Cisco BTS 10200 Softswitch Operations
and Maintenance Guide
Release 6.0.1
February 18, 2010
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-16000-07
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1005R)
Cisco BTS 10200 Softswitch Operations and Maintenance Guide
Operator Interface2-10
Vulnerabilities in H.323 Message Processing2-11
Authentication, Authorization and Accounting Support2-11
Pluggable Authentication Module Support2-12
User Security Account Management2-12
OL-16000-06
Sun Microsystems Configurations2-12
Solaris OS Patches2-14
Trace Normal Forms (TNF) Support2-14
XML Libraries2-15
Device GLM Patch2-15
Security CE Patch2-15
Security Bad_Trap Patch2-15
Java SDK Patches2-15
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
iii
Contents
CHAPTER
3Monitoring and Backing Up the BTS3-1
Introduction3-1
Detecting and Preventing BTS Congestion3-1
Monitoring BTS Hardware3-1
Checking BTS System Health3-2
Using BTS System-Health Reports3-3
Checking BTS System Time3-4
Checking the OS Log of Each Host Machine3-4
Checking Disk Mirroring on Each Host Machine3-5
CA/FS Side A3-5
CA/FS Side B3-5
EMS Side A3-6
EMS Side B3-6
Creating Reports for Nonrural Primary and Intermediate Carriers3-11
Creating Reports for Rural Primary and Intermediate Carriers3-12
Backing Up the Software Image3-15
Full Database Auditing3-16
Checking Shared Memory3-16
From CA/FS Side A3-16
From CA/FS Side B3-17
Backing Up the Full BTS3-18
Backing Up the CA/FS3-18
Backing up the EMS/BDMS3-19
Backing up the EMS Database3-20
Using FTP to Setup File Transfer3-21
Using SFTP to Setup File Transfer3-22
iv
Archiving Your Database3-24
Examining Heap Usage3-25
Checking the DNS Server3-25
Log Archive Facility (LAF)3-26
Secure Transfer of Files3-26
Other Capabilities3-27
Provisioning LAF3-27
Enabling LAF Process3-27
Setup Non-Interactive SSH Login to External Archive Server3-28
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-06
LAF Alarm Information3-29
Moving Core Files3-29
Contents
CHAPTER
CHAPTER
4Operating the BTS4-1
Introduction4-1
Managing Subscribers4-2
Viewing Calls4-6
Using Status and Control Commands4-7
Using Show and Change Commmands4-9
Using ERAC Commands4-9
Managing Transactions4-12
Scheduling Commands4-13
Limitations4-13
5Managing External Resources5-1
Introduction5-1
Viewing BTS System-Wide Status5-1
Managing Trunk Groups and Trunks5-3
Managing Subscriber Terminations5-12
Managing Gateways5-16
CHAPTER
Managing Other External Resources5-18
Learning External Resource Dependencies5-20
GigE Support5-28
Prerequisites5-28
Provisioning the GigE Interface5-28
6Using BTS Measurements6-1
Introduction6-1
Using Measurements6-1
Learning the Measurement Types6-2
ISDN Measurements6-2
Call Processing Measurements6-5
MGCP Adapter Measurements6-12
DQoS Measurements6-13
SIP Measurements6-13
Service Interaction Manager Measurements6-16
POTS Local FS Measurements6-16
OL-16000-06
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
v
Contents
POTS Application Server Measurements6-22
POTS Miscellaneous FS Measurements6-22
POTS Class of Service FS Measurements6-24
POTS Screen List Editing FS Measurements6-25
POTS Customer Originated Trace FS Measurements6-25
POTS Automatic Callback, Recall, and Call Return Measurements6-26
POTS Limited Call Duration (Prepaid/Postpaid) with RADIUS Interface to AAA Measurements6-28
POTS Call Forwarding Combination Measurements6-28
AIN Services FS Measurements6-29
SCCP Protocol Measurements6-31
TCAP Protocol Measurements6-33
SUA Measurements6-37
M3UA Protocol Measurements6-39
SCTP Measurements6-41
Installing the FIM/XML File Using the Offline FIM/XML ToolB-7
FIM/XML File and Shared iFC FileB-9
Features Defined in FIM/XML and Shared iFCB-9
Provisioning iFCB-10
Defining a New feature as the Originating FeatureB-10
Defining a VSCB-10
Defining the SIP Trigger ProfileB-10
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
vii
Contents
Feature ConfigurationB-10
Subscriber-Sip-Trigger-ProfileB-11
Service-IdB-11
Subscriber-Service-ProfileB-11
Feature Restrictions and LimitationsB-11
viii
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-06
Introduction
Preface
Revised: February 18, 2010, OL-16000-07
This document is the Operations and Maintenance Guide for the Cisco BTS 10200 Softswitch, Release
6.0.1.
Organization
This guide has the following chapters:
• Chapter 1, “Starting and Shutting Down the BTS”—Tells you how to start up and shut down the BTS
• Chapter 2, “Managing BTS Users and Commands Using EMS”—Describes operator interfaces to
• Chapter 3, “Monitoring and Backing Up the BTS”—Includes overall BTS maintenance strategies
• Chapter 4, “Operating the BTS”—Tells you how to operate the BTS
• Chapter 5, “Managing External Resources”—Tells you how to manage external resources
• Chapter 6, “Using BTS Measurements”—Describes BTS traffic measurements and tells you how to
• Chapter 7, “Using the BTS SNMP Agent”—Explains how to use the Simple Network Management
• Appendix A, “Feature Tones”—Explains special tones the BTS supports for subscriber and operator
• Appendix B, “FIM/XML”—Explains the Feature Interaction Module/Extensible Markup Language
the BTS and how to manage access and users
provisioned on the BTS using administrative (ADM) commands
use them
Protocol (SNMP) agent
features
(FIM/XML) feature.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
ix
Introduction
Document Change History
This table provides the revision history for the Cisco BTS 10200 Softswitch Operations and Maintenance
Guide, Release 6.0.x.
Table 1Revision History
Version NumberIssue DateStatusReason for Change
OL-16000-0131 Mar 2008 InitialInitial document for Release 6.0
OL-16000-0231 July 2008 UpdatedAdded Change Number instructions for
OL-16000-0318 Nov 2008 RevisedAdded keepalive note to Chapter 5 and
OL-16000-0411 Dec 2008 RevisedUpdated the “Managing Trunk Groups and
OL-16000-0521 July 2009 RevisedAdded the “Enabling NMS to Query/Poll
OL-16000-0625 Sep 2009 Revised
Preface
subscribers.
updated the change announcement and
change subscriber directory number
information in Chapter 4.
Trunks” section on page 5-3.
Solaris SNMP Agent” section on page 7-6.
• Added the “Log Archive Facility (LAF)”
section on page 3-26.
• Added a note in Chapter 2.
• Changed all the references of workgroup
to work-group in all CLI examples.
• Updated the “Returnable Operational
States” Table in “Managing External
Resources” chapter.
OL-16000-0718 Feb 2010 Revised
• Added the “Log Archive Facility (LAF)”
section on page 3-26.
• Added following commands in the
chapter “Managing External
Resources”:
–
report aggr
–
report mgw
• Added the following command in the
chapter “Operating the BTS”
–
report subscriber
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and
revised Cisco technical documentation, at:
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
x
OL-16000-07
Preface
Introduction
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
xi
Introduction
Preface
xii
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Starting and Shutting Down the BTS
Revised: February 18, 2010, OL-16000-07
Introduction
This chapter tells you how to start up and shut down the BTS.
Meeting Power Requirements
To meet high availability requirements:
• Do not have common parts in the power feeds to the redundant hardware that could be a common
single point of failure.
• Use uninterruptible power supply (UPS) for both AC and DC systems. It must be designed to support
system operation through any possible power interruption. Power must have battery backup to
maintain service in the event of commercial power failure (both power supplies of the redundant pair
must be able to do this).
CHAP T ER
1
• For AC-powered installations have two separate (redundant) circuits. Source AC circuits from
separate transformer phases on separate breakers so a single breaker trip does not disable both.
• For DC-powered installations have power from two separate dedicated DC branches (redundant A
and B feeds) for each DC-powered BTS.
Starting BTS Hardware
The time it takes to complete this procedure varies with system type and database size. System types
include:
• EMS—Element Management System
• BDMS—Bulk Data Management System
• CA—Call Agent
• FS—Feature Server
Step 1Ensure all power cables connect to the correct ports.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
1-1
Shutting Down BTS Hardware
Step 2Plug in Catalyst switch routers.
Step 3Power on EMS/BDMS hosts A and B.
Step 4Power on CA/FS hosts A and B.
Shutting Down BTS Hardware
Step 1Ensure CA side A and EMS side A are active.
Step 2Ensure CA side B and EMS side B EMS are standby.
Step 3Log into CA side A and B and EMS side A and B using Secure Shell (SSH).
Step 4Shut down the system in order:
1. EMS side B
2. CA side B
3. CA side A
4. EMS side A
Step 5To begin platform shutdown:
>platform stop all
Chapter 1 Starting and Shutting Down the BTS
Step 6When #> returns, enter nodestat to ensure the operating system is ready for shutdown.
Step 7To shut down the servers, enter one of the following commands for each node (Sun Microsystems
recommends both as graceful shutdowns).
>shutdown -i5 -g0 -y
Or:
>sync;sync; init5
Step 8To power off primary and secondary CAs and FSs find the switch to the left of the LEDs and flip it to
OFF.
Step 9When the fans stop, release the switch to neutral.
Step 10To power off primary and secondary EMSs find the switch to the left of the LEDs and flip it to OFF.
Step 11When the fans stop, release the switch to neutral.
Step 12To power off the side, unplug them.
Starting BTS Software
BTS automatically starts when you power on the server. Repeat this procedure for each server.
1-2
Step 1Enter nodestat.
Step 2Log in as root.
Step 3Enter platform start.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 1 Starting and Shutting Down the BTS
Step 4Once all components start, enter nodestat to ensure proper startup.
Starting BTS Software
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
1-3
Starting BTS Software
Chapter 1 Starting and Shutting Down the BTS
1-4
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Introduction
CHAP T ER
2
Managing BTS Users and Commands Using EMS
Revised: February 18, 2010, OL-16000-07
This chapter describes operator interfaces to the BTS and how to manage access and users.
The Element Management System (EMS) database holds up to 256 logins and up to 50 active user
sessions.Using the command line interface (CLI) you can locally connect to the EMS in an interactive
session.The EMS system administrator can:
• Add a new user.
• Assign a user’s privilege level—10 is for the system administrator. BTS has predefined user
accounts:
UsernamePermission
btsadminbtsadminlike MAINT shell user—MAINT shell is an enhanced CLI
interface and does not log off an idle user)
secadminsecadminlike MAINT shell user
btsuserbtsuserlower access permissions than btsadmin and secadmin, good for
generic provisioning access
• Reset a user’s password.
• Enter a description for each security class and privilege level.
• Manage security log reporting.
Logging into the EMS Using CLI
SSH is a way to access the BTS CLI or maintenance (MAINT) modes. SSH provides encrypted
communication between a remote machine and the EMS/CA for executing CLI or MAINT commands.
The SSH server runs on EMSs and CAs. To connect the client and server sides run the secure shell
daemon (SSHD). With SSH, new users must enter a new password and reenter that password during the
first login. In future logins they are prompted once for a password only.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-1
Managing Users
Chapter 2 Managing BTS Users and Commands Using EMS
The “ciscouser” login is a high-level security login for TAC and other BTS support personnel that
restricts access to certain commands. Anyone else trying to execute such commands receives an error
message.
After installation, on the EMS, the system prompts you to change the passwords of root, btsadmin, btsuser and calea if they have default passwords. On the CA, the system prompts you to change the
passwords of root if it has default password. There are no default passwords for Operations,
Administration and Maintenance applications.
When logging in for the first time system administrators log in as
btsadmin). Change the password.
Step 1To log in from the client side for the first time: sshbtsadmin@<ipaddress>.
NoteIf you are logged in to the system as root, enter: btsadmin@0
btsadmin (the default password is
On the first SSH login from the client side, expect a message like this:
The authenticity of host [hostname] can't be established.
