140
Starent Networks Multimedia Core Platforms Thresholding Configuration Guide Version 9.0 Generally Available 03-31-2010 P/N: 901-00-0061 Rev L

901 00 0061 Thresholding Config

Embed Size (px)

DESCRIPTION

troubleshooting

Citation preview

Starent Networks Multimedia Core PlatformsThresholding Configuration GuideVersion 9.0Generally Available03-31-2010P/N: 901-00-0061 Rev LNOTICE OF COPYRIGHTThe material contained in this document is for informational purposes only and is subject to change without notice.No part of this document may be reproduced, transmitted, transcribed, or stored in a retrieval system in any form or by any means, mechanical, magnetic, optical, chemical, or otherwise without the written permission of Starent Networks Corporation.Starent and the Starent logo are registered trademarks of Starent Networks Corporation. How Wireless Connects and StarOS are trademarks of Starent Networks Corp.VA Linux is a registered trademark of VA Linux Systems, Inc. Microsoft and Microsoft Windows are registered trademarks of Microsoft Corporation. Sun, Solaris, and Netra are registered trademarks of Sun Microsystems. Linux is a registered trademark of Linus Torvalds. Adobe, Acrobat, Acrobat Reader are registered trademarks of Adobe Systems, Inc. CompactFlash is a trademark of SanDisk Corporation. Panduit is a registered trademark or Panduit Corporation. HyperTerminal is a registered trademark of Hilgraeve Inc. MOLEX is a registered trademark of Molex, Inc. Red Hat is a registered trademark of Red Hat, Inc. Intel is a registered trademark of Intel Corporation.Any trademarks, trade names, service marks, or service names owned or registered by any other company and used in this documentation are the property of their respective companies.Copyright 2010 Cisco and/or its affiliates. All rights reserved.30 International PlaceTewksbury, MA 01876978.851.1100Visit us at http://www.starentnetworks.comTABLE OF CONTENTSAbout This GuideConventions Used ..........................................................................................................................viiContacting Starent Networks ........................................................................................................viiiContacting Starent Networks Customer Support ....................................................................... ixProviding Documentation Feedback......................................................................................... ixChapter 1: Thresholding OverviewChapter 2: Verifying and Saving Your ConfigurationVerifying the Configuration .........................................................................................................2-1Feature Configuration ..............................................................................................................2-1Service Configuration ..............................................................................................................2-2Context Configuration .............................................................................................................2-3System Configuration ..............................................................................................................2-3Finding Configuration Errors..................................................................................................2-3Saving the Configuration ..............................................................................................................2-4Saving the Configuration on ST-series Platforms ...................................................................2-4Chapter 3: AAA ThresholdsSaving Your Configuration..........................................................................................................3-2AAA Accounting Message Archive Size Thresholds ..................................................................3-3Configuring AAA Accounting Message Archive Size Threshold..........................................3-3AAA Accounting Failure Thresholds ...........................................................................................3-4Configuring AAA Accounting Failure Threshold ...................................................................3-4AAA Accounting Failure Rate Thresholds..................................................................................3-5Configuring AAA Accounting Failure Rate Threshold..........................................................3-5AAA Authentication Failure Thresholds.....................................................................................3-6Configuring AAA Authentication Failure Threshold ..............................................................3-6AAA Authentication Failure Rate Thresholds .............................................................................3-7Configuring AAA Authentication Failure Rate Threshold.....................................................3-7AAA Request Message Retry Rate Thresholds...........................................................................3-8Configuring AAA Request Message Retry Rate Threshold ....................................................3-8AAA Manager Request Queue Threshold ....................................................................................3-9Configuring AAA Manager Request Queue Threshold..........................................................3-9Chapter 4: ASN GW Service ThresholdsSaving Your Configuration..........................................................................................................4-2System-Level ASN GW Service Thresholds...............................................................................4-3Configuring System-level ASN GW Service Thresholds.......................................................4-3Generally Available03-31-2010iiChapter 5: Call Setup ThresholdsSaving Your Configuration .......................................................................................................... 