This publi cation is protected by federal copyri ght l aw. No part of this publication may be copied or di stributed,
transmitt ed, tr anscri bed, stor ed in a retrie v al syst em, or tr anslat ed into an y human or comput er langu age in any form or
by any mea ns, electronic, mechanical, magnetic, manual or otherwise, or disclosed to thir d parties without the express
written permission of Paradyne Corporation, 8545 126th Ave. N., Larg o, FL 33773.
Par adyne Corporation makes no representation or warranties with respect to the contents hereof and specifically
disclaims any implied warranties of merchantability or fit ness for a particular purpose. Further, Parady ne Corporat ion
reserves the right to revise this publi cation and to make changes from ti m e to tim e in the contents hereof without
obligation of Paradyne Corporation to notify any person of such revision or changes.
Changes and enhancements to the product and to the information herein will be documented and issued as a new
release to this manual.
W arranty, Sales, Service, and Training Information
Contact yo ur loc al sales r eprese ntati v e, service r epresent ativ e , or dist ribut or di rec tly f or an y hel p need ed. F or addit ional
informati on concerning warranty, sal es, service, repair, installation, docum entation, training, distributor locations, or
Paradyne worldwide office locations, use one of the following methods:
Internet: Visit the Paradyne W orld Wide Web site at www.paradyne.com. (Be sure to regist er your warranty at
www.paradyne.com/warranty.)
Telephone: Call our automated system to receive current information by fax or to speak with a company
representative.
— Within the U.S.A., call 1-800- 870-2221
— Outside the U.S.A., call 1-727- 530-2340
Document Feedback
We welcome your comments and suggestions about this document. Please mail them to Technical Publications,
Par adyne Corporation, 8545 126th A ve. N., Largo, FL 33773, or send e-mail to userdoc@paradyne.com. Include the
number and title of this document in your correspondence. Please include your name and phone number if you are
willing to pro vide additional clarificat ion.
Trademarks
ACCULINK, COMSPHERE, F rameSaver, Hotwire, MVL, NextEDGE, OpenLane, and Performance Wizard are
registere d tr adem arks of Paradyne Corporat ion. BitStorm, EtherLoop, GrandVIEW , ReachDSL, StormPort,
StormSystem, StormTracker, and TruePut are trademarks of Pa radyne Corporation. All other products and services
mentioned herei n are the trademarks, service marks, re gistered trademarks, or regi stered service marks of their
resp ective ow n ers.
This guide contains information necessary for the use of the three user interfaces
of the BitStorm 4800 IP DSLAM:
Command Line Interface (CLI)
Web Interface
SNMP Interface
It is designed for technicians who administer DSL multiplexers, especially those
used in Multi-Tenant Unit (MTU)/Multi-Dwelling Unit (MDU) applications.
Document Summary
SectionDescription
Chapter 1, BitStorm 4800
Overview
Chapter 2, Terminology and
Conventions
Chapter 3, Using the Command
Line In te r face
Chapter 4,
Interface
Chapter 5,
Troubleshooting
Appendix A, CLI Command
Descriptions
Appendix B, SNMP Traps
Appendix C, MIB Support
Appendix D, OID Cross
Reference
Using the Web
Monitoring and
Provides an introduction to the capabilities of the
BitStorm 4800.
Defines terms used in this manual and in the product ’s
user interfaces.
Explains how to use the Co mman d Line Interface
(CLI).
Exlains how to use the w eb int erface.
Describes tools for monitoring the system and
diagnosing problems.
Provides detailed descriptions of all CLI commands.
Describes the SNMP traps supported.
Describes the MIBs and objects supported.
Lists supported MIB Object IDs by number.
4800-A2-GB20-10July 2002
vii
Page 10
About This Guide
SectionDescription
Appendix E, CLI to MIB Object
Cross Reference
Appendix F, Reference Tab les
Index
A master glossary of terms and acronyms used in Paradyne documents is
available online at
Technical Glossary
Product-Related Documents
Complete documentation for this product is available online at
www.paradyne.com
Systems.
Document NumberDocument Title
4800-A2-GN10
Contains a tab le sho wing what MIB obje cts are us ed to
implement CLI command s.
Contains tables used in CLI commands and web
interf ace screens.
Lists key terms, concepts, and sections in alphabet ical
order.
www.paradyne.com
. Select
Library → Technical Manuals →
.
. Select
Library → Technical Manuals → BitStorm DSL
BitStorm 4800 Management Module I nstallation Instructions
Describes how to instal l t he 4800 and 4804 Management
Modules in the BitStorm 4800.
4821-A2-GN20
6051-A2-GZ40
BitStorm 4800 Installa ti on G uide
Describes the installation and cabling of th e Bit Storm 4800
IP DSLAM.
The BitStorm™ 4800 IP DSLAM is an access gateway that combines in one
device:
Layer 2 switching
Aggregation
Element management
Provisioning
1
Digital Subscriber Line (DSL) support
The BitStorm 4800 is a replacement for and an alternative to multi-de vice solutions
with switches, routers, and servers that require rewiring buildings, and expensive,
downsized ATM DSLAMs not designed for Multi-T enant Unit (MTU)/Multi-Dwelling
Unit (MDU) applications.
V
.3
5
/X
.2
1
A
L
A
R
4804
OK
ALARM
1
TEST
3
5
2
7
4
6
8
M
M
O
D
E
M
C
O
N
S
O
L
9
1
1
1
3
1
0
1
5
1
2
1
7
1
4
1
9
1
6
2
1
1
8
2
3
2
0
2
2
2
4
E
M
2
5
2
7
2
9
2
6
3
1
2
8
3
3
3
0
3
5
3
2
3
7
3
4
3
9
3
6
3
8
4
0
G
U
M
P
L
T
IN
K
G
ig
E
D
O
W
N
4
1
4
3
4
5
4
2
4
7
4
4
4
6
4
8
L
IN
K
G
ig
E
1
2
3
4
5
6
7
S
8
T
A
C
K
P
O
S
I
T
I
O
N
02-17063
Figure 1-1.BitStorm 4800 with 48 Ports and Model 4804 Management Module
4800-A2-GB20-10July 2002
1-1
Page 14
1. BitStorm 4800 Overview
Figure 1-2 shows a typical application for the BitStorm 4800.
In-Building DSL
Phone
Filter
Splitter
ASDL
CPE
BitStorm 4800
Optional:
Adjunct Server
or Service Gateway
Figure 1-2.BitStorm 4800 Sample A p pl ication
Point of Presence (POP)
BLEC
Service
Management
System
Router
Building to
BLEC POP
Access
Voice
Gateway
Class
&
Switch
Internet
Private
Network
PSTN
02-17064
1-2
July 20024800-A2-GB20-10
Page 15
Features
1. BitStorm 4800 Overview
The BitStorm 4800 IP DSLAM has the following features:
Compact size (height = 1U)
Shelf-mountable (up to eight units high) and rack-mountable
Low price per port
Up to 48 ports per unit
Up to 384 ports per stack, with a single high-speed uplink
Multiple uplink options:
— Gigabit Ethernet uplink using wire or fiber
— V.35, EIA-5 30-A, or X.21 uplink using Model 4804 Management Module
with suitable adapter
Little or no connection management and configuration (uses learning bridge
capabilities of Ethernet)
IEEE 802.3x standards-based flow control for maximum performance and
minimu m pa cket l os s
Auto-rating DSL technology to adjust to line conditions
Auto-sensing on all Ethernet ports to adjust automatically to the speed of
attached devices
Automatic detection of full duplex or half duplex operation on all Ethernet ports
Automatic switchov er detection for Medium-Dependent Interface (MDI) and
MDI crossover (MDIX) connections, ensuring plug-and-play compatibility with
hubs and endstations
Web-based server for management
Virtual Private Networking (VPN) for management, using the IPSec security
protocol
Command Line Interface (CLI) like that of popular routers
Support for Simple Network Management Protocol (SNMP) Version 1 and
Version 2
Support for off-the-shelf Asynchronous DSL (ADSL) endpoints
Uplink VLAN tagging for billing and acce ss control
4800-A2-GB20-10July 2002
1-3
Page 16
1. BitStorm 4800 Overview
1-4
July 20024800-A2-GB20-10
Page 17
Termi n ol ogy and Conventions
System Terminology
The following terms are used in this manual and the product’s user interfaces:
Port
Unit
Stack
Port
2
Unit
A port is one of the physical interfaces of a BitStorm 4800 or Management Module.
These are :
ALARM
CONSOLE
DOWNLINK GigE (RJ45)
DOWNLINK GigE (SFP)
DSL Ports 1–24 (24-port model) or 1–48 (48-port model)
MGMT
MODEM
UPLINK GigE (RJ45)
UPLINK GigE (SFP)
V.35/X .21
A single BitStorm 4800 is referred to as a unit or chassis. The first or only unit is
referred to as Unit 1.
Stack
Up to eight units may be interconnected, sharing a single uplink; this arrangement
is called a stack.
4800-A2-GB20-10July 2002
2-1
Page 18
2. Terminology and Conventions
DSL Port ID
There are several ways a DSL port can be identified in the BitStorm 4800. The
term Port ID in this manual, in reference to a DSL port, refers to any of the possible
identifiers for a DSL port.
Interface Number.
Port s 1–48 of the BitStorm 4800 can be referred to by the
numbers 1–48 respectively. Port numbers 25–48 are invalid for the 24-port
model.
Example:
IAC#configure interface dsl 24 line-code dmt
Interface Name.
You can use the
configure interface dsl name
command to
assign a name to the port, which you can then use instead of the number. See
The port ID can be expressed as a combination
of the BitStorm 4800 unit number and a port number. In the initial release, 1 is
the only valid unit number.
may be used to specify all DSL ports in a command that
all
refers only to DSL por ts.
Example:
IAC#configure interface dsl all line-code dmt
Range.
Any of the port ID types may be used as an operator in a range
specification. The only requirement is that the port used as the first operator in
a range must have a lower interface number than the second operator.
The Ethernet por t s on the BitStorm 4800 are identified by the following names:
– for the MGMT port
mgmt
Reserved Names
downlink
uplink
– for the Ethernet DOWNLINK GigE port
– for the Ethernet UPLINK GigE port
These can be used alone or in combination with the unit number to identify the
three ports. Unit number is described in
System Terminology
on page 2-1. The
term Port ID in this manual, in reference to an Ethernet port, refers to any of the
possible identifiers for an Ethern et port.
