Lucent Stinger FS Instruction Manual

Stinger®
Administration Guide
Part Number: 363-217-010R9.8.1
For software version 9.8.1
November, 2005

Lucent Technologies
Copyright © 2002-2005 Lucent Technologies Inc. All rights reserved.
This material is protected by the copyright laws of the United States and other countries. It may not be reproduced, distributed, or altered in
any fashion by any entity (either internal or external to Lucent Technologies), except in accordance with applicable agreements, contracts, or
licensing, without the express written consent of Lucent Technologies. For permission to reproduce or distribute, please email your request to
techcomm@lucent.com.
Notice
Every effort was made to ensure that the information in this document was complete and accurate at the time of printing, but information is
subject to change.
For latest information, refer to online product documentation at www.lucent.com/support.
This product may utilize zlib for the execution of certain compression functions.
(C) 1995-2002 Jean-loup Gailly and Mark Adler. Provided "AS IS" without warranty of any kind.
European Community (EC) RTTE compliance
Hereby, Lucent Technologies, declares that the equipment documented in this publication is in compliance with the essential require-
ments and other relevant provisions of the Radio and Telecommunications Technical Equipment (RTTE) Directive 1999/5/EC.
To view the official Declaration of Conformity certificate for this equipment, according to EN 45014, access the Lucent INS online documentation
library at http://www.lucentdocs.com/ins.
Safety, compliance, and warranty Information
Before handling any Lucent Access Networks hardware product, read the Edge Access and Broadband Access Safety and Compliance Guide included
in your product package. See that guide also to determine how products comply with the electromagnetic interference (EMI) and network
compatibility requirements of your country. See the warranty card included in your product package for the limited warranty that Lucent
Technologies provides for its products.
Security statement
In rare instances, unauthorized individuals make connections to the telecommunications network through the use of access features.
Trademarks
Lucent, the Lucent logo, and all Lucent brand and product names are trademarks or registered trademarks of Lucent Technologies Inc. Other
brand and product names are trademarks of their respective holders.
Ordering Information
You can order the most up-to-date product information and computer-based training online at http://www.lucentdocs.com/bookstore.
How to comment
To comment on this information product, go to the Online Comment Form (http://www.lucent-info.com/comments/enus/) or email your
comments to the Comments Hotline (comments@lucent.com).

Stinger® Administration Guide iii
Customer Service
Product and service information, and software upgrades, are available 24 hours a day.
Technical assistance options accommodate varying levels of urgency.
Finding information and software
To obtain software upgrades, release notes, and addenda for this product, log in to
Lucent OnLine Customer Support at http://www.lucent.com/support.
Lucent OnLine Customer Support also provides technical information, product
information, and descriptions of available services. The center is open 24 hours a day,
seven days a week. Log in and select a service.
Obtaining technical assistance
Lucent OnLine Customer Support at http://www.lucent.com/support provides easy
access to technical support. You can obtain technical assistance through email or the
Internet, or by telephone. If you need assistance, make sure that you have the
following information available:
■ Active service or maintenance contract number, entitlement ID, or site ID
■ Product name, model, and serial number
■ Software version or release number
■ Software and hardware options
■ If supplied by your carrier, service profile identifiers (SPIDs) associated with your
line
■ Whether you are routing or bridging with your Lucent product
■ Type of computer you are using
■ Description of the problem
Obtaining assistance through email or the Internet
If your services agreement allows, you can communicate directly with a technical
engineer through Email Technical Support or a Live Chat. Select one of these sites
when you log in to http://www.lucent.com/support.
Calling the technical assistance center (TAC)
If you cannot find an answer through the tools and information of
Lucent OnLine
Customer Support
or if you have a very urgent need, contact TAC. Access
Lucent
OnLine Customer Support
at
http://www.lucent.com/support
and click
Contact
Us
for a list of telephone numbers inside and outside the United States.
Alternatively, call 1-866-LUCENT8 (1-866-582-3688) from any location in North
America for a menu of Lucent services. Or call +1 510-747-2000 for an operator. If
you do not have an active services agreement or contract, you will be charged for
time and materials.


Stinger® Administration Guide v
Contents
Chapter 1 Administering a Stinger System ......................................................1-1
About standalone and hosted Stinger systems......................................................... 1-1
Logging into a Stinger unit....................................................................................... 1-2
Enabling basic security measures ............................................................................. 1-3
Changing the default Admin password ............................................................... 1-3
Securing the serial port of each control module................................................ 1-3
Specifying a management-only Ethernet interface ........................................... 1-4
Managing administrative access to the unit ............................................................. 1-5
Administering the system remotely using secure shell (SSH) and Telnet ......... 1-5
Logging in using SSH ......................................................................................... 1-5
TAOS implementation................................................................................. 1-5
User authentication ..................................................................................... 1-6
MAC verification ......................................................................................... 1-6
Key generation ............................................................................................ 1-6
Encryption and MAC key re-exchange ....................................................... 1-7
Limitations .................................................................................................. 1-7
Configuring the secure shell server............................................................. 1-7
Logging into a system using secure shell..................................................... 1-9
Log messages related to SSH support .......................................................... 1-9
Telnet access .................................................................................................... 1-10
Disabling telnet access ............................................................................... 1-10
Enabling mild authentication.................................................................... 1-10
Creating Telnet access control lists............................................................ 1-10
Summary of administrative access available.................................................... 1-12
Creating user profiles for administrative access ..................................................... 1-12
Creating a new administrative profile ............................................................. 1-13
Enabling two level authentication................................................................... 1-14
Settings in the user profile and comparable RADIUS attributes ............... 1-14
Settings in the system profile .................................................................... 1-16
Sample configuration ................................................................................ 1-17
Specifying the maximum number of login attempts ....................................... 1-17
Authentication from a remote shelf to a host Stinger unit.............................. 1-18
User account and user password expiration .................................................... 1-19
What happens when a user account or user password expires ................ 1-19
RADIUS support for account and password expiration ............................ 1-19
Setting expiration dates for user accounts and passwords ........................ 1-20
Enforcing a password check ...................................................................... 1-21
Changing a user password......................................................................... 1-21
Assigning permissions...................................................................................... 1-22
Understanding command permissions ...................................................... 1-221-22
1-22
1-21
1-21
1-20
1-19
1-19
1-19
1-18
1-17
1-17
1-16
1-14
1-14
1-13
1-12
1-12
1-10
1-10
1-10
1-10
1-9
1-9
1-7
1-7
1-7
1-6
1-6
1-6
1-5
1-5
1-5
1-5
1-4
1-3
1-3
1-3
1-2
1-1
1-1