5-2Call Setup Thresholds.................................................................................................................. 5-3Configuring Call Setup Thresholds ......................................................................................... 5-3Call Setup Failure Thresholds ...................................................................................................... 5-4Configuring Call Setup Failure Thresholds............................................................................ 5-4RP Setup Failure Rate Thresholds............................................................................................... 5-5Configuring RP Setup Failure Rate Thresholds ...................................................................... 5-5PPP Setup Failure Rate Thresholds............................................................................................. 5-6Configuring PPP Setup Failure Rate Thresholds .................................................................... 5-6No Resource Call Reject Thresholds........................................................................................... 5-7Configuring No Resource Call Reject Thresholds .................................................................. 5-7Chapter 6: CPU Resource ThresholdsSaving Your Configuration .......................................................................................................... 6-210-second Average of Total PAC/PSC CPU Utilization Thresholds.......................................... 6-3Configuring 10-second Average of Total PAC/PSC CPU Utilization Thresholds ................. 6-3PAC/PSC CPU Available Memory Thresholds ........................................................................... 6-4Configuring PAC/PSC CPU Available Memory Thresholds................................................. 6-4PAC/PSC CPU Load Thresholds ................................................................................................. 6-5Configuring PAC/PSC CPU Load Thresholds ........................................................................ 6-5PAC/PSC CPU Memory Usage Thresholds................................................................................ 6-6Configuring PAC/PSC CPU Memory Usage Thresholds ....................................................... 6-6PAC/PSC CPU Session Throughput Thresholds ......................................................................... 6-7Configuring PAC/PSC CPU Session Throughput Thresholds ................................................ 6-7PAC/PSC CPU Utilization Thresholds ........................................................................................ 6-8Configuring PAC/PSC CPU Utilization Thresholds ............................................................... 6-8SPC/SMC CPU Memory Usage Thresholds ................................................................................ 6-9Configuring SPC/SMC CPU Memory Usage Thresholds...................................................... 6-9SPC/SMC CPU Utilization Thresholds..................................................................................... 6-10Configuring SPC/SMC CPU Utilization Thresholds ............................................................ 6-10ORBS Software Task CPU Usage Warning-Level Thresholds ................................................. 6-11Configuring ORBS Software Task CPU Usage Warning-Level Thresholds ........................ 6-11ORBS Software Task CPU Usage Critical-Level Thresholds ................................................... 6-12Configuring ORBS Software Task CPU Usage Critical-Level Thresholds .......................... 6-12Chapter 7: FA Service ThresholdsConfiguring FA Service Thresholds............................................................................................ 7-2Saving Your Configuration .......................................................................................................... 7-3Chapter 8: HA Service ThresholdsSaving Your Configuration .......................................................................................................... 8-2Context-Level HA Service Thresholds ........................................................................................ 8-3Configuring Context-Level HA Service Thresholds ............................................................... 8-3HA Service-Level HA Service Thresholds .................................................................................. 