Example:
IAC#configure interface ethernet downlink mode auto
IAC#configure interface ethernet 1/uplink mode auto
The following are reserved names and may not be assigned as DSL port names:
/ (slash)
all
dhcp
downlink
mgmt
uplink
v35
4800-A2-GB20-10July 2002
2-3
Page 20
2. Terminology and Conventions
2-4
July 20024800-A2-GB20-10
Page 21
Using the Command Line
Interface
Overview
The Command Line Interface (CLI) is accessible via either a directly connected
terminal session or a Teln et connect ion. You can use the CLI to:
Change the operational characteristics of the device by setting configuration
values
Display system status
Perform diagnostics
3
Access Levels
The system supports multiple simultaneous CLI sessions.
CLI users have one of two access levels:
User –
Administrator
The Administrator level requires a second password.
At least one login ID and one password are internally stored for each user, and can
be modified by the administrator. If the user has administrator privileges, one
login ID and two passwords are stored (one for User privilege and one for
Administrator privilege). The passwords must be different for User level and
Administrato r l evel access for th e same login ID.
The user may display cer t ain configuration and statu s information.
– The user has access to all commands.
4800-A2-GB20-10July 2002
3-1
Page 22
3. Using the Command Line Interface
Logging In
When the CLI connection is first established, a login prompt is displayed:
Login>
Enter a user name. The first time you log in on a new unit, type the name
and press Enter. The password prompt is displayed:
Password>
Enter the password associated with the user name. The default password for
admin is null, so press Enter without typing anything. The following prompt is
displayed:
IAC>
Type
privilege
show that you must enter the administrator privilege password. The first time you
log in, just press Enter.
The following prompt is displayed:
IAC#
For security purposes, immediately establish new passwords for the user name
admin. See
Command Line Prompts
The command line prompt shows the user access level, whether there are any
unsaved configuration changes, and at what level you are in the command tree.
and press Enter. The password prompt is displayed again to
Configure User-Accounts
in Appendix A,
CLI Command Descriptions
admin
.
For the User access level, the following prompt is displayed:
IAC>
For the Administrator access level, the following prompt is displayed:
IAC#
If changes have been made to the configuration in this or a previous session that
have not been changed, an exclamation point is added to the prompt. For
example:
IAC#!
The next secti o n,
tree further affects the prompt.
Modes of Operation
, shows how your position in the command
3-2
July 20024800-A2-GB20-10
Page 23
Modes of Op eration
You may enter CLI commands in their entirety on one line. For example:
Alternatively, you may logically position the command interface at any point in the
command tree structure by entering partial commands. The prompt shows where
you are in the command structure. For example:
IAC#configure
IAC(configure)#interface
IAC(configure-interface)#dsl
IAC(configure-interface-dsl)#1/1
IAC(configure-interface-dsl-1/1)#line-code dmt
IAC(configure-interface-dsl-1/1)#!latency fast
You can move back up the command tree using the
The
example, if DSL interface 1/1 is being configured, the following prompt is
displayed:
command positions the CLI up one level in the command tree. For
command positions the interface one level higher :
back
Automatic Command Completion
Commands and keywords can be abbreviated to as few characters as are required
to make them uniquely identifiable. For example,
configure
ambiguous.
You can request automatic com pletion of a comman d or keyword you have
partially typed by pressing the T ab ke y. If the command or keyword you have typed
is ambiguous, the Tab key displa ys the options for completion.
and
is a valid abbreviation for
cop
is a valid abbreviation for
con
, but the abbreviation
copy
co
is
4800-A2-GB20-10July 2002
3-3
Page 24
3. Using the Command Line Interface
Command History Buffer
The last 15 commands are maintained in a command history buffer. You can use
the Up Arrow and Down Arrow keys to scroll through and redisplay commands,
then alter and resubmit a command maintained in the buffer.
Mor e Prompt
Command Help
The CLI lets you control the flow of text to the screen with a
(see
Paging
If paging is disabled, text is sent to the screen without interruption. If paging is
enabled, only 23 lines of text are displayed at a time. A
on line 24 of your screen, and you can do the following:
To view the next screen of output, press the spacebar.
To view the next line of output, press the Enter key.
To return to the command line, press q or any other key besides the spacebar
and Enter key.
The paging command affects only the user who enters the command.
You can obtain help when you enter commands by using the following methods:
To list all commands for a specific level, enter a question mark (?) at the
system prompt:
To obtain a list of commands that start with a particular character set, enter an
abbreviated command immediately followed by a question mark:
in Appendix A,
IAC#?
CLI Command Descriptions
paging
).
More
command
prompt is displayed
To list a command's keywords or arguments, enter a question mark in place of
a keyword or argument on the command lin e:
3-4
July 20024800-A2-GB20-10
IAC#configure sys?
IAC#configure management ?
Page 25
Keyboard Definitions
The following table summarizes the special uses of keys in the CLI:
Press . . .To . . .
Ctrl-cClear the current command line entry, exit a command line
Ctrl-zTerminate a privileged mode sessi on and conti nue the sessi on in
Down ArrowRecall commands from the command line history buffer starting
3. Using the Command Line Interface
prompt without answering, or abort the command in progress.
standard mode. If Ctrl-z i s entered by a user not in privileged
mode, it places the user at the top of the command tree.
with the first command in the buffer.
EnterSubmit the current command li ne, or, if a
displayed, display the next line of text.
qAbort a
(Pressing any key other than Enter or the spacebar has this
effect.)
? (Question Mark)Display the Help text for the current command.
SpacebarDisplay the next page of output when a
on line 24 of your screen.
Up ArrowScroll to the prev ious v al id comm and li ne entry leavi ng the curs or
at the end of the entry.
Command Syntax Error Handling
The CLI checks the syntax of commands you enter. If an error is detected, the
following prompt is displayed:
Syntax error - use '?' to see valid completions
The prompt returns to normal when you press the Enter key.
Automatic Logout
More
prompt is
More
prompt and return to the command line prompt.
More
prompt is displayed
The unit automatically terminates the CLI session if the Inactivity Timeout duration
is exceeded. The Inactivity Timeout is configurable. See
Options
4800-A2-GB20-10July 2002
in Appendix A,
CLI Command Descriptions
Configure System
.
3-5
Page 26
3. Using the Command Line Interface
Configuring the System
In order to configure the unit you must be at the Administrator access level.
Configuration changes take effect immediately . Ho wev er , the changes are made to
the running configuration, which is in RAM (Random Access Memory). You must
enter the
NVRAM (Non-Volatile RAM).
If there are unsaved changes, an exclamation point (!) is added to the prompt to
remind you, or other administrators, of the outstanding changes. The changes
remain in RAM and can be saved until the unit is powered off or reset.
For informat ion abou t what elements of the system you can configure, see the
configure
Configure Bridge
save
command to save your changes to the startup configuration in
commands in Appendix A,
on page A-5.
CLI Command Descriptions
, beginning with
3-6
July 20024800-A2-GB20-10
Page 27
Using the Web Interface
Overview
The BitStorm 4800 supports a Web interface that can be used with a Web browser
to perform the same functions as the command line interface:
Change the operational characteristics of the device by setting configuration
values
Display system status
Perform diagnostics
4
Web interface users have one of two access levels:
User –
Administrator
The unit configuration can be changed only by a user with Administrator level
access.
Browsers Supported
The Web interface can be used with Internet Explorer version 4 or above, and
Netscape 4.7 and above, under Windows or Unix. Under Windows, version 6 or
above of either browser is recommended.
The user may display cer t ain configuration and statu s information.
– The user has access to all screens and functions.
4800-A2-GB20-10July 2002
4-1
Page 28
4. Using the Web Interface
Navigation
All main screens of the Web interface can be reached by clicking on hyperlinks in
the four menu boxes on the left side of the screen:
Status
memory. The Status screen of a 48-port model is shown.
Diagnostics
– Use the Status screens to display statistics, status, and contents of
– Use the DIagnostics screens to start and stop tests.
4-2
July 20024800-A2-GB20-10
Page 29
4. Using the Web Interface
Configuration
interfaces, and filters.
– Use the Configuration screens to configure the system,
System
– Use the System screens to display system information, download
firmware, back up configurations, and modify users.
For more information, click on the Help button on any screen.
4800-A2-GB20-10July 2002
4-3
Page 30
4. Using the Web Interface
Logging In
When you first connect to the BitStorm 4800 (by opening its IP address in your
Web browser), a password dialog box appears. Enter
and enter nothing in the Password field. Click on OK.
For best security, use the System/Users screen to immediately change the default
password for the admin user.
Configuring the System
for the User Name,
admin
Use the
Use the
Click on Apply in each screen to save your selections to the running configuration.
Configuration
Bridge tab le
Filters
Interfaces
Management
Security
Subscriber Management Syst em Virtual Local Area Network
System log
System
Date and time
System options and identification
screens to configure the following:
screens to configure the following:
4-4
July 20024800-A2-GB20-10
Page 31
Saving the Co nfiguration
Procedure
To save your configuration to non-volatile RAM:
1. Go to the System/Save and Restore screen.
2. Click on Save Running Config.
4. Using the Web Interface
Logging Out
To end a session, close your Web browser. This prevents an unauthorized user
from accessing the system using your user name and password.
4800-A2-GB20-10July 2002
4-5
Page 32
4. Using the Web Interface
4-6
July 20024800-A2-GB20-10
Page 33
Monitoring and Troubleshoot ing
Overview
The chapter describes ways to monitor the status of the BitStorm 4800, and to
diagnose problems. These include:
5
System Log
Front Panel LEDs
Show Commands and Web Interface Status Screens
on page 5-2
on page 5-6
on page 5-6
4800-A2-GB20-10July 2002
5-1
Page 34
5. Monitoring and Troubleshooting
System Log
The system log (syslog) contains messages of up to eight different levels of
importance. From high to low, they are:
Emergency
Alert
Critical
Error
Warning
Notice
Informational
Debug
– Action must be taken immediately to prevent serious problems.
– The system is unusable.
– Critical condition.
– Error condition.
– Warning condition.
– Normal but noteworthy condition.
