action>
</config>
4. Pay attention to the allowable CLI command conventions for syntax and
variable argument in the XML file. If you enter an invalid or incomplete
command, this will result in an XML file that fails to execute properly.
Note For overview information on the CLI commands you can use
in global configuration mode and its subordinate modes, refer
to the Content Services Switch Command Reference,
Chapter 2, CLI Commands.
Note The web-mgmt state enable command (for CSS software version
3.x) performs the same function as the (config) no restrict xml
command (for CSS software version 4.x) and the web-mgmt state
disable command performs the same function as the (config)
restrict xml command. When you use the web-mgmt state enable
command, it does not appear in the configuration file. Instead, the
(config) no restrict xml command appears in the configuration file.
Note When XML is enabled, the CSS listens for XML connections on
port 80.
Note Ensure that the CLI commands in the XML document do not have
an impact on the interface configuration through which the XML file
transfer process is to occur (for example, including the command no
ip addr 10.1.2.3, which identifies the IP address of the CSS
receiving the XML file). If this occurs, you will disconnect the
workstation performing the XML file transfer.
Software is available to simplify the process of publishing XML files to the CSS
HTTP server. These software packages offer a simple method to publish files to a
Web server. This software uses the HTTP protocol to publish files and require no
special software on the Web server side of the connection.
The syntax and options for this global configuration mode command are:
• cmd-sched - Enable command scheduling.
• cmd-sched record name minute hour day month weekday “commands...”
{logfile_name} - Create a configuration record for the scheduled execution
of any CLI commands, including the playing of scripts.
The variables are listed below. When entering minute, hour, day, month, and
weekday variables, you may enter a single integer, a wildcard (*), a list separated
by commas, or a range separated by a dash (-).
• name - The name of the configuration record. Enter an unquoted text string
up to 16 characters.
• minutes - The minute of the hour to execute this command. Valid numbers are
from 0 to 59.
• hour - The hour of the day. Valid numbers are from 0 to 23.
• day - The day of the month. Valid numbers are from 0 to 31.
• month - The month of the year. Valid numbers are from 1 to 12.
• weekday - The day of the week. Valid numbers are from 1 to 7. Sunday is 1.
• command - The commands you want to execute. Enter a quoted text string up
to 255 characters. Separate multiple commands with a semicolon (;)
character. If the command string includes quoted characters, use a single
quote character; any single quoted characters not preceded by a backslash (\)
character is converted to double quotes when the command string is executed.
• logfile_name, as an optional variable that defines the name of the log file.
Enter a text string up to 32 characters.
Any of the time variables can contain one or some combination of the following
values:
• A single number to define a single or exact value for the specified time
variable
• A wildcard (*) character matching any valid number for the specified time
variable
• A list of numbers separated by commas, up to 40 characters, to define
multiple values for a time variable
• Two numbers separated by a dash (-) character indicating a range of values
for a time variable
For example, enter:
(config)# cmd-sched record periodic_shows 30 21 3 6 1 "show
history;show service;show rule;show system-resources"
Field Description
Cmd Scheduler State of the command scheduler (enabled or disabled) and
the number of configured records.
Sched Rec The name of the configuration record.
id The ID for the record.
next exec The day and time when the record will be executed.
executions How many times the record has executed.
minList The configured minute of the hour to execute the command.
hourList The configured hour of the day to execute the command.
Table 2-3 Field Descriptions for the show cmd-sched Command (continued)
Field Description
dayList The configured day of the month to execute the command.
monthList The configured month of the year to execute the command.
weekdayList The configured day of the week to execute the command.
Sunday is 1.
cmd The commands you want to execute. Separate multiple
commands with a ; character.
Where to Go Next
Chapter 3, Configuring CSS Network Protocols, describes how to configure the
CSS DNS, ARP, RIP, IP, routing, bridging, SSH, and opportunistic Layer 3
forwarding.
This chapter describes how to configure the CSS DNS, ARP, RIP, IP, routing,
bridging, SSH, and opportunistic Layer 3 forwarding functions. Information in
this chapter applies to all CSS models except where noted.
This chapter includes the following sections:
• Configuring Domain Name Service
• Configuring Address Resolution Protocol
• Configuring Routing Information Protocol
• Configuring Internet Protocol
• Configuring an IP Route
• Configuring IP Source-Route
• Disabling an Implicit Service for Static Route Next Hop
• Configuring IP Subnet-Broadcast
• Showing IP Information
• Configuring Bridging for the CSS
• Configuring Secure Shell Daemon
• Configuring Opportunistic Layer 3 Forwarding
Configuring ARP
To define a static ARP mapping, use the arp command. The syntax for this global
configuration mode command is:
• arp ip_address mac_address interface {vlan}
• arp hostname mac_address interface {vlan}
The variables and options are:
• ip_address - The address of the system for static mapping. Enter an IP
address in dotted-decimal notation (for example, 192.168.11.1) or in
mnemonic host-name format (for example, myhost.mydomain.com).
• hostname - The address of the system for static mapping. Enter a hostname in
mnemonic host-name format (for example, myhost.mydomain.com). You
must configure DNS and the hostname must be resolved to an IP address for
hostname to work.
• interface - The CSS interface that you want to configure. For a CSS 11050 or
CSS 11150, enter the interface name in interface port format (for example,
e2). For a CSS 11800, the interface format is slot/port (for example, 3/1).
To remove a static mapping address, use the no arp command. For example:
(config)# no arp 192.168.11.1
The CSS discards ARP requests from hosts that are not on the same network as
the CSS circuit IP address. Thus, if a CSS and a host are within the same VLAN
but configured for different IP networks, the CSS does not respond to ARP
requests from the host.
To delete dynamic entries from the ARP cache, use the clear arp cache command
with an IP address or hostname. The syntax and options for this command are:
• clear arp cache - Clear the entire ARP cache
• clear arp cache ip_address - Clear a single ARP IP address entry
• clear arp cache hostname - Clear a single ARP hostname entry
For example:
# clear arp cache
Field Description
IP Address The IP address of the system for static mapping.
MAC Address The MAC address of the system mapped to the IP address.
Type The resolution type for the entry. Dynamic indicates that
the entry was discovered through the ARP protocol. Static
indicates that the resolution is from a static configuration.
Port The CSS interface configured as the egress logical port.
Table 3-2 describes the fields in the show arp config output.
Table 3-2 Field Descriptions for the show arp config Command
Field Description
ARP Response Timeout The time in seconds to wait for an ARP resolution
response before discarding the packet waiting to be
forwarded to an address. The time can be from 5 to 30
seconds. The default is 5 seconds.
ARP Flush Timeout The time in seconds to hold an ARP resolution result
in the ARP cache. The timeout period can be from 60
to 86400 (24 hours). The default is 14400 (4 hours).
An entry of none or 86401 indicates that the ARP
entries will not timeout.
Note The network does not have to be present in the routing table to be
advertised. The SNTPip advertise command is intended for
advertising Virtual IP addresses (VIPs).
To stop advertising routes from other protocols through RIP, use either the local,
static, or firewall option.
The following command stops advertising static routes:
(config)# no rip redistribute firewall
(config)# no rip redistribute local
(config)# no rip redistribute static
(config)# no rip redistribute ospf
Field Description
IP Address The advertised RIP interface address.
State The operational state of the RIP interface.
RIP Send The RIP version that the interface sends. The possible field
values are:
• none, do not send RIP packets
• RIPv1, send RIP version 1 packets only
• RIPv2, send RIP version 2 packets only (default)
RIP Recv The RIP version that the interface receives. The possible
values are:
• both, receiving both version 1 and version 2 (default)
• none, receiving no RIP packets
• Ripv1, receiving RIP version 1 packets only
• Ripv2, receiving RIP version 2 packets only
Default Metric The default metric used when advertising the RIP interface.
Table 3-3 Field Descriptions for the show rip Command (continued)
Field Description
Tx Log The setting for the logging of RIP packet transmissions
(enabled or disabled). The default setting is disabled.
Rx Log The setting for the logging of RIP packet received (enabled
or disabled). The default setting is disabled.
Table 3-4 describes the fields in the show rip globals output.
Table 3-4 Field Descriptions for the show rip globals Command
Field Description
RIP Route Changes The global number of route changes made to the IP
route database by RIP
RIP Query Responses The global number of query responses sent to RIP
query from other systems
To display the RIP interface statistics for all RIP interface entries, enter:
# show rip statistics
Table 3-5 describes the fields in the show rip statistics output.
Table 3-5 Field Descriptions for the show rip statistics Command
Field Description
System Route Changes The global number of route changes made to the IP
route database by RIP
System Global Query The global number of query responses sent to RIP
Responses query from other systems
IP Address The RIP interface IP address
Triggered Updates Sent The number of triggered RIP updates sent by the
interface
Table 3-5 Field Descriptions for the show rip statistics Command (continued)
Field Description
Bad Packets Received The number of bad RIP response packets received
by the interface
Bad Routes Received The number of bad routes in valid RIP packets
received by the interface
Configuring IP Record-Route
To enable the CSS to process frames with a record-route option, use the ip
record-route command. For example:
(config)# ip record-route
Configuring IP Redundancy
To enable CSS-to-CSS redundancy, use the ip redundancy command. For
example:
(config)# ip redundancy
Configuring IP ECMP
Use the ip ecmp command to set the equal-cost multipath selection algorithm and
the preferred reverse egress path. The syntax and options for this global
configuration mode command are:
• ip ecmp address - Choose among alternate paths based on IP addresses. For
example:
(config)# ip ecmp address
• ip ecmp no-prefer-ingress - Do not prefer the ingress path of a flow for its
reverse egress path. By default, the ingress path for a flow is its preferred
egress path. For example:
(config)# ip ecmp no-prefer-ingress
To reset the ingress path of a flow for its preferred reverse egress path, enter:
(config)# no ip ecmp no-prefer-ingress
Configuring an IP Route
A static route consists of a destination network address and mask, as well as the
next hop to reach the destination. You can also specify a default static route (using
0.0.0.0 as the destination network address and a valid next hop address) to direct
frames for which no other destination is listed in the routing table. Default static
routes are useful for forwarding otherwise unrouteable packets by the CSS.
When you configure a static route, the CSS creates an internal service that
periodically polls the configured next hop address with an ICMP echo (or ping)
keepalive. The internal service is called an implicit service. If the router fails, the
CSS removes any entries from the routing table that point to the failed router and
stops sending network traffic to the failed router. When the router recovers, the
CSS:
• Becomes aware of the router
• Reenters applicable routes into the routing table
The implicit service does not determine if the default or static route appears in the
routing table. This decision is based on the CSS having a viable ARP entry for the
next hop router IP address so the CSS can forward traffic to that destination. The
CSS uses the ICMP keepalive as a means to ensure the next hop router MAC
address is available and current. However, in certain situations, the next hop router
may block ICMP message transmitted by the CSS, which results in a failed ICMP
keepalive (the ICMP keepalive is in the Down state). As long as the CSS has the
ARP entry of the next hop router the static route is still placed in the routing table.
Note The CSS allows you to disable the internal ICMP keepalive through the
ip-no-implicit service command. In this case, if the MAC address for the next
hop is not known to the CSS the address will not appear in the routing table.
Use the ip route command to configure an IP route. You can configure a static
route, a default static IP route, a blackhole route (where the CSS drops any
packets addressed to the route), or a firewall IP route. Each ip route command
requires either an:
• IP address and a subnet mask prefix - For example, 192.168.1.0/24
or
• IP address and a subnet mask - For example, 192.168.1.0 255.255.255.0
The ip route options are defined below. Note that the examples use the /subnet
mask prefix option.
• ip route IP address subnet mask blackhole - Instructs the CSS to drop any
packets addressed to the route. For example:
(config)# ip route 192.168.1.0/24 blackhole
• ip route IP address subnet mask IP address2 - Specify the next hop address
for the route. For example:
(config)# ip route 0.0.0.0/0 10.0.1.1
Configuring IP Source-Route
To enable processing of source-routed frames, use the ip source-route command.
For example:
(config)# ip source-route
Note Static routes can sometimes appear in the CSS routing table even when you have
an implicit service for the next hop address (the default setting) and the internal
keepalive is down. When the CSS detects the ARP mapping for the next hop in the
static route, the CSS continues to list that route in the routing table regardless of the
state of the ICMP service keepalive (Down or Up).
To reset the default setting (no implicit service is established to the next hop of
the static route), enter:
(config)# no ip no-implicit-service
Configuring IP Subnet-Broadcast
To enable the CSS to forward subnet broadcast addressed frames, use the
ip subnet-broadcast command.
For example:
(config)# ip subnet-broadcast
Caution Enabling the CSS to forward the subnet broadcast can make the
subnet susceptible to “smurf” attacks; an attacker sends an ICMP
echo request frame using a subnet broadcast address as a destination
and a forged address as the source. If the attack is successful, all the
destination subnet hosts reply to the echo and flood the path back to
the source. By disabling the subnet broadcast forwarding, the
original echo never reaches the hosts.
Showing IP Information
Use the show ip command to display Internet Protocol (IP) information for the
CSS. Refer to the following sections to display CSS IP information.
• Showing IP Config - Display IP global configuration parameters
• Showing IP Interfaces - Display configured IP interfaces
• Showing IP Routes - Display IP routing information
• Showing IP Statistics - Display aggregate UDP and TCP statistics for the
unit
• Showing IP Summary - Display a summary of IP global statistics
Showing IP Config
Use the show ip config command to display IP global configuration parameters.
The parameters shows the state (enabled or disabled) of the source route option,
forward IP broadcasts, record route option, and IP route change logging. It also
shows the value for the orphaned route timer.
Table 3-6 describes the fields in the show ip config output.
Field Description
Source Route Whether the processing of source-routed frames is enabled
Option or disabled.
Forward IP Whether the forwarding of IP broadcasts is enabled or
Broadcasts disabled.
Orphaned Route The setting for the orphaned route timer.
Timer
Record Route Whether the processing with a record-route option is
Option enabled or disabled.
Table 3-6 Field Descriptions for the show ip config Command (continued)
Field Description
Multiple Equal The setting for the equal-cost multipath selection
Cost Path algorithm. The possible settings are:
Algorithm
• Address, choose among alternate paths based on IP
addresses
• roundrobin, alternate between equal paths in
roundrobin fashion
IP Route Change Whether the logging of IP route changes is enabled or
Logging disabled.
Showing IP Interfaces
Use the show ip interfaces command to display configured IP interfaces on the
CSS. The display includes the circuit state, IP address, broadcast address, Internet
Control Message Protocol (ICMP) settings, and Router Discovery Program (RDP)
settings.
Table 3-7 describes the fields in the show ip interfaces output.
Field Description
Circuit Name The name of the circuit associated with the IP interface.
State The state of the IP interface. The possible states are:
• active (1), the interface is up
• disabled (2), the interface is disabled
• noCircuit (3), the interface is waiting for an underlying
circuit
IP Address The IP address assigned to the circuit.
Network Mask The network mask of the circuit.
Table 3-7 Field Descriptions for the show ip interfaces Command (continued)
Field Description
Broadcast Address The broadcast IP address associated with the IP interface.
If left at zero, the all-ones host is used for numbered
interfaces. 255.255.255.255 is always used for
unnumbered interfaces.
Redundancy Indicates whether the redundancy protocol is running on
the interface. The default state is disable.
ICMP Redirect Whether the transmission of Internet Control Message
Protocol (ICMP) redirect messages is enabled or disabled.
The default state is Enabled.
ICMP Unreachable Whether the transmission of ICMP “destination
unreachable” messages is enabled or disabled. The default
state is Enabled.
RIP Whether the RIP is enabled or disabled.
Showing IP Routes
Use the show ip routes command to display IP routing information. The syntax
and options for this command are:
• show ip routes - Display the entire routing table, including host IP address,
next hop, interface, route type, protocol, age (in seconds), and metric
• show ip routes firewall - Display all firewall routes
• show ip routes local - Display all local routes
• show ip routes ospf - Display all OSPF routes
• show ip routes rip - Display all RIP routes
• show ip routes static - Display all static routes
• show ip routes ip_address or host {to ip_address or host|mask or prefix} -
Display information about a route to a destination, a specific route, or routes
in a range
Field Description
prefix/length The IP address and prefix length for the route.
next hop The IP address for the next hop.
if The ifIndex value that identifies the local interface through
which the next hop of this route should be reached.
type The type of the route entry. The possible types are:
• local, local interface
• remote, remote destination
• mgmt, management interface
proto The protocol for the route.
age The maximum age for the route.
metric The metric cost for the route.
Showing IP Statistics
Use the show ip statistics command to display aggregate TCP statistics for the
unit. Table 3-9 describes the fields in the show ip statistics output.
Field Description
UDP Statistics:
Input Datagrams: The total number of UDP datagrams delivered to UDP
users.
No Port Errors: The total number of received UDP datagrams for
which there was no application at the destination port.
Output Datagrams: The total number of UDP datagrams sent from the
CSS.
Input Errors: The number of received UDP datagrams that could not
be delivered for reasons other than the lack of an
application at the destination port.
TCP Statistics:
Retransmit The algorithm used to determine the timeout value for
Algorithm: retransmitting unacknowledged octets.
Max Retransmit The maximum value permitted by a TCP
Time: implementation for the retransmission timeout,
measured in milliseconds.
Active Opens: The number of times TCP connections have made a
direct transition to the SYN-SENT state from the
CLOSED state.
Failed Attempts: The number of times TCP connections have made a
direct transition to the CLOSED state from either the
SYN-SENT state or the SYN-RCVD state, plus the
number of times TCP connections have made a direct
transition to the LISTEN state from the SYN-RCVD
state.
Established Conns: The number of TCP connections for which the current
state is either ESTABLISHED or CLOSE-WAIT.
Table 3-9 Field Descriptions for the show ip statistics Command (continued)
Field Description
Output Segments: The total number of segments sent, including those on
current connections but excluding those containing
only retransmitted octets.
Input Errors: The total number of segments received in error (for
example, bad TCP checksums).
Min Retransmit The minimum value permitted by a TCP
Time: implementation for the retransmission timeout,
measured in milliseconds.
Max TCP The limit on the total number of TCP connections the
Connections: CSS can support.
Passive Opens: The number of times TCP connections have made a
direct transition to the SYN-RCVD state from the
LISTEN state.
Resets: The number of times TCP connections have made a
direct transition to the CLOSED state from either the
ESTABLISHED state or the CLOSE-WAIT state.
