This command creates a text description stored in the configuration file for a configuration context.
The command associates a text string with a configuration context to help identify the content in the configuration file.
The no form of the command removes the string from the configuration.
No text description is associated with this configuration.
This command administratively disables an entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics.
The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they can be deleted.
The no form of this command administratively enables an entity.
no shutdown
This command creates an access or network accounting policy. An accounting policy defines the accounting records that are created.
Access accounting policies are policies that can be applied to one or more service access points (SAPs). Changes made to an existing policy, using any of the sub-commands, are applied immediately to all SAPs where this policy is applied.
Network accounting policies are policies that can be applied to one or more network ports. Changes made to an existing policy, using any of the sub-commands, are applied immediately to all network ports where this policy is applied.
If an accounting policy is not specified on a SAP or network port, accounting records are produced in accordance with the access or network policy designated as the default. For more information, see the default command.
The no form of the command deletes the policy from the configuration. The accounting policy cannot be deleted unless it is removed from all the SAPs or network ports where the policy is applied. Use the show>log>accounting-policy command to see where an accounting policy is used and which accounting policy is the default policy.
n/a
This command configures the interval between collection of accounting records.
This command configures the accounting policy specified by acct-policy-id to be the default accounting policy that is used by all SAPs or network ports that do not have a specified accounting policy.
For a SAP or network port, if no accounting policy is explicitly specified and a default policy is defined, records are produced as per the default accounting policy. If no default policy is defined, no records are collected. However, if an accounting policy is explicitly defined for a SAP or network port, records are collected for that SAP or network port.
Only one access accounting policy ID can be designated as the default access policy. Similarly, only one network accounting policy ID can be designated as the default network accounting policy.
The record-name must be specified prior to configuring an accounting policy as default.
If a policy is configured as the default policy, a no default command must be issued before a new default policy can be configured.
Default accounting policies cannot be explicitly applied. For example, if default is set for accounting-policy 10, policy 10 cannot be assigned.
The no form of the command removes the default pol icy designation from the policy ID. The accounting policy is removed from all SAPs or network ports that do not have a policy explicitly defined. If there is no policy defined as the default policy, no accounting policy is applied to those entities.
This command adds the record name to the accounting policy, specifying which records to forward to the configured accounting file (identified by log-file-id). Each accounting policy can only contain one record name. To obtain a list of all record types that can be configured, use the show>log>accounting-records command.
The record-name must be specified prior to configuring an accounting policy as default.
To configure an accounting policy for access ports, select a service record (for example, service-ingress-octets). To change the service record to another service record, re-enter the record command with the new record-name to replace the old record-name.
When configuring an accounting policy for network ports, select a network record. To change the network record to another network record, re-enter the record command with the new record-name to replace the old record-name.
Only one record may be configured in a single accounting policy. If changing the record switches it from network to service, or from service to network, the old record-name must be removed using the no form of this command. For example, to change an accounting policy configuration from a network-egress-octets record to a service-ingress-octets record, use the no record command and then enter the service-ingress-octets record.
![]() | Note: Collecting excessive statistics can adversely affect CPU usage and take up large amounts of storage space. |
The no form of the command removes the record from the policy.
n/a
This command specifies the destination for the accounting records selected for the accounting policy.
No destination is specified
The file is generated when the log file ID is first referenced. This command identifies the type of accounting file to be created. If the to command is executed while the accounting policy is in operation, it becomes active during the next collection interval.
This command is used to specify that a particular event, or all events associated with an application, are either generated or suppressed.
Events are generated by an application and contain an event number and description explaining the cause of the event. Each event has a default designation that directs it to be generated or suppressed.
Events are generated with a default severity level that can be modified by using the severity-level option. For example, to change event reporting for an external alarm output on the chassis, do the following:
1. | Specify the application. | config>log>event-control>chassis |
2. | Specify the event name or number. 1 | config>log>event-control>chassis> extAlarmInput1Detected |
3. | Specify whether the event is generated or suppressed. | config>log>event-control>chassis> extAlarmInput1Detected>generate |
4. | Change the severity level (for example, major severity). | config>log>event-control>chassis> extAlarmInput1Detected>generate>major |
Note:
Events that are suppressed by default are typically used for debugging purposes. Events are suppressed at the time the application requests the event’s generation. No event log entry is generated regardless of the destination. While this feature can save processor resources, there may be a negative effect on the ability to troubleshoot problems if the logging entries are not generated. However, the generation of too many events may cause excessive overhead.
The throttle parameter enables event throttling for these events. The throttling rate is set globally for all events with the throttle-rate command. The throttling rate can also be configured independently for each log event by using the specific-throttle-rate parameter; this rate overrides the globally configured throttle rate for the specified log event.
The no form of the command resets the parameters to the default setting for events for the application or a specific event within the application. The severity-level, generate, and suppress options will also be reset to the initial values.
Each event has a default suppress or generate state. To display a list of all events and the current configuration use the event-control command.