– Messages pert aining to command processing.
– Debug-level messages for developers.
The level of messages written to the log can be set using
command of the Command Line Interface, or the
Configuration/Syslog
the Web interface. The levels are:
emergency
alert
informational
– Alert and emergency mess ages are logged.
– Only emergency messages are logged.
– Informational, notice, warning, error, critical, alert, and
emergency messages are logged.
– All messages are logged.
debug
configure syslog
screen of
Viewing the System Log
You can view the system log using the
Line Interface, or the
Message Format
System log messages have the format:
For example:
show syslog
Status/Syslog
Priority: Month/Day: HH:MM:SS
screen of the Web interface.
:
Message
ALERT Jun 5 00:14:59 Link Down on Por t 2
command of the Command
5-2
July 20024800-A2-GB20-10
Page 35
Messages
5. Monitoring and Troubleshooting
The following are the system log messages of greatest impor tance.
Messages may be associated with SNMP traps. See Appendix B,
Table 5-1.System Log Messages (1 of 3)
MessagePriorityMeaning
Bootp Obtained Mgmt IP Address
Address :
address
address
address
address
address
, Mask=
, Mask=
, Mask=
;
, Mask=
, Mask=
mask
mask
mask
mask
mask
Address=
Gateway=
Bootp Obtained Mgmt IP Address
Address :
Address=
Gateway=
replaced by
Bootp Obtained Mgmt IP Address
Address :
Address=
Gateway=
Bootp Obtained Mgmt IP Address
Address :
Address=
Gateway=
replaced by
Statically Configur ed M gm t IP
Address Address :
Address=
Gateway=
address
address
address
address
address
AlertBOOTP obtain ed the di splayed
management IP address and gateway
,
AlertBOOTP replaced the management IP
,
,
AlertAn administrator has replaced the
,
,
address.
address and gateway address.
management IP address and gateway
address obtained by BOOTP.
SNMP Traps
.
Cold Start Completed - System
Operational.
DSL Port
DSL Port
Fan
overheating.
Fan
Ftp Session Log :
UserName :
UserAcct :
Cmd Exec :
Cmd Status :
Log On Time :
Log Off Time :
Ftp Server IP :
GigE Down Link: Unit
Down.
GigE Down Link: Unit
Unit u Link Down. AlertThe specified DSL interface is down.
p
Unit u Link Up. AlertThe specified DSL interface has come
p
has Failed, unit at risk of
f
is Restored. AlertThe specified fan (1–3) has restarted.
f
user
acct
exec
status
time
time
address
: Link
u
: Link Up. AlertThe specified GigE Downlink port has
u
AlertThe system has success fully started
after a hardware reset.
up.
AlertThe specified fan (1–3) has failed.
Notify your service representative.
AlertAn FTP session has occurred with the
displayed characteristics.
AlertThe specified GigE Downli nk port has
gone down.
come up.
4800-A2-GB20-10July 2002
5-3
Page 36
5. Monitoring and Troubleshooting
Table 5-1.System Log Messages (2 of 3)
MessagePriorityMeaning
GigE Up Link: Unit u: Link Down. Al ertThe specified GigE Uplink port has
gone down.
GigE Up Link: Unit
MAC Address and Physical Port
Mismatch: Unauthorized User
(
user
) on DSL port u by
Management Port: Unit
Down.
Management P ort: Unit
Pow er On Self T est FAILED . AlertOne or more of the hardwar e self -tes ts
Statically Configur ed M gm t IP
Address Address :
Address=
Gateway=
replaced by
Bootp Obtained Mgmt IP Address
Address :
Address=
Gateway=
address
address
address
address
u
: Link Up. AlertThe specified GigE Uplink port has
come up.
AlertThe hardware address of the user on
the specified port has changed,
access
.
u
: Link
u
: Link Up. AlertThe MGMT port has come up.
, Mask=
, Mask=
mask
mask
AlertThe MGMT port has gone down.
AlertThe manually set managem ent IP
,
,
possibly signaling a security breach.
failed. If possible, use the show
system self-tes t CLI command or the
System/Self-Test Results Web
interfa ce screen to determine the area
of failure. Notify your service
representative.
address and gateway address have
been replaced by tho se obtained from
a BOOTP request.
Statically Configur ed M gm t IP
Address Address :
Address=
Gateway=
replaced by
Statically Configur ed M gm t IP
Address Address :
Address=
Gateway=
Statically Configur ed M gm t IP
Address Address :
Address=
Gateway=
System Fault communication with
Subsystem
System Restored communication
with Subsystem
Temperature has fallen below 70
degrees Celsius.
address
address
address
address
address
address
subsystem
subsystem
, Mask=
, Mask=
;
, Mask=
;
.
mask
mask
mask
.
,
,
,
AlertAn administrator has replaced the
displayed management IP address
and gatewa y address.
AlertAn administra tor has set the displ ayed
management IP address and gateway
address.
AlertA system fault occurred. Notify your
service representative.
AlertThe system recovered from a system
fault.
AlertThe unit temperature, which had risen
above 70° C , has fallen below that
threshold.
5-4
July 20024800-A2-GB20-10
Page 37
5. Monitoring and Troubleshooting
Table 5-1.System Log Messages (3 of 3)
MessagePriorityMeaning
Temperature has ri sen above 70
degrees Celsius, unit at risk of
Overheating.
Temperature has ri sen above 75
degrees Celsius, unit at risk of
SHUTTING DOWN.
Test Agent POST results fr om
subsystem
Time Client unable to locat e NTP
Server.
V.35 Link: Unit
V.35 Link: Unit
V.35 Loopbac k Test Activated.
Duration is
V.35 Loopback Test Terminated.AlertThe test on the V.35/X.21 port was
Failed.
u
: Link Down. AlertThe V.35/X.21 inter face has gone
u
: Link Up. AlertThe V.35/X.21 interface has come up.
n
seconds.
AlertThe unit temperature has risen above
70° C. Shut down the unit as soon as
possible, and notify your service
representative.
Emergency The unit temperature has risen above
75° C. Shut down the unit as soon as
possible, and notify your service
representative.
AlertThe Power-On Self-Test of the
specified s ubsystem fai led. Notify y our
service representative.
AlertThe SNTP server is not respon ding, so
the system date and time are not set
and updated automatic all y.
down.
AlertA test has been initiated on the
V.35 /X.21 po rt .
terminated.
4800-A2-GB20-10July 2002
5-5
Page 38
5. Monitoring and Troubleshooting
Front Panel LE D s
If you have access to the unit, check the front panel LEDs. These are described in
the
BitStorm 4800 Installatio n Guide
.
If an LED that should be lit during normal operation is not lit, verify that it is
functional by using the
Diagnostics/Test LEDs
test leds
screen of the Web interface.
command of the Command Line Interface or the
Show Commands and Web In terface Status Screens
The
command of the Command Line Interface and various screens of the
show
Web interface show the condition of the unit and its interfaces, including error
statistics for the ports. The following table shows how to access the informat ion.
Table 5-2.How to Locate Status Information
For Information
About . . .Use the CLI Command . . .
Status/DSL Port Statistics
Status/Ethernet Statistics
Address
Management (IPsec)show management ipsecConfigurat ion/IPsec
Management (SNMP) show management snmpConfi guration/SNMP
Self-Test Resultsshow system selft estSystem/Self-Test Results
Syslogshow syslogSt atus/Syslog
Systemshow system st atusStatus/System Information
Userssho w user-accountsStatus/Users
5-6
July 20024800-A2-GB20-10
Page 39
CLI Command Descriptions
CLI Commands
The BitStorm 4800 can be managed with text commands from the Command Line
Interface (CLI). The CLI can be accessed:
Locally via a PC or asynchronous terminal connected to the CONSOLE port.
Remotely via a Telnet session.
The following conventions are used in descriptions of the commands:
A
ConventionMeaning
[ ]
{ }
|
x
y
[{ }]
Helvetica It alic
Courier Bold
Underscore
x.x.x.x
xx-xx-xx-xx-xx-xx
Commands are shown in this appendix in alphabetical order, regardless of
function or access level required.
A choice of optional parameters. Command par ameters enclosed
in neither brackets nor braces are required.
A choice of required parameters. Command par am eters enclosed
in neither brackets nor braces are required.
Mutually exclusive elements. Enter one element only (either x or y
in this example).
A required choice within an optional element.
A variable.
A command and its key wor ds. I t is nec essa ry to type only as much
of a command or ke yword as is required to distin guish it from
others. The CLI soft ware automatically fills in the rest.
If a keyword is underscored, it is the default value f or the
command.
IP address or subnet mask. Each x denotes a decimal value
0–255.
MAC address . Each x denotes a hexadecimal digit 0–f.
For general information abou t using the CLI, see Chapter 3,
Line Interface
4800-A2-GB20-10July 2002
Using the Command
.
A-1
Page 40
A. CLI Command Descriptions
Back
The
command logically positions the CLI in the command structure.
back
Ta ble A-1.Back Command
back
Minimum Access Level:
back
The
DSL interface 1/1 i s being configured, the fol lowing prompt is displayed:
IAC(configure-interface-dsl-1/1)#
The back command retu rns the di splay to the
prompt
– Multiplexing forwarding mode. The system treats each DSL port as if it were a
private network connected to the uplink, and never forwards data on another DSL port.
sms
– Subscriber Management System (SMS) mode . The system treats each DSL port
as if it were a priv ate net work conne cted to t he upli nk, and never forwards data on another
DSL port. In addition, a managem ent Vi rtual Local Area Network (VL AN) is cr eated on t he
uplink for use by the SMS.
switch
– Switched mode. The syst em acts as a transparent learning bridge. Thi s is the
default.
uplink-tag
unique VLAN tag. The system therefore treats each DSL port as if it were a priv ate
network connected to the uplink, and never forwards data on another DSL port.
Example:
IAC#
– UpLink Tagging mode. All traffic from the DSL subscriber ports is given a
configure bridge mode mux
Administrator
command specifies the mode the bridge will operate in.
configure bridge timeout {
Minimum Access Level:
configure bridge timeout
The
learned entry may exist in the bridge table without apearing as the source address of a
received fram e.
time
– The amount of time, in seconds, that an entry may exist. The valid range is
10–1000000 seconds, or 0 (zero, which specifies that no timeouts will occur). The default
is 300.