vi Stinger® Administration Guide
Contents
Specifying group permissions for commands and profile access ............... 1-24
Specifying a time-out for user logins ............................................................... 1-29
Setting the command-line prompt .................................................................. 1-29
Setting log levels for each login ....................................................................... 1-29
Logging in as a different user........................................................................... 1-30
Displaying the current user ............................................................................. 1-30
Basic system settings .............................................................................................. 1-31
Setting the system name.................................................................................. 1-31
Setting the system time and date..................................................................... 1-31
Viewing the system time and date ............................................................ 1-31
Changing the system time......................................................................... 1-31
Changing the system date ......................................................................... 1-31
Configuring system clocking............................................................................ 1-32
Displaying the current clock-source.......................................................... 1-32
Configuring trunk ports as clock sources .................................................. 1-32
Displaying basic system information ...................................................................... 1-33
Displaying system hardware information and software version ..................... 1-33
System and module uptime............................................................................. 1-34
Using the status window.................................................................................. 1-35
Displaying the status window ................................................................... 1-35
Understanding the status window ............................................................ 1-36
Connection status information.................................................................. 1-36
General status information........................................................................ 1-37
Line and channel status ................................................................................... 1-37
Log message information .......................................................................... 1-38
Customizing the status window display.................................................... 1-39
Changing current status window sizes ...................................................... 1-39
Viewing the factory configuration and software licenses ................................ 1-40
Displaying administrative connections................................................................... 1-40
Displaying administrative session information (userstat command) ............. 1-40
Customizing the output of the userstat command.................................. 1-41
Displaying information related to a known IP address ............................. 1-41
Displaying information related to a known username.............................. 1-42
Using the view left session command ......................................................... 1-42
Displaying administrative users ....................................................................... 1-43
Terminating a user connection ........................................................................ 1-43
Disconnecting an idle connection.................................................................... 1-43
Resetting a Stinger system...................................................................................... 1-44
Chapter 2 Configuring logging, Syslog, and call logging services .................2-1
Configuring system logging and Syslog services ...................................................... 2-1
Overview of log profile parameters................................................................... 2-1
Configuring system logging ............................................................................... 2-4
Enabling command logging ............................................................................... 2-4
Viewing command logs ............................................................................... 2-5
Viewing the cmd-log profile ........................................................................ 2-6
Saving command logs.................................................................................. 2-7
Storing log messages across system resets ................................................... 2-7
Configuring the Stinger unit Syslog facility..................................................... 2-10
Enabling the Syslog facility on the Stinger unit ........................................ 2-11
Specifying a session ID base ...................................................................... 2-112-11
2-11
2-10
2-7
2-7
2-6
2-5
2-4
2-4
2-1
2-1
2-1
1-44
1-43
1-43
1-43
1-42
1-42
1-41
1-41
1-40
1-40
1-40
1-39
1-39
1-38
1-37
1-37
1-36
1-36
1-35
1-35
1-34
1-33
1-33
1-32
1-32
1-32
1-31
1-31
1-31
1-31
1-31
1-31
1-30
1-30
1-29
1-29
1-29
1-24