This command configures an event throttling rate.
This command enables the context to configure event handling in the Event Handler System (EHS).
This command configures an event handler.
The no form of the command removes the specified event handler.
This command enables the context to configure the event handler action list.
This command configures an event handler action-list entry. An action list consists of one or more entries. Each entry in the list references a configured script policy, which in turn references a configured script.
Multiple entries can be configured in the action list if multiple actions are required when an event triggers the event handler; for example, an event trigger results in the execution of different scripts. When the handler is triggered, it runs through the entries in sequence.
The no form of the command removes the specified action-list entry.
This command specifies the minimum delay between subsequent executions of the action specified in this entry. This is useful, for example, to ensure that a script does not get triggered to execute too often.
no min-delay
This command specifies the script policy to use for this event handler action-list entry. The associated script is launched when the handler is triggered.
The script policy must already have been configured under the config>system>script-control context.
no script-policy
This command enables the context to configure log events as triggers for event handlers in EHS.
This command defines a specific log event that triggers the associated event handler. Further matching criteria can be applied (with the log-filter command) to only trigger certain handlers with certain instances of the log event.
The log event consists of an application ID and event ID.
The no form of the command removes the specified log event.
This command configures a trigger entry for the specified log event. A trigger entry references a previously configured event handler. One or more trigger entries can be configured for the event.
Trigger entries can also be configured with a previously configured log filter.
The no form of the command removes the specified trigger entry.
This command configures how many times the specified log event occurs before an action is triggered (for example, an EHS script). The number of occurrences of the event can be optionally bounded by a time window. If no time window is specified, the action is triggered every specified Nth event.
Triggering occurs at the specified Nth event, not at the end of the time window.
no debounce
This command specifies the event handler to be used for this trigger entry. The event handler must have already been configured under the config>log>event-handling>handler context.
If the log event occurs and matches the criteria configured in the log filter (see log-filter), the event handler is triggered. When the event handler is triggered, the script that is referenced by the script policy that is in turn referenced by the event handler, is executed.
This command specifies the log filter to be used for this trigger entry. The log filter must have already been configured under the config>log>filter context.
The log filter defines the matching criteria that must be met in order for the log event to trigger the event handler. The log filter is applied to the log event, and if the filtering decision results in a forward action, the event handler is triggered.
This command enables the context to configure a file ID template that is used as a destination for an event log or an accounting (billing) file.
The template defines the file location and characteristics of the destination for a log event message stream or for accounting and billing information. The log-file-id variable defined in this context is subsequently specified in the to command under config>log>log-id or config>log>accounting-policy contexts, to direct specific logging or accounting source streams to the file destination.
A file ID can only be assigned to either one log-id or one accounting-policy. It cannot be reused for multiple instances. A file ID and associated file definition must exist for each log and accounting file that will be stored in the file system.
A file is created when the file ID defined by this command is selected as the destination type for a specific log or accounting record. Log files are collected in a “log” directory. Accounting files are collected in an “act” directory.
The filenames for a log or accounting file are created by the system (see Table 38).
File Type | Filename |
Log File | logllff-timestamp |
Accounting File | actaaff-timestamp |
where:
The accounting file is compressed and has a .gz extension
When initialized, each file will contain:
If the process of writing to a log file fails (for example, the compact flash card is full), the log file will not become operational even if the compact flash card is replaced. Enter a clear log command or a shutdown/no shutdown command sequence to reinitialize the file.
If the location fails (for example, the compact flash card fills up during the write process), a trap is sent.
The no form of the command removes the file ID from the configuration. A file ID can only be removed from the configuration if the file is not the designated output for a log destination. The actual file remains on the file system.
n/a
This command specifies the location where the log or accounting billing file will be created.
The location command is optional. If the location command is not explicitly configured, log and accounting files will be created on cf3: for the following:
For the 7705 SAR-18, log files are created by default on cf1: and accounting files are created by default on cf2:. There are no overflows onto other devices.
![]() | Note: The 7705 SAR-A, 7705 SAR-Ax, 7705 SAR-W, 7705 SAR-Wx, 7705 SAR-Hc, and 7705 SAR-X do not have field-replaceable compact flash drives; they are shipped with integrated flash memory that is used to store system boot software, OS software, and configuration files and logs. The flash memory is identified as cf3-A: by the system. On the 7705 SAR-X and 7705 SAR-Ax, the flash memory is 512 Mbytes; for the other platforms, the flash memory is 256 Mbytes. |
When multiple location commands are entered in a single file ID context, the last command overwrites the previous command.
When the location of a file ID that is associated with an active log ID is changed, the log events are not immediately written to the new location. The new location does not take effect until the log rolls over, either because the rollover period has expired or a clear>log log-id command is entered to manually roll over the log file.
When creating log or accounting files, the designated location is used as long as there is available space. If no space is available, an attempt is made to delete unnecessary files that are past their retention date.