Example:
configure bridge timeout 0
IAC#
4800-A2-GB20-10July 2002
Administrator
command specifies the maximum amount of time a
time
}
A-5
Page 44
A. CLI Command Descriptions
Configure Date
The
configure date
command sets the date, time, and time zone in the
BitStorm 4800.
When it is first powered on, the unit attempts to obtain the date and time from an
NTP server on the Internet. If it fails, the unit’s date is set to Januar y 1, 2001, and
the time is set to 00: 00: 00.
Table A-5.Configure Date Command
configure date [
Minimum Access Level:
configure date
The
mm/dd/yy or dd/mm/yy
date format is set by the
Configure System Options Com m and ); the default order i s mo nth, day, and year.
hh:mm
– Specifies the time in hours (0–23) and minutes (0–59).
Example:
configure date 03/21/02 13:05
IAC#
mm/dd/yy
Administrator
command sets the date and time.
– specifies the month, day, and year, each as two digits. The
configure system options
configure date-timezone {
Minimum Access Level:
configure date-timezone
The
relati ve to.
time_zone
and time represent. Ho urs before GMT are expressed as negative number s and hours
after GMT are expressed as positive numbers (with or without a plus sign). Half hours are
supported as decimals. Valid values are –12 through 12.
Offsets are listed in Table F-1, Time Zone Names, in Appendix F,
can also obtain a list of time zone offsets using the command:
configure date-timezone ?
The unit does not adjust f or Daylight Savings Time.
Examples:
IAC#
IAC#
IAC#
– Specifies the of fset in hours from Greenwich Mean Time (GMT) that the date
command specifies the t ime zone the date and time are
] [
hh:mm
command (see Table A-18,
]
}
Reference Tables
. You
A-6
July 20024800-A2-GB20-10
Page 45
Configure Factory
A. CLI Command Descriptions
The
configure factory
command loads the factory default parameters into the
running configuration. The default parameters take immediate effect, but are not
saved. Execute the Save command to save the parameters to Non-Volatile
Random-Access Memory (NVRAM).
Factory defaults include a management address of 10.10.10.10, so if you are
managing the BitStorm 4800 using Telnet over a different address, your
connection is terminated upon execution of the
configure factory
command. It is
therefore recommended that this command be executed from the Console or
Modem port.
Tabl e A-6.Configure Factory Command
configure factory
Minimum Access Level:
configure factory
The
Example:
configure factory
IAC#
Administrator
command loads factory default parameters.
4800-A2-GB20-10July 2002
A-7
Page 46
A. CLI Command Descriptions
Configure Filter
Filters restrict select types of user data on a particular interface. There are three
steps to implementing a filter in the BitStorm 4800:
Define filter rules (see
Define a named filter comprising one or more rules (see Table A-7, Configure
Configure Filter-Rule
on page A-10)
Filter Command)
Bind the filter to an interface (see
The
configure filter
command creates and deletes filters.
Configure Filter-Binding
on page A-9)
Tabl e A-7.Configure Filter Command
configure filter create
[
rule_name_1
Minimum Access Level:
configure filter cr eate
The
filter_name
characters.
forward
conditions specified in the rule or rules are matched.
discard
in the rule or rules are matched.
rule_name_1
must be already defined using the
Configure Filter-Rule Command).
Example:
IAC#
– Specifies that a packet is to be forwarded to the user when none of the
– Specifie s that a pac ke t is to be discar ded when no ne of the co nditi ons speci fied
Minimum Access Level: Administrator
The configure interface dsl line-code command spe cifies the line code for a DSL port.
port_id
described in
line-code – Valid choices are:
Example:
IAC#
4800-A2-GB20-10July 2002
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– ansi – The port uses ANSI T1.413-1998.
– dmt – The port uses G.dmt (G.992.1).
– g.lite – The port uses G.lite (G.992.2).
– multimode – The port automatical ly senses the line code in accordance wi th
G.994.1. This is the default.
confi gu re interface dsl 1/24 line-code ansi
in Chapte r2,
port_id
}
}
Terminology and Conventions
.
A-13
Page 52
A. CLI Command Descriptions
Table A-10. Configure Interface Command (4 of 11)
configure interface dsl {
port_id
linkupdown-trap {disabled | enabled
Minimum Access Level: Administrator
The configure interf ace dsl linkupdown-trap command specifies whether an SNMP
trap should be sent upo n li nk up and li nk down events.
port_id
described in
linkupdown-trap – Valid choices are:
Example:
IAC#
configure interface dsl {
Minimum Access Level: Administrator
The config ure in terf ace dslmax-downstream-speed command speci fies the maximu m
rate, in Kbps, available for traffic from the port toward the CPE. If behavior is set to fixed,
this is the only downst ream rate.
port_id
described in
rate
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– disabled – No traps are sent upon link up and link down events.
– enabled – A trap is sent upon a link up or link down event. This is the default.
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– Valid rates are:
– For dmt and ansi: 64 to 8128 Kbps in 32 Kbps increments. The default is 8128.
– For g.lite: 64 to 4000 Kbps in 32 Kbps increments. The default is 4000.
Minimum Access Level: Administrator
The configure interface dsl min-downstream-speed command specifies the minimum
rate, in Kbps, t o adapt to for traffic from the port toward the CPE.
port_id
described in
min-downstream-speed – Valid rates are:
Example:
IAC#
– Identifies the port to be configured. The poss ible forms of the identif ier are
Sys tem Termin ol ogy
– For dmt and ansi: 64 to 8128 Kbps in 32 Kbps increments. The default is 128.
– For g.lite: 64 to 4000 Kbps in 32 Kbps increments. The default is 128.
Minimum Access Level: Administrator
The configure interf ace ethernet connector command spec ifies the physical interface
to be used when both interfaces are active at the sam e time. Ordinarily the BitStorm 4800
uses the fiber optic port if an SFP transceiver is detected , so this command provides a
way to force the use of the 8-position modul ar jack even if a transceiver is ins talled.
Minimum Access Level: Administrator
The configure interface v35 flow-control command determines what lead, if any, is
used for flo w control.
flow-control – Valid choices are:
Example:
IAC#
confi gu re interface v35 clock-source internal
– cts – The CTS lead is monitored for flow control.
– dsr - The DSR lead is monitored for flow control.
– none - No hardware flow control is used. This is the def ault.
confi gu re interface v35 flow-control dsr
configure interface v35 idle-char {flag | mark}
Minimum Access Level: Administrator
The configure interface v35 idle-char command specifies whether the port should
transmit the flag character (hexad ecimal 7E) or all ones (hexadecimal FF) between
frames on the V.35/X.21 interface on a 4804 Management Module.
flag – Valid choices are flag and mark. The default is flag.
Example:
confi gu re interface v35 idle-char mark
IAC#
configure interface v35
invert-tx-clock {disabled
Minimum Access Level: Administrator
The configure interface v35 invert-tx- clock command specifies whether the clock
supplied by the 4804 Management Module V.35/X.21 port on the TXC interchange circuit
DB (ITU/T 114) is phase inv erted with respect to the Transmitted Data interchange circuit
BA (ITU/T 103).
invert-tx-clock – Invert Transmit Clock. Valid choices are disabled and enabled. The
default is disabled.
Example:
confi gu re interface v35 invert-tx-clock enabled
IAC#
| enabled}
A-20
July 20024800-A2-GB20-10
Page 59
Table A-10. Configure Interface Command (11 of 11)
A. CLI Command Descriptions
configure interface v35 rate {
Minimum Access Level: Administrator
The configure interface v35 rate command specifies the port rate in Kbps for the
V.35/X.21 interface on a 4804 Management Module. This value is ignored if clock-source
is external.
rate – Valid rates are 64 to 8192 Kbps in 64 Kbps increments. The default is 2048.
Example:
confi gu re interface v35 rate 1536
IAC#
rate
}
configure interface v35 show
Minimum Access Level: Administrator
The configure in ter face v35 show command displays parameters for the V.35/X.21 port
without leaving configuration mode .
Example:
confi gu re interface v35 show
IAC#
configure interface v35 state {disabled | enabled}
Minimum Access Level: Administrator
The configure interface v35 state command specifies the availabi li ty of the V.35/X.21
interfa ce on a 4804 Managem ent Module.
state – Valid choices are disabled and enabled. The default is enabled.
Example:
confi gu re interface v35 state disabled
IAC#
configure interface v35 type {eia530a | v35 | x21}
Minimum Access Level: Administrator
The configu re inter face v35 t ype command sp eci fies t he elect rical int erf a ce used for the
V.35/X.21 port on a 4804 Management Module.
type – Valid choices are:
– eia530a – The interface is EIA-530-A.
– v35 – The interface is V.35. This is the default.
– x21 – The interface is X.21.
Example:
confi gu re interface v35 type v35
IAC#
4800-A2-GB20-10July 2002
A-21
Page 60
A. CLI Command Descriptions
SNR Margin (DSL Interfaces)
SNR (Signal-to-Noise Ratio) is the amplitude of the desired signal compared to the
amplitude of noise on the line. Margin is the amount of noise that can be tolerated
before a communication error or link establishment failure occurs. There are three
settings in the BitStorm 4800 related to SNR margin:
min-snr-margin
target-downstream-margin
target-upstream-margin
If behavior is set to adaptive, the target-downstream-margin and
target-upstream-margin settings determine the highest rates the modems can train
to. These rates may be less than the maximum configured rates.
For example, if target-downstream-margin is set to 6, the modems will train
(establish communication) at the highest rate downstream at which there is at
least 6 dB of margin, or, if it is lower, the maximum configured rate
(max-downstream-speed, in this case).
If behavior is set to fixed, the target margins determine the acceptabi lity of the
signal at the selected fixed rate. If the margin is lower than the target margin at
that rate, the modems train again.
The min-snr-margin setting is for the upstream direction only . I t causes the modem
to retrain if the margin falls and remains below the setting for 60 seconds.
A-22
July 20024800-A2-GB20-10
Page 61
Configure IP
A. CLI Command Descriptions
The
configure IP
command is used to specify IP parameters.