Key fingerprint is 1024 5f:a0:0b:65:d3:82:df:ab:42:62:6d:98:9c:fe:e9:52.
Are you sure you want to continue connecting (yes/no)?
Step 2Enter yes.
The password prompt appears, now all communications are encrypted.
Step 3Enter your password.
The system responds with a CLI> prompt. You can now send commands to the EMS.
Step 4Enter provisioning commands.
Step 5To log off, enter exit .
Managing Users
You must have a user privilege level of 9 or higher to add, show, change, or delete a user.
CautionDo not add, change, or delete username root, this prevents proper EMS access.
Table 2-1Managing Users
TaskSample Command
Adding a user
Viewing a usershow user name=UserABC;
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-2
1. add user name=UserABC; command-level=9; warn=10;
Chapter 2 Managing BTS Users and Commands Using EMS
Table 2-1Managing Users (continued)
TaskSample Command
Viewing user activityshow ems;
Changing a userchange user name=UserABC; command-level=1;
Deleting a userdelete user name=UserABC;
Changing a user’s password
Managing Users
work-groups=somegroup;
You cannot delete optiuser.
reset password name=username; days-valid=<number of days the
new password will be valid>; warn=<number of days before
password expiration to warn user>;
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-3
Managing Users
Chapter 2 Managing BTS Users and Commands Using EMS
Table 2-1Managing Users (continued)
TaskSample Command
Blocking an active user1. Select operation mode:
• MAINTENANCE—(default) for regular maintenance
• UPGRADE—for upgrades
2. block session terminal=USR16;
NoteYou cannot block the session of a user with higher privileges
than yours.
Prevent BTS provisioning during an upgrade or maintenance window
from the following interfaces:
• CLI
• FTP
• CORBA
• SNMP
NoteThe software will support blocking HTTP interfaces in a
future release.
If you block provisioning before performing an SMG restart or EMS
reboot, blocking is still enforced when these applications return to
in-service state.
There are two levels of blocking:
• PROVISION—Prevents all provisioning commands from
executing
• COMPLETE—Prevents all commands from executing
Only terminal type MNT users can use these blocking and unblocking
commands. MNT users are never blocked. MNT users issue these
commands from either active or standby EMS.
A blocking command applies to all non-MNT users on terminals on
either active or standby EMS. Commands do not execute for:
• Logged-in users
• Users who login after the block command
Commands are not queued for execution after unblock. The CLI user
prompt changes when blocked, notifying the user their commands will
not execute.
Unblocking a user
unblock session terminal=USR16;
NoteYou cannot unblock the session of a user with higher
privileges.
Resetting a user’s idle timeIdle time is how many minutes (1-30) a user can be idle before being
logged off the BTS.
change session idle-time=30;
Stopping a user’s session
stop session terminal=USR16;
2-4
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 2 Managing BTS Users and Commands Using EMS
NoteAll commands should be assigned to a work-group. If a command is not assigned to a work-group, a user
will able to execute that command, which is not recommended. You can also assign users and the
commands to multiple work-groups.
Managing Commands
Each command (verb-noun combination) has a security class of 1-10; 1 is lowest, 10 is highest. Each
time a user enters a command, the system compares the user’s privilege level to the command’s security
class. EMS denies the command if the user level is less than the command level.
The Command Level (command-level) table shows the 10 command security classes. BTS has the
following presets:
• 1 (lowest level)
• 5 (mid-level)
• 10 (highest level)—These commands require a system administrator with a security level of 10 to
execute.
Managing Commands
Table 2-2Managing Commands
TaskSample Command
Viewing a command’s security class
Adding a description to a command’s
security class
show command-level id=10;
change command-level id=10; description=This is
the highest level administration access;
Changing a command’s privilege levelchange command-table noun=mgw; verb=add;
sec-level=9;
Resetting a command’s privilege levelreset command-table noun=mgw; verb=add;
Viewing security summary reports In a web browser enter https:// <ems ip addr>.
OL-16000-07
This chapter details the behaviors and attributes of the various security packages in the BTS 10200. The
sources for the items are derived from many dynamic sources. Included in these sources are security
bulletins from third-party vendors to the BTS 10200 as well as security agencies and open source
organizations.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-5
Adapter and User Security
104705
Cisco BTS 10200
Kernel parameter tuning
User password control and
command authorization
UNIX services
(for example
Apache and SSH)
User authentication and authorization
BTS applications and third-party software
Solaris kernel and IP stack
OSS Network
NMS/NOC User Access for OAM&P
VoIP Network
Gateway Access for IAD or PSTN
Security is an important part of the BTS 10200. The BTS 10200 has interfaces to customer premise
equipment (CPE) as well as northbound Operations Support System (OSS) interfaces. All of these
interfaces are subject to attacks. In addition, users who are allowed onto the BTS 10200 can also find
ways to exploit applications that can lead to service-affecting situations. Therefore, many precautions
are taken to ensure the solidity of the BTS 10200 defenses while avoiding a system that is difficult to
manage.
Figure 2-1BTS 10200 Access and Related Security
Chapter 2 Managing BTS Users and Commands Using EMS
Adapter and User Security
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-6
This section describes requirements that generally involve adapter and user level of security. In the BTS
10200, adapters are any external, northbound interfaces of the BTS 10200. However, some extrapolated
requirements involve adapter technology based on the current deployment:
• Support termination of a session once a provisionable inactivity timeout has occurred. An event
report is issued upon each timeout expiry. The inactivity time ranges from 10 to 30 minutes.
• Restrict access as “root” to the BTS 10200 in all cases except Cisco TAC and customer
“administrator”. This is a broad statement that includes the addition of command-line interface
(CLI) commands to help manage the system. In addition, UNIX services are restricted to harden the
operating system (OS). The service restriction is listed in the Solaris OS Security and BTShard
Package section. The process of restricting root access is an ongoing process.
• Use of “sudo" is acceptable and the formal Sun-built and packaged version is located in
/opt/sfw/bin/.
OL-16000-07
Chapter 2 Managing BTS Users and Commands Using EMS
Solaris OS Security and BTShard Package
This section details the security packages for the BTS 10200 OS. These packages are automatically
installed at installation. These packages are derived from both Sun Microsystems security bulletins and
Cisco internal policies for safety of the OS and its applications. All services can be reactivated for the
lifetime of the current kernel instance. All settings are reset on reboot of the kernel. These settings are
contained in the BTShard Solaris package delivered with the BTS 10200.
• Remove unnecessary UNIX systems services. These services are listed below. Management of these
facilities must allow for each service to be enabled or disabled on an individual basis. This service
management must also be accomplished through the BTS 10200 adapter interface.
–
FTP—FTP server is disabled and SFTP (Secure FTP) should be used. This impacts the Bulk
Data Provisioning interface. It does not impact the Billing Bulk Data transfer. The FTP client
code will still be available on the EMS node.
–
Telnet—This terminal protocol is disabled and SSH (Secure Shell) should be used. The telnet
server and client code are still available on the EMS node.
–
Echo—This service is to be disabled. This capability has been replaced with Internet Control
Message Protocol (ICMP) “ping” facilities.
–
Discard—This service is to be disabled.
Solaris OS Security and BTShard Package
–
Printer—This service is to be disabled. No printer services are supplied in the BTS 10200
product description.
–
Daytime—This service is to be disabled.
–
Chargen—This service is to be disabled.
–
SMTP—This service is to be disabled.
–
Time—This service is to be disabled.
–
Finger—This service is to be disabled. No network user facilities are required. The BTS 10200
tracks users internally and on a single BTS basis.
–
Sun RPC—This service is to be disabled. This may be enabled in a lab environment for Tooltalk
usage in debugging application programs.
–
Exec—This service is to be disabled.
–
Login—This service is to be disabled.
–
Shell—This service is to be disabled. This may be required for some lab activity; however, there
is no field usage for rlogin, rcp, and rsh facilities.
–
UUCP—This service is to be disabled.
–
NFS—This service is to be disabled.
–
Lockd—This service is to be disabled.
–
X11—This service is available for the near term only.
–
DTSCP—This service is to be disabled.
–
Font-services—This service is to be disabled.
–
HTTP—This service is to be enabled. This is used by the BTS 10200 to offer results of report
generation. This will migrate to HTTPS.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-7
Solaris OS Security and BTShard Package
• The following UNIX accounts are to be LOCKED but not removed from the system: lp, uucp, nuucp,
nobody, listen, and any other Cisco support accounts not used in the normal course of field
operation. Services managed by root are the only accounts allowed to utilize one of these identities.
This is the default behavior.
• Modifications to the Solaris kernel parameters were made to close potential breeches in the OS.
These types of security precautions are most often geared toward “denial of service” attacks. These
types of attacks create situations that degrade the performance of a system and as a result, prohibit
the critical applications from delivering the service they are designed to provide.
• The TCP protocol uses random initial sequence numbers.
• All failed login attempts are logged.
• The following users are not allowed direct FTP access to the machine: root, daemon, bin, sys, adm,
nobody, and noaccess.
• A root user cannot telnet directly to the machine. Direct root user access is granted to the console
only. A user who wants to access the root account must use the su command from a nonprivileged
account.
• The break key (<STOP> <A>) on the keyboard is disabled.
• IP_FORWARD_DIRECTED_BROADCASTS—This option determines whether to forward
broadcast packets directed to a specific net or subnet, if that net or subnet is directly connected to
the machine. If the system is acting as a router, this option can be exploited to generate a great deal
of broadcast network traffic. Turning this option off helps prevent broadcast traffic attacks. The
Solaris default value is 1 (True). For example:
ip_forward_directed_broadcasts=0
Chapter 2 Managing BTS Users and Commands Using EMS
• IP_FORWARD_SRC_ROUTED—This option determines whether to forward packets that are
source routed. These packets define the path the packet should take instead of allowing network
routers to define the path. The Solaris default value is 1 (True). For example:
ip_forward_src_routed=0
• IP_IGNORE_REDIRECT—This option determines whether to ignore the ICMP packets that define
new routes. If the system is acting as a router, an attacker may send redirect messages to alter routing
tables as part of sophisticated attack (man-in-the-middle attack) or a simple denial of service. The
Solaris default value is 0 (False). For example:
ip_ignore_redirect=1
• IP_IRE_FLUSH_INTERVAL—This option determines the period of time at which a specific route
will be kept, even if currently in use. Address Resolution Protocol (ARP) attacks may be effective
with the default interval. Shortening the time interval may reduce the effectiveness of attacks. The
default interval is 1200000 milliseconds (20 minutes). For example:
ip_ire_flush_interval=60000
• IP_RESPOND_TO_ADDRESS_MASK_BROADCAST—This option determines whether to
respond to ICMP netmask requests, typically sent by diskless clients when booting. An attacker may
use the netmask information for determining network topology or the broadcast address for the
subnet. The default value is 0 (False). For example:
ip_respond_to_address_mask_broadcast=0
2-8
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 2 Managing BTS Users and Commands Using EMS
• IP_RESPOND_TO_ECHO_BROADCAST—This option determines whether to respond to ICMP
broadcast echo requests (ping). An attacker may try to create a denial of service attack on subnets
by sending many broadcast echo requests to which all systems will respond. This also provides
information on systems that are available on the network. The Solaris default value is 1 (True). For
example:
ip_respond_to_echo_broadcast=1
• IP_RESPOND_TO_TIMESTAMP—This option determines whether to respond to ICMP timestamp
requests, that some systems use to discover the time on a remote system. An attacker may use the
time information to schedule an attack at a period of time when the system may run a cron job (or
other time-based event) or otherwise be busy. It may also be possible predict ID or sequence
numbers that are based on the time of day for spoofing services. The Solaris default value is 1 (True).