If sufficient space is not available, an attempt is made to remove the oldest to newest closed log or accounting files. After each file is deleted, the system attempts to create the new file.
A medium severity trap is issued to indicate that the compact flash is either not available or that no space is available on the specified flash.
A high-priority alarm condition is raised if the compact flash device for this file ID is not present or if there is insufficient space available. If space does becomes available, the alarm condition will be cleared.
Use the no form of this command to revert to default settings.
For the 7705 SAR-8 Shelf V2, 7705 SAR-A, 7705 SAR-Ax, 7705 SAR-H, 7705 SAR-Hc, 7705 SAR-M, 7705 SAR-W, 7705 SAR-Wx, and 7705 SAR-X, log and accounting files are created on cf3:
For the 7705 SAR-18, log files are created on cf1: and accounting files are created on cf2:
This command configures how often an event or accounting log is rolled over or partitioned into a new file.
An event or accounting log is actually composed of multiple individual files. The system creates a new file for the log based on the rollover time, expressed in minutes.
The retention option, expressed in hours, allows you to modify the default time that the file is kept in the system. The retention time is based on the rollover time of the file. The retention time is used as a factor to determine which files should be deleted first as the file space becomes full.
When multiple rollover commands for a file ID are entered, the last command overwrites the previous command.
rollover 1440
retention 12
This command creates a context for an event filter. An event filter specifies whether to forward or drop an event or trap based on the match criteria.
Filters are configured in the filter filter-id context and then applied to a log in the log-id log-id context. Only events for the configured log source streams destined for the log ID where the filter is applied are filtered.
Any changes made to an existing filter, using any of the sub-commands, are immediately applied to the destinations where the filter is applied.
The no form of the command removes the filter association from log IDs, which causes those logs to forward all events.
No event filters are defined.
The default action specifies the action that is applied to events when no action is specified in the event filter entries or when an event does not match the specified criteria.
When multiple default-action commands are entered, the last command overwrites the previous command.
The no form of the command reverts to the default value.
default-action forward
This command is used to create or edit an event filter entry. Multiple entries may be created using unique entry-id numbers. The -TiMOS implementation exits the filter on the first match found and executes the action in accordance with the action command.
Comparisons are performed in an ascending entry ID order. When entries are created, they should be arranged sequentially from the most explicit entry to the least explicit. Matching ceases when a packet matches an entry. The entry action is performed on the packet, either drop or forward. To be considered a match, the packet must meet all the conditions defined in the entry.
An entry may have no match criteria defined (in which case, everything matches) but must have at least the action keyword for it to be considered complete. Entries without the action keyword will be considered incomplete and rendered inactive.
The no form of the command removes the specified entry from the event filter. Entries removed from the event filter are immediately removed from all log IDs where the filter is applied.
No event filter entries are defined. An entry must be explicitly configured.
This command specifies a drop or forward action associated with the filter entry.
If neither drop nor forward is specified, the default-action will be used for traffic that conforms to the match criteria. This could be considered a No-Op filter entry used to explicitly exit a set of filter entries without modifying previous actions.
When multiple action commands are entered, the last command will overwrite the previous command.
The no form of the command removes the specified action statement.
no action
This command enables the context to enter or edit match criteria for a filter entry. When the match criteria is satisfied, the action associated with the entry is executed.
If more than one match parameter (within one match statement) is specified, then all the criteria must be satisfied and functional before the action associated with the match is executed.
Use the applications command to display a list of the valid applications.
Match context can consist of multiple match parameters (application, event-number, severity, subject), but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
No match context is defined.
This command adds a TiMOS application as an event filter match criterion.
A TiMOS application is the software entity that reports the event. Examples of applications include: IP, MPLS, CLI, and SERVICES. Only one application can be specified per entry.
When multiple application commands are entered, the last command will overwrite the previous command.
The no form of the command removes the application as a match criterion.
no application
This command adds system messages as a match criterion.
The no form of the command removes system messages as a match criterion.
This command adds a TiMOS application event number as a match criterion.
TiMOS event numbers uniquely identify a specific logging event within an application.
Only one number command can be entered per event filter entry. If multiple number commands are entered, the last command overwrites the previous command.
The no form of the command removes the event number as a match criterion.
no event-number
Operator | Notes |
eq | Equal to |
neq | Not equal to |
lt | Less than |
lte | Less than or equal to |
gt | Greater than |
gte | Greater than or equal to |
This command specifies the log event matches for the router.
This command adds an event severity level as a match criterion.
Only one severity command can be entered per event filter entry. When multiple severity commands are entered, the last command overwrites the previous command.
The no form of the command removes the severity match criterion.
no severity
Operator | Notes |
eq | Equal to |
neq | Not equal to |
lt | Less than |
lte | Less than or equal to |
gt | Greater than |
gte | Greater than or equal to |
Severity Number | Severity Level |
1 | Cleared |
2 | Indeterminate (info) |
3 | Critical |
4 | Major |
5 | Minor |
6 | Warning |
This command adds an event subject as a match criterion.