Table A- 11. Co n figure I P C ommand
configure ip nhr {
Minimum Access Level:
configure ip nhr
The
ports in the system.
ip_address
Example:
IAC#
– Specifies the IP address of the next-hop router.
configure ip nhr 135.75.90.112
ip_address
Administrator
command determines the Next- Hop Router (NHR) address for all
}
4800-A2-GB20-10July 2002
A-23
Page 62
A. CLI Command Descriptions
Configure Management
The
configure management
command sets parameters for remote management
of the BitStorm 4800.
Table A-12. Configure Management Command (1 of 9)
configure management address
{bootp | {{
Minimum Access Level:
configure management address
The
BitStorm 4800, or specifies that it will be assigned using BOOT P (Bootstrap Protocol).
bootp
– Specifies that a BOOTP server will determine the management IP address.
Management addresses are cleared in anticipation of a BOOTP response.
command changes the routable IP address of the IPsec tunnel at the remote end for a
specified connection.
connection_name
remote_host
Example:
IAC#
remot e- tu nnel-address 135.90.27.3
configure management ipsec connection modify
{
Minimum Access Level: Administrator
The configure management ipsec connection modify spi command sets the Security
Profile Index for the Encapsulating Security Payload protocol for a specif ied connection.
connection_name
spi
in – The SPI is assigned to the inbound connection.
out – The SPI is assigned to the outbound connection.
both – The SPI is assigned to both the inbound and outbound connections. This is the
default.
Example:
IAC#
connection_name
– Specifies the routable IP address of the IPsec tunnel at the remote end.
Minimum Access Level: Administrator
The configure management snmp nms-address command specifies the IP addresses
of up to eight NMS (Network Management System) workstations allowed to access the
BitStorm 4800. If SNMP Access Validation is disabled, these addresses have no effect.
Minimum Access Level: Administrator
The configure management vlan command specifies a VLAN tag to be added to
management traff ic. VL AN taggin g is enab l ed only i f the Bridge Mode i s sms o r uplink- ta g.
See
Configure Brid ge
vlan_tag
Example:
IAC#
– Specifies the val ue of the VLAN tag. Vali d values are 1–15.
configure management vlan 12
on page A-5.
vlan_tag
}
A-32
July 20024800-A2-GB20-10
Page 71
Configure Scheduler
A. CLI Command Descriptions
The
configure scheduler
command sets parameters for automatic backup.
Table A-13. Configure Scheduler Command (1 of 2)
configure scheduler {disabled | enabled}
Minimum Access Level:
configure scheduler
The
occurs.
disabled
enabled
Example:
IAC#
– Specifies automatic configuration backup will not occur. This is the default.
– Specifies that auto ma tic configuration backup will occur .
configure scheduler enabled
configure scheduler dynamic [
Minimum Access Level:
configure schedule r dynamic
The
backup will o cc u r a fte r ea c h con f ig u rat io n ch a nge.
hh:mm
– Specifies the amount of time aft er a configuration change t hat a conf iguration
backup will automatically occur. Time is specified in hours (1–24) and minutes (0-59)
separated by a colon. The default and minimum is 00:30 (30 minutes).
Example:
configure scheduler dynamic 24:00
IAC#
Administrator
command determines whether automati c config uration bac k up
– Specifies the day of the week backups will occur. If daily is selected, a
– Specifies the time of da y the bac ku p will occur. Time is specifi ed in hour s (1–23)
Administrator
command specif ies th e fix ed ti mes at which conf igur ation
hh:mm
}
4800-A2-GB20-10July 2002
A-33
Page 72
A. CLI Command Descriptions
Table A-13. Configure Scheduler Command (2 of 2)
configure scheduler ftp {
{
filename
Minimum Access Level: Administrator
The configure sche duler ftp command defines the FTP (File Transfer Protocol) server
used for automatic configuration backup.
ip_address
user_name
password
filename
Example:
IAC#
}
– Specifies the network add ress of the FTP server.
– Specifies a user name accepted by the FTP server.
– Specifies the password associated with the user name.
– Specifies the file contai ning the configuration backup.
confi gu re scheduler ftp 135.27.90.98 admin admnpas s ia c2 _b kup
ip_address
} {
user_name
} {
password
}
configure scheduler ftp timestamp {append | none}
Minimum Access Level: Administrator
The configure sche duler ftp timestamp command determines whether a timestamp is
added to filenames to distinguish them from each other and prevent overwriting existing
files.
append – Date and time are added to the filename.
none – The filename is used as entered. This is the default.
Example:
configure scheduler ftp timestamp append
IAC#
A-34
July 20024800-A2-GB20-10
Page 73
Configure Security
A. CLI Command Descriptions
The
configure security
See
IP Security
on page A-38 for a detailed description of the IP security table.
command limits access to the system.
Table A-14. Configure Security Command (1 of 3)
configure security ip {
Minimum Access Level:
configure secur ity i p
The
IP addresses associated with a DSL port. For more information see
page A-38.
port_id
described in Chapter 2,
disabled
specified port. This is the default.
enabled
the specified port. The system must be in multiplex forwarding (mux) mode, else the
following message is displayed:
See Table A-4, Configure Bridge Command for information about mux forwarding mode.
Example:
IAC#
– Identifies the DSL port to be affected. The possible forms of the identifier are
– Specifies that ther e are no restrictions on the number of IP addresses on the
– Specifies that t here are restrictions on the number of IP addresses allo wed on
Comma nd not allowed: System must be in mux forwardin g mo de
configure security ip 1/1 enabled
Administrator
command determines whet her ther e is a l imit on the numbe r o f
Terminology and Conventions
port_id
} {disabled | enabled}
IP Security
.
on
configure security ip {
Minimum Access Level:
configure security ip add
The
a particular DSL port. For more information see
port_id
described in Chapter 2,
ip_address
allowed IP addre sses already has the number of addres ses specified by the
security IP max-ip
nhr_address
default addr ess.
Example:
IAC#
– Identifies the DSL port to be affected. The possible forms of the identifier are
– Specifies an IP address allowed to be active on the port. If the table of
Command not allowed: Too many static entries
– Specifies the address of the Next Hop Router for this port. It overrides the
configure security ip 1/1 add 135.27.90.2 135.27.90.21
Administrator
Terminology and Conventions
command, the following error message is displayed:
port_id
command specifes an IP address allowed to be active on
} add {
IP Secur ity
ip_address
on page A-38.
.
} {
nhr_address
}
configure
4800-A2-GB20-10July 2002
A-35
Page 74
A. CLI Command Descriptions
Table A-14. Configure Security Command (2 of 3)
configure security ip {
Minimum Access Level: Administrator
The configure security ip delete command deletes an IP address in the table of
addresses allo wed to be active on a particular DSL port.
port_id
described in Chapter 2,
ip_address
of addresses for this port. You can displa y the table using the config u re se cu rity ip
show command.
Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies an IP address to be deleted. The address must exist in the table
confi gu re security ip 1/1 delete 135.27.90.2
configure security ip {
Minimum Access Level: Administrator
The configure security ip max-ip command specifes the number of IP addresses
allowed to be active on a particular DSL port. For more information see
page A-38.
port_id
described in Chapter 2,
max_ip
range is 1–20. The default is 1.
Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies the maximum number of IP addresses allowed on the port. The valid
configure security ip 1/48 max-ip 2
port_id
port_id
} delete {
.
} max-ip {
.
ip_address
max_ip
}
}
IP Security
on
configure security ip {
Minimum Access Level: Administrator
The configure security ip show command displays the table of addresses allowed for a
particular DSL port.
port_id
identifier are descri bed in Chapter 2,
Example:
IAC#
– Identifies the port whose table is to be displayed. The possible forms of the
configure security ip 1/48 show
port_id
} show
Ter minology and Conventions
.
A-36
July 20024800-A2-GB20-10
Page 75
Table A-14. Configure Security Command (3 of 3)
A. CLI Command Descriptions
configure security mac {
Minimum Access Level: Administrator
The configure security mac add command specifes a MAC address allowed to send
data to a particular DSL port. The address is added to a table of up to 20 entries.
port_id
described in Chapter 2,
mac_address
any other MAC add ress is dropped. Adding an address automatically enables the MAC
address filtering feature for the port. The address must be in the form
where each
Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies a MAC address all owed to send data to the port. Traffic from
is a hexadecimal digit 0–f.
x
configure security mac 1/1 add 00-01-d2-e4-d3-c1
configure security mac {
Minimum Access Level: Administrator
The configure security mac delete command deletes a MAC address in the table of
addresses allo wed to send data to a particular DSL port.
port_id
described in Chapter 2,
mac_address
table of address es fo r this port. You can display the tab le usi ng the co nfigure secu rity ma c
show co m mand . The addre ss mu s t be i n the form
hexadecim al digit 0–f.
all – Specifies that all MA C addresses defined for the port are to be deleted. The MAC
address filtering feature is disabl ed for the port.
Example:
IAC#
– Identifies the port to be affected. The possible forms of the identifier are
Terminology and Conventions
– Specifies a MAC address to be del eted. The address must exist in the
configure security mac 1/1 delete 00-01-d2-e4-d3-c1
port_id
port_id
} add {
mac_address
.
} delete {
.
xx-xx-xx-xx-xx-xx
}
xx-xx-xx-xx-xx-xx
mac_address
, where each x is a
,
| all}
configure security mac {
Minimum Access Level: Administrator
The configure security mac show command displays the table of MAC addresses
allowed for a particular DSL port.
port_id
identifier are descri bed in Chapter 2,
Example:
IAC#
4800-A2-GB20-10July 2002
– Identifies the port whose table is to be displayed. The possible forms of the
configure security ip 1/48 show
port_id
} show
Ter minology and Conventions
.
A-37
Page 76
A. CLI Command Descriptions
IP Security
Entries in the table of allowed IP addresses are made in one of two ways:
Dynamic
entries are automatically learned by the unit by monitoring DHCP
messages that pass through the unit between a subscriber's host and a DHCP
server. Learning of dynamic entries in this manner is always active. Dynamic
entries are not retained in non-volatile storage so they are lost when the unit is
reset or loses power. Dynamic entries are removed if and when the lease on
the DHCP-provided address expires or when the host relinquishes its lease on
the address.
entries are entered by an administrator using the
Static
add
command
. Static entries are saved in non-volatile storage and can only be
configure security ip
removed by administrator action.