8-4Generally Available03-31-2010iiiConfiguring HA Service-Level HA Service Thresholds .........................................................8-4Chapter 9: Content Filtering ThresholdsConfiguring Content Filtering Thresholds...................................................................................9-2Enabling Thresholds ...........................................................................................................9-2Configuring Threshold Poll Interval ...................................................................................9-2Configuring Thresholds Limits ...........................................................................................9-2Saving Your Configuration..........................................................................................................9-3Chapter 10: IP Pool Utilization ThresholdsSaving Your Configuration........................................................................................................10-3Context-Level IP Pool and Group Thresholds...........................................................................10-4Configuring Context-Level IP Pool and Group Thresholds ..................................................10-4IP Address Pool-Level Thresholds .............................................................................................10-5Configuring IP Address Pool-Level Thresholds...................................................................10-5Chapter 11: Packet Processing ThresholdsSaving Your Configuration........................................................................................................11-2Filtered/Dropped Packet Thresholds ..........................................................................................11-3Configuring Filtered/Dropped Packet Thresholds .................................................................11-3Forwarded Packet Thresholds....................................................................................................11-4Configuring Forwarded Packet Thresholds ...........................................................................11-4Chapter 12: PDIF ThresholdsConfiguring PDIF Thresholds...............................................................................................12-1Saving Your Configuration........................................................................................................12-2Chapter 13: PDSN Service ThresholdsSaving Your Configuration........................................................................................................13-2Context-Level PDSN Service Thresholds ..................................................................................13-3Configuring Context-Level PDSN Service Thresholds .........................................................13-3PDSN Service-Level PDSN Service Thresholds.......................................................................13-4Configuring PDSN Service-Level PDSN Service Thresholds ..............................................13-4Chapter 14: Per-service Session ThresholdsSaving Your Configuration........................................................................................................14-2Per-PDSN Service Thresholds...................................................................................................14-3Configuring Per-PDSN Service Thresholds ..........................................................................14-3Per-HA Service Thresholds ........................................................................................................14-4Configuring Per-HA Service Thresholds..............................................................................14-4Per-GGSN Service Thresholds ...................................................................................................14-5Configuring Per-GGSN Service Thresholds.........................................................................14-5Per-LNS Service Thresholds ......................................................................................................14-6Configuring Per-LNS Service Thresholds .............................................................................14-6Generally Available03-31-2010ivPer-GPRS Service Thresholds................................................................................................... 14-7Configuring Per-GGSN Service Thresholds ......................................................................... 14-7Per-GPRS Service PDP Contexts Thresholds ............................................................................ 14-8Configuring Per-GPRS Service PDP Contexts Thresholds.................................................. 14-8Per-SGSN Service Thresholds ................................................................................................... 14-9Configuring Per-GGSN Service Thresholds ......................................................................... 14-9Per-SGSN Service PDP Contexts Thresholds......................................................................... 14-10Configuring Per-SGSN Service PDP Contexts Thresholds ................................................ 14-10Chapter 15: Port Utilization ThresholdsSaving Your Configuration ........................................................................................................ 15-2Receive Port Utilization Thresholds.......................................................................................... 15-3Configuring Receive Port Utilization Thresholds ................................................................. 15-3Transmit Port Utilization Thresholds ......................................................................................... 15-4Configuring Transmit Port Utilization Thresholds............................................................... 15-4High Port Activity Thresholds................................................................................................... 15-5Configuring High Port Activity Thresholds .......................................................................... 15-5Chapter 16: Subscriber ThresholdsSaving Your Configuration ........................................................................................................ 16-2Total Subscriber Thresholds...................................................................................................... 