The subject is the entity for which the event is reported, such as a port. In this case, the port-id string would be the subject.
Only one subject command can be entered per event filter entry. If multiple subject commands are entered, the last command overwrites the previous command.
The no form of the command removes the subject match criterion.
no subject
When the regexp keyword is not specified, the subject command string is matched exactly by the event filter.
This command enables the context to configure a syslog target host that is capable of receiving selected syslog messages from the 7705 SAR.
A valid syslog-id must have the target syslog host address configured.
A maximum of 10 syslog IDs can be configured.
No log events are sent to a syslog target address until the syslog-id has been configured as the log destination (to) in the log-id node.
No syslog IDs are defined.
This command associates the syslog target host IP address with the syslog ID.
This parameter is mandatory. If no address is configured, syslog data cannot be forwarded to the syslog target host.
Only one address can be associated with a syslog-id. If multiple addresses are entered, the last address entered overwrites the previous address.
The same syslog target host can be used by multiple log IDs.
The no form of the command removes the syslog target host IP address.
no address
This command configures the facility code for messages sent to the syslog target host.
Multiple syslog IDs can be created with the same target host but each syslog ID can only have one facility code. If multiple facility codes are entered, the last facility code entered overwrites the previous facility code.
If multiple facilities need to be generated for a single syslog target host, then multiple log-id entries must be created, each with its own filter criteria to select the events to be sent to the syslog target host with a given facility code.
The no form of the command reverts to the default value.
local7
This command configures the syslog message severity level threshold. All messages with a severity level equal to or higher than the threshold are sent to the syslog target host.
Only a single threshold level can be specified. If multiple level commands are entered, the last command will overwrite the previous command.
The no form of the command reverts to the default value.
info
Configured Severity | Definition |
Emergency | System is unusable |
Alert | Action must be taken immediately |
Critical | Critical condition |
Error | Error condition |
Warning | Warning condition |
Notice | Normal but significant condition |
Info | Informational messages |
Debug | Debug-level messages |
This command adds the string prepended to every syslog message sent to the syslog host.
RFC 3164, The BSD syslog Protocol, allows an alphanumeric string (tag) to be prepended to the content of every log message sent to the syslog host. This alphanumeric string can, for example, be used to identify the node that generates the log entry. The software appends a colon (:) and a space to the string and it is inserted in the syslog message after the date stamp and before the syslog message content.
Only one string can be entered. If multiple strings are entered, the last string overwrites the previous string. The alphanumeric string can contain lowercase (a-z), uppercase (A-Z) and numeric (0-9) characters.
The no form of the command removes the log prefix string.
no log-prefix
This command configures the UDP port that will be used to send syslog messages to the syslog target host.
The port configuration is needed if the syslog target host uses a port other than the standard UDP syslog port 514.
Only one port can be configured. If multiple port commands are entered, the last entered port overwrites the previously entered ports.
The no form of the command reverts to default value.
no port
This command creates a context to configure destinations for event streams.
The log-id context is used to direct events, alarms, traps, and debug information to respective destinations.
A maximum of 100 logs can be configured.
Before an event can be associated with this log-id, the log-id>from command identifying the source of the event must be configured.
Only one destination can be specified for a log-id. The destination of an event stream can be an in-memory buffer, console, session, snmp-trap-group, syslog, or file.
Use the event-control command to suppress the generation of events, alarms, and traps for all log destinations.
An event filter policy can be applied in the log-id context to limit which events, alarms, and traps are sent to the specified log-id.
Log-IDs 99 and 100 are created by the agent. Log-ID 99 captures all log messages. Log-ID 100 captures log messages with a severity level of major and above.
The no form of the command deletes the log destination ID from the configuration.
No log destinations are defined
This command associates an event filter policy with the log destination.
The filter command is optional. If no event filter is configured, all events, alarms and traps generated by the source stream will be forwarded to the destination.
An event filter policy defines (limits) the events that are forwarded to the destination configured in the log-id. The event filter policy can also be used to select the alarms and traps to be forwarded to a destination snmp-trap-group.
The application of filters for debug messages is limited to application and subject only.
Accounting records cannot be filtered using the filter command.
Only one filter-id can be configured per log destination.
The no form of the command removes the specified event filter from the log-id.
no filter
This command selects the source stream to be sent to a log destination.
One or more source streams must be specified. The source of the data stream must be identified using the from command before you can configure the destination using the to command. The from command can identify multiple source streams in a single statement (for example: from main change debug-trace).
Only one from command may be entered for a single log-id. If multiple from commands are entered, then the last command entered overwrites the previous command.
The no form of the command removes all previously configured source streams.
no from
This command instructs the events selected for the log ID to be directed to the console. If the console is not connected, all entries are dropped.
The command is one of the to commands used to specify the log ID destination. A to command is mandatory when configuring a log destination.
The source of the data stream must be specified in the from command prior to configuring the destination with the to command.