Entries in this table are used for two functions:
If the bridge mode is configured for multiplexing, entries in the table control the
flow of hardware (MAC) address information via ARP requests and responses
passing through the unit.
If the unit is configured for multiplexing and there is not an entry in this table
for a subscriber's host, that host will not be able to obtain MAC address
information for other hosts on the subnet via the BitStorm 4800. In addition,
hosts that are connected on the upstream side of the unit will not be able to
obtain MAC information for this subscriber's host. (A host that is connected on
the DSL side of the unit cannot obtain MAC address informat ion about any
host other than the port's Next Hop Router when the unit is configured for
multiplexing.)
For typical TCP/IP communications, the inability to obtain MAC address
information effectively blocks communications. However, it may ha ve no effect
at all on other protocols (such as PPPoE) that do not require the MAC address
information that is obtained via ARP messages.
If IP Security is enabled for a DSL por t, the unit drops all messages that are
received at that port whose Ethertype is not either ARP or IP and whose
source IP address is not found in the IP address table.
When IP Security is enabled for a DSL port, the restrictions on upstream data flow
described above are enforced. In addition to restricting communication to only
those addresses that are in the table, a maximum can be set on the number of
addresses that can be in use on a port. This number is the sum of the static and
dynamic entries for that port. If the limit is reached, the unit will block all requests
for allocation of additional addresses via DHCP. This condition remains until one of
the following happens:
The lease on an existing dynamic entry for this port expires
A subscriber's host connected to this por t releases its DHCP-assigned
address
One or more entries are deleted from the table by an administrator
The limit on the number of entries is increased
IP Security is disabled on the port
A-38
July 20024800-A2-GB20-10
Page 77
Configure SNTP
A. CLI Command Descriptions
The
configure sntp
commands define the use of a Simple Network Time Protocol
(SNTP) server to set and update the date in time in the unit. If SNTP is enabled,
the unit makes an SNTP request at initialization and then periodically at the
interval specified by the
configure sntp interval
command.
Table A-15. Configure SNTP Command
configure sntp {disable | enable}
Minimum Access Level:
configure sntp
The
disable
enable
server.
Example:
IAC#
– The unit does not make SNTP requests. Date and time must be set manually.
– The unit update s the date and time peri odical ly b y sending r eques ts to an SNTP
configure sntp disable
configure sntp address {
Minimum Access Level:
configure sntp addre ss
The
ip_address
Example:
IAC#
– The address of an SNTP server. The default is 192. 5.41.40.
configure sntp address 137.90.127.40
Administrator
command determines whether the unit makes SNTP requests .
ip_address
Administrator
command specifies the IP address of an SNTP server .
}
configure sntp interval {
Minimum Access Level:
configure sntp interval
The
SNTP requests to update the date and t ime.
interval
default is 24.
Example:
IAC#
– The period, in hours, between SNTP requests. Valid values are 1–24. The
configure sntp interval 12
Administrator
command specifies the frequency that the unit should make
interval
}
4800-A2-GB20-10July 2002
A-39
Page 78
A. CLI Command Descriptions
Configure Syslog
The
configure syslog
command limits the messages written to the system log
– All messa ges ( sati sfyi ng the sy slog t hre shold se tti ng) are writte n to the sys tem
– Duplicate messages are written to the system log only if they are received
configure syslog rate-limiting disabled
Administrator
command determines whether dupl icate messages
configure syslog threshold
{emergency | alert
Minimum Access Level:
configure syslog threshold
The
written to the system log.
emergency
alert
information
log.
debug
system log.
Example:
IAC#
– Only emergency messag e s are written to the system log.
– Emergency and alert messages are written to the system log. This is the default.
– Emergency, alert, and informati onal messages are written to the system
– Emergency, alert, informational, and debugging messages are writte n to th e
configure syslog threshold information
| information | debug}
Administrator
command specifies the levels of messages that are
A-40
July 20024800-A2-GB20-10
Page 79
Configure System Information
A. CLI Command Descriptions
The
configure system information
commands store a system name, location,
and description.
Table A-17. Configure System Information Command
configure system information system-location {
Minimum Access Level:
configure system information system-location
The
the system.
location
Example:
IAC#
Building_C_First_Floor
– Up to 36 printable charac ters. No spaces are allow ed.
configure system information system-location
configure system information system-name {
Minimum Access Level:
configure system information system-name
The
the system.
name
– Up to 36 printable characters. No spaces are allowed.
Example:
configure system information system-name Paradyne_IAC_8
IAC#
Administrator
command stores th e location of
name
Administrator
command stores a name identifying
location
}
}
4800-A2-GB20-10July 2002
A-41
Page 80
A. CLI Command Descriptions
Configure System Options
The
configure system options
commands configure system-wide parameters for
the BitStorm 4800.
Table A-18. Configure System Options Command (1 of 2)
configure system options
date-display-format {dd/mm/yy | mm/dd/yy
Minimum Access Level:
configure system options date-display-format
The
format displayed and accepted by the system.
dd/mm/yy
mm/dd/yy
Example:
IAC#
– The date displa y format is in the order day, month, year.
– The date displa y format is in the order month, day, year. This is the default.
configure system options date-display-format dd/mm/yy
Administrator
configure system options inactivity-timeout {
Minimum Access Level:
configure syst em options inactivity-ti m eout
The
session can exist with no activity before it is terminated by the system.
time
– Specifies the amount of time in minutes an inac ti ve telnet session can exist before
it is terminated. The valid range is 1–20. The default is 5 minutes. A value of 0 (zero)
disables the inactivity timeout.
Example:
configure system options inactivity-timeout 10
IAC#
Administrator
command specif ies how long a telnet
}
command determines the date
}
time
configure system options
port-display-format {name | sle | unit/port
Minimum Access Level:
configure system options port-display-format
The
ports are identified by the system. The va rio us ways of distinguishing ports are described
in
System Terminology
name
– Ports are refe rr ed to by name.
sle
– Ports are referred to by Single Logical Enti ty ( S LE) number.
unit/port
Example:
IAC#
– Ports are referred to by unit number and port number. This is the default.
configure system options port-display-format sle
Administrator
in Chapter 2,
command determine s the way DSL
Term inology and Conventions
}
.
A-42
July 20024800-A2-GB20-10
Page 81
A. CLI Command Descriptions
Table A-18. Configure System Options Command (2 of 2)
configure system options test-timeout {
Minimum Access Level: Administrator
The configure system options test-timeout command specifi es the maximum amount
of time a disruptive test is allowed to run.
time
– Specifies the amount of time in minutes a disruptive te st can run before it is
terminated. The vali d range is 1–30. The default is 5 minutes.
Example:
configure system options test-timeout 2
IAC#
time
}
4800-A2-GB20-10July 2002
A-43
Page 82
A. CLI Command Descriptions
Configure Uplink
The
configure uplink
command determines whet her the GigE Uplink port or the
V.35/X .21 port on the Management Module is used for the uplink. If the
Management Module has a V .35/X.21 port, the V .35/X.21 port is the default uplink.
This command therefore allows you to override the default by specifying the GigE
Uplink port as the uplink.
Table A-19. Configure Uplink Command
configure uplink {gige-uplink | module}
Minimum Access Level:
configure uplink
The
gige-uplink
module
Example:
IAC#
– The uplink is the GigE Uplink Ethernet port.
– The uplink is the V.35/X.21 port on the Management Module.
configure uplink gige-uplink
Administrator
command determines the port used f or t he uplink.
A-44
July 20024800-A2-GB20-10
Page 83
Configure Uplink-Tag
A. CLI Command Descriptions
The
configure uplink-tag
commands assign a VLAN tag to every DSL port. The
range of numbers is determined by a base number and an index number:
The default base value is 16 and the default index value is 1, so the default VLAN
tags for DSL ports 1–48 of a unit are 16–63, respectively.
Table A-21. Configure Uplink-Tag Command
configure uplink-tag base {
Minimum Access Level:
configure uplink-tag base
The
setting VLAN tags for the DSL ports.
base
– Specifies the base value used in setting the range of VLAN tags. Valid values are
16, 512, 1024, 1536, 2048, 2560, 3072, and 3584. The default is 16. See Table A-20,
VLAN Tag Ranges, to see the effect of the base on VLAN tag ranges.
Example:
configure uplink-tag base 1024
IAC#
Administrator
command determines the base value to be used for
configure uplink-tag index {
Minimum Access Level:
configure uplink-ta g index
The
setting VLAN tags for the DSL ports.
index
– Specifies the inde x val ue use d in setting t he range of VLAN ta gs. Valid val ues are
1–5. The default is 1. See Table A-20, VLAN Tag Ranges, t o see the effect of the index on
VLAN tag ranges.
Example:
configure uplink-tag index 2
IAC#
Administrator
command determines the index value to be used for
base
index
}
}
4800-A2-GB20-10July 2002
A-45
Page 84
A. CLI Command Descriptions
Configure User-Accounts
The
configure user-accounts
commands create and delete user accounts for
managing the BitStorm 4800.
Table A-22. Configure User-Accounts Command
configure user-accounts
create {
Minimum Access Level:
configure user- accounts create
The
passwor ds for it. It also can be used to change passwords .
user
– Specifi es a user name of 1–15 print able characte rs. Spaces are not al lowed. If the
user already ex ists, the command modifies the password or passwords for the user.
login_password
allowed. A login password is required of al l users.
privilege_password
not allowed. The opti onal second password allows users to enter privileged mode to
configure the system . The privilege passwor d mu st be different than the login password.
volatile me mory. The running config uration is not permitted as the sour ce or dest inati on of
an FTP operation.
startup-config
non-volatile memory.
Example:
IAC#
command copies the configurati on of the BitStorm 4800. It can be used to save
– Specifies that the source or destination file is on an FTP server. The ftp keyword
ip_address
–
user_name
–
password
–
filename
–
copy ftp 135.90.28 .28 ftpuser ft ppw save.c onfig star tup-conf ig
– The password associated with the user name
– The name of the source or destinati on fi le
– Specifi es that the s ource or destinati on file is the configuration i n active
– Specifies that the sour ce or destination file is the configuration in
Administrator
– The IP address of the FTP server
– A user name allowed on the FTP server
End
The
end
Ta ble A-24. End Command
end
Minimum Access Level:
end
The
standard mode. If the end comm and is executed by a user not in privileged mode, it
places the user at the top of the com m and tr ee li ke one or more
Example:
end
IAC#
You are ending your privilege mode session
IAC>_
4800-A2-GB20-10July 2002
command terminates privileged mode.