Contents
Stinger® Administration Guide vii
Configuring the Syslog daemon ................................................................ 2-12
Configuring call logging ......................................................................................... 2-12
Overview of call logging .................................................................................. 2-12
Enabling call logging........................................................................................ 2-12
Chapter 3 Working with Stinger Shelves and Modules ..................................3-1
Understanding physical addressing on Stinger units................................................ 3-1
Viewing system components.................................................................................... 3-2
Using the show command................................................................................... 3-2
Field description from the output of the show command............................ 3-3
Displaying the status of LPMs, PSMs, and CLT modules............................. 3-4
Displaying hosted MRT system topology and statistics ............................... 3-4
Displaying a picture of the topology............................................................ 3-5
Sending an init packet to a remote shelf..................................................... 3-7
Viewing information about a module................................................................ 3-7
Using the show command with the shelf and slot numbers ........................ 3-8
Using the slot-info profile......................................................................... 3-8
Opening a session with a module ............................................................................ 3-9
Changing the state of a module ............................................................................. 3-10
Using the slot command................................................................................. 3-10
Using slot-admin profiles ................................................................................ 3-10
Changing the state of a module’s interface ............................................................ 3-11
Using the device command ............................................................................. 3-11
Using the device-state profile........................................................................ 3-12
Removing a module and its configuration ............................................................. 3-13
Flagging a mismatched module and slot type.................................................. 3-13
When a new module does not match a slot type ...................................... 3-14
Activating a LIM in a mismatched state .................................................... 3-15
Activating a trunk module ........................................................................ 3-16
Removing LIMs that use system-generated ATM addresses............................ 3-16
Replacing a LIM and retaining the existing ATM addresses on the slot .......... 3-17
Moving a LIM that uses system-generated ATM addresses ............................. 3-17
Recovering from a failed module installation ........................................................ 3-17
Using the nvram command............................................................................... 3-18
Removing the module ..................................................................................... 3-18
Enabling LIM self-testing ....................................................................................... 3-19
Chapter 4 Monitoring Interfaces on LIMs and Trunk Modules.......................4-1
Where to find related information ........................................................................... 4-1
Monitoring trunk module interfaces........................................................................ 4-2
Viewing the trunk status profiles....................................................................... 4-2
Displaying the status of trunk interfaces ........................................................... 4-3
Displaying trunk port status ........................................................................ 4-4
Resetting trunk statistics.............................................................................. 4-5
Monitoring DSL interfaces ....................................................................................... 4-5
Displaying DSL interface profiles ....................................................................... 4-6
Displaying DSL interface status.......................................................................... 4-7
Displaying ADSL LIM interfaces.................................................................. 4-8
Displaying T1 and E1 interfaces ................................................................ 4-10
Testing IMA connectivity................................................................................. 4-10
Working with IMA groups............................................................................... 4-104-10
4-10
4-10
4-8
4-7
4-6
4-5
4-5
4-4
4-3
4-2
4-2
4-1
4-1
3-19
3-18
3-18
3-17
3-17
3-17
3-16
3-16
3-15
3-14
3-13
3-13
3-12
3-11
3-11
3-10
3-10
3-10
3-9
3-8
3-8
3-7
3-7
3-5
3-4
3-4
3-3
3-2
3-2
3-1
3-1
2-12
2-12
2-12
2-12

viii Stinger® Administration Guide
Contents
Displaying IMA groups.............................................................................. 4-10
Reinitializing out-of-service IMA groups .................................................. 4-10
Monitoring remote shelves .................................................................................... 4-11
Using the remote-shelf-stat profile .................................................................. 4-11
Displaying information about enabled remote shelves.................................... 4-13
Displaying Gigabit Ethernet OLIM (GE-OLIM) line status .............................. 4-14
Displaying DSL performance settings..................................................................... 4-14
Displaying the current time ............................................................................. 4-15
Displaying ADSL physical entries .................................................................... 4-15
Displaying channel entries............................................................................... 4-15
Displaying interval statistics for disruption of service events .......................... 4-16
Displaying interval totals for ADSL block counts ............................................ 4-16
Displaying disruption of service statistics......................................................... 4-16
Displaying ADSL block counts......................................................................... 4-17
Displaying performance data interval.............................................................. 4-18
Displaying ADSL block statistics (channel performance) intervals.................. 4-19
Displaying service traps sent ............................................................................ 4-20
Displaying time and interval information........................................................ 4-20
Displaying initialization failure statistics.......................................................... 4-20
Redundancy support for Stinger services............................................................... 4-21
Monitoring LIM and LIM port redundancy ........................................................... 4-22
Overview of port redundancy parameters....................................................... 4-22
Verifying port redundancy status .................................................................... 4-23
Verifying slot configuration redundancy status............................................... 4-23
Displaying redundancy or ignore-lineup settings for LIM ports...................... 4-24
Monitoring redundant trunk groups...................................................................... 4-25
Chapter 5 Monitoring Network Processor operations ....................................5-1
Monitoring network processor operations ............................................................... 5-1
Displaying network processor bandwidth allocation......................................... 5-1
Displaying CAC data for the Gigabit Ethernet OLIM......................................... 5-3
Monitoring network processor operations on IP control modules .................... 5-4
Enabling and disabling statistics collection.................................................. 5-5
Monitoring IP QoS ...................................................................................... 5-5
Monitoring statistics for a connection ......................................................... 5-8
Monitoring FPP statistics ............................................................................. 5-9
Global RSP statistics................................................................................... 5-10
Monitoring logical port traffic ................................................................... 5-10
Scheduler traffic and error statistics .......................................................... 5-12
Displaying APP driver statistics ................................................................. 5-12
Monitoring network operations on the Fast Ethernet Trunk module............. 5-12
Enabling, disabling, and clearing statistics collection ................................ 5-13
Displaying Ethernet traffic and error statistics and traffic rates ................ 5-14
Displaying ATM statistics—Fast Ethernet Trunk module.......................... 5-16
Obtaining AAL5 statistics .......................................................................... 5-17
Optimizing system performance ............................................................................ 5-19
Optimizing performance with filters and flow classification ........................... 5-19
Overview of system profile settings........................................................... 5-20
Configuration recommendations .............................................................. 5-20
Adjusting network processor FPP memory compaction .................................. 5-21
Configuring queue size from controller to LIM ............................................... 5-225-22
5-21
5-20
5-20
5-19
5-19
5-17
5-16
5-14
5-13
5-12
5-12
5-12
5-10
5-10
5-9
5-8
5-5
5-5
5-4
5-3
5-1
5-1
5-1
4-25
4-24
4-23
4-23
4-22
4-22
4-21
4-20
4-20
4-20
4-19
4-18
4-17
4-16
4-16
4-16
4-15
4-15
4-15
4-14
4-14
4-13
4-11
4-11
4-10
4-10