Input Segments: The total number of segments received, including
those received in error. This count includes segments
received on currently established connections.
Retransmit The total number of segments retransmitted--that is,
Segments: the number of TCP segments transmitted containing
one or more previously transmitted octets.
Output Resets: The number of TCP segments sent containing the RST
flag.
ICMP Statistics:
Echo Requests In: The number of received ICMP Echo (request)
messages.
VIP Echo The sending Echo request count for the VIP.
Requests:
Unreachable: The number of received ICMP Destination
Unreachable messages.
Redirect: The number of received ICMP Redirect messages.
Table 3-9 Field Descriptions for the show ip statistics Command (continued)
Field Description
Router Solicit: The number of received ICMP router solicitation
packets.
Param Problem: The number of received ICMP Parameter Problem
messages.
Timestamp Reply: The number of sent ICMP Timestamp Reply
messages.
Information Reply: The number of received ICMP reply packets.
Mask Reply: The number of received ICMP Address Mask Reply
messages.
Echo Replies In: The number of received ICMP Echo reply messages.
VIP Echo Replies: The sending Echo replies in response to echoes for the
VIP.
Source Quench: The number of received ICMP Source Quench
messages.
Router Adv: The number of received ICMP router advertisement
packets.
Time Exceeded: The number of received ICMP Time Exceeded
messages.
Timestamp: The number of sent ICMP Timestamp (request)
messages.
Information The number of received ICMP information request
Request: packets.
Mask Request: The number of sent ICMP Address Mask Request
messages.
Invalid: The number of received bad ICMP type packets.
ARP Statistics:
Requests In: The number of received ARP request packets.
Requests Out: The sending ARP request packet count.
Table 3-9 Field Descriptions for the show ip statistics Command (continued)
Field Description
Duplicate Addr: The number of received ARP packets with duplicate
IP address detected count. This can be the local IP
address, VIP, or virtual interface
Invalid: The number of invalid or bad ARP packets.
Replies In: The number of received ARP reply packets.
Replies Out: The sending ARP reply packet count.
In Off Subnet: The number of received ARP packets with sender or
target addresses outside of the subnet range of the
receiving interface.
Unresolved: The number of processed IP frames with unresolved
next hop MAC addresses.
Showing IP Summary
Use the show ip summary command to display a summary of IP global statistics.
The statistics include data on reachable and total routes, reachable and total hosts,
memory in use for each, and total IP routing memory in use.
Table 3-10 describes the fields in the show ip summary output.
Field Description
Reachable Routes The current number of reachable routes.
Total Routes The current number of routes maintained, both reachable
and unreachable.
Reachable Hosts The current number of reachable host entries.
Total Hosts The current number of host entries, both reachable and
unreachable.
Total Memory in The total amount of memory in bytes allocated for the IP
use - IP Routing routing table. When there are no additional free entries in
Memory Pool the memory pool, more memory is allocated to the pool.
Note Make sure that bridge maximum age is less than or equal to 2 x
(bridge forward-time - 1 second) and greater than or equal to 2 x
(bridge hello-time + 1 second).
Note Make sure that bridge maximum age is greater than or equal to 2 x
(bridge hello-time + 1 second) and less than or equal to 2 x (bridge
forward-time - 1 second).
Note When spanning-tree is disabled, the CSS drops Bridge Protocol Data
Units (BPDUs).
Table 3-11 Field Descriptions for the show bridge forwarding Command
Field Description
VLAN The bridge interface virtual LAN number
MAC Address The MAC address for the entries
Port Number The port number for the forwarding
To display bridge status information, use the show bridge status command.
Table 3-12 describes the fields in the show bridge status output.
Table 3-12 Field Descriptions for the show bridge status Command
Field Description
STP State The state of the spanning-tree protocol, enabled or disabled.
Root Max Age The timeout period in seconds of the host for timing out root
information.
Root Hello Time The interval in seconds that the root broadcasts its hello
message to other devices.
Root Fwd Delay The delay time in seconds that the root uses for forward
delay.
Designated Root The bridge ID for the designated root.
Bridge ID The bridge ID of this bridge.
Port The port ID.
Table 3-12 Field Descriptions for the show bridge status Command (continued)
Field Description
State The state of the port. The possible states are:
• Block, the blocking state. A port enters the blocking
state after switch initialization. The port does not
participate in frame forwarding.
• Listen, the listening state. This state is the first
transitional state a port enters after the blocking state.
The port enters this state when STP determines that the
port should participate in frame forwarding.
• Learn, the learning state. The port enters the learning
state from the listening state. The port in the learning
state prepares to participate in frame forwarding.
• Forward, the forwarding state. The port enters the
forwarding state from the learning state. A port in the
forwarding state forwards frames.
• Disabled, the disabled state. A port in the disabled state
does not participate in frame forwarding or STP. A port
in the disabled state is non operational.
Designated Bridge The bridge ID for the designated bridge.
Designated Root The bridge ID for the designated root.
Root Cost The cost of the root.
Port Cost The cost of the port.
Desg Port Designated port.
Note This feature requires an SSHD Server License, which enables SSHD
functionality on both the Standard and Enhanced versions of CSS
software.
For more information on these options and associated variables, refer to the
following sections:
• Configuring SSHD Keepalive
• Configuring SSHD Port
• Configuring SSHD Server-Keybits
• Disabling and Enabling Telnet Access when using SSHD
Table 3-13 Field Descriptions for the show sshd config Command
Field Description
Keepalive Setting Whether or not SSHD keepalive is enabled. SSHD
keepalive is enabled by default.
No. of Server Key Bits The number of bits in the server key. The default is
768. The range is from 512 to 65535.
Listen Port No. The port number that the server listens to connections
from clients. The default is 22. The range is from 22 to
65535.
Telnet Disallowed Whether or not Telnet access to the CSS is allowed.
Telnet access is enabled by default.
Using opportunistic Layer 3 forwarding, the CSS inspects the IP packet header to
determine the destination IP address. Instead of forwarding the packet to Router1,
the CSS forwards the packet directly to end station B. Because the CSS only
handles the packet once, the router and uplink are not used and network resources
are conserved.
Internet
Router1
(default)
Subnet
CSS
VLAN1 VLAN2
49383
When you configure ip opportunistic all, you can use the ip route
originated-packets command to configure routes that the CSS will use to reach
devices, but will not use as opportunistic routes for forwarding traffic. Routes
created using the ip route originated-packets command apply only to packets
that originate on the CSS. Packets and flows forwarded by the CSS will not use
these routes.
For example,
(config)# ip route 0.0.0.0/0 192.168.1.7 originated-packets
Where to Go Next
For information on configuring circuits and interfaces, refer to Chapter 4,
Configuring Interfaces and Circuits.
This chapter describes how to configure the CSS interfaces and circuits, and
bridge interfaces to VLANs. Information in this chapter applies to all CSS models
except where noted.
This chapter contains the following sections:
• Interface and Circuit Overview
• Configuring Interfaces
• Configuring Circuits
• Configuring a Circuit IP Interface
• Configuring RIP for an IP Interface
Using the trunk command, you can assign multiple VLANs to a CSS interface
port (Gigabit Ethernet ports only). A trunk is a point-to-point link carrying the
traffic of several VLANs (as illustrated in Figure 4-2). The advantage of a trunk is to
save ports when creating a link between two devices implementing VLANs, typically
two switches. A trunk bundles virtual links over one physical link. The unique
physical link between the two CSSs is able to carry traffic for the specified VLANs.
Note The trunk and vlan commands (and the associated software
functionality) comply with the IEEE 802.1Q Standard for Local and
Metropolitan Area Networks: Virtual Bridged Local Area Networks.
The CSS forwards VLAN circuit traffic to the IP interface. The IP interface passes
the traffic to the IP forwarding function where the CSS compares the destination
of each packet to information contained in the routing table. Once the CSS
resolves the packet addresses, it forwards the packet to the appropriate VLAN and
destination port.
When trunking is enabled, the CSS automatically inserts a tag in every frame
transmitted over the trunk link to identify the originating VLAN. When the
VLAN-aware device receives the frame the device reviews the VLAN-tagged
packet to identify the transmitting VLAN. If the VLAN is recognized, the frame is
routed to the proper port and VLAN destination. If the frame is from a VLAN that is
not assigned to the trunk port, the packet is ignored. By default, the CSS discards
untagged packets.
Note that on an 802.1Q trunk, you may configure one VLAN (using the optional
default-vlan command) to:
• Accept packets that arrive untagged on the interface
• Transmit untagged packets
By this method, the CSS can determine which VLAN transmitted an untagged
frame. This capability allows VLAN-aware devices and VLAN-unaware devices
to transmit and receive information on the same cable.
Figure 4-1 illustrates the interfaces, circuits, and VLANs in a CSS and Figure 4-2
illustrates trunking between VLANs.
VLAN1
Interface Port e1
Circuit Bridging Interface Port e2
IP Interface Domain Interface Port e3
for VLAN 1 vlan 1 Interface Port e4
10.3.6.58
VLAN2
Interface Port e5
Circuit Bridging Interface Port e7
IP Forwarding
IP Interface Domain Interface Port e9
(Layer 3)
for VLAN 2 vlan 2 Interface Port e11
10.3.6.59
VLAN3
Interface Port e6
Circuit Bridging Interface Port e8
IP Interface Domain Interface Port e10
for VLAN 3 vlan 3 Interface Port e12
49384
10.3.6.60
VLAN1 VLAN1
Trunk
51593
Configuring Interfaces
Interfaces are ports that enable you to connect devices to the CSS and connect the
CSS to the Internet. The commands to configure interfaces on the CSS 11050 and
CSS 11150 differ slightly from the commands to configure interfaces on the
CSS 11800 because the CSS 11800 requires a slot/port designation. The CSS
11050 and CSS 11150 do not use the slot/port designation.
Configuring an interface requires you to:
• Configure an interface and enter into the interface mode
• Add a description of the interface (optional)
• Configure an interface duplex and speed
• Set the maximum idle time for the interface
• Bridge the interface to a VLAN, or specify VLAN trunking to the interface
• Configure the low water mark of flow control blocks (optional)
• Smoothing bursty network traffic on the CSS 11800 Gigabit Ethernet Module
(optional)
Configuring an Interface
To configure an interface, enter the interface command and a valid interface
name. To use the interface command for a:
• CSS 11050 or CSS 11150, enter the interface name in interface port format
(for example, e2)
• CSS 11800, enter the interface format in slot/port format (for example, 3/1)
The CSS changes from config mode to the specific interface mode.
(config-if[e1])#
For Gigabit Ethernet modules (GEM), if the link does not come up and you need
to force the module and its link partner into a specific mode, you can set the
duplex and flow control (pause) method. The pause methods of communications
between modules determines how the module sends pause frames. The module
sends pause frames when it becomes overwhelmed with data. The CSS module
and its link partner must be configured with the same pause method.
Use the phy command to manually configure the interface (port) duplex and
speed to one of the following settings:
• phy 10Mbits-FD - Set the FEM port to 10 Mbits per second and full-duplex.
• phy 10Mbits-HD - Set the FEM port to 10 Mbits per second and half-duplex.
• phy 100Mbits-FD - Set the FEM port to 100 Mbits per second and
full-duplex.
• phy 100Mbits-HD - Set the FEM port to 100 Mbits per second and
half-duplex.
• phy auto-negotiate - Resets the FEM or GEM port to automatically negotiate
speed or pause method, respectively, and duplex (default).
• phy 1Gbits-FD-asym - Set the GEM port to full duplex mode with
asymmetric pause toward the link partner.
• phy 1Gbits-FD-no pause - Set the GEM port to full duplex mode with no
pause.
• phy 1Gbits-FD-sym - Set the GEM port to full duplex mode with symmetric
pause.
• phy 1Gbits-FD-sym-asym - Set the GEM port to full duplex mode with
asymmetric and symmetric pause toward the local device.
For example, to set interface e1 to 100 Mbps and half-duplex, enter:
(config-if[e1])# phy 100Mbits-HD
To reset the idle time for an interface to its default value of 0, enter:
(config-if[e7])# no max-idle
To show duplex and speed value for a specific interface, enter the show phy
command and the interface name. For example:
(config)# show phy e3
Field Description
Name The name of the physical interface.
Configured Speed The configured speed for the Ethernet interface (port) in
the CSS. Auto indicates that the speed is automatically
negotiated.
Table 4-2 Field Descriptions for the show phy Command (continued)
Field Description
Configured Duplex The configured duplex for the Ethernet interface (port) in
the CSS. Auto indicates that the duplex is automatically
negotiated.
Actual Speed The actual speed for the Ethernet interface (port) in the
CSS.
Actual Duplex The configure duplex for the Ethernet interface (port) in
the CSS.
Link The link status, up or down.
Rev Revision number of the chip.
Partner Auto Whether or not auto-negotiation is available on the link
partner.
Note The CSS 11050 and CSS 11150 both support a maximum of 16
VLANs. The CSS 11800 supports a maximum of 128 VLANs.
Note When you enter the bridge vlan command, enter the word vlan in
lowercase letters and include a space before the VLAN number (for
example, vlan 2).
To display all interfaces and the VLANs to which they are configured, enter the
show circuit command. Refer to “Showing Circuits” in this chapter for
information about the show circuits command.
In the show circuit display, VLANs appear as VLAN (uppercase, with no space
before the VLAN number).
Note The CSS 11050 and CSS 11150 both support a maximum of 16
VLANs. The CSS 11800 supports a maximum of 128 VLANs.
Note The CSS software has a dependency when using the trunk
command. For trunking to be enabled, all VLAN bridging
commands for any active VLAN must first be disabled for the
Gigabit Interface by using the no bridge vlan, no bridge priority,
no bridge state, and no bridge pathcost commands. If you do not
disable VLAN bridging on an interface, the CSS software instructs
you to do so.
Note When you enter the trunk command, enter the word vlan in
lowercase letters and include a space before the VLAN number (for
example, vlan 2).
For example, to configure gigabit ethernet port 1 in slot 1 for use in VLAN2,
VLAN3, and VLAN9, enter:
CSS11800(config-if[1/1])# trunk
CSS11800(config-if[1/1])# vlan 2
Create VLAN<2>, [y/n]:y
CSS11800(config-if-vlan[1/1-2])# vlan 3
Create VLAN<3>, [y/n]:y
CSS11800(config-if-vlan[1/1-3])# vlan 9
Create VLAN<9>, [y/n]:y
CSS11800(config-if-vlan[1/1-9])#
Every time you enter a vlan command for a new VLAN, the software
automatically prompts you to create the specified VLAN (where y instructs the
software to create the VLAN and n cancels the VLAN creation).
To disable trunking on the specified Gigabit Interface and associated VLANs,
enter:
(config-trunkif[2/3])# no trunk
The no trunk command turns off all trunking, removes all specified vlan
commands associated with the interface, and deletes this information from the
running configuration. The interface is returned to VLAN1 by default.
To display all interfaces and the VLANs to which they are configured, enter the
show circuit command. Refer to Table 4-9 for information about the show
circuits command.
To disable the bridge state for slot 1, port 1, located in VLAN3, enter:
CSS11800(config-if-vlan[1/1-3])# bridge state disable
Table 4-3 Field Descriptions for the show bridge forwarding Command
Field Description
VLAN The bridge interface virtual LAN number
MAC Address The MAC address for the entries
Port Number The port number for the forwarding
To display bridge status information, use the show bridge status command.
Table 4-4 describes the fields in the show bridge status output.
Table 4-4 Field Descriptions for the show bridge status Command
Field Description
STP State The state of the spanning-tree protocol, enabled or disabled.
Root Max Age The timeout period in seconds of the host for timing out root
information.
Root Hello Time The interval in seconds that the root broadcasts its hello
message to other switches.
Root Fwd Delay The delay time in seconds that the root uses for forward
delay.
Designated Root The bridge ID for the designated root.
Bridge ID The bridge ID of this bridge.
Port The port ID.
State The state of the port. The possible states are:
• Block, the blocking state. A port enters the blocking
state after switch initialization. The port does not
participate in frame forwarding.
• Listen, the listening state. This state is the first
transitional state a port enters after the blocking state.
The port enters this state when STP determines that the
port should participate in frame forwarding.
• Learn, the learning state. The port enters the learning
state from the listening state. The port in the learning
state prepares to participate in frame forwarding.
• Forward, the forwarding state. The port enters the
forwarding state from the learning state. A port in the
forwarding state forwards frames.
• Disabled, the disabled state. A port in the disabled state
does not participate in frame forwarding or STP. A port
in the disabled state is non operational.
Designated Bridge The bridge ID for the designated bridge.
Designated Root The bridge ID for the designated root.
Table 4-4 Field Descriptions for the show bridge status Command (continued)
Field Description
Root Cost The cost of the root.
Port Cost The cost of the port.
Desg Port Designated port.
Field Description
Port The CSS port
VLAN The VLAN on the port
Default The configured default VLAN on the port (if there is not
a configured default VLAN, “None” appears in this
field)
Showing Interfaces
To display a list of valid interfaces for the CSS, use the show interface command.
For example:
(config)# show interface
To only display information for a specific interface, enter the show interface
command and the interface name.
(config)# show interface e7
Field Description
Name The name of the interface.
ifIndex The ifIndex for the interface.
Type The type of interface. The possible types include:
• fe - Fast Ethernet interface
• ge - Gigabit Ethernet interface
• console - console interface
Oper Operational state, up or down.
Admin Administration state, up or down.
Last Change The date of the last state change.
Field Description
MAC The interface's address at the protocol layer immediately
below the network layer in the protocol stack. For interfaces
that do not have such an address (for example, a serial line),
this object should contain an octet string of zero length.
Administrative The desired state of the interface (Enabled, Disabled, or
Testing). The testing state indicates that no operational
packets can be passed.
MTU The size of the largest datagram that can be sent or received
on the interface, specified in octets. For interfaces that are
used for transmitting network datagrams, this is the size of
the largest network datagram that can be sent on the interface.
In Octets The total number of octets received on the interface,
including framing characters.
In Unicast The number of subnetwork-unicast packets delivered to a
higher-layer protocol.
In Multicast The number of non-unicast (for example,
subnetwork-broadcast or subnetwork-multicast) packets
delivered to a higher-layer protocol.
In Errors The number of inbound packets that contained errors
preventing them from being deliverable to a higher-layer
protocol.