For example:
ip_respond_to_timestamp=0
• IP_RESPOND_TO_TIMESTAMP_BROADCAST—This option determines whether to respond to
ICMP broadcast timestamp requests, that are used to discover the time on all systems in the
broadcast range. This option is dangerous for the same reasons as responding to a single timestamp
request. Additionally, an attacker may try to create a denial of service attack by generating many
broadcast timestamp requests. The default value is 1 (True). For example:
ip_respond_to_timestamp_broadcast=0
Solaris OS Security and BTShard Package
• IP_SEND_REDIRECTS—This option determines whether to send ICMP redirect messages, that
can introduce changes into the routing table of the remote system. It should only be used on systems
that act as routers. The Solaris default value is 1 (True). For example:
ip_send_redirects=0
• IP_STRICT_DST_MULTIHOMING—This option determines whether to enable strict destination
multihoming. If this is set to 1 and ip_forwarding is set to 0, then a packet sent to an interface from
which it did not arrive will be dropped. This setting prevents an attacker from passing packets across
a machine with multiple interfaces that is not acting a router. The default value is 0 (False). For
example:
ip_strict_dst_multihoming=1
• TCP_CONN_REQ_MAX_Q0—This option determines the size of the queue containing half-open
connections. This setting provides protection from SYN flood attacks. Solaris 2.6 and 7 (and 2.5.1
with patch 103582-12 and higher) include protection from these attacks. The queue size default is
adequate for most systems but should be increased for busy web servers. The default value is 1024.
For example:
tcp_conn_req_max_q0=4096
• The following startup files are removed from the level “3” runtime environment of the BTS 10200.
These services can still be started manually if required in laboratory circumstances. They are not
required for field operations.
–
S71rpc
–
S73cachefs.daemon
–
S73nfs.client
OL-16000-07
–
S74autofs
–
S80lp
–
S80spc
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-9
Chapter 2 Managing BTS Users and Commands Using EMS
Solaris OS Security and BTShard Package
–
S88sendmail
–
S93cacheos.finish
–
S99dtlogin
Operator Interface
Additional commands have been added to manage the UNIX services in the BTS 10200. These
commands are available from the CLI/MAINT interface. In addition, these same commands are also
available from the CORBA and bulk-provisioning interface. There are no schemas and tables associated
with these commands. They directly control the UNIX services. These services are only enabled for the
lifetime of the current kernel instance. They are reset to the installed defaults when a kernel reboot is
performed.
Table 2-3 describes the system services available using the node command.
NodeChangeENABLE [Required] A Boolean flag [Y/N] that indicates whether to turn
this service on or off.
NodeChangeNODE [Required] The node name in the BTS 10200 where the service
is managed.
2-10
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 2 Managing BTS Users and Commands Using EMS
Solaris OS Security and BTShard Package
Table 2-3Node Command for UNIX Services (continued)
NounVerbOptionsDescription
NodeShowSERVICE [Required]
Must be one of the
following: FTP,
TELNET, ECHO,
DISCARD, PRINTER,
DAYTIME, CHARGEN,
SMTP, TIME, FINGER,
SUNRPC, EXEC,
LOGIN, SHELL, UUCP,
NFS, LOCKD, X11,
DTSCP,
FONT-SERVICES,
HTTP.
NodeShowNode [Required] Defines the node to display for the state of the
Defines the service to display.
service.
Vulnerabilities in H.323 Message Processing
During 2002 the University of Oulu Security Programming Group (OUSPG) discovered a number of
implementation-specific vulnerabilities in the Simple Network Management Protocol (SNMP).
Subsequent to this discovery, the National Infrastructure Security Coordination Centre (NISCC)
performed and commissioned further work on identifying implementation specific vulnerabilities in
related protocols that are critical to the United Kingdom Critical National Infrastructure. One of these
protocols is H.225, that is part of the H.323 family and is commonly implemented as a component of
multimedia applications such as Voice over IP (VoIP).
OUSPG produced a test suite for H.225 and employed it to validate their findings against a number of
products from different vendors. The test results have been confirmed by testing performed by NISCC
and the affected vendors contacted with the test results. These vendors' product lines cover a great deal
of the existing critical information infrastructure worldwide and have therefore been addressed as a
priority. However, the NISCC has subsequently contacted other vendors whose products employ H.323
and provided them with tools with which to test these implementations.
Authentication, Authorization and Accounting Support
These extensions represent modifications to the current scheme of user account management on the
system. It includes support for the following two protocols; these protocols are not required to be
mutually inclusive.
• Radius Protocol
• Lightweight Directory Access Protocol (LDAP)
OL-16000-07
Prior to Release 4.4, user account management for the BTS 10200 used the standard Solaris password
management facilities without the use of the Authentication Dial-In User Service Network Information
Service (NIS). All accounts are stored locally and referenced locally. This security feature begins
support for a complete AAA model for user account management. This model impacts several internal
subsystems of the BTS 10200 Element Management System (EMS) application. It also impacts the core
login support on the other nodes of the BTS 10200.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-11
Sun Microsystems Configurations
Pluggable Authentication Module Support
The BTS 10200 deploys a Secure Shell (SSH) package with Pluggable Authentication Module (PAM)
support. The package includes the PAM support required to utilize the Radius and LDAP servers.
The supporting configuration allows local accounts to fall through if the Radius and LDAP servers are
not available. These default local accounts for the BTS 10200 are the btsuser, btsadmin and secadmin
accounts. These are the standard default accounts provided in the base product and use the native
password management.
A UNIX-based user provides access to the operating system on all nodes. The oamp user is defined for
package management purposes. The account is locked and no password is available. However, to grant
UNIX access to all nodes of the BTS 10200, a default password is provided.
When PAM support is used, SSH transfers the control of authentication to the PAM library, that then
loads the modules specified in the PAM configuration file. Finally, the PAM library tells SSH whether
the authentication was successful. SSH is not aware of the details of the actual authentication method
employed by PAM. Only the final result is of interest.
User Security Account Management
Chapter 2 Managing BTS Users and Commands Using EMS
The BTS 10200 EMS contains an application program known as User Security Management (USM).
This program determines if an account is local or off-board. Password management facilities are disabled
for all accounts on the BTS 10200 when an AAA deployment is configured. The AAA deployment
transfers the responsibility for these existing facilities to the end-user AAA servers. These facilities
include the following attributes:
• Password aging, warning, and expiration
• Password reset and automatic account locking
• Local account management (password and shadow files) for new accounts
Sun Microsystems Configurations
Table 2-4 lists the Solaris 10 architecture-specific or hardware specific packages for certain Sun
Microsystems configurations.
Table 2-4Solaris Architectural- or Hardware-Specific Optional Package List
SUNWssaopAdministration Utilities and Firmware for
SPARCStorage Array
SUNWuaudUSB Audio driversSYSTEM —
SUNWuaudxUSB Audio drivers (64-bit)SYSTEM —
SUNWusbUSB device driversSYSTEM —
SUNWusbxUSB device drivers (64-bit)SYSTEM —
SUNWxwdvX Windows System Window driversSYSTEM —
SUNWxwdvxX Windows System Window drivers (64-bit)SYSTEM —
SYSTEM —
SYSTEM —
SYSTEM —
SYSTEM —
Solaris OS Patches
This chapter describes the BTS 10200 Solaris OS patches.
Trace Normal Forms (TNF) Support
The TNF package provides the Solaris tool suite with enhanced debugging capabilities of applications
as they execute in the target environment. TNF supports program execution traces at both the user and
kernel level The package includes the following:
• SUNWtnfc—Utilities needed to enable probe points, in the kernel and in applications, that can
generate TNF records in a trace file.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
2-14
OL-16000-07
Chapter 2 Managing BTS Users and Commands Using EMS
• SUNWtnfd—Utilities needed by developers using TNF facilities.
• SUNWtnfx—The 64-bit utilities needed to enable probe points, in the kernel and in applications,
that can generate TNF records in a trace file.
XML Libraries
The Sun VTS software requires the use of the XML libraries on the BTS 10200. These are in the
supplemental part of the Solaris distribution with the VTS packages. These XML libraries and tools for
32 and 64 bit usage are listed as follows:
• SUNWxmlS
• SUNWlxml
• SUNWlxmlx
Device GLM Patch
The 109885-16 patch corrects several open bug reports on the SCSI device driver GLM in the Solaris OS.
Solaris OS Patches
Security CE Patch
The 111883-24 patch corrects Sun GigaSwift Ethernet 1.0 driver.
Security Bad_Trap Patch
The 117000-05 patch is a new generic kernel patch that cumulates many kernel level bug fixes into a
single patch. This supersedes the older generic patch 108528-29.
Java SDK Patches
The upgraded version of Java requires some additional patches to the kernel and system libraries to
support the required functionality. The patches are listed below. These are the relevant patches from the
recommended cluster of patches as produced by Sun Microsystems.
The BTS allows you to gather data and create a report on its overall state. Use this data to find problems
like hardware failures or traffic congestion.
Table 3-3Using BTS System-Health Reports
TaskSample Command
Viewing scheduled reports
Viewing reports by ID number
Scheduling reports
show scheduled-command verb=report; noun=system_health
CautionDo not change the date or time in your BTS host machines while CA, FS, EMS, and BDMS are running.
Instead allow the Solaris OS to get the time automatically through NTP services.
Chapter 3 Monitoring and Backing Up the BTS
delete scheduled-command id=881958666704177006;
In a web browser enter
FQDN>:/report/system_health
report system-health period=<1 ... 720>;
NoteResults may take a few minutes to display.
https://<active EMS IP addr or
Step 1Log in to the primary and secondary EMSs as root.
Step 2Enter <hostname># date.
Step 3On each EMS ensure the following are correct:
a. The time does not deviate more than +/- 2 seconds.
b. Day, month, year, time zone
Step 4Log in to both the primary and secondary CA as root.
Step 5Enter <hostname># date.
Step 6On each CA ensure the following are correct:
a. The time is accurate to within +/-2 seconds of the correct time.
b. Day, month, year, time zone
Checking the OS Log of Each Host Machine
Monitor the OS logs on all four host machines (primary and secondary EMS, primary and secondary CA)
for errors or warnings. This report shows you recent messages like memory hits, disk errors, and frequent
process restarts.
3-4
Step 1Log in as root.
Step 2Enter dmesg.
Step 3For more history edit the /var/adm/messages file.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
Checking Disk Mirroring on Each Host Machine
Each procedure takes about 30 minutes.
CA/FS Side A
Before doing this procedure, ensure your BTS platform is connected to controller 1 or controller 0.
Step 1Log in as root to CA/FS side A using telnet.
Step 2Enter one of the following:
<hostname># metastat | grep c0
Or:
<hostname># metastat | grep c1
Step 3Verify the return matches the following:
c1t0d0s1 0 No Okay Yes
c1t1d0s1 0 No Okay Yes
c1t0d0s5 0 No Okay Yes
c1t1d0s5 0 No Okay Yes
c1t0d0s6 0 No Okay Yes
c1t1d0s6 0 No Okay Yes
c1t0d0s0 0 No Okay Yes
c1t1d0s0 0 No Okay Yes
c1t0d0s3 0 No Okay Yes
c1t1d0s3 0 No Okay Yes
c1t1d0 Yes id1,sd@SSEAGATE_ST373307LSUN72G_3HZ9JG7800007518H8WV
c1t0d0 Yes id1,sd@SSEAGATE_ST373307LSUN72G_3HZ9JC9N00007518Y15K
If the results differ synchronize the disk mirroring:
<hostname># cd /opt/setup
<hostname># sync_mirror
Checking BTS System Health
CautionIn case of a mismatch, synchronize once. If the mismatch continues, contact Cisco TAC.
CA/FS Side B
Step 1Log in as root to CA/FS side B using telnet.
Step 2Enter <hostname># metastat | grep c0.
Step 3Verify the return matches the following:
OL-16000-07
Verify the results using Step 1 through Step 3.
c0t0d0s6 0 No Okay
c0t1d0s6 0 No Okay
c0t0d0s1 0 No Okay
c0t1d0s1 0 No Okay
c0t0d0s5 0 No Okay
c0t1d0s5 0 No Okay
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-5
Checking BTS System Health
CautionIn case of a mismatch, synchronize once. If the mismatch continues contact Cisco TAC.
EMS Side A
Chapter 3 Monitoring and Backing Up the BTS
c0t0d0s7 0 No Okay
c0t1d0s7 0 No Okay
c0t0d0s0 0 No Okay
c0t1d0s0 0 No Okay
c0t0d0s3 0 No Okay
c0t1d0s3 0 No Okay
If the results differ synchronize the disk mirroring:
<hostname># cd /opt/setup
<hostname># sync_mirror
Verify the results using Step 1 through Step 3.