Contents
Stinger® Administration Guide ix
Maintaining ASIC Integrity .................................................................................... 5-22
Checking the defaults for control module self-tests ........................................ 5-22
Enabling centralized integrity checks .............................................................. 5-25
Chapter 6 Managing System Configuration and Memory ..............................6-1
Saving system configuration .................................................................................... 6-1
Saving the configuration to a local file .............................................................. 6-2
Saving the configuration to a network host ...................................................... 6-2
Saving the configuration in GZIP compressed format ....................................... 6-2
Timing the saving of profiles.............................................................................. 6-2
Displaying NVRAM usage statistics .......................................................................... 6-3
Clearing system configuration.................................................................................. 6-3
Retaining configuration information after clearing NVRAM ................................... 6-3
How it works ..................................................................................................... 6-4
Loading a default.cfg file from the TFTP server .............................................. 6-4
Verifying that the default.cfg is saved to the desired directories .................... 6-4
Issuing the nvram command on a system with a default.cfg file..................... 6-6
Restoring or updating system configuration ............................................................ 6-6
Restoring from a local file.................................................................................. 6-6
Restoring from a network host .......................................................................... 6-6
Updating the configuration................................................................................ 6-7
Extended profiling on control modules v2 or higher............................................... 6-7
When to enable extended profiling ................................................................... 6-8
How it works ..................................................................................................... 6-8
Enabling extended profiling............................................................................... 6-8
Restoring default NVRAM configuration......................................................... 6-10
Transferring code images between control modules .............................................. 6-10
Troubleshooting the restore process....................................................................... 6-11
Using FTP to transfer files....................................................................................... 6-11
FTP client command-line interface.................................................................. 6-12
Typical command-line FTP file transfer ........................................................... 6-12
FTP client URL interface .................................................................................. 6-13
Username and password details ................................................................ 6-14
URL path details ........................................................................................ 6-14
Typical FTP URLs ............................................................................................. 6-14
Sample FTP URL with complete syntax .................................................... 6-14
Sample FTP URL with no URL path or local directory.............................. 6-15
Sample FTP URL with no username or password ..................................... 6-15
Sample FTP URL by specifying a source IP Address .................................. 6-15
Using a script to configure a Stinger unit ............................................................... 6-16
Reloading profiles from RADIUS............................................................................ 6-16
Loading specific module images............................................................................. 6-17
Using the load-select profile.......................................................................... 6-17
Loading images for unknown modules ........................................................... 6-17
Loading an extracted code image .................................................................... 6-18
Using the load configuration command with an ATM VCC ......................... 6-18
Managing PCMCIA flash cards............................................................................... 6-19
Formatting a flash card .................................................................................... 6-19
Displaying the contents of flash....................................................................... 6-19
Compressing and uncompressing files on a flash card..................................... 6-20
Checking the file system .................................................................................. 6-206-20
6-20
6-19
6-19
6-19
6-18
6-18
6-17
6-17
6-17
6-16
6-16
6-15
6-15
6-15
6-14
6-14
6-14
6-14
6-13
6-12
6-12
6-11
6-11
6-10
6-10
6-8
6-8
6-8
6-7
6-7
6-6
6-6
6-6
6-6
6-4
6-4
6-4
6-3
6-3
6-3
6-2
6-2
6-2
6-2
6-1
6-1
5-25
5-22
5-22

xStinger® Administration Guide
Contents
Optional firmware (Centillium-based LIMs).......................................................... 6-21
Using optional firmware .................................................................................. 6-21
Verifying firmware version of a LIM ............................................................... 6-22
Caveats with current implementation ............................................................. 6-22
Log messages for firmware download events .................................................. 6-23
Upgrading bootprom on GE-COP, GE-OLIM, and IP RLIMs.................................. 6-23
Command syntax............................................................................................. 6-23
Preparing for the bootprom update ................................................................. 6-23
Updating bootprom on a GE-COP ................................................................... 6-24
Updating bootprom on a GE-OLIM ................................................................. 6-24
Updating bootprom on an IP RLIM ................................................................. 6-25
Verifying vendor information.......................................................................... 6-26
Chapter 7 Administering the SNMP Agent.......................................................7-1
Overview of Stinger SNMP support ......................................................................... 7-1
Stinger unit as an SNMP agent .......................................................................... 7-1
Requirement for a soft IP address ...................................................................... 7-2
Overview of the snmp profile .................................................................................... 7-2
Activating the SNMP agent ...................................................................................... 7-4
Specifying an SNMP agent address .......................................................................... 7-4
Securing the SNMP agent ........................................................................................ 7-4
Enabling read-write access and setting community strings ............................... 7-4
Configuring host address security...................................................................... 7-5
Enabling host address security .................................................................... 7-5
Configuring the snmp-manager profile ......................................................... 7-5
Example of configuring host address security ............................................. 7-6
Configuring SNMPv3 USM privacy ................................................................... 7-6
Verifying the SNMPv3 license is enabled .................................................... 7-7
SNMPv3 USM features................................................................................ 7-7
Enabling SNMPv3 USM privacy.................................................................. 7-7
Using the snmpv3-usm-user profile .............................................................. 7-7
Generating authentication keys .................................................................. 7-9
Generating privacy keys ............................................................................ 7-10
Example of SNMPv3 USM configuration .................................................. 7-10
Restricting the agent to SNMPv3 .............................................................. 7-10
SNMPv3 notifications ................................................................................ 7-11
Configuring view-based access control............................................................ 7-13
Enabling VACM......................................................................................... 7-14
Mapping a security name and security model to a security group............ 7-14
Specifying view names for different types of access.................................. 7-15
Defining views........................................................................................... 7-16
Managing SNMP interfaces .................................................................................... 7-17
Verifying SNMP state ....................................................................................... 7-17
Using the admin-state-perm-if profile..................................................... 7-18
Using the admin-state-phys-if profile..................................................... 7-18
Viewing SNMP interface numbers................................................................... 7-20
Initiating interface state changes ..................................................................... 7-21
Resetting the SNMP interface table sequentially ............................................. 7-21
Naming convention for SNMP-configured profiles ................................................ 7-21
Default naming convention ............................................................................. 7-22
Configurable naming convention .................................................................... 7-227-22
7-22
7-21
7-21
7-21
7-20
7-18
7-18
7-17
7-17
7-16
7-15
7-14
7-14
7-13
7-11
7-10
7-10
7-10
7-9
7-7
7-7
7-7
7-7
7-6
7-6
7-5
7-5
7-5
7-4
7-4
7-4
7-4
7-2
7-2
7-1
7-1
7-1
6-26
6-25
6-24
6-24
6-23
6-23
6-23
6-23
6-22
6-22
6-21
6-21