The to command can only be set once. It cannot be modified or re-entered. If the log destination needs to be changed or if the maximum size of an SNMP log or memory log needs to be modified, the log ID must be removed and then recreated.
No destination is specified
This command instructs the events selected for the log ID to be directed to a specified file.
The command is one of the to commands used to specify the log ID destination. A to command is mandatory when configuring a log destination.
The source of the data stream must be specified in the from command prior to configuring the destination with the to command.
The to command can only be set once. It cannot be modified or re-entered. If the log destination needs to be changed or if the maximum size of an SNMP log or memory log needs to be modified, the log ID must be removed and then recreated.
No destination is specified
This command instructs the events selected for the log ID to be directed to a memory file. A memory file is a circular buffer. Once the file is full, each new entry replaces the oldest entry in the log.
The command is one of the to commands used to specify the log ID destination. A to command is mandatory when configuring a log destination.
The source of the data stream must be specified in the from command prior to configuring the destination with the to command.
The to command can only be set once. It cannot be modified or re-entered. If the log destination needs to be changed or if the maximum size of an SNMP log or memory log needs to be modified, the log ID must be removed and then recreated.
No destination is specified
This command instructs the events selected for the log ID to be directed to the current console or Telnet session. This command is only valid for the duration of the session. When the session is terminated, the to session configuration is removed. A log ID with a session destination is saved in the configuration file but the to session part of the configuration is not stored.
The command is one of the to commands used to specify the log ID destination. A to command is mandatory when configuring a log destination.
The source of the data stream must be specified in the from command prior to configuring the destination with the to command.
The to command can only be set once. It cannot be modified or re-entered. If the log destination needs to be changed or if the maximum size of an SNMP log or memory log needs to be modified, the log ID must be removed and then recreated.
No destination is specified
This command instructs the alarms and traps to be directed to the snmp-trap-group associated with the log-id.
A local circular memory log is always maintained for SNMP notifications sent to the specified snmp-trap-group for the log-id.
The command is one of the to commands used to specify the log ID destination. A to command is mandatory when configuring a log destination.
The source of the data stream must be specified in the from command prior to configuring the destination with the to command.
The to command can only be set once. It cannot be modified or re-entered. If the log destination needs to be changed or if the maximum size of an SNMP log or memory log needs to be modified, the log ID must be removed and then recreated.
No destination is specified
This command instructs the alarms and traps to be directed to a specified syslog. To remain consistent with the standards governing syslog, messages to syslog are truncated to 1 kbyte.
The command is one of the to commands used to specify the log ID destination. A to command is mandatory when configuring a log destination.
The source of the data stream must be specified in the from command prior to configuring the destination with the to command.
The to command can only be set once. It cannot be modified or re-entered. If the log destination needs to be changed or if the maximum size of an SNMP log or memory log needs to be modified, the log ID must be removed and then recreated.
No destination is specified
This command specifies whether the time should be displayed in local or Coordinated Universal Time (UTC) format.
utc
This command enables the context to configure a group of SNMP trap receivers and their operational parameters for a given log-id.
A trap group specifies the types of SNMP traps and specifies the log ID that will receive the group of SNMP traps. A trap group must be configured in order for SNMP traps to be sent.
To suppress the generation of all alarms and traps, see the event-control command. To suppress alarms and traps that are sent to this log-id, see the filter (log destination) command. Once alarms and traps are generated, they can be directed to one or more SNMP trap groups. Logger events that can be forwarded as SNMP traps are always defined on the main event source.
The no form of the command deletes the SNMP trap group.
There are no default SNMP trap groups.
This command adds or modifies a trap receiver and configures the operational parameters for the trap receiver. A trap reports significant events that occur on a 7705 SAR, such as errors or failures.
Before an SNMP trap can be issued to a trap receiver, the to console, snmp-trap-group, and at least one trap-target must be configured.
The trap-target command is used to add or remove a trap receiver from an snmp-trap-group. The operational parameters specified in the command include:
A single snmp-trap-group log-id can have multiple trap receivers. Each trap receiver can have different operational parameters.
An address can be configured as a trap receiver more than once as long as a different port is used for each instance.
To prevent resource limitations, only configure a maximum of 10 trap receivers.
![]() | Note: If the same trap-target name port port parameter value is specified in more than one SNMP trap group, each trap destination should be configured with a different notify-community value. This allows a trap receiving an application, such as NMS, to reconcile a separate event sequence number stream for each 7705 SAR event log when multiple event logs are directed to the same IP address and port destination. |
The no form of the command removes the SNMP trap receiver from the SNMP trap group.