16-3Configuring Total Subscriber Thresholds ............................................................................. 16-3Active Subscriber Thresholds.................................................................................................... 16-4Configuring Active Subscriber Thresholds ........................................................................... 16-4Chapter 17: Session License Utilization ThresholdsConfiguring Session License Utilization Thresholds ................................................................. 17-2Saving Your Configuration ........................................................................................................ 17-3Chapter 18: SPC/SMC CompactFlash Memory Utilization ThresholdsConfiguring SPC/SMC CompactFlash Memory Utilization Thresholds .............................. 18-1Saving Your Configuration ........................................................................................................ 18-2Chapter 19: Total Session ThresholdsSaving Your Configuration ........................................................................................................ 19-2Total PDSN Session Thresholds ................................................................................................ 19-3Configuring Total PDSN Session Thresholds ....................................................................... 19-3Total GGSN Session Thresholds............................................................................................... 19-4Configuring Total GGSN Session Thresholds ...................................................................... 19-4Total GPRS Session Thresholds................................................................................................ 19-5Configuring Total GPRS Session Thresholds ....................................................................... 19-5Total GPRS PDP Contexts Thresholds ...................................................................................... 19-6Configuring Total GPRS PDP Context Thresholds .............................................................. 19-6Total HA Session Thresholds.................................................................................................... 19-7Generally Available03-31-2010vConfiguring Total HA Session Thresholds...........................................................................19-7Total HSGW Session Thresholds ...............................................................................................19-8Configuring Total HSGW Session Thresholds.....................................................................19-8Total LMA Session Thresholds ..................................................................................................19-9Configuring Total LMA Session Thresholds........................................................................19-9Total LNS Session Thresholds .................................................................................................19-10Configuring Total LNS Session Thresholds ........................................................................19-10Total MME Session Thresholds ...............................................................................................19-11Configuring Total MME Session Thresholds ......................................................................19-11Total P-GW Session Thresholds..............................................................................................19-12Configuring Total P-GW Session Thresholds .....................................................................19-12Total SGSN Session Thresholds..............................................................................................19-13Configuring Total SGSN Session Thresholds .....................................................................19-13Total SGSN PDP Contexts Thresholds ....................................................................................19-14Configuring Total SGSN PDP Context Thresholds............................................................19-14Total S-GW Session Thresholds..............................................................................................19-15Configuring Total S-GW Session Thresholds .....................................................................19-15Chapter 20: MME Service ThresholdsSaving Your Configuration........................................................................................................20-2System-Level MME Service Thresholds...................................................................................20-3Configuring System-level MME Service Thresholds...........................................................20-3Chapter 21:Network Address Translation ThresholdsConfiguring NAT Thresholds....................................................................................................21-2Enabling Thresholds .........................................................................................................21-2Configuring Threshold Poll Interval .................................................................................21-2Configuring Thresholds Limits .........................................................................................21-2Saving Your Configuration........................................................................................................21-3Chapter 22:Stateful Firewall ThresholdsConfiguring Stateful Firewall Thresholds ..................................................................................22-2Enabling