Contents
Stinger® Administration Guide xi
Selecting the naming convention for connection profiles............................... 7-22
Chapter 8 Watchdogs, Alarms, and Traps ........................................................8-1
Configuring SNMP watchdogs ................................................................................. 8-1
Settings in a watchdog-config profile ................................................................ 8-3
Enabling a watchdog to monitor fan failure...................................................... 8-3
Watchdog routines for input relays ................................................................... 8-4
Watchdog routines for a remote shelves ........................................................... 8-4
Defining alarms ........................................................................................................ 8-4
Overview of alarm profile settings ..................................................................... 8-4
Sample alarm profile configuration .................................................................. 8-6
Working with alarms ......................................................................................... 8-7
Listing alarms using the alarm command.................................................... 8-7
Monitoring and changing the status of alarms (alarm-stat profile) .......... 8-8
Acknowledging alarms ................................................................................ 8-8
Clearing alarms ........................................................................................... 8-9
Turning off an alarm status light................................................................. 8-9
Closing a relay ............................................................................................. 8-9
Setting alarms for events on remote shelves ..................................................... 8-9
Monitoring environmental conditions ............................................................ 8-12
Configuring alarm settings for the alarm MIB................................................. 8-12
Setting the maximum number of alarms in alarmClearTable .......... 8-12
Clearing alarms from alarmActiveTable and alarmClearedTable ...... 8-13
Deleting an alarm model table .................................................................. 8-13
Configuring SNMP traps......................................................................................... 8-13
Creating a trap profile ...................................................................................... 8-13
Configuring the trap profile ............................................................................ 8-14
Trap classes ...................................................................................................... 8-14
Alarm class traps ....................................................................................... 8-15
Security class traps .................................................................................... 8-18
Port class trap ............................................................................................ 8-19
Slot class trap............................................................................................. 8-19
OSPF class traps......................................................................................... 8-20
Traps not belonging to any class ............................................................... 8-22
Typical uses of traps and trap classes......................................................... 8-22
Monitoring ADSL threshold values ................................................................. 8-23
Specifying the dsl-threshold profile ........................................................ 8-23
Overview of the dsl-threshold profile settings ........................................ 8-24
Lucent-specific ADSL threshold traps ....................................................... 8-25
Enabling the system to generate ADSL threshold traps ............................ 8-26
Configuring link-state traps for LIM and trunk ports ...................................... 8-26
Changing the setting for the desired-trap-state parameter systemwide...... 8-27
Enabling a trap for Gigabit Ethernet link state ................................................ 8-27
Configuring trap sequencing and heartbeat traps............................................ 8-28
Trap sequencing and the heartbeat trap.................................................... 8-28
Configuring trap sequencing and the sending of heartbeat traps ............. 8-28
Enabling traps for events on remote shelves ................................................... 8-29
Stinger trap optimization ................................................................................. 8-30
Optimizing the number of traps generated by the system ........................ 8-31
Trap optimization ...................................................................................... 8-31
Displaying information about notification logs ............................................... 8-328-32
8-31
8-31
8-30
8-29
8-28
8-28
8-28
8-27
8-27
8-26
8-26
8-25
8-24
8-23
8-23
8-22
8-22
8-20
8-19
8-19
8-18
8-15
8-14
8-14
8-13
8-13
8-13
8-13
8-12
8-12
8-12
8-9
8-9
8-9
8-9
8-8
8-8
8-7
8-7
8-6
8-4
8-4
8-4
8-4
8-3
8-3
8-1
8-1
7-22