Administrator
command terminates a privileged mode session and continu es the session in
back
commands.
A-47
Page 86
A. CLI Command Descriptions
Exit
Firmware
The
command terminates the user session.
exit
Tabl e A-25. Exit Command
exit
Minimum Access Level:
exit
The
connection is dropped.
Example:
IAC#
The
command terminates the user sess ion. If the user session is by te lnet, the
exit
firmware
command downloads and applies new firmware to the
User
BitStorm 4800, and displays the version numbers of the active and alternate
firmware.
Table A-26. Firmwar e Command (1 of 2)
firmware download {
ip_address
} {
user_name
} {
password
} {
filename
{no | yes}
}
Minimum Access Level:
firmware download
The
optionally applies it immediately.
ip_address
user_name
password
filename
no
– The file is downloaded to the alternate firmware area, but not applied or executed.
yes
– The file is downloade d and applied immediately. The BitStorm 4800 is reset.
Example:
IAC#
– Specifies the network add ress of the FTP server.
– Specifies a user name accepted by the FTP server.
– Specifies the password associated with the user name.
– Specifies the file contai ning the configuration backup.
firmw ar e dow nload 135.27.90.98 admin admnpa ss fi rm 03 02.bin no
Administrator
command downloads ne w fi rmware to the BitStorm 4800, and
firmware download-status
Minimum Access Level:
firmware download-status
The
firmware download.
Example:
firmw ar e dow nload-status
IAC#
Administrator
command displa ys the status of the active or last
A-48
July 20024800-A2-GB20-10
Page 87
Table A-26. Firmwar e Command (2 of 2)
firmware revision
A. CLI Command Descriptions
Paging
Minimum Access Level:
firmwar e revision
The
running and alternate firmware maintained in memory.
Example:
firmware revision
IAC#
Administrator
command displa ys the revision numbers of the firmwar e currently
firmware switch
Minimum Access Level:
firmware switch
The
resets the BitStorm 4800.
Example:
firmware switch
IAC#
IAC#S wi tc h from firmware revision S01.02.03 to fir mw ar e revision
S01.02.04? (yes/no)
IAC#Firmware switched, system rebooting
The
paging
command enables and disables the More prompt.
Administrator
command loads and executes the alternative firmware file. This
yes
Tabl e A-27. Paging Command
paging {disabled | enabled}
Minimum Access Level:
paging
The
affects onl y the user who enters the command.
disabled
enabled
prompt is displayed on line 24. When
– Press the space bar to view the next screen of output
– Press the Enter key to view the next line of output
Example:
IAC>
command determines how a full screen of output is displayed. The selection
– Specifies that output is sent to the screen without interruption.
– Specifies that when 23 lines of output have been sent to the screen, a
paging enabled
User
More
is display ed, you can:
More
4800-A2-GB20-10July 2002
A-49
Page 88
A. CLI Command Descriptions
Password
Privilege
The
password
If the
command changes the password at the current level:
password
command is executed while in privilege mode, the privilege
password is changed
If the
password
command is executed while in user mode, the user password
is changed
Ta ble A-28. Password Command
password
Minimum Access Level:
password
The
depending on which level is active.
Example:
password
IAC#
enter old admin level password:
enter new admin level password:
enter new admin level password again:
password changed
IAC#
command changes the user or administrator (privilege) password,
User
****
******
******
The
privilege
command switches the user to Administrator mode.
Table A-29. Privilege Command
privilege
Minimum Access Level:
privilege
The
When the passwor d is entered correctly, the user is placed in Administrator (privileged)
mode.
Example:
privilege
IAC>
Password:
IAC#
command causes the user to be prompted for an administrator passwor d.
******
User
A-50
July 20024800-A2-GB20-10
Page 89
Restart
A. CLI Command Descriptions
Save
The
restart
command restarts the unit.
Table A-30. Restart Command
restart unit {
Minimum Access Level:
restart unit
The
and retrain the DSL ports.
Example:
restart unit 1
IAC#
The
command saves the running configuration to Non-Volatile Random
save
unit_number | unit_name
command restarts the unit, causing it to reload the startup configuration
Administrator
}
Access Memory (NVRAM).
Table A-31. Save Command
save
Minimum Access Level:
save
The
startup configuration file, which is in nonvolatile memory.
The
not yet been saved. It returns to
Example:
IAC#!
IAC#_
command copies the running conf iguration, which is in v olatile memory, to the
IAC#
prompt changes to
save
Administrator
IAC#!
when the configur ation has been changed and has
IAC#
after the
save
command is ex ecuted.
4800-A2-GB20-10July 2002
A-51
Page 90
A. CLI Command Descriptions
Show
The
command displays configuration options and statistics.
show
Table A-32. Show Command (1 of 20)
show bridge [
Minimum Access Level:
show bridge
The
port_id
Example:
IAC#
Displa y results:
– Specifies that the display should be limite d to entries for a single port.
show br id ge
Mode
– The functional mode of the bridge:
– switched – Switched mode. The system acts as a transparent learning bridge.
– multiplexing – The system treats each DSL port as if it were a private network
connected to the uplink, and never forwards data on another DSL port.
– sms – The system treats each DSL port as if it were a pri vate network connected to
the uplink, and never forwards data on another DSL port. In addition, a
management VLAN is created on the uplink for use by the SMS.
Total Entries
hardware address
port-id
– The port ID of the entry .
status
– The status of the entry:
– invalid – This learned entry has timed out but has not yet been deleted.
– learned – This entry was learned.
– management – This entry has a matching static address.
– other – None of the other st atuses apply to this entry.
– self – This entry is the BitStorm 4800.
port_id
command displays the MAC table .
– The number of entries currently in the table.
]
User
– The MAC address of the table entry.
show bridge timeout
Minimum Access Level:
show bridge timeout
The
seconds.
Example:
show br id ge ti meout
IAC#
Displa y results:
timeout
A-52
July 20024800-A2-GB20-10
User
command displays the bridge table entry timeout value in
– The bridge table entry timeout value.
Page 91
A. CLI Command Descriptions
Table A-32. Show Command (2 of 20)
show date
Minimum Access Level: User
The show date command di splays the system date, time, and time zone
Example:
show date
IAC#
Displa y results:
mm/dd/yy
hh/mm/ss
timezone – The offset from Greenwi ch Mean Time.
dd/mm/yy
or
– The date in the chosen system format.
– The time in hours, minutes, and seconds.
show filter [
filter_name
]
Minimum Access Level: User
The show filter com m and displays configured data filters.
filter_name
– Specifies that the display should be limited to a sing le filter.
Example:
show fi lt er
IAC#
Displa y results:
filter-name
action
– The name of the filter.
– The action to be performed:
– forward – Specifies that a packet is to be forwarded to the user when none of the
conditions specified in the rule or rules are matched.
– discard – Specifi es that a packet is to be discarded when none of the conditions
specified in the rule or rules are matched.
rule-name – The name assigned to the rule or rules associated with th is filter.
type – The rule type:
– ether – The rule is based on Ethertypes.action – The action to perform if the rule is satisfied:
– forward – The packet is forwar ded.
– discard – The packet is discarded.
rule – The rule criteria :
– The Ethertypes the rule affects.
4800-A2-GB20-10July 2002
A-53
Page 92
A. CLI Command Descriptions
Table A-32. Show Command (3 of 20)
show filter-binding [filter [
Minimum Access Level: User
The show filter-binding command displays the bindings of filters to interfaces.
filter – Specifies that output is sorted b y fi lt er name.
filter_name
port – Specifies that output is sorted by port number.
port_id
Example:
IAC#
Displa y results:
port-id – The port the rule is bound to.
filter-name – The name of the filter.
direction – The direction of the data stream affected by this binding:
– inbound – Traffic towar d the port is affected.
– outbound – Traffic from the port is affect ed.
show filter-rule [
Minimum Access Level: User
– Specifies that the display should be limited to a sing le filter.
– Specifies that the display should be limite d to a sin gle port.
show fi lt er- binding
rule_name
filter_name
]
]] | [port [
port_id
]]
The show filter-rule command displays configured filter rules.
filter_name
Example:
IAC#
Displa y results:
rule-name – The name assigned to the rule.
type – The rule type:
– ether – The rule is based on Ethertypes.
– ether-snap – The rule applies to Layer 2 SubNetwork Access Protocol (SNAP)
action – The action to perform if the rule is satisfied:
– forward – The packet is forwar ded.
– discard – The packet is discarded.
rule – The rule criteria :
– The Ethertypes the rule affects.
– Specifies that the display should be limited to a sing le filter.
show fi lt er- rule
traffic.
A-54
July 20024800-A2-GB20-10
Page 93
A. CLI Command Descriptions
Table A-32. Show Command (4 of 20)
show interface console
Minimum Access Level: User
The show interface console command di splays the co nfi guration of the Console port on
the 4800 or 4804 Management Module.
Example:
show interface console
IAC#
Displa y results:
Configuration parameters for the port. See the conf igure interface console commands
in Table A-10, Configure Interface Command, for information about the par am eters.
show interface dsl {
Minimum Access Level: User
The show interfa ce dsl clear-stati stics command resets statistics for all DSL ports or a
specified DSL port.
port_id
specified, all statistics are cleared.
clear-statistics – Resets to zero the st a tis tics for this se s si on . Th is affect s o nl y th e
statistics di spla y ed using the show command during this session . All stat isti cs conti nue to
be maintained.
Example:
IAC#
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl all clear-statistics
show interface dsl {
Minimum Access Level: User
The show interfa ce dsl conf iguration command displays information about all DSL
ports or a specified DSL port.
port_id
specified, information is displayed for all ports.
configuration – Specifies that the port’s configuration should be displayed.
Example:
IAC#
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl 1/1 configuration
port_id
port_id
} clear-statistics
} configuration
Displa y results:
Configuration parameters for the port. See the conf igure interface dsl commands in
Table A-10, Configure Interface Com m and, for information about the parameters.