Thresholds .........................................................................................................22-2Configuring Threshold Poll Interval .................................................................................22-2Configuring Thresholds Limits .........................................................................................22-2Saving Your Configuration........................................................................................................22-3IndexGenerally Available03-31-2010viABOUT THIS GUIDEThis section contains an overview of the information contained within this document. It lists conventions used in the documentation process. In addition, it provides information about contacting Starent Networks Corporation.This document provides description and configuration information on setting thresholds. Detailed information on individual threshold variables can be found in the Command Line Interface Reference.IMPORTANTThe information and instructions in this document assume that the system hardware has been fully installed and the installation was verified according to the instructions found in the System Installation Guide.Conventions UsedListed below are various conventions used throughout this documentation.Table 0-1 Icon Notice Type DescriptionInformation noteProvides information about important features or instructions.CautionAlerts you of potential damage to a program, device, or system.WarningAlerts you of potential personal injury or fatality. May also alert you of potential electrical hazards.Electro-Static Discharge (ESD)Alerts you to take proper grounding precautions before handling a product.Table 0-2 Typeface Conventions DescriptionText represented as a scr eendi spl ayThis typeface represents displays that appear on your terminal screen, for example:Logi n:Generally Available03-31-2010 viiiContacting Starent NetworksStarent Networks Corporation30 International PlaceTewksbury, MAUSA01876Telephone:978.851.1100Facsimile: 978.640.6825E-mail:[email protected] Visit us at:http://www.starentnetworks.com Text represented as commandsThis typeface represents commands that you enter, for example:show ip access-listThis document always gives the full form of a command in lowercase letters. Commands are not case sensitive.Text represented as a command variableThis typeface represents a variable that is part of a command, for example:show card slot_numberslot_number is a variable representing the desired chassis slot number.Text represented as menu or sub-menu namesThis typeface represents menus and sub-menus that you access within a software application, for example:Click the File menu, then click NewTable 0-3 Command Syntax Conventions Description{keyword or variable }Required keywords and variables are surrounded by grouped brackets. Required keywords and variables are those components that are required to be entered as part of the command syntax. [ keyword or variable ]Optional keywords or variables, or those that a user may or may not choose to use, are surrounded by square brackets.|With some commands there may be a group of variables, from which the user chooses one. These are called alternative variables and are documented by separating each variable with a vertical bar (also known as a pipe filter). Pipe filters can be used in conjunction with required or optional keywords or variables. For example:{nonce | timestamp }OR[ count number_of_packets | size number_of_bytes ]Table 0-2 Typeface Conventions DescriptionGenerally Available03-31-2010ixContacting Starent Networks Customer SupportStarent Networks' customer support program is designed to provide innovative customer support and superior service delivery. Our support program is based on the belief that our customers expect their wireless communications equipment vendor to not be merely a part of the vendor community, but also their trusted partner. To that end, Starent team members are prepared to listen, participate with you in growing your successful business, and work beside you to resolve any issue that may arise.You can expect to receive fast, accurate, and professional care every time you call on us.E-mail us at [email protected] mailing address is:30 International PlaceTewksbury, MA USA 01876Our shipping address is:200 Ames Pond DriveTewksbury, MA USA 01876IMPORTANTFor warranty and repair information, please be sure to include the Return Material Authorization (RMA) tracking number on the outside of the package.Providing Documentation FeedbackAt Starent Networks, we take great pride in the overall quality of our user documentation. Our Technical Communication team has strived to ensure the accuracy, completeness, and general usability of our documentation.To help us improve in our quest for quality, we need your help. Please e-mail us with any questions, comments, or suggestions at [email protected]. Should you find an error or omission in our documentation, please contact your Starent representative using the information in the section above, identifying the problem as a documentation issue.We look forward to continually improving the quality of our documentation with your help.Generally Available03-31-2010 xCHAPTER 1THRESHOLDING OVERVIEWThresholding on the system is used to monitor the system for conditions that could potentially cause errors or outage. Typically, these conditions are temporary (i.e. high CPU utilization, or packet collisions on a network) and are quickly resolved. However, continuous or large numbers of these error conditions within a specific time interval may be indicative of larger, more severe