xii Stinger® Administration Guide
Contents
Configuring traps for CDR device failure ............................................................... 8-34
Configuring alarms for CDR failure ................................................................. 8-34
Configuring traps for events related to CDR failure ........................................ 8-35
Displaying alarms caused by CDR failure ........................................................ 8-35
Chapter 9 Working with IP Traffic ....................................................................9-1
Testing IP connectivity ............................................................................................. 9-1
Displaying the IP interface table............................................................................... 9-2
Displaying and modifying IP routes ......................................................................... 9-3
Using the netstat command to display the IP routing table ............................. 9-3
Modifying the IP routing table........................................................................... 9-4
Adding a static IP route to the routing table ............................................... 9-5
Deleting a static IP route from the routing table......................................... 9-5
Tracing IP routes ...................................................................................................... 9-5
Displaying IP protocol statistics ................................................................................ 9-6
Displaying IP route cache information..................................................................... 9-8
Verifying name service settings................................................................................ 9-9
Displaying the ARP cache......................................................................................... 9-9
Displaying the DNS host table................................................................................ 9-10
Displaying the Ethernet information ..................................................................... 9-11
Displaying the contents of Ethernet packets.................................................... 9-11
Displaying Ethernet statistics and error counters ............................................ 9-12
Displaying information about IGMP ...................................................................... 9-13
Displaying WAN IP interface information.............................................................. 9-15
Displaying packets on WAN IP interfaces ........................................................ 9-15
Displaying WAN data for a particular user ...................................................... 9-15
Displaying WAN data during connection establishment for users .................. 9-16
Chapter 10 Monitoring OSPF routing ...............................................................10-1
Overview of the OSPF command........................................................................... 10-1
Displaying general information about OSPF routing ............................................. 10-2
Displaying the OSPF database ................................................................................ 10-4
Displaying OSPF external advertisements ....................................................... 10-6
Displaying OSPF internal advertisements........................................................ 10-7
Displaying the OSPF link-state database ................................................................ 10-7
Displaying OSPF LSAs ............................................................................................ 10-9
Displaying the OSPF routing table ....................................................................... 10-10
Displaying information about OSPF areas............................................................ 10-11
Displaying information about OSPF routers ........................................................ 10-11
Displaying OSPF interfaces................................................................................... 10-12
Displaying summarized information.............................................................. 10-12
Displaying information about a specific interface.......................................... 10-13
Displaying OSPF neighbors .................................................................................. 10-14
Chapter 11 Monitoring ATM and PNNI.............................................................11-1
Monitoring ATM networks .................................................................................... 11-1
Using the ATM status window......................................................................... 11-2
Determining ATM line status........................................................................... 11-3
Displaying the status of ATM internal lines..................................................... 11-4
Changing ATM debug levels ............................................................................ 11-411-4
11-4
11-3
11-2
11-1
11-1
10-14
10-13
10-12
10-12
10-11
10-11
10-10
10-9
10-7
10-7
10-6
10-4
10-2
10-1
10-1
9-16
9-15
9-15
9-15
9-13
9-12
9-11
9-11
9-10
9-9
9-9
9-8
9-6
9-5
9-5
9-5
9-4
9-3
9-3
9-2
9-1
9-1
8-35
8-35
8-34
8-34

Contents
Stinger® Administration Guide xiii
Displaying the status of ATM trunk modules and their connections .............. 11-5
Checking the status of a VCC interface............................................................ 11-5
Checking the status of a terminating PVC ....................................................... 11-6
Displaying ATM VCC information and packet statistics .................................. 11-6
Displaying ATM virtual link information ........................................................ 11-7
Displaying routed and bridged connections on a port ................................... 11-10
Sample commands displaying terminating links..................................... 11-10
Sample commands displaying cross-connected links .............................. 11-11
Displaying ATM virtual link cross-connect information................................ 11-11
Displaying SPVC information ........................................................................ 11-12
Displaying SPVC target ATM addresses ......................................................... 11-14
Monitoring failing SPVCs............................................................................... 11-15
Displaying signal statistics.............................................................................. 11-15
Displaying CAC bandwidth allocation statistics............................................. 11-16
Displaying ATM connection failures.............................................................. 11-19
Displaying QoS statistics ................................................................................ 11-19
Monitoring PNNI nodes ....................................................................................... 11-20
Verifying the PNNI link.................................................................................. 11-21
Displaying general PNNI information ............................................................ 11-21
Displaying PNNI interface information.......................................................... 11-23
Displaying information about PNNI logical links........................................... 11-24
Displaying information about the PNNI hierarchy ........................................ 11-26
Displaying details about neighbor nodes ....................................................... 11-28
Displaying local node information................................................................. 11-29
Displaying information about other nodes .................................................... 11-31
Displaying the PNNI topology database ......................................................... 11-33
Displaying the PNNI routing table ................................................................. 11-35
Chapter 12 Diagnostic Testing ..........................................................................12-1
OAM testing ........................................................................................................... 12-1
Overview of F4 and F5 OAM tests................................................................... 12-1
Using the oam command and atm-oam profile to run OAM tests...................... 12-2
Overview of the oam command ................................................................. 12-3
Overview of the atm-oam profile................................................................ 12-4
Enabling F4 OAM on a LIM ...................................................................... 12-7
Continuity check and monitoring ................................................................... 12-9
Continuity check implementation ............................................................ 12-9
Deactivating a continuity check test ....................................................... 12-10
Running F4 and F5 continuity tests using the oam command................. 12-11
Running F5 continuity tests using the atm-oam profile ........................... 12-12
OAM loopback tests ....................................................................................... 12-12
Running F4 and F5 loopback tests using the oam command ................... 12-12
Running F4 and F5 loopback tests using the atm-oam profile ................. 12-14
Specifying that a trap is sent ................................................................... 12-15
Using the oamloop command................................................................... 12-15
Configuring loopback on OC3, E3, and DS3 interfaces........................... 12-16
Displaying OAM entries................................................................................. 12-17
Fault reporting and alarms ............................................................................ 12-21
Traps for AIS/RDI and continuity check alarms ............................................ 12-21
Internal and external diagnostic tests .................................................................. 12-22
Running an internal diagnostic test (IDT) ..................................................... 12-2212-22
12-22
12-21
12-21
12-17
12-16
12-15
12-15
12-14
12-12
12-12
12-12
12-11
12-10
12-9
12-9
12-7
12-4
12-3
12-2
12-1
12-1
12-1
11-35
11-33
11-31
11-29
11-28
11-26
11-24
11-23
11-21
11-21
11-20
11-19
11-19
11-16
11-15
11-15
11-14
11-12
11-11
11-11
11-10
11-10
11-7
11-6
11-6
11-5
11-5