Step 1Log in as root to EMS side A using telnet.
Step 2Enter <hostname># metastat | grep c0.
Step 3Verify the return matches the following:
c0t0d0s6 0 No Okay
c0t1d0s6 0 No Okay
c0t0d0s1 0 No Okay
c0t1d0s1 0 No Okay
c0t0d0s5 0 No Okay
c0t1d0s5 0 No Okay
c0t0d0s7 0 No Okay
c0t1d0s7 0 No Okay
c0t0d0s0 0 No Okay
c0t1d0s0 0 No Okay
c0t0d0s3 0 No Okay
c0t1d0s3 0 No Okay
If the results differ synchronize the disk mirroring:
<hostname># cd /opt/setup
<hostname># sync_mirror
Verify the results using Step 1 through Step 3.
CautionIn case of a mismatch, synchronize once. If the mismatch continues contact Cisco TAC.
EMS Side B
Step 1Log in as root to EMS side B using telnet.
3-6
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
Step 2Enter <hostname># metastat | grep c0.
Step 3Verify the return result matches the following:
c0t0d0s6 0 No Okay
c0t1d0s6 0 No Okay
c0t0d0s1 0 No Okay
c0t1d0s1 0 No Okay
c0t0d0s5 0 No Okay
c0t1d0s5 0 No Okay
c0t0d0s7 0 No Okay
c0t1d0s7 0 No Okay
c0t0d0s0 0 No Okay
c0t1d0s0 0 No Okay
c0t0d0s3 0 No Okay
c0t1d0s3 0 No Okay
If the results differ synchronize the disk mirroring:
<hostname># cd /opt/setup
<hostname># sync_mirror
Verify the results using Step 1 through Step 3.
Checking BTS System Health
CautionIn case of a mismatch, synchronize once. If the mismatch continues contact Cisco TAC.
Auditing Databases and Tables
Audit either the complete database or entries in every provisionable table in both the Oracle database
and shared memory. See the Cisco BTS 10200 Softswitch Troubleshooting Guide, Release 6.0.1.
CautionAudits are time-intensive. Do only during a maintenance window. Completion time varies with database
or table entries.
Table 3-4Auditing Databases and Tables
TaskSample Command
Auditing individual tables
Auditing every entry in each
provisionable table
Auditing provisionable tables
based on type
Auditing provisionable tables
based on platform state
audit trunk type=row-count;
audit database;
audit database type=row-count;
Notetype defaults to full
audit database platform-state=active;
Noteplatform-state defaults to active
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-7
Exporting Provisioned Data
Table 3-4Auditing Databases and Tables (continued)
Notebts_audit cannot work in certain scenarios, for example, when
a termination record points to an invalid mgw
If a table references a missing row, the mismatch is not resolved. Only
synchronize data mismatches between active network elemens.
1. Audit mismatches using bts_audit.
2. Enter:
bts_sync /opt/ems/report/Audit_CA146_root.sql
bts_sync applies updates directly to the databases.
Exporting Provisioned Data
The CLI Native Data Export feature enables the export of all provisioning data from the BTS 10200
system by the use of a CLI command. Execution of the CLI command stores the exported data in a
user-named output file in text format in the export directory. The exported file contains all provisioning
data from the BTS 10200. The provisioning data is written into the export file using add and change
commands for all supported nouns.
The key attributes of the CLI Native Data Export feature are
• The user can run the CLI command to export the BTS 10200 provisioning data.
• The provisioning data for all the nouns, which enables the use of verbs as “add” and “change” is
exported in text format.
• The list of all the nouns related to provisioning is kept in an input file (xml format). Upon execution
of the export command, the xml input file reads the nouns and their corresponding verbs (operation
type, whether add or change), and exports the provisioning data from the BTS 10200.
The CLI export command is:
CLI > export database outfile = <whatever>
Where the noun is database and the verb is export. Execution of the command exports all of the
provisioning data from the BTS 10200. All of the exported data is written in the output file as specified
by the user. The output file contains all the add and change commands for the existing native data in the
BTS 10200. The exported output file is stored in the /opt/ems/export directory.
The result of the export command is a text file that contains add/change CLI commands. The following
is an example output text file:
Currently the export command is supported only from the CLI interface. The export command is
currently not supported from other interfaces such as CORBA and SOAP.
There is a limitation on the size of the /opt/ems/export directory. Currently the size of the export
directory is defined in /opt/ems/etc/bts.properties as 7500000 ~ 700 MB. During the first run of the
export command, if the size of the export file is beyond the threshold limit, a warning message is shown
to the user after export is finished. The warning message indicates that the export file size has exceeded
the threshold and that the user needs to clean up the export directory before running the command again.
During additional runs of the export command, if the export directory size is more then the threshold
size, a warning is shown to the user that the space of export directory is insufficient for the export and
that the user has to clear the export directory before rerunning the export command.
The North American Numbering Plan Association (NANPA) collects, stores, and maintains how
telephone numbers are used by 19 countries. Companies, like carriers, that hold telephone numbers must
report to NANPA twice a year using the NRUF report. Go to http://www.nanpa.com for more
information and job aids on submitting reports.
The BTS creates an NRUF report using the Number Block table. This table:
• Is a single table that is the sole reference for NANPA audits
• Can be customized
• Can be updated from data imported from other tables, changes from office-code updates, or
manually
• Has the following fields:
–
Number Block: NPA to NPA-NXX-XXXX—For FCC-required NANPA audit compliance, the
report input is NPANXX. In markets outside of NANPA, the input can be based on either the
combination of the national destination code (NDC) and the exchange code (EC), or just the EC.
–
Code Holder = Y/N
3-10
–
Block Holder = Y/N
–
Native = Y/N
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
–
Non-Native = Y/N
To generate the following reports, use
report dn-summary:
• All DNs in NDC and EC
• Thousands group in NDC and EC
• Operating company number (OCN)
• Switch Common Language Location Identifier (CLLI) code
• OCN + CLLI code—entries must match LERG data
Creating Reports for Nonrural Primary and Intermediate Carriers
NRUF reporting for nonrural primary and intermediate carriers:
• Occurs at a thousands-block level (NPA-NXX-X)
• Applies only to NANP
The report returns the following based on the DN2SUBSCRIBER table’s STATUS token:
Table 3-5NRUF Report Data for Nonrural Carriers
Exporting Provisioned Data
Data GroupsMatching Data from the DN2SUBSCRIBER Table
Assigned DNs
• Individual DNs:
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]; (status=assigned)
AND ADMIN-DN=N
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]; (status=ported-out)
AND ADMIN-DN=N
• DID DNs:
ndc=<npa>; ec=<nxx>; DN=xxxx; (status=assigned) AND
ADMIN-DN=N; X 10000
ndc=<npa>; ec=<nxx>; DN=xxxx; (status=ported-out) AND
ADMIN-DN=N; X 10000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx; (status=assigned) AND
ADMIN-DN=N; X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx; (status=ported-out) AND
ADMIN-DN=N; X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (status=assigned) AND
ADMIN-DN=N; X 100
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (status=ported-out)
AND ADMIN-DN=N; X 100
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x; (status=assigned)
AND ADMIN-DN=N; X 10
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x;
(status=ported-out) AND ADMIN-DN=N; X 10
OL-16000-07
Intermediate Telephone
Directory Numbers
Reserved DNs0
• PORTED-OUT DNs
0
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-11
Exporting Provisioned Data
Table 3-5NRUF Report Data for Nonrural Carriers (continued)
Data GroupsMatching Data from the DN2SUBSCRIBER Table
ndc=<npa>; ec=<nxx>; (ADMIN-DN=Y AND (status=ASSIGNED))
ndc=<npa>; ec=<nxx>; (ADMIN-DN=Y AND (status=PORTED-OUT))
• Administrative DID DNs:
ndc=<npa>; ec=<nxx>; DN=xxxx; (ADMIN-DN=Y AND
(status=ASSIGNED)) X 10000
ndc=<npa>; ec=<nxx>; DN=xxxx; (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 10000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx (ADMIN-DN=Y AND
(status=ASSIGNED)) X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (ADMIN-DN=Y AND
(status=ASSIGNED)) X 100
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 100
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x; (ADMIN-DN=Y AND
(status=ASSIGNED)) X 10
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x; (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 10
• Changed Number administrative DNs
Creating Reports for Rural Primary and Intermediate Carriers
This section identifies the DN information that is reported at the NPA-NXX level when the service
provider is a code holder. NRUF reporting at the “ndc, ec” level includes dn-groups of varying length.
Some countries might support dn-groups of length 1, 2, 3 or 4.
3-12
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
• The Rural Primary Carrier (U2 form) NPA-NXX report has:
–
NPA-NXX (input as ndc, ec)
–
Rate Center (read from LERG)
–
State (read from LERG)
–
Number of Assigned DNs
–
Number of Intermediate DNs
–
Number of Reserved DNs
–
Number of Aging DNs
–
Number of Administrative DNs
–
Donated to Pool (always 0)
• The Rural Intermediate Carrier (U4 form) report has:
–
NPA-NXX (input as ndc, ec)
–
Rate Center (read from LERG)
–
State (read from LERG)
Exporting Provisioned Data
–
Number of Assigned DNs
–
Number of Intermediate DNs
–
Number of Reserved DNs
–
Number of Aging DNs
–
Number of Administrative DNs
–
Numbers Received (always 0)
The report returns the following based on the DN2SUBSCRIBER table’s STATUS token:
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-13
Exporting Provisioned Data
Table 3-6NRUF Report Data for Rural Carriers
Data GroupsMatching Data from the DN2SUBSCRIBER Table
Assigned DNs
Chapter 3 Monitoring and Backing Up the BTS
• Individual DNs:
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]; (status=assigned) AND
ADMIN-DN=N
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]; (status=ported-out)
AND ADMIN-DN=N
• DID DNs:
ndc=<npa>; ec=<nxx>; DN=xxxx; (status=assigned) AND
ADMIN-DN=N; X 10000
ndc=<npa>; ec=<nxx>; DN=xxxx; (status=ported-out) AND
ADMIN-DN=N; X 10000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx; (status=assigned) AND
ADMIN-DN=N; X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx; (status=ported-out) AND
ADMIN-DN=N; X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (status=assigned) AND
ADMIN-DN=N; X 100
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (status=ported-out) AND
ADMIN-DN=N; X 100
Intermediate Telephone
Directory Numbers
Reserved DNs0
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x; (status=assigned)
AND ADMIN-DN=N; X 10
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x; (status=ported-out)
AND ADMIN-DN=N; X 10
0
3-14
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
Table 3-6NRUF Report Data for Rural Carriers (continued)
Data GroupsMatching Data from the DN2SUBSCRIBER Table
To back up the software image do the following three procedures:
1. Full Database Auditing, page 3-16
2. Checking Shared Memory, page 3-16
3. Backing Up the Full BTS, page 3-18
ndc=<npa>; ec=<nxx>; (ADMIN-DN=Y AND (status=ASSIGNED))
ndc=<npa>; ec=<nxx>; (ADMIN-DN=Y AND (status=PORTED-OUT))
ndc=<npa>; ec=<nxx>; DN=xxxx; (ADMIN-DN=Y AND
(status=ASSIGNED)) X 10000
ndc=<npa>; ec=<nxx>; DN=xxxx; (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 10000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx (ADMIN-DN=Y AND
(status=ASSIGNED)) X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9]xxx (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 1000
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (ADMIN-DN=Y AND
(status=ASSIGNED)) X 100
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9]xx; (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 100
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x; (ADMIN-DN=Y AND
(status=ASSIGNED)) X 10
ndc=<npa>; ec=<nxx>; DN=[0-9][0-9][0-9]x; (ADMIN-DN=Y AND
(status=PORTED-OUT)) X 10
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-15
Exporting Provisioned Data
Full Database Auditing
Step 1Log in as CLI user on EMS side A.
Step 2Enter audit database type=full;.