issues. The purpose of thresholding is to help identify potentially severe conditions so that immediate action can be taken to minimize and/or avoid system downtime.The following thresholding models are supported by the system: Alert: A value is monitored and an alert condition occurs when the value reaches or exceeds the configured high threshold within the specified polling interval. The alert is then generated and/or sent at the end of the polling interval.In the example shown in Figure1-1, this model generates alerts during period 2, 3, and 5 at the point where the count exceeded HT. Alarm: Both high and low thresholds are defined for a value. An alarm condition occurs when the value reaches or exceeds the configured high threshold within the specified polling interval. The alert is then generated and/or sent at the end of the polling interval.The alarm is cleared at the end of the first interval where the measured value is below the low threshold.In the example shown in Figure1-1, this model generates an alarm during period 2 when the count exceeds HT. A second alarm is generated in period 6 when the count falls beneath LT. The second alarm indicates a clear condition.Thresholding Overview Generally Available03-31-2010 1-2Figure 1-1 Thresholding Model ExampleIMPORTANTNote that for certain values, the alert or alarm serves to warn of low quantities (i.e. memory, session licenses, etc.). In these cases, the low threshold is the condition that must be met or exceeded within the polling interval to generate the alert or alarm. Once the high threshold is exceeded during an interval, the low quantity condition is cleared.Thresholding functionality on the system can be configured to monitor the following values: AAA: Archive size Number of authentication failures Authentication failure rate Number of accounting failures Accounting failure rate Retry rate AAA Manager request queue usage ASN GW Service: Number of ASN GW Authentication failures Number of ASN GW hand-off denials Maximum number of EAP retries Number of network entry denials Number of Network Access Identifier (NAI) in R6 message ASN GW timeout duration during session setup ASN GW session timeout duration 12 34 567HTLTCountTimeHT =High ThresholdLT =Low Threshold Generally Available03-31-20101-3 FA Service registration reply errors HA Service: Call setup rate Registration Reply, Re-registration Reply, and De-registration Reply errors PDSN Service: Call setup rate A11 Messages failed and discarded PPP send packets discarded Call setup: Number of calls setup Number of call setup failures RP setup failure rate PPP setup failure rate Number of calls rejected due to no processing resources being available MME Service Number of MME Authentication failures Number of MME Session Attachment failures Number of MME sessions PAC/PSC CPU resource availability: 10 second sample utilization Percent utilization Available memory Load Memory usage Session throughput SPC/SMC CPU resource availability: Memory usage Percent utilization ORBS software task utilization IP address pool utilization Licensed session utilization Packet processing: Number of packets filtered/dropped Number of packets forwarded to CPU Per-service session count Port utilization: High activity Transmit utilizationThresholding Overview Generally Available03-31-2010 1-4 Receive utilization Subscriber number: Total number Number active Total session count SPC/SMC CompactFlash memory utilizationThresholding reports conditions using one of the following mechanisms: SNMP traps: SNMP traps have been created that indicate the condition (high threshold crossing and/or clear) of each of the monitored values. Complete descriptions and other information pertaining to these traps is located in the starentMIB(8164).starentTraps(2) section of the SNMP MIB Reference.The generation of specific traps can be enabled or disabled on the system allowing you to view only those traps that are most important to you. Logs: The system provides a facility called threshold for which active and event logs can be generated. As with other system facilities, logs are generated Log messages pertaining to the condition of a monitored value are generated with a severity level of WARNING.Refer to the System Administration Guide for additional information on system logging functionality. Alarm System: High threshold alarms generated within the specified polling interval are considered outstanding until a the condition no longer exists and/or a condition clear alarm is generated.Outstanding alarms are reported to through the systems alarm subsystem and are viewable through the systems CLI.Table1-1 indicates the reporting mechanisms supported by each of the above models.Table 1-1 Thresholding Reporting Mechanisms by ModelModel SNMP Traps Logs Alarm SystemAlert X XAlarm X X XCHAPTER 2VERIFYING AND SAVING YOUR CONFIGURATIONThis chapter describes how to verify and save the system configuration. Verifying the Configuration You can use a number of commands to verify the configuration of your feature, service, or system. Many are hierarchical in their implementation and some are specific to portions of or specific lines in the configuration file.Feature ConfigurationIn many configurations, specific features are set and need to be verified. Examples include APN and IP address pool configuration. Using these examples, enter the following commands to verify proper feature configuration:show apn allThe output displays the complete configuration for the APN. In this example, an APN called apn1 is configured.accesspoi nt name( APN) : apn1aut hent i cat i oncont ext : t estpdpt ype: i pv4Sel ect i onMode: subscr i bedi psour cevi ol at i on: Checkeddr opl i mi t : 10account i ngmode: gt ppNoear l yPDUs: Di sabl edmax- pr i mar y- pdp- cont ext s: 1000000t ot al - pdp- cont ext s: 1000000pr i mar ycont ext s: not avai l abl et ot al cont ext s: not avai l abl el ocal i p: 0. 