xiv Stinger® Administration Guide
Contents
Running an external diagnostic test (EDT) feature ....................................... 12-23
Digital loopback....................................................................................... 12-24
Analog loopback...................................................................................... 12-24
Running built-in self tests (BISTs) on DSL ports ........................................... 12-25
Supported LIMs ....................................................................................... 12-25
Enabling the built-in self test using the command-line interface ........... 12-25
Relay alarm testing............................................................................................... 12-26
Overview of the inputrelaytest command .................................................. 12-26
Examples using the inputrelaytest command............................................. 12-26
Displaying the status of input relays.............................................................. 12-28
Configuring a bit-error rate test (BERT) .............................................................. 12-28
Testing DSL copper loops ..................................................................................... 12-29
Using the line-tests profile ......................................................................... 12-30
Galvanic isolation test.................................................................................... 12-31
Using the line-tests profile ................................................................... 12-31
Using the isolate command................................................................... 12-32
Multiport tone generation test....................................................................... 12-32
Using the line-tests profile ................................................................... 12-32
Using the gen-tone command ................................................................. 12-33
Appendix A Using Debug Commands ................................................................. A-1
Enabling debug permissions.....................................................................................A-1
Enabling debug output.............................................................................................A-2
Setting debug levels..................................................................................................A-2
Getting online help for debug commands................................................................A-2
Summary of common debug commands .................................................................A-3
System and devices debugging.................................................................................A-3
Displaying IP control module network processor information ...................A-4
Displaying network processor connection information ..............................A-5
Obtaining information about routes on the network processor .................A-6
Obtaining detailed information for a DID ...................................................A-7
Displaying ARP entries ................................................................................A-8
Displaying SED parameters for a DID .........................................................A-8
Displaying multicast group information......................................................A-8
Displaying IP QoS details.............................................................................A-8
Displaying bridge group information ..........................................................A-9
Displaying scheduler IDs associated with a logical port ............................A-10
Displaying information for a specific queue..............................................A-10
Displaying details for a specific scheduler .................................................A-11
Displaying Fast Ethernet trunk protocol and connection information............A-11
Displaying connection information...........................................................A-11
Displaying ATM information.....................................................................A-12
Displaying AAL5 channel information......................................................A-13
Displaying Ethernet device information....................................................A-14
NEBs testing and loopback (sar command)...........................................................A-16
Displaying Stinger port information ................................................................A-17
Resetting TCP port 23 ......................................................................................A-18
Displaying the serial numbers..........................................................................A-18
Modifying Stinger unit functionality ...............................................................A-18
RADIUS debugging.................................................................................................A-19
Using the acct-failsafe debug command......................................................A-19
Verifying settings in the external-auth profile ...............................................A-20A-20
A-19
A-19
A-18
A-18
A-18
A-17
A-16
A-14
A-13
A-12
A-11
A-11
A-11
A-10
A-10
A-9
A-8
A-8
A-8
A-8
A-7
A-6
A-5
A-4
A-3
A-3
A-2
A-2
A-2
A-1
A-1
12-33
12-32
12-32
12-32
12-31
12-31
12-30
12-29
12-28
12-28
12-26
12-26
12-26
12-25
12-25
12-25
12-24
12-24
12-23

Contents
Stinger® Administration Guide xv
Displaying RADIUS accounting session status .................................................A-20
Displaying RADIUS authentication and accounting statistics..........................A-21
Interface debugging................................................................................................A-22
Displaying network interface mappings ..........................................................A-23
Using the EOC command on ADSL interfaces.................................................A-23
Control module debugging.....................................................................................A-24
Displaying the status of redundant control modules .......................................A-25
Displaying interface management information ...............................................A-26
Appendix B Stinger Log Messages...................................................................... B-1
Fatal and warning error messages............................................................................B-1
Reviewing the fatal error log .............................................................................B-1
Clearing the fatal error log.................................................................................B-2
Definitions of fatal errors .........................................................................................B-2
Definitions of warning messages..............................................................................B-4
Fatal crash information on the console....................................................................B-7
Syslog messages........................................................................................................B-8
PCMCIA flash card error messages...........................................................................B-8
load command messages ...................................................................................B-9
format command messages..............................................................................B-10
dircode command messages............................................................................B-10B-10
B-10
B-9
B-8
B-8
B-7
B-4
B-2
B-2
B-1
B-1
B-1
A-26
A-25
A-24
A-23
A-23
A-22
A-21
A-20