In Discards The number of inbound packets that were chosen to be
discarded even though no errors had been detected to prevent
their being deliverable to a higher-layer protocol. One
possible reason for discarding such a packet could be to free
up buffer space.
In Unknown The number of packets received over the interface that were
discarded because of an unknown or unsupported protocol.
Last Change The value of sysUpTime at the time the interface entered its
current operational state. If the state has not changed since
the time the CSS came up, the sysUptime is when the port
was initialized.
Table 4-7 Field Descriptions for the show mibii Command (continued)
Field Description
Operational The current operational state of the interface (Up, Down, or
Testing). The Testing state indicates that no operational
packets can be passed.
Speed An estimate of the interface's current bandwidth in bits per
second. For interfaces that do not vary in bandwidth or for
those where no accurate estimation can be made, this object
should contain the nominal bandwidth.
Queue Len The length of the output packet queue (in packets).
Out Octets The total number of octets transmitted out of the interface,
including framing characters.
Out Unicast The total number of packets that higher-level protocols
requested be transmitted to a subnetwork-unicast address,
including those that were discarded or not sent.
Out Multicast The total number of packets that higher-level protocols
requested be transmitted to a non-unicast (for example., a
subnetwork-broadcast or subnetwork-multicast) address,
including those that were discarded or not sent.
Out Errors The number of outbound packets that could not be
transmitted because of errors.
Out Discards The number of outbound packets that were chosen to be
discarded even though no errors had been detected to prevent
their being transmitted. One possible reason for discarding
such a packet could be to free up buffer space.
To clear interface statistics, use the clear statistics command in SuperUser mode.
For example:
# clear statistics
Field Description
Alignment The number of frames with alignment errors (frames that
do not end with a whole number of octets and have a bad
CRC) received on the interface.
FCS The number of frames received on the interface that are an
integral number of octets in length but do not pass the FCS
check.
Table 4-8 Field Descriptions for the show ether-errors Command (continued)
Field Description
Single Collision The number of successfully transmitted frames on the
interface for which transmission is inhibited by exactly one
collision.
Multiple The number of successfully transmitted frames on the
Collisions interface for which transmission is inhibited by more than
one collision.
SQE Test The number of times that the SQE TEST ERROR message
is generated.
Deferred Tx The number of frames for which the first transmission
attempt on the interface is delayed because the medium is
busy.
The count represented by an instance of this object does not
include frames involved in collisions.
Internal RX Errors The number of frames for which reception on the interface
fails due to an internal MAC sublayer receive error.
Frame too Long The number of frames received on the interface that exceed
the maximum permitted frame size.
Carrier Sense The number of times that the carrier sense condition was
Errors lost or never asserted when attempting to transmit a frame
on the interface.
Internal Tx Errors The number of frames for which transmission on the
interface fails due to an internal MAC sublayer transmit
error.
Excessive The number of frames for which transmission on the
Collisions interface fails due to excessive collisions.
Late Collisions The number of times that a collision is detected on the
interface later than 512 bit-times into the transmission of a
packet.
Configuring Circuits
A circuit on the CSS is a logical entity that maps IP interfaces to a logical port or
group of logical ports (for example, a VLAN). Each VLAN circuit requires an IP
address. Assigning an IP address to each VLAN circuit allows the CSS to route
Ethernet interfaces from VLAN to VLAN.
To enter a specific circuit configuration mode, enter the circuit command and
VLAN as shown in the following example:
(config)# circuit VLAN7
(config-circuit[VLAN7])#
Note When you use the circuit command, enter the word ‘VLAN’ in
uppercase letters and do not include a space between VLAN and the
VLAN number (for example, VLAN7).
Note The CSS allows you to enable router discovery and define a router
discovery preference for each interface. To enable router discovery
and define a preference per interface, refer to the sections “Enabling
Router-Discovery” and “Configuring Router-Discovery
Preference”, respectively, later in this chapter.
To reset the minimum router advertisement interval to the default of 0.75 x the
maximum advertisement value, enter:
(config-circuit[VLAN7])# no router-discovery
min-advertisement-interval
Showing Circuits
To show circuit information, use the show circuits command. A circuit on the
CSS is a logical entity that maps IP interfaces to a logical port or group of logical
ports.
To list all circuits and their interfaces regardless of their state, enter:
# show circuits all
Field Description
Circuit Name The circuit name. Note that in the show circuit output, VLANs
appear as VLAN (uppercase, with no space before the VLAN
number).
Circuit State The state of the circuit. The possible states are:
• active-ipEnabled
• down-ipEnabled
• active-ipDisabled
• down-ipDisabled
IP Address IP interface address.
Interface(s) The interface associated with the circuit.
Operational The operational status of the interface. The possible states are:
Status
• Up
• Down
Note When you use the circuit command, enter the word ‘VLAN’ in
uppercase letters and do not include a space between VLAN and the
VLAN number (for example, VLAN7).
To remove a local IP address from a circuit, enter the following command from
the circuit mode:
(config-circuit[VLAN7])# no ip address
To reset the broadcast IP address to the default all-ones host address, enter:
(config-circuit[VLAN7-173.3.6.58])# no broadcast
Enabling Router-Discovery
To enable router discovery for an interface, use the router-discovery command.
When enabled, router discovery transmits packets with a multicast address of
244.0.0.1. To enable an interface to transmit packets with a multicast address of
255.255.255.255, use the router-discovery limited-broadcast command in
circuit mode (see “Configuring Router-Discovery Limited-Broadcast”, earlier in
this chapter). Router discovery is disabled by default.
For example:
(config-circuit-ip[VLAN7-192.168.1.58])# router-discovery
Enabling a Circuit IP
To enable the IP interface on a circuit, use the enable command. The default is
enable.
For example:
(config-circuit-ip[VLAN7-173.3.6.58])# enable
Disabling a Circuit IP
To disable the IP interfaces on a circuit, enter:
(config-circuit-ip[VLAN7-173.3.6.58])# no enable
Showing IP Interfaces
Use the show ip interfaces command to display configured IP interfaces on the
CSS. The display includes the circuit state, IP address, broadcast address, Internet
Control Message Protocol (ICMP) settings, and Router Discovery Program (RDP)
settings.
Field Description
Circuit Name The name of the circuit associated with the IP interface.
State The state of the IP interface. The possible states are:
• active (1), the interface is up
• disabled (2), the interface is disabled
• noCircuit (3), the interface is waiting for an underlying
circuit
IP Address The IP address assigned to the circuit.
Network Mask The network mask of the circuit.
Broadcast Address The broadcast IP address associated with the IP interface.
If left at zero, the all-ones host is used for numbered
interfaces. 255.255.255.255 is always used for
unnumbered interfaces.
Redundancy Indicates whether or not the redundancy protocol is
running on the interface. The default state is disable.
ICMP Redirect Whether the transmission of Internet Control Message
Protocol (ICMP) redirect messages is enabled or disabled.
The default state is Enabled.
ICMP Unreachable Whether the transmission of ICMP “destination
unreachable” messages is enabled or disabled. The default
state is enabled.
RIP Whether the RIP is enabled or disabled.
Field Description
IP Address The advertised RIP interface address.
State The operational state of the RIP interface.
RIP Send The RIP version that the interface sends. The possible field
values are:
• none, do not send RIP packets
• RIPv1, send RIP version 1 packets only
• RIPv2, send RIP version 2 packets only (default)
RIP Recv The RIP version that the interface receives. The possible
values are:
• both, receiving both version 1 and version 2 (default)
• none, receiving no RIP packets
• Ripv1, receiving RIP version 1 packets only
• Ripv2, receiving RIP version 2 packets only
Default Metric The default metric used when advertising the RIP interface.
Tx Log The setting for the logging of RIP packet transmissions
(enabled or disabled). The default setting is disabled.
Rx Log The setting for the logging of RIP packet received (enabled
or disabled). The default setting is disabled.
Table 4-12 describes the fields in the show rip globals output.
Table 4-12 Field Descriptions for the show rip globals Command
Field Description
RIP Route Changes The global number of route changes made to the IP
route database by RIP
RIP Query Responses The global number of query responses sent to RIP
query from other systems
To display the RIP interface statistics for all RIP interface entries, enter:
# show rip statistics
Table 4-13 describes the fields in the show rip statistics output.
Table 4-13 Field Descriptions for the show rip statistics Command
Field Description
System Route Changes The global number of route changes made to the IP
route database by RIP
System Global Query The global number of query responses sent to RIP
Responses query from other systems
IP Address The RIP interface IP address
Triggered Updates Sent The number of triggered RIP updates sent by the
interface
Bad Packets Received The number of bad RIP response packets received
by the interface
Bad Routes Received The number of bad routes in valid RIP packets
received by the interface
Where to Go Next
For information on creating and configuring services, refer to Chapter 5,
Configuring Services.
This chapter describes how to configure services. This chapter also contains an
overview on the association between services, owners, and content rules.
Information in this chapter applies to all CSS models except where noted.
This chapter contains the following sections:
• Service, Owner, and Content Rule Overview
• Service Load Overview
• Configuring Load for Services
• Global Keepalive Mode
• Script Keepalives
• Script Keepalives and Upgrading WebNS Software
• Configuring Services
• Showing Service Configurations
49385
Note Redirect services have load numbers associated with them, but the
load numbers are either 2 (available) or 255 (unavailable).
Figure 5-2 shows servers A, B, and C with response times of 100 ms, 1100 ms,
and 120 ms, respectively. One group of servers has load step configured to 10 ms.
The second group of servers has load step configured to 100 ms.
serverA 100 ms
serverB 1100 ms
serverC 120 ms
255 255
254 254
102
serverC 4 serverB 12
For the servers set to the 10 ms load step, the difference in response time between:
• ServerA and serverB is 1000 ms. Because this value is greater than the
configured load step of 10 ms, the CSS considers the server loads different.
• ServerA and serverC is 20 ms. Because this value is greater than the
configured load step of 10 ms, the CSS considers the server loads different.
For the servers set to 100 ms load step, the difference in response time between:
• ServerA and serverB is 1000 ms. Because this value is greater than the
configured load step of 100 ms, the CSS considers the server loads different.
• ServerA and serverC is 20 ms. Because this value is less than the configured
load step of 100 ms, the CSS considers servers A and C to have the same load.
Increasing the load step causes the load for servers to be closer to each other.
Decreasing the load step causes the load for servers to be further from each other.
To enable you to configure an accurate load threshold for a server, you can
calculate a load number for a server. To calculate a server load number:
1. Take the difference between the server with the lowest response time and the
server for which you want to determine a load number.
2. Divide the difference by the configured load step.
3. Add this number to the calculated load step of the server with the lowest
response time, which is always 2.
For example, to calculate the load number for serverC with the 10 ms load step:
1. Take the difference in server response time between serverA and serverC
(20 ms).
2. Divide it by the configured load step (10 ms). The result equals 2.
3. Add 2 to serverA’s (server with lowest response time) calculated load (2) to
determine serverC’s calculated load of 4.
The options and syntax for this global configuration mode command are:
• load step msec dynamic (default) - Set the initial load step. The CSS uses the
default of 10 ms as the initial load step, modifying it after the CSS collects
sufficient response time information.
• load step msec static - Set a constant load step. The CSS uses this load step
value instead of making dynamic calculations. The default is 10 ms.
Enter the load step in milliseconds from 10 to 1000000000. The default is 10 ms.
For example, to set the load step to 100 ms, enter:
(config)# load step 100
Note If you do not configure a load threshold for the content rule with the
(config-owner-content) load-threshold command, the rule inherits
this global load threshold.
Enter the teardown timer as the number of seconds between teardown reports.
enter an integer from 0 to 1000000000. The default is 20. The value of 0 disables
the timer. For example, to set the teardown timer to 120 seconds, enter:
(config)# load teardown-timer 120
Field Description
Global load The configured state of load reporting (enabled or
information disabled). Reporting is disabled by default.
Step Size The configured method in which the load step size is
calculated:
• Dynamic indicates that the CSS calculates the step
size.
• Static indicates that the configured step size is
used.
Configured The configured load step. The value is the difference in
milliseconds between load numbers. If the step size
method is dynamic, this is the initial load step. The
CSS modifies the value after it collects sufficient
response time information from the services.
Actual The actual load step. The value is the difference in
milliseconds between load numbers. If the step size
method is configured, the actual value will be the same
as the Configured field.
Threshold The configured global load number that the CSS uses
to determine if a service is eligible to receive flows.
The default is 254 with a range of 2 to 254.
Table 5-2 Field Descriptions for the show load Command (continued)
Field Description
Ageout-Timer The configured time interval in seconds in which stale
load information for a service is aged out. When the
ageout timer interval expires, the CSS erases the
information and resets the service load to 2. The
default is 60 with a range of an integer from 0 to
1000000000. The value of 0 disables the timer.
Teardown-timer The maximum time between teardown reports. The
default is 20 with a range from 0 to 1000000000. The
value of 0 disables the timer.
Configured The configured maximum time between teardown
reports. The default is 20 with a range from 0 to
1000000000. The value of 0 disables the timer.
Actual The actual time between teardown reports.
Service Name The name of the service.
Average Load Number The average load number for the service.
Caution Do not configure more than 256 keepalives of one type. Do not
configure more than 512 total keepalives. Any services assigned to
keepalives over 512 will not be eligible for content rule selection.
• type tcp - A TCP session that determines service viability (3-way handshake
and reset (RST)).
For example, to set the global keepalive keepimages to type tcp, enter:
(config-keepalive[keepimages])# type tcp
To clear the content information for the URI assigned to this keepalive, enter:
(config-keepalive[keepimages])# no uri
3. Display the hash value using the show keepalive command. For example:
(config-keepalive[keepimages])# show keepalive
Keepalives:
Name: imageserver1
Index: 0 State: ALIVE
Description: Auto generated for service serv1
Address: 10.0.3.21 Port:80
Type: HTTP GET:/testpage.html
Hash: 1024b91e516637aaf9ffca21b4b05b8c
Frequency: 5
Max Failures: 3
Retry Frequency: 5
Dependent Services:
4. Use the hash value from the keepalive display to configure the keepalive
hash. Enter the MD5 hash value as a quoted hexadecimal string up to
32 characters. For example:
(config-keepalive[keepimages])# hash
"1024b91e516637aaf9ffca21b4b05b8c"
To clear a hash value and return to the default hash value, enter:
(config-keepalive[keepimages])# no hash
For example:
(config)# show keepalive
Keepalives:
Keepalives:
Alive1 DOWN 192.25.1.7
Alive2 ALIVE 192.25.1.8
Field Description
Name The name of the keepalive.
Index The CSS assigned unique index value for each keepalive.
State The state of the keepalive. The possible states are down, alive,
dying, and suspended.
Description The description for the keepalive.
Address The IP address where the keepalive messages are sent.
Port The port number for the keepalive.
Type The type of keepalive message assigned to the keepalive. The
possible types are FTP, HTTP, ICMP, script, TCP, or named.
Frequency The time in seconds between sending keepalive messages to the
IP address. The default is 5. The range is from 2 to 255.
Max Failures The configured number of times the IP address can fail to
respond to a keepalive message before being considered down.
The default is 3. The range is from 1 to 10.
Retry The retry period in seconds to send messages to the keepalive
Frequency IP address. The default is 5. The range is from 2 to 255.
Dependent Services currently configured to use the keepalive. This is
Services mainly used for named keepalive types.
Script Keepalives
Script keepalives are scripts that you can create to provide custom keepalives for
your specific service requirements. To create the scripts, use the rich CSS
Scripting Language that is included in your CSS software. For details on using the
CSS Scripting Language, including using socket commands and examples of
keepalive scripts, refer to the Content Services Switch Advanced Configuration
Guide.
Currently, a CSS provides keepalives for FTP, HTTP, ICMP, and TCP. For
information on global keepalives, refer to “Global Keepalive Mode” earlier in this
chapter. For information on configuring keepalive messages, refer to
“Configuring Keepalives for a Service” earlier in this chapter.
Using script keepalives allow you to extend the CSS keepalive functionality
beyond the default keepalives. For example, you can develop a script specifically
to connect a CSS to a Post Office Protocol 3 (POP3) mail server.
Once you create a script offline, you can upload it to the CSS and configure the
script keepalive option on a service.
The CSS supports a maximum of 255 script keepalives (out of a maximum of 512
keepalive types). If you specify a script to parse the output for each executed
command, you can configure only 16 keepalives that use script output.
Note You can also configure a script keepalive without having the
corresponding script present on the CSS. In this case, a constant
Down state remains on the service until you upload the appropriate
script to the CSS. This allows you to develop and implement a
configuration before uploading all the scripts to the CSS.
Because a CSS reads an entire script into memory, there is a maximum script
keepalive size of 200 KB (approximately 6,000 lines). If a script exceeds this
limit, it will not load. This should be more than adequate for all applications. For
example, the script keepalives included with your CSS software are
approximately 1 KB. To further conserve CSS memory, services can share a
common script keepalive so that only one instance of the script needs to reside in
memory. However, you must configure the script keepalive for each service where
you want the script to run.
To see a complete list of all scripts available in the /<current running
version>/script directory, press the Tab key or “?”. Optionally, you can type a
script name not found in the list, then you can upload the script later. You can
manipulate scripts using the archive, clear, and copy commands. You can also
upload a script from a local hard drive to the /script directory on the CSS, or
download a script from the /script directory on the CSS to a local hard drive.
Note For a large number of services that use script keepalives, use a
smaller subset of global keepalives to handle the work for them. For
information on global keepalives, refer to “Global Keepalive Mode”
earlier in this chapter.
Use the keepalive type script command to configure script keepalives. The
syntax for this service configuration mode command is:
keepalive type script script_name {“arguments”}{use-output}
The optional use-output keyword allows the script to parse the output for each
executed command. This optional keyword allows the use of grep and file
direction within a script. You can configure a maximum of 16 script keepalives
(out of a maximum of 255 script keepalives) to use script output. By default, the
script does not parse the output.
For example, to configure an httplist keepalive, enter:
(config-service[serv1)# keepalive type script ap-kal-httplist
“10.10.102.105 /default.htm”
In the previous command example, the keepalive command configures the serv1
service keepalive to be of type script with the script name ap-kal-httplist and the
arguments “10.10.102.105 /default.htm”. The output is not parsed by the script.
To disable a script keepalive on a service, enter:
(config-service[serv1])# keepalive type none
Note If a script keepalive terminates with an error, you can use the Script
Error and Script Run Time fields to help troubleshoot the problem.