0. 0. 0pr i mar ydns: 0. 0. 0. 0secondar ydns: 0. 0. 0. 0pppkeepal i veper i od: 0pppmt u: 1500absol ut et i meout : 0i dl et i meout : 0l ongdur at i ont i meout : 0l ongdur at i onact i on: Det ect i oni pheader compr essi on: vjdat acompr essi on: st acmppcdef l at ecompr essi onmode: nor malmi ncompr essi onsi ze: 128i pout put access- gr oup: i pi nput access- gr oup:pppaut hent i cat i on:al l ow noaut hent i cat i on: Enabl edi msi aut hent i cat i on: Di sabl edVerifying and Saving Your Configuration Generally Available03-31-2010 2-2Enter the following command to display the IP address pool configuration:show ip poolThe output from this command should look similar to the sample shown below. In this example, all IP pools were configured in the isp1 context.cont ext : i sp1:+- - - - - Type: ( P) - Publ i c( R) - Pr i vat e| ( S) - St at i c( E) - Resour ce|| +- - - - St at e: ( G) - Good( D) - Pendi ngDel et e( R) - Resi zi ng| || | ++- - Pr i or i t y: 0. . 10( Hi ghest ( 0) . . Lowest ( 10) )| | | || | | | +- Busyout : ( B) - Busyout conf i gur ed| | | | || | | | |vvvvvPool NameSt ar t Addr essMask/ EndAddr essUsedAvai l- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -PG00i psec12. 12. 12. 0255. 255. 255. 00254PG00pool 110. 10. 0. 0255. 255. 0. 0065534SG00vpnpool 192. 168. 1. 250192. 168. 1. 25405Tot al Pool Count : 5IMPORTANTMany features can be configured on the system. There are show commands specifically for these features. Refer to theCommand Line Interface Reference for more information.Service ConfigurationVerify that your service was created and configured properly by entering the following command:show The output is a concise listing of the service parameter settings similar to the sample displayed below. In this example, a P-GW service called pgw1 is configured.Ser vi cename: pgw1Ser vi ce- I d: 1Cont ext : t est 1St at us: STARTEDRest ar t Count er : 8EGTPSer vi ce: egt p1LMASer vi ce: Not def i nedSessi on- Del et e- Del ayTi mer : Enabl edSessi on- Del et e- Del ayt i meout : 10000( msecs)PLMNI DLi st : MCC: 100, MNC: 99Newcal l Pol i cy: NoneGenerally Available03-31-2010 Verifying the Configuration2-3Context ConfigurationVerify that your context was created and configured properly by entering the following command:show context name The output shows the active context. Its ID is similar to the sample displayed below. In this example, a context named test1 is configured.Cont ext NameCont ext I DSt at e- - - - - - - - - - - - - - - - - - - - - - - - - -t est 12Act i veSystem ConfigurationVerify that your entire configuration file was created and configured properly by entering the following command:show configurationThis command displays the entire configuration including the context and service configurations defined above. Finding Configuration ErrorsIdentify errors in your configuration file by entering the following command:show configuration errorsThis command displays errors it finds within the configuration. For example, if you have created a service named service1, but entered it as srv1 in another part of the configuration, the system displays this error.You must refine this command to specify particular sections of the configuration. Add the section keyword and choose a section from the help menu:show configuration errors section ggsn-serviceorshow configuration errors section aaa-configIf the configuration contains no errors, an output similar to the following is displayed:####################################################################################### Di spl ayi ngGl obal AAA- conf i gur at i oner r or s######################################################################################Tot al 0er r or ( s) i nt hi ssect i on!Verifying and Saving Your Configuration Generally Available03-31-2010 2-4Saving the ConfigurationSave system configuration information to a file locally or to a remote node on the network. You can use this configuration file on any other systems that require the same configuration.Files that you save locally can be stored in the SPCs/SMCs CompactFlash or on an installed PCMCIA memory card on the SPC/SMC. Files that you save to a remote network node can be transmitted via FTP or TFTP.Saving the Configuration on ST-series PlatformsThese instructions assume that you are at the root prompt for the Exec mode:[ l ocal ] host_name#To save your current configuration, enter the following command:save configuration url [-redundant] [-noconfirm] [showsecrets] [verbose]Keyword/Variable DescriptionurlSpecifies the path and name to which the configuration file is to be stored. url may refer to a local or a remote file. url must be entered using one of the following formats: {/flash | /pcmcia1 | /pcmcia2 }[ /dir ] /file_name file:/{/flash | /pcmcia1 | /pcmcia2 }[ /dir ] /file_name tftp://{ipaddr | host_name [ :port# ] }[ /dir ] /file_name ftp://[ username [ :pwd ] @ ] {ipaddr | host_name }[ :port# ] [ /dir ] /file_name sftp://[ username [ :pwd ] @ ] {ipaddr | host_name }[ :port# ] [ /dir ] /file_name/flash corresponds to the CompactFlash on the SPC/SMC./pcmcia1 corresponds to PCMCIA slot 1./pcmcia2 corresponds to PCMCIA slot 2.ipaddr is the IP address of the network server.host_name is the network servers hostname.port# is the network servers logical port number. Defaults are: tftp: 69 - data ftp: 20 - data, 21 - control sftp: 115 - dataNote: host_name can only be used if the networkconfig parameter is configured for DHCP and the DHCP server returns a valid nameserver.dxusername is the username required to gain access to the server, if necessary.pwd is the password for the specified username if required./dir specifies the directory where the file is located if one exists./file_name specifies the name of the configuration file to be saved.Note: Name configuration files with a .cfg extension.Generally Available03-31-2010 Saving the Configuration2-5IMPORTANTThe -redundant keyword is only applicable when saving a configuration file to local devices.This command does not synchronize the local file system. If you have added, modified, or deleted other files or directories to or from a local device for the active SPC/SMC, then you must synchronize the local file system on both SPCs/SMCs.EXAMPLE(S)To save a configuration file called system.cfg to a directory that was previously created called cfgfiles on the SPCs/SMCs CompactFlash, enter the following command:save configuration /flash/cfgfiles/system.cfgTo save a configuration file called simple_ip.cfg to a directory called host_name_configs using an FTP server with an IP address of 192.168.34.156 on which you have an account with a username of administrator and a password of secure, use the following command:save configuration ftp://administrator:[email protected]/host_name_configs/simple_ip.cfgTo save a configuration file called init_config.cfg to the root directory of a TFTP server with a hostname of config_server, enter the following command:save configuration tftp://config_server/init_config.cfg-redundantOptional: This keyword directs the system to save the CLI configuration file to the local device, defined by the url variable, and then automatically copies the file to the like device on the standby SPC/SMC, if available.Note: This keyword works only for like local devices that are located on both the active and standby SPCs/SMCs. For example, if you save the file to the /pcmcia1 device on the active SPC/SMC, that same type of device (a PC-Card in Slot 1 of the standby SPC/SMC) must be available. Otherwise, a failure message is displayed.Note: If saving the file to an external network (non-local) device, the system disregards this keyword.-noconfirmOptional: Indicates that no confirmation is to be given prior to saving the configuration information to the specified filename (if one was specified) or to the currently active configuration file (if none was specified).showsecretsOptional: This keyword causes the CLI configuration file to be saved with all passwords in plain text, rather than their default encrypted format.verbose Optional: Specifies to display every parameter that is being saved to the new configuration file.Keyword/Variable DescriptionVerifying and Saving Your Configuration Generally Available03-31-2010 2-6CHAPTER 3AAA THRESHOLDSThreshold monitoring can be enabled for the AAA-related values described in the following table.Value Description To configure, go to section:Archive sizeEnables the generation of alerts or alarms based on the number of AAA (RADIUS and/or GTPP) accounting messages archived during the polling interval.AAA Accounting Message Archive Size ThresholdsAccounting FailuresEnables the generation of alerts or alarms based on the number of failed AAA accounting requests that occur during the polling interval.AAA Accounting Failure ThresholdsAccounting Failure RateEnables the generation of alerts or alarms based on the percentage of AAA accounting requests that failed during the polling interval.AAA Accounting Failure Rate ThresholdsAuthentication FailuresEnables the generation of alerts or alarms based on the number of failed AAA authentication requests that occur during the polling interval.AAA Authentication Failure ThresholdsAuthentication Failure RateEnables the generation of alerts or alarms based on the percentage of AAA authentication requests that failed during the polling interval.AAA Authentication Failure Rate ThresholdsRetry RateEnables the generation of alerts or alarms based on the percentage of AAA requests (both accounting and authentication) that were re-tried during the polling interval.AAA Request Message Retry Rate ThresholdsAAA Manager Request Queue UsageEnables the generation of alarms or alerts when the AAA Manager request queue usage reaches a specified percentage level.AAA Manager Request Queue ThresholdAAA Thresholds Generally Available03-31-2010 3-2Saving Your ConfigurationWhen you configure thresholds they are not permanent unless you save the changes. When you have completed configuring thresholds, save your configuration as described in the Saving Your Configuration chapter.Generally Available03-31-2010 AAA Accounting Message Archive Size Thresholds3-3AAA Accounting Message Archive Size ThresholdsIn the event that the system cannot communicate with configured AAA accounting servers (RADIUS or CGFs), either due to the server being busy or loss of network connectivity, the system buffers, or archives, the accounting messages. Accounting message archive size thresholds generate alerts or alarms based on the number of AAA accounting messages buffered in the archive during the specified polling interval. Accounting requests are counted for all AAA accounting servers that the system is configured to communicate with.Alerts or alarms are triggered for accounting failures based on the following rules: Enter condition: Actual number of archived messages High Threshold Clear condition: Actual number of archived messages