4800-A2-GB20-10July 2002
A-55
Page 94
A. CLI Command Descriptions
Table A-32. Show Command (5 of 20)
show interface dsl {
Minimum Access Level: User
The show interface dsl performance command displays performance information for all
DSL ports or a specified DSL port.
port_id
specified, information is displayed for all ports.
performance – Specifies that performance statistics for the specified port should be
displayed.
Example:
IAC#
Displa y results:
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl all performance
Status – The status of the link:
– dormant – The link has not yet trained up.
– down – The link is down.
– notConnected – The link is training.
– unknown – The link’s status cannot be determined.
– up – The link is enabled and ready to send packets.
Line Rate Up – The upstream data rate.
Line Rate Down – The do wnstream data rate.
Margin Up – The amount of distortion that can be tolerated, in dBm, upstream.
Margin Down – The amount of dist ortion that can be tolerated, in dBm, downst ream.
Attainable Rate – The maximum rate negotiated.
Attenuation – The decrease of intensity of the signal across the link, in dB.
port_id
} performance
show interface dsl {
Minimum Access Level: User
The show interface dsl rate command displays the data rate for all DSL ports or a
specified DSL port.
port_id
specified, information is displayed for all ports.
rate – Specifies that t he current rate of the specified port should be displayed.
Example:
IAC#
– Specifies that the display should be limite d to thi s specified port. If all is
show interface dsl all rate
port_id
} rate
A-56
July 20024800-A2-GB20-10
Page 95
Table A-32. Show Command (6 of 20)
A. CLI Command Descriptions
show interface d sl rate,
continued
Displa y results:
Status – The status of the link:
– dormant – The link has not yet trained up.
– down – The link is down.
– notConnected – The link is training.
– unknown – The link’s status cannot be determined.
– up – The link is enabled and ready to send packets.
Line Rate Up – The upstream data rate.
Line Rate Down – The do wnstream data rate.
show interface dsl {
port_id
} statistics
Minimum Access Level: User
The show interfa ce dsl statistics command displays statistics for all DSL ports or a
specified DSL port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all ports.
statistics – Specifes that the error stati stics for the speci fied port should be displayed.
Example:
show interface dsl 1/1 statistics
IAC#
Displa y results:
dsl link – The status of the link:
– dormant – The link has not yet trained up.
– down – The link is down.
– notConnected – The link is training.
– unknown – The link’s status cannot be determined.
– up – The link is enabled and ready to send packets.
current link up time – The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
line code – The line code used on the port: DMT, ANSI, or G.lite.
latency – The buffer setting for the port: fast or interleaved.
4800-A2-GB20-10July 2002
A-57
Page 96
A. CLI Command Descriptions
Table A-32. Show Command (7 of 20)
show interface dsl statistics,
continued
DSL Statistics (Up and Down denote values f or t he upstream and downstream directi ons):
margin – The amount of noise margin that can be tolerated, in dB.
rate – The data rate.
attainable rate – An estimate of the maximum attainable rate.
attenuation – The decrease of intensity of the signal across the link, in dB.
errored second s – Seconds during which an error occurred.
severely errored seconds – Seconds during which there was a major error suc h as
an out of frame condition, or a bit error density greater than 10
unavailable seconds – Seconds accrued after ten consecutive severely errored
–2
.
seconds.
loss of power – Number of times the remote unit has been powered off.
ATM Statistics (Up and Down denote values for the upstream and downstream
directions):
total cells rx – Total number of ATM cells received.
total cells tx – Total number of ATM cells sent.
total HEC – Number of cells from the CPE whose headers were corrected.
total OCD – Number of Out of Cell Delineation eve nts on the link from the CPE.
Ethernet Statistics:
total frames discarded – Number of frames discarded due to errors.
total bytes rx – Number of bytes received on the port.
total b y tes tx – Number of bytes transmitted by the port.
total frames rx – Number of bytes received on the port.
total frames tx – Number of bytes transmitted by the port.
total rx errors – Number of frames received with error s.
total tx errors – Number of frames transmitted with er rors.
show interface ethernet {
port_id
} clear-statistics
Minimum Access Level: User
The show interface ethernet clear- statistics command resets st atistics for all Ethernet
ports or a specified port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all Ethernet ports.
clear-statistics – Resets to zero the st a tis tics for this se s si on . Th is affect s o nl y th e
statistics di spla y ed using the show command during this session . All stat isti cs conti nue to
be maintained.
Example:
show in te rfa ce ethernet 1/mgmt clear-statis tic s
IAC#
A-58
July 20024800-A2-GB20-10
Page 97
Table A-32. Show Command (8 of 20)
A. CLI Command Descriptions
show interface ethernet {
port_id
} configuration
Minimum Access Level: User
The show int erface e the rnet conf i guratio n command displ a ys confi gurat ion i nf ormation
for all Ethernet ports or a specifi ed port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all Ethernet ports.
configuration – Specifies that the port’s configuration should be displayed.
Example:
show in te rfa ce ethernet 1/mgmt configuratio n
IAC#
Displa y results:
current link up time – The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
The remainder of the display shows configuration parameters for the port. See the
configure interface ethernet commands in Table A-10, Configure Interface Command,
for more inf ormation about the parameter s.
show interface ethernet {
port_id
} statistics
Minimum Access Level: User
The show interface eth ernet statisti cs command disp la ys stati stic s f or all Ethernet ports
or a specified port.
port_id
– Specifies that the display should be limite d to thi s specified port. If all is
specified, information is displayed for all Ethernet ports.
statistics – Specifes that the error stati stics for the speci fied port should be displayed.
Example:
show in te rfa ce ethernet 1/mgmt statistics
IAC#
Displa y results:
ethernet link – The status of the link:
– dormant – The link has no de vice attached.
– down – The link is down.
– unknown – The link’s status cannot be determined.
– up – The link is enabled and ready to send packets.
current link up time – The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
rate – The data rate of the port.
mode – The duplex mode: full duplex or half duplex.
connector type – The connector used for the link: rj 45 or fiber.
total bytes rx – Number of bytes received on the port.
total b y tes tx – Number of bytes transmitted by the port.
total frames rx – Number of bytes received on the port.
total frames tx – Number of bytes transmitted by the port.
total frames discarded – Number of frames discarded b y the port.
4800-A2-GB20-10July 2002
A-59
Page 98
A. CLI Command Descriptions
Table A-32. Show Command (9 of 20)
show interface modem
Minimum Access Level: User
The show interfa ce mode m command displays the confi guration of the Modem port on
the 4800 or 4804 Management Module.
Example:
IAC#
Displa y results:
The remainder of the display shows configuration parameters for the port. See the
configure int erface modem commands in Table A-10, Configure Int erf ac e Command , f or
more information about the parameters.
show interface v35 clear-statistics
Minimum Access Level: User
show in te rfa ce modem
current link up time – The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
The show interf ace v35 c lea r -stat istics command r esets st atis tics for the V.35/X.21 port
of the 4804 Management Module.
clear-statistics – Resets to zero the st a tis tics for this se s si on . Th is affect s o nl y th e
statistics di spla y ed using the show command during this session . All stat isti cs conti nue to
be maintained.
Example:
show interface v35 clear-statistics
IAC#
show interface v35 configuration
Minimum Access Level: User
The show interfa ce v35 configuration command displays configuration information for
the V.35/X.21 port of the 4804 Management Module.
configuration – Specif ies that the V.35/X.21 port’s configuration should be displayed.
Example:
show interface v35 configuration
IAC#
Displa y results:
current link up time – The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
The remainder of the display shows configuration parameters for the port. See the
configure interface v35 commands in Table A-10, Configure Interface Comman d, for
more information about the parameters.
A-60
July 20024800-A2-GB20-10
Page 99
A. CLI Command Descriptions
Table A-32. Show Command (10 of 20)
show interface v35 statistics
Minimum Access Level: User
The show interfa ce v35 statistics command displays statistics for the V.35/X.21 port of
the 4804 Management Module.
statistics – Specifes that the error stati stics for the V.35/X.21 port should be displayed.
Example:
show interface v35 statistics
IAC#
Displa y results:
seria l li nk – The status of the link:
– dormant – The link has no de vice attached.
– down – The link is down.
– testing – A test is in progress on the link.
– unknown – The link’s status cannot be determined.
– up – The link is enabled and ready to send packets.
current link up time – The number of da ys, hour s, min ute s, and seco nds the interf ac e
has been active.
link type – The electrical interface:
– eia530a – The interface is EIA-530-A.
– v35 – The interface is V.35.
– x21 – The interface is X.21.
RTS – The status of the Request To Send lead (on or off).
CTS – The status of the Clear To Send lead (on or off).
DSR – The status of the Data Set Ready lead (on or off).
DTR – The status of the Data Terminal Ready lead (on or off ).
LSD – The status of the Line Signal Detect lead (on or off).
HDLC Up lin k St at is ti cs :
total frames receiv ed – Total number of frames received.
total frames transmitted – Total number of frames sent.
total receive erro rs – Number of errors detected in i ncom ing data.
total transmit errors – Number of errors detected in outgoing data
PPP Uplink Statistics:
total receive bytes – Total number of bytes re ceived.
total transmit bytes – Total number of bytes sent.
total receive erro rs – Number of errors detected in i ncom ing data.
total transmit errors – Number of errors detected in outgoing data
4800-A2-GB20-10July 2002
A-61
Page 100
A. CLI Command Descriptions
Table A-32. Show Command (11 of 20)
show ip nhr
Minimum Access Level: User
The show ip nhr command displays the address of the Ne xt Hop Router.
Example:
IAC#
Displa y results:
show management arp
Minimum Access Level: User
The show management arp command displays the ARP table for the management
interface.
Example:
IAC#
show ip nhr
nhr address – The management Ne xt Hop Router IP address.
show ma na gem ent arp
Displa y results:
ip address – The IP address of the entry.
mac addr es s – The hardware address of the entry.
type – The source of the add ress:
– dynamic – The address was learned.
– static – The address was added to the table b y an adm inistrator.
show management ip
Minimum Access Level: User
The show management ip command displays the Management Module settings.
Example:
show ma na gem ent ip
IAC#
Displa y results:
ip address – The management IP address.
subnet mask – The subnet mask to be appl ied to the IP address.
gateway – The management next hop or gateway IP address.
A-62
July 20024800-A2-GB20-10
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.