You can also use the show running-config command to display the script
keepalive and its arguments.
service serv1
ip address 10.10.102.105
keepalive frequency 10
keepalive type script ap-kal-httplist “10.10.102.105
/default.htm”
active
The example above shows the script keepalive and arguments that have been
configured on a service. If no arguments are specified in the script, then the
quoted text following the script name will not appear.
Because the above script fails when it executes the exit command, the script
returns a non-zero value. By default, the script will fail with a syntax error if the
connect command fails. Be sure to check the logic of your scripts to ensure that
the CSS returns the correct value.
Use the following procedure to ensure that your custom script keepalives operate
properly after upgrading the software.
1. Upgrade the WebNS software in your CSS. See Appendix A, Upgrading Your
CSS Software.
2. Copy the scripts from the old /<current running version>/script directory to
the new /<current running version>/script directory.
3. Reboot the CSS.
Creating Services
A service can be a destination location or entity that contains and provides
Internet content (for example, a server, an application on a server such as FTP, or
streaming audio). A service has a name that is associated with an IP address, and
optionally, a protocol and a port number.
By creating a service, you identify the service and enable the CSS to recognize it.
You can then apply content rules to services that allow the CSS to:
• Direct requests for content to the service
• Deny requests for content from the service
Enter the service name from 1 to 31 characters. For example, to create service
serv1, enter:
(config)# service serv1
Configuring Services
The following sections describe how to configure content services.
• Assigning an IP Address to the Service
• Specifying a Port
• Specifying a Protocol
• Specifying a Domain Name
• Configuring an Advanced Load Balancing String
• Configuring a Service HTTP Cookie
• Configuring Weight
• Specifying a Service Type
• Configuring Service Access
• Configuring Service Cache Bypass
• Configuring Network Address Translation for Transparent Caches
• Configuring a Service to Bypass a Cache Farm
• Configuring Keepalives for a Service
• Showing Keepalive Configurations
• Configuring Maximum TCP Connections
• Activating a Service
• Suspending a Service
• Removing a Service
Note The CSS sends keepalives only to the first address in a service range.
If you configure a scripted keepalive, it should contain the first
address in a service range as one of its arguments.
Specifying a Port
Use the port command to specify a service TCP/UDP port number or range of
port numbers. The TCP or UDP destination port number is associated with a
service. Enter the port number as an integer from 0 to 65535. The default is any.
For example:
(config-service[serv1])# port 80
To specify a port to be used for keepalives, refer to the service mode keepalive
port command.
Use the range option to specify a range of port numbers starting with the port
number you specified using the port command. Enter a range number from 1 to
65535. The default range is 1. For example, if you enter a port number of 80 with
a range of 10, the port numbers will range from 80 through 89. You can use the
port range command only on local (default) services.
For example:
(config-service[serv1])# port 80 10
Specifying a Protocol
To specify a service IP protocol, use the protocol command. The default setting
for this command is any, for any IP protocol. The options for this command are:
• protocol tcp - The service uses the TCP protocol suite
• protocol udp - The service uses the UDP protocol suite
For example:
(config-service[serv1])# protocol tcp
Note You can only use a service redirect domain on a service type redirect.
You must specify the domain command for a redirect service to
obtain an applicable HTTP redirect.
Enter the service domain name as an unquoted text string with no spaces and a
maximum length of 64 characters.
Note The CSS automatically prepends the domain name with http://.
For example:
(config-service[serv1])# domain www.arrowpoint.com
or
or
For example:
(config-service[serv1])# string userid3217
Configuring Weight
To specify the relative weight of the service, use the weight command in service
mode. The CSS uses this weight when you configure ACA or weighted
roundrobin load balancing on a content rule. By default, all services have a weight
of 1. A higher weight will bias flows towards the specified service. To set the
weight for a service, enter a number from 1 to 10. The default is 1.
For example:
(config-service[serv1])# weight 2
Note When you add a service to content rules, the service weight as
configured in service mode is applied to each rule as a
server-specific attribute. To define a content rule-specific server
weight, use the add service weight command. This command
overrides the server-specific weight and applies only to the content
rule to which you add the service. For information on the add
service weight command, refer to Chapter 7, “Configuring Content
Rules”.
For example, to enable the CSS to redirect content requests for serv1, specify
redirect in the serv1 content rule:
(config-service[serv1])# type redirect
For example:
(config-service[serv1])# cache-bypass
Note Currently, you can use the transparent-hosttag command only with
a CSS operating in a Client Side Accelerator (CSA) environment.
For details on CSA, refer to the Content Service Switch Advanced
Configuration Guide, Chapter 7, Configuring the CSS Domain
Name Service.
For example:
(config-service[serv1])# transparent-hosttag
To disable destination NATing for the transparent cache service type, enter:
(config-service[serv1])# no transparent-hosttag
Note Currently, you can use the bypass-hosttag command only with a
CSS operating in a CSA environment. For details on CSA, refer to
the Content Services Switch Advanced Configuration Guide,
Chapter 7, Configuring the CSS Domain Name Service.
For example:
(config-service[serv1])# bypass-hosttag
Caution Do not configure more than 256 keepalives of one type. Do not
configure more than 512 total keepalives. Any services assigned to
keepalives over 512 will not be eligible for content rule selection.
Note If you do not configure a keepalive port, the TCP keepalive uses the
service port configured with the (config-service) port command. If
you do not configure either port, the TCP keepalive uses port 80.
For example, to specify port 8080 as the keepalive port for service serv1, enter:
(config-service[serv1])# keepalive port 8080
The syntax and options for this service mode command are:
• keepalive type ftp ftp_record - Keepalive method that accesses an FTP
server by logging into the server as defined in an FTP record file.
• keepalive type http {non-persistent} - An HTTP index page request. By
default, HTTP keepalives attempt to use persistent connections. To disable
this behavior, include the non-persistent option.
• keepalive type icmp - An ICMP echo message (ping). This is the default
keepalive type.
• keepalive type named name - Specify a global keepalive name to associate
the server with a global keepalive. Before using this command, ensure that
the global keepalive is activated through the (config-keepalive) active
command. Assigning a service to a global keepalive overrides any keepalive
properties you assigned in service mode.
• keepalive type none - Do not send keepalive messages to a service.
• keepalive type script script_name {“arguments”} {use-output} - Script
keepalive to be used by the service. The script is played each time the
keepalive is issued. By default, the script does not parse the output. For
details on using script keepalives, refer to the “Script Keepalives” section
earlier in this chapter.
• keepalive type tcp - A TCP session that determines service viability (3-way
handshake and reset (RST)).
For example, to set serv1 keepalive type to ftp, enter:
(config-service[serv1])# keepalive type ftp
When you specify the content information of a URI for an HTTP keepalive, the
CSS calculates a hash value for the content. If the content information changes,
the hash value no longer matches the original hash value and the CSS assumes that
the service is down. To prevent the CSS from assuming that a service is down due
to a hash value mismatch, define keepalive method as head. The CSS does not
compute a hash value for this type of keepalive.
If you specify a Web page with changeable content and do not specify the head
keepalive method, you must suspend and reactivate the service each time the
content changes.
2. Display the hash value using the show keepalive command. For example,
enter:
(config-service[serv1])# show keepalive
Keepalives:
Name: serv1
Index: 0 State: ALIVE
Description: Auto generated for service serv1
Address: 10.0.3.21 Port: 80
Type: HTTP:GET:/testpage.html
Hash: 1024b91e516637aaf9ffca21b4b05b8c
Frequency: 5
Max Failures: 3
Retry Frequency: 5
Dependent Services:
3. Use the hash value from the keepalive display to configure the keepalive
hash. Enter the MD5 hash as a quoted hexadecimal string up to 32 characters.
For example:
(config-service[serv1])# keepalive hash
"1024b91e516637aaf9ffca21b4b05b8c"
To clear a hash value and return to the default hash value, enter:
(config-service[serv1])# no keepalive hash
Keepalives:
Name: keepimages Index: 1 State: ALIVE ( ICP Check )
Description: Auto generated for service imageserver1
Address: 172.16.1.7 Port: 80
Type: HTTP:HEAD:/index.html
Frequency: 5
Max Failures: 3
Retry Frequency: 5
Dependent Services: imageserver1
Name: rualive Index: 2 State: ALIVE
Description: Auto generated for service serv2
Address: 172.16.1.8 Port: 80
Type: HTTP:HEAD:/index.html
Frequency: 5
Max Failures: 3
Retry Frequency: 5
Dependent Services: serv2
Keepalives:
keepimagesALIVE172.16.1.7
rualiveALIVE172.16.1.8
Note Do not use service max connections on UDP content rules. The service connection
counters do not increment and remain at 0 because UDP is a connectionless
protocol.
Activating a Service
Once you configure a service, you must activate it to enable the CSS to access it
for content requests. Activating a service puts it into the resource pool for
load-balancing content requests and starts the keepalive function.
The following command activates service serv1:
(config-service[serv1])# active
Suspending a Service
Suspending a service removes it from the pool for future load-balancing content
requests. Suspending a service does not affect existing content flows, but it
prevents additional connections from accessing the service for its content. You
may want to suspend a service prior to performing maintenance on the service.
The following command suspends service serv1:
(config-service[serv1])# suspend
Note When you suspend a service, the CSS rebalances the remaining
services using the failover setting.
Removing a Service
When you remove a service, the CSS:
• Removes the service from all content rules to which the service has been
added.
• Rebalances the remaining services. The CSS does not apply the failover
setting.
Note You cannot retrieve service information once you issue the remove
service command.
To remove service server1 from owner arrowpoint content rule rule1, enter:
(config-owner-content[arrowpoint-rule1])# remove service server1
For example, to remove service serviceftp from source group ftpgroup, enter:
(config-group[ftpgroup])# remove service serviceftp
To display information for a specific service, enter the show service command
with the service name. For example:
# show service serv86
If you are in service mode, to display the configuration information for the current
service, enter:
(config-service[serv86])# show service
Note The connection counters displayed with the show service command
do not increment and remain at 0 for UDP flows. UDP is a
connectionless protocol.
Field Description
Name The name of the service.
Index The CSS assigned unique numeric index.
Table 5-4 Field Descriptions for the show service Command (continued)
Field Description
Type The type for the service. If you do not define a type for the
service, the default service type is local. The possible types are:
• nci-direct-return - A NAT Channel Indication (NCI)
service for NAT peering.
• nci-info-only - The service is NAT Channel indication for
information only.
• proxy-cache - The service is a proxy cache. This type
bypasses content rules for requests from the cache.
• redirect - The service is not directly accessible and requires
redirection.
• redundancy-up - The service is a redundant uplink.
• rep-cache-redir - The service is a replication cache with
redirect.
• rep-store - The service is a replication store server for hot
content.
• rep-store-redir - The service is a replication store to which
content requests are redirected.
• transparent-cache - The service is a transparent cache. No
content rules are applied to requests from the cache.
State The state of the service. The State field displays reports the
service as either Alive, Dying, Down, or Suspended. The Dying
state reports that a service is failing according to the parameters
configured in the following service mode commands: keepalive
retryperiod, keepalive frequency, and keepalive maxfailure.
When a service enters the Down state, the CSS does not forward
any new connections to it (the service is removed from the load
balancing rotation for the content rule). However, the CSS
keeps all existing connections to the service (connections to that
service are not "torn down").
Rule The address, protocol, and port information for the service.
Redirect The domain name to be used when an HTTP redirect service
Domain generates an “object moved” message for the service.
Table 5-4 Field Descriptions for the show service Command (continued)
Field Description
Redirect The HTTP redirect string to be used when an HTTP redirect
String service generates an “object moved” message for the service.
Keepalive The keepalive type, frequency, maxfailure, and retryperiod. The
possible keepalive types are:
• ftp - The keepalive method that accesses an FTP server by
logging into an FTP server as defined in an FTP record file.
• http - An HTTP index page request. By default, HTTP
keepalives attempt to use persistent connections.
• icmp - An ICMP echo message (default)
• named - Global keepalive defined in keepalive
configuration mode.
• none - Do not send keepalive messages to the service.
• script - Script keepalive to be used by the service. The
script is played each time the keepalive is issued.
• tcp - TCP connection handshake request.
The keepalive frequency value is the time in seconds between
sending keepalive messages to the service. The default is 5. The
range is from 2 to 255. The keepalive maxfailure value is the
number of times the service can fail to respond to a keepalive
message before being considered down. The default is 3. The
range is from 1 to 10. The keepalive retryperiod value is the time
in seconds between sending retry messages to the service. The
default is 5. The range is from 2 to 255.
Mtu The size of the largest datagram that can be sent or received on
the service.
State The total number of state transitions on the service.
Transitions
Connections The current number of TCP connections on the service.
Max The configured maximum number of TCP connections on the
Connections service. The default is 0. The range is from 0 to 65535.
Table 5-4 Field Descriptions for the show service Command (continued)
Field Description
Total The total number of connections that have been mapped to the
Connections service.
Total Reused The total number of connections that were reused for multiple
Conns content requests during persistent connections.
Weight The service weight used with load metrics to make load
allocation decisions. The weight is used in ArrowPoint Content
Awareness (ACA) and weighted roundrobin load balancing
decisions. The default is 1. The range is from 1 to 10.
Load/Average The current and average load for the service.
Load
Where to Go Next
For information on creating and configuring owners, refer to Chapter 6,
Configuring Owners.
This chapter describes how to create and configure owners. Services, which are
associated with content rules, are discussed in Chapter 5, Configuring Services.
Information in this chapter applies to all CSS models except where noted.
This chapter contains the following sections:
• Owner Configuration Quick Start
• Creating an Owner
• Configuring an Owner DNS Balance Type
• Specifying Owner Address
• Specifying Owner Billing Information
• Specifying Case
• Specifying Owner DNS Type
• Specifying Owner Email Address
• Removing an Owner
• Showing Owner Information
Creating an Owner
An owner is generally the person or company who contracts the web hosting
service to host their web content and allocate bandwidth as required. Use the
owner command to create an owner for a content rule. When you create an owner,
you enable the CSS to identify the entity (for example, person, company name, or
other meaningful title) that owns content rules. The CSS can contain many owners
and maintain a configurable profile for each owner.
When creating an owner, you may want to use the owner’s DNS name. Enter the
owner name as an unquoted text string from 1 to 31 characters in length. The
following example creates the owner arrowpoint:
(config)# owner arrowpoint
Once you create an owner, the CLI enters into owner mode.
(config-owner[arrowpoint])#
To remove an owner, use the no owner command. When you remove an owner,
you also remove all content rules created for the owner. For example:
(config-owner[arrowpoint])# no owner arrowpoint
Note For the leastloaded option to work properly, all domain sites
must be running a minimum of CSS software version 3.01.
To reset the DNS load balancing method to its default setting of roundrobin,
enter:
(config-owner[arrowpoint])# no dnsbalance
Specifying Case
To define whether or not the CSS employs case-sensitivity when matching content
requests to an owner’s content rule, use the case command. The default is case
insensitive.
For example, a client requests content from arrowpoint/index.html. If owner
arrowpoint is configured for:
• case sensitive, the request must match content index.html exactly
• case insensitive, the request can be any combination of uppercase and
lowercase letters (for example, Index.html, INDEX.HTML)
To configure owner arrowpoint content rules to be case-sensitive, enter:
(config-owner[arrowpoint])# case sensitive
Removing an Owner
To remove an owner, issue the no owner command from config mode as shown
in the following example. To remove an owner, you must first exit from the owner
mode. You cannot be in the owner mode that you wish to remove.
(config)# no owner arrowpoint
Caution Removing an owner also deletes the content rules associated with it.
Field Description
Name The name of the owner.
Billing Info The billing information about the owner.
Address The postal address for the owner of the Web hosting service.
Email Address The email address for the owner.
Table 6-2 Field Descriptions for the show owner Command (continued)
Field Description
DNS Policy The peer DNS exchange policy for the owner. The possible
policies are:
• accept, accepting all content rules proposed by the CSS
peer.
• push, advertising the owner and push all content rules
onto the CSS peer.
• both, advertising the owner and pushing all content rules
onto the CSS peer, and accept all content rules proposed
by the CSS peer.
• none, the default DNS exchange policy for the owner.
The owner is hidden from the CSS peer.
Case Matching Whether the matching of content requests to the owner’s
rules is case sensitive or insensitive.
For example:
(config)# show summary
Field Description
Global Bypass Counters
No Rule Bypass The number of times that a flow passes through even
Count though it did not match one of the existing content rules.
ACL Bypass The number of times that the ACL immediately sends
Count traffic to its destination, bypassing the content rule.
URL Params The number of times that content requests match on
Bypass Count content rules that have param-bypass set to enable. The
CSS forwards the content requests to the origin server.
Cache Miss The number of times that TCP connections from the
Bypass Count cache servers bypassed content rules so the cache server
could access the origin server for the requested content.
Garbage Bypass The number of times that the CSS examined content
Count requests and deemed them unrecognizable or corrupt. As
a result, the CSS forwards the content request to the
origin server rather than the cache server.
Owner The owner name.
Content Rules The rule associated with the owner.
State The state of the rule (active or suspended).
Services The services associated with the rule.
Service Hits The number of hits on the service.
Where to Go Next
Once you create and configure an owner, refer to Chapter 7, Configuring Content
Rules, for information on configuring content rules. Content rules instruct the
CSS on how to handle requests for the owner’s content. You create and configure
a content rule within a specific owner mode. This method ensures that the
configured content rule applies only to a specific owner.
This chapter describes how to create and configure content rules. Services, which
are added to content rules, are discussed in Chapter 5, Configuring Services.
Configuring owners is discussed in Chapter 6, Configuring Owners. Information
in this chapter applies to all CSS models except where noted.
This chapter contains the following sections:
• Service, Owner, and Content Rule Overview
• Naming and Assigning a Content Rule to an Owner
• Configuring a Virtual IP Address
• Configuring a Domain Name Content Rule
• Adding Services to a Content Rule
• Activating a Content Rule
• Suspending a Content Rule
• Removing a Content Rule
• Removing a Service from a Content Rule
• Configuring a Protocol
• Configuring Port Information
• Configuring Load Balancing
• Configuring a DNS Balance Type
• Configuring Hotlists
• Specifying a Uniform Resource Locator
4. Applies all content rules to service the request for content (for example,
load-balancing method, redirects, failover, stickiness).