No SNMP trap targets are defined.
snmpv1 | Selects the SNMP version 1 format. When specifying snmpv1, the notify-community parameter must be configured for the proper SNMP community string that the trap receiver expects to be present in alarms and traps messages. If the SNMP version is changed from snmpv3 to snmpv1, then the notify-community parameter must be changed to reflect the community string rather than the snmpv3securityName that is used by snmpv3. | |
snmpv2c | Selects the SNMP version 2c format. When specifying snmpv2c, the notify-community parameter must be configured for the proper SNMP community string that the trap receiver expects to be present in alarms and traps messages. If the SNMP version is changed from snmpv3 to snmpv2c, then the notify-community parameter must be changed to reflect the community string rather than the security-name that is used by snmpv3. | |
snmpv3 | Selects the SNMP version 3 format. When specifying snmpv3, the notify-community parameter must be configured for the SNMP security-name. If the SNMP version is changed from snmpv1 or snmpv2c to snmpv3, then the notify-community parameter must be changed to reflect the security-name rather than the community string used by snmpv1 or snmpv2c. |
communityName | Community string as required by the snmpv1 or snmpv2c trap receiver. The community string can be an ASCII string up to 32 characters in length | |
snmpv3SecurityName | the security name as defined in the config>system>security>user context for SNMP v3. The snmpv3SecurityName can be an ASCII string up to 32 characters in length |
no-auth-no-privacy | Specifies that no authentication and no privacy (encryption) are required. | |
auth-no-privacy | Specifies that authentication is required but no privacy (encryption) is required. When this option is configured, the security-name must be configured for authentication. | |
privacy | Specifies that both authentication and privacy (encryption) are required. When this option is configured, the security-name must be configured for authentication and privacy. |
![]() | Note: The following command outputs are examples only; actual displays may differ depending on supported functionality and user configuration. |
This command displays accounting policy information.
The following output is an example of accounting policy information, and Table 43 describes the fields.
Label | Description |
Policy ID | The identifying value assigned to a specific policy |
Type | Identifies the accounting policy type forwarded to the configured accounting file |
access: indicates that the policy is an access accounting policy | |
network: indicates that the policy is a network accounting policy | |
none: indicates no accounting policy types assigned | |
Def | Yes: indicates that the policy is a default policy |
No: indicates that the policy is not a default policy | |
Admin State | Displays the administrative state of the policy |
Up: indicates that the policy is administratively enabled | |
Down: indicates that the policy is administratively disabled | |
Oper State | Displays the operational state of the policy |
Up: indicates that the policy is operationally up | |
Down: indicates that the policy is operationally down | |
Intvl | Displays the interval, in minutes, in which statistics are collected and written to their destination. The default depends on the record name type. |
File ID | The log destination |
Record Name | The accounting record name that represents the configured record type |
Description | The description of the accounting policy |
Data Loss Count | The number of times a statistics data loss has occurred |
Data Loss Timestamp | The timestamp of the last data loss occurrence. If there are no losses, the timestamp is N/A. |
This policy is applied to | Specifies the entities that the accounting policy is applied to |
This command displays accounting policy record names.
The following output is an example of accounting policy record information, and Table 44 describes the fields.
Label | Description |
Record # | The record ID that uniquely identifies the accounting policy, expressed as a decimal integer |
Record Name | The accounting record name |
Def. Interval | The default interval, in minutes, in which statistics are collected and written to their destination |
This command displays a list of all application names that can be used in event-control and filter commands.
The following output is an example of an application list (not all applications apply to the 7705 SAR).
This command displays event control settings for events, including whether the event is suppressed or generated, and the severity level for the event.
If no options are specified, all events, alarms, and traps are listed.
The following output is an example of event control information, and Table 45 describes the fields. Because the output is very large, only a sample of the events are shown here.
Label | Description |
Application | The application name |
ID# | The event ID number within the application L ID#: an “L” in front of an ID represents event types that do not generate an associated SNMP notification. Most events generate a notification; only the exceptions are marked with a preceding “L”. |
Event Name | The event name |
P | CL: the event has a cleared severity/priority |
CR: the event has critical severity/priority | |
IN: the event has indeterminate severity/priority | |
MA: the event has major severity/priority | |
MI: the event has minor severity/priority | |
WA: the event has warning severity/priority | |
g/s | gen: the event will be generated/logged by event control |
sup: the event will be suppressed/dropped by event control | |
thr: specifies that throttling is enabled | |
Logged | The number of events logged/generated |
Dropped | The number of events dropped/suppressed |
This command enables the context to display Event Handling System (EHS) information.
This command displays event handler information.
The following is an example of event handler information, and Table 46 describes the fields.