Step 3Check the audit report and verify that there is no mismatch or error. If errors are found, try to correct the
errors. If you cannot make the correction, contact Cisco TAC.
Checking Shared Memory
This task checks shared memory to detect potential data problems.
From CA/FS Side A
Step 1Log in as root.
Step 2Enter:
<hostname># cd /opt/OptiCall/CAxxx/bin
<hostname># ca_tiat data
Chapter 3 Monitoring and Backing Up the BTS
Press Enter.
The result should match the following:
All tables are OK.
For details, see ca_tiat.out
CautionIf the result is not“All tables are OK”, stop and contact Cisco TAC. If the result is “All tables
Step 3Enter:
<hostname># cd /opt/OptiCall/FSPTCzzz/bin <Return>
<hostname># potsctx_tiat data <Return>
Press Enter.
The result should match the following:
All tables are OK.
For detail, see potsctx_tiat.out
CautionIf the result is not“All tables are OK”, stop and contact Cisco TAC. If the result is “All tables
Step 4Enter:
<hostname>#cd /opt/OptiCall/FSAINyyy/bin
<hostname>#ain_tiat data
are OK”, go to Step 3.
are OK”, go to Step 4.
3-16
Step 5Press Enter.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
The result should match the following:
All tables are OK.
For detail, see ain_tiat.out
CautionIf the result is not“All tables are OK”, stop and contact Cisco TAC.
From CA/FS Side B
Step 1Log in as root.
Step 2Enter:
<hostname>#cd /opt/OptiCall/CAxxx/bin
<hostname>#ca_tiat data
Step 3Press Enter.
The result should match the following:
All tables are OK.
For detail, see ca_tiat.out
Exporting Provisioned Data
CautionIf the result is not“All tables are OK”, stop and contact Cisco TAC. If the result is “All tables
are OK”, go to Step 3.
Step 4Enter:
<hostname>#cd /opt/OptiCall/FSPTCzzz/bin
<hostname>#potsctx_tiat data
Step 5Press Enter:
The result match the following:
All tables are OK.
For detail, see potsctx_tiat.out
CautionIf the result is not“All tables are OK”, stop and contact Cisco TAC. If the result is “All tables
are OK”, go to Step 6.
Step 6Enter:
<hostname>#cd /opt/OptiCall/FSAINyyy/bin
<hostname>#ain_tiat data
Step 7Press Enter:
The result should match the following:
All tables are OK.
For detail, see ain_tiat.out
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-17
Exporting Provisioned Data
CautionIf the result is not“All tables are OK”, stop and contact Cisco TAC.
Backing Up the Full BTS
Do this before and after software upgrades or as routine, always during a maintenance window. Before
starting the provisioning process ensure you have the following:
Pre-Provisioning Checklist
NFS server hostname or ip address
Shared directory from NFS server
Root user access
Chapter 3 Monitoring and Backing Up the BTS
Provisioning blocked
Backing Up the CA/FS
Perform the following steps to back up the secondary CA/FS. Then repeat the procedure on the primary
CA/FS.
Step 1Log in as root on the secondary CA/FS.
Step 2Verify all platforms are in STANDBY mode, enter <hostname>#nodestat.
Step 3Remove unnecessary files or directories like /opt/Build and application tar files.
Step 4Mount the NFS server to the /mnt directory, enter <hostname>#mount <nfs server ip or
hostname>:/<share dire> /mnt
Step 5Stop all platforms; enter <hostname>#platform stop all.
Step 6Save all platforms data directory (shared memory) to nfs server
Step 13Repeat the procedure starting with Step 3 to back up the PRIMARY EMS/BDMS.
Backing up the EMS Database
This procedure is for experienced UNIX users. It tells you how to save the provisioning database from
the EMS to a remote server. The remote server must be:
• Connected to a corporate LAN.
• Backed up daily by default, the daily hot backup is not turned on at installation
The back up processes:
Chapter 3 Monitoring and Backing Up the BTS
• ora_hot_backup.ks—Backs up database data files, control files, and archive logs
• ora_arch_backup.ksh—Backs up archive logs
The target backup directory on both primary and secondary EMS systems is /opt/oraback. Backup files
in /opt/oraback directory are later transferred to the /opt/backup directory in a remote archive site.
After the files are transferred, they are purged from /opt/oraback.
Step 1Cross check the databases on the primary and secondary EMSs before backing up.
CautionCross check before ora_hot_backup.ksh and ora_arch_backup.ksh are scheduled. This
validates database and archived log files for RMAN processes.
a. Log in as oracle, or su - oracle.
b. Enter dbadm -E backup_crosscheck..
c. Ensure the log file has no errors (except the “validation failed for archived log” messages). Ignore
these messages of the /data1/arch/opticalx_yyy.arc files because the validation directs RMAN not
to look for *.arc files. ora_purge_archlog.ksh purges *.arc files.
Step 2Remove the archive log purge process and schedule the backup processes.
3-20
NoteDo this on the primary and secondary EMSs.
a. Disable the ora_purge_archlog.ksh process.
b. Enable the ora_hot_backup.ksh process.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
c. Optional: Enable the ora_arch_backup.ksh process.
d. Log in as oracle, or su - oracle.
e. Enter crontab –e.
f. Modify the crontab file as follows. This is on the primary EMS site, database name optical1.
# Daily Oracle Hot backup - this also include archive log backup
# Note: Set hot backup process to run at 2:00am every day.
#
0 2 * * * /opt/oracle/admin/scripts/ora_hot_backup.ksh optical1 > /opt/oracle/t
mp/ora_hot_backup.log 2>&1
#
# Oracle archive log backups, in addition to daily hot backup.
# Note: Set one additional archive log backup to run at 6:00pm every day.
#
0 18 * * * /opt/oracle/admin/scripts/ora_arch_backup.ksh optical1 > /opt/
oracle/tmp/ora_arch_backup.log 2>&1
#
# Purge archive log files
# Note: Delete or uncomment this line to stop purging archive log files.
#
#0 1,3,…,23 * * * /opt/oracle/admin/scripts/ora_purge_archlog.ksh optical1 >
/opt/oracle/tmp/ora_purge_archlog.log 2>&1
Exporting Provisioned Data
g. Repeat Step f by replacing optical1withoptical2on the secondary EMS site.
Step 3To setup daily file transfer to the remote archive site using FTP, see Using FTP to Setup File Transfer.
To setup daily file transfer to the remote archive site using SFTP, see Using SFTP to Setup File Transfer.
Using FTP to Setup File Transfer
Step 1Configure the remote site.
a. Verify the oracle user access and create backup directory on FTP server site.
Primary EMS hostname: priems
Secondary EMS hostname: secems
FTP server hostname: ftpserver
FTP server Oracle password: ora00
FTP server backup directory: /opt/backup
First, test the connection to the remote FTP server using the oracle user access. If the password of
oracle is not ‘ora00’, update the ORA_PW variable in the /opt/oracle/admin/etc/dba.env file.
b. Do this on the primary and secondary EMSs:
telnet ftpserver
c. Log in as oracle and enter the password (in this case, ora00).
d. Create the /opt/backup directory. Ensure the oracleuser has write permission to this directory.
mkdir /opt/backup
OL-16000-07
NoteIt is your responsibility to archive backup files from the ftp server /opt/backup directory to a
tape device or enterprise tape library.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-21
Exporting Provisioned Data
Step 2Schedule the FTP process.
a. Do this on the primary and secondary EMSs:
Chapter 3 Monitoring and Backing Up the BTS
Log in as
b. Add the following line to the Oracle crontab on the primary EMS.
ora_ftp_backup.log 2>&1 are all typed in the same line.
d. Edit the oracle crontab on secondary EMS site by replacing optical1 with optical2.
Step 3Verify the backup files, enter:
cd /opt/oraback EMS systems
cd /opt/backup Remote FTP system
Using SFTP to Setup File Transfer
al1) to /opt/backup directory of ftpserver.
The following steps generate an SSH key from the primary EMS. Key files are copied to the secondary
EMS and remote SFTP server. On the remote SFTP server the "oracle" user is created for login.
Step 1Generate SSH secure key from primary EMS:
a. Login to the primary EMS:
# su - oracle
# /opt/BTSossh/bin/ssh-keygen -t rsa
b. Generating public/private rsa key pair.
c. Enter file in which to save the key (/opt/orahome/.ssh/id_rsa).
d. Enter passphrase (empty for no passphrase).
e. Enter same passphrase.
Your identification has been saved in /opt/orahome/.ssh/id_rsa.
Your public key has been saved in /opt/orahome/.ssh/id_rsa.pub.
The key fingerprint is: d8:4f:b1:8b:f4:ac:2f:78:e9:56:a4:55:56:11:e1:40 oracle@priems79
f. Enter:
# ls -l /opt/orahome/.ssh
-rw-------1 oracleorainst1675 Mar 10 15:42 id_rsa
-rw-r--r--1 oracleorainst397 Mar 10 15:42 id_rsa.pub
Step 2From the secondary EMS, sftp both "id_ssa" and "id_rsa.pub" files from the primary EMS to the
secondary EMS /opt/orahome/.ssh directory. Make the files with "oracle:orainst" ownership.
Step 3Login to the secondary EMS:
3-22
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
# su - oracle
$ cd /opt/orahome/.ssh
$ sftp root@priems
sftp> cd /opt/orahome/.ssh
sftp> get id_rsa*
sftp> quit
$ ls -l /opt/orahome/.ssh/id_rsa*
-rw-------1 oracleorainst1675 Mar 10 15:42 id_rsa
-rw-r--r--1 oracleorainst397 Mar 10 15:42 id_rsa.pub
Now both primary and secondary EMSs have the same "id_rsa" and "id_rsa.pub" files in
/opt/orahome/.ssh directory.
Step 4Create an oracle user and /opt/backup directory on the remote SFTP server.
a. Login to remote SFTP server as root.
b. Create a user "oracle" with group "orainst" and home directory "/opt/orahome".
Heap is memory BTS reserves for data it creates as its applications execute. BTS audits heap usage of
all the processes started by a platform, CA, AIN, POTS, EMS and BDMS. Heap auditing is added to the
ADP process.
When heap usage of a process goes beyond certain threshold level, BTS generates an alarm. The alarm
clears when heap usage goes below the threshold level.
Heap audit does the following:
• Monitors traces of heap usage in the last four periods for each process
• Measures heap usage of each process started by the platform once a day at 4 a.m
• Issues a minor alarm if the heap usage of a process exceeds 70% of its max heap size limit
• Clears a minor alarm if the heap usage of a process drops below 68% of its max heap size limit
• Issues a major alarm if the heap usage of a process exceeds 80% its max heap size limit
• Clears a major alarm if the heap usage of a process drops below 78% its max heap size limit
• Issues a critical alarm if the heap usage of a process exceeds 90% its max heap size limit
• Clears a critical alarm if the heap usage of a process drops below 88% its max heap size limit
• Reports, via trace logs, the last twenty heap measurements, including the time and the value for each
process
• Clears heap usage alarms when process restarts
Checking the DNS Server
To check the DNS server, do this for all nodes.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-25
Log Archive Facility (LAF)
Step 1Log in as root on the active CA.
Step 2Enter more /etc/resolv.conf.
Note nameserver <ip address>
Step 3Enter nslookup
This defaults to the first DNS server.
Step 4Enter a valid gateway name and press Enter.
An IP address associated to gateway appears.
Step 5Enter server <second dns server ip>
Step 6Enter a valid gateway name and press Enter.
An IP address associated to gateway appears.
Step 7Enter exit to quit.
Chapter 3 Monitoring and Backing Up the BTS
Log Archive Facility (LAF)
The LAF process in Cisco BTS 10200 transports the trace log files to a remote archive server for storage.
LAF is a continuously running daemon process on all nodes (components) of the BTS 10200. It wakes
up every minute when active and checks if there are any new log files.
The service provider can specify the external archive system, the target directory, host directory, and the
disk quota for each trace log directory in the system. If any new log files are in these trace log directories,
LAF transfers them by Secure FTP (SFTP) to an external archive server specified by the service provider.