The CSS uses content rules to determine:
• Where the content physically resides, whether local or remote.
• Where to direct the request for content (which service or services).
• Which load-balancing method to use.
The type of rule also implies the Layer at which the rule functions.
• A Layer 3 content rule implies a destination IP address of the host or network.
• A Layer 4 content rule implies a combination of destination IP address,
protocol, and port.
• A Layer 5 content rule implies a combination of destination IP address,
protocol, port, and URL that may or may not contain an HTTP cookie or a
domain name.
Content rules are hierarchical. If a request for content matches more than one rule,
the characteristics of the most specific rule apply to the flow. The hierarchy is
shown below. The CSS uses this order of precedence to process requests for the
content, with 1 being the highest match and 9 being the lowest match.
1. Domain name, IP address, protocol, port, URL
2. Domain name, protocol, port, URL
3. IP address, protocol, port, URL
4. IP address, protocol, port
5. IP address, protocol
6. IP address
7. Protocol, port, URL
8. Protocol, port
9. Protocol
Note The CSS evaluates the content rule hierachary before it evaluates the
Layer 5 rule URL, cookie strings, or HTTP header information.
Figure 7-1 illustrates the CSS service, owner, and content rule concepts.
49385
Once you assign a content rule to an owner, the CLI prompt changes to reflect the
specific owner and content rule mode.
(config-owner-content[arrowpoint-rule1])#
Within owner and content mode, you can configure how the CSS will handle
requests for the content. To remove an existing content rule from an owner, issue
the no content command from owner mode:
(config-owner[arrowpoint])# no content rule1
Note The CSS allows you to configure a domain name instead of a VIP.
See the next section for information on configuring a domain name.
You may configure either a VIP, a domain name, or both in a content
rule.
Caution Ensure that all VIPs are unique IP addresses. Do not configure a VIP
to the same address as an existing IP address on your network or a
static ARP entry.
Note When you configure a rule without a VIP, the rule will match on any
VIP that matches the other configured rule attributes (for example,
port and protocol). If you have a configuration that requires this type
of rule (called a wildcard VIP rule), be aware that the client request
will match on this rule when the client request attempts to connect
directly to a server IP address.
The variables and options for the vip address command include:
• ip_address or host - The IP address or name for the content rule. Enter the
address in either dotted-decimal IP notation (for example, 192.168.11.1) or
mnemonic host-name format (for example, myhost.mydomain.com).
• range number - The range option and variable allows you to specify a range
of IP addresses starting with the VIP address. Enter a number from 1 to
65535. The default range is 1. The ip_or_host variable is the first address in
the range. For example, if you enter a VIP of 172.16.3.6 with a range of 10,
the VIP addresses will range from 172.16.3.6 to 172.16.3.15.
Note When you use an FTP content rule with a configured VIP address
range, be sure to configure the corresponding source group with the
same VIP address range (refer to the Content Services Switch
Advanced Configuration Guide, Chapter 3, Configuring Source
Groups, ACLs, EQLs, URQLs, NQLs, and DQLs).
To configure a Virtual IP address (VIP), issue the vip address command and
specify either an IP address or a host name. For example:
(config-owner-content[arrowpoint-rule1])# vip address 192.168.3.6
To configure a Virtual IP address (VIP) with a range of 10, issue the vip address
command with the range option. For example:
(config-owner-content[arrowpoint-rule1])# vip address 192.168.3.6
range 10
When using the vip address range command, use IP addresses that are within the
subnet you are using. The CSS does not arp for IP addresses that are not on the
circuit subnet. For example, if you configure the circuit for 10.10.10.1/24 and
configure the VIP range as 10.10.10.2 range 400, the CSS will not arp for any IP
addresses beyond 10.10.10.254. Using the same example with a VIP range of 200,
the CSS will arp for all IP addresses in the range.
To remove a VIP from a content rule, enter:
(config-owner-content[arrowpoint-rule1])# no vip address
Note When you ping a VIP, the CSS only responds if there is at least one
live service, live sorry server, or redirect string configured for the
VIP. If the services or sorry servers are down and you have not
defined a redirect string for the VIP, the CSS does not respond to the
ping.
Ethernet-2 Router1
CSS
VLAN2 158.3.7.2
158.3.7.58
Ethernet-4
Serv2
10.3.6.2 Client PC
requesting
content from
Ethernet-3 arrowpoint
49387
(VIP 158.37.6.0)
Owner - arrowpoint
Serv1
Content - rule1
10.3.6.1
VIP 158.37.6.0
VLAN1
10.3.6.58
To configure a domain name in a content rule, use the url command and place two
slash characters (//) at the front of the quoted url_name or url_path.
For example:
(config-owner-content[arrowpoint-rule1])# url
“//www.arrowpoint.com/*”
Use domain name rules rather than VIP rules when you have several transparent
caches and you want certain domains to use the most powerful cache server. You
want all other domains load balanced among the remaining cache servers. For this
configuration, set up a domain name rule for the specific domains you want
directed to the powerful cache server. Then configure a wildcard VIP rule (specify
port 80 and no VIP) to balance all other HTTP traffic among the remaining
caches.
You may use a single VIP in front of a server that is hosting many domain names.
Over time, some of the domain names may receive more traffic and could benefit
from having their content on a separate server. To segregate the traffic, configure
the domain names you want directed to specific services. You do not need to
configure additional VIPs for the domain names because the CSS will use the
domain names as the matching criteria in the content rules.
To enable DNS in the content rule, use the no dns-disable-local command. For
example:
(config-owner-content[arrowpoint-rule1])# no dns-disable-local
The domain names you could add as part of the DQL include www.wood.com,
www.woodworker.com, www.maple.com, www.oak.com. You could configure
www.wood.com and www.woodworker.com to have the same mapping index. You
can enter indexes from 1 to 1000 and provide an optional quoted description for
each index.
For example:
(config-dql[Woodworker]# domain www.wood.com index 1 “This is the
same as the woodworker domain”
If you specify a DQL as a matching criteria for content rule WoodSites, and there
are two services, S1 and S2, associated with the rule, the CSS checks the services
at mapping time for ranges. To add a DQL to a content rule, use the url command
as shown:
(config-owner-content[WoodSites])# url “/*“ dql Woodworker
For example, if the CSS receives a request for www.oak.com along with other
criteria, a match on the WoodSites rule occurs on DQL index 3. If the rule has the
roundrobin load balancing method, the CSS examines a service (S2 for this
example) to determine the backend connection mapping parameters. If you
configured S2 with a VIP address of 10.0.0.1 with a range of 5, the addresses
include 10.0.0.1 through 10.0.0.5. Because this service has a range of addresses
and any as its port, the DQL index of 3 matches the service VIP range index of 3,
which is address 10.0.0.3.
To delete a DQL, use the no dql command. For example:
(config)# no dql Woodworker
content domainRule2
vip address 192.168.1.2
protocol tcp
port 80
url “//www.domain.com/*”
add service Serv1
activate
If your network topology does not require that the CSS ARP-reply for VIPs, you
do not need to configure separate content rules for the domain name and VIP. In
this situation, a domain name content rule without a VIP is sufficient because it
will match on all content requests going to the domain regardless of the VIP.
An example of a topology where ARP-replying is not required is when an
upstream router has the CSS statically configured as the next hop router for the
VIPs. A domain name content rule is shown below.
content domainRule3
protocol tcp
port 80
url “//www.domain.com/*”
add service Serv1
active
Note You cannot use wildcards with either a Domain Qualifier List (DQL)
or a Uniform Resource Locator Qualifier List (URQL).
For example, the following content rule criteria have the highest precedence
because, as a set, they provide the greatest specificity in matching content:
Domain name, IP address, protocol, port, URL
If you want to create a content rule using all these criteria, such as the
configuration shown below, then the content rule matches only on the JPEG files
that are found in the domain whose name starts with “arr”, as well as the other
criteria, including VIP address, protocol, and port number.
(config-owner-content[arrowpoint-rule1])# vip address 192.168.3.6
(config-owner-content[arrowpoint-rule1])# protocol tcp
(config-owner-content[arrowpoint-rule1])# port 80
(config-owner-content[arrowpoint-rule1])# url “//arr*.com/*.jpg”
When the CSS encounters a content rule with a wildcard domain name and
matches according to the content rule hierarchy, it stops the search at that point.
This behavior is consistent with the way that the CSS manages content rules in
general.
For example, if the content request matches on the rule with VIP address
192.168.3.6 and URL /*, the CSS does not continue the search to match on a
second rule with a wildcard VIP address (no address specified) and an URL of
/*.jpg. The specific address match makes the first rule more specific than the
second rule.
To further clarify, if the match occurs on a rule with //arrowpoint*.com/*, the
search stops at that point and does not continue to match on a rule with
//arr*.com/*.gif, because the first rule is a more specific match. Also note that a
fully-specified domain name rule (arrowpoint.com) is more specific than a
wildcard domain name rule (arr*.com).
For example, to have the content rule match on all instances of the text string
“arr” in the domain name portion of the content rule, issue the following
command:
(config-owner-content[arrowpoint-rule1])# url “//www.arr*.com/*”
Note You cannot use wildcards on the rightmost portion (for example,
.com, .org, .gov) of the domain name. For this reason, the wildcard
domain name syntax f* is not supported. You can use wildcards in
any other words that make up the domain name.
Note You can only add local services to a content rule that contains either
a Domain Qualifier List (DQL) or a service port range.
The add service command enables you to add the following types of services to
a content rule:
• Service
• Primary Sorry Server
• Secondary Sorry Server
When you configure a Layer 3 or 4 content rule, the rule hits the local services. If:
• The local services are not active or configured, the rule hits the primary sorry
server.
• The primary sorry server fails, the rule hits the secondary sorry server.
Redirect services and redirect content strings cannot be used with Layer 3 or 4
rules because they use the HTTP protocol.
When you configure a Layer 5 content rule, the CSS directs content requests to
local services. If:
• The local services are not active or configured, the rule sends the HTTP
redirects with the location of the redirect services to the clients.
• The local and redirect services are not active or configured, the rule forwards
the HTTP requests to the primary sorry server.
• All services are down except the secondary sorry server, the rule forwards the
HTTP requests to the secondary sorry server.
For information on configuring service types, refer to “Specifying a Service
Type” in Chapter 5, Configuring Services.
For example:
(config-owner-content[arrowpoint-rule1])# add service serv2 weight 3
Note When you add a service to content rules, the service weight as
configured in service mode is applied to each rule as a
server-specific attribute. Use the add service weight command to
define a content rule-specific server weight. This command
overrides the server-specific weight and applies only to the content
rule to which you add the service. For information on the
(config-service)# weight command, refer to Chapter 5,
Configuring Services.
Note Once the CSS directs requests to a primary sorry server, it will
continue to use the primary sorry server even when the original
server becomes functional again. To force the connection back to the
original server you must either suspend the primary sorry server or
wait until the connection is dropped or times out. When a new
session is initiated by the CSS it should go back to the original
server.
Enter the server name as a case-sensitive unquoted text string with no spaces.
Note You can only add a primary sorry server to a rule if its range for the IP address or
port is equal to the range for the IP address or port of each service on the rule. For
example, if the rule has two services each with a range of three addresses, the
primary sorry server must have a range of three addresses.
For example:
(config-owner-content[arrowpoint-rule1])# primarySorryServer
slowserver
Note You can only add a secondary sorry server to a rule if its range for the IP address
or port is equal to the range for the IP address or port of each service on the rule.
For example, if the rule has two services each with a range of three addresses, the
secondary sorry server must have a range of three addresses.
For example:
(config-owner-content[arrowpoint-rule1])# secondarySorryServer
slowestserver
• add dns dns_name ttl_value - The DNS name mapped to the content rule with
the optional Time to Live (TTL) value in seconds. This value sets how long
the DNS client remembers the IP address response to the query. Enter a value
from 0 to 255. The default is 0.
For example:
(config-owner-content[arrowpoint-rule1])# add dns arrowpoint 120
Note To configure DNS server functionality on the CSS, use the (config)
dns-server command.
Configuring a Protocol
Specifying a protocol in a content rule enables the CSS to direct requests for
content associated with the content rule to use a specific protocol.
You may specify the following protocols for content:
• any (default, meaning the rule will match on a tcp or udp port)
• tcp
• udp
To configure the TCP protocol for content, enter:
(config-owner-content[arrowpoint-rule1])# protocol tcp
To specify the load-balancing algorithm for a content rule, use the balance
command available in content configuration mode. The options are:
• balance aca - ArrowPoint Content Awareness algorithm. The CSS uses the
normalized response time from client to server to determine the load on each
service. ACA balances the traffic over the services based on load.
• balance destip - Destination IP address division algorithm. The CSS directs
all client requests with the same destination IP address to the same service.
This option is typically used in a caching environment.
• balance domain - Domain name division algorithm. The CSS divides the
alphabet evenly across the number of caches. It parses the host tag for the first
four letters following the first dot and then uses these characters of the
domain name to determine to which server it should forward the request. This
option is typically used in a caching environment.
• balance domainhash - Internal CSS hash algorithm based on the domain
string. The CSS parses the host tag and does an exclusive XOR hash across
the entire host name. It then uses the XOR hash value to determine to which
server to forward the request. This method guarantees that all requests with
the same host tag will be sent to the same server in order to increase the
probability of a cache hit. This option is typically used in a caching
environment.
To restore the DNS balance type to the default setting of using the owner’s
method, enter:
(config-owner-content[arrowpoint-rule1])# no dnsbalance
Configuring Hotlists
Use the hotlist command to define a hotlist that lists the content most requested
(hot content) during a user-defined period of time. The CSS enables you to
configure hotlist attributes for content rules. Defining hotlist attributes for a
content rule enables you to determine which content is heavily accessed. With this
information, you can accurately determine which content should be replicated.
Note You must configure and enable a hotlist for replication-store and
replication-cache to work.
You can configure the following attributes for hotlists for specific content from
config-owner-content mode:
• hotlist - Enable the hotlist. To enable a hotlist for a specific content rule, enter
the hotlist command from the corresponding owner-content mode. For
example:
(config-owner-content[arrowpoint-rule1])# hotlist
• hotlist interval - Set the hotlist refresh interval. Enter the interval time in
minutes from 1 to 60. The default is 1. For example:
(config-owner-content[arrowpoint-rule1])# hotlist interval 10
• hotlist size - Set the size of the hotlist. Enter the total number of entries
maintained for this rule from 1 to 100. The default is 10. For example:
(config-owner-content[arrowpoint-rule1])# hotlist size 10
• hotlist threshold - Set the hotlist threshold. Enter an integer from 0 to 65535
to specify the threshold above which a piece of content is considered hot. The
default is 0. For example:
(config-owner-content[arrowpoint-rule1])# hotlist threshold 9
• hitCount - Set the hotlist type to hit count, how may times the content was
accessed. For example:
(config-owner-content[arrowpoint-rule1])# hotlist type hitcount
To display hotlist information, use the show domain hotlist command. Table 7-2
describes the fields in the show domain hotlist output.
Table 7-2 Field Descriptions for the show domain hotlist Command
Field Description
Hotlist Enable the domain hotlist. The domain hotlist is disabled
Enabled/Disabled by default.
Size The configured maximum number of domain entries
contained in the hotlist. The default is 10. The number can
be from 1 to 100.
Interval The configured interval, in minutes, to refresh the domain
hotlist and start a new list. The default is 1. The interval
can be from 1 to 60.
Threshold The configured number of domain hits per interval, which
must be exceeded for a domain to be considered hot and
added to the list. The default is 0 which indicates that the
threshold is disabled. The threshold can be from 0 to
65535.
# Hot Domains The total number of hot domains.
Hits The number of hits for a hot domain.
Domain The name of the hot domain associated with the Hits field.
To display the domain hotlist and its configuration, use the show domain hotlist
command (see Table 7-2).
Note Do not include the ? or # parameter character in the URL string. The
CSS terminates the URL at these parameter characters.
The syntax and options for this content mode command are:
• url "/url_name" - Specify the URL for the content as a quoted text string
with a maximum length of 252 characters.
• url "/{url_path}/*" eql eql_name - Specify the URL for any content file that
has its file extension defined in the specified Extension Qualifier List (EQL).
• url "/{url_path}/*" dql dql_name {eql_name} - Specify the URL for any
content file that has its domain name defined in the specified Domain
Qualifier List (DQL). You cannot use a DQL in conjunction with a domain
name in a URL. You may optionally include an EQL after the DQL name to
specify file extensions as part of the DQL matching criteria.
• url urql urql_name - Specify a URQL consisting of a group of URLs to this
content rule. Note that you cannot specify both url urql and application ssl
for the same content rule.
The variables are:
• url_name - The URL for the content. Enter a quoted text string with a
maximum length of 252 characters. You must place a slash character (/) at the
beginning of the URL (for example, “/announcements/prize.html”).
To specify a domain name, place two slashes (//) at the beginning of the URl.
For example, “//www.arrowpoint.com/*” allows the rule to match on HTTP
traffic that contains the www.arrowpoint.com domain name in the HTTP host
tag.
To use stickiness based on Secure Socket Layer (SSL) session ID, set the
URL to /*. Also, set the port to 443 with the (config-owner-content) port
command and enable stickiness with the (config-owner-content)
advanced-balance ssl command. Then specify an SSL application type.
You can specify certain wildcard operations for wildcard matching. Use a “*”
character to specify a wildcard match. You can specify a maximum of eight
directories. Each directory name can be a maximum of 32 characters with a
total maximum of 252 characters in the URL. You can specify only one
wildcard per URL.
Examples of supported wildcards are:
• /*.html - Matches all requests with the .html extension.
• /announcements/* - Matches all requests for files in the announcements
directory.
• /announcements/*.html - Matches requests for files in the
announcements directory having .html extensions.
• /announcements/new/*.jpg - Matches requests for all files in the
announcements/new directory that contain the .jpg extension.
• url_path - An optional path to any content file that has its file extension
defined in the EQL. Enter a quoted text string. You must place:
– A slash character (/) at the beginning of the quoted path
– /* characters at the end of the quoted path
For example, “/announcements/new/*”.
• eql_name - The name of the EQL. To see a list of EQLs, enter eql ?.
• urql_name - The name of the URQL. You can only assign one URQL per rule.
To see a list of URQLs, enter urql ?.
Note For caching environments, you can configure a domain content rule
by placing two slash characters (//) at the front of the url_name or
url_path. The rule matches HTTP traffic that contains the domain
name in the HTTP host tag.