Label | Description |
Handler | The name of the event handler |
Description | The event handler description string |
Admin State | The administrative state of the event handler |
Oper State | The operational state of the event handler |
Handler Execution Statistics | |
Success | The number of times that the event handler was successfully triggered |
Err No Entry | The number of times that the event handler failed to trigger due to no action-list entry |
Err Adm Status | The number of times that the event handler was not executed because the entry was administratively disabled |
Total | The total number of times that the event handler attempted execution |
Handler Action-List Entry | |
Entry-id | The action-list entry identifier |
Description | The action-list entry description string |
Admin State | The administrative state of the action-list entry |
Oper State | The operational state of the action-list entry |
Script | |
Policy Name | The name of the related script policy |
Policy Owner | The owner of the related script policy |
Min Delay | The configured minimum delay time between subsequent executions of the action specified in the entry |
Last Exec | The timestamp of the last successful execution of the action-list entry |
Handler Action-List Entry Execution Statistics | |
Success | The number of times that the action-list entry was successfully queued to run. For a script-policy entry, this indicates that the script request has been enqueued but does not necessarily indicate that the script has successfully launched or completed. |
Err Mn Delay | The number of times that the action-list entry attempted to execute before the minimum delay time expired |
Err Launch | The number of times that the action-list entry was not successfully queued to run. This could be caused by a number of conditions, including a full script request input queue. |
Err Adm Status | The number of times that the action-list entry was not executed because the entry was administratively disabled |
Total | The total number of times that the action-list entry attempted execution |
This command displays general information about EHS, as well as handler and trigger statistics.
The following is an example of EHS information.
This command displays handler configuration and script run queue information.
The following is an example of script information.
This command displays the common parameters and specific parameters of log event or of all log events. This lets a user know what parameters can be passed from a triggering event to the triggered EHS script.
The following is an example of log event parameter information.
This command displays event log file information.
If no command line parameters are specified, a summary output of all event log files is displayed.
Specifying a file ID displays detailed information on the event log file.
The following output is an example of event log file information, and Table 47 describes the fields.
Label | Description |
file-id | The log file ID |
rollover | The rollover time for the log file, which is the amount of time before the file is partitioned into a new file. |
retention | The retention time for the file in the system, which is how long the file should be retained in the file system |
admin location | The flash device specified for the file location |
none: indicates no specific flash device was specified | |
backup location | The backup compact flash device specified for the file location |
oper location | The actual flash device on which the log file exists |
file name | The complete pathname of the file associated with the log ID |
expired | Indicates whether the retention period for this file has passed |
state | in progress: indicates the current open log file |
complete: indicates the old log file |
This command displays event log filter policy information. If you specify a filter ID, the command also displays the filter match criteria.
The following outputs are examples of event log filter policy information:
Label | Description |
Filter Id | The event log filter ID |
Applied | no: the event log filter is not currently in use by a log ID |
yes: the event log filter is currently in use by a log ID | |
Default Action | drop: the default action for the event log filter is to drop events not matching filter entries |
forward: the default action for the event log filter is to forward events not matching filter entries | |
Description | The description string for the filter ID |
Label | Description |
Entry-id | The event log filter entry ID |
Action | default: there is no explicit action for the event log filter entry and the filter’s default action is used on matching events |
drop: the action for the event log filter entry is to drop matching events | |
forward: the action for the event log filter entry is to forward matching events | |
Description: (Entry-id) | The description string for the event log filter entry |
Application | The event log filter entry application match criterion |
Event Number | The event log filter event ID match criterion |
Severity | cleared: the event log filter severity match is cleared |
indeterminate: the event log filter entry application event severity indeterminate match criterion | |
critical: the event log filter entry application event severity critical match criterion | |
major: the event log filter entry application event severity cleared match criterion | |
minor: the event log filter entry application event severity minor match criterion | |
warning: the event log filter entry application event severity warning match criterion | |
Subject | Displays the event log filter entry subject string match criterion |
Router | Displays the event log filter entry router router-instance string match criterion |
Operator: | There is an operator field for each match criteria: application, event number, severity, and subject |
equal: matches when equal to the match criterion | |
greaterThan: matches when greater than the match criterion | |
greaterThanOrEqual: matches when greater than or equal to the match criterion | |
lessThan: matches when less than the match criterion | |
lessThanOrEqual: matches when less than or equal to the match criterion | |
notEqual: matches when not equal to the match criterion | |
off: no operator specified for the match criterion |
This command displays log collector statistics for the main, security, change and debug log collectors.
The following output is an example of log collector statistics, and Table 50 describes the fields.
Label | Description |
<Collector Name> | Main: the main event stream contains the events that are not explicitly directed to any other event stream |
Security: the security stream contains all events that affect attempts to breach system security, such as failed login attempts, attempts to access MIB tables to which the user is not granted access or attempts to enter a branch of the CLI to which access has not been granted | |
Change: the change event stream contains all events that directly affect the configuration or operation of this node | |
Debug: the debug-trace stream contains all messages in the debug stream | |
Dest. Log ID | Specifies the event log stream destination |
Filter ID | The value is the index to the entry that defines the filter to be applied to this log's source event stream to limit the events output to this log's destination. If the value is 0, then all events in the source log are forwarded to the destination. |
Status | Enabled: logging is enabled |
Disabled: logging is disabled | |
Dest. Type: | Console: a log created with the console type destination displays events to the physical console device Events are displayed to the console screen whether a user is logged in to the console or not. A user logged in to the console device or connected to the CLI via a remote Telnet or SSH session can also create a log with a destination type of 'session'. Events are displayed to the session device until the user logs off. When the user logs off, the 'session' type log is deleted. |
Syslog: all selected log events are sent to the syslog address | |
SNMP traps: events defined as SNMP traps are sent to the configured SNMP trap destinations and are logged in NOTIFICATION-LOG-MIB tables | |
File: all selected log events are directed to a file on the CSM’s compact flash disk | |
Memory: all selected log events are directed to an in-memory storage area |
This command displays an event log summary with settings and statistics or the contents of a specific log file, SNMP log, or memory log.