Secure Transfer of Files
BTS 10200 uses Secure FTP to transfer trace log files to the external server. LAF opens an SFTP
connection when its ready to transfer log file to the remote server. This connection is not closed even
after the transfer is complete. If for some reason the connection closes, the LAF process re-establishes
the connection during the next transfer. The connection is persistent till the LAF feature is disabled.
LAF operates on a single SFTP connection and transfer of files occurs one file at a time (using the SFTP
put operation). The same connection is used to transfer multiple files. When the LAF process detects a
bad connection, it terminates the SFTP session by closing the socket used to talk to the archive server.
The LAF process maintains a linked list for the files that need to be transferred. If the connection is lost
during a transfer, the LAF process moves the unsuccessfully transferred file to the end of the list and
raises Maintenance Alarm 108.
A re-attempt on a failed file depends on the number of files in the list and the time taken to transfer those
files. When there is no file to be transferred (i.e. the list is empty), then there is a gap of 30 seconds before
processing the list again.
The LAF process increments a counter, which is specifically used for the number of times the transfer
was attempted for this file. If a counter is more than three, the log file is deleted from the list. That is,
upon three failed attempts on the same file, the file entry is deleted from the list.
3-26
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
Other Capabilities
This section lists the additional capabilities of the LAF process.
• It performs disk space management when 90% of the disk space quota specified for the target
directory is reached.
• It gracefully recovers from any abnormal conditions and re-initiates the process to continue the
transfer of files.
• It generates alarms when any unsuccessful scenarios are encountered. These alarms are listed in the
Cisco BTS 10200 Troubleshooting Guide.
Provisioning LAF
CautionThe values provided by the user for the following parameters will be written into /etc/opticall.cfg file
and transported to all the four BTS 10200 nodes.
Log Archive Facility (LAF)
Example 1
Example 2
Example 3
The following parameters are associated with the LAF process. If they are left blank, the LAF process
for a particular platform (such as, CA, FSPTC, FSAIN) is turned off.
To use this feature, you must provision the following parameters with the external archive system, the
target directory, and the disk quota (in GB) for each platform.
CAxxx_LAF_PARAMETER
FSPTCxxx_LAF_PARAMETER
FSAINxxx_LAF_PARAMETER
Note that xxx must be replaced with each platform’s instance number.
To enable Log Archive Facility (LAF) process, refer to Enabling LAF Process section.
Enabling LAF Process
To enable the Log Archive Facility (LAF) feature, you must set up the authorization for non-interactive
SSH login to the external archive server for the Cisco BTS 10200 system to access and turn the LAF
processes to active state. (Immediately after the fresh installation and platform start, the LAF process is
in a dormant state).
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-27
Log Archive Facility (LAF)
The steps to set up the authorization in external archive server and turn the LAF processes to active is
listed below:
Setup Non-Interactive SSH Login to External Archive Server
NoteThe external archive system is recommended to be located such that it can be accessed by the
management network. In such a case, the static routes in the CA system should be explicitly set so that
the traffic to the external archive system is routed through the management network see section (“Adding
Static Routes” section for more details). Otherwise, the traffic is routed through the default network (i.e.
signaling network) and may not be able to reach the external archive system.
Step 1Log in to the Cisco BTS 10200 primary EMS as root.
Step 2From the EMS, login to the external archive server via ssh to get the external archive server added to the
/.ssh/known_hosts file.
Step 3Log off from the external archive server.
Step 4While still logged in on the primary EMS as root, generate an SSH key.
a. Execute cd/opt/BTSossh/bin.
Chapter 3 Monitoring and Backing Up the BTS
b. Execute ssh-keygen -t rsa.
c. Press Enter to accept the default file name for the key (/.ssh/id_rsa).
d. Enter y if prompted to choose whether to overwrite the existing file.
e. Press Enter when prompted to enter a passphrase (i.e. no passphrase).
f. Transfer the resulting file (/.ssh/id_rsa.pub) to a temporary location on the external archive server.
Step 5Set up the external archive server with the key generated in Step 4.
a. Login to the external archive system as root.
b. If a /.ssh/authorized_keys file does not exist on the external archive system, rename the id_rsa.pub
file (copied from the Cisco BTS 10200 EMS) to /.ssh/authorized_keys. If the file does exist, append
the id_rsa.pub file to it.
Step 6On the primary EMS, execute
ssh root@abcd
where abcd is the IP address or fully-qualified domain name of the external archive server.
Step 7Verify that login to the external archive server is successful and that no prompts for username or
password are issued.
Step 8Run enableLAF in EMS platform directories (i.e. /opt/ems/bin and /opt/bdms/bin)
Step 9Repeat Steps 1-8 for the secondary EMS, primary CA and secondary CA. (In CA, the platform
directories are /opt/OptiCall/CAxxx/bin, /opt/OptiCall/FSPTCyyy/bin, /opt/OptiCall/FSAINzzz/bin).
3-28
NoteBilling has a similar mechanism/steps to SFTP their Call Detail Blocks (CDB) files to an external
machine. If the LAF and Billing use the same target machine, then in both EMS, perform Steps 1-7 only
once. You must still run Step 8 to enable LAF. And you must still run Steps 1 -9 in CA nodes.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 3 Monitoring and Backing Up the BTS
Adding Static Routes
To add static routes to all Cisco BTS 10200 systems, perform the following steps:
Step 1From the shell or window of the primary call agent, change directory to /opt/utils.
cd /opt/utils
Step 2Edit S96StaticRoutes using an editor.
Step 3Add the subnet of NTP server, DNS server, external archive server and any other machine to the file,
which user wants to have access to Cisco BTS 10200 system in the following format:
NoteAll NTP, DNS traffic, traffic to external archive server, and traffic from other machine to Cisco BTS
10200 system (eg. login), should all go through management networks. (i.e. network gateway in
management network). This is particularly important in CA system because CA has both management
and signaling network. If user does not specify explicitly in this file, those traffic will be directed to
signaling network, because signaling network is the default one in CA/FS.
Moving Core Files
Step 4Make sure there is a soft link pointing from /etc/rc3.d/S96StaticRoutes to /opt/utils/S96StaticRoutes.
ls -l /etc/rc3.d/S96StaticRoutes
Step 5After editing, close the file, and run S96StaticRoutes.
/etc/rc3.d/S96StaticRoutes
Step 6Repeat Step 1 to Step 5 on the secondary CA.
Step 7Verify the connectivity by pinging the DNS server, NTP server, external archive server, or any machine
that user just added in that file.
LAF Alarm Information
Refer to the following link to see the LAF alarm information.
BTS creates and stores core files in the bin directory for the binary executable that generated the core.
Core files are large (2–4 GB) and eventually cause a disk full condition resulting in a switchover. When
a BTS platform system generates a core file, the BTS creates an alarm. The Core File Present—Audit 25
(major) alarm indicates a core is present in the BTS. The primary cause of this alarm is that a network
element process crashed.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
3-29
Moving Core Files
Chapter 3 Monitoring and Backing Up the BTS
The BTS automatically removes these core files when disk space is critically low or the core file has
aged beyond a maximum allowable time. However, to ensure proper BTS performance move these core
files off the BTS to another storage area as soon as they are generated. Refer to the Directory Containing
Core Files dataword for the location of the core file.
Use the settings in the cfm.cfg file to configure how to monitor and manage core files.
Table 3-7Core File Monitor Configuration File Parameters and Conditions
ParameterCondition
CORE_FILE_MONITOR_DISABLEIf set to true, the core file monitor audit is not
performed. Default setting is false.
CORE_FILE_ALARM_ENABLEIf set to false, the core file monitor alarm is not
issued when a core file is found in the network
element bin directory. Default setting is true.
CORE_FILE_MINIMUM_SPACEThis is the minimum free file space in megabytes
which will trigger the automatic deletion of the
oldest core files. Default is 5 GB.
CORE_FILE_AGE_TO_DELETEThis is the maximum time in hours that a core file
can exist before it is automatically deleted.
Default is 72 hours.
CORE_FILE_AGE_DELETE_ENABLEIf set to true, core files are deleted automatically
when their maximum age is reached. Default is
true.
CORE_FILE_SPACE_DELETE_ENABLEIf set to to true, the oldest core files are deleted
when free file space is low. Default is true.
3-30
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Introduction
CHAP T ER
4
Operating the BTS
Revised: February 18, 2010, OL-16000-07
This chapter tells you how to operate the BTS. This chapter assumes the following are true:
• Connecting components have been correctly installed.
• Connecting components have been successfully started.
• You are a system administrator with past BTS experience.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
4-1
Managing Subscribers
Managing Subscribers
Table 4-1Managing Subscribers
TaskSample Command
Activating
added
subscribers
Deactivating
subscribers
control subscriber-termination id=<subscriber id>; target-state=INS; mode=FORCED;
Ensure you specify mode=FORCED;; when assigning a DN to a ported-out subscriber.
Force the subscriber OOS:
control subscriber-termination target-state=oos; mode=forced; id=<subscriber id>;
Force the subscriber’s MTA OOS:
control mgw id=<mgw-id>; target-state=oos; mode=forced;
After activating a ported-in number, update the BTS so calls to this number from MTAs on the BTS directly
route to the MTA associated with the ported-in number:
change dn2subscriber office-code-index=
<office-code-index of ported TN’s NPA-NXX>;
dn=<XXXX of the ported TN>; lnp-trigger=N;
Update the BTS so calls to this number perform an LNP query:
change dn2subscriber office-code-index=
<office-code-index of ported TN’s NPA-NXX>;
dn=<XXXX of the ported TN>; lnp-trigger=y;
NoteWait for the CLEC to confirm the transfer before changing the DN status on the BTS. Initially, calls
to the DN may have to route to the porting-out subscriber’s MTA using LNP.
Ensure you specify
change dn2subscriber office-code-index=
<office-code-index of porting TN’s NPA-NXX>;
dn=<XXXX of the porting TN>; status=ported-out; sub-id=null;
1. Assign time and date to disconnect service.
2. Send service disconnection notice to NPAC SMS.
3. NPAC SMS broadcasts this to all service providers.
4. NPAC SMS removes the ported number from its database.
5. All service providers remove the number from their LNP databases.
6. Calls to the number route as if it was non-ported.
mode=FORCED; when assigning a DN to a ported out subscriber.
4-2
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
4-3
Managing Subscribers
Table 4-1Managing Subscribers (continued)
TaskSample Command
Changing
subscribers
Delete the changed-number entry.
delete changed-number old-DN=<old-DN>;
announcements
Change the status of the old DN to DISC in the dn2subscriber table.
change dn2subscriber DN=<old-DN>; status=DISC;
Chapter 4 Operating the BTS
4-4
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 4 Operating the BTS
Table 4-1Managing Subscribers (continued)
TaskSample Command
Changing
subscribers
Change the subscriber DN to the new DN.
change sub id=<id>; dn1=<new-DN>; CN-REFERRAL=Y;
DNs
Example:
change sub id=sub1; dn1=206-222-1841; CN-REFERRAL=Y;
The CN-REFERRAL token adds an entry in the changed-number table for the changed subscriber DN. By
default, the CN-REFERRAL token is set to Y. If the CN-REFERRAL token is set to N, the changed-number
table is not updated with the changed number information.
Use the show subscriber command to verify the new DN.
show sub id=<id>
Example:
show sub id=sub1;
Dn1 indicates 206-222-1841
Managing Subscribers
Verify that the changed number (old DN) of the subscriber is being tracked in the changed-number table.
show changed-number old-dn=<old-dn>
Example:
show changed-number OLD-DN=206-222-2345
Use the dn2subscriber table to verify that the old DN is in CN state and new DN is in assigned state. Check
if the status of the old DN is CN.
show dn2subscriber FDN=<old-DN>;
Example:
show dn2subscriber FDN=206-222-2345;
Check if the status of the new DN is assigned.
show dn2subscriber FDN=<new-DN>;
Example:
show dn2subscriber FDN=206-222-1841;
Place an incoming call to the new DN and verify the call is setup successfully.
Place an incoming call to the old DN and verify that the announcement played is "<old DN> has been
changed to <new DN>."