For example, to specify a URL that matches all requests for content in the
announcements directory with .html extensions, enter:
(config-owner-content[arrowpoint-products.html])# url
"/announcements/*.html"
To display a URL for a content rule, enter the show rule command for the content
rule.
Note Do not specify a file extension in the URL when you use an EQL in
the URL or the CSS will return an error message. For example, the
CSS will return an error message for the command url "/*.txt” eql
Cacheable. The following command is valid; url "/*" eql
Cacheable.
For example:
(config-owner-content[arrowpoint-products.html])# url "/*" eql
graphics
The following example enables the CSS to direct all requests to the correct service
for content that matches:
• Pathnames (/customers/products)
• Extensions listed in the EQL (graphics)
(config-owner-content[arrowpoint-products.html])# url
"/customers/products/*" eql graphics
Note If you also set status code 404 (drop message) for content, code 302
takes priority.
For example:
(config-owner-content[arrowpoint-rule1])# redirect
"//www.arrowpoint.com/newlocation.html"
The CSS uses remapping or redirection to reset the connection according to the
setting of the persistence reset method.
(config)# bypass persistence enable
The CSS does not use remapping or redirection to reset the connection and
continues to bypass a service.
Note The CSS does not use remapping when selecting redirect type
services. Refer to “Specifying a Service Type” in Chapter 5,
Configuring Services.
If your topology consists of a CSS 11800 using ECMP to the servers and server
port NAT configured on the services, to ensure the correct processing of packets
either:
• Enable Service Remapping with the persistence reset remap command.
• Create source groups for the services in the content rule with the add
destination service command.
Note You can only use a redirect string on a service type redirect.
Field Description
Group SFP Port Map This field is currently not used.
Info
Persistence Reset The configured persistence reset method when resetting
Method a connection to a new back-end service. The possible
methods are:
• redirect - Causing an HTTP redirection when
resetting a connection to a new back-end service. An
HTTP redirection resets both sides of the
connection.
• remap - Using a back-end remapping operation
when resetting a connection to a new back-end
service.
Bypass Persistence The configured bypass persistence setting. The possible
settings are:
• disable - The CSS performs either a service
remapping or HTTP redirection operation to reset a
bypassed service when a content request matches on
a content rule, but a previous request caused the
bypass.
• enable - The CSS does not perform remapping or
redirection to reset the connection and continue to
bypass a service. By default, bypass persistence is
enabled.
Defining Failover
Note The CSS supports stateless redundancy failover on CSSs operating
in an IP redundancy or a VIP/interface redundancy configuration.
Stateless redundancy failover requires a very specific redundant
CSS configuration, which includes either failover linear or
failover next as the failover method. For details, refer to the Content
Services Switch Advanced Configuration Guide, Chapter 5,
Configuring Redundant Content Services Switches.
To define how the CSS handles content requests when a service fails or is
suspended, use the failover command. For the CSS to use this setting, ensure that
you configure a keepalive for each service; that is, do not set the keepalive type
to none (the keepalive default is ICMP). The CSS uses the keepalive settings to
monitor the services to determine server health and availability.
The failover command applies to the following caching load balancing types:
• balance domain
• balance url
• balance srcip
• balance destip
• balance domainhash
• balance urlhash
Note If you remove a service (using the remove service command), the
CSS rebalances the remaining services. The CSS does not use the
failover setting.
Figure 7-3 shows three cache services configured for failover next. If ServerB
fails, the CSS sends ServerB content requests to ServerC, which was configured
after ServerB in the content rule.
CSS
As shown in Figure 7-4, if ServerC fails, the CSS sends ServerC content requests
to ServerA because no other services were configured after ServerC.
67867
CSS
Figure 7-5 shows three cache services configured for failover linear. If you
suspend ServerB or if it fails, the CSS does not rebalance the services. It evenly
distribute ServerB cache workload between servers A and C.
Note that Figure 7-5 and Figure 7-6 use the alphabet to illustrate division balance.
CSS
Figure 7-6 also shows three cache services configured for failover linear, but in
this example, you remove ServerB using the remove service command from
owner-content mode. Because the CSS does not apply the failover setting when
you remove a service, it rebalances the remaining services.
67869
CSS
The application command enables you to specify the following application types:
• bypass - Bypass the matching of a content rule and sends the request directly
to the origin server.
• ftp-control - Process FTP data streams.
• http (default) - Process HTTP data streams.
• realaudio-control - Process RealAudio Control data streams.
• ssl - Process Secure Socket Layer (SSL) protocol data streams. Note that you
cannot specify both url urql and application ssl for the same content rule.
For example, in a content rule that specifies port 21, you may want to configure
the application type as ftp-control. Configuring the content rule to application
type ftp-control instructs the CSS to process only FTP requests coming into
port 21.
(config-owner-content[arrowpoint-rule1])# application type
ftp-control
For example, the following owner portion of a startup-config shows a content rule
configured for application ftp-control.
!************************** OWNER **************************
owner arrowpoint
content ftprule
vip address 192.3.6.58
protocol tcp
port 21
application ftp-control
add serv1
add serv3
active
Showing Content
The show content command enables you to display all configured content in the
CSS. You can issue the show content command from any mode.
To display content information, enter:
# show content
Content:
There are 2 pieces of content:
Index: 0 <173.168.128.11> TCP Port 80 Best Effort
Index: 1 <173.168.128.11> TCP Port 80 Best Effort
/index.html
The CSS 11800 provides two additional options to the show content command:
• all
• sfp_number
These options display all content entries in the Switch Fabric Processors (SFP) on
a specific SFP. Each SFM has two SFPs, for a maximum of four SFPs in a
CSS 11800.
For example:
(config)# show content all
Content Database:
Field Description
Index CSD unique index for a known piece of content.
<address> The IP address of this known piece of content.
Protocol The IP Protocol of this known piece of content.
Port Protocol port of this known piece of content.
Best Effort The QOS class of this known piece of content. This field is not
used by the CSS at this time.
Field Description
Name The name of the content rule.
Owner The owner of the rule.
Author The author (Local CSS or remote CSS peer) of the
rule.
Index A CSS assigned unique index for the rule. The
number is based in the order that the rule was
created.
State The state of the rule (active or suspend).
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Type The application type associated with the rule. The
possible values are:
• bypass, to bypass the matching of the content
rule and send the request directly to the origin
server.
• http (default), to process HTTP data streams.
• ftp-control, to process FTP data streams.
• realaudio-control, to process RealAudio Control
data streams.
• ssl, to process Secure Socket Layer (SSL)
protocol data streams.
L3 Destination IP address.
L4 Destination protocol and port.
Url The URL for the content.
URQL The name of the associated URL Qualifier list.
EQL The name of the associated EQL.
DQL The name of the associated DQL.
Header Field Group The name of the associated header-field group.
Total Bytes The total bytes to the content rule.
Total Frames The total frames to the content rule.
Total Redirects The total redirects by the content rule.
Total Rejects The total rejects by the content rule.
Overload Rejects Total rejects on the content rule due to overload on
the rule’s available services.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Balance The load-balancing algorithm for the content rule.
The possible values are:
• ACA - ArrowPoint Content Awareness
algorithm. The CSS correlates content request
frequency with the server’s cache sizes to
improve cache hit rates for that server.
• destip - Destination IP address division. The
CSS directs all client requests with the same
destination IP address to the same service.
• domain - Domain name division. The CSS uses
the domain name in the request URI to direct the
client request to the appropriate service.
• domainhash - Internal CSS hash algorithm
based on the domain string. The CSS uses the
algorithm to hash the entire domain string.
Then, the CSS uses the hash result to choose the
server.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Balance (continued) • leastconn - Least connections. The CSS
chooses a running service that has the least
number of connections.
• roundrobin - Roundrobin algorithm (default).
• srcip - Source IP address division. The CSS
directs all client requests with the same source
IP address to the same service.
• url - URL division. The CSS uses the URL
(omitting the leading slash) in the redirect URL
to direct the client requests to the appropriate
service.
• urlhash - Internal CSS hash algorithm based on
the URL string. The CSS uses the algorithm to
hash the entire URL string. Then, the CSS uses
the hash result to choose the server.
• weightedrr - Weighted roundrobin algorithm.
The CSS uses the roundrobin algorithm but
weighs some services more heavily than others.
You can configure the weight of a service when
you add it to the rule.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Advanced Balance The advanced load balancing method for the content
rule, including stickiness. The possible values are:
• arrowpoint-cookie - Enables the content rule to
stick the client to the server based on the unique
service identifier information of the selected
server in the ArrowPoint-generated cookie.
• cookies - Enables the content rule to stick the
client to the server based on the configured
string found in the HTTP cookie header. You
must specify a port in the content rule to use this
option. The CSS will then spoof the connection.
• cookieurl - This is the same as
advanced-balance cookies, but if the CSS
cannot find the cookie header in the HTTP
packet, this type of failover looks up the URL
extensions (that is, the portion after the “?” in
the URL) based on the same string criteria. You
can use this option with any Layer 5 HTTP
content rule.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Advanced Balance • none - Disables the advanced-balancing method
(continued) for the rule. This is the default setting.
• sticky-srcip - Enables the content rule to stick a
client to a server based on the client IP address,
also known as Layer 3 stickiness. You can use
this option with Layer 3, 4, or 5 content rules.
• sticky-srcip-dstport - Enables the content rule
to stick a client to a server based on both the
client IP address and the server destination port
number, also known as Layer 4 stickiness. You
can use this option with Layer 4 or 5 content
rules.
• ssl - Enables the content rule to stick the client
to the server based on the Secure Socket Layer
(SSL) version 3 session ID assigned by the
server. The application type must be SSL for the
content rule. You must specify a port in the
content rule to use this option. The CSS will
then spoof the connection.
• url - Enables the content rule to stick a client to
a server based on a configured string found in
the URL of the HTTP request. You must specify
a port in the content rule to use this option. The
CSS will then spoof the connection.
Sticky Mask The subnet mask used for stickiness. The default is
255.255.255.255.
Sticky Inactivity timeout The inactivity timeout period on a sticky connection
for a content rule before the CSS removes the sticky
entry from the sticky table. The default value is 0,
which means this feature is disabled. The range is
from 0 to 65535 minutes.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Sticky No Cookie Found The action the CSS should take for a sticky cookie
Action content rule when it cannot locate the cookie header
or the specified cookie string in the client request.
The possible values are:
• loadbalance - The CSS uses the configured
balanced method when no cookie is found in the
client request. This is the default setting.
• redirect "URL" - The CSS redirect the client
request to a specified URL string when no
cookie found in the client request. When using
this option, you must also specify a redirect
URL. Enter the redirect URL as a quoted text
string from 0 to 64 characters.
• reject - The CSS reject the client request when
no cookie is found in the request.
• service name - The CSS sends the no cookie
client request to the specified service when no
cookie is found in the request.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Sticky Server Down The action that the CSS should take when a sticky
Failover string is found but the associated service has failed
or is suspended. The possible values are:
• Balance - The failover method uses a service
based on the configured load balancing method
(default).
• Redirect - The failover method uses a service
based on the currently configured redirect
string. If a redirect string is not configured, the
load balancing method is used.
• Reject - The failover method rejects the content
request.
• Sticky-srcip - The failover method uses a
service based on the client IP address. This is
dependent on the sticky configuration.
• Sticky-srcip-dstport - The failover method
uses a service based on the client IP address and
the server destination port. This is dependent on
the sticky configuration.
ArrowPoint Cookie Path The pathname where you want to send the
ArrowPoint cookie. The default path of the cookie is
"/".
ArrowPoint Cookie The expiration time that the CSS compares with the
Expiration time associated with the ArrowPoint cookie. If you
do not set an expiration time, the cookie expires
when the client exits the browser.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
String Match Criteria The string criteria to derive string results and the
method to choose a destination server for the result.
The string result is a sticky string in the cookie
header, URL, or URL extension based on a sticky
type being configured. Refer to the following fields.
String Range The starting and ending byte positions within a
cookie, URL, or URL extension from a client. By
specifying the range of bytes, the CSS processes the
information located only within the range.
• The default starting byte position is 1. The range
is from 1 to 1999.
• The default ending byte position is 100. The
range is from 2 to 2000.
String Prefix The string prefix located in the sticky range. If you
do not configure the string prefix, the string
functions start from the beginning of the cookie,
URL, or URL extension, depending on the sticky
type. If the string prefix is configured but is not
found in the specified sticky range, load balancing
defaults to the round robin method. The default has
no prefix (““).
String Eos-Char The ASCII characters as the delimiters for the sticky
string.
String Whether to enable or disable the ASCII conversion
Ascii-Conversion of escaped special characters within the specified
sticky range before applying any processing to the
string. By default, ACSII conversion is enabled.
String Skip-Len The number of bytes to skip after the end of the
prefix to find the string result. The default is 0. The
range is from 0 to 64.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
String Process-Len The number of bytes, after the end of the prefix
designated by the string prefix command and
skipping the bytes designated by the string
skip-length command, that the string operation will
use. The default is 0. The range is from 0 to 64.
String Operation The method to choose a destination server for a
string result; derived from the settings of the string
criteria commands. The possible values are:
• match-service-cookie - Choose a server by
matching a service cookie in the sticky string.
This is the default setting. When a match is not
found, the server is chosen by using the
configured balance method (for example,
roundrobin). This is the default method.
• hash-a - Apply a basic hash algorithm on the
hash string to generate the hash key.
• hash-crc32 - Apply the CRC32 algorithm on the
hash string to generate a hash key.
• hash-xor - Exclusive OR (XOR) each byte of
the hash string to derive the final hash key.
Redirect Text used to build an HTTP 302 redirect message
that is sent to the client when the rule is matched.
Persistence Whether or not a persistent connection with a server
is maintained. By default, persistence is enabled.
Param-Bypass Whether or not content requests bypass transparent
caches when the CSS detects special terminators in
the requests. These terminators include "#" and "?"
which indicate that the content is dependent on the
arguments that follow the terminators. Bypass is
disabled by default.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Services Content rule services to configuration and statistic
information, as follows.
Local Load The normalized load threshold for the availability of
Threshold each local service on the content rule. When the
service load metric exceeds this threshold, the local
service becomes unavailable and is redirected to the
remote services. The default is 254, which is the
maximum load. The range is from 2 through 254. A
load of 255 indicates that the service is down
PrimarySorryServer The primary service to be used when all other
services for the content rule are unavailable.
SecondSorryServer The secondary service to be used when all other
services for the content rule are unavailable.
Name The names of the services.
Hits The number of content hits on the service.
Wgt The weight for the service used when you configure
ACA and weighted roundrobin load balancing on the
content rule. With a higher weight, the CSS redirects
more requests to the service.
State The state of the service.
Ld The service load. The range is from 2 to 255. 255
indicates that the service is unavailable.
KAlive The service keepalive type.
Conn The number of connections currently mapped to the
service.
DNS The number of times that the CSS DNS resolver
chose the service as the answer to a DNS client
query.
DNS Names Domain Name Server names.
DNS TTL The time to Live value in seconds, which determines
how long the DNS client remembers the IP address
response to the query.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
DNS Balance Where the CSS resolves a request for a domain name
into an IP address. The possible values are:
• leastloaded - Resolves the request to the
least-loaded local or remote domain site. The
CSS first compares load numbers. If the load
number between domain sites is within 50, then
the CSS compares their response times. The site
with the faster response time is considered the
least loaded site.
• Preferlocal - Resolves the request to a local VIP
address. If all local systems exceed their load
threshold, the CSS chooses the least-loaded
remote system VIP address as the resolved
address for the domain name.
• roundrobin - Resolves the request by evenly
distributing the load to resolve domain names
amongst content domain sites, local and remote.
The CSS does not include sites that exceed their
local load threshold.
• useownerdnsbalance - Resolves the request by
using the DNS load balancing method assigned
to the owner. This is the default method for the
content rule. If you do not implicitly set an
owner method, the CSS uses the default owner
DNS load balancing method of roundrobin.
Table 7-5 Field Descriptions for the show rule Command (continued)
Field Description
Hotlist Whether or not hotlist is enabled.
Size The total number of hotlist entries that is maintained
for the rule. The default is 10. The range is from 1 to
100.
Type The hotlist type. Currently, the CSS supports only
the hit count hotlist type, which is the default setting.
Hit count is the number of times that the content is
accessed.
Threshold The hit count per interval threshold below which
content is not considered hot. The default is 0. The
range is from 0 to 65535.
Interval The interval, in minutes, for refreshing the hotlist.
The default is 1. The range is from 1 to 60.
Associated ACLs The associated ACLs.
This chapter describes how to enable logging, set up the log buffer, and determine
where to send the activity information. Information in this chapter applies to all
CSS models, except where noted.
This chapter contains the following sections:
• Logging Overview
• Specifying Logging Buffer Size
• Specifying Log File Destination
• Enabling Logging on a Subsystem
• Logging CLI Commands
• Showing Log Files
• Copying Log Files to an FTP or TFTP Server
For more detailed information on displaying and interpreting log messages for the
CSS 11050, CSS 11150, and CSS 11800, refer to the Cisco Content Services
Switch Getting Started Guide, Appendix A, Log Messages.
Logging Overview
The CSS provides logging capabilities for debugging and system monitoring by
generating the log files described in Table 8-1.
By default, the CSS has boot logging and system logging enabled and writes the
logged information to the log files on the hard disk or flash disk, depending on the
type of storage in your CSS. The maximum size of a log file is 50 MB for hard
disk-based systems and 10 MB for flash disk-based systems. Log file information
is recorded as ASCII text.
You can display or copy a log file using the show log or copy log command,
respectively. For details on the show log command, refer to “Showing Log Files”
in this chapter. For details on the copy log command, refer to “Copying Log Files
to an FTP or TFTP Server” in this chapter.
Note You need SuperUser privileges to use the show log command.
Note Configure all logging commands from config mode except for the
clear log command. The clear log command is available in
SuperUser mode at the root prompt (#).
When you disable logging to disk, the CSS stops logging to the specified file and
reenables logging to the sys.log file.
Table 8-3 defines the CSS subsystems for which you can enable logging.