Stinger® Administration Guide xvii
Tables
Table 1-1 Authentication keys generated by the system .................................. 1-6
Table 1-2 Syslog messages reported for secure shell error conditions .............. 1-9
Table 1-3 Administrative access available on a system ................................... 1-12
Table 1-4 Permissions and associated commands ........................................... 1-23
Table 1-5 Message levels ................................................................................. 1-30
Table 3-1 Statistics displayed for a remote shelf ............................................... 3-6
Table 4-1 Where to find additional information ............................................... 4-1
Table 4-2 Summary of profiles and commands for monitoring interfaces........ 4-2
Table 4-3 Summary of profiles and commands for monitoring interfaces........ 4-5
Table 4-4 Field descriptions for status commands............................................. 4-8
Table 4-5 Summary of profiles and commands for monitoring remote shelves ......
4-11
Table 4-6 Redundancy support for Stinger services........................................ 4-21
Table 5-1 Sample call performance statistics................................................... 5-21
Table 7-1 SNMP parameters and associated tasks ............................................. 7-2
Table 8-1 Hosted MRT alarm events ............................................................... 8-10
Table 8-2 Compact Remote alarm events ....................................................... 8-10
Table 8-3 Parameters that enable or disable traps in the alarm class.............. 8-15
Table 8-4 Parameters that enable or disable traps in the security class .......... 8-18
Table 8-5 Parameter that enables or disables traps in the port-state class ...... 8-19
Table 8-6 Parameter that enables or disables traps in the slot class ................ 8-20
Table 8-7 Parameters that enable or disable traps in the OSPF class .............. 8-20
Table 8-8 ADSL threshold traps and required settings in the trap profile...... 8-26
Table 8-9 Description of fields for the output of the nlmstat command ........ 8-32
Table 8-10 Additional fields reported with the Ipaddress argument ............... 8-33
Table 11-1 Profiles and commands for monitoring ATM networks.................. 11-1
Table 11-2 Command syntax using -t and -x options..................................... 11-10
Table 11-3 Commands and profiles for monitoring PNNI operations............. 11-20
Table 12-1 Direction specified by the remote peer and the results ................. 12-1012-10
11-20
11-10
11-1
8-33
8-32
8-26
8-20
8-20
8-19
8-18
8-15
8-10
8-10
7-2
5-21
4-21
4-8
4-5
4-2
4-1
3-6
1-30
1-23
1-12
1-9
1-6
4-11


Stinger® Administration Guide xix
About This Guide
This guide explains how to administer a Stinger unit and manage its operations. To
use this guide, you must have set up the Stinger system as described in the Getting
Started Guide for your Stinger unit and configured it for network connectivity as
described in the Stinger ATM Configuration Guide.
What is in this guide
Each chapter in this guide focuses on a particular aspect of Stinger unit
administration and operations. The chapters describe tools for system management,
network management, and SNMP agent management.
To perform many of the tasks in this manual, you must have administrative
permission on the Stinger unit. For instructions on logging into the Stinger unit with
administrative permissions, see “Logging into a Stinger unit” on page 1-2.
Note This manual describes the set of features for Stinger units running software
version TAOS 9.8-252.0. Some features might not be available with earlier versions
or specialty loads of the software.
Warning Before installing or operating your Stinger unit, be sure to read the safety
instructions in the Edge Access and Broadband Access Safety and Compliance Guide. For
information specific to your unit, see the “Safety-Related Electrical, Physical, and
Environmental Information” appendix in your unit’s Getting Started Guides.
What you should know
This guide attempts to provide enough information to enable an administrator who is
not an expert in a particular network technology to operate and troubleshoot a
Stinger unit. However, this guide does not provide a complete explanation of any
network management topic. For best results, when working with the following
capabilities on a Stinger unit, make sure that you have some applicable general
knowledge:
■Line configuration and testing
■Connection negotiation and authentication
■Connection cost management and accounting
■IP routing
■Network security

xx Stinger® Administration Guide
About This Guide
Documentation conventions
Following are all the special characters and typographical conventions used in this
manual:
Convention Meaning
Monospace text Represents text that appears on your computer’s screen, or that
could appear on your computer’s screen.
Boldface
monospace text
Represents characters that you enter exactly as shown (unless
the characters are also in italics—see Italics, below). If you
could enter the characters but are not specifically instructed to,
they do not appear in boldface.
Italics Represent variable information. Do not enter the words
themselves in the command. Enter the information they
represent. In ordinary text, italics are used for titles of
publications, for some terms that would otherwise be in
quotation marks, and to show emphasis.
[ ] Square brackets indicate an optional argument you might add
to a command. To include such an argument, type only the
information inside the brackets. Do not type the brackets unless
they appear in boldface.
|Separates command choices that are mutually exclusive.
>Points to the next level in the path to a parameter or menu
item. The item that follows the angle bracket is one of the
options that appear when you select the item that precedes the
angle bracket.
Key1+Key2 Represents a combination keystroke. To enter a combination
keystroke, press the first key and hold it down while you press
one or more other keys. Release all the keys at the same time.
(For example, Ctrl+H means hold down the Ctrl key and press
the H key.)
Press Enter Means press the Enter or Return key or its equivalent on your
computer.
Note
Introduces important additional information.
Caution
Warns that a failure to follow the recommended procedure
could result in loss of data or damage to equipment.
Warning
Warns that a failure to take appropriate safety precautions
could result in physical injury.
Warning
Warns of danger of electric shock.
This manual suits for next models
5
Table of contents