If an announcement is not played, do the following:
Verify if the release cause id maps to annc-id=118.
show release-cause id=22;
OL-16000-07
Verify if the announcement id maps to announcement-number 301.
show annc id=118;
NoteIf there is no referral number (that is, when CN-REFERRAL is set to N where the new number is
private), the BTS 10200 plays a generic announcement indicating that the number has changed. No
further information is provided on the new number.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
4-5
Viewing Calls
Viewing Calls
These tasks allows you to view information related to call forwarding features.
If A calls B and the call is forwarded to C:
• Querying A shows A is connected to C and provide C's information.
• Querying C shows C is connected to A and provide A's information.
• Querying B shows A is calling C and the call is forwarded through B.
• Even when the call is forwarded through B, B can originate another call. B can also forward multiple
When viewing Three-Way Call and Call Waiting calls remember the output shows both calls.
Table 4-2Viewing Calls
TaskSample Command
Viewing active calls
Viewing call trace
summaries, started
when subscriber
presses *57
NoteThe report appears on the screen andit does not generate in HTML.
4-6
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 4 Operating the BTS
Using Status and Control Commands
Table 4-3Using Status and Control Commands
TaskSample Command
Viewing BTS system
status
Viewing component
states
status system;
status element-manager id=EM01;
Possible states:
• STARTUP—During platform startup, the two sides are communicating to
determine which side will come up active.
–
INIT-NORMAL—primary will be active, secondary will be standby;
switchover allowed.
–
INIT-FORCED—primary will be forced to active or standby,
secondary will be forced to standby or active; no switchover allowed.
• ACTIVE-NORMAL—primary is active, secondary is standby; switchover
allowed.
Using Status and Control Commands
• ACTIVE-FORCED—primary or secondary has been forced to active; no
switchover allowed.
• STANDBY-NORMAL—primary should be active, secondary should be
standby; switchover allowed.
• STANDBY-FORCED—primary or secondary has been forced to standby;
no switchover allowed.
• TRANSITION-TO-ACTIVE-NORMAL—primary is going to active,
secondary is going to standby; switchover allowed.
• TRANSITION-TO-ACTIVE-FORCED—primary has been forced to
active or standby; secondary has been forced to standby or active; no
switchover allowed.
• TRANSITION-TO-STANDBY-NORMAL—primary is going to standby,
secondary is going to standby; switchover allowed.
• TRANSITION-TO-STANDBY-FORCED—primary has been forced to
active or standby; secondary has been forced to standby or active; no
switchover allowed.
TipUse status application for more detailed information.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
4-7
Using Status and Control Commands
Table 4-3Using Status and Control Commands (continued)
TaskSample Command
Changing states of
component pairs
(EMS, BDMS, CA,
and FS)
Viewing component
application states
Changing
component
applications states
(in-service or OOS)
Activating media
gateways
Chapter 4 Operating the BTS
control call-agent id=CA146; target-state=FORCED-STANDBY-ACTIVE;
Possible states:
• ACTIVE_STANDBY
• STANDBY_ACTIVE
• NORMAL—Primary is active and secondary is standby.
• FORCED-ACTIVE-STANDBY—Primary has been forced to active and
secondary is standby.
• FORCED-STANDBY-ACTIVE—Primary has been forced to standby and
secondary is active.
status application id=CA146;
control application id=CA146; action=star;node=prica06
CautionThis negatively impacts the performance of the BTS host.
Ensure the MG exists, then enter:
control mgw id=<mgw-id>; target-state=ins; mode=forced;
Setting subsystem
groups/OPC in or
OOS
Viewing subsystem
groups/OPC status
where
• mgw id—the voice port on the subscriber’s MTA (the voice port’s MAC
address without hyphens)
• target-state—ins to show in service for all activations
• mode—forced for all activations
control subsystem_grp id=CNAM; mode=forced; target_state=UOS;
This sets the state of the individual subsystems within the subsystem group as
well. If a subsystem/OPC combination is taken OOS individually, the state of
the subsystem group may be in service while some members of the group are
out of service.
status subsystem_grp id=CNAM
4-8
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 4 Operating the BTS
Using Show and Change Commmands
Table 4-4Using Show and Change Commands
TaskSample Command
Viewing
subscriber-related
batch data:
subscribers,
terminations,
subscriber service
profiles
Viewing database
usage statistics
show subscriber limit=1000; start_row=<next page
value>;display=id,sub_service_profile; order=id;
Where
• limit—Page size for the maximum number of rows (or lines) to display
• start_row—Which page to display first
• display=id—Sorts data by id column
• order=id—Provides a key for ordering or sorting the data
show db-usage table-name=dial_plan;
NoteDo not use hyphens in table names; instead use underscores.
Using Show and Change Commmands
Changing database
usage statistics
Using ERAC Commands
Using prepared SQL statements Extended Read Access Commands (ERAC) commands perform a
complex read against the BTS database. This SQL optimization and multitable and nested SELECT(s)
quickly return data that would otherwise take several database dips and a lot of back end data post
processing. Use the following interfaces to access ERAC:
• CLI and MAINT shells
• CORBA/XML adapters
• EPOM (uses CORBA/XML)
• SPA
Directory number (DN) and telephone number (TN) refer to the same BTS entity but with different
sources:
• TN—EC database value + the Office Code table’s NDC field
• DN—DN2 Subscriber table’s DN field
The TN/DN is a concatenation of 14 (or less) digits. Commands fail if a partial TN is supplied.
or
1. Go to http://www.cisco.com/iam/BTSCLI/BTS.html
.
2. From the first drop-list, select "Table Sizing Configuration".
NoteCommands allow for wild card support. When you enter a subscriber, subscriber account code, or DN ,
the value can have the wild card percent (%) search criteria.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
4-9
Using ERAC Commands
Chapter 4 Operating the BTS
These are standard commands and their parameters. Several are associated with BTS tables. However,
several parameters are derived from multiple sources and do not map directly to a table. They may have
real database representation but be modified for ease of use or readability.
TasksDescriptionsExamples
Viewing
account IDs
An account id can be assigned to one or more
subscribers. An account id is used only for
account-id=ABC123456789;
identification purposes. The account id is not
associated with feature grouping behavior
during call processing. The account id is
included in billing record. This is for
operational identification purpose only.
This is an optional field of 1-20 text
characters.
Viewing DNsThe DN is the telephone number. This number
show 4692550529
is a derived value composed of the
office-code.ndc, office-code.ec and the
dn2subscriber.dn fields. It is a concatenation
to provide a consistent view of the primary
directory number for a subscriber. It is 1-14
numbers.
Viewing DNs
by subscriber
This command returns a list of all DNs
associated with a specified subscriber or
account id. In this command, the subscriber id
show sub-dn-list
sub_id=foo_123;
account-id=ABC123456789;
field or the new account-id field determines
the DN(s) to list. Each row of data represents
a DN entry. The additional data is supplied to
provide further information about the DN.
Viewing line
features by DN
This command returns a list of all features
associated with a specified DN. In this
command the DN is supplied to qualify the
data search.
show dn-line-feat
dn=4692550529;
sub-id=foo_123;
account-id=-ABC123456789;
The data returned is not in the form of
services and service packages. This query
dips into the service packages and finds the
actual features associated with each service
assigned to the DN and its subscriber.
Viewing feature
summaries by
DN
This command returns the list of all features
associated with a specified entity. In this
command the DN, Subscriber ID or Account
ID is supplied to qualify the data search. The
show dn-feat-list
dn=4692550529;
sub-id=foo_123;
account-id=ABC123456789;
command returns the list of all the services of
the associated subscriber or DN and all
features associated with each specific service
package. This also includes the service
profiles association.
4-10
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 4 Operating the BTS
TasksDescriptionsExamples
Viewing speed
dial settings by
DN
Viewing
domestic long
distance
blocking by
subscriber or
account id
Viewing
international
long distance
blocking
settings by
subscriber or
account id
Viewing DA
blocking by
subscriber or
account id
Viewing OA
blocking by
subscriber or
account id
Viewing call
hunt groups by
subscriber or
account id
Viewing
sequence by
hunt group
This command returns a list of all speed dial
telephone numbers by the specified DN or
primary subscriber directory number. All one
digit speed dial values are returned as well as
the feature state of speed dial. T Only a single
row is returned with the complete list of speed
dial numbers. If a number is not defined, it is
left blank.
This command returns the cos-restrict
information for a specified subscriber. In this
command the subscriber ID field or the new
account-id field determines the subscriber.
This command keys on the use of the Nature
of Dial (NOD) means for restricting
subscriber activity.
This command returns the COS_RESTRICT
information for all DN(s) associated with a
specified subscriber or account. In this
command the subscriber ID field or the new
ACCOUNT_ID field determines the
subscriber. This command keys on the use of
the NOD as the means for restricting
subscriber activity.
This command returns the cos-restrict
information a specified subscriber or account.
In this command the subscriber id field or the
new account_id field determines the
subscriber. This command keys on the use of
the NOD as the means for restricting
subscriber activity.
This command returns the Operator
assistance blocking information for a
specified subscriber or account. In this
command the subscriber ID field or the new
ACCOUNT_ID field determines the
subscriber. One row of data exists for each
actual BTS 10200 subscribers.
This command returns the list of one or more
hunt groups associated with a specified
subscriber. In this command the subscriber Id
field or the new account_id field determines
the subscriber. Each row of data represents a
hunt group membership.
This command returns the hunt sequence as a
list of telephone numbers (TNs) associated
with a specified Hunt Group. Each row of data
equates to a relative terminal in the hunt
group. This avoids static lists with a fixed
number of terminals.
Using ERAC Commands
show dn-sd-list dn=4692550529;
sub-id=foo_123;
account-id=ABC123456789;
show sub-id-block
sub-id=foo_123;
account-id=ABC123456789;
show sub-intl-block
sub-id=foo-123;
account-id=ABC123456789;
show sub-da-block
sub-id=foo-123;
account-id=ABC123456789;
show sub-oper-block
sub-id=foo-123;
account-id=ABC123456789;
show hg-dn-listdn=4692550529;
sub-id=foo-123;
account-id=ABC123456789;
show hg-sequence
mlhg-id=foo-123;
account-id=ABC123456789;
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
4-11
Managing Transactions
TasksDescriptionsExamples
Viewing list
DNs that not in
a hunt group
This command returns a list of all DNs
associated with a specified subscriber and
that are not associated with a hunt group.
show sub-dn-find
account-id=ABC1234%;
sub-id=foo-123;
Under the present definition, the list can be
long. Each row of the data indicates a TN with
a free association. It is strongly recommended
that some qualifications are provided to
narrow the scope of the command. For
example, list all free DNs in a particular
account where the account ID is some specific
value.
Viewing
Outbound
Caller ID with
Name Value by
This command returns the caller ID and
NAME for a specified TN. Each row of data
represents a separate subscriber TN. The read
is based on the actual TN of a subscriber.
show sub-cid sub-id=foo-123;
account-id=ABC123456789;
DN
Chapter 4 Operating the BTS
Managing Transactions
The Transaction Queue tracks updates to EMS database, and the shared memory of the CAs andFSs.
Entries should remain in the transaction queue for a few seconds, unless an EMS, CA, or FS in an error
state. In case of an error state, the transaction queue to stores entries for later updates.
Table 4-5Viewing and Deleting Transactions
TaskSample Command
Viewing transaction
queue entries
Deleting transaction
queue entries
show transaction-queue target=CA146; status=pending;
Following is an example of the system response to this command.
The Hour and Minute Command Scheduling feature allows you to schedule command execution for a
specific hour and minute.
Using start-time and recurrence command tokens, schedule command time and frequency (hourly, daily,
weekly, monthly, etc.). You can remove the command at any time; if it is recurring and currently
executing, it completes and is removed.
Limitations
To prevent overload and subsequent EMS degradation, limit commands to 10, each taking less than a
minute.