Subsystem Definition
acl Access Control List (ACL)
all (default) All CSS subsystems
app Application Peering Protocol (APP)
boomerang DNS Content Routing Agent (CRA)
buffer Buffer manager
chassis Chassis manager
circuit Circuit manager
csdpeer Content Server Database (CSD) peer
dql Domain Qualifier List (DQL)
fac Flow Admission Control (FAC)
flowmgr Flow manager subsystem
hfg Header Field Group (HFG)
ipv4 Internet Protocol version 4 (IPv4)
keepalive Keepalive
netman Network management
nql Network Qualifier List (NQL)
ospf Open Shortest Path First (OSPF)
pcm Proximity CAPP Messaging (PCM)
portmapper Port Mapper
proximity Proximity
publish Publish
radius Remote Authentication Dial-In User Server
(RADIUS)
redundancy CSS redundancy
replicate Content replication
rip RIP
Subsystem Definition
security Security manager
sntp Simple Network Time Protocol (SNTP)
syssoft System software
urql Uniform Resource Locator Qualifier List (URQL)
vlanmgr VLAN manager
vpm Virtual pipe manager
vrrp Virtual Router Redundancy Protocol
wcc Web conversation control
Table 8-4 defines the logging levels you can set for a CSS subsystem. The logging
levels are listed in order of severity with a fatal error being the most severe and
info being the least severe error.
Level Definition
fatal-0 Fatal errors only.
alert-1 Alert errors, including fatal errors.
critical-2 Critical errors, including alert and fatal errors. The following trap
events log at the critical level: link down, cold start, warm start,
service down, service suspended.
error-3 General errors, including critical, alert, and fatal errors.
warning-4 Warning messages, including all lower levels (error, critical, alert,
(default) and fatal.
notice-5 Notice messages, including all trap events (except for events
logged at critical) and all lower levels except for info and debug.
info-6 Informational messages, including all lower levels except for
debug.
debug-7 Debug messages, including all other error levels.
• level - The log level for the message. Enter one of these levels:
– fatal-0 - Fatal errors only
– alert-1 - Alert errors, including errors at the fatal-0 level
– critical-2 - Critical errors, including errors at the alert-1 level
– error-3 - Error errors, including errors at the critical-2 level
– warning-4 - Warning errors (default), including errors at the error-3 level
– notice-5 - Notice messages, including errors at the warning-4 level
– info-6 - Informational messages, including errors at the notice-5 level
– debug-7 - All errors and messages
Note Before you configure logging for a specific ACL clause, ensure that
global ACL logging is enabled. To globally enable ACL logging, use
the logging subsystem acl level debug-7 command in config mode.
Note When you use the show log command to send the log activity to your
current session, and you want to stop sending log activity, press any
key on the terminal or workstation. The show log command
performs the same function as (config) logging line. Note that you
cannot run these commands at the same time.
The options and variables for the show log command include:
• log_filename - The name of the log file. Enter an unquoted text string with no
spaces. To see a list of log files with their dates, enter:
show log ?
• tail lines - Display the bottom and most recent portion of the log file. You
specify the number of lines to display, starting at the end of the log file. Enter
a number from 1 to 1000.
• line-numbers - Include the line numbers when displaying the contents of the
log file.
• traplog - Display all SNMP traps that have occurred. A trap log file is an
ASCII file in the log directory containing generic and enterprise traps. By
default, the following events generate level critical-2 messages:
– Link Up
– Link Down
– Cold Start
– Warm Start
– Service Down
– Service Suspended
All other SNMP traps generate level notice-5 messages.
Note Even though traps are disabled, the CSS still produces a log
message for any event that would normally generate a trap.
To display information in a specific log file, enter the show log command with a
valid log filename. For example:
# show log stubs
SEP 22 09:59:18 5/1 918 NETMAN-7: SNMP:SET RSP (3803)
SEP 22 09:59:53 5/1 919 NETMAN-7: SNMP:SET (3804)
SEP 22 09:59:53 5/1 920 NETMAN-7: SNMP: 1
apLogHostIpAddress.[1.2.3.4] VT_IPADDRESS <1.2.3.4>
SEP 22 09:59:53 5/1 921 NETMAN-7: SNMP: 2
apLogHostIpAddress.[1.2.3.4] VT_IPADDRESS <1.2.3.4>
Field Description
Subsystems
acl Access Control Lists subsystem
app Application Peering Protocol (APP) subsystem
boomerang Content Routing Agent (CRA)
buffer Buffer Manager subsystem
chassis Chassis Manager subsystem
circuit Circuit Manager subsystem
csdpeer Content Server Database (CSD) Peer subsystem
dql Domain Qualifier List (DQL) subsystem
fac Flow Admission Control (FAC) subsystem
flowmgr Flow Manager subsystem
hfg Header Field Group (HFG) subsystem
ipv4 IPv4 subsystem
keepalive Keepalive subsystem
netman Network Management subsystem
nql Network Qualifier List (NQL) subsystem
Table 8-5 Field Descriptions for the show log-state Command (continued)
Field Description
ospf OSPF subsystem
pcm Proximity CAPP Messaging (PCM) subsystem
portmapper PortMapper subsystem
proximity Proximity subsystem
publish Publish subsystem
radius Remote Authentication Dial-In User Server
(RADIUS)
replicate Replication subsystem
redundancy CSS redundancy subsystem
rip RIP subsystem
security Security Manager subsystem
sntp Simple Network Time Protocol (SNTP)
syssoft System software subsystem
urql Uniform Resource Qualifier List subsystem
vlanmgr VLAN Manager subsystem
vpm Virtual Pipe Manager subsystem
vrrp Virtual Router Redundancy Protocol subsystem
wcc Web Conversation Control subsystem
Levels:
debug Log all errors and messages (Verbose)
info Log informational messages, including errors at the
notice level
notice Log notice messages, including errors at the warning
level
warning Log warning errors (default), including errors at the
error level
error Log error errors, including errors at the critical level
critical Log critical errors, including errors at the alert level
Table 8-5 Field Descriptions for the show log-state Command (continued)
Field Description
alert Log alert errors, including errors at the fatal level
fatal Log fatal errors only (Quiet)
Lines: Lists the connected sessions (CSS 11800 only)
File:
Filename: The name of the log file
Current size: The current size of the log file
SNMP Overview
Simple Network Management Protocol (SNMP) is a set of network management
standards for IP-based internetworks. It includes a protocol, a database-structure
specification, and a set of management data objects. SNMP implementations
typically consist of a management application, running on one or more Network
Management Systems (NMSs), and agent applications, usually executing in
firmware on various network devices.
SNMP has two major standard revisions, SNMPv1 and SNMPv2. Your CSS
supports SNMPv2C (SNMP version 2C), known as “community-based SNMP”,
and standard Management Information Base (MIB-II) objects, along with an
extensive set of enterprise objects. (MIBs are discussed later in this chapter in the
section “Management Information Base (MIB)”.)
This overview contains the following sections:
• Managers and Agents
• Manager/Agent Communication
• Management Information Base (MIB)
• SNMP Communities
Manager/Agent Communication
There are several ways that the SNMP manager and the agent communicate.
• The manager can:
– Retrieve a value (a get action).
The SNMP manager requests information from the agent, such as the
number of users logged on to the agent device, or the status of a critical
process on that device. The agent gets the value of the requested MIB
variable and sends the value back to the manager.
– Retrieve the value immediately after the variable you name (a get-next
action).
The SNMP manager retrieves values from within a MIB. Using the
get-next function, you do not need to know the exact variable instance
you are looking for; the SNMP manager takes the variable you name and
then uses a sequential search to find the desired variables.
SNMP Manager
SNMP Agent
(CSS)
49650
Note There are two versions of the MIB tree as defined by ISO: MIB-I and
MIB-II, which has more variables than MIB-I. Refer to the MIB-II
standard in RFC 1213, “Management Information Base for Network
Management of TCP/IP-based Internets: MIB-II.”
MIB Variables
There are two types of MIB variables:
• Scalar - Variables that define an object with a single representation. This
means that an object describes a particular characteristic of the entire system.
An example of a scalar variable is SysDescr, which provides a system-wide
description of the CSS.
• Tabular - Variables that define an object with multiple representations. This
means that an object can have different values, depending on the qualifier.
For example, one tabular object could show bytes per interface, temperature
per board, or hits per service.
dod (6)
internet (1)
enterprises (1)
arrowpoint (2467)
49651
= additional branches
As shown in Figure 9-2, a number is associated with a MIB object name. This
number is called the object identifier (or object ID), and it uniquely identifies the
MIB object in the MIB tree. (The dotted lines represent other branches not
relevant to this discussion.)
For example, the MIB object labeled arrowpoint (which contains the MIB objects
specific to CSSs) in Figure 9-2 can be labeled:
iso.organization.dod.internet.private.enterprises.arrowpoint
or
1.3.6.1.4.1.2467
SNMP Communities
Each SNMP device or member is part of a community. An SNMP community
determines the access that each SNMP device has.
You supply a name to the community. After that, all SNMP devices that are
assigned to that community as members have the same access rights. The access
rights that the CSS supports are:
• read - Allows read-only access to the MIB tree for devices included in this
community
• read-write - Allows both read and write access to the MIB tree for devices
included in this community
Table 9-1 Quick Start for Defining the CSS as an SNMP Agent
Table 9-1 Quick Start for Defining the CSS as an SNMP Agent (continued)
Then enable a specific enterprise trap type. For example, you can set a trap
to notify the trap host of failed login attempts. Login failure traps provide
the username and source IP address of the person who failed to log in.
(config)# snmp trap-type enterprise login-failure
9. Configure the trap host for reload enable ability (optional). Reload enable
allows a management station with the proper WRITE community privilege
to reboot the CSS.
(config)# snmp reload-enable 100
10. Configure special enterprise trap thresholds to notify the trap host of Denial
of Service (DoS) attacks on your system (optional). For example, you can
set a trap threshold to notify the trap host of DoS attacks with illegal
addresses, either source or destination.
(config)# snmp trap-type enterprise dos-illegal-attack
trap-threshold 1
Caution It is required that you define the community strings for each access
type (read-only or read-write) before you use SNMP on the CSS.
The CSS is inaccessible until a read community string is specified.
For example:
(config)# snmp contact “Fred N. Mandy”
Enter the location as the physical location of the system. Enter a quoted text string
with a maximum length of 255 characters.
For example:
(config)# snmp location “sqa_lab1”
Enter the SNMP name as the unique name assigned to a system by the
administrator. Enter a quoted text string with a maximum of 255 characters. The
standard name convention is the system’s fully-qualified domain name (for
example, [email protected]).
For example:
(config)# snmp name “[email protected]”
To prevent the CSS from generating traps when a login fails, enter:
(config)# no snmp trap-type enterprise login-failure
To prevent the CSS from generating traps when a CSS reload occurs, enter:
(config)# no snmp trap-type enterprise reload
To prevent the CSS from generating traps when the service transitions state, enter:
(config)# no snmp trap-type enterprise service-transition
To prevent the CSS from generating traps when a redundant CSS transitions state,
enter:
(config)# no snmp trap-type enterprise redundancy-transition
For example:
(config)# snmp reload-enable
To prevent users from rebooting the CSS using SNMP (default behavior), enter:
(config)# no snmp reload-enable
Note Ensure you first enable SNMP enterprise traps using the snmp
trap-type enterprise command before you configure the CSS to
generate SNMP enterprise traps when a DoS attack event occurs. For
information, refer to “Configuring SNMP Enterprise Traps” earlier
in this chapter.
Note Ensure you first enable SNMP enterprise traps using the snmp
trap-type enterprise command before you configure the CSS to
generate SNMP enterprise traps when a DoS attack event occurs. For
information, refer to “Configuring SNMP Enterprise Traps” earlier
in this chapter.
• dos-land-attack - Generates traps for packets that have identical source and
destination addresses. The default trap threshold for this type of attack is
1 per second.
• dos-smurf-attack - Generates traps when the number of pings with a
broadcast destination address exceeds the threshold value. The default trap
threshold for this type of attack is 1 per second.
• dos-syn-attack - Generates traps when the number of TCP connections that
are initiated by a source, but not followed with an acknowledgment (ACK)
frame to complete the three-way TCP handshake, exceeds the threshold
value. The default trap threshold for this type of attack is 10 per second.
For example, to enable the CSS to generate traps for packets that have identical
source and destination addresses, enter:
(config)# snmp trap-type enterprise dos-land-attack
For example, to prevent the CSS from generating denial of service attack event
traps, enter:
(config)# no snmp trap-type enterprise dos_attack_type
Use the show dos summary command to display a summary of information about
DoS attacks. To display more detailed information, use the show dos command.
For example:
(config)# show dos summary
Field Description
Total Attacks The total number of DOS attacks detected since the
CSS was booted. The type of attacks that are listed
along with their number of occurrences are:
• SYN Attacks - The TCP connections that are
initiated by a source but are not followed with an
ACK frame to complete the three way TCP
handshake
• LAND Attacks - Packets that have identical
source and destination addresses
• Zero Port Attacks - Frames that contain source
or destination TCP or UDP ports equal to zero
Table 9-3 Field Descriptions for the show dos Command (continued)
Field Description
Last Attack The last time an attack was detected.
Detected
DOS Attack Event Details for each detected attack event, up to a
maximum of 50 events per SFP.
First Attack The first time that the attack event occurred.
Last Attack The last time that the attack event occurred.
Source/Destination The source and destination addresses for the attack
Address event.
Event Type The type of event.
Total Attacks The total number of attack occurrences for the event.
For details on the show running-config command and its output, refer to
Chapter 1, Logging in and Getting Started.
apFlowMgrExtDoSAttackEventType
apFlowMgrExtDoSAttackEventCount
apFlowMgrExtDoSAttackIndex
apFlowMgrExtDosTotalSmurfAttacks
apFlowMgrExtDosTotalIllegalSourceAttacks
apFlowMgrExtDosTotalZeroPortAttacks
apFlowMgrExtDosTotalLandAttacks
apFlowMgrExtDosTotalSynAttacks
apFlowMgrExtDosTotalAttacks
apFlowMgrExtIdleTimer
apFlowMgrExtPortIdleValue
apFlowMgrExtPortIdle
apFlowMgrExtReserveCleanTimer
apFlowMgrExtPermanentPort4
apFlowMgrExtPermanentPort3
apFlowMgrExtPermanentPort2
apFlowMgrExtPermanentPort1
apFlowMgrExtFlowTraceDuration
apFlowMgrExtFlowTraceMaxFileSize
apFlowMgrExtFlowTraceState
The previous example shows that using the question mark (?) character as a
wildcard returns information about the apFlowMgrExt MIB object. You can also
issue the lookup command on the exact MIB you want and view its description
without using the question mark (?) character. For example:
(config-rmonalarm[1])# lookup apFlowMgrExtDOSAttackEventCount
You can also display a list of all the Enterprise MIBs by using the lookup
command without any MIB object names, as in the following example:
(config-rmonalarm[1])# lookup ?
Note This command omits MIB objects of type string and MAC address.
Reading Logs
The traplog file contains all of the traps, both generic and enterprise, that have
occurred. The network device writes to the traplog file whether or not the SNMP
trap configuration is enabled.
To show the trap log since the last CSS reboot, issue the show log command as
shown:
# show log traplog
Setting Alarms
For information about commands available in this mode, refer to Chapter 10,
Configuring Remote Monitoring (RMON).
CSS MIBs
Table 9-5 describes the CSS MIB objects directly under the CSS Enterprise MIB
(1.3.6.1.4.1.2467). The MIBs listed in this table are a representation of the CSS
content-specific MIB objects. To find out how you can look up object
information, see the section “Using the CSS to Look Up MIB Objects” in this
chapter.
Table 9-5 MIB Branches Under the CSS Enterprise MIB (continued)
(config-owner-content)# remove
service ?
csaExt.mib Configuration and monitoring of (config)# dns-server ?
Client Side Accelerator (CSA)
parameters on a CSS.
dnshotExt.mib DNS hot list. (config)# domain hotlist ?
Table 9-5 MIB Branches Under the CSS Enterprise MIB (continued)
Table 9-5 MIB Branches Under the CSS Enterprise MIB (continued)
RMON Overview
RMON allows you to remotely monitor and analyze the activity of packets on
CSS Ethernet ports. It also allows alarm configuration for monitoring MIB
objects, and the event configuration to notify you of these alarm conditions. For
detailed information about RMON and its MIB objects, refer to RFC 1757.
The version of RMON provided on the CSS is a subset of the RMON-1 groups.
The CSS supports the following groups:
• Group 1 - (Statistics) Provides data about all Ethernet ports on a CSS. You
cannot configure RMON statistics. You can only view them.
• Group 2 - (History) Provides data about the Ethernet ports over a historical
period. Histories are preconfigured for each port. You can configure
additional port histories.
• Group 3 - (Alarm) Allows you to create an alarm and configure the
conditions, based on a MIB object, to trigger an alarm when significant
events occur.
• Group 9 - (Event) Allows you to create an event and configure the event
action when its associated alarm occurs.
Alarm
Statistics History
Event
Log SNMP
50481
After you create the identifier for the event, the prompt changes to
(config-rmonevent[1]). Now you can define the event, as described in “Setting the
RMON Event Attributes” later in this chapter.
To modify the attributes, you must access the RMON event configuration mode
for that event. To access this mode from any configuration mode except boot and
RMON alarm configuration modes, use the rmon-event command.
For example, to access the mode for RMON event 1, access global configuration
mode and enter:
(config)# rmon-event 1
To modify the attributes, refer to “Setting the RMON Event Attributes” later in
this chapter.
After you delete the identifier to change its attributes, recreate it as described in
“Creating a Configuration Identifier for an RMON Event” later in this chapter.
Describing an Event
When an alarm event occurs, the CSS sends a description with the event
notification. Because a description is not generated automatically, you must
provide one. To provide a description, use the description “description”
command. The description variable is the description for the RMON event. Enter
a quoted text string with a maximum length of 126 characters.
For example, to provide a description for the event, enter:
(config-rmonevent[1])# description “This event occurs when service
connections exceed 100”
Assigning an Owner
You must define the entity that configured this RMON event and is using the
resources assigned to it. To define the owner, use the owner “owner_name”
command. The owner_name variable is a quoted text string with a maximum of
126 characters. The owner for the event must be the same as the owner for the
alarm.
For example, to define the owner named Boston Tech Lab, enter:
(config-rmonevent[1])# owner “Boston Tech Lab”
• You can also designate that the event type is both log and trap. To define the
event as both log and trap types, enter:
(config-rmonevent[1])# type log-and-trap
Note Before you activate the event, make sure that you are finished
configuring it and are satisfied with its settings. After you activate
an event, you cannot modify its configuration settings. The only way
to change the event is to delete it, and then recreate it.