If the command is specified with no command line options, a summary of the defined system logs is displayed. The summary includes log settings and statistics.
If the log ID of a memory, SNMP, or file event log is specified, the command displays the contents of the log. Additional command line options control what and how the contents are displayed.
Contents of logs with console, session or syslog destinations cannot be displayed. The actual events can only be viewed on the receiving syslog or console device.
If the to-seq number is not provided, the log contents to the end of the log are displayed unless the count parameter is present, in which case the number of entries displayed is limited by the count.
The following output is an example of event log summary information, and Table 51 describes the fields.
Label | Description |
Log Id | An event log destination |
Source | no: the event log filter is not currently in use by a log ID |
yes: the event log filter is currently in use by a log ID | |
M: the event source for the log ID is the Main event category | |
C: the event source for the log ID is the Change event category | |
none: the event log filter is currently in use by a log ID | |
Filter ID | The value is the index to the entry that defines the filter to be applied to this log's source event stream to limit the events output to this log's destination. If the value is 0, then all events in the source log are forwarded to the destination. |
Admin State | Up: indicates that the administrative state is up |
Down: indicates that the administrative state is down | |
Oper State | Up: indicates that the operational state is up |
Down: indicates that the operational state is down | |
Logged | The number of events that have been sent to the log sources that were forwarded to the log destination |
Dropped | The number of events that have been sent to the log sources that were not forwarded to the log destination because they were filtered out by the log filter |
Dest. Type | Console: all selected log events are directed to the system console. If the console is not connected, then all entries are dropped. |
Syslog: all selected log events are sent to the syslog address | |
SNMP traps: events defined as SNMP traps are sent to the configured SNMP trap destinations and are logged in NOTIFICATION-LOG-MIB tables | |
File: all selected log events are directed to a file on the CSM's compact flash disk | |
Memory: all selected log events are directed to an in-memory storage area | |
Dest ID | The event log stream destination |
Size | The allocated memory size for the log |
This command displays SNMP trap group configuration information.
The following output is an example of SNMP trap group information, and Table 52 describes the fields.
Label | Description |
Name | The log destination ID for an event stream |
Address | The IP address of the trap receiver |
Port | The destination UDP port used for sending traps to the destination, expressed as a decimal integer |
Version | Specifies the SNMP version format to use for traps sent to the trap receiver. Valid values are v1, v2c, and v3. |
Community | The community string required by snmpv1 or snmpv2c trap receivers |
Sec. Level | The required authentication and privacy security levels required to access the views on this node |
Replay | Indicates whether the replay parameter has been configured for the trap-target address: enabled or disabled |
First replay | Indicates the sequence ID of the first missed notification that will be replayed when a route by which the trap-target address can be reached is added to the routing table. If no notifications are waiting to be replayed, this field shows “n/a”. |
Last replay | Indicates the last time that missed events were replayed to the trap-target address. If no events have ever been replayed, this field shows “never”. |
This command displays syslog event log destination summary information or detailed information on a specific syslog destination.
The following output is an example of syslog event log destination summary information, and Table 53 describes the fields.
Label | Description |
Syslog ID | The syslog ID number for the syslog destination |
IP Address | The IP address of the syslog target host |
Port | The configured UDP port number used when sending syslog messages |
Facility | The facility code for messages sent to the syslog target host |
Severity Level | The syslog message severity level threshold |
Below Level Dropped | A count of messages not sent to the syslog collector target because the severity level of the message was above the configured severity. The higher the level, the lower the severity. |
Prefix Present | Yes: a log prefix was prepended to the syslog message sent to the syslog host |
No: a log prefix was not prepended to the syslog message sent to the syslog host | |
Description | A text description stored in the configuration file for a configuration context |
LogPrefix | The prefix string prepended to the syslog message |
Log-id | Events are directed to this destination |
This command reinitializes or rolls over the specified memory log or log file. Memory logs are reinitialized and cleared of contents. Log files are manually rolled over.
This command is only applicable to event logs that are directed to file destinations and memory destinations.
SNMP, syslog, and console/session logs are not affected by this command.
This command enables the context to clear Event Handling System (EHS) information.
This command clears the event-handler statistics for the specified event handler. These statistics are displayed in the show log event-handling handler handler-name output. The command does not clear the global or aggregate event-handling statistics.
This command clears global and aggregate event-handling statistics. These statistics are displayed in the show log event-handling information output.