If you schedule a command to execute, but an earlier occurence of that command is still executing, the
second might fail.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Introduction
CHAP T ER
5
Managing External Resources
Revised: February 18, 2010, OL-16000-07
This chapter tells you how to manage external resources provisioned on the BTS using administrative
(ADM) commands. External resources have two service states:
• Administrative—State the BTS user provisions for the resource link
• Operational—Physical condition of the resource link or the resource)
The two types of service states are independent of each other, for example:
A user places an MGW link in-service; its administrative state is ADMIN_INS. But that link
between the BTS and MGW is lost. The MGW link’s operational state is MGW_STATUS_DOWN.
A query of the MGW returns both the administrative state and operational state.
Viewing BTS System-Wide Status
BTSSTAT runs on any BTS host. Any valid UNIX user can enter btsstat from a UNIX shell to initiate
it. This command returns the following for all BTS components:
• Component id
• Side
• Host name
• Ve rs i on
• Replication status
• Redundancy status
To run BTSSTAT from a non-BTS host, the configuration file needs the information in following table.
BTSSTAT ignores all other lines in the file.
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
5-1
Viewing BTS System-Wide Status
Table 5-1Using BTSSTAT
TaskSample Command
Viewing status of entire BTS
system (including components
not on the same host)
Viewing status of specific
components
Chapter 5 Managing External Resources
btsstat
CA
btsstat -caport
FSAIN
btsstat -fsainport
FSPTC
btsstat -fsptcport
EMS
btsstat -emsport
Running BTSSTAT from a
non-BTS host
(requires an SSL connection to
the BTS)
Viewing BTS software version
and installed patches
BDMS
btsstat -bdmsport
btsstat -f my_cfg_file
Specify BTS hosts in a configuration file:
• CA_SIDE_A_HN = prica11
CA_SIDE_B_HN = secca11
• FSAIN_SIDE_A_HN = prica11
FSAIN_SIDE_B_HN = secca11
• FSPTC_SIDE_A_HN = prica11
FSPTC_SIDE_B_HN = secca11
• EMS_SIDE_A_HN = priems11
EMS_SIDE_B_HN = secems11
• BDMS_SIDE_A_HN = priems11
BDMS_SIDE_B_HN = secems11
nodestat
5-2
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
• down session set fail soft normal, down session set fail hard
normal, down session set fail soft maintenance, down session set
fail hard maintenance, down establish request soft normal, down
establish request hard normal, down establish request soft
maintenance, down establish request hard maintenance, down
establish request hard normal, down establish request soft
maintenance, down establish request hard maintenance, down
establish fail soft normal, down establish fail hard normal, down
establish fail soft maintenance, down establish fail hard
maintenance
Managing Trunk Groups and Trunks
OL-16000-07
Viewing TGs with ISDN D
channels
Switching ISDN D channels
Changing TGs states
Viewing trunk status
• delete graceful
• request remove release, request remove session set
• remove graceful in-service and maintenance state
• DPC is inaccessible
show isdn-dchan
control isdn-dchan tgn-id=1;
This switches the active D channel to standby, and the standby D
channel to active.
control trunk-grp tgn-id=129; mode=forced; target-state=oos;
NoteBefore bringing an ISDN trunk in-service, put the connected
media gateway in-service, see Changing media gateways
status.
status trunk-termination tgn-id=2; cic=8;
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
5-3
Managing Trunk Groups and Trunks
Table 5-2Managing Trunk Groups (continued)
TaskSample Command
Resetting trunks
Changing trunk states
Forcing MAINT stateSS7 trunks
Chapter 5 Managing External Resources
reset trunk-termination tgn-id=13; cic=1-6;
Resetting does the following:
• Clears all manual and blocked states
• Clears active/transient calls on a trunk termination, with the
exception of SS7 trunk terminations.
• Brings trunks INS
control trunk-termination tgn-id=17; cic=1-23;
target-state=ins; mode=forced;
Test 1: SS7 MGCP Connectivity Test—tests if MGCP has access to
the SS7 trunk termination
Test 2: SS7 Termination Connection Test—tests if there is a path to the
device (ping).
Test 3: SS7 COT Test—tests the integrity of the SS7 Bearer Path.
Test 4: SS7 CQM Test—queries the SS7 circuit (or group of circuits)
status. A range of CICs can be specified (to a maximum of 24). Both
remote and local trunk states are displayed in the results.
Test 5: SS7 CVT Test—tests to ensure that each end of the circuit has
sufficient and consistent information for using the circuit in call
connections. CLLI names are included.
If a TG or trunk command fails, it can return one of the following generic failure reasons, as well as ones
specific to the command.
Table 5-4Understanding Trunk Group and Trunk Generic Command Responses
Command
Entered
status
or
control
Command
ResponsePossible Conditions
FailureTG or trunk database was not found in shared memory.
Component is already in the requested state.
Graceful mode only. Appears when a command is executed and operation
is INS going OSS or INS going MAINT.
A required resource is not available.
For ISDN
–
A trunk cannot be added unless both the MGW and TG are
available.
–
A TG cannot be added unless the MGW is available, and vice
versa.
For SS7, CAS, Announcement
–
A trunk cannot be added unless both the MGW and TG are
available.
–
A TG does not require the MGW to be available, and vice versa.
An associated resource of the database cannot be found.
An assigned resource is not valid (supported).
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
5-7
Managing Trunk Groups and Trunks
Table 5-4Understanding Trunk Group and Trunk Generic Command Responses (continued)
Chapter 5 Managing External Resources
Command
Entered
Command
ResponsePossible Conditions
anyFailure • Found no failure
• TG(s) cannot be found, trunk(s) cannot be found, no TG(s) found in
trunking gateway, no trunk(s) found in TG
• Fail while in termination table, fail while in TG table, fail while in
trunk table, fail while looking to find trunk index, fail while getting
TG administration state
• Failed to allocate IPC message(s), failed to dispatch IPC message(s)
• Operational state invalid, administration state invalid
• Trunk(s) state change and pending
• Found TG type invalid, found TG state invalid, found TG admin state
not ready
• Entity in desired state
• Not allow trunk to reset
• Change to out-of-service state required, change to request graceful
mode error
• Found entity unequipped in initial state
• Operation not allowed because D Channel(s) is down
• Found unknown failure reason(s)
5-8
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 5 Managing External Resources
Table 5-4Understanding Trunk Group and Trunk Generic Command Responses (continued)
Managing Trunk Groups and Trunks
Command
Entered
Trunk
Termination
commands
Command
ResponsePossible Conditions
Failure • The transaction could not be executed due to a transient error, the
endpoint is unknown, the endpoint is not ready, endpoint does not
have enough resources available, a protocol error was detected, the
command contained an unrecognized extension, the endpoint is
restarting.
• Invalid conn identifier, invalid call ID.
• Unsupported mode or invalid mode, unsupported or unknown
package.
• Endpoint does not have a digit map, endpoint redirected to another
Call Agent, endpoint malfunctioning, endpoint taken out of service.
• No such event or signal.
• Unknown action or illegal combination of actions.
• Internal consistency in local connection options, unknown extensions
in local connection options, unsupported values on local connection
options.
• Insufficient bandwidth.
• Missing remote connection descriptor.
• Incompatible protocol version.
• Internal hardware failure.
• CAS signaling protocol error.
• Failure of a group of trunks.
• Response too big.
• Loss of lower connectivity.
• No fault reason available.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
5-9
Managing Trunk Groups and Trunks
Table 5-4Understanding Trunk Group and Trunk Generic Command Responses (continued)
Chapter 5 Managing External Resources
Command
Entered
Trunk
commands
Command
ResponsePossible Conditions
Failure • NON-FAULTY—Not blocked, available for service.
• MAINT-OOS—Trunk-termination is manually controlled OOS.
• MAINT-BUSY—Trunk-termination is in maintenance state;
controlled to MAINT.
• TERM-FAULT—Bearer termination is in faulty condition.
• SIGNALLING-FAULT—Signaling link (for example, SS7 link, or
ISDN D channel) is faulty.
• MAINT-BLOCK—Trunk-termination is manually controlled OOS
(controlled mode=GRACE).
• HARDWARE-BLOCK—Trunk-termination is manually controlled
OOS (controlled mode=FORCED).
• OUTGOING_RESTRICTED—The outgoing call is not allowed
Anyfailure • Found no failure, subscriber category invalid, entity unequipped in
initial state, unknown failure reason(s).
• Subscriber(s) cannot be found, subscriber(s) state change and
pending.
• No termination(s) found in MGW.
• Fail while in termination table.
• Administration state invalid, operational state invalid.
• Failed to allocate IPC message(s), failed to dispatch IPC message(s).
• Entity in desired state.
• Not allow subscriber to reset.
• Change to out-of-service state required.
Subscriber
commands
Failure
• The media gateway is down, unreachable, in a faulty state,
transitioning to another state.
• The transaction could not be executed because the endpoint is
unknown, the endpoint is not ready, the endpoint does not have
enough resources available, the endpoint is restarting, the command
contained an unrecognized extension, the gateway is not equipped to
detect one of the requested events, the gateway is not equipped to
generate one of the requested signals, the gateway cannot send the
specified announcement.
• Invalid conn identifier, invalid call ID.
• Unsupported mode or invalid mode, unsupported or unknown
package.
• Endpoint does not have a digit map, endpoint redirected to another
Call Agent, endpoint malfunctioning, endpoint taken out of service.
• No such event or signal.
• Unknown action or illegal combination of actions.
• Internal consistency in local connection options, unknown extensions
in local connection options, unsupported values on local connection
options.
• Insufficient bandwidth.
• Missing remote connection descriptor.
• Incompatible protocol version.
• Response too big.
• Loss of lower connectivity.
• No fault reason available.
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
5-15
Managing Gateways
Managing Gateways
Table 5-7Managing Gateways
TaskSample Command
Viewing H.323 gateways
Setting the state of H.323
gateways
Viewing signaling gateway
processes (SGPs)
Viewing media gateways
status
Chapter 5 Managing External Resources
status h323-gw id=CHINA-1;
Possible RAS states:
• CCH323_RAS_STATE_NONE—operational state is ADMIN
OOS
• CCH323_RAS_STATE_GRQ—Gatekeeper Discovery state
• CCH323_RAS_STATE_RRQ—Gateway Registration state
• CCH323_RAS_STATE_IDLE—ready for calls
• CCH323_RAS_STATE_URQ—Un-registration state.
control h323-gw id=CHINA_1; target-state=INS;
status sgp id=sgp1;
status mgw id=c5300_197;
Possible states:
• ADMIN-INS—In-service
Reporting all MTAs that use
“best effort” (non DQoS) calls
in the network having or not
having a specific aggr id
• ADMIN-OOS—Out of service
• ADMIN-MAINT—Maintenance Mode
• ADMIN-OOS-PENDING—Transitioning to out of service
• ADMIN-MAINT-PENDING—Transitioning to Maintenance
4. Ensure the /opt directory is not more than 70% full.
If the /opt directory is >70% full, remove obsolete scripting files
and other user-generated files. Also remove obsolete files from
the backup directory. For help call Cisco TAC.
Learning External Resource Dependencies
Table 5-10RGW and Subscriber Termination States
RGW StateAllowed Subscriber Termination States
OOS
• OOS
• UEQP
5-20
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x
OL-16000-07
Chapter 5 Managing External Resources
Table 5-10RGW and Subscriber Termination States (continued)
RGW StateAllowed Subscriber Termination States
INS
MAINT
Table 5-11ISDN TGW/TG State Relationships
TGW StateAllowed TG States
INS
Learning External Resource Dependencies
• OOS
• MAINT
• INS
• UEQP
• OOS
• MAINT
• UEQP
• OOS
• MAINT
• INS
MAINT
• OOS
• MAINT
This table lists the administrative states BTS returns.
Table 5-12Returnable Administrative States
StateDefinition
ADMIN-INSIn service.
ADMIN-OOSOut of service.
ADMIN-MAINTMaintenance Mode.
ADMIN-OOS-PendingTransitioning to out of service.
ADMIN-MAINT-PendingTransitioning to Maintenance Mode.
ACLCongestion is at level 1
ACLCongestion is at level 2
ACLCongestion is at level 3
TFCCongestion is at level 1
TFCCongestion is at level 2
TFCCongestion is at level 3
OL-16000-07
Cisco BTS 10200 Softswitch Operations and Maintenance Guide, Release 6.0.x