Alarm triggered
Rising Threshold
Rising event generated
Alarm triggered
Falling Threshold
Falling event generated
49652
Sample Value
Sample Interval
Sample Value
5 10 15 20
Sample Interval
After you create the identifier for the alarm, the prompt changes to
(config-rmonalarm[1]). Now you can define the alarm, as described in “Setting
the RMON Alarm Attributes” later in this chapter.
To modify the attributes, you must access the RMON alarm configuration mode
for that alarm. To access this mode from any configuration mode except boot and
RMON history configuration modes, use the rmon-alarm command. For
example, to access the mode for RMON alarm 1, access global configuration
mode and enter:
(config)# rmon-alarm 1
To modify the attributes, refer to “Setting the RMON Alarm Attributes” later in
this chapter.
After you delete the alarm identifier to change its attributes, recreate the identifier
as described in “Creating a Configuration Identifier for an RMON Alarm” earlier
in this chapter.
Assigning an Owner
You must define the entity that configured the RMON alarm and is using the
resources assigned to it. To define the owner, use the owner “owner_name”
command. The owner_name variable is a quoted text string with a maximum of
32 characters. Enter the same name as the owner of the event.
For example, to define the owner named Boston Tech Lab, enter:
(config-rmonalarm[1])# owner “Boston Tech Lab”
To look up a MIB object and view its description, use the lookup command. For
example, to view the description for the apSvcConnections object, enter:
(config-rmonalarm[1])# lookup apSvcConnections
ASN Name: apSvcConnections
MIB: svcext
Object Identifier: 1.3.6.1.4.1.2467.1.15.2.1.20
Argument Type: Integer
Range: 0-4294967295
Description:
The current number of TCP connections to this service
To specify the sample variable for this RMON alarm, use the sample-variable
mib_object command. For example, to define the apSvcConnections MIB object
for the current number of service connections, enter:
(config-rmonalarm[1])# sample-variable apSvcConnections
apSvcLoadInfoTimeout
apSvcLoadSvcStatRptTimeout
apSvcLoadEnable
apSvcLoadDecayInterval
apSvcLoadStepStatic
apSvcLoadStepSize
apSvcLoadThreshold
...
Delta sampling compares the current sample value with the previous sample and
compares their difference to the configured threshold. For example, if you want
to know when the number of content rule hits increase by 100,000 hits compared
to its previous sampling, configure the apCntHits MIB object with delta sampling.
apCntHits is an ever-increasing count of hits. To define a delta sampling, enter:
(config-rmonalarm[1])# sample-type delta
Note You must create an RMON event before you can associate it with an
alarm.
For a single rising alarm event to occur, a sampled value is greater than or equal
to the rising threshold value, and the value at the last sampling interval is less than
this threshold.
• To set the threshold for the alarm, use the rising-threshold rising_value
command. The rising_value variable is the threshold for the rising sample
type. Enter an integer from 0 to 4294967295.
For example, to set the rising threshold value of 100, enter:
(config-rmonalarm[1])# rising-threshold 100
• To associate a configured event to the RMON alarm when the rising threshold
is exceeded, use the rising-event rising_index command. The rising_index
variable is the event index used when a rising threshold is crossed. If you
enter 0, no event is generated.
For example, to associate the threshold to RMON event 1, enter:
(config-rmonalarm[1])# rising-event 1
Note You must create an RMON event before you can associate it with an
alarm.
For a single falling alarm event to occur, a sampled value is less than or equal to
the falling threshold value, and the value at the last sampling interval is greater
than this threshold.
• To set the threshold for the alarm, use the falling-threshold falling_value
command. The falling_value variable is the threshold for the falling sample
type. Enter an integer from 0 to 4294967295.
For example, to set the falling threshold value of 90, enter:
(config-rmonalarm[1])# falling-threshold 90
• A startup rising alarm occurs when the first sample is greater than or equal to
the rising threshold. To enable this alarm, enter:
(config-rmonalarm[1])# startup-type rising
With delta sampling, set the sampling interval short enough so that the sampled
variable, which has a tendency to go up and down very fast, does not wrap during
a single sampling period.
Activating an Alarm
After you configure the alarm attributes, you can activate the alarm. Before you
can activate an alarm, you must specify all attributes for the alarm. To activate the
alarm, enter:
(config-rmonalarm[1])# active
Note Before you activate the alarm, make sure that you are finished
configuring it and are satisfied with its settings. After you activate
an alarm, you cannot modify its configuration settings. The only
way to change the alarm is to delete it, and then recreate it.
After you create the identifier, the prompt changes to (config-rmonhistory [5]).
Now you can define the history, as described in “Setting the RMON History
Attributes” later in this chapter.
Note If the history is activated, you cannot modify its settings. You must
delete the history, recreate it, and respecify its attributes.
To modify the attributes, you must access the RMON history configuration mode
for that history. To access this mode from any configuration mode except boot
configuration mode, use the rmon-history command. For example, to access the
mode for RMON history 5, access global configuration mode and enter:
(config)# rmon-history 5
To modify the history attributes, refer to the “Setting the RMON History
Attributes” later in this chapter.
After you delete the history identifier to change its attributes, recreate it as
described in “Creating a Configuration Identifier for an RMON History” later in
this chapter.
To see a list of data object IDs for all of the CSS Ethernet ports, enter:
(config-rmonhistory[5])# show interface
Assigning an Owner
You must define the entity that configured the RMON history and is using the
resources assigned to it. To define the owner, use the owner owner_name
command. The owner_name variable is an unquoted text string with a maximum
of 32 characters.
For example, to define an owner named Boston Tech Lab, enter:
(config-rmonhistory[5])# owner Boston_Tech_Lab
Note Before activating this command, you must specify the owner for the
RMON history entry.
Note Before you activate the history, make sure that you are finished
configuring it and are satisfied with its settings. After you activate a
history, you cannot modify its configuration settings. The only way
to change the history is to delete it, and then recreate it.
Viewing Statistics
RMON statistics provide a summary of data received in the Fast Ethernet or
Gigabit Ethernet ports. You can view them either in a CSS CLI session through
the show rmon command or directly through an SNMP network management
station by using ether-stats MIB objects (refer to RFC1398).
The CSS show rmon command allows you to display the extended 64-bit RMON
statistics for a specific Ethernet port or all Ethernet ports in the CSS. The CSS
Enterprise ap64Stats MIB defines these statistics. You can also display the
RFC1757 32-bit statistics by adding the -32 suffix to the show rmon command.
• To display the RMON statistics for all ports in the CSS, enter:
# show rmon
The port_name variable is the name of the physical port (for example,
ethernet-4). Enter it as a case-sensitive unquoted text string.
For example, to display the extended RMON statistics for the Ethernet-4 port in
the CSS, enter:
# show rmon ethernet-4
Table 10-4 lists and describes the fields in the show rmon output.
Field Description
Bytes The total number of received bytes.
Packets The total number of received packets (including bad
packets, broadcast packets, and multicast packets).
Broadcast Packets The total number of good received packets that were
directed to the broadcast address. Note that this does not
include multicast packets.
Multicast Packets The total number of good received packets that were
directed to a multicast address. This number does not
include packets directed to the broadcast address.
CRC Alignment The total number of packets received that had a length
Errors (excluding framing bits, but including FCS octets) between
64 and 1518 octets, inclusive, but had either an FCS Error,
a bad Frame Check Sequence (FCS) with an integral
number of octets, or an Alignment Error, a bad FCS with a
non-integral number of octets.
Oversize Packets The total number of received packets that were longer than
1518 octets (excluding framing bits, but including FCS
octets) and were otherwise well formed.
Undersize Packets The total number of received packets that were less than 64
octets long (excluding framing bits, but including FCS
octets) and were otherwise well formed.
Table 10-4 Field Descriptions for the show rmon Command (continued)
Table 10-4 Field Descriptions for the show rmon Command (continued)
Table 10-4 Field Descriptions for the show rmon Command (continued)
Note When you reset RMON statistics on a CSS Ethernet port to zero, the
Ethernet errors and MIB-II statistics for the port are also reset to
zero.
Viewing History
You can display the default and configured RMON history information for a
specific Ethernet port or all Ethernet ports in the CSS. For information on
configuring an RMON history, refer to “Configuring an RMON History” earlier
in this chapter.
By default, the CSS maintains two tables of history statistics for each port. One
table contains the last 50 samples at 30-second intervals. The other table contains
50 samples at 30-minute intervals. You cannot modify the configuration for these
histories.
• To view the RMON history for all ports in the CSS, enter:
# show rmon-history
• To display the RMON history for a specified port and history index, enter:
# show rmon-history port_name history_index
For example, to view the history 5 for the Ethernet-4 port, enter:
# show rmon-history ethernet-4 5
For example, to see a list of histories for the Ethernet-4 port, enter:
# show rmon-history ethernet-4 ?
Table 10-5 lists and describes the fields in the show rmon-history output.
Field Description
Owner The entity that configured the entry and is using the resources
assigned to it.
Start Time The time when the bucket sampling started.
Interval The time interval in seconds when RMON takes a bucket
sample.
Buckets The number of discrete sampling intervals over which data is to
be saved for the history.
Time The time that the sample was taken.
Sample The number of the sample.
Octets The total number of octets of data (including those in bad
packets) received on the network, excluding framing bits but
including FCS octets.
You can use this object as a reasonable estimate of Ethernet
utilization. If greater precision is desired, sample the Ethernet
statistic packet and octet objects before and after a common
interval. The differences in the sampled values are packets
(Pkts) and Octets, respectively, and the number of seconds in
the Interval. These values are used to calculate the utilization of
a 10 MB Ethernet port as follows:
Pkts * (9.6 + 6.4) + (Octets * .8)
Utilization = __________________________________
Interval * 10,000
The result of this equation is the utilization value, which is the
utilization percentage of the Ethernet segment on a scale of 0 to
100 percent.
Packets The total number of received packets (including bad packets,
broadcast packets, and multicast packets).
Errors The total number of errors that RMON received for this port.
Util% The bandwidth utilization percentage of the Ethernet segment
on a scale of 0 to 100 percent.
Note The traps sent to the traplog file are the same traps sent to an SNMP
network management station. For information on configuring SNMP
refer to Chapter 9, Configuring Simple Network Management
Protocol (SNMP).
To display all SNMP traps that have occurred on the CSS, enter:
# show log traplog
Note Even though traps are disabled, the CSS still produces a log message
for any event that would normally generate a trap.
To view the events in a log file on the CSS disk, use the show log log_filename
command. For example, to view a log file named log1, enter:
# show log log1
rmon-event 2
active
description "Service connections are below 90"
owner "Boston Tech Lab"
community moonbase_alpha
type log-and-trap
Cisco Systems periodically releases new software versions for the CSS. To help
you upgrade your CSS with a new software release, this appendix provides the
following information:
• Before You Begin
• Upgrading your CSS
• Copying Custom Scripts
3. Configure the default FTP server by using the ftp-record command. The
syntax is:
ftp-record ftp_record ip_or_host username
[“password”|encrypted-password encrypted_pwd] {base_directory}
Note The script will not offer to delete a version that you have configured
as the primary or secondary boot file. On a flash disk-based system,
you may need to quit and then deselect the primary or secondary
boot file before continuing with the upgrade.
2. Start the upgrade script and include the name of the ADI and its extension in
quotes.
• If you are using a GZIP-compressed ADI from the FTP server, include
the gz file extension. For example:
# upgrade “ap0500002.gz”
• If you are using an uncompressed version of the ADI from the FTP
server, include the adi file extension. For example:
# upgrade “ap0500002.adi”
If you did not configure a default FTP record before starting the upgrade
script, you are prompted to configure one. You can either:
• Allow the CSS to automatically configure a record to the server
containing the ADI.
• At the prompts, manually configure the FTP record by entering the FTP
server information where you copied the upgrade ADI.
rebooting
The CSS automatically performs a flash upgrade, if necessary, and then boots the
new image.
If you did not configure a default FTP record before starting the upgrade
script, you are prompted to configure one. You can either:
• Allow the CSS to automatically configure a record to the server
containing the ADI.
• At the prompts, manually configure the FTP record by entering the FTP
server information where you copied the upgrade ADI.
When a default FTP record is configured, the script displays the current
version of the ADI.
Current Version: ap04100008 (Official)
Note The script will not offer to delete a version that you have configured
as the primary or secondary boot file. On a flash disk-based system,
you may need to quit and then deselect the primary or secondary
boot file before continuing with the upgrade.
4. At the prompt, enter the file name and extension of the GZIP-compressed
ADI version to install, and verify the information you entered. For example:
Please Enter Version to Install:ap0500002.gz
Note If you are using an uncompressed version of the ADI from the FTP
server, include the adi file extension (for example, ap0500002.adi).
6. Determine whether to have the CSS reboot with the ADI you are installing.
• Enter y to reboot the CSS with this ADI after the upgrade is done.
• Enter n to not reboot the CSS with the ADI after the upgrade is done.
Reboot with Version ap0500002? [y n q] n
The script copies the ADI from the FTP server, unpacks and installs it, and
sets it as the primary boot-file.
Attempting ftp of ap0500002.gz:
Completed successfully.
#
(config-boot)# unpack ${new_version_adi}
unpacking(/) 99%
(config-boot)#
If you decided to reboot the CSS with the installed ADI in Step 6, the CSS reboots
automatically. If you made the ADI the primary boot-file and archived the
running-config to the startup-config, the CSS automatically performs a flash
upgrade, if necessary, and then boots the new image.
To manually reboot the system, enter the following commands:
(config)# boot
(config-boot)# reboot
Note Make sure that you configure a default FTP server, as described in
the “Before You Begin” section earlier in this appendix.
Caution Do not remove the ADI currently running on the CSS. Use the
version command to see the currently running software version.
To remove an ADI:
a. List the ADIs on the CSS. For example:
(config)# show installed-software
ap0401003
ap0410008
ap0500002
You can also use the save_config alias to archive your startup-config. To
view all available aliases, use the show aliases command.
Caution If you created additional profiles on the CSS, archive them by using
the archive script or save_profile command. After the upgrade is
done, use the restore filename script command to restore the profile
you archived.
When you copy a GZIP-compressed ADI onto the CSS, the CSS
automatically uncompresses it.
6. Set the new ADI as the primary boot-file and install it.
(config-boot)# primary boot-file ap0500002
The CSS automatically performs a flash upgrade, if necessary, and then boots the
new image.
cache changing
secondary sorry server, adding 7-20 user terminal parameters, configuring 2-3
wildcards in domain names 7-12, 7-15 core dumps to TFTP server 1-64
11050 port designation 4-6 log files to FTP server 1-63, 8-19
IP
I
configuration, showing 3-21
ICMP redirect message transmission, record route, configuring 3-14
disabling 4-31
redundancy, configuring 3-15
idle timeout, configuring for all sessions 1-64
route, configuring 3-16
install new software 1-30, 1-35, A-1
route, displaying configurations 3-23
interface
route, removing 3-18
bridging to VLAN 4-10
source route, configuring 3-19
configuring 4-6
statistics, displaying configurations 3-25
describing 4-7
subnet broadcast, configuring 3-20
displaying statistics 4-20
summary, displaying 3-25
duplex and speed, configuring 4-7
IP address
layer, restarting 4-25
configuring using Offline Diagnostic
maximum idle time, configuring 4-9 Monitor menu 1-37
overview 4-1 Ethernet management port, configuring
quick start 4-4 for 1-11
network boot for passive, configuring 2-24 setting password protection on Offline
Diagnostic Monitor menu 1-40
script keepalives
configuring 5-29 server
order in which types are hit 5-40, 7-17
displaying 5-30
primary sorry 7-19
maximum keepalive types 5-27
secondary sorry 7-20
overview 5-27
types, how CSS handles 5-40
status codes 5-31
upgrading WebNS software 5-32, A-10 weight and load, using with ACA 5-7
configuration path, specifying 2-15 cache bypass, configuring 5-41, 5-42, 5-43
deleting a version from the disk 1-39 creating using text editor 1-58
displaying 1-57
directory 2-47
ordering information within 1-58
displaying information 1-65
overview 1-51
overview 1-50
restoring archived file 1-62
upgrade (manual process) A-8
RMON configuration 10-34
upgrade caution A-4
saving offline 1-53
upgrade script A-3
using 1-53
version format 1-50
stateless redundancy failover 5-33, 7-7, 7-24, 7-41 enabling and disabling for SSHD 3-36
statistics reclaiming reserved control ports 2-40
clearing RMON 10-29 restricting access to the CSS 2-37
showing flows 2-41 terminal parameters
viewing an Ethernet port 10-25 terminal idle, configuring 2-4
subnet mask terminal length, configuring 2-4
assigning to CSS 1-12 terminal more, configuring 2-5
configuring using Offline Diagnostic terminal netmask format, configuring 2-5
Monitor menu 1-37
terminal timeout, configuring 2-5
prefix notation, configuring for user 2-5 user-specific, configuring 2-3
subsystem text editor
disabling logging 8-11 running-config, creating 1-58
enabling for logging 8-8 startup-config, creating 1-58
suspending TFTP server
content rule 7-21 copying core dumps to 1-64
service 5-52 copying log files to 8-19
sys.log 1-50, 8-2, 8-14 copying log files to server 8-20
sys.log.prev 8-3 threshold
syslogd, logging to 8-2, 8-3 falling RMON alarm 10-17
system resources, showing 1-68 global load threshold 5-10
load threshold, specifying 7-33
XOR hash
W
used in domainhash balance algorithm 7-24
warning used in urlhash balance algorithm 7-25
level warning 8-2, 8-5, 8-10, 8-12
symbol overview xxxiii
web management
Z
enabling access 2-37 zero, resetting Ethernet statistics to 4-23
restricting access to the CSS 2-37 zip file
web page, verifying checksum 5-19, 5-46 included on documentation CD 2-22
weight, configuring for a service 5-38 using for network boot 2-22
weighted roundrobin, load balancing 7-25
wildcards
domain names in content rules 7-15
using in content rule domain names 7-16
XML
enabling access 2-37
enabling access to the CSS 2-45, 9-8
restricting access to the CSS 2-37, 2-45, 9-8
XML code
CLI command conventions 2-43
creating 2-42
mode hierarchy 2-43
parsing 2-45
publishing 2-45
using on the CSS 2-42
XML document example 2-44